content
stringlengths 1
15.9M
|
---|
\section{Introduction}
The dwarf galaxies surrounding the Milky Way are the most extreme dark
matter dominated objects known to us with central mass to light ratios
typically of the order of tens to hundreds~\citep[e.g.,][]{Ma98,Kl02}.
Additionally, little or no emission has been detected in wavebands
other than the optical, and so the intrinsic astrophysical backgrounds
are low. This makes the dSphs attractive targets to look for signals
of dark matter annihilation products~\citep{La90,Ev04,Cu06,Co07}.
The $\gamma$ ray differential flux from dark matter annihilation
measured within a solid angle $\Delta \Omega$ is~\citep[see
e.g.,][]{Be98,Ev04}
\begin{equation}
{d \phi_\gamma \over d E_\gamma} = \phi^{\rm {PP}}(E) \times {\rm J}(\Delta
\Omega).
\end{equation}
The first term on the right-hand side depends on the particle physics
(i.e. dark matter particle mass, annihilation cross section, and
Standard Model final states). The second term is the astrophysical
factor, or J-factor, and encapsulates the distribution of dark matter
within the system of interest:
\begin{equation}
{\rm J} = \int\int {\rho_{\rm DM}}^2(\ell, \Omega) d\ell d\Omega.
\label{eq:Jfactor}
\end{equation}
It is therefore the square of the dark matter density integrated along
the line of sight and over the solid angle of the sky corresponding to the observation.
For the dSphs, the dark matter density is not known, but can be
constrained from the line of sight velocities of individual stars.
The spherical Jeans equations are often used to relate the velocities
of the stars to the underlying dark matter distribution. Nowadays,
this is often explored in a Bayesian framework using Monte Carlo
techniques, { so that the calculation of the J-factors requires
significant computational
effort~\citep{Ab10,Ch11,Wa11,Ge15b,Bo15a,Mar15}.}
However, it is reasonable to look for a simpler way of computing
J-factors for two reasons. First, for many of the recently discovered
ultrafaint dwarf galaxies, there are few stars with line of sight
velocities. In some cases, such as Ursa Major II, the giant branch
itself is so sparse that there are very few target stars for
spectroscopy~\citep{Zu06}. Given such fundamental limitations on the
observational data, the extensive exploration of model-space in
conventional Jeans analyses may be needlessly elaborate. Second, an
entirely characteristic feature of the dSphs is that they are
flattened. In fact, some of the ultrafaints are very highly flattened
with ellipticities exceeding $0.5$, such as Ursa Major
II~\citep{Zu06}, Hercules~\citep{De12}, Ursa Major I~\citep{Ma08} and
Reticulum II~\citep{Ko15}. Therefore, the underlying physical model of
a spherical dark halo containing a round distribution of stars
satisfying the Jeans equation may fail to capture important aspects of
the physics. This leaves the value of computationally intensive
approaches based on sphericity open to question, { as they may
suffer from systematic effects when applied to flattened or triaxial
systems. While there have already been some investigations of
axisymmetry and triaxiality~\citep{La13,Bo15a}, the implications of
these effects on the dark matter annihilation signal warrants a
systematic study, which we provide elsewhere~\citep{Sa16}.}
{ The question as to whether dSphs have cored or cusped dark
matter densities has been investigated intensively over the past few
years. The latest simulations have reached a resolution where the
effect of individual supernovae can be modelled, making them much
less sensitive to the details of the `sub-grid' star formation and
feedback physics~\citep{On15,Re15}. They suggest that dark matter
cores of size comparable to the half-light radius of the stellar
component should be present in objects like Carina and Fornax that
have formed stars for a Hubble time. However, dSphs with patchy star
formation may be more cuspy, with the ultra-faints possibly
retaining a pristine cusp of the form originally proposed by
Navarro, Frenk \& White (NFW)~\cite{NFW}. This picture is broadly
consistent with simple energy constraints~\cite{Pe12}, as well as
tidal arguments suggesting that if the ultra-faints had dark matter
cores, then they would not survive for long on their current
orbits~\cite{Pe10}. All this suggests that, even if the larger
classical dSphs are cored as implied by the current observational
data on general grounds~\citep{Ag12}, the smaller dSphs and the
ultra-faints are probably cusped with dark matter densities behaving
like ${\rho_{\rm DM}} \sim r^{-1}$ at small radii.}
Here, we provide a set of simple formulae for J-factors in spherical
cusped geometries. Our approach is entirely elementary, but we show
that it leads to formulae that are very competitive with more
laborious approaches. Section II concentrates on the cosmologically
motivated $1/r$ cusp exemplified by the NFW model. We
provide an analytic formula for the J-factor of the NFW model, as well
as new estimates for the classical and ultrafaint dwarfs, including
the newly discovered Horologium I, Grus I, Hydra II, and Pisces II.
Section III extends the work into more general cusped and cored dark
haloes and explores the possibilty of inferring halo structure from
J-factor profiles. In particular, we show how the behaviour of the
J-factor at small and large integration angles is controlled by the
halo parameters. Finally, we investigate the existence of a sweet spot
{ -- namely an integration angle at which the value of the
J-factor is reasonably insensitive to the unknowable aspects of the
underlying dark halo profile~\citep{Ch11,Wa11}.}
\begin{table*}
\caption{Annihilation and decay factors for dwarf spheroidals: we
quote the predictions of the NFW formula from
equations~\eqref{eq:Jfactorfull} and~\eqref{eq:Dfactorfull} using
$r_s=5R_\mathrm{half}$ at two angles -- the angle between the centre
of the dwarf and an estimate of the distance to the outermost member
star $({\theta}_\mathrm{max})$ and $\theta=0.5^\circ$. The dwarfs in
the top section are classical dwarfs and those in the middle section
are those ultrafaint dwarfs that have $J$ and $D$ estimates from the
literature. The bottom section shows those ultrafaint dwarfs without
pre-existing $J$ or $D$ estimates. For these we adopt
${\theta}_\mathrm{max}=0.5^\circ$.} \input{dwarfs_Jfactors.dat}
\label{table:Jfs}
\end{table*}
\begin{figure}
$$\includegraphics[width=\columnwidth]{{J_against_distance}}$$
\caption{Dwarf annihilation factors against distance: the points show
the J-factors computed for an opening angle of $0.5^\circ$ using the
simple NFW formula presented in this paper with $r_s=5R_\mathrm{h}$.
The red diamonds correspond to the classical dwarfs, the black
circles to the ultrafaints, and the blue squares to four
recently-discovered dwarfs with no pre-existing literature estimates
of their J-factors.}
\label{fig:J_against_d}
\end{figure}
\begin{figure*}
$$\includegraphics[width=\textwidth]{{cd_grid}}$$
\caption{Classical dwarf annihilation factors: the points are taken
from the full Jeans analysis of \protect\cite{Ge15b}. The red and
yellow bands are the estimates from equation~\eqref{eq:Jsimple}
using $\gamma=1$ and $\gamma=0.51$ respectively. The blue band is
the estimate from equation~\eqref{eq:Jfactorfull} using
$r_s=5R_\mathrm{half}$. The median and $\pm1\sigma$ estimates of
$\log_{10}(J(\theta))$ from \protect\cite{Bo15c} are given by the
black solid and dashed lines respectively. The red diamonds are the
estimates of $\log_{10}(J(0.5^\circ))$ from
\protect\cite{FermiLAT}.}
\label{fig:cd_grid}
\end{figure*}
\begin{figure*}
$$\includegraphics[width=\textwidth]{{uf_grid}}$$
\caption{Ultra-faint dwarf annihilation factors: see caption of
Fig.~\protect\ref{fig:cd_grid}. The points for Tucana II and
Reticulum II are taken from refs \cite{Wa15} and \cite{Bo15b}
respectively.}
\label{fig:uf_grid}
\end{figure*}
\begin{figure*}
$$\includegraphics[width=\textwidth]{{predict_grid}}$$
\caption{Predictions for ultra-faint dwarf annihilation factors: see
caption of Fig.~\protect\ref{fig:cd_grid}.}
\label{fig:predict_grid}
\end{figure*}
\section{Simple Formulae for J-factors}
Here, we provide a simple calculation for the J-factor of both a
spherical cusp and a Navarro-Frenk-White (NFW) halo. We show our
formulae reproduce the results of more sophisticated calculations.
\subsection{Spherical Cusp}
In spherical symmetry, dSphs follow the empirical law
\begin{equation}
M_{\rm h} = M(R_{\rm h}) \approx {2.5 \over G} \sigma_{\rm los}^2 R_{\rm h},
\label{eq:wolf}
\end{equation}
where $R_{\rm h}$ is the (projected) half-light radius of the stars and
$\sigma_{\rm los}$ is the luminosity weighted square of the velocity
dispersion. { Specifically, this is defined as
\begin{equation}
\sigma_{\rm los}^2 = {1\over L} \int_V \nu(r) v_{\rm los}^2 dV
\end{equation}
where $L$ is the total luminosity, $\nu(r)$ is the luminosity density
of the dSph and $v_{\rm los}$ is the line of sight velocity. In other words,
the physical content of eq.~(\ref{eq:wolf}) is that the mass enclosed
within the half-light radius is robust against changes in
anisotropy. This result was demonstrated from solutions of the
spherical Jeans equations~\citep{Wa09,Wo10}. There are known biases in
this formula when applied to populations deeply embedded with dark
haloes, such as the metal-rich sub-populations of dSphs~\citep{WP}. In
our application to the entirety of the stellar population of the dSph,
any such bias is negligible, especially compared to the uncertainty in the
velocity dispersion itself, which dominates the overall error budget.}
Infinite spherical cusps obeying this law have enclosed mass
\begin{equation}
M(r) = M_{\rm h} \left( {r\over R_{\rm h}} \right)^{3-\gamma}
= {5 \sigma_{\rm los}^2 \over 2 G R_{\rm h}^{2-\gamma}} r^{3-\gamma},
\end{equation}
where $0<\gamma<3$. The dark matter density is
\begin{equation}
{\rho_{\rm DM}}(r) = {M_{\rm h}\over 4 \pi R_{\rm h}^{3-\gamma}}{3 -\gamma \over r^\gamma}
= {5\sigma_{\rm los}^2\over 8 \pi G R_{\rm h}^{2-\gamma}}{3 -\gamma \over r^\gamma}.
\label{eq:sphericaldens}
\end{equation}
This gives us a one-parameter family of dark matter cusps that always
obey the empirical law~(\ref{eq:wolf}).
We now make two assumptions to enable us to perform the integration in
the J-factor analytically. First, we assume that the dSph is
sufficiently distant that
\begin{equation}
d\Omega d\ell \rightarrow {1\over D^2} 2 \pi R dR dz.
\end{equation}
Here, $D$ is the heliocentric distance, $z$ is the line of sight and
$R$ is a polar coordinate in the plane of the sky. This approximation
means that the projection is from infinity rather than from a finite
distance. The integration volume is a cylinder rather than a cone. As
even the nearest ultrafaints (Segue 1 and Reticulum II) are $\sim
20-30$ kpc distant, this incurs little actual error. Second, we
assume that the J-factor is dominated by contributions from the
singular cusp. We show {\it a posteriori} that this approximation is
fine by comparing our formula to the results of more elaborate
calculations.
The integration in eq.~(\ref{eq:Jfactor}) can now be done
analytically
\begin{eqnarray}
{\rm J} &=& {2\pi\over D^2} \int_{-\infty}^{\infty} dz \int_0^{D{\theta}} R {\rho_{\rm DM}}^2 dR, \nonumber \\
&=& {25 \sigma_{\rm los}^4 \over 64 G^2} {1 \over D^2 R_{\rm h}} \left({D{\theta} \over R_{\rm h}}\right)^{3-2\gamma} P(\gamma),
\label{eq:Jsimple}
\end{eqnarray}
where $P(\gamma)$ is a dimensionless number depending on the cusp
slope $\gamma$
\begin{equation}
P(\gamma) = {2 \over \pi^{1/2}}\,{(3-\gamma)^2\Gamma(\gamma -
\frac{1}{2})\over (3-2\gamma)\Gamma(\gamma)}.
\end{equation}
{ Here, $\Gamma(x)$ is the gamma function, whilst we require $1/2
< \gamma < 3/2$ for convergence. This constraint can be interpreted
physically. If the density is too shallow ($\gamma < 1/2$), then the
dark matter extends too far along the line of sight, causing the $z$
integral to diverge. Similarly, if it is too strongly cusped
($\gamma> 3/2$), then the contribution from the cusp at $r=0$ also
causes the $z$ integral to diverge.}
The angular integration is usually performed out to ${\theta} =
0.5^\circ$ from the centre of the dSph, as this is typical of the
resolution of Fermi-LAT data in the GeV range. \citet{Wa11} have
argued that the J-factor is most robust to modelling uncertainty when
the integration angle is ${\angle_{\rm crit}} \approx 2R_{\rm h}/D$, or twice the
half-light radius of the stars divided by distance to the dSph.
Finally, it is also useful to compute the J-factor out to ${\angle_{\rm max}} ={\rm
asin} (r_\mathrm{max}/D)$ where $r_\mathrm{max}$ is an estimate of
the maximum galactocentric distance in the sample of observed member
stars (see~\citep[][Sec. 6.2]{Ge15b}). We expect our formula to break
down at large ${\theta}$, but this is usually comparable or beyond
${\angle_{\rm max}}$.
In scenarios in which the dark matter decays (rather than
annihilates) to give $\gamma$ rays~\citep{Bo10}, it is also
helpful to have the D-factor, which is just
\begin{equation}
{\rm D} = \int\int {\rho_{\rm DM}} (\ell, \Omega) d\ell d\Omega.
\label{eq:Dfactor}
\end{equation}
Using the same approximation of an infinite cusp obeying the empirical
law (\ref{eq:wolf}), we find
\begin{equation}
{\rm D} = {5 \sigma_{\rm los}^2 \over 8 G} {R_{\rm h} \over D^2} \left( {D{\theta} \over R_{\rm h}}\right)^{3-\gamma} Q(\gamma),
\label{eq:Dsimple}
\end{equation}
where
\begin{equation}
Q(\gamma) = {2 \pi^{1/2}}\,{\Gamma( \frac{\gamma}{2} - \frac{1}{2}) \over \Gamma(\gamma/2)}.
\end{equation}
with $1 < \gamma < 3$ for convergence. This of course does not
converge for $\gamma =1$ because of contributions at large radii where
the integral diverges logarithmically.
\begin{figure*}
$$\includegraphics[width=\textwidth]{{cd_grid_decay}}$$
\caption{Classical dwarfs decay factors: the points are taken from the
full Jeans analysis of \protect\cite{Ge15b}. The red and yellow
bands are the estimates from equation~\eqref{eq:Dsimple} using
$\gamma=1$ and $\gamma=1.49$ respectively. The blue band is the
estimate from equation~\eqref{eq:Dfactorfull} using
$r_s=5R_\mathrm{half}$. The median and $\pm1\sigma$ estimates of
$\log_{10}(D(\theta))$ from \protect\cite{Bo15c} are given by the
black solid and dashed lines respectively.}
\label{fig:cd_grid_decay}
\end{figure*}
\subsection{NFW Cusp}
There is ample numerical evidence that dark matter halos have an
approximate double power law structure~\citep[][hereafter NFW]{NFW}
with cusp slope $\gamma = 1$. For this astrophysically important
case, we obtain
\begin{equation}
{\rm J} = {25 \over 8 G^2}\, {\sigma_{\rm los}^4 {\theta} \over D R_{\rm h}^2},
\label{eq:JsimpleNFW}
\end{equation}
This very simple result does not appear to have been given before.
The D-factor however is infinite, as the surface density of an
untruncated $1/r$ density cusp does not converge. In fact, for the
full NFW model, it is possible to carry out the integration explicitly
for both the J- and the D-factors and obtain exact results. These are
a little more cumbersome than the pure power-law case, but still
simple enough to be useful.
We begin by introducing an auxiliary function \citep[e.g.,][]{He90,Ev14}
\begin{equation}
X(s) = \begin{cases}
{\displaystyle {1\over \sqrt{1-s^2}}{\rm Arcsech}\, s}, & 0\le s\le 1,\nonumber\\
{\displaystyle {1\over \sqrt{s^2-1}}{\rm Arcsec}\, s }, & s\ge 1.
\end{cases}
\end{equation}
We note that $X(1)=1$ so that the function is continuous. We take the
NFW model in the form
\begin{equation}
{\rho_{\rm DM}}(r) = {\rho_0 r_{\rm s}^3 \over r ( r + r_{\rm s})^2}.
\end{equation}
Then, the J-factor is
\begin{eqnarray}
{\rm J} &=& {\pi \rho_0^2 r_{\rm s}^2 \over 3D^2\Delta^4}\Biggl[ 2D{\theta} (7Dr_{\rm s}^3{\theta} - 4D^3r_{\rm s}{\theta}^3 + 3\pi \Delta^4) \cr
&+& {6\over r_{\rm s}} (2\Delta^6 - 2r_{\rm s}^4\Delta^2 - D^4r_{\rm s}^2{\theta}^4) X\Bigl(
{D{\theta}\over r_{\rm s}}\Bigr)\Biggr],
\label{eq:Jfactorfull}
\end{eqnarray}
Then, defining $y = D{\theta}/r_{\rm s}$, the J-factor is
\begin{eqnarray}
{\rm J} &=& {\pi \rho_0^2 r_{\rm s}^3 \over 3D^2\Delta^4}
\Biggl[ 2 y (7y - 4y^3 + 3\pi \Delta^4) \cr
&+& 6 (2\Delta^6 - 2\Delta^2 - y^4) X(y)\Biggr],
\label{eq:Jfactorfull}
\end{eqnarray}
where $\Delta^2 = 1- y^2 = 1- D^2{\theta}^2/r_{\rm s}^2$. Given a mass $M_{\rm h}$ enclosed
within the half-light radius $R_{\rm h}$ the parameter $\rho_0$ is given by
\begin{equation}
\rho_0 = \frac{M_{\rm h}}{4\pir_{\rm s}^3}\Big(\log\Big[\frac{r_{\rm s}+R_{\rm h}}{r_{\rm s}}\Big]-\frac{R_{\rm h}}{r_{\rm s}+R_{\rm h}}\Big)^{-1}.
\label{eq:nfwhalorho0}
\end{equation}
On identifying $\rho_0 r_{\rm s} = 5\sigma_{\rm los}^2/(4\pi R_{\rm h} G)$ and letting
$r_{\rm s} \rightarrow \infty$, we obtain the infinite cusp
(\ref{eq:sphericaldens}) with $\gamma=1$. In this limit, the full
J-factor (\ref{eq:Jfactorfull}) reduces to (\ref{eq:JsimpleNFW}), as
it should. In the other limit, as ${\theta}$ becomes large, the J-factor
curve turns over and tends to the asymptotic value
\begin{equation}
{\rm J} \rightarrow {4 \pi\over 3} {\rho_0^2 r_{\rm s}^3 \over D^2}
\label{eq:nfwhaloasymp}
\end{equation}
The D-factor is
\begin{equation}
{\rm D} = {4\pi \rho_0 r_{\rm s}^3 \over D^2}\Biggl[ \log \left(
{D{\theta} \over 2r_{\rm s}} \right) +X\Bigl(
{D{\theta}\over r_{\rm s}}\Bigr)\Biggr]
\label{eq:Dfactorfull}
\end{equation}
with the limit of an infinite cusp $r_{\rm s} \rightarrow \infty$
regenerating the result of (\ref{eq:Dsimple}) with $\gamma =1$. In
particular, as ${\theta}$ becomes large, the first term in
eq~(\ref{eq:Dfactorfull}) dominates and the D-factor diverges
logarithmically. However, as ${\theta} \rightarrow 0$, the D-factor
tends to
\begin{equation}
{\rm D} \rightarrow 2\pi \rho_0 r_{\rm s} {\theta}^2 \log \left( {D{\theta} \over 2r_{\rm s}} \right)
\end{equation}
and so approaches zero quadratically.
\begin{figure*}
$$\includegraphics[width=\textwidth]{{uf_grid_decay}}$$
\caption{Ultra-faint dwarfs decay factors: see caption of
Fig.~\protect\ref{fig:cd_grid_decay}.}
\label{fig:uf_grid_decay}
\end{figure*}
\begin{figure*}
$$\includegraphics[width=\textwidth]{{predict_grid_decay}}$$
\caption{Predictions for ultra-faint dwarf decay factors: see caption
of Fig.~\protect\ref{fig:cd_grid_decay}.}
\label{fig:predict_grid_decay}
\end{figure*}
\subsection{Comparisons}
Here, we compare our formulae with results in the
literature. J-factors are often computed by finding the dark matter
density profile that best fits the stellar kinematics through the
spherical Jeans equations~\citep{Wa11,Bo15a,Ge15b}. The
multi-dimensional likelihood functions, which usually involve
parameters controlling the dark halo structure as well as the velocity
anisotropy, are then explored with Monte Carlo methods based on
Bayesian parameter inference. An alternative method~\citep{Mar15},
which was used by the Fermi-LAT colalboration, has some points of
contact with our approach here. They use the empirical relationship
~(\ref{eq:wolf}) between velocity dispersion and mass enclosed within
the half-light radius to circumvent solution of the Jeans
equation. They then construct likelihood functions for each dSph from
the luminosity, half-light radius and mass enclosed, together with
priors, which are explored with a two-level Bayesian hierarchical
model. Once the halo parameters are derived, the NFW profile is
numerically integrated to find the J-factor.
The J-factors and D-factors computed using the full formula for an NFW
cusp for a range of dSphs are given in Table~\ref{table:Jfs}. Error
bars are computed via propagation of errors in velocity dispersion,
distance, and halflight radius using Eq.~\ref{eq:Jfactorfull}. {
We use an `ellipticity-corrected' version of the half-light radius
which is given by the geometric average of the half-light radius as
measured along the major and minor axes. This amounts to multiplying
by $\sqrt{1-\epsilon}$ where $\epsilon$ is the ellipticity. Most
data on half-light radii, distances, ellipticities and central
velocity dispersions are extracted from the recent compilation of
~\citep{Mc12}. In addition, we use data from
\cite{Ko15,Be10,Ma15,Ki13,Ki15,Wa15} on more recently-discovered
dwarfs. In cases where the ellipticity is only bounded we use the
reported upper-bound for our `ellipticity-corrected' half-light
radius. } There is very little difference between values in this
table and ones inferred from a Jeans analysis. We also show the
J-factors for an opening angle of $\theta=0.5^\circ$ against distance
for the dSphs in Fig.~\ref{fig:J_against_d}. Naturally, the J-factors
decrease with distance making the closest dSphs the most attractive
candidates for dark matter annihilation detection. However, the
diversity in measured velocity dispersions and half-light radii
introduce variation into this J-factor versus distance relation.
In Figs.~\ref{fig:cd_grid} and~\ref{fig:uf_grid}, we show how our
simple formulae compare to the results of Jeans calculations for the
J-factor profiles for the classical and the ultrafaint dwarfs
respectively. Red and yellow lines show the results obtained using
eq.~(\ref{eq:Jsimple}). In each case, coloured bands show the
1$\sigma$ range of values obtained by error propagation using the
reported error on the data (half-light radius, line of sight velocity
dispersion and heliocentric distance)\footnote{In the cases of Segue
2, Hydra I and Grus I only 95\text{ per cent}\, upper bounds, $C$, on the
line-of-sight velocity dispersion are available. For these we assume
a uniform distribution on the line-of-sight velocity dispersion
between $0.1\,{\rm km\,s^{-1}}$ and $C/0.95$.} The blue bands use
eq.~(\ref{eq:Jfactorfull}) with $r_{\rm s} = 5R_{\rm h}$, which is a reasonable
summary of results from phase-space modeling of the dSphs, as given in
Figure 8 of ref~\citep{Am11}. For comparison, computed values for the
J- and D-factors from \citep{Ge15b} are also shown as solid circles
with error bars. They are derived by assuming parametric laws for the
light profile, the anisotropy of the stars and the dark halo
profile. The latter is permitted to have a general double power-law
structure with the density falling like $r^{-\gamma}$ at small radii
and $r^{-\beta}$ at large radii. Solution of the spherical Jeans
equations and subsequent projection then provides the line of sight
velocity dispersions. By choosing priors on the unknown parameters and
sampling the likelihood function through Markov Chain Monte Carlo
Methods, \citet{Ge15b} obtain constraints on the dark matter
distribution. Hence, they can calculate the median value of the
J-factors and the $1\sigma$ distribution at selected angles (see their
Table 2). The data points show the results of their calculations at
two locations, namely ${\theta}_{1/2}$ or the angle containing 50 per
cent of the emission, and ${\theta}_{\rm max} = {\rm arcsin} (r_{\rm
max})/D$ where $r_{\rm max}$ is an estimate of the distance to the
outermost member star with a measured radial velocity. We also show
the J-factor profiles with $\pm1\sigma$ errors computed by
\citet{Bo15c}, which were obtained through a Jeans analysis similar to
\citep{Ge15b}. Finally, we show the constraints on the J-factors at
$\theta=0.5^\circ$ from the Fermi-LAT collaboration \citep{FermiLAT}.
We see that the simple formula~(\ref{eq:Jsimple}) performs reasonably
well for the classical dwarfs, and better still for the
ultrafaints. At larger ${\theta}$, the J-factor for pure power-law cusps
is overestimated -- here the assumption of an infinitely extended cusp
breaks down. The full formula for the NFW halo (\ref{eq:Jfactorfull})
removes even this deficiency and reproduces the computational results
extremely well. Note that it is now just as straightforward to work
out the entire profile as to compute a single value. In principle, the
full profile may give information on the structure of the dark halo if
a dSph is detected in $\gamma$ rays. The largest discrepancy between
our calculation and that of \citet{Ge15b} is for Bo\"otes I. {
This may arise because Bo\"otes I possesses both a hot and cold
component~\citep{Ko11}, whereas our calculation uses the velocity
dispersion of the colder population only}. Another possible source
of this discrepancy is that the best-fitting dark halo density law
inferred by \citep{Ge15b} may deviate from the strict NFW form -- in
fact, they report that Bo\"otes I has a median value of its inner
slope $\gamma$ of 0.53 and outer slope $\beta$ of 5.9. This
discrepancy persists when comparing against the results of
\citet{Bo15c}. The other striking anomaly is when comparing our result
for Segue 1 with \citet{Bo15c}. This is caused by different ways of
designating a subset of the spectroscopically observed stars as
``members'' of Segue 1 as opposed to Milky Way foreground
contaminants, as originally noted in \citep{NO09}. \citet{Bo15b} have
shown that the determination of Segue 1's J-factor (and, implicitly,
its velocity dispersion) is extremely sensitive to the inclusion or
exclusion of a small number of stars with ambiguous membership
status. The J-factors computed in~\citep{Bo15c} are based on more
stringent membership criteria for Segue 1 as compared to the analyses
of~\citep{Ge15b} and~\citep{FermiLAT}.
A straightforward conclusion from Figs.~\ref{fig:cd_grid}
and~\ref{fig:uf_grid} is that Draco, Ursa Minor, Sculptor, Coma
Berenices, Reticulum II, Tucana II and Ursa Major II are the most
favourable dSphs for which to look for signatures of dark matter
annihiliation. Willman 1 also has a high J-factor but the assumption
of dynamical equilibrium for this object is dubious as it appears to
be severely tidally disrupted \citep{Willman1}. Similarly, Segue 1 has
a high J-factor but the issue of foreground contamination of the
spectroscopic sample brings this into doubt \citep{NO09,Bo15b}.
Fig.~\ref{fig:predict_grid} gives predictions for 4 recently
discovered ultrafaints for which there are no J-factors in the
literature. These objects are Horologium I and Grus I (discovered in
{\it Dark Energy Survey Data} \citep{Ko15,Be15}, Hydra II (discovered
by the {\it Survey of the Magellanic Stellar History}) and
\citep{Ma15}, Pisces II (discovered in {\it Sloan Digital Sky Survey}
data \citep{Be10}). Keck/DEIMOS spectroscopy of Hydra II and Pisces
II has recently been published \citep{Ki15}. The Gaia-ESO survey has
measured the velocities of 5 stars in Horologium I using the
VLT/Giraffe combination~\citep{Ko15a}, whilst Magellan/M2FS has been
used to target 7 stars in Grus I~\citep{Wa15}. Using the data in these
papers, we calculate the J-factors. The uncertainties are calculated
by Monte Carlo sampling and then estimating the $1\sigma$ bound on the
J-factor from the ensuing distributions. It is clear that Horologium
I is another excellent candidate with a J-factor comparable to
Reticulum~II and Tucana II.
We show in Figs~(\ref{fig:cd_grid_decay} -
\ref{fig:predict_grid_decay}) analogous plots for the D-factor for
classical dwarfs, ultrafaints and predictions for recent discoveries.
Both the simple formula (\ref{eq:Dsimple}) and the exact result for an
NFW cusp (\ref{eq:Dfactorfull}) do an excellent job of reproducing the
results in the literature -- with much greater economy of effort!
\section{Applications}
\subsection{Cusps and Cores}
So far, we have focussed on the NFW model with its $1/r$ density cusp.
Although this has a preferred status because of its importance in
theories of galaxy formation, there is some evidence that dark haloes
may have a different structure. For example, many of the detailed
kinematical fits reported by \citep{Ge15b} have milder cusps, often
with ${\rho_{\rm DM}} \sim r^{-1/2}$ at small radii. There is also strong
observational evidence that some of the dwarf galaxies are mildly
cusped or even cored. This includes the persistence of substructure in
Ursa Minor~\citep{Kl03}, the survival of globular clusters in
Fornax~\citep{Co12}, and the kinematics of multiple
populations~\citep{WP,Am12,Ag12,Am13}. Here, somewhat speculatively,
we suppose that the J-profile can be mapped out as a function of
${\theta}$ and ask what can then be deduced about the dark halo
structure.
A flexible set of dark halos with double-power law structure has the
form~\citep{Zh96,Ch11}
\begin{equation}
{\rho_{\rm DM}}(r) = \rho_0
\Big(\frac{r}{r_{\rm s}}\Big)^{-\gamma}\Big(1+\Big(\frac{r}{r_{\rm s}}\Big)^{\alpha}\Big)^{(\gamma-\beta)/\alpha},
\label{eq:zhao}
\end{equation}
with $\alpha,\beta$ and $\gamma$ as positive numbers. The familiar
NFW profile is recovered in the case $({\theta},\beta,\gamma) =
(1,3,1)$. Although the J-factors for this entire class of models are
not analytic, nonetheless we can easily work out their general
properties. At small radii, the density is cusped like $r^{-\gamma}$.
For strong cusps with $1/2 < \gamma < 3/2$, the behaviour can be deduced
from our work on infinite cusps in Section II by making the
identification $\rho_0 r_s^\gamma = (3-\gamma)\sigma_{\rm los}^2/(\pi
R_{\rm h}^{2-\gamma} G)$. We see from Eq.~\ref{eq:Jsimple} that the J-factor
increases like $J \propto {\theta}^{3-2\gamma}$ on moving outwards from
the center of the halo. For weaker cusps and cores ($0 \le \gamma
<1/2$), the dominant term in the J-factor near the origin is always a
gentler quadratic, namely $J \propto {\theta}^2$, as the $\gamma$-ray
emission is now no longer dominated by the very centre. Beyond the
scale radius $r_{\rm s}$, the J-factor turns over and tends to a constant
value. This is given by
\begin{equation}
{\rm J} \rightarrow {4\pi r_{\rm s}^3\rho_0^2 \over D^2}
{\Gamma[(2\beta-3)/\alpha]\Gamma[(3-2\gamma)/\alpha]\over \alpha
\Gamma[2(\beta-\gamma)/\alpha]}.
\label{eq:Jasymptotic}
\end{equation}
Formally, we require $\beta>3/2$ and $\gamma<3/2$ for convergence,
though this is satisfied by almost all astrophysically realistic
models. Notice when $(\alpha,\beta,\gamma) = (1,3,1)$, we recover the
asymptotic value for the J-factor of an NFW halo
(eq.~\ref{eq:nfwhaloasymp}).
The behaviour of the D-factor can be worked out in a similar way,
though now the boundary between strong and weak cusps is at
$\gamma=1$. For cusps with $\gamma <1$, the D-factor initially rises
like $J \propto {\theta}^{3-\gamma}$, whilst for cusps with $\gamma \le
1$, the rise is quadratic $J \propto {\theta}^2$. At large angles, the
D-factor turns over to the constant value
\begin{equation}
{\rm D} \rightarrow {4\pi r_{\rm s}^3\rho_0 \over D^2}
{\Gamma[(\beta-3)/\alpha]\Gamma[(3-\gamma)/\alpha]\over \alpha
\Gamma[(\beta-\gamma)/\alpha]},
\label{eq:Dasymptotic}
\end{equation}
provide $\beta>3$ and $\gamma<3$, as required for convergence. For the
NFW model, $\beta =3$ and so the D-factor logarithmically diverges.
We can illustrate this behaviour with two simple models. A prototype
of a weakly cusped dark halo is the model with $(\alpha,\beta,\gamma)
= (1,3,1/2)$, namely:
\begin{equation}
\rho(r) = {\rho_0 r_{\rm s}^3 \over r^{1/2}(r + r_{\rm s})^{5/2}}
\end{equation}
for which the J-factor is
\begin{eqnarray}
{\rm J} &=& {\pi \rho_0^2 \over 6 r_{\rm s}^3 \Delta^6}\Biggl[ 6D^2r_{\rm s}^2{\theta}^2
-2D^4{\theta}^4 -19r_{\rm s}^4\cr
&+& 3r_{\rm s}^2(4r_{\rm s}^2 + D^2{\theta}^2)X\Bigl(
{D{\theta}\over r_{\rm s}}\Bigr)\Biggr].
\label{eq:Jfactorweak}
\end{eqnarray}
Its asymptotic value is
\begin{equation}
{\rm J} \rightarrow {\pi r_{\rm s}^3\rho_0^2 \over 3 D^2}
\end{equation}
while its central value is
\begin{equation}
{\rm J} \rightarrow \frac{\pi}{6} r_{\rm s} \rho_0^2\left( 6\log\left(
{4r_{\rm s}^2\over D^2{\theta}^2}\right) -19\right) {\theta}^2
\end{equation}
The D-factor is not analytic, but diverges logarithmically at large
radii.
A prototype for cored dark haloes is the famous Plummer (1911) model,
which corresponds to $(\alpha,\beta,\gamma) = (2,5,0)$. This is often
used for modelling cored dark haloes (as well as clusters and the
stellar populations in dSphs). The density is
\begin{equation}
\rho(r) = {\rho_0 r_{\rm s}^5 \over (r^2 + r_{\rm s}^2)^{5/2}}.
\end{equation}
The J-factor is
\begin{equation}
{\rm J} = {5\pi^2\over 64}{\rho_0^2 r_{\rm s}^3\over D^2} \left[ 1- {r_{\rm s}^7\over
(r_{\rm s}^2 + D^2{\theta}^2)^{7\over2}}\right].
\end{equation}
Notice that the J-factor behaves like $\theta^2$ at small angles,
whereas the asymptotic value is in accord with our general rule
(\ref{eq:Jasymptotic}). The D-factor is also very simple
\begin{equation}
{\rm D} = {4\pi\over 3} {\rho_0r_{\rm s}^3{\theta}^2 \over (r_{\rm s}^2 + D^2{\theta}^2)}.
\end{equation}
It again approaches zero quadratically, and tends to the asymptotic
value given by (\ref{eq:Dasymptotic}). This is in accord with our
general results.
In principle, if the variation of the J-factor can be mapped out with
integration angle, then valuable information on the structure of the dark
halo can be gleaned. The behaviour at small angles can yield
information on the cusp slope $\gamma$. In particular, if $\gamma >
1/2$, then the logarithmic gradient of $J$ with respect to ${\theta}$ is
the cusp slope. Alternatively, if $J \propto {\theta}^2$, then the cusp
is either very mild or the dark halo is cored. Similarly, the
asymptotic value of the J-factor is controlled by the normalisation
$\rho_0$, scale-length $r_{\rm s}$ and the density fall-off $\beta$. Some of
these quantities, such as $r_{\rm s}$ can of course be constrained by the
stellar kinematics of the stars, so the asymptotic value may enable a
complete solution for the halo to be obtained.
\begin{figure}
$$\includegraphics[width=0.5\textwidth]{{spherical_comparison}}$$
\caption{Comparison of J-factors and D-factors of
($\alpha,\beta,\gamma$) dark halos with the same mass enclosed
within the half-light radius ($R_{\rm h}=30\,\mathrm{pc}$), represented by
the left black dashed line. The parameters chosen approximately
match those of Reticulum II and we set $r_s=5R_{\rm h}$. The blue band
shows the range of possible profiles when
$\alpha\in[1.,2.],\beta\in[3.,6.],\gamma\in[0.,1.2]$. The solid
black line corresponds to the NFW profile. Notice that the J-factors
of these models show least scatter at the angle ${\theta} \approx
R_{\rm h}/D$. The radii suggested in \citep{Wa11} is indicated by a
vertical dotted line, and -- at least for these models -- shows
greater scatter. The D-factors show the smallest scatter at a much
smaller angle. The red dashed vertical line shows Fermi-LAT
resolution for Reticulum II.}
\label{fig:sweetspot}
\end{figure}
\subsection{The Sweet Spot}
The idea that there is a sweet spot -- a location in which the
measured quantity is reasonably robust against changes in the
underlying dark halo model -- has proved quite powerful in studies of
dSphs. Of course, the most successful instance is the hypothesis that
the mass of dark matter enclosed within the half-light radius of the
stellar population is reasonably robust against changes in
anisotropy~\citep{Wa09,Wo10}. Similar ideas have been used to identify
radii at which the enclosed mass is insensitive to changes in the
underlying halo models~\citep{Am11, Ha16}. It is therefore natural to
wonder if there is a special angle ${\theta}$ at which the J-factor is
particularly robust.
\citet{Wa11} noticed from their Jeans solutions for dark matter haloes
for the Carina dSph that the J-factor was least sensitive to changes
in the inner slope $\gamma$, outer slope $\beta$ and velocity
anisotropy at an integration angle ${\theta} \approx 2R_{\rm h}/D$. They then
generated mock datasets from distribution functions for models with
varying inner slope $\gamma$ and velocity anisotropy, but fixed outer
slope $\beta$, which supported the idea of a sweet spot at ${\theta}
\approx 2R_{\rm h}/D$.
We test this directly in Fig.~\ref{fig:sweetspot} by plotting the
range of J-factors and D-factors of ($\alpha,\beta,\gamma$) models
with the same mass enclosed within the half-light radius of the stars
$R_{\rm h}$. This mass was chosen using the velocity dispersion and
half-light radius of Reticulum II. The range of models explored were
$\alpha\in[1.,2.],\beta\in[3.,6.],\gamma\in[0.,1.2]$. Although we have
not explicitly used any kinematic data, it is nonethless encoded in
the models using the fact that the mass enclosed with $R_{\rm h}$ -- and
hence the luminosity weighted velocity dispersion -- is the same for
all the models~\citep{Wa09,Wo10}. The vertical line in
Fig.~\ref{fig:sweetspot} shows that the integration angle ${\theta}
\approx R_{\rm h}/D$ at which the scatter in the J-factors of the models is
minimized. Notice even though the mass enclosed within $R_{\rm h}$ is
exactly the same for all the models, there is nonetheless some scatter
in the J-factors even at ${\theta} = R_{\rm h}/D$. Also shown with a vertical
line is the angle ${\theta} \approx 2R_{\rm h}/D$ suggested by \citep{Wa11},
at which the scatter is rather greater.
Presumably, the explanation of this discrepancy is that the models
constructed in \citep{Wa11}, which are derived from Markov Chain Monte
Carlo fits to discrete radial velocities, do not exactly satisfy the
empirical relation on mass enclosed within the half-light radius and
velocity dispersion. Of course, the actual integration angle used is a
trade-off between gathering power and minimizing the uncertainty in the
dark halo properties.
\section{Conclusions}
The main advance in this paper is the provision of very simple
formulae for J-factors for indirect dark matter detection. This
includes power-law spherical cusps, as well as the exact result for
the Navarro-Frenk-White~\citep{NFW} model. These compact formula offer
significant savings in effort over Jeans solution methods driven by
Markov Chain Monte Carlo engines. Especially for the ultrafaint
dwarfs, for which the size of the datasets of discrete velocities is
tiny, this provides an entirely elementary method of evaluating
J-factors. { The exact formulae for the J-factors and D-factors of
the NFW should prove particularly useful, as there are reasons
increasing in quality and quantity~\citep[e.g.,][]{On15,Re15,Pe12,Pe10} for
believing that many of the ultra-faints have pristine dark matter
haloes, even if some of the largest dSphs most probably have cored
haloes~\citep[e.g.,][]{Ag12,WP,Kl03,Am12}.}
We have computed the J-factors (and 1$\sigma$ uncertainties) for all
the known dSph galaxies with kinematic data. This includes the first
estimates for Horologium I and Grus I -- recently discovered in {\it
Dark Energy Survey Data} data -- as well as Hydra II and Pisces II.
From this compendium, the ultrafaints with the highest J-factors are
Ursa Major II, Reticulum II, Tucana II and Horologium I. They are
very attractive targets for indirect detection experiments. Although
our formulae assign Willman 1 and Segue 1 high J-factors, these
ambiguous objects may be extended clusters suffering disruption in the
Galactic tidal field rather than dwarf galaxies, perhaps complicating
or even invalidating previous estimates of $\sigma_{\rm los}$ for these
systems. Amongst the classical dSphs, Draco, Sculptor and Ursa Minor
have the highest J-factors.
If the J-factor profile can be mapped out as a function of integration
angle, then this raises the possibility of inferring properties for
the dark matter halo directly. We have shown for general halo models
that the J-factor rises from the origin, yet approaches a constant
asymptotic value with increasing integration angle. The behaviour at
the origin encodes information on the inner cusp slope $\gamma$. If
the model is cored or weakly cusped ($0\le \gamma \le 1/2$), then the
J-factor rises quadratically from the origin, $J\propto \theta^2$. If
the model is more strongly cusped ($1/2 < \gamma <3/2$), then $J
\propto {\theta}^{3-2\gamma}$. The asymptotic value of the J-factor --
which can be worked out analytically -- depends on both inner slope
$\gamma$, outer slope $\beta$ as well as the halo scale length and
normalisation.
Finally, we have identified a sweet spot, or preferential integration
angle, at which the J-factor is robust against changes in the dark
halo model. This is at the integration angle $\theta = R_{\rm h}/D$, or the
ratio of the dSphs half-light radius $R_{\rm h}$ to distance from the
observer $D$. This result holds good for models that exactly obey the
empirical relation between velocity dispersion and mass enclosed
within half-light radius~\cite{Wa09,Wo10}.
An important outstanding problem is the extension of this work to
flattened geometries. Most dSphs are flattened -- and some of the most
promising targets such as Reticulum II or Horologium I are very highly
flattened. Spherical models can provide useful guides, especially for
the largest classical dSphs (like Leo I or Fornax) that look nearly
round on the sky. They are least useful for the flattened
ultrafaints. In a companion paper, we show how to extend the
techniques presented here to explore flattened and triaxial
geometries~\citep{Sa16}.
\bigskip
\begin{acknowledgments}
{ The authors thank the anonymous referees for helpful reports, as well
as Vasily Belokurov and Matt Walker for useful discussions. JLS
acknowledges financial support from the Science and Technology
Facilities Council (STFC) of the United Kingdom.
}
\end{acknowledgments}
|
\section{Introduction}
We consider the problem of finding a (kernelized) linear classifier
for a training data set $\{ (x_i, y_i)\}_{i=1}^n$ with
$x_i\in\R^d$ and the class label $y_i\in\{-1,1\}$ for all $i=1,\ldots,n.$
Here $n$ is the sample size (the number of data vectors available) and
$d$ is the feature dimension.
By far, the most popular and successful method for getting a good linear
classifier from the
training data is
the support vector machine (SVM), originally proposed by \cite{Vapnik}.
Indeed, it has been demonstrated in \cite{FCBA} that the kernel SVM is one of the best
performers in the pool of 179 commonly used classifiers.
Despite its success, it has been observed
in \cite{MarronTodd-2007} that SVM may suffer
from a ``data-piling" problem in the high-dimension-low-sample size (HDLSS) setting
(where the sample size $n$ is smaller than the
feature dimension $d$). The authors proposed a new linear classifier, called ``Distance Weighted Discrimination" (DWD),
as a superior alternative to the SVM.
DWD has become a workhorse method for a number of statistical tasks, including data visualization (\citealt{MarronAlonso}), hypothesis testing linked with visualization in very high dimensions (\citealt{wei2015}), and adjustment for data biases and heterogeneity (\citealt{benito,Liu}).
It is well known that there is a strong need for efficient HDLSS methods
for the settings where $d$ is large, say in the order of $10^4$--$10^5$, especially
in the area of genetic molecular measurements (usually having a small sample size, where many gene level features have been measured), chemometrics (typically a small sample of high dimensional spectra) and medical image analysis (a small sample of 3-d shapes represented by high-dimensional vectors). On the other hand,
given the advent of a huge volume of data
collectible through various sources, especially from the internet,
it is also important for us to consider the case where the sample size $n$ is large, while
the feature dimension may be moderate.
Thus in this paper, we are interested in
the problem of finding a linear classifier
through DWD for
data instances
where $n$ and/or $d$ are large.
In \cite{MarronTodd-2007}, DWD is formulated as a second-order cone
programming (SOCP) problem, and the resulting model is
solved by using a primal-dual interior-point method for SOCP problems implemented
in the software SDPT3 (\citealt{SDPT3}).
However, the IPM based solver employed for DWD in \cite{MarronTodd-2007}
is computationally very expensive for solving problems
where $n$ or $d$ is large, thus making it impractical for large scale problems.
A recent approach to overcome such a computational bottleneck has appeared
in \cite{WangZou}, where the authors proposed a novel reformulation
of the primal DWD model which consists of minimizing a highly nonlinear convex
objective function subject to a ball constraint. The resulting problem
is solved via its dual and an MM (minimization-majorization) algorithm
is designed to compute the Lagrangian dual function for each given dual multiplier.
The algorithm appears to be quite promising in theory for solving large scale DWD problems.
However, the current numerical experiments and implementation of the proposed
algorithm in \cite{WangZou} are preliminary and limited
to small scale data instances, and it appears that substantial work must be
done to make it efficient for large scale instances.
Hence it is premature to compare our
proposed algorithm with the one in \cite{WangZou}.
The main contribution of this paper is to design
a new method for solving large scale DWD problems, where we target to solve a problem
with the
sample size $n \approx 10^4$--$10^6$ and/or the dimension $d\approx 10^4$--$10^5$.
Our method is a convergent 3-block semi-proximal alternating direction method of multipliers
(ADMM), which is designed based on the recent advances in research on convergent multi-block
ADMM-type methods (\citealt{STY,LST,CST}) for solving convex composite quadratic conic programming
problems.
The classical ADMM is initially proposed for solving a 2-block convex optimization problem
with a collection of coupling linear constraints. Over the years, there have been many variations of ADMM proposed and applied to a great variety of optimization problems. A natural modification is to extend the original ADMM from two-block to multi-block settings. However, in \cite{directADMM}, it was shown that the directly extended ADMM may not be convergent.
Thus it is necessary to make some modifications to the directly extended ADMM in order to
get a convergent algorithm. In \cite{STY}, the authors proposed a semi-proximal ADMM for solving a convex conic programming problem with 3 blocks of variables and 4 types of constraints. The algorithm is a convergent modification of the ADMM with an additional inexpensive step in each iteration.
In \cite{LST}, the authors proposed a Schur complement based (SCB) convergent semi-proximal ADMM for solving a multi-block linearly constrained convex programming problem whose objective function is the sum of two proper closed convex functions plus an arbitrary number of convex quadratic or linear functions. One of the key contributions in \cite{LST} is the discovery of the Schur complement based decomposition method which allows the multi-block subproblems to be solved
efficiently while ensuring the convergence of the algorithm.
More recently, \cite{LST2} generalized the SCB decomposition
method in \cite{LST} to the {\em inexact} symmetric Gauss-Seidel decomposition method, which
provides an elegant framework and simpler derivation.
Based on this previous research, in \cite{CST}, the authors proposed an {\em inexact} symmetric Gauss-Seidel based multi-block semi-proximal ADMM for solving a class of high-dimensional convex composite conic optimization problems, which has been demonstrated to have much better performance than the possibly non-convergent directly extended ADMM in solving high dimensional convex quadratic semidefinite programming problems.
Inspired by the above works, we propose a convergent 3-block semi-proximal ADMM, which is a
modification of the inexact sGS-ADMM algorithm designed in \cite{CST}
to solve the DWD model.
The first contribution we make is in reformulating the primal formulation of the {\em generalized} DWD model (using the
terminology from \cite{WangZou}) and adapting the
powerful inexact sGS-ADMM framework for solving the reformulated problem.
This
is in contrast to numerous SVM algorithms which are primarily designed for solving
the dual formulation of the SVM model.
The second contribution we make is in designing highly efficient techniques to
solve the subproblems in each of the inexact sGS-ADMM iterations.
If $n$ or $d$ is moderate, then the complexity at each iteration is $O(nd)+O(n^2)$ or $O(nd)+O(d^2)$ respectively. If both $n$ and $d$ are large, then we employ the conjugate gradient iterative method for solving the large linear systems of equations involved.
We also devise various strategies to speed up the practical performance of
the sGS-ADMM algorithm in solving large scale instances (with the largest instance
having $n=256,000$ and $d\approx 3\times 10^6$) of DWD problems
with real data sets from the UCI machine learning repository (\citealt{UCI}).
We should emphasize that the key in achieving high efficiency in our algorithm depends very much on the intricate numerical techniques and
sophisticated implementation we have developed.
Finally,
we conduct extensive numerical experiments to evaluate the performance
of our proposed algorithm against a few other alternatives.
Relative to the primal-dual interior-point method used in \cite{MarronTodd-2007},
our algorithm is vastly superior in terms of computational time and memory usage
in solving large scale problems, where our algorithm can be a few thousands times
faster. By exploiting all the highly efficient numerical techniques we have developed in
the implementation of the sGS-ADMM algorithm
for solving the generalized DWD problem, we can also
get an efficient implementation of
the possibly non-convergent directly extended ADMM for solving the same problem.
On the tested problems, our algorithm generally requires fewer iterations
compared to the directly extended ADMM even when the latter is convergent.
On quite a few instances, the directly extended ADMM actually requires many more
iterations than our proposed algorithm to solve the problems.
We also compare the efficiency of our algorithm in solving the generalized
DWD problem against the highly optimized {LIBLINEAR} (\citealt{LIBLINEAR}) and LIBSVM (\citealt{LIBSVM}) in solving the
corresponding dual SVM problem. Surprisingly, our algorithm can even be
more efficient than LIBSVM in solving large scale problems even though the
DWD model is more complex, and on
some instances, our algorithm is 50--100 times faster.
{Our DWD model is also able to produce the best test (or generalization) errors
compared to LIBLINEAR and LIBSVM among the tested instances.}
The remaining parts of this paper are organized as follows. In section \ref{sec-GeneralDWD}, we present the DWD formulation in full detail. In section \ref{sec-sGSADMM}, we propose our inexact sGS-based ADMM method for solving large scale DWD problems. We also discuss some essential computational techniques used in our implementation.
We report our numerical results in section \ref{sec-experiments}. We will also compare the performance of our algorithm to other solvers on the same data sets in this particular section. Finally, we conclude the paper in section \ref{sec-conclusion}.
Notation. We denote the 2-norm of a vector $x$ by $\norm{x}$,
and the Frobenius norm of a matrix $M$ by $\norm{M}_F$.
The inner product of two vectors $x,y$ is denoted by $\inprod{x}{y}$.
If $S$ is a symmetric positive semidefinite matrix, then we denote the weighted norm of a vector $x$ with the weight matrix $S$ by $\norm{x}_{S} := \sqrt{\inprod{x}{S x}}$.
\section{Generalized distance weighted discrimination}\label{sec-GeneralDWD}
This section gives details on the optimization problems underlying the distance weighted discrimination.
Let $(x_i,y_i)$, $i=1,\ldots,n$, be the training data where
$x_i\in \R^d$ is the feature vector and $y_i\in\{+1,-1\}$ is its corresponding class label. We let $X\in \R^{d\times n}$ be the matrix whose columns are the $x_i$'s, and $y=[y_1,\ldots,y_n]^T$.
In linear discrimination, we attempt to separate the vectors in the two classes by
a hyperplane $H= \{ x\in \R^d\mid w^T x + \beta =0 \}$, where $w\in \R^d$ is the
unit normal and $|\beta|$ is its distance to the origin.
Given a point $z\in \R^d$, the signed distance between $z$ and the hyperplane $H$ is given by
$w^Tz + \beta$.
For binary classification where the label $y_i \in \{-1,1\}$, we want
\begin{equation*}
y_i(\beta+x_i^Tw)\geq 1-\xi_i \quad \forall\; i=1,...,n,
\end{equation*}
where we have added a slack variable $\xi \geq 0$ to allow the possibility that
the positive and negative data points may not be separated cleanly by the hyperplane.
In matrix-vector notation, we need
\begin{equation}
r \;:=\; Z^Tw+\beta y +\xi \;\geq\; \bfone,
\label{eq-r}
\end{equation}
where $Z = X \diag{y}$ and
$\bfone\in \mathbb{R}^n$ is the vector of ones.
In SVM, $w$ and $\beta$ are chosen by maximizing the minimum residual, i.e.,
\begin{eqnarray}
\max \Big\{ \delta - C \inprod{\bfone}{\xi} \mid Z^T w + \beta y +\xi \geq \delta \bfone, \; \xi \geq 0, \; w^Tw\leq 1 \Big\},
\label{eq-svm}
\end{eqnarray}
where $C > 0$ is a tuning parameter to control the level of penalization on $\xi$.
For the DWD approach introduced in \cite{MarronTodd-2007}, $w$ and $\beta$ are chosen instead by minimizing the sum of reciprocals of the $r_i$'s, i.e.,
\begin{eqnarray}
\min \Big\{ \sum_{i=1}^n \frac{1}{r_i} + C \inprod{\bfone}{\xi} \mid
r= Z^T w + \beta y +\xi, \; r > 0, \; \xi \geq 0, \; w^Tw\leq 1, \; w\in \R^d
\Big\}.
\label{eq-dwd}
\end{eqnarray}
Detailed discussions on the connections between the DWD model \eqref{eq-dwd} and
the SVM model \eqref{eq-svm} can be found in \cite{MarronTodd-2007}.
The DWD optimization problem \eqref{eq-dwd} is shown to be equivalent to a second-order
cone programming problem in \cite{MarronTodd-2007} and hence it can be
solved by interior-point methods such as those implemented in
the solver SDPT3 (\citealt{SDPT3}).
Here we design an algorithm which is capable of solving large scale generalized DWD problems
of the following form:
\begin{eqnarray}
\min \Big\{ \Phi(r,\xi) := \sum_{i=1}^n \theta_q (r_i) +C \inprod{ e}{ \xi}
\mid \; Z^T w + \beta y +\xi -r =0, \;\;
\norm{w} \leq 1,\;\xi \geq 0
\Big\}
\label{eq-primal}
\end{eqnarray}
where $e\in \R^n$ is a given positive vector such that $\norm{e}_\infty =1$ (the last condition is for the purpose
of normalization).
The exponent $q$ can be any given positive number, though the values of
most interest are likely to be $q=0.5,1,2,4$, and $\theta_q (r_i)$ is the function defined by
\begin{eqnarray*}
\theta_q (t) =
\frac{1}{t^q} &\mbox{if $t>0$, } \;\mbox{and} \;\;\;
\theta_q (t) = \infty &\mbox{if $t\le0$. }
\end{eqnarray*}
Observe that in addition to allowing for a general exponent $q$ in \eqref{eq-primal}, we also allow
for a nonuniform weight $e_i > 0$ in the penalty term for each $\xi_i$.
By a simple change of variables and modification of the data vector $y$, \eqref{eq-primal} can also include the
case where the terms in $\sum_{i=1}^n \frac{1}{r_i^q}$ are weighted non-uniformly.
For brevity, we omit the details.
\begin{proposition} Let $\kappa = \frac{q+1}{q} q^{\frac{1}{q+1}}$.
The dual of problem \eqref{eq-primal} is given as follows:
\begin{eqnarray}
- \min_{\alp} \Big\{ \Psi(\alp) := \norm{Z\alp} - \kappa\sum_{i=1}^n \alp_i^{\frac{q}{q+1}}
\mid 0 \leq \alp \leq Ce , \inprod{y}{\alp} =0
\Big\},
\label{eq-dual}
\end{eqnarray}
\end{proposition}
\begin{proof}
Consider the Lagrangian function associated with \eqref{eq-primal}:
\begin{eqnarray*}
&& \hspace{-0.7cm}
L(r,w,\beta,\xi;\alpha,\eta,\lam) = \mbox{$\sum_{i=1}^n$} \theta_q (r_i) + C \inprod{e}{\xi} -\inprod{\alp}{Z^Tw+\beta y + \xi-r}
+ \frac{\lam}{2}(\norm{w}^2-1) - \inprod{\eta}{\xi}
\\
&=& \mbox{$\sum_{i=1}^n$} \theta_q (r_i) +
\inprod{r}{\alp } + \inprod{\xi} {Ce -\alp-\eta} -\beta\inprod{y}{\alp} - \inprod{w}{Z\alp} + \frac{\lam}{2}(\inprod{w}{w}-1),
\end{eqnarray*}
where $r \in \R^n $, $w\in \R^d$, $\beta\in\R$, $\xi\in\R^n$, $\alp\in\R^n$, $\lam, \eta \geq 0$.
Now
\begin{eqnarray*}
&& \inf_{r_i}\Big\{ \theta_q (r_i) + \alp_i r_i \Big\}
= \left\{ \begin{array}{ll} \kappa\, \alp_i^{\frac{q}{q+1}}
&\mbox{if $\alp_i \geq 0$}
\\[0pt]
-\infty &\mbox{if $\alp_i < 0$}
\end{array} \right.
\\[5pt]
&& \inf_{w} \Big\{ -\inprod{Z\alp}{w} + \frac{\lam}{2}\norm{w}^2 \Big\}
=
\left\{ \begin{array}{ll}
-\frac{1}{2\lam}\norm{Z\alp}^2 & \mbox{if $\lam > 0$} \\[0pt]
0 &\mbox{if $\lam=0$, $Z\alp = 0$} \\[0pt]
-\infty & \mbox{if $\lam=0$, $Z\alp\not=0$}
\end{array} \right.
\\[5pt]
&& \inf_{\xi} \Big\{ \inprod{\xi} {Ce -\alp-\eta} \Big\}
= \left\{\begin{array}{ll}
0 &\mbox{if $Ce-\alp-\eta=0$} \\[0pt]
-\infty &\mbox{otherwise}
\end{array} \right.,
\\[5pt]
&& \inf_{\beta} \Big\{ -\beta\inprod{y}{\alp} \Big\}
= \left\{
\begin{array}{ll}
0 &\mbox{if $\inprod{y}{\alp}=0$} \\[0pt]
-\infty &\mbox{otherwise}
\end{array} \right..
\end{eqnarray*}
Let $F_D = \{ \alp\in\R^n \mid 0\leq \alp\leq Ce, \inprod{y}{\alp}=0 \}$. Hence
\begin{eqnarray*}
\min_{r,w,\beta,\xi} L(r,w,\beta,\xi;\alpha,\eta,\lam)
=\left\{\begin{array}{l}
\kappa \sum_{i=1}^n \alp_i^{\frac{q}{q+1}}
- \frac{1}{2\lam}\norm{Z\alp}^2 - \frac{\lam}{2}, \quad\mbox{if $\lam > 0$, $\alp\in F_D$},
\\[0pt]
\kappa \sum_{i=1}^n \alp_i^{\frac{q}{q+1}}, \quad \mbox{if $\lam =0$, $Z\alp=0$, $\alp\in F_D$},
\\[0pt]
-\infty, \quad \mbox{if $\lam =0$, $Z\alp\not=0$, $\alp\in F_D$, or $\alp\not\in F_D$.}
\end{array} \right.
\end{eqnarray*}
Now for $\alp \in F_D$, we have
\begin{eqnarray*}
& \max_{\lam \geq 0, \eta \geq 0} \big\{ \min_{r,w,\beta,\xi} L(r,w,\beta,\xi;\alpha,\eta,\lam)\big \}
= \kappa \sum_{i=1}^n \alp_i^{\frac{q}{q+1}} -\norm{Z\alp}.
\end{eqnarray*}
From here, we get the required dual problem.
\end{proof}
\bigskip
It is straightforward to show that the feasible regions of \eqref{eq-primal} and \eqref{eq-dual}
both have nonempty interiors. Thus optimal solutions for both problems exist and they
satisfy
the following KKT (Karush-Kuhn-Tucker) optimality conditions:
\begin{eqnarray}
\begin{array}{ll}
Z^T w + \beta y + \xi - r = 0, & \inprod{y}{\alp} = 0, \\[0pt]
r > 0,\; \alp > 0, \quad \alp \leq C e, \quad \xi \geq 0, & \inprod{Ce - \alp}{\xi} = 0, \\[0pt]
\alp_i = \frac{q}{r_i^{q+1}}, \; i=1,\ldots,n, &
\mbox{either} \; w = \frac{Z\alp}{\norm{Z\alp}}, \;\; \mbox{or}\;\; Z\alp = 0, \; \norm{w}^2 \leq 1.
\end{array} \label{eq-optimality}
\end{eqnarray}
Let $(r^*,\xi^*,w^*,\beta^*)$ and $\alp^*$ be an optimal solution of
\eqref{eq-primal} and \eqref{eq-dual}, respectively.
Next we analyse some properties of the optimal solution. In particular,
we show that the optimal solution $\alp^*$
is bounded away from 0.
\begin{proposition} There exists a positive $\delta$ such that
$
\alp^*_i \geq \delta \;\; \forall\; i=1,\ldots,n.
$
\end{proposition}
\begin{proof} For convenience, let $F_P = \{ (r,\xi,w,\beta) \mid
Z^T w +\beta y + \xi -r = 0, \norm{w} \leq 1, \xi \geq 0\}$ be the
feasible region of \eqref{eq-primal}. Since $(\bfone,\bfone,0,0)\in F_P$, we have that
$$
C e_{\min} \xi^*_i \leq
C \inprod{e}{\xi^*} \leq \Phi(r^*,\xi^*,w^*,\beta^*) \leq \Phi(\bfone,\bfone,0,0)
= n + C \mbox{$\sum_{i=1}^n$} e_i
\quad \forall\; i=1,\ldots,n,
$$
where $e_{\min} = \min_{1\leq i \leq n} \{ e_i\}$.
Hence we have $0\leq \xi^* \leq \varrho \bfone$, where
$\varrho := \frac{n + C \sum_{i=1}^{n} e_i}{C e_{\min}}$.
Next, we establish a bound for $|\beta^*|$. Suppose $\beta^* > 0$.
Consider an index $i$ such that $y_i = -1$. Then
$
0 < \beta^* = Z_i^T w^* + \xi^*_i-r^*_i \leq \norm{Z_i}\norm{w^*} + \xi^*_i
\leq K + \varrho,
$
where $Z_i$ denotes the $i$th column of $Z$,
$K = \max_{1\leq j \leq n}\{\norm{Z_j}\}$. On the other hand, if
$\beta^* < 0$, then we consider an index $k$ such that $y_k = 1$, and
$
0< -\beta^* = Z_k^T w^* + \xi^*_k-r^*_k \leq K + \varrho.
$
To summarize, we have that $|\beta^*| \leq K + \varrho$.
Now we can establish an upper bound for $r^*$. For any $i=1,\ldots,n$, we have that
$$
r^*_i = Z_i^T w^* + \beta^* y_i + \xi^*_i \leq \norm{Z_i}\norm{w^*}
+|\beta^*| + \xi_i^* \leq 2(K+\varrho).
$$
From here, we get
$
\alp^*_i = \frac{q}{ (r_i^*)^{q+1}} \geq \delta := \frac{q}{ (2K+2\varrho)^{q+1}} \quad\forall\;
i=1,\ldots,n.
$
This completes the proof of the proposition.
\end{proof}
\section{An inexact SGS-based ADMM for large scale DWD problems}\label{sec-sGSADMM}
We can rewrite the model \eqref{eq-primal} as:
\begin{eqnarray*}
\min \Big\{
\sum_{i=1}^n
\theta_q (r_i)+ C \inprod{e}{\xi} +\delta_B(w) + \delta_{\R^n_+}(\xi)
\mid \; Z^T w +\beta y+\xi-r=0, \; \; w\in \R^d, \; r,\xi\in \R^n
\Big\}
\end{eqnarray*}
where $B=\{w \in \R^d \mid \norm{w}\leq 1\}$.
Here, both $\delta_B(w)$ and $\delta_{\R^n_+}(\xi)$ are infinity indicator functions. In general, an infinity indicator function
over a set $\mathcal{C}$ is defined by:
\begin{eqnarray*}
\delta_\mathcal{C}(x):=
\begin{cases}
0, &\quad \text{if } x \in \mathcal{C}; \\
+\infty, &\quad \text{otherwise.}
\end{cases}
\end{eqnarray*}
The model above is a convex
minimization problem with three nonlinear blocks.
By introducing an auxiliary variable $u=w$, we can reformulate it as:
\begin{eqnarray}
\begin{array}{ll}
\min &\sum_{i=1}^n \theta_q (r_i)+ C \inprod{e}{\xi}+\delta_B(u) + \delta_{\R^n_+}(\xi)
\\[8pt]
\text{s.t.} &Z^T w+\beta y+\xi-r=0\\[3pt]
& D(w- u) =0, \;\; w,u\in\R^d, \; \beta\in \R,\; r,\xi\in \R^n,
\end{array}
\label{eq-gen}
\end{eqnarray}
where $D\in \R^{d\times d}$ is a given positive scalar multiple of the identity
matrix which is introduced
for the purpose of scaling the variables.
For a given parameter $\sig > 0$,
the augmented Lagrangian function associated with \eqref{eq-gen} is given by
\begin{eqnarray*}
\begin{array}{rcl}
L_{\sigma}(r,w,\beta,\xi,u;\alpha,\rho) &=&\sum_{i=1}^n \theta_q (r_i)
+ C \inprod{e}{\xi}+\delta_B(u) + \delta_{\R^n_+}(\xi)
+\frac{\sigma}{2}\norm{Z^T w+\beta y +\xi -r -\sigma^{-1}\alpha}^2
\\[8pt]
&& +\frac{\sigma}{2}\norm{D(w-u)-\sigma^{-1}\rho}^2
-\frac{1}{2\sigma}\norm{ \alpha}^2 -\frac{1}{2 \sigma}\norm{\rho}^2.
\end{array}
\end{eqnarray*}
The algorithm which we will design later is based on recent progress
in algorithms for solving multi-block convex conic programming.
In particular, our algorithm is designed based on
the inexact ADMM algorithm in \cite{CST} and we made essential use of
the inexact symmetric Gauss-Seidel
decomposition theorem in \cite{LST} to solve the subproblems
arising in each iteration of the algorithm.
We can view \eqref{eq-gen} as a linearly constrained nonsmooth
convex
programming problem with three blocks of variables grouped as
$(w,\beta)$, $r$, $(u,\xi)$.
The template for our inexact
sGS based ADMM is described next.
Note that the
subproblems need not be solved exactly as long as they satisfy some prescribed accuracy.
\begin{description}
\item[Algorithm 1.] {\bf An inexact sGS-ADMM for solving \eqref{eq-gen}.}
\\[5pt]
Let $\{ \varepsilon_k\}$ be a summable sequence of nonnegative
nonincreasing numbers.
Given an initial iterate $(r^0,w^0,\beta^0,\xi^0,u^0)$ in the feasible region of \eqref{eq-gen}, and
$(\alpha^0,\rho^0)$ in the dual feasible region of \eqref{eq-gen}, choose a $d\times d$ symmetric positive semidefinite matrix $\cT$, and
perform the
following steps in each iteration.
\item[Step 1a.]
Compute
$$
(\bar{w}^{k+1},\bar{\beta}^{k+1})
\approx \mbox{argmin}_{w,\beta}\; \Big\{L_\sigma (r^{k},w,\beta,\xi^k,u^k;\alpha^k,\rho^k)
+ \frac{\sig}{2}\norm{w-w^k}_{\cT}^2 \Big\}.
$$
In particular, $(\bar{w}^{k+1},\bar{\beta}^{k+1})$ is an approximate solution to the
following $(d+1)\times (d+1)$ linear system of equations:
\begin{eqnarray}
\underbrace{\begin{bmatrix} ZZ^T+ D^2 +\cT & Zy\\[5pt] (Zy)^T& y^Ty
\end{bmatrix} }_{A}
\begin{bmatrix} w \\[5pt] \beta
\end{bmatrix}
= \bar{h}^k :=
\begin{bmatrix}
-Z(\xi^k-r^k-\sigma^{-1}\alpha^k)+D^2 u^k + D(\sigma^{-1}\rho^k) + \cT w^k\\[5pt]
-y^T(\xi^k-r^k-\sigma^{-1}\alpha^k)
\end{bmatrix}. \quad
\label{eq-linsys}
\end{eqnarray}
We require the residual of
the approximate solution $(\bar{w}^{k+1},\bar{\beta}^{k+1})$
to satisfy
\begin{eqnarray}
\norm{\bar{h}^k - A[\bar{w}^{k+1};\bar{\beta}^{k+1}]} \leq \varepsilon_k.
\label{eq-linsys-tol}
\end{eqnarray}
\item[Step 1b.] Compute $r^{k+1}\approx\mbox{argmin}_{r\in \R^n}\; L_{\sigma}(r,\bar{w}^{k+1},\bar{\beta}^{k+1},\xi^k,u^k;\alpha^k,\rho^k)$. Specifically, by observing that the
objective function in this subproblem is actually separable in $r_i$ for $i=1,\ldots,n$,
we can compute $r^{k+1}_i$ as follows:
\begin{eqnarray}
\begin{array}{lll}
r^{k+1}_i &\approx& \arg \min_{r_i} \Big\{ \theta_q (r_i) +\frac{\sigma}{2} \norm{r_i-c^k_i}^2 \Big\}\\
&=& \arg \min_{r_i > 0} \Big\{ \frac{1}{r_i^q}
+\frac{\sigma}{2} \norm{r_i-c^k_i}^2 \Big\} \quad \forall \;i=1,\ldots,n,
\end{array} \label{eq-1c}
\end{eqnarray}
where $c^k=Z^T \bar{w}^{k+1}+y\bar{\beta}^{k+1}+\xi^k-\sigma^{-1}\alpha^k$.
The details on how the above one-dimensional problems are solved
will be given later.
The solution $r_i^{k+1}$ is deemed to be sufficiently accurate if
\begin{eqnarray*}
\Big|-\frac{q}{ (r_i^{k+1})^{q+1}} + \sig (r^{k+1}_i- c^k_i) \Big|\leq \varepsilon_k/\sqrt{n}
\quad \forall\; i=1,\ldots,n.
\end{eqnarray*}
\item[Step 1c.] Compute
$$
(w^{k+1},\beta^{k+1}) \approx \mbox{argmin}_{w,\beta}\; \Big\{
L_{\sigma}(r^{k+1},w,\beta,\xi^k,u^k;\alpha^k,\rho^k) + \frac{\sig}{2}\norm{w-w^k}_\cT^2
\Big\},$$
which amounts to solving the
linear system of equations \eqref{eq-linsys}
but with $r^k$ in the right-hand side vector $\bar{h}^k$ replaced by $r^{k+1}$.
Let $h^k$ be the new right-hand side vector. We require the approximate solution
to satisfy the accuracy condition that
$$
\norm{h^k - A[w^{k+1};\beta^{k+1}]}\leq 5 \varepsilon_k.
$$
Observe that the accuracy requirement here is more relaxed than that
stated in \eqref{eq-linsys-tol} of Step 1a. The reason for doing so is that
one may hope to use the solution $(\bar{w}^{k+1},\bar{\beta}^{k+1})$
computed in Step 1a as an approximate solution for the current subproblem.
If $(\bar{w}^{k+1},\bar{\beta}^{k+1})$ indeed satisfies the above
accuracy condition, then one can simply
set $(w^{k+1},\beta^{k+1}) = (\bar{w}^{k+1},\bar{\beta}^{k+1})$ and
the cost of solving this new subproblem can be saved.
\item[Step 2.]
Compute $(u^{k+1},\xi^{k+1})= \mbox{argmin}_{u,\xi}\; L_{\sigma}(r^{k+1},w^{k+1},\beta^{k+1},\xi,u;\alpha^k,\rho^k)$. By observing that the objective function is
actually separable in $u$ and $\xi$, we can compute $u^{k+1}$ and $\xi^{k+1}$ separately
as follows:
\begin{eqnarray*}
u^{k+1}&=& \arg \min \left\{ \delta_B (u) +\frac{\sigma}{2}\norm{D(u-g^k)}^2 \right\} \;=\; \begin{cases} g^k & \mbox{if $\norm{g^k} \leq 1$}
\\[0pt]
g^k/\norm{g^k} & \mbox{otherwise}
\end{cases},
\\
\xi^{k+1}&=&\Pi _{\R_{+}^n}\Big( r^{k+1} -Z^T w^{k+1} -y \beta^{k+1}
+\sigma^{-1}\alpha^k -\sigma^{-1}C e\Big),
\end{eqnarray*}
where $g^k=w^{k+1}-\sigma^{-1}D^{-1}\rho^k$, and $\Pi_{\R^n_+}(\cdot)$ denotes
the projection onto $\R^n_+$.
\item[Step 3.] Compute
\begin{eqnarray*}
\alpha^{k+1}&=& \alpha^k -\tau \sigma (Z^T w^{k+1}+y\beta^{k+1}+\xi^{k+1}-r^{k+1}),\\
\rho^{k+1}&=& \rho^k -\tau \sigma D (w^{k+1}-u^{k+1}),
\end{eqnarray*}
where $\tau \in (0,(1+\sqrt{5})/2)$ is the steplength which is typically
chosen to be $1.618$.
\end{description}
In our implementation of Algorithm 1, we choose the summable sequence $\{ \varepsilon_k\}_{k\geq 0}$ to
be $\varepsilon_k = c/(k+1)^{1.5}$ where $c$ is a constant that is inversely
proportional to $\norm{Z}_F$.
Next we discuss the computational cost of Algorithm 1.
As we shall see later, the most computationally intensive steps in each iteration
of the above algorithm are in solving the linear systems of equations of the form
\eqref{eq-linsys} in Step 1a and 1c. The detailed analysis of their computational costs
will be presented in subsection \ref{subsec-linsys}.
All the other steps can be done
in at most $O(n)$ or $O(d)$ arithmetic operations, together with the
computation of $Z^T w^{k+1}$, which costs $2dn$ operations if we do not
take advantage of any possible sparsity in $Z$.
\subsection{Convergence results}
We have the following convergence theorem for the inexact sGS-ADMM, established by Chen, Sun and Toh in \citet[Theorem 1]{CST}. This theorem guarantees the convergence of our algorithm to optimality, as a merit over the possibly non-convergent directly extended semi-proximal ADMM.
\begin{theorem}
Suppose that the system \eqref{eq-optimality} has at least one solution. Let $\{(r^k,w^k,\beta^k,\xi^k,u^k;\alpha^k,\rho^k)\}$ be the sequence generated by the inexact sGS-ADMM in Algorithm 1. Then the sequence $\{(r^k,w^k,\beta^k,\xi^k,u^k)\}$ converges to an optimal solution of problem \eqref{eq-gen} and the sequence $\{(\alpha^k,\rho^k)\}$ converges to an optimal solution to the dual of problem \eqref{eq-gen}.
\end{theorem}
\begin{proof}
In order to apply the convergence result in \cite{CST}, we need to express \eqref{eq-gen}
as follows:
\begin{eqnarray}
\min \Big\{p(r) + f(r,w,\beta) + q(\xi,u) + g(\xi,u)
\mid\;
A_1^* r + A_2^* [w;\beta] + B^*[\xi; u] = 0 \Big\}
\end{eqnarray}
where $p(r) = \sum_{i=1}^n \theta_q (r_i),
\;\; f(r,w,\beta) \equiv 0,
\quad q(\xi,u) = \delta_B(u) + C \inprod{e}{\xi} + \delta_{\R^n_+}(\xi), \;\; g(\xi,u) \equiv 0,$
\begin{eqnarray*}
& A_1^* = \left(\begin{array}{c} -I \\[0pt] 0 \end{array} \right),\;
A_2^* = \left(\begin{array}{cc} Z^T & y \\[0pt] D & 0 \end{array} \right),\;
B^* = \left(\begin{array}{cc} I & 0 \\[0pt] 0 & -D \end{array} \right).&
\end{eqnarray*}
Next we need to consider the following matrices:
\begin{eqnarray*}
\left(\begin{array}{c}
A_1 \\[0pt] A_2
\end{array}\right) \Big( A_1^*,\; A_2^* \Big) + \left(\begin{array}{ccc}
0 & 0 & 0 \\[0pt] 0 & \cT & 0 \\[0pt] 0 & 0 & 0
\end{array}\right)
=\left( \begin{array}{ccc}
I & [-Z^T, -y] \\[0pt]
[-Z^T,-y]^T & M
\end{array}\right), \quad BB^* = \left(\begin{array}{cc}
I & 0 \\[0pt] 0 & D^2
\end{array}\right),
\end{eqnarray*}
where
$$
M = \left( \begin{array}{cc}
ZZ^T + D^2 + \cT & Zy \\[0pt]
(Zy)^T & y^T y
\end{array}\right) \succ 0.
$$
One can show that $M$ is positive definite by using the Schur complement lemma.
With the conditions that $M\succ 0$ and $BB^*\succ 0$, the conditions
in Proposition 4.2 of \cite{CST} are satisfied, and hence the convergence of Algorithm 1 follows by using Theorem 1 in \cite{CST}.
\end{proof}
We note here that the convergence analysis in \cite{CST} is highly nontrivial.
But it is motivated by the
proof for the simpler case of an
exact semi-proximal ADMM that is available in Appendix B of the paper by
\cite{FPST}.
In that paper, one can see that the convergence proof is based on the descent
property of
a certain function, while the augmented Lagrangian function itself does not have
such a descent property.
\subsection{Numerical computation of the subproblem \eqref{eq-1c} in Step 1b}
In the presentation of Algorithm 1, we have described how the subproblem in each step can be solved
except for the subproblem \eqref{eq-1c} in Step 1b. Now we discuss how it can be solved. Observe that
for each $i$, we need to solve a one-dimensional problem of the form:
\begin{eqnarray}
\min \Big\{ \varphi(s):= \frac{1}{s^q} + \frac{\sig}{2} (s-a)^2 \mid s > 0
\Big\},
\label{eq-varphi}
\end{eqnarray}
where $a$ is given. It is easy to
see that $\varphi(\cdot)$ is a convex function and it has a unique minimizer
in the domain $(0,\infty)$.
The optimality condition for \eqref{eq-varphi} is given by
$$
s- a = \frac{q\sig^{-1}}{s^{q+1}},
$$
where the unique minimizer $s^*$
is determined by the intersection of the line $s\mapsto s-a$ and the
curve $s\mapsto \frac{q \sig^{-1}}{s^{q+1}}$ for $s> 0$.
We propose to use Newton's method to find the
minimizer, and the template is given as follows. Given an initial iterate $s^0$, perform the
following iterations:
$$
s_{k+1} = s_k - \varphi'(s_k)/\varphi''(s_k) = s_k \left( \
\frac{q(q+2)\sig^{-1} + a s^{q+1}_k}{q(q+1)\sig^{-1} + s^{q+2}_k}\right), \quad k=0,1,\ldots
$$
Since $\varphi^{\prime\prime}(s^*) > 0$, Newton's method
would have a local quadratic convergence rate, and we would expect
it to converge in a small number of iterations, say less than $20$,
if a good initial point $s^0$ is given. In solving the subproblem
\eqref{eq-1c} in Step 1b, we always use the previous solution $r_i^k$ as the
initial point to warm-start Newton's method.
If a good initial point is not available, one can use the bisection technique to find one. In our tests, this technique was however never used.
Observe that the computational cost for solving the subproblem \eqref{eq-1c} in Step 1b is
$O(n)$ if Newton's method converges within a fixed number of iterations (say 20)
for all $i=1,\ldots,n$. Indeed, in our experiments, the average number of
Newton iterations required to solve \eqref{eq-varphi} for each of the instances is less than $10$.
\subsection{Efficient techniques to solve the linear system
\eqref{eq-linsys}}
\label{subsec-linsys}
Observe that in each iteration of Algorithm 1, we need to solve a $(d+1)\times (d+1)$ linear system of
equations \eqref{eq-linsys}
with the same coefficient matrix $A$. For large scale problems where $n$ and/or $d$ are large,
this step would constitute the most expensive part of the algorithm.
In order to solve such a linear system efficiently,
we design different techniques to solve it, depending on the dimensions $n$ and $d$.
We consider the following cases.
\subsubsection{The case where $d\ll n$ and $d$ is moderate}\label{subsec-directSolver}
This is the most straightforward case where
we set $\cT =0$, and
we solve
\eqref{eq-linsys} by computing the Cholesky factorization of the coefficient matrix $A$.
The cost of computing $A$ is
$2 n d^2$ arithmetic operations. Assuming that $A$ is stored, then we can
compute its Cholesky factorization at the cost of $O(d^3)$ operations, which
needs only to be performed once at the very beginning of Algorithm 1.
After that, whenever we need to solve the linear system
\eqref{eq-linsys}, we compute the right-hand-side vector at
the cost of $2nd$ operations and
solve two $(d+1)\times (d+1)$
triangular systems of linear equations at the cost of $2d^2$ operations.
\subsubsection{The case where $n\ll d$ and $n$ is moderate}\label{subsec-smw}
\def\hD{\widehat{D}}
In this case, we also set $\cT=0$. But solving the large $(d+1)\times (d+1)$
system of linear equations \eqref{eq-linsys} requires more thought.
In order to avoid inverting the high dimensional matrix $A$ directly,
we make use of the Sherman-Morrison-Woodbury formula to
get $A^{-1}$ by inverting a much smaller
$(n+1)\times (n+1)$ matrix
as shown in the following proposition.
\begin{proposition} The coefficient matrix $A$ can be rewritten as follows:
\begin{eqnarray}
A &=& \hD + U E U^T, \quad
U = \left[\begin{array}{cc}
Z & 0\\ y^T &\norm{y}
\end{array}\right], \quad E = \diag{I_n,-1},
\label{eq-Anew}
\end{eqnarray}
where $\hD = \diag{D,\norm{y}^2}$.
It holds that
\begin{eqnarray}
A^{-1} &=& \hD^{-1} - \hD^{-1} U H^{-1} U^T \hD^{-1},
\label{eq-Ainv}
\end{eqnarray}
where
\begin{eqnarray}
H = E^{-1} + U^T \hD^{-1} U =
\left[\begin{array}{cc}
I_n + Z^T D^{-1} Z + yy^T/\norm{y}^2 & y/\norm{y}\\[3pt] y^T/\norm{y} & 0
\end{array}\right].
\label{eq-H}
\end{eqnarray}
\end{proposition}
\begin{proof} It is easy to verify that \eqref{eq-Anew} holds and we omit the details.
To get \eqref{eq-Ainv}, we only need to apply the Sherman-Morrison-Woodbury formula in \citet[p.50]{GVbook}
to \eqref{eq-Anew} and perform some simplifications.
\end{proof}
\medskip
Note that in making use of \eqref{eq-Ainv} to compute
$A^{-1}\bar{h}^k$, we need to find $H^{-1}$. A rather cost effective way to
do so is to express $H$ as follows and use the Sherman-Morrison-Woodbury formula to find
its inverse:
\begin{eqnarray*}
H =J+ \bar{y}\bar{y}^T, \quad
J = diag(I_n + Z^TD^{-1} Z,-1), \quad \bar{y} = [y/\norm{y}; \; 1].
\end{eqnarray*}
With the above expression for $H$, we have that
\begin{eqnarray*}
H^{-1} = J^{-1} - \frac{1}{1+\bar{y}^T J^{-1}\bar{y}} (J^{-1}\bar{y} ) (J^{-1}\bar{y})^T.
\end{eqnarray*}
Thus
to solve \eqref{eq-linsys}, we first compute the $n\times n$ matrix $I_n + Z^TD^{-1} Z$ in \eqref{eq-H} at
the cost of $2dn^2$ operations. Then we compute its Cholesky factorization at the cost of $O(n^3)$ operations.
(Observe that even though we are solving a $(d+1)\times (d+1)$ linear system of equations
for which $d\gg n$, we only need to compute the Cholesky factorization of
a much smaller $n\times n$ matrix.)
Also, we need to compute $J^{-1}\bar{y}$ at the cost of
$O(n^2)$ operations by using the previously computed Cholesky factorization.
These computations only need to be performed
once at the beginning of Algorithm 1. After that, whenever we need to
solve a linear system of the form \eqref{eq-linsys},
we can compute $\bar{h}^k$ at the cost of $2nd$ operations, and then
make use of $\eqref{eq-Ainv}$ to get $A^{-1}\bar{h}^k$ by solving two $n\times n$
triangular systems of linear equations at the cost of $2n^2$ operations, and
performing two matrix-vector multiplications involving $Z$ and $Z^T$ at a
total cost of $4nd$ operations. To summarize, given the Cholesky factorization of the first diagonal block of $H$, the cost of solving \eqref{eq-linsys} via \eqref{eq-Ainv} is $6nd + 2n^2$ operations.
\subsubsection{The case where $d$ and $n$ are both large}
The purpose of introducing the proximal term $\frac{1}{2}\norm{w-w^k}_\cT^2$
in Steps 1a and 1c is to make the computation of the solutions of the subproblems
easier.
However, one should note that adding the proximal term typically will make the algorithm converge more slowly, and the deterioration will become worse for
larger $\norm{\cT}$. Thus in practice, one would need to strike a balance between choosing
a symmetric positive semidefinite matrix $\cT$ to make the computation easier while not slowing down
the algorithm by too much.
In our implementation, we first attempt to
solve the subproblem in Step 1a (similarly for 1c) without adding a proximal term by setting
$\cT=0$. In particular, we solve the linear system \eqref{eq-linsys}
by using
a preconditioned symmetric quasi-minimal residual (PSQMR) iterative solver (\citealt{PSQMR})
when both $n$ and $d$ are large.
Basically, it is a variant of the Krylov subspace method similar to the idea in GMRES (\citealt{SaadBook}). For more details on the PSQMR algorithm, the reader is referred to the appendix.
In each step of the PSQMR solver, the main cost is in performing the matrix-vector
multiplication with the coefficient matrix $A$, which costs
$4nd$ arithmetic operations.
As the number of steps taken by an iterative solver to solve \eqref{eq-linsys}
to the required accuracy \eqref{eq-linsys-tol} is dependent on the
conditioning of $A$, in the event that the
solver requires more than $50$ steps to solve \eqref{eq-linsys},
we would switch to
adding a suitable non-zero proximal term $\cT$ to make the subproblem in Step 1a easier to solve.
The most common and natural choice of $\cT$ to make the subproblem in Step 1a easy to solve is
to set $\cT = \lambda_{\max}I- ZZ^T$, where
$\lam_{\max}$ denotes the largest eigenvalue of $ZZ^T$. In this case
the corresponding linear system \eqref{eq-linsys} is very easy to solve. More precisely, for the
linear system in \eqref{eq-linsys}, we can first compute $\bar{\beta}^{k+1}$ via the
Schur complement equation in a single variable followed by computing $\bar{w}^k$ as follows:
\begin{eqnarray}
\begin{array}{l}
\big(y^Ty - (Zy)^T (\lam_{\max} I + D)^{-1} (Zy) \big)\beta = \bar{h}^k_{d+1}
- (Zy)^T (\lam_{\max} I + D)^{-1} \bar{h}^k_{1:d},
\\[5pt]
\bar{w}^{k+1} = (\lam_{\max}I + D)^{-1} (\bar{h}^k_{1:d} - (Zy)\bar{\beta}^{k+1}),
\end{array}
\label{eq-schur}
\end{eqnarray}
where $\bar{h}^k_{1:d}$ denotes the vector extracted from the first $d$ components
of $\bar{h}^k$.
In our implementation, we pick a $\cT$ which is less conservative
than the above natural choice as follows.
Suppose we have computed the first $\ell$ largest eigenvalues of $ZZ^T$ such that $\lam_1\geq\ldots\geq\lam_{\ell-1} > \lam_\ell$, and their
corresponding orthonormal set of eigenvectors, $v_1,\ldots,v_\ell$.
We pick $\cT$ to be
\begin{eqnarray}
\cT = \lam_\ell I + \mbox{$\sum_{i=1}^{\ell-1}$} (\lam_i -\lam_\ell) v_i v_i^T - ZZ^T,
\label{eq-T}
\end{eqnarray}
which can be proved to be positive semidefinite by using the spectral decomposition
of $ZZ^T$. In practice, one would typically pick $\ell$ to be a small integer, say $10$,
and compute the first $\ell$ largest eigenvalues and their corresponding eigenvectors
via variants of the Lanczos method.
The most expensive step in each iteration of the Lanczos method is a matrix-vector multiplication, which
requires $O(d^2)$ operations. In general, the cost of computing the first few largest eigenvalues of $ZZ^T$
is much cheaper than that of computing the full eigenvalue decomposition.
In {\sc Matlab}, such a computation can be
done by using the routine {\tt eigs}.
To solve \eqref{eq-linsys}, we need the inverse of $ZZ^T + D+\cT$. Fortunately,
when $D = \mu I_d$, it can easily be inverted with
$$
(ZZ^T + D + \cT)^{-1} = (\mu+\lam_\ell)^{-1} I_d
+ \mbox{$\sum_{i=1}^{\ell-1}$}
\big( (\mu+\lam_i)^{-1}-(\mu+\lam_\ell)^{-1}\big) v_iv_i^T.
$$
One can then compute $\bar{\beta}^k$ and $\bar{w}^k$ as
in \eqref{eq-schur} with $(\lam_{\max} I + D)^{-1}$ replaced by the above
inverse.
\section{Experiments}\label{sec-experiments}
In this section, we test the performance of our inexact sGS-ADMM method on several publicly available data sets. The numerical results presented in the subsequent subsections are obtained from a computer with processor specifications: Intel(R) Xeon(R) CPU E5-2670 @ 2.5GHz (2 processors) and 64GB of RAM, running on a 64-bit Windows Operating System.
\subsection{Tuning the penalty parameter}
In the DWD model \eqref{eq-gen}, we see that it is important to make a suitable choice of the penalty parameter $C$.
In \cite{MarronTodd-2007}, it has been noticed that a reasonable choice for the penalty parameter when the exponent $q=1$ is a large constant divided by the square of a typical distance between the $x_i$'s, where the typical distance, $dist$, is defined as the median of the pairwise Euclidean distances between classes. We found out that in a more general case, $C$ should be inversely proportional to $dist^{q+1}$. On the other hand, we observed that a good choice of $C$ also depends on the sample size $n$ and the dimension of features $d$. In our numerical experiments, we empirically set the value of $C$ to be
$10^{q+1}\max \big\{1,\frac{10^{q-1} \log(n)\max\{1000,d\}^{\frac{1}{3}}}{dist^{q+1}}\big\}$,
where $\log(\cdot)$ is the natural logarithm.
\subsection{Scaling of data}
A technique which is very important in implementing ADMM based methods in practice to
achieve fast convergence
is the data scaling technique.
Empirically, we have observed that
it is good to scale the matrix $Z$ in \eqref{eq-gen} so that the magnitude of all the blocks in the equality constraint would be roughly the same. Here we choose the scaling factor to be $Z_{\rm scale} = \sqrt{\norm{X}_F}$,
where $\norm{\cdot}_F$ is the Frobenius norm. Hence the optimization model in \eqref{eq-gen} becomes:
\begin{eqnarray}
\begin{array}{ll}
\min &\sum_{i=1}^n \frac{1}{r_i^q}+ C \inprod{e}{\xi}+\delta_{\widetilde{B}}(\tilde{u}) + \delta_{\R^n_+}(\xi)
\\[8pt]
\text{s.t.} & \widetilde{Z}^T \,\tilde{w}
+\beta y+\xi-r=0,\; r > 0,\\[0pt]
& D(\tilde{w}- \tilde{u}) =0, \;\; \tilde{w}, \tilde{u}\in\R^d, \; r,\xi\in \R^n,
\end{array}
\label{eq-gen-scale}
\end{eqnarray}
where $\widetilde{Z} = \frac{Z}{Z_{\rm scale}}$,
$\tilde{w} = Z_{\rm scale} w$, $\tilde{u} = Z_{\rm scale} u$, and
$\widetilde{B}=\{\tilde{w} \in \R^d \mid \norm{\tilde{w}}\leq Z_{\rm scale}\}$. Therefore, if we have computed an optimal solution $(r^*,\tilde{w}^*,\beta^*,\xi^*,\tilde{u}^*)$ of
\eqref{eq-gen-scale}, then
$(r^*,Z^{-1}_{\rm scale}\tilde{w}^*,\beta^*,\xi^*,Z^{-1}_{\rm scale}\tilde{u}^*)$
would be an optimal solution of \eqref{eq-gen}.
\subsection{Stopping condition for inexact sGS-ADMM}\label{subsec-stopping}
We measure the accuracy of an approximate optimal solution $(r,w,\beta,\xi,u,\alpha,\rho)$ for \eqref{eq-gen-scale} based on the KKT optimality conditions \eqref{eq-optimality} by defining the following relative residuals:
\begin{eqnarray*}
\arraycolsep=1.4pt\def\arraystretch{1.5}
\begin{array}{lllll}
\eta_{C_1} = \frac{|y^T \alp|}{1+C}, & \eta_{C_2} = \frac{|\xi^T (Ce-\alp)|}{1+C}, & \eta_{C_3} = \frac{\norm{\alp - s}^2}{1+C} \text{ with } s_i = \frac{q}{r_i^{q+1}} , \\
\eta_{P_1} = \frac{\norm{\widetilde{Z}^T \tilde{w} + \beta y + \xi - r}}{1+C},
& \eta_{P_2} = \frac{\norm{D(\tilde{w}-\tilde{u})}}{1+C}, & \eta_{P_3} = \frac{\max\{\norm{\tilde{w}}-Z_{\rm scale},0\}}{1+C} ,
\\
\eta_{D_1} = \frac{\norm{\min\{0,\alp\}}}{1+C}, & \eta_{D_2} = \frac{\norm{\max\{0,\alp-Ce\}}}{1+C} ,
\end{array}
\end{eqnarray*}
where $Z_{\rm scale}$ is a scaling factor which has been discussed in the last subsection.
Additionally, we calculate the relative duality gap by:
$$
\eta_{gap} := \frac{|\primobj-\dualobj|}{1+|\primobj|+|\dualobj|},
$$
where
$\primobj = \sum_{i=1}^n \frac{1}{r_i^q}+ C \inprod{e}{\xi}, \;
\dualobj = \kappa\sum_{i=1}^n \alp_i^{\frac{q}{q+1}}- Z_{\rm scale}\norm{\widetilde{Z}\alp}, \text{ with }
\kappa = \frac{q+1}{q} q^{\frac{1}{q+1}}.$
We should emphasize that although for machine learning problems, a high accuracy solution is
usually not required, it is important however to use
the KKT optimality conditions as the stopping criterion to find a moderately
accurate solution in order to design a robust solver.
We terminate the solver when $\max\{\eta_P,\eta_D\}<10^{-5}$, $\min\{\eta_C,\eta_{gap}\}<\sqrt{10^{-5}}$, and $\max\{\eta_C,\eta_{gap}\} < 0.05$.
Here, $\eta_C = \max\{\eta_{C_1},\eta_{C_2},\eta_{C_3}\}, \; \eta_P = \max\{\eta_{P_1},\eta_{P_2},\eta_{P_3}\}$, and $ \eta_D = \max\{\eta_{D_1},\eta_{D_2}\}$.
Furthermore, the maximum number of iterations is set to be 2000.
\subsection{Adjustment of Lagrangian parameter $\sigma$ }
Based upon some preliminary experiments, we set our initial Lagrangian parameter $\sig$ to be $\sigma_0=\min\{10C, n\}^q$, where $q$ is the exponent in \eqref{eq-gen},
and adapt the following strategy to update $\sigma$ to improve the convergence speed of the algorithm in practice:
\begin{description}
\item[Step 1.] Set $\chi=\frac{\eta_P}{\eta_D}$, where $\eta_P$ and $\eta_D$ are defined in subsection \ref{subsec-stopping};
\item[Step 2.] If $\chi>\theta$, set $\sig_{k+1} = \zeta \sig_k$; elseif $\frac{1}{\chi}>\theta$, set $\sig_{k+1} = \frac{1}{\zeta} \sig_k$.
\end{description}
Here we empirically set $\theta$ to be 5 and $\zeta$ to be 1.1. Nevertheless, if we have either $\eta_P\ll\eta_D$ or $\eta_D\ll\eta_P$, then we would increase $\zeta$ accordingly, say 2.2 if $\max\{\chi,\frac{1}{\chi}\}>500$ or 1.65 if $\max\{\chi,\frac{1}{\chi}\}>50$.
\subsection{Performance of the sGS-ADMM on UCI data sets}
In this subsection, we test our algorithm on instances from the UCI data repository (\citealt{UCI}).
The datasets we have chosen here are all classification problems with two classes.
However, the size for each class may not be balanced. To tackle the case of uneven class proportions, we use the weighted DWD model discussed in \cite{qiao}. Specifically,
we consider the model \eqref{eq-primal} using $e = \bfone$ and the term
$\sum_{i=1}^n 1/r_i^{q}$ is replaced by $\sum_{i=1}^n \tau_i^q/ r_i^{q}$, with
the weights $\tau_i$ given as follows:
\begin{eqnarray*}
\tau_i = \left\{ \begin{array}{ll}
\frac{\tau_-}{\max\{\tau_+,\tau_-\}} & \mbox{if $y_i=+1$} \\[5pt]
\frac{\tau_+}{\max\{\tau_+,\tau_-\}} & \mbox{if $y_i=-1$}
\end{array}, \right.
\end{eqnarray*}
where $\tau_\pm =
\big(|n_\pm| K^{-1}\big)^{\frac{1}{1+q}}$.
Here $n_{\pm}$ is the number of data points with class label $\pm 1$ respectively and $K:={n}/{\log(n)}$ is a normalizing factor.
\begin{center}
\spacingset{1.2}
\begin{footnotesize}
\begin{longtable}{| c | c | c | c | c | c| c| c| c|}
\hline
\multicolumn{1}{|c}{Data} & \multicolumn{1}{|c|}{$n$}
& \multicolumn{1}{|c|}{$d$}
& \multicolumn{1}{|c|}{$C$}
& \multicolumn{1}{|c|}{Iter} & \multicolumn{1}{|c|}{Time (s)}
& \multicolumn{1}{|c|}{psqmr$|$double}
& \multicolumn{1}{|c|}{Train-error (\%)}
\\ \hline
\endhead
a8a &22696 & 123 &6.27e+02 &201 &2.28 & 0$|$201 &15.10
\\[3pt]\hline
a9a &32561 & 123 &6.49e+02 &201 &2.31 & 0$|$201 &14.93
\\[3pt]\hline
covtype &581012 & 54 &3.13e+03 &643 &104.34 & 0$|$191 &23.74
\\[3pt]\hline
gisette &6000 &4972 &1.15e+04 &101 &39.69 & 0$|$ 49 &0.17
\\[3pt]\hline
gisette-scale &6000 &4956 &1.00e+02 &201 &59.73 & 0$|$201 &0.00
\\[3pt]\hline
ijcnn1 &35000 & 22 &4.23e+03 &401 &3.16 & 0$|$401 &7.77
\\[3pt]\hline
mushrooms &8124 & 112 &3.75e+02 & 81 &1.09 & 0$|$ 81 &0.00
\\[3pt]\hline
real-sim &72309 &20958 &1.55e+04 &210 &47.69 & 875$|$210 &1.45
\\[3pt]\hline
w7a &24692 & 300 &5.95e+02 &701 &4.84 & 0$|$701 &1.17
\\[3pt]\hline
w8a &49749 & 300 &6.36e+02 &906 &9.43 & 0$|$906 &1.20
\\[3pt]\hline
rcv1 &20242 &44505 &9.18e+03 & 81 &9.18 & 234$|$ 49 &0.63
\\[3pt]\hline
leu & 38 &7129 &1.00e+02 &489 &2.84 & 0$|$489 &0.00
\\[3pt]\hline
prostate & 102 &6033 &1.00e+02 & 81 &3.19 & 0$|$ 81 &0.00
\\[3pt]\hline
farm-ads &4143 &54877 &3.50e+03 & 81 &6.92 & 792$|$ 81 &0.14
\\[3pt]\hline
dorothea & 800 &88120 &1.00e+02 & 51 &4.44 & 0$|$ 51 &0.00
\\[3pt]\hline
url-svm &256000 &685896 &1.18e+06 &121 &294.55 & 364$|$121 &0.01
\\[3pt]\hline
\caption{The performance of our inexact sGS-ADMM method on the UCI data sets. }
\label{table-UCI}
\end{longtable}
\end{footnotesize}
\end{center}
Table \ref{table-UCI} presents the number of iterations and runtime required, as well as training error produced when we perform our inexact sGS-ADMM algorithm to solve {16} data sets. Here, the running time is the total time spent in reading the training data and in solving
the DWD model. The timing
for getting the best penalty parameter C is excluded.
The results are generated using the exponent $q=1$.
In the table, ``psqmr" is the iteration count for the preconditioned symmetric quasi-minimal residual method for solving the linear system \eqref{eq-linsys}. A `0' for ``psqmr" means that we are using a direct solver as mentioned in subsection \ref{subsec-directSolver} and \ref{subsec-smw}. {Under the column ``double" in Table \ref{table-UCI}, we also record the number of iterations for which the extra Step 1c is executed to ensure the convergence of Algorithm 1.
Denote the index set $S=\{i \mid y_i [\text{sgn}(\beta+x_i^T w)]\le 0, i=1,\ldots,n\}$ for which the data instances are categorized wrongly, where $sgn(x)$ is the sign function. The training and testing errors are both defined by $\frac{|S|}{n}\times 100 \%$, where $|S|$ is the cardinality of the set $S$.}
Our algorithm is capable of solving all the data sets, even when the size of the data matrix is huge.
In addition, for data with unbalanced class size, such as w7a and w8a, our algorithm is able to produce a classifier with small training error.
\subsection{Comparison with other solvers}
In this subsection, we compare our inexact sGS-ADMM method for solving \eqref{eq-primal}
via \eqref{eq-gen}
with
the primal-dual interior-point method implemented in \cite{SDPT3} and used in \cite{MarronTodd-2007}. We also compare our method with
the directly extended (semi-proximal) ADMM (using
the aggressive step-length 1.618) even though the latter's convergence is not
guaranteed.
Note that the directly extended ADMM we have implemented here follows exactly the
same design used for sGS-ADMM, except that
we switch off the additional Step 1c in the Algorithm 1.
We should emphasize that our directly extended ADMM is not a simple
adaption of the classical ADMM, but instead incorporates all the sophisticated techniques
we have developed for sGS-ADMM.
We will report our computational results for two different values of the exponent, $q=1$ and $q=2$, in Tables \ref{table-comparison} and \ref{table-comparison-2}, respectively.
\begin{center}
\spacingset{1.2}
\begin{footnotesize}
\footnotesize
\setlength{\tabcolsep}{1.5pt}
\begin{longtable}{|| c | c | c | c || c | c | c|| c| c |c || c| c| c||}
\hline
\multicolumn{4}{||c||}{exponent $q=1$} & \multicolumn{3}{c||}{sGS-ADMM} & \multicolumn{3}{c||}{directADMM} & \multicolumn{3}{c||}{IPM} \\
\hline
\multicolumn{1}{||c|}{Data} & \multicolumn{1}{|c|}{$n$} & \multicolumn{1}{|c|}{$d$}
& \multicolumn{1}{|c||}{$C$} & \multicolumn{1}{|c|}{Time (s)} & \multicolumn{1}{|c|}{Iter}
& \multicolumn{1}{|c||}{Error (\%)} & \multicolumn{1}{|c|}{Time (s)} & \multicolumn{1}{|c|}{Iter}
& \multicolumn{1}{|c||}{Error (\%)} & \multicolumn{1}{|c|}{Time (s)} & \multicolumn{1}{|c|}{Iter}
& \multicolumn{1}{|c||}{Error (\%)}
\\ \hline
\endhead
a8a &22696 & 123 &6.27e+02&2.28 &201 &15.10&2.01 &219 &15.10&1321.20 & 47 &15.09
\\[3pt]\hline
a9a &32561 & 123 &6.49e+02&2.31 &201 &14.93&2.12 &258 &14.93&2992.60 & 43 &14.93
\\[3pt]\hline
covtype &581012 & 54 &3.13e+03&104.34 &643 &23.74&100.26 &700 &23.74 & - & - & -
\\[3pt]\hline
gisette &6000 &4972 &1.15e+04&39.69 &101 &0.17&33.14 & 70 &0.25&2403.40 & 62 &20.50*
\\[3pt]\hline
gisette-scale &6000 &4956 &1.00e+02&59.73 &201 &0.00&152.05 &2000 &0.00&49800.58 & 84 &17.80*
\\[3pt]\hline
ijcnn1 &35000 & 22 &4.23e+03&3.16 &401 &7.77&2.95 &501 &7.77&1679.34 & 34 &7.77
\\[3pt]\hline
mushrooms &8124 & 112 &3.75e+02&1.09 & 81 &0.00&1.42 &320 &0.00&136.67 & 50 &0.00
\\[3pt]\hline
real-sim &72309 &20958 &1.55e+04&47.69 &210 &1.45&89.55 &702 &1.42 & - & - & -
\\[3pt]\hline
w7a &24692 & 300 &5.95e+02&4.84 &701 &1.17&8.52 &2000 &1.16&4474.13 & 53 &1.17
\\[3pt]\hline
w8a &49749 & 300 &6.36e+02&9.43 &906 &1.20&13.58 &2000 &1.16 & - & - & -
\\[3pt]\hline
rcv1 &20242 &44505 &9.18e+03&9.18 & 81 &0.63&16.07 &245 &0.63&9366.41 & 43 &0.17
\\[3pt]\hline
leu & 38 &7129 &1.00e+02&2.84 &489 &0.00&5.35 &2000 &0.00&1.33 & 11 &0.00
\\[3pt]\hline
prostate & 102 &6033 &1.00e+02&3.19 & 81 &0.00&4.13 &2000 &0.00&7.73 & 19 &0.00
\\[3pt]\hline
farm-ads &4143 &54877 &3.50e+03&6.92 & 81 &0.14&4.20 & 61 &0.14&642.79 & 54 &0.24
\\[3pt]\hline
dorothea & 800 &88120 &1.00e+02&4.44 & 51 &0.00&37.31 &2000 &0.00&15.53 & 23 &0.00
\\[3pt]\hline
url-svm &256000 &685896 &1.18e+06&294.55 &121 &0.01&264.52 &195 &0.00 & - & - & -
\\[3pt]\hline
\caption{Comparison between the performance of our inexact sGS-ADMM, directly extended ADMM ``directADMM", and the interior point method ``IPM" on the UCI data sets. A `*' next to the error in the table means that the problem set cannot be solved properly by the respective solver; `-' means the algorithm cannot solve the dataset due to insufficient computer memory.}
\label{table-comparison}
\end{longtable}
\end{footnotesize}
\end{center}
Table \ref{table-comparison} reports the runtime, number of iterations required as well as the training error of 3 different solvers for solving the UCI data sets. We can observe that the interior point method is almost always the slowest to achieve optimality compared to the other two solvers, despite requiring the least number of iterations, especially when the sample size $n$ is large.
The inefficiency of the interior-point method is caused by its need to solve an $n\times n$ linear system of equations in each iteration, which could be very expensive if $n$ is large.
In addition, it cannot solve the DWD problem where $n$ is huge due to the excessive computer memory needed to store the large $n\times n$ matrix.
On the other hand, our inexact sGS-ADMM method outperforms the directly extended (semi-proximal) ADMM for
9 out of {16 cases} in terms of runtime. For the other cases, we are only slower by a relatively small margin. Furthermore, when our algorithm outperforms the directly extended ADMM, it often shortens the runtime by a large margin.
In terms of number of iterations, for {14 out of 16 cases}, the directly extended ADMM requires at least the same number of iterations as our inexact sGS-ADMM method. We can say that our algorithm is remarkably efficient and it further possesses a
convergence guarantee. In contrast, the directly extended ADMM
is not guaranteed to converge although it is also very efficient when it
does converge. We can observe that the directly extended ADMM sometimes
would take many more iterations to solve a problem compared to
our inexact sGS-ADMM, especially for the instances in Table \ref{table-comparison-2},
possibly because the lack of a convergence guarantee makes it difficult for the method to find a sufficiently accurate approximate optimal solution.
To summarize, our inexact sGS-ADMM method is an efficient yet convergent algorithm for solving the primal form of the DWD model. It is also able to solve large scale problems which cannot be handled by the interior point method.
\begin{center}
\spacingset{1.2}
\begin{footnotesize}
\footnotesize
\setlength{\tabcolsep}{1.5pt}
\begin{longtable}{|| c | c | c | c || c | c | c|| c| c |c || c| c| c||}
\hline
\multicolumn{4}{||c||}{exponent $q=2$} & \multicolumn{3}{c||}{sGS-ADMM} & \multicolumn{3}{c||}{directADMM} & \multicolumn{3}{c||}{IPM} \\
\hline
\multicolumn{1}{||c|}{Data} & \multicolumn{1}{|c|}{$n$} & \multicolumn{1}{|c|}{$d$}
& \multicolumn{1}{|c||}{$C$} & \multicolumn{1}{|c|}{Time (s)} & \multicolumn{1}{|c|}{Iter}
& \multicolumn{1}{|c||}{Error (\%)} & \multicolumn{1}{|c|}{Time (s)} & \multicolumn{1}{|c|}{Iter}
& \multicolumn{1}{|c||}{Error (\%)} & \multicolumn{1}{|c|}{Time (s)} & \multicolumn{1}{|c|}{Iter}
& \multicolumn{1}{|c||}{Error (\%)}
\\ \hline
\endhead
a8a &22696 & 123 &1.57e+04&2.77 &248 &15.10&2.97 &533 &15.11&7364.34 & 45 &15.17
\\[3pt]\hline
a9a &32561 & 123 &1.62e+04&2.92 &279 &14.94&5.78 &1197 &14.94&16402.05 & 48 &14.95
\\[3pt]\hline
covtype &581012 & 54 &1.52e+05&81.63 &368 &23.74&275.29 &2000 &23.74 & - & - & -
\\[3pt]\hline
gisette &6000 &4972 &1.01e+06&39.72 &101 &0.03&28.42 & 81 &0.03&2193.74 & 55 &0.00
\\[3pt]\hline
gisette-scale &6000 &4956 &1.00e+03&88.89 &439 &0.00&147.80 &2000 &1.20&31827.33 & 53 &0.00
\\[3pt]\hline
ijcnn1 &35000 & 22 &2.69e+05&2.76 &233 &7.94&4.80 &1056 &7.87&1959.68 & 38 &7.98
\\[3pt]\hline
mushrooms &8124 & 112 &7.66e+03&1.59 &301 &0.00&3.63 &2000 &0.17&594.33 & 52 &0.00
\\[3pt]\hline
real-sim &72309 &20958 &1.10e+06&43.20 &180 &1.51&23.56 &181 &1.51 & - & - & -
\\[3pt]\hline
w7a &24692 & 300 &1.44e+04&3.96 &473 &1.15&7.83 &2000 &2.69&5448.78 & 48 &1.18
\\[3pt]\hline
w8a &49749 & 300 &1.54e+04&7.07 &543 &1.13&13.57 &2000 &2.68 & - & - & -
\\[3pt]\hline
rcv1 &20242 &44505 &4.69e+05&9.47 & 81 &1.16&7.54 &101 &1.16&8562.76 & 47 &0.24*
\\[3pt]\hline
leu & 38 &7129 &1.00e+03&1.72 &204 &0.00&4.52 &2000 &0.00&2.82 & 23 &0.00
\\[3pt]\hline
prostate & 102 &6033 &1.00e+03&3.32 &111 &0.00&3.87 &2000 &0.00&8.33 & 21 &0.00
\\[3pt]\hline
farm-ads &4143 &54877 &5.21e+04&37.79 &401 &0.19&8.31 &146 &0.19&343.13 & 43 &0.27
\\[3pt]\hline
dorothea & 800 &88120 &1.00e+03&4.39 & 51 &0.00&31.49 &2000 &0.00&16.84 & 25 &0.00
\\[3pt]\hline
url-svm &256000 &685896 &5.49e+07&452.81 &205 &0.02&587.46 &490 &0.02 & - & - & -
\\[3pt]\hline
\caption{
Same as Table \ref{table-comparison} but
for $q=2$.}
\label{table-comparison-2}
\end{longtable}
\end{footnotesize}
\end{center}
Table \ref{table-comparison-2} reports the runtime, number of iterations required
as well as the training error of 3 different solvers for solving the UCI data sets for the case when $q=2$. Again, we can see that the interior point method is almost always the slowest to converge to optimality.
Our sGS-ADMM algorithm outperforms the directly extended ADMM algorithm in {12 out of 16} data sets in terms of runtime.
In terms of the number of iterations, it has the best performance among almost all the data sets. On the other hand, for {8} data sets, the number of iterations required by the directly extended ADMM hits the maximum iterations allowed, probably implying nonconvergence of the method. For the interior point method, it
takes an even longer time to solve the problems
compared to the case when $q=1$. This is due to an increase in the number of constraints generated
in the second-order cone programming formulation of the DWD model with $q=2$.
The numerical result we obtained in this case is consistent with the one we obtained for the case $q=1$. This further shows the merit of our algorithm in a more general setting. We could also expect the similar result when the exponent is 4 or 8.
\subsection{Comparison with LIBSVM and LIBLINEAR}
In this subsection, we will compare the performance of our DWD model to the state-of-the-art model support
vector machine (SVM). We apply our sGS-ADMM algorithm as the DWD model and use
LIBSVM in \cite{LIBSVM} as well as LIBLINEAR in \cite{LIBLINEAR} to implement the SVM model. LIBSVM is a
general solver for solving SVM models with different kernels; while LIBLINEAR is a solver highly specialized
in solving SVM with linear kernels. LIBLINEAR is a fast linear classifier; in particular, we would apply it to the
dual of L2-regularized L1-loss support vector classification problem. We would like to emphasize that the solution given by LIBSVM using linear kernel and that given by LIBLINEAR is not exactly the same. This may be
due to the reason that LIBLINEAR has internally preprocessed the data and
assumes that there is no bias term in the model.
{The parameters used in LIBSVM are chosen to be the same as in \cite{unifapg}, whereas for LIBLINEAR, we make use of the default parameter $C = 1$ for all the datasets.}
Table \ref{table-comparison-LIBSVM} shows the runtime and number of iterations needed for
solving the binary classification problem via the DWD and SVM models respectively on the UCI datasets. It also gives the training and testing classification error produced by the three algorithms. Note that
the training time excludes the time for computing the best penalty parameter $C$.
The stopping tolerance for all algorithms is set to be $10^{-5}$.
For LIBLINEAR, we observed that the default maximum number of iteration is breached for many datasets.
Thus we increase the maximum number of iteration from the default 1000 to 20000.
In terms of runtime, LIBLINEAR is almost always the fastest to solve the problem, except for the
{two largest datasets (rcv1,url-svm) for which our algorithm is about 2-3 times faster}.
Note that the maximum iteration is reached for {these two datasets}. On the other hand,
LIBSVM is almost always the slowest solver. It may only be faster than sGS-ADMM for small datasests (3 cases).
Our algorithm can be 50-100 times faster than LIBSVM when solving large data instances. Furthermore,
LIBSVM may have the risk of not being able to handle extremely large-scaled datasets. For example,
it cannot solve the biggest dataset (url-svm) within 24 hours.
In terms of training and testing error, we may observe from the table that the DWD and SVM models
produced comparable training classification errors, although there are some discrepancies due to the
differences in the models and penalty parameters used. On the other hand, the testing errors vary across
different solvers. For most datasets, the DWD model (solved by sGS-ADMM) produced smaller (sometimes much smaller) testing errors than
the other algorithms (8 cases); whereas the SVM model (solved by LIBLINEAR) produced the
worst testing errors among all algorithms {(5 cases)}. The discrepancy between the testing errors
given by LIBSVM and LIBLINEAR may be due to the different treatment of the bias term in-built into the algorithms.
It is reasonable to claim that our algorithm is more efficient than the extremely fast solver LIBLINEAR
in solving large data instances even though our algorithm is designed for the more complex
DWD model compared to the simpler SVM model.
Moreover, our algorithm for solving the DWD model is able to produce testing errors
which are generally better than those produced by LIBLINEAR for solving the SVM model.
\begin{center}
\spacingset{1.2}
\begin{footnotesize}
\footnotesize
\setlength{\tabcolsep}{0.8pt}
\begin{longtable}{|| c | c | c |c || c | c | c|c|| c|c | c|c || c| c| c|c||}
\hline
\multicolumn{4}{||c||}{} & \multicolumn{4}{c||}{DWD via sGS-ADMM} & \multicolumn{4}{c||}{SVM via LIBLINEAR} & \multicolumn{4}{c||}{SVM via LIBSVM} \\
\hline
\multicolumn{1}{||c|}{Data} & \multicolumn{1}{|c|}{$n$} & \multicolumn{1}{|c|}{$d$} & \multicolumn{1}{|c||}{$n_{test}$}
& \multicolumn{1}{|c|}{Time} & \multicolumn{1}{|c|}{Iter} & \multicolumn{1}{|c|}{$Err_{tr}$} & \multicolumn{1}{|c||}{$Err_{test}$} & \multicolumn{1}{|c|}{Time} & \multicolumn{1}{|c|}{Iter}
& \multicolumn{1}{|c|}{$Err_{tr}$} & \multicolumn{1}{|c||}{$Err_{test}$} & \multicolumn{1}{|c|}{Time} & \multicolumn{1}{|c|}{Iter} & \multicolumn{1}{|c|}{$Err_{tr}$} & \multicolumn{1}{|c||}{$Err_{test}$}
\\ \hline
\endhead
a8a &22696 & 123 &9865 &2.28 &201 &15.10 &14.67 &0.69 &20000 &15.32 &14.87&50.45 &34811 &15.44 &14.80
\\[3pt]\hline
a9a &32561 & 123 &16281 &2.31 &201 &14.93 &15.19 &0.79 &6475 &15.01 &15.02&93.91 &25721 &15.24 &15.03
\\[3pt]\hline
covtype &581012 & 54 & / &104.34 &643 &23.74 & / &23.53 &20000 &23.69 & /&19641.19 &224517 &23.70 & /
\\[3pt]\hline
gisette &6000 &4972 &1000 &39.69 &101 &0.17 &3.00 &4.34 &132 &0.00 &10.70&85.93 &14818 &0.40 &14.30
\\[3pt]\hline
gisette-scale &6000 &4956 &1000 &59.73 &201 &0.00 &2.50 &33.07 &484 &0.00 &2.30&152.27 &15738 &0.40 &2.20
\\[3pt]\hline
ijcnn1 &35000 & 22 &91701 &3.16 &401 &7.77 &7.82 &0.55 &11891 &8.70 &8.35&27.04 &10137 &9.21 &8.76
\\[3pt]\hline
mushrooms &8124 & 112 & / &1.09 & 81 &0.00 & / &0.19 &326 &0.00 & /&0.64 &1003 &0.00 & /
\\[3pt]\hline
real-sim &72309 &20958 & / &47.69 &210 &1.45 & / &7.56 &1190 &1.07 & /&3846.07 &52591 &1.37 & /
\\[3pt]\hline
w7a &24692 & 300 &25057 &4.84 &701 &1.17 &1.30 &0.43 &1689 &1.28 &10.12&14.79 &62830 &1.37 &1.38
\\[3pt]\hline
w8a &49749 & 300 &14951 &9.43 &906 &1.20 &1.31 &2.45 &13095 &1.18 &9.64&63.27 &124373 &1.36 &1.43
\\[3pt]\hline
rcv1 &20242 &44505 &677399 &9.18 & 81 &0.63 &5.12 &33.98 &20000 &0.15 &5.17&819.32 &33517 &0.62 &13.82
\\[3pt]\hline
leu & 38 &7129 & 34 &2.84 &489 &0.00 &5.88 &0.30 & 27 &0.00 &20.59&0.59 &184 &0.00 &17.65
\\[3pt]\hline
prostate & 102 &6033 & / &3.19 & 81 &0.00 & / &2.73 &353 &0.00 & /&2.54 &1063 &0.00 & /
\\[3pt]\hline
farm-ads &4143 &54877 & / &6.92 & 81 &0.14 & / &6.11 &5364 &0.14 & /&10.34 &15273 &0.14 & /
\\[3pt]\hline
dorothea & 800 &88120 & 350 &4.44 & 51 &0.00 &5.14 &0.83 & 11 &0.00 &8.86&7.48 &4553 &0.00 &7.71
\\[3pt]\hline
url-svm &256000 &685896 & / &294.55 &121 &0.01 & / &660.39 &20000 &0.01 & /& - & - & - & -
\\[3pt]\hline
\caption{Comparison between the performance of our inexact sGS-ADMM on DWD model with LIBLINEAR and LIBSVM on SVM model. $n_{test}$ is the size of testing sample, $Err_{tr}$ is the percentage of training error; while $Err_{test}$ is that of the testing error. `-' means the result cannot be obtained within 24 hours, and `/' means test sets are not available.}
\label{table-comparison-LIBSVM}
\end{longtable}
\end{footnotesize}
\end{center}
\section{Conclusion}\label{sec-conclusion}
In this paper, by making use of the recent advances in ADMM from the work in \cite{STY}, \cite{LST} and \cite{CST}, we proposed a convergent 3-block inexact symmetric
Gauss-Seidel-based semi-proximal ADMM algorithm for solving large scale DWD problems. We applied the algorithm successfully to the primal formulation of the DWD model and designed highly efficient routines to solve the subproblems arising in each of the inexact sGS-ADMM iterations. Numerical experiments for the cases when the exponent equals to 1 and 2 demonstrated that our algorithm is capable of solving large scale problems, even when the sample size and/or the feature dimension is huge. In addition, it is also highly efficient while guaranteeing the convergence to optimality. As a conclusion, we have designed an efficient method for solving the binary classification model through DWD.
\bigskip
\begin{center}
{\large\bf SUPPLEMENTARY MATERIAL}
\end{center}
\begin{description}
\item[Matlab package:] MATLAB-package containing codes to perform the sGS-ADMM algorithm for the DWD model described in the article. The package also contains datasets used for experiment purpose in the article. It could be downloaded from http://www.math.nus.edu.sg/$\sim$mattohkc/DWDLarge.zip.
\item[R package:] R-package containing codes to perform the sGS-ADMM algorithm for the DWD model described in the article. It would be available at CRAN.
\bigskip
\begin{center}
{\large\bf APPENDIX}
\end{center}
\item[PSQMR algorithm:] In the following we shall present a brief version of the PSQMR method to solve the linear system $Ax = b$. The following is a simplified algorithm without preconditioner.
Given initial iterate $x_0$, define each of the following:
$r_0 = b - Ax_0; \; q_0 = r_0; \; \tau_0 = \norm{q_0}; \; \theta_0 = 0; \; d_0 = 0$.
Then for each iteration $k$ until convergent condition is met, compute:
\begin{eqnarray*}
r_k &=& r_{k-1} - \frac{r_{k-1}^T r_{k-1}}{q_{k-1}^T Aq_k} Aq_k \\
\theta_k &=& \frac{\norm{r_k}}{\tau_{k-1}} \\
c_k &=& \frac{1}{\sqrt{1+\theta_k^2}} \\
\tau_k &=& \tau_{k-1} \theta_k c_k \\
d_k &=& c_k^2 \theta_{k-1}^2 d_{k-1} + c_k^2 \frac{r_{k-1}^T r_{k-1}}{q_{k-1}^T Aq_k} Aq_k \\
x_k &=& x_{k-1} + d_k \\
q_k &=& r_k + \frac{r_{k}^T r_{k}}{r_{k-1}^T r_{k-1}} q_{k-1} \\
\end{eqnarray*}
The final $x_k$ obtained is an approximated solution to the linear system.
\end{description}
\spacingset{0.9}
|
\section{Introduction}
\indent A dusty plasma with massive dust particles can experience significant correlation effects when the Coulomb coupling parameter $\Gamma>1$ (($\Gamma = \frac{Z_d^2e^2}{4\pi\epsilon_0dT_d}exp[-d/\lambda_p]$, where $Z_d$, $d$, $T_d$, $\lambda_p$ are number of charges on dust particles, interparticle distance, dust particle temperature and plasma debye length respectively). Past theoretical works \cite{carini,postogna,golden,berkov,kalman} suggest that correlation effects can significantly modify the collective modes of a dusty plasmas. Kaw and Sen \cite{sen} have studied the influence of correlation effect on DAW using a generalized hydrodynamic model and have obtained a new dispersive corrections, overall reduction in frequency and phase velocity, existence of $\partial \omega /\partial k <0$ regime.\\
They have also pointed out that in most laboratory plasmas such correlation induced effects can get masked out by collisional or ion streaming effects. To the best of our knowledge, such correlation induced effects have not been experimentally measured earlier. In the present work we report results on such a measurement and compare it to theoretical results.
\section{Experimental set-up}
The schematic of experimental setup is shown in Fig.\ref{fig:exp_setup}(a) and it is described in detail elsewere \cite{pramanik1}. The discharge was struck between the vacuum vessel (cathode) and rod shaped anode by apply a DC voltage ($V_{dc}$). The inner side of the cathode is covered with a thin stainless steel foil to avoid micro-arcs. Graphite flakes expanded in thermal plasma were used as dust in present experiment. These graphite particles are of very low density ($\rho \sim 1.0 gm/cm^3$). The system was pumped down to a base pressure ($P$) of $10^{-3}$mbar using a rotary pump. It was filled with argon and plasma was formed by applying a discharge voltage ($V_{dc}$) $\sim500$ Volts to the anode at $P\sim1$ mbar. Then the pressure was reduced gradually to 0.086 mbar. It was observed that dust particles begin to accumulate near the anode region. The anode region provides suitable electric field against the gravitational field for levitation of dust grains. The radial electric field confines the dust particles. An AC signal (using a signal generator and a power amplifier) was superimposed with the discharge voltage to excite the waves (See Fig.\ref{fig:exp_setup}(b)). The amplitude of the AC signal was increased with increase in pressure to excite the DAW. The frequency of applied AC signal was varied from 0 to 2 Hz very precisely. \\
\begin{figure}[h]
\centerline{\scalebox{0.3}{\includegraphics{chamber}}
\scalebox{0.35}{\includegraphics{acdc}}}
\caption{a) Schematic of experimental setup and b) Typical discharge voltage waveform}
\label{fig:exp_setup}
\end{figure}
The levitated dust particles were illuminated by green Nd-Yag diode laser light. The laser light was spread into a sheet by a cylindrical lens and forward scattered light from the dust cloud was used to visualize the dust particles. The scattered light from the dust particles was recorded using a CCD camera (25 fps) and later stored into a computer using a frame grabber card. The ion density ($n_i$), electron temperature ($T_e$) was measured using single a Langmuier probe. The dust temperature ($T_d$) was calculated from the velocity of the particles by tracing single particle in different frames.
\begin{figure}[hbt]
\includegraphics[height=0.16\textheight]{stable_wave1}
\caption {a) Stable dust cloud b) $\&$ c) DAW of different wavelength}
\label{fig:wave}
\end{figure}
\section{Data Analysis}
Digitized data was arranged into several still images and stored as separate data records in the interval of 1/25 sec. Consecutive data records were then Fourier analyzed using the technique described by Smith \textit{et al} \cite{smith}, to obtain cross-power, phase and coherence ($\gamma$) spectra respectively. The frequency of the waves was computed using phase spectrum and time delay between consecutive frames.
\section{Result and Discussion}
The experiment was carried out to study the dispersive characteristics of dust acoustic wave in two different pressures regimes viz, low collisional regime (P=0.086 mbar) and high collisional regime (P=0.27 mbar) for a strongly coupled dusty plasma. In both regimes, initially a stable dust cloud was formed in the sheath region near the cathode (vessel wall). Typical stable dust cloud at above mentioned parameters is shown in the Fig. 2(a). It clearly shows that there is no background oscillations before applying AC signal. As the AC voltage was modulated with the DC voltage, the plasma glow as well as the discharge current exhibit oscillation of same frequency. The plasma boundary also varies with time, thus dust cloud as a whole also exhibits similar motion. In addition to this dust cloud breaks up into series of crests and troughs (see in Fig 2(b) and 2(c)) similar to pressure perturbation when the AC voltage approaches minimum value. These perturbations have been referred in text as DAW oscillations and are similar to those reported earlier \cite{barkan,thompson,fortov,pramanik}. The dust cloud oscillates specially due to the application of oscillating voltage. A CCD camera was used to capture the images of dust cloud when it crossed the field of view. It was observed that DAW were excited just before the oscillating discharge voltage approaches minimum value. The frequency and wave length of the externally driven dust acoustic wave were measured from the FFT techniques of consecutive frames.
\begin{figure}[h]
\centerline{\scalebox{0.38}{\includegraphics{fig3a}}
\scalebox{0.38}{\includegraphics{fig3b}}}
\caption{Experimental (open circle) and theoretically calculated (solid and dotted line) dispersion curve for DAW in the a) low collisional regime and in the b) high collisional regime.}
\end{figure}
For our experimental parameter the phase velocity was quite low (few mm/sec) compare to other experimental groups \cite{thompson,pramanik,piper}. The dispersion relation of the externally driven DAW in both regime are shown in Fig 3(a) and 3(b). The open circles denote the experimental points. To compare our experimental results we choose a theory where strong correlation effects were taken into account along with the collisional effects \cite{sen}. We have plotted (with solid and dotted line) the dispersion relation according to the above theory for our experimental dusty plasma parameters. The DAW dispersion relation from the above theory is given by,
\begin{equation}
k^2\lambda_p^2 = \frac{\omega(\omega+i\nu_{dn}) - k^2 \beta}
{1-\omega(\omega+i\nu_{dn})+k^2\beta}
\end{equation}
Where $\beta = \gamma_d\mu_d \lambda_d^2$, $\gamma_d$ and $\mu_d$ are adiabatic index and coefficient of compressibility as mentioned in reference \cite{sen}. We have used experimentally measured $n_i$, $T_e$, $d$ and $T_d$ to calculate
$Z_d$, $\Gamma$, $\nu_{dn}$ and $\omega_{pd}=48$ was used as a free parameter to fit the theoretical dispersion curve \cite{piper}. The above dispersion relation is valid for hydrodynamic regime ($\omega_{pd} \tau_m \ll 1$, where $\tau_m$ is relaxation time).\\
As seen, there is a good agreement between the experimental and theoretical disperson curves for high and low collisional regime. In the strongly correlated regime $\alpha = \gamma_d \mu_d \lambda_d^2/\lambda_p^2 < 0$, since $\mu_d$ changes sign for $\Gamma > 3.1$ and $\alpha > 0$ in the weekly correlated regime as discussed in \cite{sen}, the experimental dispersion relation shows negative slope ($\partial\omega/\partial k <0$) which is consistent with the theoretical model results predicted by Kaw et al. It is clear from the figures, at low collision frequencies the dispersion curves for strongly and weakly correlated regime are very different where as at higher collisional frequencies the differences are not significant. This is because the modifications of the dispersion relation due to dust neutral collisions are much stronger than correlation effects in higher pressure. Close match of theoretical prediction with experimental observation clearly suggest that correlation effect is significant in our case. Substantial reduction of peak value of dispersive curve in figure 3(b) shows the effect of strong collision.\\
\section{conclusion}
We have carried out an experiment on externally excited dust acoustic wave in a strongly coupled regime. The measured dispersive characteristic shows substantial reduction in phase velocity and existence of $\partial \omega/\partial k < 0$ regime. The dispersion relation at low pressure shows the effect of correlation. The correlation effects gets masked by collisional effect at high neutral pressure. These observations appear with past theoretical predictions.
|
\section{Introduction}
Many applied problems rely on the numerical optimization of a target function. While the problem of local minimization is well understood, the numerical identification of global minima is still a challenging task \cite{LoSch13}.
Over the last decades, {\em metaheuristics} have played an increasing role in the design of fast algorithms to provide sufficiently good solutions to an optimization problem. {\em Swarm intelligence} (SI), for one, is a class of metaheuristic algorithms that is mostly inspired by nature, especially biological systems \cite{parsopoulos2002recent,poli2007particle}. SI systems consists typically of a population of simple agents interacting with one another and with their environment. These interactions often lead to the emergence of an 'intelligent' collective behavior, unknown to the individual agents. The main advantage of these methods over other global minimization strategies such as {\em simulated annealing} is their resilience to the problem of saturating at a local minima.
Notable algorithms within this class include {\em particle swarm optimization} (PSO) (see, e.g. \cite{kennedy2010particle,poli2007particle} and the references therein), {\em ant colony optimization} {mohan2012survey} (ACO) and {\em artificial bee colony} optimization \cite{karaboga2014comprehensive} (ABC). Their basic set-up is a population of agents exploring a bounded domain and evaluating the function along each trajectory. The force driving the agents' motion is derived from a mixture of individual steering and communication with the collective. For instance, agents can store the position of the best function value along their individual path on the one side, and get information on the global best location by communicating with the others. The general difficulty lies in the development of robust algorithms with a well-balanced exploration and exploitation ability. A vast number of these algorithms have been suggested in the literature and the variants differ with respect to memory effects, stochasticity, time discretization and other features.
On the other hand, individual-based models are also frequently used to investigate collective behavior effects in applications such as mathematical biology \cite{naldi2010mathematical}, swarming \cite{CarrilloCS,cucker1,vicsek1995novel}, crowd dynamics \cite{bellomo2011modeling,bellomo2016behavioral,bellomo2012modeling} or opinion formation \cite{galam2012sociophysics,helbing2010quantitative,motschtadmor}. Ref.~\cite{naldi2010mathematical}, for example, provides a series of articles that demonstrates the common methodological approaches and tools for modeling and simulating collective behavior. As for opinion dynamics, Ref.~\cite{helbing2010quantitative} provides a unified and comprehensive overview of the different stochastic methods, their interrelations and properties. In particular, psychologists have begun investigating the proponents of change in attitude and opinion using mathematical models as early as the 1950's \cite{festinger1962theory,french1956formal,osgood1955principle}. Opinion formation is one of the fundamental aspects of self-organization in networks of systems \cite{dolfin2015modeling,jia2015opinion,knopoff2014mathematical,pareschi2013interacting}.
In general, opinion dynamics within an interacting population can lead to either consensus, polarisation or even fragmentation. A thorough understanding of such phenomena would, initially, require the formulation of mathematical models, which describe the evolution of opinions in the population under investigation. An early formulation of such a model was given by French in \cite{french1956formal} to understand complex phenomena found empirically about groups. A well recognised linear model that leads to consensus is the de Groot's model \cite{degroot1974reaching} that was analysed in the work \cite{chatterjee1977towards}. Later on, Vicsek et.~al.~introduced a simple local averaging rule as a basis for studying the cooperative behaviour of animals \cite{vicsek1995novel}. A simplification of the Vicsek model that exhibits interesting clustering and consensus effects is found in \cite{hegselmann2002opinion,krause2000discrete}, which makes it more attractive for engineering implementations. Other notable articles on opinion dynamics include \cite{acemoglu2011opinion,galam1991towards}.
Unfortunately, a through investigation of individual-based models become exceedingly difficult, and sometimes even impossible, for very large numbers of individuals. A very popular workaround is to employ techniques from kinetic theory to analyze such models by the means of partial differential equations (PDE), which describe the evolution of the probability distribution of agents, e.g., by passing to mean field equations \cite{CarrilloCanizoBolley,CarrilloCS,dobrushin1989dynamical,HaTadmor,Sznitman} or by means of evolutionary differential games \cite{marsan2016stochastic,aletti2007first,bellomo2016mathematics,boudin2009kinetic}. Stationary states, ergodicity and pattern formations may then be 'easily' investigated on the continuous PDE level rather than on the discrete particle system.
In this work we introduce a stochastic SI algorithm called {\em consensus-based optimization} (CBO) that bears strong resemblance to consensus formation models. In such models, agents adapt their opinion, revise their beliefs, or change their behavior as a result of social interactions with other agents, thereby leading to either consensus, polarization or fragmentation within an interacting population \cite{burini2016collective,krause2000discrete,naldi2010mathematical}. A metaheuristic based on a discrete consensus model may be found in \cite{Sichani13}.
The objective of this paper is twofold:
\begin{enumerate}
\item[(i)] Introduce an agent-based global optimization strategy that is efficient and robust and that further allows passage to the mean-field limit.
\item[(ii)] Partially justify the efficiency of the method by analyzing its mean-field limit equations.
\end{enumerate}
The study of SI algorithms from a mean-field point of view has, to the best of our knowledge, not been fully explored before. The mean-field perspective will allow to get a deeper understanding of the performance of the agent-based algorithm, especially in regards to convergence properties.
This work is organized as follows: We begin Section~\ref{sec:model} with the formulation of the CBO algorithm. Here, we also derive the mean-field limit equation and draw conclusions on the analytic properties of the algorithm. In Section~\ref{sec:numerics}, we present and justify results on the numerical performance of the algorithm in dimension $d=1$. Additionally, we present numerical results indicating the potential of the CBO algorithm in multiple dimensions in Section~\ref{sec:multi}. In particular, we consider optimizations problems in dimension $d=20$. Finally, concluding remarks are given in Section~\ref{sec:conclusions}.
\section{A Consensus-Based Optimization (CBO) Algorithm}
\label{sec:model}
In this section we introduce a first-order consensus-based minimization algorithm with smooth deterministic and multiplicative stochastic forcing. The task at hand is to find a global minimum
\begin{equation}\label{eq:minprob}
\min\nolimits_{x\in\mathbb{R}^d} f(x)
\end{equation}
of a given continuous objective function $f\in\mathcal{C}_b(\mathbb{R}^d;\mathbb{R})$ which is assumed to be non-negative and bounded. Here, the number of degrees of freedom for the optimization is given by the spatial dimension $d \in \mathbb{N}$.
To find this minimum we consider a system of $N\in\mathbb{N}$ interacting agents with position vector $X_t^i\in\mathbb{R}^d$, $i = 1, \ldots, N$, which evolves in time with respect to the stochastic differential equations (SDEs) given by
\begin{subequations}\label{eq:particle}
\begin{align}
dX_t^i = -\lambda (X_t^i-v_f)\,H^\epsilon(f(X_t^i)-f(v_f))\,d t + \sqrt{2} \sigma |X^i_t-v_f| d W_t^i, \label{model-dynamics}
\end{align}
with drift parameter $\lambda>0$ and noise parameter $\sigma\ge 0$. The point $v_f$ is calculated from the mean
\begin{align}
v_f = \frac{1}{\sum_i \omega_f^\alpha(X^i_t)} \sum\nolimits_i X_t^i\, \omega_f^\alpha(X^i_t). \label{model-consensus}
\end{align}
\end{subequations}
The system is supplemented with an initial condition $X_t^i(0) = X_0^i \in \mathbb{R}^d$, $i = 1, \ldots, N$, and the
weight function $\omega_f^\alpha$ is given as a power of the reciprocal function value. In this paper, we consider the particular form
\begin{equation}
\omega_f^\alpha(x) =\exp(-\alpha f(x)), \quad \alpha >0. \label{model-weight}
\end{equation}
Here, $H^\epsilon\colon\mathbb{R}\to\mathbb{R}$ denotes a smooth regularization of the Heaviside function.
\begin{remark}
Compared to existing particle optimization algorithms (see e.g. \cite{Sichani13,eberhart1995new,kennedy2010particle,parsopoulos2002recent,poli2007particle}) we avoid the evaluation of $\arg\min_{i=1,\ldots,N} f(X_t^i)$ by considering \eqref{model-consensus} and \eqref{model-weight} instead. Additionally, we incorporate a multiplicative noise term in \eqref{model-dynamics}.
\end{remark}
The positional change of an agent is given by two components: First, each agent compares the function value at its own location $f(X^i_t)$ with the function value at the weighted average location of the collective $f(v_f)$. It is driven towards $v_f$ if $f(X_t^i)-f(v_f)$ is positive, which is determined by $H^\epsilon$. The magnitude of the attraction towards $v_f$ is given by the distance $\lambda|X^i_t-v_f|$, $\lambda>0$, hence agents far away from $v_f$ are strongly attracted, whereas agents located at $v_f$ tend to keep their position.
The second component is a random search term, which we model as independent Brownian motions $\sqrt{2} \sigma W^i_t$ with uniform diffusion parameter $\sigma>0$, whose individual variances are scaled with the distance of the agent from $v_f$. This implies that agents away from $v_f$ exhibit a large noise in their search path, enabling them to explore their current area, while agents near $v_f$ display low or no randomness emphasizing their current position. The current weighted average $v_f$ is determined by a weighted linear interaction process of the collective, where the weight $\omega_f^\alpha$ is a function of each agent's location and the objective function $f$.
\begin{remark}
The model \eqref{eq:particle} neglects the inertia of particles as well as memory effects \cite{kennedy2010particle}. We emphasize that both components of the agent's behavior, attraction towards the average location and random walks at the current location, are scaled with the distance towards $v_f$. Despite its simplicity, we will argue that the algorithm performs surprisingly well and allows for an analytical treatment as the system possesses a mean-field limit towards a partial differential equation (cf.~\cite{CarrilloChoiTotzeckTse}).
\end{remark}
\subsection{The role of the weighted average $v_f$ and weight function $\omega_f^\alpha$} In most swarm intelligence models, such as PSO, $v_f$ is typically given by the current global best, i.e.,
\[
v_f=\arg\min\nolimits_{i=1,\ldots,N} f(X_t^i).
\]
However, the existence of a distinguished agent does not permit the passage to the mean-field limit. This motivated the use of a weighted average as given in \eqref{model-consensus}.
By assuming independence of the processes $X_t^i$, $i=1,\ldots,N$, we may formally pass to the limit $N\to\infty$ in \eqref{model-consensus} to obtain
\begin{align}\label{eq:v_mean-field}
\frac{1}{\sum_i \omega_f^\alpha(X^i_t)} \sum\nolimits_i X_t^i\, \omega_f^\alpha(X^i_t) \quad\longrightarrow \quad \frac{1}{\int_{\mathbb{R}^d} \omega_f^\alpha\,d\rho_t} \int_{\mathbb{R}^d} x\,\omega_f^\alpha\,d\rho_t,
\end{align}
in the distributional sense, which holds due to the law of large numbers. Here $\rho_t\in\P(\mathbb{R}^d)$ is a Borel probability measure describing the one-particle mean-field distribution (cf.~Section~\ref{sec:mean-field}), which is assumed to be absolutely continuous w.r.t.~the Lebesgue measure $dx$. In this case, $\omega_f^\alpha \rho_t$ satisfies
\begin{align}\label{eq:laplace}
\lim\nolimits_{\alpha\to\infty}\left(-\frac{1}{\alpha}\log\left(\int_{\mathbb{R}^d} e^{-\alpha f} d\rho_t\right)\right) = \inf f,
\end{align}
by the {\em Laplace principle} \cite{dembo2009large}. Therefore, if $f$ attains a single minima $x_*\in\text{supp}(\rho_t)$, then the Gibbs-type measure $\eta_t^\alpha:=\omega_f^\alpha \rho_t/\|\omega_f^\alpha\|_{L^1(\rho_t)}\in\P(\mathbb{R}^d)$ approximates a Dirac distribution $\delta_{x_*}$ at $x_*\in\mathbb{R}^d$ for sufficiently large $\alpha\gg 1$. In this case, the value on the right-hand side of \eqref{eq:v_mean-field} provides a good estimate of $x_*$. These kind of weighted measures also appear in other metaheuristics, such as simulated annealing \cite{SimAnnCerny,SimAnnKirk}.
For completeness, we include the proof of the convergence mentioned in \eqref{eq:laplace} for sufficiently regular functions $f$. In the rest of this paper, we denote $\P_p^{ac}(\mathbb{R}^d)$ as the space of Borel probability measures with finite $p$-th moment, which are further absolutely continuous w.r.t.~the Lebesgue measure $dx$ on $\mathbb{R}^d$.
\begin{proposition}\label{prop:laplace}
Assume that $f\in\mathcal{C}_b(\mathbb{R}^d;\mathbb{R})$, $f\ge 0$, attains a unique global minimum at the point $x_*\in\mathbb{R}^d$ and let $\rho\in\P^{ac}(\mathbb{R}^d)$. Then, we have
\begin{align}\label{eq:laplace2}
\lim\nolimits_{\alpha\to\infty}\left(-\frac{1}{\alpha}\log\left(\int_{\mathbb{R}^d} e^{-\alpha f} d\rho\right)\right) = f(x_*).
\end{align}
\end{proposition}
\begin{proof}
Let the global minimum be attained at $x_*\in\text{supp}(\rho)$ with $f_*:=f(x_*)$. Notice that $\eta^\alpha=\omega_f^\alpha \rho/\|\omega_f^\alpha\|_{L^1(\rho)}\in\P^{ac}(\mathbb{R}^d)$. We begin by showing that the functional
\[
\mathcal{E}_\alpha(f):=\int_{\mathbb{R}^d} f\,d\eta^\alpha,
\]
converges towards $f_*$ for $\alpha\to\infty$. For this reason, we consider the derivative of $\mathcal{E}_\alpha(f-f_*)$ w.r.t.~$\alpha$. Simple calculations lead to
\[
\frac{d}{d\alpha} \mathcal{E}_\alpha(f-f_*) = -\frac{1}{2}\iint_{\mathbb{R}^d\times\mathbb{R}^d} |f(x)-f(y)|^2 d\eta^\alpha(x)\,d\eta^\alpha(y)<0,
\]
where the strict inequality holds due to the fact that $f$ is not globally constant. Since $\mathcal{E}_\alpha(f)\ge f_*$ for all $\alpha\ge 0$, we see from the differential inequality that $\mathcal{E}_\alpha(f)$ decays towards $f_*$ as $\alpha\to\infty$.
Now, let $\epsilon>0$ be arbitrary. From Chebyshev's inequality we further obtain
\[
\eta^\alpha(\{x\in\mathbb{R}^d\,|\, f(x)-f_*\ge \epsilon\}) \le \frac{1}{\epsilon}\int_{\{f-f_*\ge \epsilon\}} (f-f_*)\,d\eta^\alpha \le \frac{1}{\epsilon}\mathcal{E}_\alpha(f-f_*).
\]
Since the right-hand side tends to zero for $\alpha\to\infty$, we deduce that the measure $\eta^\alpha$ converges in distribution towards the Dirac distribution $\delta_{x_*}$ at the global minima $x_*$, as asserted.
\end{proof}
\begin{remark}
Notice that since
\[
\frac{d}{d\alpha} \log\left(\int_{\mathbb{R}^d} e^{-\alpha f} d\rho \right) = -\mathcal{E}_\alpha(f),
\]
we may integrate over $\alpha\ge 0$ and formally pass to the limit $\alpha\to\infty$ to obtain
\[
\lim\nolimits_{\alpha\to\infty}\left(-\frac{1}{\alpha}\log\left(\int_{\mathbb{R}^d} e^{-{\alpha} f} d\rho \right)\right) = \lim\nolimits_{\alpha\to\infty}\frac{1}{\alpha}\int_0^{\alpha} \mathcal{E}_{\beta}(f)\,d\beta = f_*,
\]
which is precisely the Laplace principle \eqref{eq:laplace}.
\end{remark}
\subsection{The deterministic case $\sigma=0$}
The interacting particle system \eqref{eq:particle} may also be considered in the deterministic setting $\sigma=0$. According to \eqref{model-consensus}, the consensus location $v_f$ is a convex combination of the agent's positions. It is hence straightforward that all agents are attracted towards a point inside the convex hull of initial positions $\operatorname{conv}(X^1_0,\dots,X^N_0)$ for all times. The dynamics bear resemblance to opinion formation models, which are studied, e.g., in \cite{albi2015kinetic,krause2000discrete,naldi2010mathematical,motschtadmor} (see also references therein). Further, there is a relation to consensus mechanism in the velocity components of Cucker-Smale type models (see e.g.~\cite{CarrilloCS,cucker1,cucker2,HaTadmor}).
Rewriting \eqref{eq:particle} into the deterministic ODE system
\begin{align}
\frac{d X^i}{d t} = \left(\frac{1}{\sum\nolimits_j \omega_f^\alpha(X_t^j)}\sum\nolimits_{j\ne i } (X_t^i-X_t^j)\,\omega_f^\alpha(X_t^j)\right)H^\epsilon(f(X_t^i)-f(v_f)),
\end{align}
gives a representation of the dynamics as a pairwise weighted interaction, which is scaled with the nonlinear and nonlocal Heaviside term. Note, that the interactions are not symmetric and the uniform connectivity of agents can vanish with $\epsilon\rightarrow0$.
In all settings, one is interested in the formation of consensus patterns.
\begin{definition}
A stationary state ${\bf X}=(X^1,\ldots,X^N)$ of \eqref{eq:particle} with $X^1=\cdots=X^N$ is called \emph{uniform consensus}. If particles aggregate to a stationary state consisting of several spatially separated concentration points, this is termed \emph{nonuniform consensus} (cf.~\cite{chatterjee1977towards,degroot1974reaching}).
\end{definition}
In the global minimization problem however, we not only expect our algorithm to converge to a uniform consensus state, but the concentration point should be located \emph{at or near the global minima}. This is a significant difference to the aforementioned opinion or flocking models, where the location of the consensus state is usually not of primary concern. The deterministic approach to algorithm \eqref{eq:particle} fails at this additional requirement, due to the existence of, possibly uncountable, nonuniform consensus stationary states.
\begin{lemma}\label{lem:stationary}
Consider \eqref{eq:particle} with $\sigma=0$. Then any selection of positions ${\bf X}=(X^1,\ldots,X^N)$ taken from any level set of $f$ such that $f(X^1)=\dots=f(X^N)$ is a stationary state.
\end{lemma}
The inclusion of noise in \eqref{eq:particle} eliminates such unstable equilibria, since the formation of particle configurations that are nonuniform consensus has probability zero due to the Brownian motion. This also means that only uniform consensus is permitted in the stochastic model. In Fig.~\ref{fig:comparisonDetSto} we compare the deterministic case ($\sigma=0$) with a stochastic one ($\sigma=0.7$) for a double-well type function
\begin{align}\label{eq:double-well}
f(x) = 0.2 x^4 - 2x^2 + 0.5x +10,
\end{align}
with global minimum positioned at $x_* = -2.29613$. One clearly observes that the particles form a nonuniform consensus on the level set $f(X^i) = 9.896$ in the deterministic case. In the presence of noise, the particles converge to a uniform consensus state near the global minimum.
\begin{figure}
\centering
\begin{subfigure}{.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./uniform_noBrown.png}
\end{subfigure}
\begin{subfigure}{.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./uniform_Brown.png}
\end{subfigure}
\caption{Double-well objective function given in \eqref{eq:double-well}.
The black markers show the initial particle positions while the red markers denote the converged particles positions mapped onto the objective function. Left: deterministic scheme ($\sigma=0$). Right: stochastic scheme ($\sigma=0.7$).}\label{fig:comparisonDetSto}
\end{figure}
\subsection{The mean-field limit}\label{sec:mean-field}
Due to the smoothness of the right-hand side, we can formally derive the mean-field equation of the microscopic system \eqref{eq:particle}. Mean-field limits for interacting particle system with noise have been rigorously studied in, e.g.~\cite{CarrilloCanizoBolley,dobrushin1989dynamical,Sznitman}.
A standard strategy to formally derive the mean-field limit is to consider the dynamics of the first marginal of $\nu_t^N$ and make the so-called {\em propagation of chaos} assumption on the marginals. More specifically, we assume that $\nu_t^N \approx \rho_t^{\otimes N}$ for $N\gg 1$, i.e., the random variables $X_t^1,\ldots,X_t^N$ are approximately independently $\rho_t$-distributed. In this case,
\[
\frac{1}{N}\sum\nolimits_j \omega_f(X_t^j) \approx \int_{\mathbb{R}^d} \omega_f\,d\rho_t,\qquad \frac{1}{N}\sum\nolimits_j X_t^j\,\omega_f(X_t^j) \approx \int_{\mathbb{R}^d} x\,\omega_f\,d\rho_t,
\]
simply due to the law of large numbers, and therefore $v_f \approx v_f[\rho_t]$. Consequently, \eqref{model-dynamics} becomes independent of $j\ne i$, and we obtain the so-called {\em Mc-Kean nonlinear process}
\begin{subequations}
\begin{align}
d\bar{X}_t = -\lambda (\bar{X}_t-v_f[\rho_t])\,H^\epsilon(f(\bar{X}_t)-f(v_f[\rho_t]))\,d t + \sqrt{2} \sigma |\bar{X}_t-v_f[\rho_t]| d W_t
\end{align}
where the weighted average is given by
\begin{align}
v_f[\rho_t ] = \frac{1}{\int_{\mathbb{R}^d} \omega_f^\alpha d\rho_t} \int_{\mathbb{R}^d} x\,\omega_f^\alpha d\rho_t,\qquad \rho_t = \text{law}(\bar{X}_t).
\end{align}
\end{subequations}
Equation (2.9a) may be equivalently expressed as the Fokker--Planck equation
\begin{gather}\label{eq:model-pde}
\partial_t \rho_t = \Delta (\kappa[\rho_t]\rho_t) + \text{div}(\mu[\rho_t]\rho_t), \\
\intertext{with}
\kappa[\rho_t](x) = \sigma^2|x-v_f[\rho_t]|^2,\qquad \mu[\rho_t](x) = -\lambda(x-v_f[\rho_t])H^\epsilon(f(x)-f(v_f[\rho_t])),\nonumber
\end{gather}
which describes the evolution of the law corresponding to the Mc-Kean nonlinear process $\{\bar{X}_t\in\mathbb{R}^d\,|\,t\ge 0\}$.
\begin{remark}
We note that the presence of $v_f$ makes the Fokker--Planck equation nonlinear and nonlocal in both the convection and diffusion part. This is nonstandard in the literature and raises several analytical and numerical questions \cite{CarrilloChoiTotzeckTse}.
\end{remark}
The mean-field limit equation \eqref{eq:model-pde} allows for an analytical discussion of the dynamics, which is advantageous compared to the large-scale stochastic system \eqref{eq:particle}. The formation of a consensus corresponds to a concentration of $\rho_t$ in form of a Dirac measure as time tends to infinity. While both rigorous existence theory and the concentration phenomena of the diffusion process are difficult to study due the degeneracy at $v_f$, we provide two simple results for the case $\sigma=0$ and in the absence of the Heaviside function, i.e., $H^\epsilon\equiv 1$, which indicate the usability of the method. For analytical results for the case $\sigma>0$ and $H^\epsilon\equiv 1$, we refer to \cite{CarrilloChoiTotzeckTse}.
\begin{lemma}\label{lem:concentration}
Let $\alpha>0$ be arbitrary but fixed and $\rho^\alpha\in\mathcal{C}([0,\infty),\P_2^{ac}(\mathbb{R}^d))$ satisfy \eqref{eq:model-pde} with $\sigma=0$ and $H^\epsilon\equiv 1$. Then $\rho_t^\alpha \to \delta_{\hat x}$ in the sense of distributions as $t\to\infty$ for some $\hat x\in\mathbb{R}^d$.
\end{lemma}
\begin{proof}
A simple computation of the evolution of the variance gives
\begin{align*}
\frac{d}{dt}V(\rho_t^\alpha) &:=\frac{d}{dt}\iint |x-y|^2 d\rho_t^\alpha(x)d\rho_t^\alpha(y) \\
&= -2\lambda\iint |x-y|^2\,d\rho_t^\alpha(x)\,d\rho_t^\alpha(y) = -2\lambda V(\rho_t^\alpha),
\end{align*}
which directly shows that $V(\rho_t^\alpha)=V(\rho_0^\alpha)e^{-2\lambda t}\to 0$ as $t\to \infty$. Consequently, for any $\epsilon>0$, we have
\[
\rho_t^\alpha(\{x\in\mathbb{R}^d\,|\, |x-\mathbb{E}[\bar{X}_t]|\ge \epsilon\}) \le \frac{1}{\epsilon^2}\int_{\mathbb{R}^d} |x-\mathbb{E}[\bar{X}_t]|^2d\rho_t^\alpha = \frac{1}{\epsilon^2}V(\rho_t^\alpha).
\]
Passing to the limit $t\to\infty$ on the right-hand side shows the concentration of the measure $\rho_t^\alpha$ around its expectation. To show that its expectation $\mathbb{E}[\bar{X}_t]$ converges towards some $\hat x\in\mathbb{R}^d$ as $t\to\infty$, we compute the evolution of $\mathbb{E}[\bar{X}_t]$, which yields
\[
\frac{d}{dt} \mathbb{E}[\bar{X}_t] = -\lambda \int_{\mathbb{R}^d} (x - v_f[\rho_t^\alpha])\,d\rho_t^\alpha = -\lambda (\mathbb{E}[\bar{X}_t] - v_f[\rho_t^\alpha]).
\]
On the other hand, we have
\[
\left| \mathbb{E}[\bar{X}_t] - v_f[\rho_t^\alpha] \right|^2 \le \int_{\mathbb{R}^d} |x-v_f[\rho_t^\alpha]|^2 d\rho_t^\alpha \le c_f V(\rho_t^\alpha) \le c_f V(\rho_0^\alpha)e^{-2\lambda t},
\]
with $c_f = \exp(\alpha(\sup f - \inf f))$. Therefore, we further obtain
\begin{align*}
|\mathbb{E}[\bar{X}_t] - \mathbb{E}[\bar{X}_0]| &\le \lambda\int_0^t \int_{\mathbb{R}^d} |x - v_f[\rho_s^\alpha]|\,d\rho_s^\alpha \,ds \le \lambda c_f V(\rho_0^\alpha) \int_0^t e^{-2\lambda s}\,ds \\
&= (c_f/2) V(\rho_0^\alpha)\left(1-e^{-2\lambda t}\right),
\end{align*}
which shows that $|\hat x - \mathbb{E}[\bar{X}_0]| = \lim_{t\to\infty}|\mathbb{E}[\bar{X}_t] - \mathbb{E}[\bar{X}_0]| \le (c_f/2) V(\rho_0^\alpha)$, i.e., $\hat x\in \mathbb{R}^d$. Furthermore, since $|\mathbb{E}[\bar{X}_t] - v_f[\rho_t^\alpha]|\to 0$, we also have that $\lim_{t\to\infty} v_f[\rho_t^\alpha] = \hat x$.
\end{proof}
By assuming more regularity on the objective function $f$ we can even show that the point $v_f$ converges, as $t\to\infty$, towards a neighborhood of the global minimizer $x_*$. Furthermore, this neighborhood may be made arbitrarily small by choosing $\alpha\gg 1$ sufficiently large.
\begin{lemma}
Let $f$ have the form $f=g + \chi$, where
\begin{enumerate}
\item $g\in\mathcal{C}^2(\mathbb{R}^d)$ globally strongly convex, i.e.,
\[
\langle x-y,\nabla g(x)-\nabla g(y)\rangle \ge m_g|x-y|^2,
\]
for some constant $m_g>0$.
\item $\nabla\chi$ is globally Lipschitz continuous and bounded with $c_\chi := \text{Lip}(\nabla \chi) \le m_g$, where $\text{Lip}(\nabla \chi)$ denotes the Lipschitz constant of $\nabla\chi$.
\end{enumerate}
Then, for any $\epsilon>0$, there exists an $\bar \alpha>0$, such that
\[
\lim\nolimits_{t\to\infty} f(v_f[\rho_t^{\bar \alpha}]) \le f(x_*) + \epsilon,
\]
where $\rho^{\bar \alpha}\in\mathcal{C}([0,\infty),\P_2^{ac}(\mathbb{R}^d))$ is a solution of \eqref{eq:model-pde} with $\sigma=0$ and $H^\epsilon\equiv 1$. In particular, there exists some $\delta>0$ such that $\lim\nolimits_{t\to\infty} v_f[\rho_t^{\bar \alpha}]\in B_\delta(x_*)$.
\end{lemma}
\begin{proof}
We begin the proof by estimating the evolution of the following functional
\[
\mathcal{F}_\alpha(\rho_t^\alpha):= \log\left(\int_{\mathbb{R}^d} e^{-\alpha f} d\rho_t^\alpha \right).
\]
Taking its time derivative gives
\begin{align*}
\frac{d}{dt} \mathcal{F}_\alpha(\rho_t^\alpha)
&= \lambda\alpha\int_{\mathbb{R}^d} \langle \nabla g(x)-\nabla g(v_f[\rho_t^\alpha]),x-v_f[\rho_t^\alpha]\rangle\,d\eta_t^\alpha \\
&\hspace*{12em}+ \lambda\int_{\mathbb{R}^d} \nabla \chi(x)\cdot (x-v_f[\rho_t^\alpha])\,d\eta_t^\alpha,
\end{align*}
where we used the fact that
\[
\int_{\mathbb{R}^d} (x-v_f[\rho_t^\alpha])\,d\eta_t^\alpha = 0.
\]
Using the assumptions on $f$, we estimate from below to obtain
\[
\frac{d}{dt} \mathcal{F}_\alpha(\rho_t^\alpha) \ge \lambda\alpha\big(m_g -c_\chi\big)\int_{\mathbb{R}^d} |x-v_f[\rho_t^\alpha]|^2 d\eta_t^\alpha \ge 0,
\]
which directly implies that
\begin{align}\label{eq:uniform}
-\log\left(\int_{\mathbb{R}^d} e^{-\alpha f} d\rho_t^\alpha \right) = -\mathcal{F}_\alpha(\rho_t^\alpha) \le -\mathcal{F}_\alpha(\rho_0) = -\log\left(\int_{\mathbb{R}^d} e^{-\alpha f} d\rho_0 \right),
\end{align}
for all $t\ge 0$. On the other hand, we have by definition that
\[
\frac{d}{d\alpha}\mathcal{F}_\alpha(\rho_t^\alpha) = -\int_{\mathbb{R}^d} f\,d\eta_t^\alpha,
\]
and by differentiation of \eqref{eq:uniform} w.r.t.~$\alpha$, we obtain
\[
\int_{\mathbb{R}^d} f\,d\eta_t^\alpha \le \int_{\mathbb{R}^d} f\,d\eta_0.
\]
From Proposition~\ref{prop:laplace}, we further obtain the existence of an $\bar \alpha\gg 1$ such that
\[
\int_{\mathbb{R}^d} (f-f_*)\,d\eta_t^{\bar \alpha} \le \int_{\mathbb{R}^d} (f-f_*)\,d\eta_0 \le \epsilon.
\]
We now proceed to estimate $f(v_f[\rho_t^{\bar\alpha}])$ as follows:
\begin{align*}
f(v_f[\rho_t^{\bar\alpha}]) &= g(v_f[\rho_t^{\bar\alpha}]) + \chi(v_f[\rho_t^{\bar\alpha}]) \le \int_{\mathbb{R}^d} g(x)\,d\eta_t^{\bar\alpha} + \chi(v_f[\rho_t^{\bar\alpha}]) \\
&= \int_{\mathbb{R}^d} f(x)\,d\eta_t^{\bar\alpha} + \chi(v_f[\rho_t^{\bar\alpha}]) - \int_{\mathbb{R}^d} \chi(x)\,d\eta_t^{\bar\alpha} \\
&\le \int_{\mathbb{R}^d} f(x)\,d\eta_t^{\bar\alpha} + \|\nabla\chi\|_\infty\int_{\mathbb{R}^d} |x-v_f[\rho_t^{\bar\alpha}]|d\eta_t^{\bar\alpha},
\end{align*}
where we made use of Jensen's inequality in the first inequality. Consequently,
\begin{align*}
f(v_f[\rho_t^{\bar\alpha}]) - f_* &\le \int_{\mathbb{R}^d} (f-f_*)\,d\eta_t^{\bar\alpha} + \|\nabla\chi\|_\infty\int_{\mathbb{R}^d} |x-v_f[\rho_t^{\bar\alpha}]|d\eta_t^{\bar\alpha} \\
&\le \epsilon + \|\nabla\chi\|_\infty\int_{\mathbb{R}^d} |x-v_f[\rho_t^{\bar\alpha}]|d\eta_t^{\bar\alpha}.
\end{align*}
Since the last term on the right hand side converges to zero as $t\to\infty$ (cf.~Lemma~\ref{lem:concentration}), we may pass to the limit to obtain
\[
\lim\nolimits_{t\to\infty} f(v_f[\rho_t^{\bar\alpha}]) \le f_* + \epsilon.
\]
Due to continuity of $f$, we find some $\delta>0$ such that $\lim_{t\to\infty} v_f[\rho_t^{\bar\alpha}] \in B_\delta(x_*)$, where $\bar\alpha$ needs to be chosen even larger if necessary.
\end{proof}
\section{Numerical Experiments in $d=1$}\label{sec:numerics}
In this section we study the performance of the consensus-based optimization algorithm and investigate, in particular, the relation of the particle system and the mean-field PDE. We employ two standard test cases from optimization literature \cite{jamil2013literature}, namely the \emph{Ackley function}
\begin{equation}\label{eq-ackley}
f_A(x) = -20 \exp\!\bigg(\!\!-\frac{0.2}{\sqrt{d}}\|x-B\|\bigg) - \exp\!\bigg(\frac{1}{d}\sum_{i=1}^d \cos(2\pi (x_i-B) )\bigg) + 20 + e + C
\end{equation}
and the \emph{Rastrigin function}
\begin{equation}\label{eq-rastrigin}
f_R(x)= \frac{1}{d} \sum_{i=1}^d \left[(x_i-B)^2 - 10 \cos(2\pi (x_i-B)) + 10 \right] + C,
\end{equation}
where $d \in \mathbb{N}$ denotes the dimension of the search space and $B,C\in\mathbb{R}$ are constant shifts. As seen in Fig.~\ref{fig-3benchmarks}, both functions attain multiple local minima but only one global minimum.
\begin{figure}[h]
\centering
\begin{subfigure}{.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./F1_plot.png}
\caption{Ackley}
\end{subfigure}
\begin{subfigure}{.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./F3_plot.png}
\caption{Rastrigin}
\end{subfigure}
\caption{Benchmark functions}\label{fig-3benchmarks}
\end{figure}
\subsection{Numerical methods}
For the stochastic system we use a simple particle scheme, while the mean-field PDE is discretized with the help of a splitting scheme in time and a discontinuous Galerkin method in space. For the numerical experiments we choose $\lambda=1$.
\subsubsection{Particle scheme}
The particle simulations are realized using the standard Euler-Maruyama scheme \cite{Higham}. We recall the particle equations:
\begin{equation}\label{eq:EM}
dX_t^{i} = -\lambda(X_t^i-v_f) H^\epsilon(f(X_t^i)-f(v_f))dt + \sqrt{2}\sigma|X_t^{i}-v_f|dW_t^i,
\end{equation}
where the Heaviside function is approximated by
\begin{equation*}
H^\epsilon(x) = \frac{1}{2} \text{erf}(\frac{1}{\epsilon} x) + \frac{1}{2}.
\end{equation*}
Note the stochasticity of the particle scheme induced by the Brownian motion $W_t$ in \eqref{eq:EM} (cf. the discussion in Lemma~\ref{lem:stationary}). Thus, to get meaningful results we simulate $M$ samples with different initial data and different realizations of the Brownian motion. As random number generator we use the \texttt{numpy\@.random} package of \texttt{python} which is based on the Mersenne Twister pseudo-random number generator \cite{MersenneTwister}.
\subsubsection{Galerkin scheme for the mean-field equation}
The solver for the mean-field PDE uses a discontinuous Galerkin method in space. A splitting of the transport and diffusion part is used to compute the solution iteratively. In fact, instead of solving the full equation
\begin{equation*}
\partial_t \rho - \div(\mu[\rho] \rho) = \Delta(\kappa[\rho] \rho ),
\end{equation*}
one half-step in time is computed for the convection part
\begin{equation}\label{convection}
\partial_t\rho_* - \div(\mu[\rho_{k-1}] \rho_*) =0,\qquad \rho_*(0)=\rho_{k-1}
\end{equation}
with local Lax--Friedrichs method, followed by one semi-implicit time step for the diffusion part
\begin{equation}\label{diffusion}
\partial_t\rho_{**} = \Delta (\kappa[\rho_*] \rho_{**}),\qquad \rho_{**}(0)=\rho_{*},
\end{equation}
and finally one half-step of \eqref{convection} again to obtain $\rho_k$. Here $\rho_*$, $\rho_{**}$ denotes the intermediate solutions after the first and second step, respectively. This provides a semi-implicit scheme of second order, typically known as {\em Strang splitting} \cite{Strang}.
Since we expect very large spatial gradients in the solution due to the convergence to a Dirac function (see Lemma \ref{lem:concentration}), we use discontinuous Galerkin elements. Hence, there is need for an appropriate handling of the numerical fluxes. For any smooth test function $\varphi$ the convective part in weak form reads as
\begin{equation*}
\int_K \rho_* \,\varphi\,dx = \int_K \rho_{k-1} \,\varphi\,dx + \tau\int_K \mu_{k-1} \rho_{k-1} \cdot \nabla \varphi\,dx - \tau\int_{\partial K} \overline{\mu_{k-1} \rho_{k-1}} \cdot \textbf{n}\, \varphi\, ds,
\end{equation*}
for any interval $K\subset\mathbb{R}$ in a given partition $\mathcal T_h$ with $\mu_{k-1}= \mu[\rho_{k-1}]$. As mentioned, the local Lax--Friedrichs numerical flux \cite{cockburn2003discontinuous} is implemented, i.e.,
\begin{equation*}
\overline{\mu\rho} = \mu \{\rho\} + \frac{1}{2} |\mu| \ldb \rho \mathclose{\ooalign{\makebox[.4em][l]{$\rbrack$}\cr\makebox[.4em][r]{$\rbrack$}\cr}},
\end{equation*}
where
\begin{equation*}
\{\rho\} = \frac{1}{2}(\rho^+ + \rho^-)\qquad \text{and}\qquad \ldb \rho \mathclose{\ooalign{\makebox[.4em][l]{$\rbrack$}\cr\makebox[.4em][r]{$\rbrack$}\cr}} = \rho^+\textbf{n} + \rho^- \textbf{n},
\end{equation*}
are the average and jump operators respectively. For the diffusion part the weak formulation reads
\begin{align*}
\int_K \rho_{**}\, \varphi\,dx + \tau \int_K \nabla (\kappa_* \rho_{**}) \cdot \nabla \varphi\,dx - \tau\int_{\partial K} \overline{\kappa_* \rho_{**}\, \varphi}\,dx = \int_K \rho_* \varphi\,dx
\end{align*}
where $\kappa_*=\kappa[\rho_*]$ and the flux function
\begin{equation*}
\overline{\kappa \rho\, \varphi} = \ldb \varphi\mathclose{\ooalign{\makebox[.4em][l]{$\rbrack$}\cr\makebox[.4em][r]{$\rbrack$}\cr}} \{ \nabla (\kappa\rho) \}\cdot \textbf{n} + \ldb \kappa\rho \mathclose{\ooalign{\makebox[.4em][l]{$\rbrack$}\cr\makebox[.4em][r]{$\rbrack$}\cr}} \{ \nabla \varphi \} \cdot \textbf{n} - \ldb \kappa\rho \mathclose{\ooalign{\makebox[.4em][l]{$\rbrack$}\cr\makebox[.4em][r]{$\rbrack$}\cr}} \ldb \varphi \mathclose{\ooalign{\makebox[.4em][l]{$\rbrack$}\cr\makebox[.4em][r]{$\rbrack$}\cr}},
\end{equation*}
proposed in \cite{kulkarni2007discontinuous} is used.
\subsection{CBO in $d=1$}
In the following we show the results of the computations realized with the numerical methods described above. The parameters for the particle simulation are
\[
N=50,\quad dt=10^{-1},\quad \alpha = 40,\quad \sigma = 0.7,\quad M = 500,\quad T = 80.
\]
The initial positions of the particles are chosen randomly due to the uniform distribution in $[-3,3]$ with help of the random number generator \texttt{numpy.random} of the \texttt{python} software. The particle simulation is stopped when the final time $T=80$ is reached, i.e., after $T/dt$ iterations. Due to the stochasticity of the Euler-Maruyama scheme, we compute $M$ samples of each testcase and average over the samples to obtain meaningful results. The parameters for the mean-field simulations are
\[
\alpha = 40,\quad \sigma = 0.7,\quad \text{tol} = 10^{-3},\quad h = 10^{-2}.
\]
Here, $h$ denotes uniform spatial grid size. The stopping criterion for the mean-field simulation is
\[
\|\rho_k - \rho_{k-1}\|_{L^2(\Omega)} < \tau_k\,\text{tol},
\]
where $\rho_k$ denotes the solution at timestep $k$ and $\tau_k$ the current timestep, which is required to satisfy the CFL condition
\[
\tau_k < h / \max(|\mu|),
\]
in order to resolve the drift term. The initial distribution of particles and $\rho$ is the uniform distribution on $[-3,3]$. Note that the PDE is deterministic, we therefore need not compute different samples in the mean-field case. We ran the PDE simulation until the stopping criterion was fulfilled in order to fix an appropriate stopping time for the particle simulation. The mean-field simulations for the Ackley benchmark stopped at $T= 5.7$ and $T=25$ in the standard and the shifted case, respectively. The Rastrigin benchmark stopped at $T=58$ and $T=78$ in the corresponding cases. Thus, we fixed the time horizon of the particle simulation at $T=80$.
\begin{figure}[h]
\centering
\begin{subfigure}{.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./verschobenab-bench1a0b0.png}
\caption{Ackley: $B=C=0$, $\arg\min f_A=0$}
\end{subfigure}
\begin{subfigure}{.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./verschobenab-bench1a2b5.png}
\caption{Ackley: $B=2$, $C=5$ $\arg\min f_A=2$}
\end{subfigure}\\
\begin{subfigure}{.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./verschobenab-bench3a0b0.png}
\caption{Rastrigin: $B=C=0$, $\arg\min f_R =0$}
\end{subfigure}
\begin{subfigure}{.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./verschobenab-bench3a2b5.png}
\caption{Rastrigin: $B=2$, $C=5$, $\arg\min f_R = 2$}
\end{subfigure}
\caption{Optimization results in 1d. The support of the mean-field density is depicted in red. The histograms show the distribution of $v_f$ for the 500 samples. The histogram for (a) and (b) contains 50 bins. The histogram of (c) and (d) has 500 bins, since $v_f$ is located at a local minima neighboring the global minimum at time $T=80$ in a few samples.}
\label{fig:1Dbenchmarks}
\end{figure}
Figure~\ref{fig:1Dbenchmarks} shows the results for the particle and the mean-field simulations in spatial dimension one. The objective function is depicted in blue, the red line denotes the support of the PDE solution at final time. The histogram in the upper left corner of the plot shows the final positions of the $v_f$ computed by $M=500$ runs with different random initial data.
\begin{remark}
Note, that due to the diffusion, the support of $\rho$ will not concentrate into a single point in the given time interval $[0,T]$. Still we expect the density to concentrate in a small region. Hence, in Fig.~\ref{fig:1Dbenchmarks} we denote the domain where $\rho > 10^{-6}$ by support.
\end{remark}
The shifted case is interesting since the location of the minimum is less centred with respect to the initial distribution. The proposed algorithm determines a remarkable approximation of the minimum of the Ackley function in the unshifted as well as in the shifted case in every sample of the particle problem. Note that the minimizer candidates $v_f$ are located close to the center of the support resulting from the mean-field simulation for all samples. This last property holds for the Rastrigin function as well. Here, the range of $v_f$ realized by the 500 samples is larger in the shifted case. The realizations of $v_f$ resulting from the simulations are still contained in the support of the mean-field solution except for a few that are located at local minima neighboring the global one. Thus averaging over various realizations allows for a very reasonable approximation of the global minimum.
\subsection{Convergence towards mean-field equation in $d=1$}
In this section, we consider the Ackley function with $C=1$, $x_*=0$, $f_A(x_*)=1$ and particles initially equidistantly distributed on $[-3,1]$. To study the convergence of an evolution of the particle dynamics towards the uniform consensus at $x_*$, we compute the Wasserstein distance \cite{Villani}
\begin{equation}
W_1\left(\rho_t^N, \delta_{x_*}\right)\quad\text{with}\quad \rho_t^N = \frac{1}{N}\sum\nolimits_i\delta_{X_t^i},
\end{equation}
which is a time-dependent and stochastic quantity, for a sample of $M$ system trajectories.
Note that in the case $d=1$, one has the representation \cite{Villani}
\begin{equation*}
W_1\left(\rho_t^N, \delta_{x_*}\right) = \int_0^1 |F^{-1}(t) - G^{-1}(t)| dt,
\end{equation*}
where $F$ and $G$ are the cumulative distribution functions associated with $\rho_t^N$ and $\delta_{x_*}$, respectively. This formulation is used to compute the results in the following. For the limiting continuous case with $\rho_0=\mathcal{U}([-3,1])$, we have $W_1(\rho_0,\delta_0)=1.25$.
\begin{figure}[h]
\centering
\begin{subfigure}{0.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./WdiffN.png}
\caption{$W_1(\rho_0^N, \delta_{x_*})$}
\end{subfigure}
\begin{subfigure}{0.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./EW1.png}
\caption{$\mathbb{E}[W_1(\rho_t^N,\delta_{x_*})]$}
\end{subfigure}\\
\begin{subfigure}{0.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./VarW1.png}
\caption{$\text{Var}[W_1(\rho_t^N, \delta_{x_*})]$}
\end{subfigure}
\caption{Convergence of CBO \eqref{eq:particle} to uniform consensus for the 1d Ackley function.}\label{fig-w1}
\end{figure}
Fig.~\ref{fig-w1}(a) shows that the $W_1$-distance of the particle configuration at $t=0$ to the uniform consensus $\delta_{x_*}$ approaches the value in the continuous uniformly distributed case as the number of particles increases. Fig.~\ref{fig-w1}(b) depicts an exponential decay of the mean of the $W_1$ distance for varying number of particles $N=100,1000$. The mean is taken over $M=1000$ realizations. Notice that the expectations are essentially identical for the different values of $N$. The variance of the $W_1$-distance is initially zero and decays after a peak, as seen in Fig.~\ref{fig-w1}(c). Furthermore, it decreases uniformly as $N\rightarrow\infty$, highlighting that the dynamics are governed by the deterministic mean-field equation in the limit.
\section{Numerical Experiments in Multiple Dimensions ($d=20$)}\label{sec:multi}
Efficient algorithms for global optimization become practically relevant for high-dimensional problems, where grid-based procedures exceed computational capabilities. We illustrate the performance of the CBO algorithm \eqref{eq:particle} with several toy experiments in dimension $d=20$.
Assuming that the solution to the mean-field equation shows concentration arbitrarily close to $x_*$ for sufficiently large $\alpha$, the particle dynamics will do so too. However, we theoretically expect the number of particles necessary to mimic the mean-field dynamics to scale with $\mathcal{O}(N^{d/2})$. Strikingly, good optimization results are already obtained for a \emph{much smaller} number of particles, as shown in the following examples using the Ackley function and the Rastrigin function as benchmarks.
In order to classify the numerical results we will make use of a success rate and the expectation of $\frac{1}{d}\norm{v_f - x_*}^2$ computed with $M =1000$ realizations of the CBO algorithm. Due to the radial symmetry of the benchmark function the evaluation of the norm is justified. We consider a run to be successful if $v_f\in Q_{0.25}(x_*)=(x_*-0.25,x_*+0.25)^d$, i.e., our candidate for the minimizer is contained in the open $\|\cdot\|_\infty$-ball with radius 0.25 around the true minimizer $x_*$. Note that this condition is more restrictive than requiring $v_f$ to be located closer to the minimum than the closest local maximum, which would be $v_f \in Q_{0.5}(x_*)$. This would be a valid definition for success as well, since a steepest descent search initialized in $v_f$ would find the global minimizer. Nevertheless, by this definition all simulation results would lead to successful runs and we would not get an impression of the influence of the parameters. This is the reason we use the more restrictive definition of success. The following parameters are used for the simulations
\begin{center}
$d=20$,\, $T=10$,\, $M=1000$,\, $dt=0.01$,\, and $\sigma = 5$.
\end{center}
To initialize the particle positions we draw random variables that are uniformly distributed in the hypercube $[-3,3]^d$. Thus, for $x_*=0$ the minimizer is located at the center of the initial data.
\subsection{Variations in particle number $N\in\mathbb{N}$}
We begin by investigating the influence of the number of particles $N$ on the numerical results. Table~\ref{tab-D20-A} and Table~\ref{tab-D20-R} show the success rate of the runs and the expectation of the distances $\frac{1}{d}\norm{v_f - x_*}^2$ for the Ackley and the Rastrigin benchmark functions, respectively. In case of the Ackley function the success rate is $100\%$ for all simulations. The values of the expectations show a slight difference for varying parameters. The approximation is better if the minimizer $x_*$ is centered with respect to the initial data, i.e.~$x_*=0$.
\begin{table}[htb]\centering
\caption{Ackley function in $d=20$ with $\alpha=30$.}
\begin{tabular}{c | c || c c c }
& & & $N$ & \\
$x_*$ & & 50 & 100 & 200 \\
\hline
0 & \text{success rate} & 100\% & 100\%& 100\% \\
& $\frac{1}{d}\mathbb{E}[\norm{v_f(T)-x_*}^2]$ & $5.21e^{-4}$ & $1.18e^{-3}$ & $2.47e^{-3}$ \\
\hline
1 & \text{success rate} & 100\%& 100\%& 100\% \\
& $\frac{1}{d}\mathbb{E}[\norm{v_f(T)-x_*}^2]$& $5.23e^{-4}$ & $1.21e^{-3}$ & $2.55e^{-3}$ \\
\hline
2 & \text{success rate} & 100\% & 100\% & 100\% \\
& $\frac{1}{d}\mathbb{E}[\norm{v_f(T)-x_*}^2]$ & $5.46e^{-4}$ & $1.24e^{-3}$ & $2.57e^{-3}$
\end{tabular}
\label{tab-D20-A}
\end{table}
The results are very different for the Rastrigin benchmark. The success rate is between $34\%$ and $63\%$. It is better for larger $N$ and for $x_*$ centered w.r.t.~the initial data. This difference in the behavior is anticipated by the theory, since the objective of the weighted average is to separate local minima from the global minima. This separation works better if the distance between the local minima and the global one is large. In case of the Ackley function this distance is larger compared to the one of the Rastrigin function, which explains the different results. In Fig.~\ref{fig:evolutionDiffN} we see the evolution of the expectation $\frac{1}{d}\mathbb{E}[\norm{v_f - x_*}^2]$. For both benchmarks, the simulation with $N=200$ performs best. The smaller $N$, the more time is needed to approximate the minimizer appropriately.
\begin{table}[htb]\centering
\caption{Rastrigin function in $d=20$ with $\alpha=30$.}
\begin{tabular}{c | c || c c c }
& & & $N$ & \\
$x_*$ & & 50 & 100 & 200 \\
\hline
0 & \text{success rate} & 34.\% & 61.1\%& 62.2\% \\
& $\frac{1}{d}\mathbb{E}[\norm{v_f(T)-x_*}^2]$ & $3.12e^{-1}$ & $2.47e^{-1}$ & $2.42e^{-1}$ \\
\hline
1 & \text{success rate} & 34.5\%& 57.1\%& 61.6\% \\
& $\frac{1}{d}\mathbb{E}[\norm{v_f(T)-x_*}^2]$& $3.09e^{-1}$ & $2.52e^{-1}$ & $0.244e^{-1}$ \\
\hline
2 & \text{success rate} & 35.5\% & 54.8\% & 62.4\% \\
& $\frac{1}{d}\mathbb{E}[\norm{v_f(T)-x_*}^2]$ & $3.06e^{-1}$ & $2.51e^{-1}$ & $2.44e^{-1}$
\end{tabular}
\label{tab-D20-R}
\end{table}
\begin{figure}[h]
\centering
\begin{subfigure}{.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./evoNormdiffNAckley.png}
\caption{Ackley}
\end{subfigure}
\begin{subfigure}{.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./evoNormdiffNRastrigin.png}
\caption{Rastrigin}
\end{subfigure}
\caption{Evolution of the expectation of the distances of $v_f$ and $x_*$ over time.}
\label{fig:evolutionDiffN}
\end{figure}
\subsection{Variations in exponential weight $\alpha$}
From the theory, we expect that the separation of local and global minima works better for larger $\alpha\gg 1$. Thus, we study the influence of the weight parameter in the following and check if the results improve for larger $\alpha>0$. In Table~\ref{tab-D20-alphaA} the results for the Ackley function with $N=100$ are shown. Again, the performance is very good for all tested cases. Moreover, the expectation shows that $v_f$ provides a very good approximation of the global minimizer, even for small weight parameters $\alpha$.
\begin{table}[htb]\centering
\caption{Ackley function in $d=20$ with $N=100$.}
\begin{tabular}{c | c || c c c c c }
& & & & $\alpha$ & & \\
$x_*$ & & 10 & 20 & 30 & 40 & 50 \\
\hline
0 & \text{success rate} & 100\% & 100\%& 100\% & 100\% & 100\% \\
& $\frac{1}{d}\mathbb{E}[\norm{v_f(T)-x_*}^2]$ & $2.55e^{-4}$ & $1.06e^{-4}$ & $6.18e^{-5}$ & $4.21e^{-5}$ & $3.04e^{-5}$ \\
\hline
1 & \text{success rate} & 100\% & 100\%& 100\% & 100\% & 100\% \\
& $\frac{1}{d}\mathbb{E}[\norm{v_f(T)-x_*}^2]$& $2.58e^{-4}$ & $1.09e^{-4}$ & $6.31e^{-5}$ & $4.24e^{-5}$ & $3.04e^{-5}$ \\
\hline
2 & \text{success rate} & 100\% & 100\%& 100\% & 100\% & 100\% \\
& $\frac{1}{d}\mathbb{E}[\norm{v_f(T)-x_*}^2]$ & $2.62e^{-4}$ & $1.10e^{-4}$ & $6.46e^{-5}$ & $ 4.35e^{-5}$ & $3.18e^{-5}$ \\
\end{tabular}
\label{tab-D20-alphaA}
\end{table}
The results obtained for the Rastrigin function are given in Table~\ref{tab-D20-alphaR}. Here we can see a significant influence of $\alpha>0$. For $\alpha=10$ the performance of the CBO algorithm is rather poor. Nevertheless, for increasing $\alpha$ the results strongly improve. And for $\alpha=50$ the results are already very good. Similarly, the expectation shows that $v_f$ provides an increasingly better approximation of the global minima for larger weight parameters $\alpha\gg 1$. This underlines our theoretical results which indicate that the performance of the CBO algorithm strongly depends on the exponential weight parameter $\alpha>0$.
\begin{table}[htb]
\caption{Rastrigin function in $d=20$ with $N=100$. }
\begin{tabular}{c | c || c c c c c }
& & & & $\alpha$ & & \\
$x_*$ & & 10 & 20 & 30 & 40 & 50 \\
\hline
0 & \text{success rate} & 7.0\%& 11.6\% & 61.1\% & 93.8\% & 99.7\%\\
& $\frac{1}{d}\mathbb{E}[\norm{v_f(T)-x_*}^2]$ & $4.32e^{-1}$ & $3.91e^{-1}$ & $2.48e^{-1}$ & $1.35e^{-1}$ & $7.67e^{-2}$ \\
\hline
1 & \text{success rate} & 7.5\%& 10.3\%& 57.1\% & 96\% & 99.5\% \\
& $\frac{1}{d}\mathbb{E}[\norm{v_f(T)-x_*}^2]$& $4.34e^{-1}$ & $3.94e^{-1}$ & $2.52e^{-1}$ & $1.32e^{-1}$ & $7.59e^{-2}$ \\
\hline
2 & \text{success rate} & 7.5\% & 12.2\% & 54.8\% & 94.9\% & 99.3\% \\
& $\frac{1}{d}\mathbb{E}[\norm{v_f(T)-x_*}^2]$ & $4.31e^{-1}$ & $3.92e^{-1}$ & $2.51e^{-1}$ & $1.32^{-1}$ & $7.81e^{-2}$
\end{tabular}
\label{tab-D20-alphaR}
\end{table}
In Fig.~\ref{fig:evolutionNormAlpha} we see the evolution of the expectation $\frac{1}{d}\mathbb{E}[\norm{v_f - x_*}^2]$. As anticipated by the theory and the results shown in the tables, we find an improvement in performance for larger values of $\alpha$. In contrast to the graphs showing this evolution for different $N$, we find that the influence of $\alpha$ becomes more important at the end of the simulation.
\begin{figure}[h]
\centering
\begin{subfigure}{.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./evoNormdiffalphaAckley.png}
\caption{Ackley}
\end{subfigure}
\begin{subfigure}{.49\textwidth}
\includegraphics[keepaspectratio=true,width=\textwidth]{./evoNormdiffalphaRastrigin.png}
\caption{Rastrigin}
\end{subfigure}
\caption{Evolution of the expectation of the distances of $v_f$ and $x_*$ over time.}
\label{fig:evolutionNormAlpha}
\end{figure}
These results indicate that the weight parameter $\alpha$ has more influence on the outcome of the simulation than the number of particles $N$. Even for small $N$ we obtain good results in dimension $d=20$ if $\alpha$ is sufficiently large. Note further, that the function evaluations correlate with $N$, thus small $N$ implies few function evaluations. In many applications function evaluations are very costly and optimization algorithms may be applied only if the number is function evaluations is small. The numerical results therefore indicate that the CBO algorithm might be a good choice for the global optimization of objective functions that have large evaluation costs.
\section{Conclusion}\label{sec:conclusions}
We presented a new swarm intelligence model, namely the CBO algorithm, in the spirit of consensus formation, which can be used for global optimization purposes. As already mentioned in the introduction, most global optimization approaches have their specific advantages and drawbacks. Here we emphasize on the analytical investigation of the corresponding mean-field limit, which allowed us to study the convergence behavior and to also draw some conclusions on the microscopic system. This is an initial step in the direction of combining tools from global optimization with mean-field analysis. The results are encouraging for future research and might be applied to other approaches such as PSO, ACO or other well-known metaheuristics.
\section*{Acknowledgment}
We thank Nicola Bellomo and Jos\'e Antonio Carrillo for their constructive comments and suggestions. Oliver Tse gratefully acknowledges financial support from the Nachwuchsring of the University of Kaiserslautern.
\bibliographystyle{plain}
|
\section{Introduction}
\label{sec:intro}
The celebrated Cahn-Hilliard equation was proposed to describe phase separation
phenomena in binary systems \cite{CH}. Its ``standard'' version has the form
of a semilinear parabolic fourth order equation, namely
\begin{equation}\label{CH-par}
u_t - \Delta( -\Delta u + f(u) )=0.
\end{equation}
Here the unknown $u$ stands for the relative
concentration of one phase, or component,
in a binary material, and $f$ is the derivative of a non-convex potential $F$
whose minima represent the energetically more favorable configurations
usually attained in correspondance, or in proximity,
of pure phases or concentrations.
In view of the fact that $u$ is an order parameter, often
it is normalized in such a way that the pure states
correspond to the values $u=\pm 1$, whereas $-1<u<1$ denotes the
(local) presence of a mixture. We will also adopt this convention. In such
setting the values $u\not\in [-1,1]$ are generally interpreted as
``nonphysical'' and should be somehow excluded. In view
of the fourth-order character of~\eqref{CH-par}, no
maximum principle is available for $u$. Hence, the {\sl constraint}\/
$u\in [-1,1]$ is generally enforced by assuming $F$ to
be defined only for $u\in(-1,1)$ (or for $u\in[-1,1]$; both
choices are admissible under proper structure
conditions) and to be identically $+\infty$ outside
the interval $[-1,1]$. A relevant example is given
by the so-called {\sl logarithmic potential}
\begin{equation}\label{logpot}
F(u)=(1-u)\log(1-u) + (1+u)\log(1+u) - \frac{\lambda}2 u^2,
\quad \lambda \ge 0,
\end{equation}
where the last term may induce nonconvexity.
Such a kind of potential is generally termed as
a {\sl singular}\/ one and its occurrence may give rise to mathematical
difficulties in the analysis of the system. For this reason,
singular potentials are often replaced by ``smooth'' approximations
like the so-called {\sl double-well}\/ potential taking,
after normalization, the form $F(u)= (1-u^2)^2$. Of course,
in the presence of a smooth double-well potential, solutions
are no longer expected to satisfy the physical constraint $u\in[-1,1]$.
The mathematical literature devoted to~\eqref{CH-par}
is huge and the main properties of the solutions
in terms of regularity, qualitative behavior, and asymptotics
are now well-understood, also in presence of singular potentials
like~\eqref{logpot} (cf., e.g., \cite{N-C1,MZ1} and the
references therein). Actually, in recent years, the attention has moved to
more sophisticated versions of~\eqref{CH-par} related to specific
physical situations. Among these, we are interested here
in the so-called {\sl hyperbolic relaxation}\/ of the equation.
This can be written as
\begin{equation}\label{CH-hyp}
\alpha u_{tt} + u_t - \Delta( -\Delta u + f(u) ) = 0,
\end{equation}
where $\alpha>0$ is a (small) relaxation parameter and the new
term accounts for the occurrence of ``inertial'' effects.
Equation~\eqref{CH-hyp} may be used in order to describe
strongly non-equilibrium decomposition generated by
deep supercooling into the spinodal region occurring in certain materials
(e.g., glasses), see \cite{Gal,GJ}. From the mathematical point of view,
equation~\eqref{CH-hyp} carries many similarities with the semilinear
(damped) wave equation, but is, however, much more delicate to deal with.
For instance, in space dimension $N=3$ the existence of global in time
strong solutions is, up to our knowledge, an open issue also in
the case when $f$ is a globally Lipschitz (nonlinear)
function \cite{GSSZ},
whereas for $N=2$ the occurrence of a critical exponent
is observed in case $f$ has a polynomial growth \cite{GSZ1,GSZ2}.
The situation is somehow more satisfactory
in space dimension $N=1$ (cf., e.g., \cite{ZM1,ZM2}) due to
better Sobolev embeddings (in particular all solutions taking values
in the ``energy space'' are also uniformly bounded).
It is however worth noting that, in the case when $f$ is singular,
even the existence of (global) {\sl weak}\/ solutions
is a mathematically very challenging problem. Indeed, at least
up to our knowledge, this seems to be an open issue even in
one space dimension.
The picture is only partially more satisfactory when one considers
a further relaxation of the equation containing a ``strong damping''
(or ``viscosity'') term, namely
\begin{equation}\label{CH-strong}
\alpha u_{tt} + u_t - \Delta( \delta u_t -\Delta u + f(u) ) = 0,
\end{equation}
with $\delta>0$ (a physical justification for this equation
is given, e.g., in \cite{N-C}). The new term induces additional regularity
and some parabolic smoothing effects, and, for this reason,
\eqref{CH-strong} is mathematically more tractable
in comparison to~\eqref{CH-hyp}. Indeed, existence, regularity and large time
behavior of solutions have been analyzed in a number of papers
(cf., e.g., \cite{Bonfoh,BGM,GGMP1,GPS,Kan} and references therein).
In all these contributions, however, $f$ is taken as a smooth
function of at most polynomial growth at infinity.
Here, instead, we will consider \eqref{CH-strong} with the choice of
a singular function $f$.
To explain the related difficulties, the main
point stands, of course, in the low
number of available a-priori estimates. This is
a general feature of equations of the second order in time, and,
as a consequence, approximating sequences satisfy very poor compactness
properties. In particular, the second order term $u_{tt}$
can be only controlled in a space like $L^1(0,T;X)$,
where $X$ is a Sobolev space of negative order. In view of the
bad topological properties of $L^1$, this implies
that in the limit the term $u_t$ cannot be shown to be (and, in fact,
is not expected to be) continuous in time, but
only of bounded variation. In particular, it may present
{\sl jumps}\/ with respect to the time variable. In turn,
the occurrence of these jumps is strictly connected to the fact that it
is no longer possible to compute the singular term $f(u)$
in the ``pointwise'' sense.
Indeed, in the weak formulation $f(u)$ is
suitably reinterpreted in the distributional sense, and, in
particular, concentration phenomena may occur.
This idea comes from the theory of convex integrals
in Sobolev spaces introduced in the celebrated paper
by Brezis~\cite{brezisart}
and later developed and adapted to cover a number of
different situations (cf., e.g., \cite{BCGG,BGRT,SP}
and references therein). In our former paper
in collaboration with E.~Bonetti and E.~Rocca \cite{BRSS}
we have shown that this method can be adapted to treat
equations of the second order in time. Actually,
using duality methods in Sobolev spaces of {\sl parabolic type}\/
(i.e., depending both on space and on time variables),
we may provide the required relaxation of the term $f(u)$
accounting for the possible occurrence of
concentration phenomena with respect to time.
The reader is referred to~\cite{BRSS} for further considerations
and extended comments and examples.
Equation \eqref{CH-strong} will be considered here
in the simplest mathematical setting. Namely, we will settle it
in a smooth bounded domain $\Omega\subset \mathbb{R}^N$,
$N\le 3$ (we remark however that the results could be easily extended
to any spatial dimension), in a fixed reference interval
$(0,T)$ of arbitrary length, and with homogeneous
Dirichlet boundary conditions. Then, existence of weak solutions
will be proved by suitably adapting the approach of~\cite{BRSS}.
It is worth observing that, as happens for the mentioned strongly
damped wave equation and for other similar models, an alternative
weak formulation could be given by restating the problem in the
form of a variational inequality. However, as noted in \cite{BRSS},
we believe the concept of solution provided here to be somehow
more flexible. In particular, with this method we may provide an
explicit characterization of the (relaxed) term $f(u)$
(which may be thought as a physical quantity representing
the vincular reaction provided by the constraint) in
terms of regularity (for instance, for equation~\eqref{CH-strong}
concentration phenomena are expected to occur
{\sl only}\/ with respect to the time variable $t$).
Moreover, we can prove that at least {\sl some}\/ weak
solutions satisfy a suitable form of the energy
inequality. This can be seen as a sort of selection principle
for ``physical'' solutions (note, indeed, that uniqueness is
not expected to hold).
\smallskip
The plan of the paper is the following: in the next Section~\ref{sec:main} we
introduce our assumptions on coefficients and data and state our main result
regarding existence of at least one solution to a suitable weak formulation
of equation~\eqref{CH-strong}. The proof of this theorem is then carried out in
Section~\ref{sec:proof} by means of an approximation -- a priori estimates --
compactness argument.
\section{Main result}
\label{sec:main}
\subsection{Preliminaries}
\label{subsec:prel}
We consider the viscous Cahn-Hilliard equation with inertia:
\begin{equation}\label{CH}
\begin{cases}
\alpha u_{tt}+u_t-\Delta w=0,\\
w=\delta u_t-\Delta u+\beta(u)-\lambda u.
\end{cases}
\end{equation}
Here the coefficients $\alpha$ and $\delta$ are strictly positive constants,
whereas $\lambda\ge 0$. Moreover, $\beta$ is a maximal monotone operator
in $\mathbb{R}\times\mathbb{R}$ satisfying
\begin{equation}\label{hyp:beta}
\overline{D(\beta)}=[-1,1], \quad 0\in\beta(0).
\end{equation}
Actually, $\beta$ represents the monotone part of $f(u)$
(cf.~\eqref{CH-hyp}). The {\sl domain}~$D(\beta)$ has been normalized
just for mathematical convenience. Following \cite{Ba},
there exists a convex and lower semicontinuous
function $j:\mathbb{R}\rightarrow[0,+\infty]$ such that $\beta=\partial j$,
$\overline{D(j)}=[-1,1]$, and $j(0)=\min j=0$.
For all $\epsilon\in(0,1)$ we denote by $j^\epsilon:\mathbb{R}\rightarrow[0,+\infty)$ the
{\sl Moreau-Yosida regularization}\/ of $j$,
and by $\beta^\epsilon:=\partial j^\epsilon=(j^\epsilon)'$
the corresponding {\sl Yosida approximation}\/ of $\beta=\partial j$.
By a direct check (cf.~also \cite[Appendix~A]{MZ1}), one may prove, based on
\eqref{hyp:beta}, that there exist constants
$c_1>0$ and $c_2\geq0$ independent of $\epsilon$, such that
\begin{equation}\label{bound:l1}
\beta^\epsilon(r)r \ge c_1 |\beta^\epsilon(r)| - c_2.
\end{equation}
Let us also introduce some functional spaces: we set $H:=L^2(\Omega)$ and $V:=H^1_0(\Omega)$,
so that $V'=H^{-1}(\Omega)$. Moreover, we put
$$
\mathcal V:=H^1(0,T;H),
$$
and, for all $t\in(0,T]$,
$$
\mathcal V_t:=H^1(0,t;H).
$$
We denote by $(\cdot,\cdot)$ and $\langle\cdot,\cdot\rangle$ the scalar
product in $H$ and the duality pairing between $V'$ and $V$, respectively.
The scalar products on $L^2(0,T;H)$ and on $L^2(0,t;H)$,
for $t\in(0,T)$, are indicated respectively by
$$
\dual{\cdot,\cdot}\;\;\;\;\text{ and by }\;\;\;\;\dual{\cdot,\cdot}_t.
$$
Correspondingly, the duality products between $\mathcal{V}$
and $\mathcal V'$ and between $\mathcal{V}_t$ and $\mathcal V'_t$ are noted as
$$
\duav{\cdot,\cdot}\;\;\;\;\text{ and }\;\;\;\;\duav{\cdot,\cdot}_t,
$$
respectively.
Next, we indicate by $A:D(A)\rightarrow H$, with domain $D(A):=H^2(\Omega)\cap H^1_0(\Omega)$,
the Laplace operator with homogeneous Dirichlet boundary condition seen as
an unbounded linear operator on~$H$. Hence, $A$ is strictly positive and
its powers $A^s$ are well defined for all $s\in\mathbb{R}$. In particular,
$D({A^{1/2}})=H^1_0(\Omega)=V$. Moreover, $A$ may be extended to the
space $V$ and it turns out that $A:V\rightarrow V'$ is an isomorphism.
In particular, $V'$ is a Hilbert space when endowed with the scalar product
$$
(u,v)_*:= \langle v,A^{-1}u \rangle = \langle u,A^{-1}v \rangle
\quad\text{for }\,u,v\in V'.
$$
The associated norm is then given by $\|u\|_{V'}^2=(u,u)_*$
for $u\in V'$. Correspondingly,
the scalar products of the spaces $L^2(0,T;V')$ and $L^2(0,t;V')$ are denoted by
$$
(\!(\cdot,\cdot)\!)_*\;\;\;\;\;\;(\!(\cdot,\cdot)\!)_{*,t}
$$
respectively. In particular, we have
$$
(\!(u,v)\!)_* = \int_0^T \langle v,A^{-1}u \rangle \deriv\!t
\quad\text{for }\,u,v\in L^2(0,T;V'),
$$
with a similar characterization holding
for~$(\!(\cdot,\cdot)\!)_{*,t}$.
\subsection{Relaxation of the constraint}
\label{subsec:constr}
We now provide a brief sketch of the relaxation of $\beta$ mentioned
in the introduction, referring to~\cite[Sec.~2]{BRSS} for additional
details.
First of all, we introduce the functional $J:H\to [0,+\infty]$,
$J(u):=\int_{\Omega}j(u)\,\deriv\!x$ for all $u\in H$, whose
value is intended to be $+\infty$ if $j(u)\notin L^1(\Omega)$.
Moreover it is convenient to define
\begin{equation}
\mathcal J(u):=\int_0^T\int_{\Omega}j(u)\,\deriv\!x\,\deriv\!t
\;\;\;\;\;\forall\, u\in L^2((0,T)\times\Omega),
\end{equation}
and its counterpart on $(0,t)$, namely
\begin{equation}
\mathcal J_t(u):=\int_0^t\int_{\Omega}j(u)\,\deriv\!x\,\deriv\!s
\;\;\;\;\;\forall\, u\in L^2((0,t)\times\Omega).
\end{equation}
Then, the relaxed version of $\beta$ will be intended as a
maximal monotone operator in the duality couple ${\mathcal V} \times {\mathcal V}'$.
Indeed, we first introduce $\mathcal J_{\mathcal V}:=\mathcal J\llcorner_{\mathcal V}$,
the restriction of $\mathcal J$ to $\mathcal V$. Then, we consider its
subdifferential $\partial\mathcal J_{\mathcal V}$ with respect
to the duality pairing between $\mathcal V$ and $\mathcal V'$.
Namely, for $\xi\in \mathcal V'$ and $u\in\mathcal V$, we say that
\begin{align}
\xi\in \partial \mathcal J_{\mathcal V}(u)\;\;\Longleftrightarrow\;\;
\mathcal J_{\mathcal V}(z) \geq\duavw{\xi,z-u}+\mathcal J_{\mathcal V}(u)\;\;\;\;
\forall \,z\in\mathcal V.
\end{align}
In order to emphasize that $\partial \mathcal J_{\mathcal V}$
consists in a relaxation of~$\beta$, we will simply note
$\partial \mathcal J_{\mathcal V}=:\beta_w$ ($w$ standing for ``weak'').
Proceeding in a similar way for the functional $\mathcal J_t$, we define the
subdifferential $\partial\mathcal J_{t,\mathcal V_t}$ of the operator
$\mathcal J_{t,\mathcal V_t}:=\mathcal J_t\llcorner_{\mathcal V_t}$. This
will be indicated simply by $\beta_{w,t}$.
In this setting it is not true anymore that an {\sl element}\/ $\xi$ of the
{\sl set}\/ $\beta_w(u)$ (recall that $\beta$ is a multivalued operator and,
as a consequence, $\beta_w$ may
be multivalued as well) admits a ``pointwise'' interpretation
as ``$\xi(t,x)=\beta(u(t,x))$''.
Indeed, $\xi$ belongs to the negative order Sobolev space ${\mathcal V}'$
and concentration phenomena are expected to occur. Nevertheless, the
maps $\beta^\epsilon$ still provide a suitable approximation of $\beta_w$.
Referring the reader to~\cite{BRSS,S15} for additional details and comments,
we just mention here some basic facts. First of all, let us
define $J^\epsilon(u):=\int_{\Omega}j^\epsilon(u)\,\deriv\!x$ and
${\mathcal J}^\epsilon(u):=\int_0^T\int_{\Omega}j^\epsilon(u)\,\deriv\!x\,\deriv\!t$.
Then, one may prove that the functionals $\mathcal J^\epsilon$ converge
to~$\mathcal J$ in the sense of Mosco-convergence
with respect to the topology of $L^2(0,T;H)$. Moreover, their restrictions
to ${\mathcal V}$ Mosco-converge to $\mathcal J_{{\mathcal V}}$
in the topology of ${\mathcal V}$. The analogue of these properties
also holds for restrictions to time subintervals $(0,t)$.
Referring the reader to~\cite[Chap.~3]{Att}
for the definition and basic properties of Mosco-convergence, here
we just recall that this convergence notion for functionals
implies (and is in fact equivalent to) a related notion
of convergence for their subdifferentials, called graph-convergence
(or G-convergence). Namely, noting that the function $\beta^\epsilon$ represents
the subdifferential of $\mathcal J^\epsilon$ both with respect to
the topology of $L^2(0,T;H)$ and to that of $\mathcal V$,
it turns out that the operators $\beta^\epsilon$, if identified
with their graphs, G-converge to $\beta$ in the topology
of $L^2(0,T;H)\times L^2(0,T;H)$ and G-converge to $\beta_w$ in the topology
of ${\mathcal V}\times{\mathcal V}'$. As a consequence of the latter property,
we may apply the so-called
{\sl Minty's trick}\/ in the duality between ${\mathcal V}$ and ${\mathcal V}'$.
This argument will be the main tool we will use in order to take the limit
in the approximation of the problem and can be simply stated in this way:
once one deals with a sequence $\{v^\epsilon\}\subset {\mathcal V}$
satisfying $v_\epsilon\rightharpoonup v$ weakly in $\mathcal V$ and
$\beta^\epsilon(v_\epsilon)\rightharpoonup \xi$ weakly in $\mathcal V'$,
then the inequality
\begin{equation}\label{minty}
\limsup_{\epsilon\searrow0}\, \duav{\xi_\epsilon,v_\epsilon}\leq \duav{\xi,v}
\end{equation}
implies that $\xi\in \beta_w(v)$. In other words, $\xi$ is identified as an
element of the set $\beta_w(v)\subset {\mathcal V}'$.
\subsection{Statement of the main result}
\label{subsec:res}
We start with presenting our basic concept of weak solution,
which can be seen as an adaptation of~\cite[Def.~2.2]{BRSS}.
\begin{definition}\label{def:sol}
%
A couple $(u,\eta)$ is called a weak solution to the initial-boundary value problem for
the viscous Cahn-Hilliard equation with inertia whenever the following
conditions hold:\\[2mm]
%
{\sl (a)}~There hold the regularity properties
\begin{align}\label{reg:ut}
& u_t \in BV(0,T;H^{-4}(\Omega)) \cap L^{\infty}(0, T ;V') \cap L^2(0, T ;H),\\
\label{reg:u}
& u \in L^{\infty}(0, T ;V) \cap L^2(0, T ;D(A)),\\
\label{reg:xi}
& \eta \in {\mathcal V}'.
\end{align}
%
{\sl (b)}~For any test function $\varphi\in \mathcal V$,
there holds the following weak version of~\eqref{CH}:
%
\begin{align}\nonumber
& \alpha(u_{t}(T),\varphi(T))_*
- \alpha (u_1,\varphi(0))_*
- \alpha\dual{u_{t},\varphi_t}_*
+ \dual{u_t,\varphi}_*\\
\label{eq:w}
& \mbox{}~~~~~
+ \delta\dual{u_t,\varphi}
+ \dual{A^{1/2} u, A^{1/2}\varphi}
+ \duav{\eta,\varphi}
- \lambda\dual{u,\varphi}=0.
\end{align}
%
Moreover, for all $t\in [0,T]$ there exists
$\eta_{(t)}\in \mathcal{V}'$ such that
%
\begin{align}\nonumber
& \alpha (u_{t}(t),\varphi(t))_*
- \alpha (u_1,\varphi(0))_*
- \alpha\dual{u_{t},\varphi_t}_{*,t}
+ \dual{u_t,\varphi}_{*,t}\\
\label{eq:wt}
& \mbox{}~~~~~
+ \delta\dual{u_t,\varphi}_t
+ \dual{A^{1/2} u, A^{1/2}\varphi}_t
+ \duav{\eta_{(t)},\varphi}_t
- \lambda\dual{u,\varphi}_t=0,
\end{align}
%
for all $\varphi\in \mathcal V_t$.\\[2mm]
{\sl (c)}~The functionals $\eta$ and $\eta_{(t)}$ satisfy
%
\begin{equation}\label{graph}
\eta\in\beta_w(u), \qquad \eta_{(t)}\in \beta_{w,t}(u\llcorner_{(0,t)})
\;\;\text{ for all }t\in(0,T),
\end{equation}
%
and the following compatibility condition holds true:
%
\begin{equation}\label{compa}
\duav{\eta_{(t)},\varphi}_t = \duav{\eta,\bar\varphi}
\;\;\text{ for all }
\varphi\in\mathcal V_{t,0}\;\;\text{ and all }t\in[0,T),
\end{equation}
%
where ${\mathcal V}_{t,0}:=\{ \varphi\in {\mathcal V}_t:~\varphi(t)=0\}$
and $\bar\varphi$ is the trivial extension of
$\varphi\in \mathcal V_{t,0}$ to $\mathcal V$, i.e.,
$\bar\varphi(s)=\varphi(t)=0$ for all $s\in (t,T]$.\\[2mm]
{\sl (d)}~There holds the Cauchy condition
%
\begin{equation}\label{init}
u|_{t=0} = u_0 \quad\text{a.e.~in }\,\Omega.
\end{equation}
%
\end{definition}
\noindent%
Correspondingly, we conclude this section with our main result,
stating existence of at least one weak solution.
\begin{theorem}\label{main}
%
Let $T>0$ and let the initial data satisfy
%
\begin{equation}\label{hp:init}
u_0\in V, \quad j(u_0)\in L^1(\Omega),
\qquad u_1\in H.
\end{equation}
%
Then, there exists a solution $(u,\eta)$
to the viscous Cahn-Hilliard equation with inertia in the
sense of\/ {\rm Def.~\ref{def:sol}}. Moreover,
$u$ satisfies the\/ {\rm energy inequality}
%
\begin{align}\label{energ:eq}
& \frac{\alpha}{2} \|u_t(t_2)\|_{V'}^2
+ \frac{1}{2}\|A^{1/2} u(t_2)\|^2_{H}
+ J(u(t_2))
- \frac{\lambda}{2}\|u(t_2)\|^2_H
+ \int_{t_1}^{t_2}\big( \delta\|u_t\|_H^2
+ \|u_t\|^2_{V'}\big) \,\deriv\!s\nonumber\\
& \mbox{}~~~~~
\le \frac{\alpha}{2}\|u_t(t_1)\|_{V'}^2
+ \frac{1}{2}\|A^{1/2} u(t_1)\|^2_{H}
+ J(u(t_1))
- \frac{\lambda}{2}\|u(t_1)\|^2_H,
\end{align}
%
for\/ {\rm almost every} $t_1\in [0, T)$ (surely including $t_1 = 0$)
and\/ {\rm every} $t_2 \in (t_1,T]$.
%
\end{theorem}
\section{Proof of Theorem~\ref{main}}
\label{sec:proof}
\subsection{Approximation}
\label{subsec:appro}
We consider a regularization of system~\eqref{CH},
namely for $\epsilon\in(0,1)$ we denote by $(u^\epsilon,w^\epsilon)$ the solution to
\begin{align}\label{CH:eps:1}
& \alpha u^\epsilon_{tt}+u^\epsilon_t+A w^\epsilon = 0,\\
\label{CH:eps:2}
& w^\epsilon=\delta u^\epsilon_t+A u^\epsilon+\beta^\epsilon(u^\epsilon)-\lambda u^\epsilon,
\end{align}
coupled with the initial conditions
\begin{equation}\label{init:eps}
u^\epsilon|_{t=0} = u_0^\epsilon ~~\text{and }\,\,
u^\epsilon_t|_{t=0} = u_1^\epsilon,
\quad\text{a.e.~in }\,\Omega.
\end{equation}
Recall that $\beta^\epsilon$ was defined in Subsec.~\ref{subsec:prel}.
The following result provides existence of a unique smooth solution
to \eqref{CH:eps:1}-\eqref{init:eps}
once the initial data are suitably regularized:
\begin{theorem}\label{exist:eps}
%
Let $T>0$, $u^\epsilon_0\in D(A)=H^2(\Omega)\cap V$,
$u^\epsilon_1\in D(A^{1/2})=V$. Then there exists a unique
function $u^\epsilon$ with
%
\begin{align}\label{regee1}
&u^\epsilon\in W^{1,\infty}(0,T;H)\cap H^1(0,T;V)\cap L^\infty (0,T;D(A)),\\
\label{regee2}
&u^\epsilon_t\in W^{1,\infty}(0,T;D({A^{-1}})),
\end{align}
%
satisfying \eqref{CH:eps:1}-\eqref{init:eps}.
Moreover, for every $t_1,t_2\in[0,T]$, there holds the approximate energy balance
%
\begin{align}\label{energ:eps}
& \frac{\alpha}{2}\|u_t^\epsilon(t_2)\|_{V'}^2
+ \frac{1}{2}\|A^{1/2} u^\epsilon(t_2)\|^2_{H}
+ J^\epsilon(u^\epsilon(t_2))
- \frac{\lambda}{2}\|u^\epsilon(t_2)\|^2_H
+ \int_{t_1}^{t_2}
\big( \delta\|u_t^\epsilon\|_H^2 + \|u_t^\epsilon\|^2_{V'} \big)\,\deriv\!s \nonumber\\
%
& \mbox{}~~~~~
= \frac{\alpha}{2}\|u_t^\epsilon(t_1)\|_{V'}^2
+ \frac{1}{2}\|A^{1/2} u^\epsilon(t_1)\|^2_{H}
+ J^\epsilon(u^\epsilon(t_1))
- \frac{\lambda}{2}\|u^\epsilon(t_1)\|^2_H.
\end{align}
%
\end{theorem}
\noindent%
The proof of the above result is standard (see, e.g., \cite[Thm.~2.1]{GGMP2}).
Actually, one can replicate the a-priori estimates corresponding to
the regularity properties \eqref{regee1}-\eqref{regee2}
by multiplying \eqref{CH:eps:1} by $u^\epsilon_t$, \eqref{CH:eps:2} by $A u^\epsilon_t$,
and using the Lipschitz continuity of $\beta^\epsilon$.
The regularity of $\beta^\epsilon$ is also essential for having
uniqueness, as one can show via standard contractive methods.
Then, to prove the energy equality it is sufficient to test \eqref{CH:eps:1}
by $A^{-1} u^\epsilon_t$, \eqref{CH:eps:2} by $u^\epsilon_{t}$, and
integrate the results with respect to the time and space variables.
It is worth observing that these test functions are {\sl admissible}\/
thanks to the regularity properties \eqref{regee1}-\eqref{regee2}. As a consequence
of this fact, we can apply standard chain-rule formulas
to obtain that \eqref{energ:eps} holds with the {\sl equal}\/ sign,
which will no longer be the case in the limit.
\smallskip
As a first step in the proof of Theorem~\ref{main}, we need to
specify the required regularization of the initial data:
\begin{lemma}\label{iniz_data}
%
Let~\eqref{hp:init} hold. Then there exist two families
$\{u^\epsilon_0\}\subset D(A)\cap V$
and $\{u_1^\epsilon\}\subset V$, $\epsilon\in(0,1)$, satisfying
\begin{align}\label{apprin:1}
& J^\epsilon(u^\epsilon_0)\leq J(u_0)~~\forall\epsilon>0\;\;\;\;\;\;
\text{ and }\;\;u^\epsilon_0\rightarrow u_0~~\text{in }\,V,\\
\label{apprin:2}
& u^\epsilon_1\rightarrow u_1~~\text{in }\,H.
\end{align}
%
\end{lemma}
\noindent%
Also the above lemma is standard. Indeed, one can construct
$u^\epsilon_0$, $u^\epsilon_1$ by simple singular perturbation methods
(see, e.g., \cite[Sec.~3]{SP}).
Let us then consider the solutions $u^\epsilon$ to the regularized system
\eqref{CH:eps:1}-\eqref{init:eps}
with the initial data provided by Lemma~\ref{iniz_data}.
Then, taking a test function $\varphi\in\mathcal V$, multiplying
\eqref{CH:eps:1} by $A^{-1}\varphi$, \eqref{CH:eps:2} by $\varphi$,
and performing standard manipulations, one
can see that $u^\epsilon$ also satisfies the weak formulation
(compare with~\eqref{eq:w})
\begin{align}\nonumber
& \alpha(u^\epsilon_{t}(T),\varphi(T))_*
- \alpha (u^\epsilon_1,\varphi(0))_*
- \alpha\dual{u^\epsilon_{t},\varphi_t}_*
+ \dual{u^\epsilon_t,\varphi}_*\\
\label{eq:wee}
& \mbox{}~~~~~
+ \delta\dual{u^\epsilon_t,\varphi}
+ \dual{A^{1/2} u^\epsilon, A^{1/2}\varphi}
+ \dual{\beta^\epsilon(u^\epsilon),\varphi}
- \lambda\dual{u^\epsilon,\varphi}=0.
\end{align}
Correspondingly, the analogue over subintervals $(0,t)$ also holds. Namely,
for $\varphi\in\mathcal V_t$ one has (compare with~\eqref{eq:wt})
\begin{align}\nonumber
& \alpha(u^\epsilon_{t}(t),\varphi(t))_*
- \alpha (u^\epsilon_1,\varphi(0))_*
- \alpha\dual{u^\epsilon_{t},\varphi_t}_{*,t}
+ \dual{u^\epsilon_t,\varphi}_{*,t}\\
\label{eq:weet}
& \mbox{}~~~~~
+ \delta\dual{u^\epsilon_t,\varphi}_t
+ \dual{A^{1/2} u^\epsilon, A^{1/2}\varphi}_t
+ \dual{\beta^\epsilon(u^\epsilon),\varphi}_t
- \lambda\dual{u^\epsilon,\varphi}_t=0.
\end{align}
\subsection{A priori estimates}
\label{subsec:apriori}
We now establish some a-priori estimates for $u^\epsilon$. The estimates
will be uniform in $\epsilon$ and permit us to take $\epsilon\searrow 0$
at the end. First of all, the energy balance \eqref{energ:eps}
and the uniform bounded properties \eqref{apprin:1}-\eqref{apprin:2}
of approximating initial data
provide the existence of a constant $M>0$, independent of $\epsilon$,
such that the following bounds hold true:
\begin{subequations}\label{ests}
\begin{align}
&\|u^\epsilon\|_{L^{\infty}(0,T;V)}\leq M\label{est1},\\
&\|u^\epsilon\|_{H^1(0,T;V')}\leq M,\label{est1b}\\
&\delta^{1/2}\| u^\epsilon\|_{H^1(0,T;H)}\leq M,\label{est2}\\
&\alpha^{1/2}\| u^\epsilon\|_{W^{1,\infty}(0,T;V')}\leq M,\label{est2b}\\
&\| j^\epsilon(u^\epsilon)\|_{L^\infty(0,T;L^1(\Omega))}\leq M,
\end{align}
\end{subequations}
for all $\epsilon\in(0,1)$. More precisely, thanks to the fact that,
for every (fixed) $\epsilon\in (0,1)$, $u^\epsilon_t$ lies in $C^0([0,T];V')$
by~\eqref{regee1}-\eqref{regee2},
we are allowed to evaluate $u^\epsilon_t$ pointwise in time.
Hence, \eqref{est2b} may be complemented by
\begin{equation}\label{est2c}
\| u^\epsilon_t(t) \|_{V'}\leq M \;\;\;\;\;
\text{ for every }\,t\in[0,T],
\end{equation}
and in particular, for $t=T$. Analogously,
thanks to $u^\epsilon \in C^0([0,T];V)$,
in addition to~\eqref{est1} we also have
\begin{align}
& \|u^\epsilon(t)\|_{V}\leq M\;\;\;\text{ for every }\,t\in [0,T].\label{est1*}
\end{align}
Next, taking $\varphi=u^\epsilon$ in \eqref{eq:wee} and rearranging terms, we infer
\begin{align}\nonumber
& \int_0^T\int_\Omega\beta^\epsilon(u^\epsilon) u^\epsilon\,\deriv\!x\,\deriv\!t
\leq \alpha\|u^\epsilon_t(T)\|_{V'}\|u^\epsilon(T)\|_{V'}
+\alpha\|u^\epsilon_1\|_{V'}\|u^\epsilon_0\|_{V'}\\
\nonumber
& \mbox{}~~~~~
+ \alpha\|u^\epsilon_t\|_{L^2(0,T;V')}^2
+ \|u^\epsilon_t\|_{L^2(0,T;V')}\|u^\epsilon\|_{L^2(0,T;V')} \\
\label{estxx}
& \mbox{}~~~~~
+ \delta \|u^\epsilon_t\|_{L^2(0,T;H)}\|u^\epsilon\|_{L^2(0,T;H)}
+ \|A^{1/2} u^\epsilon\|^2_{L^2(0,T;H)}
+ \lambda\|u^\epsilon\|_{L^2(0,T;H)}^2.
\end{align}
Then, thanks to estimates \eqref{ests}, \eqref{est2c} and \eqref{est1*},
we may check that the right hand side of~\eqref{estxx}
is bounded uniformly with respect
to~$\epsilon$. Consequently, using also \eqref{bound:l1}, we infer
\begin{equation}\label{estbeta}
\|\beta^\epsilon(u^\epsilon)\|_{L^1(0,T;L^1(\Omega))}\leq M.
\end{equation}
Now, since we assumed $N\leq3$, we know that $L^1(\Omega)\subset D(A^{-1})$,
the latter being a closed subspace of $H^{-2}(\Omega)$.
Moreover, $A$ can be extended to a bounded linear operator
$A:D(A^{-1})\rightarrow D(A^{-2}) \subset H^{-4}(\Omega)$. Then, letting
$X:=H^{-4}(\Omega)$ (note that for $N>3$ the argument still works up to
suitably modifying the choice of~$X$) and rewriting
\eqref{CH:eps:1}-\eqref{CH:eps:2} as a single equation, i.e.,
\begin{equation}\label{CH:eps:}
\alpha u^\epsilon_{tt}+u^\epsilon_t
+ \delta A u^\epsilon_t+A^2 u^\epsilon
+ A (\beta^\epsilon(u^\epsilon)) -\lambda A u^\epsilon = 0,
\end{equation}
we may check by a comparison of terms that
\begin{equation}\label{est5}
\alpha \|u^\epsilon_t\|_{W^{1,1}(0,T;X)}\leq M.
\end{equation}
Actually, we used here the
estimates \eqref{ests} together with \eqref{estbeta}.
Next, thanks to the last of~\eqref{regee1}, we are allowed
to multiply \eqref{CH:eps:1} by $u^\epsilon$
and \eqref{CH:eps:2} by $Au^\epsilon$. Using the monotonicity
of $\beta^\epsilon$ and the bounds \eqref{ests}, standard
arguments lead us to the additional estimate
\begin{equation}\label{est6}
\| u^\epsilon\|_{L^2(0,T;D(A))}\leq M,
\end{equation}
still holding for $M>0$ independent of $\epsilon$.
Finally, for all $\varphi\in\mathcal V_t$
we can compute from \eqref{eq:weet}
\begin{align}
& \left|\int_0^t\langle\beta^\epsilon(u^\epsilon),\varphi\rangle\,\deriv\!s \right|
\leq \alpha\|u^\epsilon_t(t)\|_{V'}\|\varphi(t)\|_{V'}
+ \alpha \|u^\epsilon_1\|_{V'}\|\varphi(0)\|_{V'}
+ \alpha\|u^\epsilon_t\|_{L^2(0,t;V')}\|\varphi_t\|_{L^2(0,t;V')}\nonumber\\
%
& \mbox{} ~~~~~
+ \|u^\epsilon_t\|_{L^2(0,t;V')}\|\varphi\|_{L^2(0,t;V')}
+ \delta\|u^\epsilon_t\|_{L^2(0,t;H)}\|\varphi\|_{L^2(0,t;H)}\nonumber\\
\label{est6b}
& \mbox{} ~~~~~
+ \| u^\epsilon\|_{L^2(0,t;D(A))}\|\varphi\|_{L^2(0,t;H)}
+ \lambda\|u^\epsilon\|_{L^2(0,t;H)}\|\varphi\|_{L^2(0,t;H)}
\end{align}
and the right-hand side, by \eqref{ests}, \eqref{est2c} and \eqref{est6},
is less or equal than $C\|\varphi\|_{\mathcal V_t}$,
with $C$ depending only on the (controlled) norms of $u^\epsilon$.
Hence it follows that there exists a constant $M>0$ independent
of $\epsilon$ such that
\begin{align}
\|\beta^\epsilon(u^\epsilon)\|_{\mathcal V_t'}\leq M,\label{est:beta:V'}
\end{align}
for every $t\in(0,T]$. In particular, $\|\beta^\epsilon(u^\epsilon)\|_{\mathcal V'}\leq M$.
\subsection{Passage to the limit}
\label{subsec:limit}
Using the estimates obtained above, we now aim to pass to the
limit as $\epsilon\searrow 0$ in the weak formulation \eqref{eq:wee}.
Firstly, \eqref{ests}, \eqref{est6} and \eqref{est:beta:V'} imply that there exist
$u\in W^{1,\infty}(0,T;V')\cap H^1(0,T;H)\cap L^\infty(0,T;V)\cap L^2(0,T;D(A))$ and
$\eta\in \mathcal V'$ such that
\begin{subequations}\label{conv}
\begin{align}
&u^\epsilon\rightharpoonup u \;\;\;\text{ weakly star in } W^{1,\infty}(0,T;V')
\text{ and weakly in }L^2(0,T;D(A)),\label{conv1}\\
&u^\epsilon\rightharpoonup u \;\;\;\text{ weakly star in }
L^{\infty}(0,T;V)\text{ and weakly in }H^1(0,T;H),\label{conv2}\\
&u_t^\epsilon\rightharpoonup u_t \;\;\;\text{ weakly star in } BV(0,T;X),\label{conv3}\\
&\beta^\epsilon(u^\epsilon)\rightharpoonup\eta\;\;\;\text{ weakly in } \mathcal V'.\label{conv3a}
\end{align}
Here and below all convergence relations are implicitly intended to hold up
to extraction of a (non relabeled) subsequence of $\epsilon\searrow 0$.
Thanks to \eqref{conv1}-\eqref{conv2} and \eqref{est1*} we also infer
\begin{align}\label{conv4}
&u^\epsilon(t)\rightharpoonup u(t) \;\;\;\text{ weakly in }V\;\;\;\text{ for all }t\in[0,T].
\end{align}
Next, condition \eqref{conv1} implies, thanks to the Aubin-Lions lemma, that
\begin{align}\label{conv4*}
& u^\epsilon\rightarrow u \;\;\;\text{ strongly in } L^2(0,T;V).
\end{align}
A generalized version of the same lemma \cite[Cor.~4, Sec.~8]{Si}
implies, thanks to \eqref{conv2} and \eqref{conv3},
\begin{align}\label{conv5*}
& u_t^\epsilon\rightarrow u_t \;\;\;\text{ strongly in } L^2(0,T;V').
\end{align}
From \eqref{conv3} and a proper version of the
Helly selection principle \cite[Lemma 7.2]{DMDSM}, we infer
\begin{align}
u_t^\epsilon(t)\rightharpoonup u_t(t) \;\;\;\text{ weakly in } X\;\;\;\;
\text{ for all }t\in[0,T].\label{conv6}
\end{align}
Combining this with \eqref{est2c}, we obtain more precisely
\begin{align}
u_t^\epsilon(t)\rightarrow u_t(t) \;\;\;\text{ weakly in }V'
\;\text{ and strongly in }D(A^{-1})\;\;\;\;\text{ for all }t\in[0,T].\label{conv7}
\end{align}
\end{subequations}
Hence, using \eqref{conv}, we can take $\epsilon\searrow0$ in~\eqref{eq:wee}
and get back~\eqref{eq:w}. Indeed, it is not difficult to check that all terms
pass to the limit. Notice however that,
in view of \eqref{conv3a}, the {\sl $L^2$-scalar product}\/
$\dual{\beta^\epsilon(u^\epsilon),\varphi}$ is replaced by
the ${\mathcal V}'$-${\mathcal V}$ duality $\duav{\eta,\varphi}$ in the limit.
Let us now consider the weak formulation on subintervals. Taking $\varphi\in\mathcal V_t$,
$t\in [0,T]$, we may rearrange terms in \eqref{eq:weet} to get
\begin{align}\nonumber
& \dual{\beta^\epsilon(u^\epsilon),\varphi}_t
= - \alpha(u^\epsilon_{t}(t),\varphi(t))_*
+ \alpha (u^\epsilon_1,\varphi(0))_*
+ \alpha\dual{u^\epsilon_{t},\varphi_t}_{*,t}\\
\label{eq:weet2}
& \mbox{}~~~~~
- \dual{u^\epsilon_t,\varphi}_{*,t}
- \delta\dual{u^\epsilon_t,\varphi}_t
- \dual{A^{1/2} u^\epsilon, A^{1/2}\varphi}_t
+ \lambda\dual{u^\epsilon,\varphi}_t=0.
\end{align}
Now, {\sl without extracting further subsequences}, it can be checked that,
as a consequence of \eqref{conv}, the right hand side tends to
\begin{align}\nonumber
& - \alpha(u_t(t),\varphi(t))_*
+ \alpha (u_1,\varphi(0))_*
+ \alpha \dual{u_t,\varphi_t}_{*,t}
- \dual{u_t,\varphi}_{*,t}\\
\label{eq:weet3}
& \mbox{}~~~~~
- \delta\dual{u_t,\varphi}_t
- \dual{A^{1/2} u, A^{1/2}\varphi}_t
+ \lambda\dual{u,\varphi}_t
=: \duav{\eta_{(t)},\varphi}_t.
\end{align}
Hence we have proved \eqref{eq:w} and \eqref{eq:wt}. The compatibility
property~\eqref{compa} is also a straighforward consequence
of this argument.
Next, to prove \eqref{graph}, according to~\eqref{minty}, we need to show
\begin{equation} \label{semi:1}
\limsup_{\epsilon\searrow0} \,\duav{\beta^\epsilon(u^\epsilon),u^\epsilon}\leq\duav{\eta,u}.
\end{equation}
Thanks to \eqref{eq:wee} with $\varphi=u^\epsilon$, we have
\begin{align}
& \duav{\beta^\epsilon(u^\epsilon),u^\epsilon}
= - \alpha (u^\epsilon_{t}(T),u^\epsilon(T))_*
+ \alpha (u^\epsilon_1,u^\epsilon_0)_*
+ \alpha \dual{u^\epsilon_{t},u^\epsilon_t}_*\nonumber\\
\label{semi:2}
& \mbox{}~~~~~ - \dual{u^\epsilon_t,u^\epsilon}_*
- \delta \dual{u^\epsilon_t,u^\epsilon}
- \|A^{1/2} u^\epsilon\|_{L^2(0,T;H)}^2
+ \lambda\|u^\epsilon\|_{L^2(0,T;H)}^2.
\end{align}
Then, we take the $\limsup$ of the above expression
as $\epsilon\searrow0$. Then, using relations \eqref{conv}
and standard lower semicontinuity arguments
we infer that the $\limsup$ of the above expression
is less or equal than
\begin{align}
& - \alpha (u_{t}(T),u(T))_*
+ \alpha (u_1,u_0)_*
+ \alpha \dual{u_{t},u_t}_*\nonumber
- \dual{u_t,u}_*\\
\label{semi:3}
& \mbox{}~~~~~ - \delta \dual{u_t,u}
- \|A^{1/2} u\|_{L^2(0,T;H)}^2
+ \lambda\|u\|_{L^2(0,T;H)}^2
= \duav{\eta,u},
\end{align}
the last equality following from \eqref{eq:w} with the choice
$\varphi=u$. Combining \eqref{semi:2} with \eqref{semi:3} we obtain
\eqref{semi:1}, whence the first of \eqref{graph}.
The same argument applied to the subinterval $(0,t)$ entails
$\eta_{(t)}\in \beta_w(u\llcorner_{(0,t)})$, for all $t\in(0,T]$, as desired.
\smallskip
Finally, we need to prove the energy {\sl inequality}\/ \eqref{energ:eq}.
To this aim, we consider the approximate energy balance~\eqref{energ:eps}
and take its $\liminf$ as $\epsilon\searrow0$.
Then, by standard lower semicontinuity arguments, it is clear that the
left hand side of \eqref{energ:eq} is less or equal than the
$\liminf$ of the left hand side of \eqref{energ:eps}.
The more delicate point stands, of course, in dealing with
the right hand sides. Indeed, we claim that there exists the limit
\begin{align}\nonumber
& \lim_{\epsilon\searrow 0} \Big( \frac{\alpha}{2}\|u_t^\epsilon(t_1)\|_{V'}^2
+ \frac{1}{2}\|A^{1/2} u^\epsilon(t_1)\|^2_{H}
+ J^\epsilon(u^\epsilon(t_1))
- \frac{\lambda}{2}\|u^\epsilon(t_1)\|^2_H \Big) \\
\label{semi:4}
& \mbox{}~~~~~
= \Big( \frac{\alpha}{2}\|u_t(t_1)\|_{V'}^2
+ \frac{1}{2}\|A^{1/2} u(t_1)\|^2_{H}
+ J(u(t_1))
- \frac{\lambda}{2}\|u(t_1)\|^2_H \Big),
\end{align}
at least for almost every $t_1 \in [0,t)$, surely including $t_1=0$.
We just sketch the proof of this fact, which follows closely the lines of
the argument given in \cite[Section 3]{BRSS}
to which we refer the reader for more details.
First, we observe that the last summand passes to the limit
in view of \eqref{conv4} and the compact embedding $V\subset H$.
Next, the convergence
$$
\Big( \frac{\alpha}{2}\|u_t^\epsilon(t_1)\|_{V'}^2
+ \frac{1}{2}\|A^{1/2} u^\epsilon(t_1)\|^2_{H} \Big)
\to \Big( \frac{\alpha}{2}\|u_t(t_1)\|_{V'}^2
+ \frac{1}{2}\|A^{1/2} u(t_1)\|^2_{H} \Big)
$$
holds for {\sl almost}\/ every choice of $t_1$ and up to extraction
of a further subsequence of $\epsilon\searrow 0$ in view of
\eqref{conv4*} and \eqref{conv5*} (indeed, because these are just
$L^2$-bounds with respect to time, we cannot hope to get convergence
for {\sl every}\/ $t_1\in[0,T)$). Finally, we need to show
$$
J^\epsilon(u^\epsilon(t_1))\rightarrow J(u(t_1)).
$$
This is the most delicate part, which proceeds exactly as
in~\cite[Section 3]{BRSS}, to which
the reader is referred. Note, finally, that \eqref{semi:4}
for $t_1=0$ can be easily proved as a direct consequence
of Lemma~\ref{iniz_data} (again, we refer the reader
to~\cite{BRSS} for details). The proof is concluded.
|
\section{Introduction}
Saliency detection aims to detect distinctive regions in an image that draw human attention. This topic has received a great deal of attention in computer vision and cognitive science because of its wide range of applications such as content-aware image cropping~\cite{appcrop} and resizing~\cite{appresize}, video summarization~\cite{appsum}, object detection~\cite{appdet}, and person re-identification~\cite{appreid}. Various papers such as DRFI~\cite{drfi}, GMR~\cite{gmr}, DSR~\cite{dsr}, RBD~\cite{rbd}, HDCT~\cite{hdct}, HS~\cite{hs} and GC~\cite{hc} utilize low level features such as color, texture and location information to investigate characteristics of salient regions including objectness, boundary convexity, spatial distribution, and global contrast. The recent success of deep learning in object recognition and classification~\cite{ILSVRC15} brought to a revolution in computer vision. Inspired by the human visual system, deep learning builds hierarchical layers of visual representation to extract the high level features of an image. Using extracted high level features, several recent works~\cite{legs,mdf,mcdl} have demonstrated state-of-the-art performance in saliency detection that significantly outperform previous works that utilized only low level features.
\begin{figure}
\centering
\setlength\tabcolsep{0.6pt}
\begin{tabular}{cccccc}
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/concept/704.jpg}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/concept/704.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/concept/704_DDE4.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/concept/704_MDF.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/concept/704_DSBR.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/concept/704_DDE.png}}\vspace{-0.17in}\\
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/concept/0851.jpg}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/concept/0851.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/concept/0851_DDE4.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/concept/0851_MDF.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/concept/0851_DSBR.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/concept/0851_DDE.png}}\\
(a) & (b) & (c) & (d) & (e) & (f)\vspace{-0.10in}\\
\end{tabular}\vspace{-0.05in}
\caption{(a) Input images, (b) Ground truth masks, (c) Fuzzy saliency masks from VGG16 features (HF setting, described in \Secref{analysis}), (d-f) Results of (d) MDF~\cite{mdf}, (e) MCDL~\cite{mcdl}, and (f) our method.}\vspace{-0.15in}
\label{fig:concept}
\end{figure}
As discussed in ~\cite{Hariharan15cvpr}, while high level features are good to evaluate objectness in an image, they are relatively weak in for determining precise localization. This is because multiple levels of convolutional and pooling layers ``blur'' the object boundaries, and high level features from the output of the last layer are too coarse spatially for the saliency detection task. This problem is illustrated in \Figref{concept}(c). To generate a precise saliency mask, previous studies utilized various methods including object proposal~\cite{legs} and superpixel classification~\cite{mdf,mcdl}. Yet, it was still very hard to differentiate salient regions from their adjacent non-salient regions because their feature distances were not directly encoded.
\begin{figure*}[t]
\centering
\includegraphics[width=0.85\textwidth] {images/algorithm/fullmodel.pdf}
\vspace{-0.15in}
\caption{Overall pipeline of our method. We compute the ELD-map from the initial feature distance map for each query region and concatenate the high level feature from the output of the conv5\_3 layer of the VGG16 model.}\vspace{-0.15in}
\label{fig:cnnarch}
\end{figure*}
In this paper, we introduce the encoded low level distance map (ELD-map), which directly encodes the feature distance between each pair of superpixels in an image.
Our ELD-map encodes feature distance for various low level features including colors, color distributions, Gabor filter responses, and locations. Our ELD-map is unique in that it uses deep learning as an auto-encoder to encode these low level feature distances by multiple convolutional layers with $1 \times 1$ kernels. The encoded feature distance map has strong discriminative power to evaluate similarities between different parts of an image with precise boundaries among superpixels. We concatenate our ELD-map and the output of the last convolutional layer from the VGG-net (VGG16)~\cite{Simonyan14c} to form a new feature vector which is a composite of both high level and low level information. Using our new feature vector, we can precisely estimate saliency of superpixels. Without any post-processing, this method generates an accurate saliency map with precise boundaries.
In summary, our paper offers the following contributions:
\begin{itemize}
\vspace{-0.05in}
\item We introduce the ELD-map which shows that low level features can play complementary roles to assist high level features with the precise detection of salient regions.
\vspace{-0.05in}
\item Compared with previous works that utilized either high level or low level features, but not both, our work demonstrates consistent improvements across different benchmark datasets.
\vspace{-0.05in}
\item Because high level features can be reused for different query regions in an image, our method runs fast. The testing time in the ECSSD dataset~\cite{hs} takes only around 0.5 seconds per an image.
\end{itemize}
\section{Related Works}
In this section, representative works in salient region detection are reviewed. We refer readers to~\cite{SalObjSurvey} and~\cite{SalObjBenchmark} for a survey and a benchmark comparison of the state-of-the-art salient region detection algorithms.
Recent trends in salient region detection utilize learning-based approaches, which were first introduced by Liu \etal~\cite{msra10k}. Liu \etal were also the first group to released a benchmark dataset (MSRA10K) with ground truth evaluation. Following this work, several representative benchmarks with ground truth evaluation were released. These benchmarks include ECSSD~\cite{hs}, Judd~\cite{Judd09iccv}, THUR15K~\cite{thur15k}, DUTOMRON~\cite{gmr}, PASCAL-S~\cite{pascals}, and FT~\cite{Achanta09cvpr}. They cover rich variety of images containing different scenes and subjects. In addition, each one exhibits different characteristics. For example, the ground truth of the MSRA10K dataset are binary mask images which were manually segmented by human, while the ground truth of the FT~\cite{Achanta09cvpr} dataset were determined by human fixation.
Discriminative Regional Feature Integration(DRFI)~\cite{drfi}, Robust Background Detection(RBD)~\cite{rbd}, Dense and Sparse Reconstruction(DSR)~\cite{dsr}, Markov Chain(MC)~\cite{mc}, High Dimensional Color Transform(HDCT)~\cite{hdct}, and Hierarchical Saliency(HS)~\cite{hs} are the top 6 models for salient region detection reported in the benchmark paper~\cite{SalObjBenchmark}. These algorithms consider various heuristic priors such as the global contrast prior~\cite{hs} and the boundary prior~\cite{drfi} and often generate high-dimensional features to increase discriminative power~\cite{hdct, drfi} to distinguish salient regions from non-salient regions. These methods are all based on hand-crafted low level features without deep learning.
Deep learning has emerged in the field of saliency detection last year. Several methods that utilize deep learnings for saliency detection were simultaneously proposed. This includes Multiscale Deep Feature(MDF)~\cite{mdf}, Multi-Context Deep Learning(MCDL)~\cite{mcdl}, and Local Estimation and Global Search(LEGS)~\cite{legs}. They utilized high level features from the deep convolutional neural network (CNN) and demonstrated superior results over previous works that utilized only low level features. MDF and MCDL utilize superpixel algorithms, and query each region individually to assign saliency to superpixels. For each query region, MDF generates three input images that cover different scopes of an input image, and MCDL uses sliding windows with deep CNN to compute the deep features of the center superpixel. LEGS first generates an initial rough saliency mask from deep CNN and refines the saliency map using an object proposal algorithm.
Compared to the aforementioned methods, our work utilizes high level and low level features simultaneously. The high level features evaluate the objectness in an image with coarse spatial location and the low level features evaluate similarities between the different superpixels in an image. Our high level and low level features are combined and evaluated by a multi-level fully connected neural network classifier, that seamlessly considers both high level and low level features to assign saliency to query superpixels. Experiments demonstrate that our method significantly outperforms previous methods that utilize either low level features or high level features, but not both.
\section{Algorithms}
The overall pipeline of our method is illustrated in \Figref{cnnarch}. First, the process for construction of the ELD-map is described. Then, we describe how the high level features were extracted and integrated with the ELD-map for salient region classification. At the end of this section, we report the results of our self evaluations to analyze the effects of the ELD-map and the high level features in our saliency detection framework.
\subsection{Construction of the ELD-map}
\label{sec:eld}
\begin{figure}[t]
\centering
\includegraphics[width=0.45\textwidth]{images/algorithm/initial_fm.pdf}\vspace{-0.05in}
\caption{Visualization of the construction process for the initial low level feature distance map. Each grid cell, which represents uniformly divided area of an image, is described by the features of the superpixel that occupies the largest area of the grid cell. Using the features, we construct an $N \times N \times K$ feature distance map. The computed features and distances are summarized in \Tabref{regional_descriptor} and \Tabref{cell_descriptor} } \vspace{-0.15in}
\label{fig:initialmap}
\end{figure}
\begin{table}
\begin{center}
\begin{tabular}{|c|c|}
\hline
Features of a superpixel ($f(r_{c})$) & \specialcell{Feature Index} \\
\hline\hline
Average RGB value & 1-3 \\
Average LAB value & 4-6 \\
Average HSV value & 7-9 \\
Gabor filter response & 10-33\\
Maximum Gabor response & 34\\
Center location & 35-36\\
RGB color histogram & 37-61\\
LAB color histogram & 62-86\\
HSV color histogram & 87-110\\
\hline
\end{tabular}
\end{center}
\vspace{-0.15in}
\caption{The list of extracted features of a superpixel.}
\vspace{-0.1in}
\label{tab:regional_descriptor}
\begin{center}
\begin{tabular}{|c|c|c|}
\hline
Distance map features & \specialcell{\#$f(\cdot)$} & \specialcell{Feature Index}\\
\hline\hline
$f(c_{ij}) - f(r_q)$ & 1-36 & 1-36\\
\hline
\specialcell{$\chi^2$ distance($f(c_{ij}), f(r_q)$)} & 37-110 & 37-45\\
\hline
$f(c_{ij})$ & 1-9 & 46-54\\
\hline
\end{tabular}
\end{center}
\vspace{-0.15in}
\caption{The list of feature distances used for computing the initial low level feature distance map. $f(r_q)$ is the extracted features of a query superpixel, $r_q$, and
$f(c_{ij})$ is the extracted features of a grid cell $c_{ij}$, where $f(c_{ij}) := f(r_c^*)$. Details are described in \Secref{eld}.}\vspace{-0.1in}
\label{tab:cell_descriptor}
\end{table}
Our algorithm utilizes a superpixel-based approach for saliency detection. To segment an image into superpixels, the SLIC\cite{slic} algorithm is used. The major benefits of using the SLIC algorithm for superpixel segmentation are that the segmented superpixels are roughly regular and that it provides control on the number of superpixels.
After superpixel segmentation, the initial hand-crafted low level features of each superpixel are calculated, and the superpixel representation is converted into a regular grid representation as illustrated in \Figref{initialmap}. To be more specific, we assign superpixels to grid cells according to their occupying area in each cell. This regular grid representation is efficient for CNN architecture because we can convert images with different resolutions and aspect ratios into a fixed size distance map without resizing and cropping.
In our implementation, the size of the regular grid was set to $23\times23$. We index the superpixels as $S = \{r_1,...,r_M\}$, and the grid cells of the regular grid as $G = \{c_{11},c_{12},...,c_{NN}\}$, $N=23$. We denote the computed feature descriptor of each superpixel region as $f(r_c)$. The collected features for each superpixel are summarized in \Tabref{regional_descriptor}. Our hand-crafted features are all low level features related to colors (average colors in RGB, LAB, and HSV spaces, and their local color histograms), textures (Gabor filter responses~\cite{gabor} averaged over pixels in each region), and locations (center location of a superpixel). We normalize the pixel coordinates so that the range of coordinates was within $[0,1]$ and include the maximum over 24 values for the Gabor filter response in each region. Each grid cell descriptor is equal to the descriptor of the superpixel which occupies the largest area inside that grid cell, \ie, $f(c_{ij}) := f(r_c^*)$, where $r_c^* = \arg\max_{r_c} { \#pixels({r_c} \cap c_{ij})} $.
Similar to MCDL\cite{mcdl} and MDF\cite{mdf}, we query the saliency score of each region individually. For each query region, we compute a low level feature distance map that modelled the feature distances between the queried superpixel $f(r_q)$ and grid cells $f(c_{ij})$ in the regular grid. For the mean color value and Gabor response, we simply compute the differences within them where negative values are allowed, and use the Chi-square ($\chi^2$) distance for color histograms between $r_c^*$ and $r_q$. We attach the average colors of $f(c_{ij})$ at the end of the distance measurements as a reference point, and find that this improved the performance. \Tabref{cell_descriptor} summarizes the computed feature distances of the initial feature distance map where the number of the initial features ($K$) is 54. After computing the distances, the size of the initial feature distance map becomes $23 \times 23 \times 54$.
The initial feature distance map is then encoded to a compact but accurate feature distance map using the multiple $1 \times 1$ convolutional and ReLU layers, as illustrated in \Figref{cnnarch}. The multiple $1 \times 1$ convolutional and ReLU layers work as a fully connected layer across channels to find the best nonlinear combination of feature distances that better describe the similarities and dissimilarities between a query superpixel and the other regions of an image. Because the dimension of the initial map is reduced, we call this distance map as an encoded low level distance map (ELD-map). In our implementation, the size of the ELD-map was $23 \times 23 \times 3$. In the self-evaluation experiment in \Tabref{controlled_table}, we find that encoding the low level feature distance map with the deep CNN with $1 \times 1$ kernel enhances the performance of our method. The effects of the encoding will be discussed in \Secref{analysis}.
\subsection{Integration with High Level Features}
We extract the high level features using the VGG16 model pretrained by the ImageNet Dataset~\cite{ILSVRC15}. The \textbf{VGG16}~\cite{Simonyan14c} won the ImageNet2014 CLS-LOC task. We used the VGG16 model distributed by Caffe Model Zoo~\cite{caffe} \rev{without finetuning}. We resize the input images to $224\times 224$ to fit to the fixed input size of the VGG16 model and extract a ``conv5\_3'' feature map, which is generated after passing the last convolutional layer. The extracted features has 512 channels and $14\times 14$ resolution. To fit the features to our GPU memory, we attach an additional convolutional layer with a $1\times 1$ kernel for feature selection and dimensionality reduction as in GoogleNet~\cite{googlenet}.
For each input image, we process it with the pre-trained deep CNN only once and reuse the extracted high level feature map for all queried regions. Therefore, our computational cost is small even when we use a very deep and powerful model such as the VGG16 model. Although other parts of our algorithm, including generating the ELD-map and applying fully-connected layers, should be repeated each time, the cost from these parts is much smaller than running the VGG16 model.
Before applying the fully-connected layers to classify the queried region, we concatenate the ELD-map and ``conv5\_3'' feature map after flattening each map. Afterwards, two fully-connected layers with 1024 nodes generate a saliency score for the queried region using the concatenated features. We use the cross entropy loss for softmax classifier to evaluate the outputs:
\begin{equation}\label{eq:softmax}
L = -\sum_{j=0}^{1}1_{(y=j)}\log(\frac{e^{z_j}}{e^{z_0} + e^{z_1}})
\end{equation}
where $0$ and $1$ denote non-salient and salient region labels respectively, and $z_0$ and $z_1$ are the score of each label of training data. Since the ELD-map features and the high level features are fixed in length, their spatial correlation can be learnt from training data automatically in the fully connected layers.
\subsection{Analysis of the Effects of the Encoded Low level Distance map}
\label{sec:analysis}
\begin{figure}
\centering
\setlength\tabcolsep{1pt}
\begin{tabular}{cccccc}
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0534.jpg}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0534.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0534_DDE_1.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0534_DDE_2.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0534_DDE_3.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0534_DDE_4.png}}\vspace{-0.15in}\\
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0924.jpg}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0924.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0924_DDE1.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0924_DDE2.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0924_DDE3.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0924_DDE4.png}}\vspace{-0.15in}\\
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0184.jpg}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0184.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0184_DDE_1.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0184_DDE_2.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0184_DDE_3.png}} &
\subfloat{\includegraphics[width=0.16\linewidth]{images/analysis/controlled/0184_DDE_4.png}}\\
(a) & (b) & (c) & (d) & (e) & (f) \\
\end{tabular}\vspace{-0.1in}
\caption{Visual comparisons of results in our self-evaluation experiments. (a) Input images, (b) Ground truth masks, (c-f) the results of our algorithm (c) using both ELD-map and high level features (ELD-HF) (d) using both non-encoded low level distance map and high level features (LD-HF) (e) using only encoded low level distance map (ELD) (f) using only high level features (HF). Details of each experiment are described in \Tabref{controlled_table}.}\vspace{-0.15in}
\label{fig:controlled}
\end{figure}
\begin{table*}
\begin{center}
\begin{tabular}{|c|c|c|c|c|c|}
\hline
\specialcell{Setting\\Description} & \specialcell{Encoded Low level \\Distance map} & \specialcell{Non-encoded Low level \\Distance map} & \specialcell{High level features\\from VGG16}
& \specialcell{f-measure on\\ECSSD}& \specialcell{f-measure on\\PASCAL-S}\\
\hline
ELD-HF & Use & Not Use & Use & 0.867 &
0.770\\
\hline
LD-HF & Not Use & Use &
Use & 0.835 &
0.735\\
\hline
ELD & Use & Not Use &
Not Use & 0.790 &
0.682\\
\hline
HF & Not Use & Location Only &
Use & 0.768 &
0.693\\
\hline
\end{tabular}
\end{center}
\vspace{-0.15in}
\caption{The detail of settings of the controlled experiments. Using both ELD-map and high level features from VGG16 shows the best performance.}\vspace{-0.15in}
\label{tab:controlled_table}
\end{table*}
\begin{figure}
\centering
\setlength\tabcolsep{-0.25in}
\vspace{-0.1in}
\begin{tabular}{cc}
\subfloat{\includegraphics[width=0.67\linewidth]{images/analysis/controlled/controlled_prgraph_ecssd.pdf}} &
\subfloat{\includegraphics[width=0.67\linewidth]{images/analysis/controlled/controlled_prgraph_pascal.pdf}}\vspace{-0.2in} \\
(a) ECSSD & (b) PASCAL-S\\
\end{tabular}\vspace{-0.1in}
\caption{Precision-Recall graphs of the controlled experiments described in \Tabref{controlled_table} }\vspace{-0.1in}\label{fig:controlled_prgraph}
\end{figure}
\begin{figure}
\centering
\setlength\tabcolsep{-0.25in}
\vspace{-0.4in}
\begin{tabular}{cc}
\subfloat{\includegraphics[width=0.67\linewidth]{images/analysis/controlled/no_hist_ecssd.pdf}} &
\subfloat{\includegraphics[width=0.67\linewidth]{images/analysis/controlled/no_hist_pascal.pdf}}\vspace{-0.2in}\\
(a) ECSSD & (b) PASCAL-S\\
\end{tabular}\vspace{-0.1in}
\caption{Precision-Recall graphs of the controlled experiments to show the effect of the statistical features. }\vspace{-0.1in}\label{fig:controlled_histo}
\end{figure}
\begin{figure*}
\centering
\setlength\tabcolsep{1pt}
\begin{tabular}{cccccccccc}
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046/0046.jpg}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046/initial/mean_R.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046/initial/mean_L.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046/initial/G1.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046/initial/gabor_max.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046/initial/chi_L.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046/initial/chi_H.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046/dde/0.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046/dde/1.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046/dde/2.png}}\vspace{-0.15in}\\
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046_nonsal/0046.jpg}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046_nonsal/initial/mean_R.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046_nonsal/initial/mean_L.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046_nonsal/initial/G1.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046_nonsal/initial/gabor_max.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046_nonsal/initial/chi_L.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046_nonsal/initial/chi_H.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046_nonsal/dde/0.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046_nonsal/dde/1.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0046_nonsal/dde/2.png}}\vspace{-0.15in}\\
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0262/0262.jpg}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0262/initial/mean_R.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0262/initial/mean_L.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0262/initial/G1.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0262/initial/gabor_max.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0262/initial/chi_L.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0262/initial/chi_H.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0262/dde/0.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0262/dde/1.png}} &
\subfloat{\includegraphics[width=0.092\textwidth]{images/analysis/Encoding/0262/dde/2.png}}\\
(a) & (b) & (c) & (d) & (e) & (f) & (g) & (h) & (i) & (j)\\
\end{tabular}
\vspace{-0.1in}
\caption{Comparisons of the discriminative power of different features and our ELD-map feature space. (a) Input images, the query superpixels are highlighted. (b)-(g) are the distance maps of the different features between the query superpixel and other superpixels in an image. (b)-(c) Distance maps of average color of (b) R-channel (RGB color space), and (c) L-channel (LAB color space). (d) Differences of the first Gabor filter responses. (e) Differences of the maximum gabor filter responses. (f)-(g) Chi-square distance maps of (f) L-channel histogram (LAB color space), and (g) H-channel histogram (HSV color space). (h)-(j) our Encoded Low level Distance map (ELD-map).}\vspace{-0.1in}
\label{fig:3ch_compare}
\end{figure*}
\rev{Although theoretically neural networks can model any complex function\cite{hornik1989multilayer}, practically they may suffer from limited training data and limited computational resources. For instance, overfitting and underfitting frequently occur because of a small dataset and the complexity of desired features. It is also common for CNN to generate feature maps with much lower resolution than original input images. By providing strongly relevant information, the encoded low level distance map(ELD-map) complements the features from deep CNN and guides the classifier to learn properly. ELD-map has two main advantages:} (1) it can easily generate the fine-grained dense saliency mask, and (2) it provides additional low level feature distances, which can be hard to learn for CNN, such as Chi-square distance between histograms.
We performed multiple controlled experiments to demonstrate the effects of the ELD-map in our algorithm. We conducted the experiments using four different settings: The \textbf{ELD-HF} setting uses both the ELD-map and the high level feature map from the VGG16 model. The \textbf{LD-HF} setting utilizes both the low level feature distances and the high level feature map, but does not encode the low level distances with the $1\times 1$ convolutional network. The \textbf{ELD} setting uses only ELD-map without high level features from the VGG16 model. The \textbf{HF} setting uses the high level feature map from VGG16 model and the location distance between the query region and other regions to notify which region is queried. We ran all models until the training data loss converged.
The results of the controlled experiments are shown in \Figref{controlled}. The model using only the high level feature map from the deep CNN detected the approximate location of the salient objects but was unable to capture detailed location because the high level feature maps had lower resolution than the resolution of the original input images. On the other hand, the model with only the low level features failed to distinguish the salient object in the first row. With both the low level feature distances and the high level feature map, the models could correctly capture salient objects and their exact boundaries. Also, we found that the ELD-map often helps to find salient objects that are difficult to detect using only CNN as shown in the second row. We speculate that the ELD-map can provide additional information which is hard to be accurately modeled by the convolutional layers. \rev{Some of the hand-crafted features of our method are statistical features, \eg histogram, and we use $\chi^2$ distance to measure the distance between histograms that would be difficult to learn by CNN. To demonstrate the effects of the statistical features, we re-train our network with the histogram features removed from our network. The comparisons are shown in \figref{controlled_histo}. Clearly, the histogram features improve the performance of our work. Similarly, for features in other color space, \eg LAB and HSV, it may require more layers to model such transformation, but we can easily adopt them from hand-crafted features.}
\Tabref{controlled_table} summarizes the controlled experiments for the self-evaluation of our method. It also shows the quantitative comparisons in terms of f-measure on the ECSSD and the PASCAL-S datasets. The corresponding quantitative comparisons in terms of the Precision-Recall graphs are presented in \Figref{controlled_prgraph}. The model utilizing both ELD-map and high level features exhibits the best performance. By comparing ELD-HF and LD-HF settings, we found that it is useful to apply $1\times 1$ kernels among the low level features.
\Figref{3ch_compare} shows the initial hand-crafted distance features and ELD-map. For the ELD-map, which is originally the $23\times 23$ size grid, we visualized each superpixel using the feature value of the closest grid cell according to the location of the center pixel. Each hand-crafted feature has its own weakness but it captures different aspects of similarities or dissimilarities between superpixels. Our $1\times 1$ kernels work as fully-connected layers among low level feature distances and generate a powerful feature distance map by combining all of the original feature distances nonlinearly. This nonlinear mapping is data-driven which is directly learnt from training data automatically. We can see the strong discriminative power of feature distances in ELD-map. While the third channel (j) is related to the position of the query region, the other two channels (h-i) seem to indicate the differences of appearance such as color and texture. Therefore, the ELD-map helps to group regions that belong to the same object, because regions which have the similar color and texture have similar values in the two channels of the ELD-map regardless of their position.
\section{Experiment and Discussion}
\begin{figure*}
\centering
\setlength\tabcolsep{-0.2in}
\begin{tabular}{ccccc}
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/asd_prgraph.pdf}} &
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/pascal_prgraph.pdf}} &
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/ecssd_prgraph.pdf}} &
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/dutomron_prgraph.pdf}} &
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/thur_prgraph.pdf}} \vspace{-0.6in}\\
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/asd_fmeasure.pdf}} &
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/pascal_fmeasure.pdf}} &
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/ecssd_fmeasure.pdf}} &
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/dutomron_fmeasure.pdf}} &
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/thur_fmeasure.pdf}} \vspace{-0.5in}\\
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/asd_mae.pdf}} &
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/pascal_mae.pdf}} &
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/ecssd_mae.pdf}} &
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/dutomron_mae.pdf}} &
\subfloat{\includegraphics[width=0.26\textwidth]{images/analysis/compared/graph/thur_mae.pdf}} \\
\setlength\tabcolsep{1pt}
(a) ASD &(b) PASCAL-S &(c) ECSSD &(d) DUT-OMRON &(e) THUR15K
\end{tabular} \vspace{-0.1in}
\caption{From top to bottom, Precision-Recall (PR) graph, F-measure score with different thresholds and Mean Absolute Error (MAE) of various algorithms on five popular datasets.}\vspace{-0.15in}\label{fig:compare}
\end{figure*}
\begin{table}
\scriptsize
\begin{center}
\begin{tabular}{|c|c|c|c|c|c|}
\hline
& ASD & PASCAL-S & ECSSD & DUT-OMRON & THUR15K\\
\hline
Ours & 0.924 & \textbf{0.771} & \textbf{0.867} & \textbf{0.719} & \textbf{0.731}\\
\hline
MCDL & 0.928 & 0.737 & 0.837 & 0.703 & 0.686\\
\hline
MDF & \textbf{0.931} & 0.759 & 0.831 & 0.694 & 0.670\\
\hline
LEGS & 0.905 & 0.749 & 0.831 & 0.669 & 0.664\\
\hline
DRFI & 0.919 & 0.692 & 0.787 & 0.665 & 0.670\\
\hline
DSR & 0.886 & 0.645 & 0.737 & 0.626 & 0.611\\
\hline
GMR & 0.909 & 0.664 & 0.740 & 0.610 & 0.597\\
\hline
HDCT & 0.884 & 0.604 & 0.705 & 0.609 & 0.602\\
\hline
HS & 0.902 & 0.637 & 0.731 & 0.616 & 0.585\\
\hline
\end{tabular}
\end{center}
\vspace{-0.15in}
\caption{The F-measure scores of salient region detection algorithms on five popular datasets. The best score is marked in bold.}\vspace{-0.1in}
\label{tab:result_table_fscore}
\end{table}
\begin{table}
\scriptsize
\begin{center}
\begin{tabular}{|c|c|c|c|c|c|}
\hline
& ASD & PASCAL-S & ECSSD & DUT-OMRON & THUR15K\\
\hline
Ours & \textbf{0.035} & \textbf{0.121} & \textbf{0.080} & 0.091 & \textbf{0.095}\\
\hline
MCDL & \textbf{0.035} & 0.142 & 0.102 & \textbf{0.089} & 0.102\\
\hline
MDF & 0.051 & 0.142 & 0.108 & 0.092 & 0.127\\
\hline
LEGS & 0.063 & 0.155 & 0.119 & 0.133 & 0.125\\
\hline
DRFI & 0.085 & 0.196 & 0.166 & 0.155 & 0.150\\
\hline
DSR & 0.080 & 0.205 & 0.173 & 0.139 & 0.142\\
\hline
GMR & 0.075 & 0.217 & 0.189 & 0.189 & 0.181\\
\hline
HDCT & 0.119 & 0.229 & 0.199 & 0.164 & 0.177\\
\hline
HS & 0.111 & 0.262 & 0.228 & 0.227 & 0.218\\
\hline
\end{tabular}
\end{center}
\vspace{-0.15in}
\caption{The Mean Absolute Error(MAE) of salient region detection algorithms on five popular datasets. The best score is marked in bold.}\vspace{-0.15in}
\label{tab:result_table_mae}
\end{table}
We evaluated the performance of our algorithm using various datasets. The \textbf{MSRA10K}~\cite{msra10k} is a dataset with 10,000 images which includes the \textbf{ASD} dataset~\cite{Achanta09cvpr}. Most images in this dataset contains single object. The \textbf{PASCAL-S}~\cite{pascals} is generated from the PASCAL VOC dataset~\cite{pascal} and contains 850 natural images. The \textbf{ECSSD}~\cite{hs} contains 1,000 images which have semantic meaning in their ground truth segmentation. It also contains images with complex structures. The \textbf{DUT-OMRON}~\cite{gmr} has 5,168 high quality images and the \textbf{THUR15K}~\cite{thur15k} contains 6,232 images of specific classes.
We trained our model using 9,000 images from the MSRA10K dataset after excluding the same images in ASD dataset. We did not use validation set and trained the model until its training data loss converges. From each image, we use about 30 salient superpixels and 70 non-salient superpixels; around 0.9 million input data are generated. \rev{The layers of VGG16 model are fixed by setting the learning rate equal to zero. For other layers, we initialize the weights by the ``xavier'' (caffe parameter), and we set the base learning rate equal to 0.001.} We use stochastic gradient descent method with momentum 0.9 and decrease running rate 90\% when training loss does not decrease. Training our model takes 3 hours for 100,000 iterations with mini-batch size 128.
Our results were compared with MCDL~\cite{mcdl}, MDF~\cite{mdf}, LEGS~\cite{legs}, DRFI~\cite{drfi}, DSR~\cite{dsr}, GMR~\cite{gmr}, HDCT~\cite{hdct}, and HS~\cite{hs}, which are the state-of-the-art algorithms. DRFI, DSR, GMR, HDCT and HS use low level features and MCDL, MDF and LEGS utilize deep CNN for high level context. We obtained the result images from the project site of each algorithm or the benchmark evaluation~\cite{SalObjBenchmark}. The results which were not provided were generated from the authors' source codes published in the web. The comparisons on Precision-Recall(PR) graph and Mean Absolute Error(MAE) graph are presented in \Figref{compare}. Maximum F-measure scores and MAE values are also described in \Tabref{result_table_fscore} and \Tabref{result_table_mae}. We used the evaluation codes used in the benchmark paper~\cite{SalObjBenchmark}. The PR graph and f-measure score tend to be more informative than ROC curve because salient pixels are usually less than non-salient~\cite{SalObjBenchmark}. Following the criteria by Achanta et. al.~\cite{Achanta09cvpr}, we moved the threshold from 0 to 255 to generate binary masks($M$). Using the ground truth($G$), the precision and recall is calculated as follows:
\begin{equation}
Precision = \frac{\left | M\bigcap G \right |}{\left | M \right |},\quad
Recall = \frac{\left | M\bigcap G \right |}{\left | G \right |}
\end{equation}
We also reported the F-Measure score which is a balanced measurement between precision and recall as follows:
\begin{equation}
F_\beta = \frac{(1+\beta^2)Precision \times Recall}{\beta^2 \times Precision + Recall}
\end{equation}
where $\beta^2$ is typically set to 0.3. We visualized f-measure score for the different thresholds and reported the maximum f-measure score which well describes the overall detection performance~\cite{SalObjBenchmark}. In our algorithm, making binary masks using the high threshold around 240 generated good f-measure score.
The overlapping-based evaluations give higher score to methods which assign high saliency score to salient pixel correctly. However, the evaluation on non-salient regions can be unfair especially for the methods which successfully detect non-salient regions, but missed the detection of salient regions~\cite{SalObjBenchmark}. Therefore, we also calculated the mean absolute error(MAE) for fair comparisons as suggested by~\cite{SalObjBenchmark}. The MAE evaluates
the detection accuracy as follow:
\begin{equation}
MAE = \frac{1}{W\times H}\sum_{x=1}^{W}\sum_{y=1}^{H}\left | S(x,y) - G(x,y) \right |
\end{equation}
where $W$ and $H$ are width and height of an image, $S$ is the estimated saliency map and $G$ is the ground truth binary mask.
\begin{figure*}
\centering
\setlength\tabcolsep{1pt}
\begin{tabular}{ccccccccccc}
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/0643.jpg}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/0643.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/0643_DDE.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/0643_MCDL.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/0643_MDF.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/0643_LEGS.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/0643_DRFI.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/0643_DSR.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/0643_GMR.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/0643_HDCT.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/0643_HS.png}} \vspace{-0.15in}\\
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/sun_ajbsvlfgxtabdeia.jpg}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/sun_ajbsvlfgxtabdeia.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/sun_ajbsvlfgxtabdeia_DDE.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/sun_ajbsvlfgxtabdeia_MCDL.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/sun_ajbsvlfgxtabdeia_MDF.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/sun_ajbsvlfgxtabdeia_LEGS.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/sun_ajbsvlfgxtabdeia_DRFI.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/sun_ajbsvlfgxtabdeia_DSR.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/sun_ajbsvlfgxtabdeia_GMR.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/sun_ajbsvlfgxtabdeia_HDCT.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/low_contrast/sun_ajbsvlfgxtabdeia_HS.png}} \vspace{-0.15in}\\
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/sun_agrqdwijscuxzgvz.jpg}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/sun_agrqdwijscuxzgvz.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/sun_agrqdwijscuxzgvz_DDE.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/sun_agrqdwijscuxzgvz_MCDL.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/sun_agrqdwijscuxzgvz_MDF.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/sun_agrqdwijscuxzgvz_LEGS.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/sun_agrqdwijscuxzgvz_DRFI.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/sun_agrqdwijscuxzgvz_DSR.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/sun_agrqdwijscuxzgvz_GMR.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/sun_agrqdwijscuxzgvz_HDCT.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/sun_agrqdwijscuxzgvz_HS.png}} \vspace{-0.15in}\\
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/90354.jpg}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/90354.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/90354_DDE.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/90354_MCDL.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/90354_MDF.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/90354_LEGS.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/90354_DRFI.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/90354_DSR.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/90354_GMR.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/90354_HDCT.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/complicate_background/90354_HS.png}} \vspace{-0.15in}\\
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/sun_aolxbgnccbjmzwpi.jpg}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/sun_aolxbgnccbjmzwpi.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/sun_aolxbgnccbjmzwpi_DDE.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/sun_aolxbgnccbjmzwpi_MCDL.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/sun_aolxbgnccbjmzwpi_MDF.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/sun_aolxbgnccbjmzwpi_LEGS.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/sun_aolxbgnccbjmzwpi_DRFI.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/sun_aolxbgnccbjmzwpi_DSR.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/sun_aolxbgnccbjmzwpi_GMR.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/sun_aolxbgnccbjmzwpi_HDCT.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/sun_aolxbgnccbjmzwpi_HS.png}} \vspace{-0.15in}\\
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/405.jpg}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/405.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/405_DDE.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/405_MCDL.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/405_MDF.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/405_LEGS.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/405_DRFI.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/405_DSR.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/405_GMR.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/405_HDCT.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/multi_objs/405_HS.png}} \vspace{-0.15in}\\
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/touch_boundary/721.jpg}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/touch_boundary/721.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/touch_boundary/721_DDE.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/touch_boundary/721_MCDL.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/touch_boundary/721_MDF.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/touch_boundary/721_LEGS.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/touch_boundary/721_DRFI.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/touch_boundary/721_DSR.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/touch_boundary/721_GMR.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/touch_boundary/721_HDCT.png}} &
\subfloat{\includegraphics[width=0.084\textwidth]{images/analysis/case_study/touch_boundary/721_HS.png}}\\
(a) Inputs & (b) GT & (c) Ours & (d) MCDL & (e) MDF & (f) LEGS & (g) DRFI & (h) DSR & (i) GMR & (j) HDCT & (k) HS
\end{tabular} \vspace{-0.15in}
\caption{Visual comparisons of our results and the state-of-the-art methods on difficult scenes. (a) original image, (b) ground truth, (c) Ours (d) MCDL~\cite{mcdl} (e) MDF~\cite{mdf} (f) LEGS~\cite{legs} (g) DRFI~\cite{drfi}, (h) DSR~\cite{dsr}, (i) GMR~\cite{gmr}, (j) HDCT~\cite{hdct} (k) HS~\cite{hs}. From the top to the bottom, row 1-2 are the images with a low-contrast salient object, row 3-4 are with complicated background, row 5-6 are with multiple salient objects and row 7 is with a salient object touching the image boundaries.}\vspace{-0.15in}
\label{fig:visualize_compare2}
\end{figure*}
\begin{figure}
\centering
\setlength\tabcolsep{1pt}
\begin{tabular}{ccccc}
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/multi_color/sun_arehbojazeuqndvs.jpg}} &
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/multi_color/sun_arehbojazeuqndvs.png}} &
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/multi_color/sun_arehbojazeuqndvs_DDE.png}} &
\subfloat{\includegraphics[width=0.19\linewidth] {images/analysis/case_study/multi_color/sun_arehbojazeuqndvs_MCDL.png}} &
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/multi_color/sun_arehbojazeuqndvs_MDF.png}} \vspace{-0.15in}\\
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/complicate_background/sun_bedphsztovjnwhjk.jpg}} &
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/complicate_background/sun_bedphsztovjnwhjk.png}} &
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/complicate_background/sun_bedphsztovjnwhjk_DDE.png}} &
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/complicate_background/sun_bedphsztovjnwhjk_MCDL.png}}&
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/complicate_background/sun_bedphsztovjnwhjk_MDF.png}}\vspace{-0.15in}\\
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/small_not_centered/sun_axrsddesgwhkfuig.jpg}} &
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/small_not_centered/sun_axrsddesgwhkfuig.png}} &
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/small_not_centered/sun_axrsddesgwhkfuig_DDE.png}} &
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/small_not_centered/sun_axrsddesgwhkfuig_MCDL.png}}&
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/small_not_centered/sun_axrsddesgwhkfuig_MDF.png}}\vspace{-0.15in}\\
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/small_not_centered/sun_alfklkcgxhhyubjz.jpg}} &
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/small_not_centered/sun_alfklkcgxhhyubjz.png}} &
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/small_not_centered/sun_alfklkcgxhhyubjz_DDE.png}} &
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/small_not_centered/sun_alfklkcgxhhyubjz_MCDL.png}}&
\subfloat{\includegraphics[width=0.19\linewidth]{images/analysis/case_study/small_not_centered/sun_alfklkcgxhhyubjz_MDF.png}}\\
(a) & (b) & (c) & (d) & (e) \\
\end{tabular} \vspace{-0.1in}
\caption{Failure cases of our algorithm. (a) Input images, (b) Ground truths, Results of (c) our method, (d) MCDL~\cite{mcdl}, (e) MDF~\cite{mdf}.}\vspace{-0.15in}\label{fig:failure_cases}
\end{figure}
In \Figref{compare}, the PR-graph indicates our algorithm achieves the better performance than the previous works including MDF and MCDL which also utilize CNN models. Our algorithm shows the lowest MAE and the highest maximum F-measure score on most of the datasets. Visual comparisons of various methods are shown in \Figref{visualize_compare2}. We visualize the results from various difficult cases including low-contrast objects (row 1-3), complicate backgrounds (row 4-6), small salient objects (row 7-8), multiple salient objects(row 9-10) and touching boundary examples (row 11-12). Our algorithm shows especially good performance on images with low-contrast salient objects and complicated backgrounds, and also works well on other difficult scenes.
In \Figref{failure_cases}, we reported some failure cases. The first and the second results contain correct salient objects but also highlight non-salient regions. The third and fourth examples have the extremely difficult scenes with a small, low-contrast and boundary touching the salient object. Because these kinds of data are not provided much by the training data, MSRA10K, we may further improve the performance with richer training data. For these difficult scenes, MCDL~\cite{mcdl} and MDF~\cite{mdf} also fail to find the salient objects precisely.
The running time of our algorithm was measured from the ECSSD dataset, where tested images were of size $400\times 300$. We used a server machine with intel i7 CPU, 8GB RAM and GTX Titan-Black for testing. Our model, developed by C++ and based on Caffe~\cite{caffe} library, took around 0.5 seconds per image. The training of our deep CNN took around 3 hours under the same environment. The short training time and testing time is also an advantage of our method. This is due to the sharing of our high level features which only need to be computed once for a whole image.
\section{Conclusion}
In this paper, we have introduced a new method to integrate the low-level and the high-level features for saliency detection. The Encoded Low-level Distance map (ELD-map) has stronger discriminative power than the original low-level feature distances to measure similarities or dissimilarities among superpixels. When concatenated with the high-level features from the deep CNN model (VGG16), our method shows the state-of-the-art performance in terms of both visual qualities and quantitative comparisons. As a future work, we are planning to explore more various CNN architectures to further improve the performance of our work.
\section*{Acknowledgement}
This work was partially supported by HRHRP(High Risk High Return Project of KAIST) and the MOTIE(The Ministry of Trade, industry \& Energy), Korea, under the Technology Innovation Program supervised by KEIT(Korea Evaluation Institute of Industrial Technology), 10045252, Development of robot task intelligence technology. Futhermore, this research was also supported by the National Research Foundation of Korea (NRF) under Grant NRF-2014R1A2A2A01003140.
{\small
\bibliographystyle{ieee}
|
\section{Introduction}
The classical Poincar\'{e}-Bendixson Theorem describes the asymptotic behavior of flows in the plane.
The topology of the plane puts severe restrictions on the behavior of limit sets.
The Poincar\'{e}-Bendixson Theorem states for example that if the $\alpha$- and the $\omega$-limit set of a bounded trajectory of a smooth flow in ${ \mathbb{R}}^2$ does not contain equilibria, then the limit set is a periodic orbit. Several generalizations of this theorem have appeared in the literature. For instance the generalization of the Poincar\'e-Bendixson Theorem to two-dimensional manifolds, cf.\ \cite{abz}.
In \cite{hajek} an extension to continuous (two-dimensional) flows is obtained and
\cite{ciesielski} provides a generalization to semi-flows.
The remarkable result by Fiedler and Mallet-Paret \cite{fiedlermallet} establishes
an extension of the Poincar\'{e}-Bendixson Theorem to infinite dimensional dynamical systems
with a positive Lyapunov function. They apply their result
to \emph{scalar} parabolic equations of the form
\begin{equation}\label{rd}
u_s=u_{xx}+f(x,u,u_x),\quad x\in S^1, f\in C^2.
\end{equation}
In this paper we establish a version of the Poincar\'{e}-Bendixson Theorem for
bounded orbits of the nonlinear Cauchy-Riemann equations in the plane. A bounded orbit of the nonlinear Cauchy-Riemann equations
is a (smooth) bounded function $u\colon { \mathbb{R}}\times S^1\to { \mathbb{R}}^2$, which satisfies
\begin{equation}
\label{nonlinearCR}
u_s-J\bigl(u_t-F(t,u)\bigr)=0,
\end{equation}
with $u(s,t)=\bigl(p(s,t),q(s,t)\bigr)$, $s\in { \mathbb{R}}$, $t\in S^1={ \mathbb{R}}/{ \mathbb{Z}}.$ Here $F(t,u)$ is a smooth non-autonomous vector field on ${ \mathbb{R}}^2$ and
$J$ is the symplectic matrix
$$
J=\left(
\begin{array}{cc}
0 & -1\\
1 & 0
\end{array}
\right).
$$
We prove that the asymptotic behavior, as $s$ goes to infinity, of bounded solutions of Equation (\ref{nonlinearCR}) is as simple
as the limiting behavior of flows in ${ \mathbb{R}}^2.$
Equation (\ref{nonlinearCR}) arises in many different contexts, in particular in Floer homology literature,
where the vector field has the form $F(t,u)=F_{H}(t,u),$ i.e. $F_H$ is \emph{Hamiltonian}, cf.\ \cite{mcduffsalamon}.
The latter implies that there exists a time-dependent Hamiltonian function $H(t,\cdot):{ \mathbb{R}}^2\to { \mathbb{R}}$, such that $F_H(t,u)=J\nabla H(t,u)$.
In the Hamiltonian case the Cauchy-Riemann equations are the $L^2$-gradient flow of the Hamilton action
and as such
bounded solutions of (\ref{nonlinearCR}) will, generically, be connections orbits between equilibria.
The Hamilton action is an ${ \mathbb{R}}$-valued Lyapunov function for the Cauchy-Riemann equations.
In this paper we obtain a result about the asymptotic behavior of orbits for \emph{general} vector fields $F$ in the Cauchy-Riemann equations.
A bounded solution of the Cauchy-Riemann equations is a smooth function $u$ with $|u(s,t)|\le C$.
Let $X$ be the set of solutions bounded
by a fixed (but arbitrary) constant (in the present work we will always choose $C=1$). Endowed with the compact-open topology $X$ is a compact Hausdorff space. The translation invariance of the Cauchy-Riemann equations in the $s-$variable
defines an induced flow
on $X$ by translating solutions in the $s$-variable.
A bounded solution $u$ can be identified with its orbit $\gamma(u),$ and $\alpha(u)$ and $\omega(u)$ are well-defined elements of $X$.
In Section\ \ref{sectionmainresult} we given a detailed account of the space $X$ and the induced translation flow
in the context of the Cauchy-Riemann equations.
\begin{theorem}\label{poincare-bendixson1}
Let $u$ be a bounded solution of the Cauchy-Riemann Equations (\ref{nonlinearCR}).
Then, for the $\omega$-limit set $\omega(u)$ the following dichotomy holds:
\begin{enumerate}
\item[(i)] either $\omega(u)$ consists of exactly one $s$-periodic orbit, or
\item[(ii)] $\alpha(v)\subseteq E$ and $\omega(v)\subseteq E$, for every $v\in \omega(u)$,
\end{enumerate}
where $E$ denotes the set of equilibria of Equation \eqref{nonlinearCR}, i.e. the 1-periodic solutions of the vector field $F(t,x)$.
The same dichotomy holds for the $\alpha$-limit set $\alpha(u)$.
\end{theorem}
As in the classical Poincar\'{e}-Bendixson Theorem alternative (ii) allows for $\omega(u)$ (or $\alpha(u)$) to consist of homoclinic and heteroclinic solutions joining equilibria.
%
An important reason why a generalization of the Poincar\'{e}-Bendixson holds for the Cauchy-Riemann equations is that there exists a continuous projection onto ${ \mathbb{R}}^2$, which is defined as follows.
Let $t_0\in S^1$ be arbitrary, then define
\begin{equation}\label{pi}
\begin{array}{lccl}
\pi_{t_0}:&X&\to& { \mathbb{R}}^2\\
&u=(p,q)&\mapsto& \pi_{t_0}(u)=\bigl(p(0,t_0),q(0,t_0)\bigr).
\end{array}
\end{equation}
\begin{theorem}\label{teorema2}
Under the assumptions of Theorem \ref{poincare-bendixson1} the projection
$$
\pi_{t_0} \colon \omega(u)\to\pi_{t_0}\omega(u)
$$
is a homeomorphism onto its image.
\end{theorem}
In general, if a flow allows a continuous Lyapunov function, then limit sets of orbits consist only of equilibria. Such flows are referred to as
gradient-like flows.
Theorem \ref{pb} in this paper gives an abstract extension of the Poincar\'e-Bendixson Theorem
to flows that allow a \emph{discrete} Lyapunov function.
In particular Theorem \ref{pb} implies Theorem \ref{poincare-bendixson1}.
Note that Theorem \ref{teorema2} together with the classical Poincar\'{e}-Bendixson Theorem also implies Theorem \ref{poincare-bendixson1}.
An abstract version of Theorem \ref{teorema2} is proved in Section \ref{sec:strvers}.
The main differences between the results in \cite{fiedlermallet} for parabolic equations and the results in this paper are that the Cauchy-Riemann equations do not define a well-posed initial value problem and, more importantly, the discrete Lyapunov functions that are considered in this paper are \emph{not} bounded from below.
Furthermore, the results obtained in this paper do not assume differentiability of the flow, nor does the flow need to be defined on a Banach space.
We believe that most of the results in this paper extendable to semi-flows, e.g.
\cite{ciesielski}.
In Section \ref{sectionmainresult} we analyze the main properties of the Cauchy-Riemann equations (\ref{nonlinearCR}) and additional details are given in Section \ref{proofoflemmas}. In Section \ref{abstractsetting} we set up an abstract setting which generalizes the properties of the Cauchy-Riemann equations. In Sections \ref{sectionsv} and \ref{sec:strvers} a full proof of the Poincar\'{e}-Bendixson Theorem is given adapted to the abstract setting introduced in Section \ref{abstractsetting}.
\section{The Cauchy-Riemann Equations}
\label{sectionmainresult}
The initial value problem of Equation (\ref{nonlinearCR}) is ill-posed.
Given an initial value $u(0,t) = u_0(t)$, there may not exist solutions $u(s,t)$ of Equation (\ref{nonlinearCR}) for any $s$-time interval $I\ni 0$. We therefore
restrict our attention to
bounded solutions, which are
functions $u\in C^1({ \mathbb{R}}\times S^1;{ \mathbb{R}}^2)$ that satisfy Equation (\ref{nonlinearCR}) and for which
\begin{equation}
\label{eqn:ent-sol}
|u(s,t)| <\infty,\quad \text{for all } (s,t) \in { \mathbb{R}}\times S^1.
\end{equation}
Since each bounded solution may be considered separately, it suffices to look at the space $X$ of functions $u\in C^1({ \mathbb{R}}\times S^1;{ \mathbb{R}}^2)$ satisfying Equation (\ref{nonlinearCR}) and
$$
|u(s,t)| \le C,\quad \text{for all } (s,t) \in { \mathbb{R}}\times S^1,
$$
for some fixed arbitrary constant $C>0.$ Note that, without loss of generality, we can choose $C=1.$
On $X$ we consider the compact-open topology, i.e.
\begin{equation}\label{compactopen}
u^n\xrightarrow{X} u \quad\iff \quad u^n \xrightarrow{C^0_{\text{loc}}} u
\end{equation}
where the latter indicates uniform convergence on compact subsets of $S^1\times { \mathbb{R}}.$
Since
$C^0({ \mathbb{R}}\times S^1;{ \mathbb{R}}^2)$, endowed with the compact-open topology, is Hausdorff (see \cite[\S 47]{munkres}),
and $X \subset C^0({ \mathbb{R}}\times S^1;{ \mathbb{R}}^2)$,
also $X$ is a Hausdorff space.
\begin{proposition}
\label{Xcompact}
The solution space $X$
is a compact Hausdorff space.
\end{proposition}
\begin{proof}
See Section \ref{proofoflemmas}.
\end{proof}
Identify the translation mapping $(s,t) \mapsto (s+\sigma,t)$ by $\sigma \in { \mathbb{R}}$ and consider the evaluation mapping
\begin{equation}\label{phi}
{ \mathbb{R}} \times C^0({ \mathbb{R}}\times S^1;{ \mathbb{R}}^2) \to C^0({ \mathbb{R}}\times S^1;{ \mathbb{R}}^2) ,\quad (\sigma,u) \mapsto \phi^\sigma(u) = u\circ \sigma.
\end{equation}
\begin{lemma}
\label{lem:evalv1}
The evaluation mapping $(\sigma,u) \mapsto \phi^\sigma(u)$
is continuous with respect to the compact-open topology on $C^0({ \mathbb{R}}\times S^1;{ \mathbb{R}}^2)$.
\end{lemma}
\begin{proof}
Since ${ \mathbb{R}}\times S^1$ is a locally compact Hausdorff space, the composition of mappings
$$ C^0({ \mathbb{R}}\times S^1;{ \mathbb{R}}\times S^1) \times C^0({ \mathbb{R}}\times S^1;{ \mathbb{R}}^2) \to C^0({ \mathbb{R}}\times S^1;{ \mathbb{R}}^2),
$$
is continuous with respect to the compact-open topologies on $C^0({ \mathbb{R}}\times S^1;{ \mathbb{R}}\times S^1)$ and $C^0({ \mathbb{R}}\times S^1;{ \mathbb{R}}^2)$,
see \cite[\S 46]{munkres}. The translation $\sigma$ as defined above is a continuous mapping in $C^0({ \mathbb{R}}\times S^1;{ \mathbb{R}}\times S^1)$,
which proves the lemma.
\end{proof}
Since the Cauchy-Riemann Equations are $s$-translation invariant, $u\in X$ implies that
$\phi^\sigma(u) \in X.$ We therefore obtain a continuous mapping ${ \mathbb{R}}\times X \to X$, again denoted by $\phi^\sigma(u)$.
Also,
$$
\phi^\sigma\bigl(\phi^{\sigma'}(u)\bigr) = (u\circ \sigma')\circ \sigma = u\circ (\sigma+\sigma') = \phi^{\sigma+\sigma'}(u),
$$
which shows that $\phi^\sigma$ defines a continuous flow on $X$. A continuous flow on $X$ is a continuous mapping $(\sigma,u) \mapsto \phi^\sigma(u) \in X$, such that $\phi^0(u) = u$ and $\phi^{\sigma+\sigma'}(u) =\phi^\sigma(\phi^{\sigma'}(u))$, for all $\sigma,\sigma' \in { \mathbb{R}}$ and for all $u\in X$.
Consider the evaluation mapping $\iota: C^0({ \mathbb{R}}\times S^1;{ \mathbb{R}}^2) \to C^0(S^1;{ \mathbb{R}}^2)$, defined by
$$
u(\cdot,\cdot) \mapsto u(0,\cdot).
$$
By a similar argument as in Lemma \ref{lem:evalv1} it follows that the mapping $\iota$ is a continuous mapping with respect to the compact-open topology on $C^0(S^1;{ \mathbb{R}}^2).$
\begin{proposition}
\label{prop:aron}
The mapping $\iota: X \to {\mathscr{X}}$, with ${\mathscr{X}} = \iota(X)$, is a homeomorphism.
\end{proposition}
\begin{proof}
See Section \ref{proofoflemmas}.
\end{proof}
For $\phi^\sigma$ we have the following commuting diagram:
$$
\begin{diagram}
\node{{ \mathbb{R}}\times X} \arrow{e,l}{\phi^\sigma} \arrow{s,l}{{\rm id} \times \iota}\node{X} \arrow{s,r}{\iota}\\
\node{{ \mathbb{R}}\times {\mathscr{X}}} \arrow{e,l}{T^\sigma} \node{{\mathscr{X}},}
\end{diagram}
$$
with $u(0,\cdot) \mapsto T^\sigma(u(0,\cdot)) = u(\sigma,\cdot)$, and $T^\sigma$ defines a flow on ${\mathscr{X}}$.
The principal tool in the proof of Theorem \ref{poincare-bendixson1} is the existence of an unbounded, discrete Lyapunov function, which decreases along orbits of the flow $\phi^\sigma.$
Let $u^1, u^2 \in X$ be two solutions, with $ u^1\not=u^2$,
such that the function $t\mapsto u^1(s,t)-u^2(s,t)$ is nowhere zero. Then
define $w:= u^1-u^2\in C^0({ \mathbb{R}}\times S^1;{ \mathbb{R}}^2).$
The $s$-dependent winding number ${\mathscr{W}}$ of the pair $(u^1,u^2)$ is defined as the winding number of $w$ about the origin, i.e.
\begin{equation}
\label{eqn:wind}
{\mathscr{W}}\bigl(u^1(s,\cdot),u^2(s,\cdot)\bigr):={\mathscr{W}}(w(s,\cdot),0)=\frac{1}{2\pi}\int_{S^1} w^*\theta,
\end{equation}
where
$\theta=\frac{-q dp+p dq}{p^2+q^2}$ is a closed one-form on ${ \mathbb{R}}^2\setminus \{0\}$, cf.\ \cite{GVVW}.
A pair of solutions $(u^1, u^2)\in X\times X$ is said to be \emph{singular} if they belong to the \lq\lq crossing\rq\rq \ set defined by
$$
\Sigma_X:=\{(u^1,u^2)\in X\times X : \exists~ s\in { \mathbb{R}}\ :\ u^1(s,t)=u^2(s,t)\ \text{for some } t\in S^1\}.
$$
The Lyapunov function
$W\colon (X\times X)\setminus \Sigma_X \to { \mathbb{Z}}$ is defined by
\begin{equation}
\label{defn:w}
W(u^1,u^2) := {\mathscr{W}}\bigl( \iota(u^1),\iota(u^2)\bigr).
\end{equation}
The Lyapunov function $W$ is continuous on $(X\times X)\setminus \Sigma_X$ and constant on connected components.
The set $\Sigma_X$ is a closed in $X\times X,$ since uniform convergence on compact sets implies point-wise convergence.
The Lyapunov function $W$ is a symmetric:
$$
W(u^1,u^2)=W(u^2,u^1),\ \ \ \ \ \text{for all} \ (u^1,u^2)\not\in \Sigma_{X}.
$$
The \emph{diagonal} in $X\times X$ is defined by
$$
\Delta:=\{(u^1,u^2)\in X\times X: u^1=u^2\},
$$
and $\Delta\subset \Sigma_X$.
The flow $\phi^\sigma$ induces a product flow on $X\times X$ via $(u^1,u^2) \mapsto \bigl(\phi^\sigma(u^1),\phi^\sigma(u^2)\bigr)$,
and the diagonal $\Delta$ is invariant for the product flow.
For the action of the flow on $W$ we have
\begin{eqnarray*}
W\bigl(\phi^\sigma(u^1),\phi^\sigma(u^2)\bigr) &=& {\mathscr{W}}\bigl(\iota\circ\phi^\sigma(u^1),\iota\circ\phi^\sigma(u^2)\bigr)\\
&=& {\mathscr{W}}\bigl(T^\sigma( \iota(u^1)),T^\sigma(\iota(u^2))\bigr) = {\mathscr{W}}(u^1(\sigma,\cdot),u^2(\sigma,\cdot)).
\end{eqnarray*}
In \cite{GVVW} it is proved that the set $\Sigma_{X}\setminus\Delta$ is ``thin" in $X\times X$,
which is the content of the following proposition.
\begin{proposition}[see \cite{GVVW}]
\label{thinness}
For every singular solution pair $(u^1,u^2)\in\Sigma_{X}\setminus\Delta$, there exists an ${\varepsilon}_0 = {\varepsilon}(u^1,u^2)>0$, such that
$(\phi^{\sigma}(u^1),\phi^{\sigma}(u^2))\not\in\Sigma_{X}$, for all $\sigma\in (-{\varepsilon}_0,{\varepsilon}_0)\setminus \{0\}$.
\end{proposition}
Orbits which intersect $\Sigma_{X}$ ``transversely'' (and thus are not in the diagonal) instantly escape from $\Sigma_X$ and the diagonal $\Delta$ is the maximal invariant set contained in $\Sigma_{X}.$
The following proposition proves that
$W$ is a discrete Lyapunov function.
\begin{proposition}[see \cite{GVVW}]
\label{prop:lyap}
For every pair of singular solutions $(u^1,u^2)\in\Sigma_{X}\setminus\Delta$, there exists an ${\varepsilon}_0 = {\varepsilon}(u^1,u^2)>0$, such that
$
W(\phi^{\sigma}(u^1),\phi^{\sigma}(u^2))>W(\phi^{\sigma'}(u^1),\phi^{\sigma'}(u^2))$, for all $\sigma\in (-{\varepsilon}_0,0)$ and all $\sigma' \in (0,{\varepsilon}_0)$.
\end{proposition}
For a given $u\in X$ define the $\alpha$- and $\omega$-limit sets as:
$$
\begin{array}{rcl}
\omega(u)&:=&\{w\in X: \phi^{\sigma_n}(u)\xrightarrow{X}w, \text{\ for\ some }\ \sigma_n\to\infty\},\\
\alpha(u)&:=&\{w\in X: \phi^{\sigma_n}(u)\xrightarrow{X}w, \text{\ for\ some }\ \sigma_n\to-\infty\}.
\end{array}
$$
The sets $\alpha(u)$ and $\omega(u)$ are closed invariant sets for the flow $\phi^\sigma$, see
\cite[Lemma 4.6 Chapter IV]{hajek}.
Since $X$ is compact, also $\alpha(u)$ and $\omega(u)$ are compact. Compactness of $X$ also implies that
$\alpha(u)$ and $\omega(u)$ are non-empty, see
\cite[Theorem 4.7 Chapter IV]{hajek}.
The Hausdorff property of $X$ and the continuity of the flow $\phi^\sigma$ imply
that $\alpha(u)$ and $\omega(u)$ are connected sets, see \cite[Theorem 4.7 Chapter IV]{hajek}.
Define the equilibria of $\phi^\sigma$ by
$$
E:=\{u\in X:\phi^{\sigma}(u)=u \ \ \text{for all} \ \sigma\in { \mathbb{R}}\}.
$$
Equilibria are functions $u= u(t)$
which satisfy the stationary equation
$
u_t=F(t,u).
$
\section{The abstract Poincar\'{e}-Bendixson Theorem}\label{abstractsetting}
The concepts introduced so far can be
embedded in a more abstract setting, which generalizes the work by Fiedler and Mallet-Paret in \cite{fiedlermallet}.
Let $\phi^\sigma$ be a continuous flow on a \emph{compact}
Hausdorff space $X.$ In the case of the Cauchy-Riemann equations the flow $\phi^{\sigma}$ is defined in (\ref{phi}), where the space $X$ is either the full solution space, or the space which consists of the closure of a single entire (bounded) orbit.
The notions of $\alpha$- and $\omega$-limit sets, defined in Section\ \ref{sectionmainresult} remain unchanged, and
$\alpha(u)$ and $\omega(u)$ are non-empty, compact, connected, invariant sets.
Let $\Delta=\{(u^1,u^2)\in X\times X\colon u^1=u^2\}$ be invariant for the product flow induced by $\phi^\sigma.$
We assume that there exist a closed \lq\lq thin\rq\rq\ singular set $\Sigma$, with $\Delta \subset \Sigma\subset X\times X,$
and functions $W \colon (X\times X)\setminus \Sigma\to { \mathbb{Z}}$ and $\pi:X\to\pi(X)\subset{ \mathbb{R}}^2,$ which satisfy the following five axioms:
\begin{listass}
\item\label{continuityofW} the function $W:X\times X\setminus\Sigma\to { \mathbb{Z}}$, is continuous and symmetric;
\item\label{Wandpi} the mapping $\pi:X\to \pi(X)\subset{ \mathbb{R}}^2$, is a continuous projection onto its (compact) image;
\item\label{piandsigmageneral} the set
$\{(u^1,u^2)\in X\times X\colon \pi(u^1)=\pi(u^2)\}$ is a subset of $\Sigma;$
\item\label{thingeneral} for every $(u^1,u^2)\in \Sigma\setminus\Delta,$ there exists an ${\varepsilon}_0 >0$, depending on $(u^1,u^2)$, such that
$(\phi^{\sigma}(u^1),\phi^{\sigma}(u^2))\not\in\Sigma$,
for all $\sigma \in (-{\varepsilon}_0,{\varepsilon}_0)\setminus \{0\}$;
\item\label{Wdropping}
for every $(u^1,u^2)\in \Sigma\setminus\Delta,$ there exists an ${\varepsilon}_0 >0$, depending on $(u^1,u^2)$, such that
$$
W(\phi^{\sigma}(u^1),\phi^{\sigma}(u^2))>W(\phi^{\sigma'}(u^1),\phi^{\sigma'}(u^2)),
$$
for all $ \sigma\in(-{\varepsilon}_0,0)$ and all $\sigma'\in (0,{\varepsilon}_0)$.
\end{listass}
Axioms (\ref{continuityofW})
(\ref{Wdropping})
are modeled on the properties of the non-linear Cauchy-Riemann Equations discussed in Section \ref{sectionmainresult}, with $\pi=\pi_{t_0}$ defined in (\ref{pi}).
The above axioms also
generalize the conditions in the work of Fiedler and Mallet-Paret in \cite{fiedlermallet}. Note that the function $W$ is a priori unbounded in the present case and the flow $\phi^\sigma$ does not necessarily regularize.
Under these assumptions we prove the following Theorem.
\begin{theorem}[Poincar\'{e}-Bendixson]\label{pb}
Let $\phi^\sigma$ be a continuous flow on a compact Hausdorff space $X.$ Let $\Sigma$ be a closed subset of $X\times X$, and let $W\colon (X\times X)\setminus\Sigma\to { \mathbb{Z}}$ and $\pi:X\to \pi(X)\subset { \mathbb{R}}^2$ be mappings as defined above, and which satisfy Axioms (\ref{continuityofW})-(\ref{Wdropping}).
Then, for $\omega(u)$ we have the following dichotomy
\begin{enumerate}
\item[(i)] either $\omega(u)$ consists of precisely one periodic orbit, or else
\item[(ii)] $\alpha(w)\subseteq E$ and $\omega(w)\subseteq E$, for every $w\in\omega(u).$
\end{enumerate}
The same dichotomy holds for $\alpha(u).$
\end{theorem}
As in \cite{fiedlermallet} the proof of Theorem \ref{pb} will be divided into the three Propositions listed below.
\smallskip
{\em
From this point on
we assume the hypotheses of Theorem \ref{pb}.
}
\begin{proposition}[Soft version]\label{sv}\label{softversion}
Let $u \in X$ and let $w\in \omega(u)$. Then $\omega(w)$ contains a periodic solution or an equilibrium. The same holds for $\alpha(w).$
\end{proposition}
Proposition \ref{sv} implies that, since $\omega(w)$ and $\alpha(w)$ are both subsets of $\omega(u)$, also $\omega(u)$ contains a periodic solution or an equilibrium.
\begin{proposition}\label{pr2}
Let $u \in X$ and let $w\in\omega(u)$. Then either,
\begin{enumerate}
\item[(i)] $\alpha(w)$ and $\omega(w)$ consist only of equilibria, or else
\item[(ii)] $\gamma(w)$ is a periodic orbit.
\end{enumerate}
\end{proposition}
\begin{proposition}\label{pr3}
Let $u \in X.$ If $\omega(u)$ contains a periodic orbit, then $\omega(u)$ is a single periodic orbit.
\end{proposition}
Proposition \ref{sv} is proved in Section \ref{sectionsv} and the proofs of Propositions \ref{pr2} and \ref{pr3} are carried out in Section \ref{sectionstv}.
Proposition \ref{sv} is used in the proof of Proposition \ref{pr2}.
Propositions \ref{pr2} and \ref{pr3} together imply Theorem \ref{pb}.
Section \ref{sectiontechnicallemmas} contains a number of technical lemmas.
Theorem \ref{pb} is applied directly to the Cauchy-Riemann equations which proves Theorem \ref{poincare-bendixson1}.
Theorem \ref{teorema2} is proved in Section \ref{sectionstv} with a formulation adapted to the abstract setting.
Finally, Section \ref{proofoflemmas} provides the proofs of Propositions \ref{Xcompact} and \ref{prop:aron}.
\section{The soft version}\label{sectionsv}
The hypotheses of Section \ref{abstractsetting} will be assumed for the remainder of the paper.
\begin{lemma}
\label{decreasing lemma}
For every pair $(u^1,u^2) \in (X\times X)\setminus \Delta$
the set $$A_{(u^1,u^2)}:=\{\sigma\in { \mathbb{R}}\colon \bigl(\phi^\sigma(u^1),\phi^\sigma(u^2)\bigr)\in \Sigma\}$$ consists of isolated points. Moreover, the mapping
$$
\sigma\mapsto W(\phi^\sigma(u^1),\phi^\sigma(u^2)),
$$
defined for $\sigma\in{ \mathbb{R}}\setminus A_{(u^1,u^2)},$
is a non-increasing function of $\sigma$ and is constant on the connected components of ${ \mathbb{R}}\setminus A_{(u^1,u^2)}$.
\begin{proof}
Suppose there exists an accumulation point $\sigma_n \to \sigma_*$, with $\sigma_n\in A_{(u^1,u^2)}.$
By definition $\bigl(\phi^{\sigma_n}(u^1),\phi^{\sigma_n}(u^2)\bigr) \in \Sigma\setminus \Delta$, since $\Delta$ is invariant and
$(u^1,u^2) \not \in \Delta$. By the continuity of
$\phi^\sigma$ we have
$$
\bigl(\phi^{\sigma_n }(u^1),\phi^{\sigma_n }(u^2)\bigr)\xrightarrow{n\to \infty} \bigl(\phi^{\sigma_*}(u^1),\phi^{\sigma_*}(u^2)\bigr)\in \Sigma,
$$
since $\Sigma$ is closed. This proves that $\sigma_* \in A_{(u^1,u^2)}$.
The invariance of $\Delta$ implies that $\bigl(\phi^{\sigma_*}(u^1),\phi^{\sigma_*}(u^2)\bigr)\in \Sigma\setminus \Delta$.
By Axiom (A4) there exists an ${\varepsilon}_0 >0$, depending on $\bigl(\phi^{\sigma_*}(u^1),\phi^{\sigma_*}(u^2)\bigr)$, such that
$(\phi^{\sigma_*+{\varepsilon}}(u^1),\phi^{\sigma_*+{\varepsilon}}(u^2))\not\in\Sigma$,
for all $ {\varepsilon} \in (-{\varepsilon}_0,{\varepsilon}_0)\setminus \{0\}$. This contradicts the fact that $\sigma_*$ is an accumulation point.
The set $A_{(u^1,u^2)}$ is a discrete and ordered set. Let $\sigma'<\sigma''$ be two consecutive points in $A_{(u^1,u^2)}$.
By Axiom (A1), $W$ is continuous and ${ \mathbb{Z}}$-valued, and therefore $W(\phi^\sigma(u^1),\phi^\sigma(u^2))$ is constant on
$\sigma \in (\sigma',\sigma'')$.
By Axiom (\ref{Wdropping}), $W(\phi^\sigma(u^1),\phi^\sigma(u^2))$ drops at
points in $A_{(u^1,u^2)}$, which shows that $W$ is non-increasing.
\end{proof}
\end{lemma}
\begin{lemma}
\label{lem:not-in-sigma}
Let $u\in X$ and $w\in \omega(u).$ For every $w^1,w^2 \in \clos\bigl(\gamma(w)\bigr)$ with $w^1\not=w^2,$ it holds that
$(w^1,w^2) \not\in \Sigma$.
\end{lemma}
\begin{proof} We argue by contradiction.
Suppose $(w^1,w^2) \in \Sigma\setminus \Delta$, then,
by the Axioms (\ref{thingeneral}) and (\ref{Wdropping}), there exists an ${\varepsilon}_0>0$ such that
$\bigl(\phi^{\sigma}(w^1),\phi^{\sigma}(w^2)\bigr)\not\in\Sigma$
for all $\sigma \in (-{\varepsilon}_0,{\varepsilon}_0)\setminus \{0\}$
and
$$
W(\phi^{\sigma}(w^1),\phi^{\sigma}(w^2))>W(\phi^{\sigma'}(w^1),\phi^{\sigma'}(w^2)),
$$
for all $\sigma \in (-{\varepsilon}_0,0)$ and all $\sigma' \in (0,{\varepsilon}_0)$.
Set $\sigma = -{\varepsilon}$ and $\sigma' = {\varepsilon}$, with $0<{\varepsilon} <{\varepsilon}_0$.
Since $w^1, w^2\in\clos(\gamma(w)),$
there exist $s_1, s_2 \in { \mathbb{R}}$ such that $\bigl(\phi^{s_1\pm {\varepsilon}}(w),\phi^{s_2\pm {\varepsilon}}(w)\bigr) \not \in \Sigma$ and
$\bigl(\phi^{s_1\pm {\varepsilon}}(w),\phi^{s_2\pm {\varepsilon}}(w)\bigr)$ is close to
$\bigl(\phi^{\pm{\varepsilon}}(w^1),\phi^{\pm{\varepsilon}}(w^2)\bigr)$.
The continuity of $W$ (Axiom (A1)) implies that
\begin{equation}\label{dec}
\begin{array}{llllll}
W(\phi^{s_1+{\varepsilon}}(w),\phi^{s_2+{\varepsilon}}(w))&=&W(\phi^{{\varepsilon}}(w^1),\phi^{{\varepsilon}}(w^2))& & & \\
&<&W(\phi^{-{\varepsilon}}(w^1),\phi^{-{\varepsilon}}(w^2))\\
&=&W(\phi^{s_1-{\varepsilon}}(w),\phi^{s_2-{\varepsilon}}(w)).
\end{array}
\end{equation}
Since $\gamma(w)\subset \omega(u)$ is an invariant subset of $\omega(u)$,
the definition of $\omega$-limit set and the continuity of $\phi^{\sigma}$ imply that there exists a sequence $\sigma_n\to \infty$,
as $n\to \infty$, such that
\begin{equation}
\label{eqn:conv-3}
\phi^{\sigma_n+ s_1 - s_2 \pm{\varepsilon}}(u)\to \phi^{s_1\pm{\varepsilon}}(w)\quad\hbox{and}\quad
\phi^{\sigma_n\pm{\varepsilon}}(u)\to \phi^{s_2\pm{\varepsilon}}(w).
\end{equation}
Since $\sigma_n$ is divergent we may assume
\begin{equation}
\label{eqn:choice-2}
\sigma_{n+1}>\sigma_n+2{\varepsilon},\quad \text{ for all } ~n.
\end{equation}
Inequality (\ref{dec}), the convergence in (\ref{eqn:conv-3}), Axiom (A1) (continuity) and the fact that $W$ is locally constant
(Lemma \ref{decreasing lemma}), imply, for $\sigma_n\to\infty$, that
\begin{eqnarray}
W(\phi^{\sigma_n+s_1-s_2+{\varepsilon}}(u),\phi^{\sigma_n+{\varepsilon}}(u))&=&W(\phi^{s_1+{\varepsilon}}(w),\phi^{s_2+{\varepsilon}}(w))\nonumber\\
&<&W(\phi^{s_1-{\varepsilon}}(w),\phi^{s_2-{\varepsilon}}(w))\nonumber\\
&=&W(\phi^{\sigma_n+s_1-s_2-{\varepsilon}}(u),\phi^{\sigma_n-{\varepsilon}}(u)).\nonumber
\end{eqnarray}
Combining the latter with (\ref{eqn:choice-2}) and the fact that $W$ is non-increasing implies that
$$
W(\phi^{\sigma_{n+1}+s_1-s_2-{\varepsilon}}(u),\phi^{\sigma_{n+1}-{\varepsilon}}(u)) <
W(\phi^{\sigma_n+s_1-s_2-{\varepsilon}}(u),\phi^{\sigma_n-{\varepsilon}}(u)),
$$
for all $n$.
From this inequality we deduce that $\sigma \mapsto W(\phi^{\sigma+s_1-s_2}(u),\phi^{\sigma}(u))$ has infinitely many jumps and therefore
$$
W(\phi^{\sigma+s_1-s_2}(u),\phi^{\sigma}(u))
\to -\infty,\quad\hbox{as}\quad \sigma \to \infty.
$$
On the other hand, the continuity of $W$ and Equation (\ref{eqn:conv-3}) yield
$$
W(\phi^{\sigma_n+s_1-s_2+{\varepsilon}}(u),\phi^{\sigma_n+{\varepsilon}}(u)) = W(\phi^{s_1+{\varepsilon}}(w),\phi^{s_2+{\varepsilon}}(w))>-\infty,
$$
as $\sigma_n \to \infty$,
which is a contradiction.
\end{proof}
\begin{lemma} \label{injectivityofpi1}
Let $u\in X$ and $w\in \omega(u),$ then
$$
\pi\colon \clos\left(\gamma(w)\right)\to \pi\clos(\gamma(w))\subset { \mathbb{R}}^2
$$
is a homeomorphism onto its image. Hence, $\pi\circ\phi^\sigma\circ \pi^{-1}$ is a continuous flow on $\pi\clos(\gamma(w)).$
\begin{proof}
By Axiom (A2), the projection $\pi\colon \clos\left(\gamma(w)\right)\to \pi\clos(\gamma(w))$ is continuous.
Since $\clos\left(\gamma(w)\right)$ is compact and $ \pi\clos(\gamma(w))$ is Hausdorff, it is sufficient to show that
$\pi$ is bijective, see \cite[\S~26, Thm.~26.6]{munkres}.
The projection $\pi $ is surjective and it remains to show that
$\pi$ is
injective on $\clos(\gamma(w)).$
Suppose $\pi$ is not injective,
then there exist
$w^1, w^2\in\clos(\gamma(w))$, such that $w^1\not=w^2$ and $\pi(w^1)=\pi(w^2).$
Axiom (\ref{piandsigmageneral}) then implies
that $(w^1,w^2)\in \Sigma\setminus \Delta$.
On the other hand, Lemma \ref{lem:not-in-sigma} implies that $(w^1,w^2)\not\in \Sigma$,
which is a contradiction. This establishes the injectivity of $\pi$.
\end{proof}
\end{lemma}
For the projected flow on $\pi\clos(\gamma(w))$ we have the following commuting diagram:
\begin{equation}\label{diagramprojflow}
\begin{diagram}
\node{{ \mathbb{R}}\times \clos(\gamma(w))} \arrow{e,l}{\phi^\sigma} \arrow{s,l}{{\rm id} \times \pi}\node{\clos(\gamma(w))} \arrow{s,r}{\pi}\\
\node{{ \mathbb{R}}\times \pi\clos(\gamma(w))} \arrow{e,l}{\psi^\sigma} \node{\pi\clos(\gamma(w)),}
\end{diagram}
\end{equation}
where $\psi^\sigma = \pi\circ\phi^\sigma\circ ({\rm id} \times \pi)^{-1}$.
\begin{corollary}
\label{eqtoeqgeneral}
The equilibria of the planar flow $\psi^\sigma :=\pi\circ\phi^{\sigma}\circ ({\rm id} \times \pi)^{-1}$
on $\pi\clos(\gamma(w))$
are in one-to-one correspondence with the equilibria of the flow $\phi^{\sigma}$ on $\clos(\gamma(w)).$
\end{corollary}
Following the natural strategy in proving a Poincar\'{e}-Bendixson type result,
we need to find a transverse curve at a non-equilibrium point and invoke a flow box theorem, ultimately leading to contradiction arguments involving the inside and outside of a Jordan curve made up of a flow line and the transversal.
Transversals do exist for continuous (but not necessarily smooth) flows in ${ \mathbb{R}}^2$~\cite[section VII.2]{hajek}. However, our flow is defined
on the closed invariant subset $\pi\clos(\gamma(w))\subset { \mathbb{R}}^2$.
This set may well have empty interior which prevents us from finding a section as defined below, and that is also a curve (i.e.\ a so-called transversal).
Roughly speaking, we overcome this difficulty by adapting the usual Jordan curve arguments to a slightly ``less local'' version.
Let $(\sigma,x) \mapsto \psi^\sigma (x)$ be the (local) continuous flow on the subset ${\mathscr{D}}=\pi\clos(\gamma(w))$ of ${ \mathbb{R}}^2$.
A subset ${\mathscr{C}}\subset {\mathscr{D}}$ is a \emph{section} for $\psi^\sigma$, if there is a $\delta>0$ such that
$$
\psi^{\sigma_1}({\mathscr{C}})\cap\psi^{\sigma_2}({\mathscr{C}})=\varnothing, \quad \text{ for all } 0\leq \sigma_1< \sigma_2\leq \delta.
$$
The following lemma shows that for non-equilibrium points $x \in {\mathscr{D}}$ there exists a section for the flow in an ${\varepsilon}$-neighborhood of $x$.
\begin{lemma}\label{sectionsnoneq}
Let $x\in {\mathscr{D}}$ be a non-equilibrium point of $\psi^\sigma$. Then,
\begin{enumerate}
\item[(i)]
for sufficiently small $\delta>0$
there exists a section ${\mathscr{C}}$ containing $x$
such that the set
$$
{\mathscr{U}}:=\left\{\psi^\sigma (y) : y \in {\mathscr{C}}, \sigma \in\left[-\delta,\delta\right] \right\}
$$
is homeomorphic to ${\mathscr{C}} \times [-\delta,\delta]$ via the map $\psi$,
and for ${\varepsilon}>0$ sufficiently small
\begin{itemize}
\item $B_{\varepsilon}(x) \cap {\mathscr{D}} \subset {\mathscr{U}}$,
\item $h_\sigma(\overline{B_{\varepsilon}(x)} \cap {\mathscr{U}}) \in (-\delta,\delta)$.
\end{itemize}
where $h_\sigma$ is the second components of the inverse homeomorphism $h: {\mathscr{U}} \to {\mathscr{C}} \times [-\delta,\delta]$, i.e., $h \circ \psi^\sigma(y) = (y,\sigma)$ for all
$y \in {\mathscr{C}}, \sigma \in\left[-\delta,\delta\right]$;
\item[(ii)]
for $\delta_0 < \delta$ sufficiently small the three balls
$B^{0} \equiv B_{{\varepsilon}_0}(x)$,
$B^{-} \equiv B_{{\varepsilon}_0}(\psi^{-\delta_0}(x))$ and
$B^{+} \equiv B_{{\varepsilon}_0}(\psi^{\delta_0}(x))$
are, for ${\varepsilon}_0 < {\varepsilon}$ sufficiently small, disjoint subsets of $B_{{\varepsilon}}(x)$ such that
$h_\sigma(B^-\cap{\mathscr{U}}) < -\frac{\delta_0}{2} < h_\sigma(B^0\cap{\mathscr{U}}) < \frac{\delta_0}{2} <h_\sigma(B^+\cap{\mathscr{U}})$.
Furthermore, for ${\varepsilon}_1 <{\varepsilon}_0$ sufficiently small, we have
$\psi^{\pm\delta_0}(y) \in B^{\pm}$ for all $y \in {\mathscr{C}}_0 \equiv {\mathscr{C}} \cap B_{{\varepsilon}_1}(x)$.
\end{enumerate}
\end{lemma}
\begin{proof}
The first part follows from the construction of sections in
\cite[section VI.2]{hajek}. The second part then follows from continuity of $\psi$ and its inverse $h$.
\end{proof}
The situation described by Lemma~\ref{sectionsnoneq} is illustrated in Figure~\ref{f:canonicdomain}.
\begin{figure}[t]
\centerline{\includegraphics[width=0.7\textwidth]{picture1}}
\caption{Sketch of the flow in ${\mathscr{U}}$ (and the subset $B_{\varepsilon}(x) \cap {\mathscr{D}}$)
through the section ${\mathscr{C}}$. The time section $\sigma=\pm\delta_0/2$ separate the
balls $B^0$ and $B^\pm$. We note that the section ${\mathscr{C}}$ (and its forward and backward translates in time) are not (necessarily) curves.}
\label{f:canonicdomain}
\end{figure}
\begin{remark} \label{rmk:restrictionFBT}
{\em
In fact, as we will see later, we need to apply a variant of the above lemma
to closed, forward invariant subsets of the form
$$
\clos(\gamma(w)\cup\{\phi^{\sigma}(u),\sigma\ge \sigma_*\}),
$$
where $u\in X, w\in\omega(u),\sigma_*\in{ \mathbb{R}}.$ On $\clos(\gamma(w)\cup\{\phi^{\sigma}(u),\sigma\ge \sigma_*\})$ we have a commuting diagram similar to (\ref{diagramprojflow}). In order to have a bi-directional local flow, we define the slightly smaller set
\begin{equation}\label{sV}
{\mathscr{V}}:=\pi\clos(\gamma(w)\cup\{\phi^{\sigma}(u),\sigma\ge \sigma_*+2\delta\}),
\end{equation}
for $\delta>0$ small.
Then, if $x\in{\mathscr{V}}$ is not an equilibrium for $\psi^{\sigma},$
Lemma \ref{sectionsnoneq} continues to hold with ${\mathscr{U}}$ replaced by ${\mathscr{V}}$.
}
\end{remark}
\begin{remark}\label{r:J0
{\em
(i)
The second part of Lemma~\ref{sectionsnoneq} is used to construct a set that replaces
the role of the transversal. Let $y_1$ and $y_2$ be two points in ${\mathscr{C}}_0$.
Consider the line segment $L_0$ connecting $y_1$ and
$y_2$. Then $L_0 \subset B^0$. It may happen that
$L_0$ intersects the flow lines of $\psi^{\sigma}(y_{1,2})$ at some $\sigma \neq
0$, but this can be overcome by slightly varying~$\sigma$. Indeed, let the line segment $\ell_0$ be a subset of
$L_0$ with endpoints $\psi^{\sigma^0_1}(y_1)$ and $\psi^{\sigma^0_2}(y_2)$ for some
$\sigma^0_1,\sigma^0_2\in (-\delta_0/2,\delta_0/2)$, such that $\ell_0$ does not intersect the flow
lines $\psi^{\sigma}(y_{1})$ and $\psi^{\sigma}(y_{2})$ at any other $\sigma \in [-\delta,\delta]$. We still have $\ell_0 \subset B^0$, see Figure~\ref{f:thethreeJs}.
We repeat this
construction in the balls $B^{-}$ and $B^{+}$ to obtain line segments $\ell_-$ and $\ell_+$, respectively, with one end point on each flow line and no other intersections with the flow lines.
Then we obtain three Jordan curves
\begin{alignat*}{1}
{\mathscr{J}}_0 &= \{ \psi^\sigma (y_1) : \sigma^-_1 \leq \sigma \leq \sigma^+_1 \} \cup
\{ \psi^\sigma (y_2) : \sigma^-_2 \leq \sigma \leq \sigma^+_2 \} \cup \ell_- \cup \ell_+ ,\\
{\mathscr{J}}_{-} &= \{ \psi^\sigma (y_1) : \sigma^-_1 \leq \sigma \leq \sigma^0_1 \} \cup
\{ \psi^\sigma (y_2) : \sigma^-_2 \leq \sigma \leq \sigma^0_2 \} \cup \ell_- \cup \ell_0, \\
{\mathscr{J}}_{+} &= \{ \psi^\sigma (y_1) : \sigma^0_1 \leq \sigma \leq \sigma^+_1 \} \cup
\{ \psi^\sigma (y_2) : \sigma^0_2 \leq \sigma \leq \sigma^+_2 \} \cup \ell_0 \cup \ell_+.
\end{alignat*}
in $B_{\varepsilon}(x)$, see Figure~\ref{f:thethreeJs}.
We denote the interior of ${\mathscr{J}}_j$ by $J_j$, and its exterior by $J_j^*$,
$j \in \{-,0,+\}$. Clearly, $J_\pm \subset J_0$ and
$J_- \cap J_+ =\varnothing$.
\begin{figure}
\centerline{\includegraphics[width=0.5\textwidth]{picture2}\hspace*{5mm}\raisebox{0.9cm}{\includegraphics[width=0.37\textwidth]{picture3}}}
\caption{On the left an illustration of the construction of $\ell_0$ and $\ell_\pm$. On the right a sketch of the interiors $J_0$ and $J_\pm$
of the Jordan curves ${\mathscr{J}}_0$ and ${\mathscr{J}}_\pm$ (as well as their exteriors
$J_0^*$ and $J_\pm^*$). Note that $J_0 = \interior (\overline{J_- \cup J_+})$.}
\label{f:thethreeJs}
\end{figure}
(ii)
By Lemma~\ref{sectionsnoneq} any flow line in $J_0$ must leave $J_0$ in forward and backward time. By flow invariance of the other boundary components, a flow line can only enter or leave $J_0$ through $\ell_+$ or $\ell_-$.
Moreover, \emph{no} flow line can (in forward time) enter $J_0$ through $\ell_+$ and then leave it through $\ell_-$.
In this sense, the set $J_0$ plays the role of a transversal.
Analogous statements holds for $J_+$ and $J_-$.
In particular, this implies a slightly stronger statement for the flow in $J_+ \cap J_0$:
if a flow line is in $J_+$ then must leave $J_0$ through $\ell_+$.
Similarly, if a flow line is in $J_-$ then must have entered $J_0$ through $\ell_-$.
(iii)
The flow lines $\{ \psi^{\sigma} (y_{1,2}) : \sigma \in (\sigma^+_{1,2},\delta] \}$
and $\{ \psi^{\sigma} (y_{1,2}) : \sigma \in [-\delta,\sigma^-_{1,2}) \}$
lie in the exterior $J_0^*$. This follows from the fact that by construction they cannot cross $\ell_+$ and $\ell_-$, respectively, and $\psi^{\pm\delta}(y_{1,2})$ all lie in $J_0^*$ by the second bullet of Lemma~\ref{sectionsnoneq}(i).
}
\end{remark}
\begin{proof}[Proof of Proposition \ref{sv}]
Suppose $\omega(w)$ does not contain any equilibria.
Choose $\zeta\in \omega(w)$ and $\zeta^*\in \omega (\zeta)$, then
\begin{equation}
\label{eqn:inclusions}
\omega(\zeta)\subseteq\omega(\omega(w)) = \omega(w) \subseteq \omega(\gamma(w)) = \clos(\gamma(w)).
\end{equation}
Since
$\zeta^*$ is not an equilibrium, then
$\pi (\zeta^*)$ is not an equilibrium for $\psi^\sigma = \pi\circ \phi^\sigma \circ ({\rm id}\times \pi)^{-1}$ by Corollary \ref{eqtoeqgeneral}.
According to Lemma \ref{sectionsnoneq} there exists a section ${\mathscr{C}}$ for $\psi^\sigma$
through $x= \pi (\zeta^*)$.
Since $\zeta^*\in \omega(\zeta)$ there exist times $\sigma_n \to \infty$ such that $\phi^{\sigma_n} (\zeta) \to \zeta^*$.
By Lemma \ref{sectionsnoneq} these times can be chosen such that $\pi\circ\phi^{\sigma_n} (\zeta)\in {\mathscr{C}}_0$, as defined in Lemma~\ref{sectionsnoneq}(ii),
for $\sigma_n$ sufficiently large. Moreover, $\pi\circ\phi^{\sigma}(\zeta)\not\in {\mathscr{C}}_0$ for $\sigma\in(\sigma_n,\sigma_{n+1}).$
We consider two cases.
{\it Case 1}. For some $n\not = n'$, we have $\pi\circ\phi^{\sigma_n} (\zeta) = \pi\circ\phi^{\sigma_{n'}} (\zeta)$.
Then, since $\pi$ is a homeomorphism on $\clos\bigl(\gamma(w)\bigr)$
(see Lemma \ref{injectivityofpi1}) and since $\omega(\zeta) \subset \clos\bigl(\gamma(w)\bigr)$ (see Equation (\ref{eqn:inclusions})), it follows that $\phi^{\sigma_n} (\zeta) = \phi^{\sigma_{n'}} (\zeta)$, and thus $\phi^\sigma(\zeta)$ is a periodic orbit.
{\it Case 2}. All $\pi\circ\phi^{\sigma_n} (\zeta)$ are mutually distinct.
Take $n$ sufficiently large so that $y_1 \equiv \pi\circ\phi^{\sigma_{n+1}} (\zeta)$ and $y_2 \equiv \pi\circ\phi^{\sigma_{n+1}} (\zeta)$ both lie in ${\mathscr{C}}_0$. Denote $\widetilde{\sigma} = \sigma_{n+1}-\sigma_n$, so that $y_2=\psi^{\widetilde{\sigma}}(y_1)$. Apply the construction of Remark~\ref{r:J0}(i) to these $y_1$ and $y_2$.
In addition to ${\mathscr{J}}_0$ we obtain two more Jordan curves
\begin{alignat*}{1}
{\mathscr{G}}_- &= \{ \psi^\sigma (y_1) : \sigma^-_1 \leq \sigma \leq \widetilde{\sigma} + \sigma^-_2 \} \cup \ell_- \\
{\mathscr{G}}_+ &= \{ \psi^\sigma (y_1) : \sigma^+_1 \leq \sigma \leq \widetilde{\sigma} + \sigma^+_2 \} \cup \ell_+ .
\end{alignat*}
Both curves separate ${ \mathbb{R}}^2$ into two open sets, say $A_{\pm}^1$ and $A_{\pm}^2$, see Figure~\ref{f:Apm}. Here, to fix notation,
we require that $J_0 \subset A_{+}^1$ and $J_0 \subset A_{-}^2$ (recall that $J_0$ is the interior of~${\mathscr{J}}_0$) so that $A_+^2 \cap A_-^1 =\varnothing$.
It follows from the property of $J_0$ described in Remark~\ref{r:J0}(ii)
and flow invariance of
$\{ \psi^\sigma (y_1) : \sigma^-_1 \leq \sigma \leq \widetilde{\sigma} + \sigma^+_2 \} $
that once a flow line is in $A_+^2$ it can never enter $A_-^1$ (in forward time).
\begin{figure}[t]
\centerline{\includegraphics[width=6.5cm]{picture4}}
\caption{Sketch of the construction of $A_+^2$ and $A_-^1$. Whether $A_-^1$ is a bounded region and $A_+^2$ an unbounded one (as depicted here) or the other way around, is irrelevant for the argument.}
\label{f:Apm}
\end{figure}
Finally, we note that Remark~\ref{r:J0}(iii) implies that
$x_1=\psi^{-\delta}(y_1) = \pi\circ\phi^{\sigma_{n}-\delta} (\zeta) $ lies in $A_-^1$,
while $x_2=\psi^{\delta}(y_2) = \pi\circ\phi^{\sigma_{n+1}+\delta} (\zeta) $ lies in $A_+^2$.
Now consider the orbit $\pi\circ\phi^\sigma(w)$.
Since $\zeta\in\omega(w)$ and $\pi$ is continuous, $\pi(\zeta)$ is an $\omega$-limit point of $\pi(w)$ under $\psi^{\sigma}$.
Consequently, the orbit $\pi\circ\phi^{\sigma}(w)$
keeps (in forward time) visiting arbitrarily small neighborhoods of $x_1 \in A_-^1$ and $x_2 \in A_+^2$. However, as argued above, once a flow line is in $A_+^2$ it can never enter $A_-^1$, which is a contradiction.
\end{proof}
\begin{remark}
\label{rmk:new}
{\em
In \cite[Proposition 2]{fiedlermallet} the ``soft version'' was proved using both smoothness of the flow and fact that there exists a non-negative discrete Lyapunov function.
The extension given by Proposition \ref{softversion} makes it applicable to the Cauchy-Riemann equations, for which a ${ \mathbb{Z}}$-valued Lyapunov function exists.
}
\end{remark}
\section{The strong version}\label{sec:strvers}
The first subsection contains preliminary lemmas that are used to prove the strong version of the Poincar\'{e}-Bendixson Theorem. The proof of Proposition \ref{pr2} is carried out in the second subsection.
The arguments in this section resemble those in \cite{fiedlermallet}, but are adjusted to our setting.
\subsection{Technical lemmas}\label{sectiontechnicallemmas}
\begin{lemma}\label{lemma k}
Let $u \in X,$
then for every $w\in \omega(u)$ there exists an integer $k(w)$ such that
$$
W(w^1,w^2)=k(w),
$$
for all $w^1, w^2 \in\clos\bigl(\gamma(w)\bigr)$, with $w^1\not=w^2.$
\end{lemma}
\begin{proof}[Proof (cf.\ \cite{fiedlermallet}, Lemma 3.1).]
Since we consider two distinct
$w^1, w^2\in \clos\bigl(\gamma(w)\bigr)$, we may exclude the case that $w$ is an equilibrium. We
therefore distinguish two cases: (i) $\gamma(w)$ is a periodic orbit, or (ii) $\sigma \mapsto\phi^\sigma(w)$ is injective.
Lemma \ref{lem:not-in-sigma} implies that $(w^1,w^2) \not \in \Sigma$, and therefore $(w^1,w^2) \mapsto W(w^1,w^2)$ is
a continuous ${ \mathbb{Z}}$-valued function on $\bigl(\clos(\gamma(w)) \times \clos(\gamma(w))\bigr)\setminus \Delta$.
(i) If $\gamma(w)$ is a periodic orbit, then, $\clos(\gamma(w))=\gamma(w)$, which is homeomorphic to $S^1,$ and $\gamma(w)\times\gamma(w)$ is thus homeomorphic to the 2-torus $\mathbb{T}^2$.
Therefore $(w^1,w^2) \mapsto W(w^1,w^2)$ induces
a continuous ${ \mathbb{Z}}$-valued function on $\mathbb{T}^2 \setminus S^1$. Since the latter is connected, it follows that $W$ is constant
on $\bigl(\gamma(w)\times\gamma(w)\bigr)\setminus \Delta$.
(ii) If $\sigma\to \phi^\sigma(w)$ is injective, then $\bigl(\gamma(w) \times \gamma(w)\bigr)\setminus \Delta$
has two connected components given by $(\phi^{\sigma_1}(w),\phi^{\sigma_2}(w))$, with $\sigma_1>\sigma_2$, and $\sigma_1<\sigma_2,$ respectively. Since $W$ is symmetric (Axiom (A1)) we conclude that $W$ is constant on $\bigl(\gamma(w) \times \gamma(w)\bigr)\setminus \Delta$.
Note that $\bigl(\clos(\gamma(w)) \times \clos(\gamma(w))\bigr)\setminus \Delta$ is the closure of $\bigl(\gamma(w) \times \gamma(w)\bigr)\setminus \Delta$ in $(X\times X)\setminus \Delta$.
Since $W$ is continuous on
$\bigl(\clos(\gamma(w)) \times \clos(\gamma(w))\bigr)\setminus \Delta$, it is also constant, which proves the lemma.
\end{proof}
\begin{lemma}\label{lemmak1}
Assume that $u\in X$ and $w\in \omega (u).$ Let $k(w)$ be defined as in Lemma \ref{lemma k}.
If $\alpha(w)\cap\omega(w)=\varnothing$, then there exists a $\sigma_*\geq 0$, such that
\begin{equation}\label{kappavzero}
W(u^1,w^1)=k(w)
\end{equation}
for every $u^1\in \clos\{\phi^\sigma(u), \sigma\ge \sigma_*\}$ and every $w^1\in \clos (\gamma(w))$, such that $u^1\not=w^1.$ In particular, if $\pi(u^1)=\pi(w^1)$ for some $u^1\in\clos\{\phi^\sigma(u), \sigma\geq \sigma_*\}$ and $w^1\in\clos(\gamma(w))$, then $u^1=w^1.$ Hence
\begin{equation}\label{firstextinj}
\pi\circ\phi^\sigma (u)\not\in \pi \clos(\gamma(w)) \ \ \text{for all } \sigma\geq \sigma_*.
\end{equation}
\end{lemma}
\begin{proof}[Proof (cf.\ \cite{fiedlermallet}, Lemma 3.2).]
We start by observing that it is enough to prove that (\ref{kappavzero}) holds for $u^1\in\phi^\sigma(u), \sigma\ge \sigma_*.$ Then by continuity of $W,$ the statement follows for all $u^1\in\clos\{\phi^\sigma(u),\sigma\ge \sigma_*\}.$
Suppose there exist sequences $\sigma_n\to \infty,{w}_n\in \clos(\gamma(w)),$ with
$$
\phi^{\sigma_n}(u)\not={w}_n, \quad k_n:=W(\phi^{\sigma_n}(u),{w}_n)\not=k(w).
$$
We may assume, passing to a subsequence if necessary, that for all $n$ we have either $k_n>k(w)$ or $k_n<k(w).$ We will split the proof in two cases.
{\it Case 1}: $k_n<k(w).$
Again passing to a subsequence if necessary, we may assume that either ${w}_n\in\alpha(w)$ for all $n$ or else ${w}_n\in\clos(\gamma(w))\setminus\alpha(w)$ for all $n.$ Since $\alpha(w)$ and $\omega(w)$ are disjoint by assumption, it follows that $\clos(\gamma(w))\setminus\alpha(w)=\gamma(w)\cup\omega(w).$
Choose now $w^1\in \omega(w)$ in case ${w}_n\in \alpha(w),$ and $w^1\in\alpha(w)$ in case ${w}_n\in\gamma(w)\cup\omega(w).$ In both cases we have $w^1\in\omega(u),$ hence we can choose a sequence $\tilde{\sigma}_n$ with $\tilde{\sigma}_n>\sigma_n,$ for every $n$ such that
$$
w^1:=\lim_{n\to\infty}\phi^{\tilde{\sigma}_n}(u).
$$
In case ${w}_n\in\gamma(w)\cup\omega(w)$ we may assume that $\tilde{\sigma}_n-\sigma_{n}$ is so large that $\phi^{\tilde{\sigma}_n-\sigma_{n}}({w}_n)\in\clos\{\phi^\sigma(w), \sigma>0\}.$ For a further subsequence, we have convergence of $\phi^{\tilde{\sigma}_n-\sigma_n}({w}_n).$ Define
$$
w^2:=\lim_{n\to\infty}\phi^{\tilde{\sigma}_n-\sigma_n}({w}_n).
$$
Note that $w^1,w^2\in\clos(\gamma(w)),$ and $w^1\not=w^2$ since $\alpha(w)\cap\omega(w)=\varnothing.$ In fact, by construction it follows that either $w^1\in\omega(w)$ and $w^2\in\alpha(w),$ or else $w^1\in\alpha(w)$ and $w^2\in\clos\{\gamma(w),\sigma\geq 0\}=\{\phi^\sigma(w), \sigma\geq0\}\cup\omega(w).$
By Lemma \ref{lemma k} there exists $k(w)\in { \mathbb{Z}}$ such that
$$
W(w^1,w^2)=k(w).
$$
For $n$ large enough the continuity of $W$ implies
\begin{eqnarray}
k_n<k(w)&=&W(w^1,w^2)=W(\phi^{\tilde{\sigma}_n}(u),\phi^{\tilde{\sigma}_n-\sigma_n}({w}_n))\nonumber\\
&=&W(\phi^{{\sigma}_n+(\tilde{\sigma}_n-\sigma_n)}(u),\phi^{\tilde{\sigma}_n-\sigma_n}({w}^n))\nonumber\\
&\leq& W(\phi^{{\sigma}_n}(u),{w}_n)=k_n,\nonumber
\end{eqnarray}
which is a contradiction.
The final assertion (\ref{firstextinj}) follows from the following observation. Suppose, by contradiction, that there exist a
$u^1=\phi^{\sigma_1}(u),$ for some $\sigma_1\ge\sigma_*$
and $w^1\in\clos(\gamma(w)),$ such that $\pi(u^1)=\pi(w^1).$ By what we have just proved, we then have $u^1=w^1.$
Since $w^1\in \clos(\gamma(w))$ and, by assumption, the sets $\alpha(w),$ $\gamma(w)$ and $\omega(w)$ are disjoint,
there are only three different possibilities.
\begin{enumerate}
\item $w^1\in\omega(w).$ Then $\phi^{\sigma_1}(u)\in\omega(w).$ By invariance $\omega(u)\subseteq\omega(\omega(w))=\omega(w).$ Since $\alpha(w)\subseteq\omega(u)\subseteq\omega(w),$ this contradicts $\alpha(w)\cap\omega(w)=\varnothing.$
\item $w^1\in\alpha(w).$ Then $\phi^{\sigma_1}(u)\in\alpha(w).$ By invariance $\omega(u)\subseteq\omega(\alpha(w))=\alpha(w).$ Since $\omega(w)\subseteq\omega(u)\subseteq\alpha(w),$ this contradicts $\alpha(w)\cap\omega(w)=\varnothing.
\item $w^1\in\gamma(w).$ Then $\phi^{\sigma_1}(u)\in\gamma(w).$ By invariance $\omega(u)=\omega(w).$ But $\alpha(w)\subseteq\omega(u)=\omega(w),$ again contradicting $\alpha(w)\cap\omega(w)=\varnothing.
\end{enumerate}
{\it Case 2}: $k_n>k(w).$
This case is analogous to the previous one. It is enough to exchange the roles of $\alpha(w)$ and $\omega(w).$ See \cite[Lemma 3.2]{fiedlermallet}
for further details.
\end{proof}
\begin{remark}\label{r:flowboxextends}
{\em
Lemma \ref{lemmak1} implies that the commutative diagram (\ref{diagramprojflow}) extends from $\clos(\gamma(w))$ to $\clos(\gamma(w)\cup\{\phi^{\sigma}(u),\sigma\ge\sigma_*\}),$ if $\alpha(w)\cap\omega(w)=\varnothing.$ Additionally, by Remark \ref{rmk:restrictionFBT},
the assertions of Lemma \ref{sectionsnoneq}
hold for every $x\in{\mathscr{V}}$ (defined in (\ref{sV})) that is not an equilibrium.
}
\end{remark}
\begin{lemma}\label{lemma3.3mp}
Let $u\in X$ and let $\gamma_1$ and $\gamma_2$ be (not necessarily distinct) stationary or periodic orbits in $\omega(u)$. Then, there exists a $k=k(\gamma_1,\gamma_2), k\in{ \mathbb{Z}}$, such that
\begin{equation}\label{3.2}
W(p^1,p^2)=k,
\end{equation}
for every $p^j\in\gamma_j, p^1\not= p^2.$ In particular, the projections of disjoint periodic orbits are disjoint.
\begin{proof}[Proof (cf.\ \cite{fiedlermallet}, Lemma 3.3).]
We consider the case where $\gamma_1$ and $\gamma_2$ are both periodic, the others are analogous or even simpler. We first claim that $W(p^1,p^2)$ is defined for every $p^1\in\gamma^1$ and every $p^2\in\gamma^2$ with $p^1\not=p^2.$ Suppose, by contradiction, that there exist $p^1\in \gamma^1$ and $p^2\in \gamma^2$ with $p^1\not=p^2$ such that $(p^1,p^2)\in \Sigma\setminus\Delta.$ Then, by Axiom (\ref{thingeneral}) and (\ref{Wdropping}) there exists an ${\varepsilon}_0>0,$ such that $(\phi^{\sigma}(p^1),\phi^{\sigma}(p^2))\not\in\Sigma$ for every $\sigma\in (-{\varepsilon}_0,{\varepsilon}_0)\setminus\{0\}$ and
\begin{equation}\label{ww}
W(\phi^{\sigma'}(p^1),\phi^{\sigma'}(p^2))< W(\phi^{\sigma}(p^1),\phi^{\sigma}(p^2)),
\end{equation}
for $\sigma'\in(0,{\varepsilon}_0)$ and $\sigma\in(-{\varepsilon}_0,0).$ Set $\sigma'=\tfrac{{\varepsilon}_0}{2}$ and $\sigma=-\tfrac{{\varepsilon}_0}{2}.$
By continuity of $W$ there exists an $\eta\in(0,\tfrac{{\varepsilon}_0}{2})$ such that $W$ is constant on the set
$$
\mathcal{U}=\left\{(\phi^{\sigma_1}(p^1),\phi^{\sigma_2}(p^2))\ |\ -\tfrac{{\varepsilon}_0}{2}-\eta<\sigma_1,\sigma_2<\tfrac{{\varepsilon}_0}{2}+\eta\right\}.
$$
By periodicity of $\gamma^1$ and $\gamma^2$ there is a $\sigma_3>{\varepsilon}_0$ such that $(\phi^{\sigma_3}(p^1),\phi^{\sigma_3}(p^2))\in\mathcal{U}$ (both in the periodic and the quasi-periodic case). Now, by (\ref{ww})
$$
W(\phi^{{\varepsilon}_0/2}(p^1),\phi^{{\varepsilon}_0/2}(p^2))<W(\phi^{-{\varepsilon}_0/2}(p^1),\phi^{-{\varepsilon}_0/2}(p^2))=W(\phi^{\sigma_3}(p^1),\phi^{\sigma_3}(p^2)).
$$
Since $\sigma_3>\tfrac{{\varepsilon}_0}{2},$ this contradicts Lemma \ref{decreasing lemma}. Hence $(p^1,p^2)\not\in\Sigma$ and $W(p^1,p^2)$ is well defined for every $p^1\in\gamma^1$ and every $p^2\in\gamma^2,$ with $p^1\not=p^2.$
This implies, by continuity of $W$, that the map
$$
(p^1,p^2)\to W(p^1,p^2)
$$
is locally constant on
$$
\{(p^1,p^2)\in\gamma_1\times\gamma_2\ |\ p^1\not=p^2\}.
$$
This set is connected, which proves (\ref{3.2}).
\end{proof}
\end{lemma}
\begin{lemma}\label{lemma:new-not-in-sigma}
Let $u\in X$ and $ e \in E.$ For every $w\in\omega(u)$ with $w\not=e$ it holds $(w,e)\not\in \Sigma.$ If, furthermore, $e\not=\omega(u)$ then there exists a $\bar{\sigma}\in{ \mathbb{R}}$ such that the map $\sigma\mapsto W(\phi^{\sigma}(u),e)$ is constant for $\sigma>\bar{\sigma}.$
\begin{proof}
The arguments in this proof resemble those in the proof of Lemma \ref{lem:not-in-sigma}. We repeat the argument. Let $w\in \omega(u).$ Since $w\not=e,$ we can assume that $(w,e)\not\in\Delta.$
Suppose, by contradiction, that $(w,e)\in\Sigma\setminus\Delta,$ then by Axioms (\ref{thingeneral}) and (\ref{Wdropping}), there exists an ${\varepsilon}_0>0$ such that $(\phi^{\sigma}(w),e)\not\in\Sigma,$ for all $\sigma\in(-{\varepsilon}_0,{\varepsilon}_0)\setminus\{0\}$ and
$$
W(\phi^{\sigma}(w),e)> W(\phi^{\sigma'}(w),e),
$$
for all $\sigma\in(-{\varepsilon}_0,0)$ and all $\sigma'\in (0,{\varepsilon}_0).$ Set $\sigma=-{\varepsilon}$ and $\sigma'={\varepsilon},$ with $0<{\varepsilon}<{\varepsilon}_0.$ Then we have
\begin{equation}\label{dec2}
W(\phi^{-{\varepsilon}}(w),e)> W(\phi^{{\varepsilon}}(w),e).
\end{equation}
By definition of the $\omega$-limit set and the invariance $\omega$, there exists a sequence $\sigma_n\to\infty,$ as $n\to\infty$ such that
\begin{equation}\label{con}
\phi^{\sigma_n\pm{\varepsilon}}(u)\to \phi^{\pm{\varepsilon}}(w).
\end{equation}
Since $\sigma_n$ is divergent we assume that
\begin{equation}\label{eqn:choice3}
\sigma_{n+1}>\sigma_n+2{\varepsilon}, \quad \text{for all } n\in { \mathbb{N}}.
\end{equation}
Inequality (\ref{dec2}), convergence in (\ref{con}) and Lemma \ref{decreasing lemma} imply, for $\sigma_n\to\infty,$ that
$$
\begin{array}{ccl}
W(\phi^{\sigma_n+{\varepsilon}}(u),e)&=& W(\phi^{+{\varepsilon}}(w),e)\nonumber\\
&<& W(\phi^{-{\varepsilon}}(w),e)\nonumber\\
&=& W(\phi^{\sigma_n-{\varepsilon}}(u),e).
\end{array}
$$
Combining the latter with (\ref{eqn:choice3}) and the fact that $W$ is non-increasing, we obtain
$$
W(\phi^{\sigma_{n+1}-{\varepsilon}}(u),e)<W(\phi^{\sigma_{n}-{\varepsilon}}(u),e),
$$
for all $n.$ From this, we deduce that $\sigma\mapsto W(\phi^{\sigma}(u),e)$ has infinitely many jumps and therefore
$$
W(\phi^{\sigma}(u),e)\to-\infty \quad \text{as}\quad \sigma\to\infty.
$$
On the other hand, continuity of $W$ and (\ref{con}) imply, for $\sigma_n\to\infty,$ that
$$
W(\phi^{\sigma_n+{\varepsilon}}(u),e)=W(\phi^{{\varepsilon}}(w),e)>-\infty,
$$
which is a contradiction.
To prove the final assertion, suppose, by contradiction, that such a $\bar{\sigma}$ does not exist. Then there exists a sequence $\sigma_n\to\infty$ such that $(\phi^{\sigma_n}(u),e)\in\Sigma.$ Now choose a $w\in\omega(u)\setminus\{e\}\not=\varnothing.$ There exists a sequence $\tilde{\sigma}_n\to\infty$ such that $\phi^{\tilde{\sigma}_n}(u)\to w.$ By the first part of the lemma, $W(w,e)\in{ \mathbb{Z}}.$ We may choose $\tilde{\sigma}_n>\sigma_n$ without loss of generality. By continuity of $W$ and axiom (\ref{Wdropping}) it follows that
$$
W(w,e)=\lim_{n\to\infty}W(\phi^{\tilde{\sigma}_n}(u),e)=-\infty,
$$
a contradiction.
\end{proof}
\end{lemma}
\begin{lemma}\label{3.4}
Let $u$ be in $X.$
There exists an integer $k_0\in{ \mathbb{Z}}$ such that
\begin{equation}\label{wweko}
W(w,e)=k_0
\end{equation}
for every $w\in\omega(u),$ and for every equilibrium $e\in \omega(u)$ such that $w\not=e.$
\begin{proof}
Fix $e\in E\cap \omega(u).$ Let $w\in\omega(u)\setminus \{e\}.$
According to Lemma \ref{lemma:new-not-in-sigma},
$W(w,e)$ is well-defined. Since $\phi^{\sigma_n}(u)\to w$ for some $\sigma_n\to\infty,$
\begin{eqnarray}
W(w,e)&=&\lim_{n\to\infty} W(\phi^{\sigma_n}(u),e)\nonumber\\
&=&\lim_{\sigma\to\infty} W(\phi^{\sigma}(u),e)=k_e,\nonumber
\end{eqnarray}
where the second limit exists by Lemma \ref{lemma:new-not-in-sigma}.
Since the above statement holds for any $w\in\omega(u)\setminus\{e\},$ this implies that $W(w,e)$ is independent of $w\in\omega(u)\setminus\{e\}.$
We still need to show that $W(w,e)$ is independent of $e\in E\cap\omega(u).$
Therefore let $e,\tilde{e}\in E\cap \omega(u), e\not=\tilde{e}.$ Then, by Axiom (\ref{continuityofW}), by the fact that $e,\tilde{e}\in \omega(u),$ and by Lemma \ref{lemma:new-not-in-sigma} it holds tha
$$
k_e=W(w,e)
=W(\tilde{e},{e})
= W(e,\tilde{e}) =
W(w,\tilde{e})=k_{\tilde{e}}.
$$
This shows (\ref{wweko}) and concludes the proof.
\end{proof}
\end{lemma}
\subsection{Proof of the strong version}\label{sectionstv}
In this subsection we prove Propositions \ref{pr2} and \ref{pr3}, which completes the proof of Theorem \ref{pb}. Theorem \ref{teorema2}
follows as a consequence of Proposition \ref{th2fmp}.
\begin{proof}[Proof of Proposition \ref{pr2}]
Let $u \in X$ and $w \in \omega(u)$.
Suppose, by contradiction, that there is a non-equilibrium $w^*\in\omega(w)$ and that $\gamma(w)$ is not periodic. Lemma \ref{injectivityofpi1} implies that $\pi\circ\phi^\sigma$ is a planar flow on the set $\omega(w)\subseteq\clos(\gamma(w)).$ By Corollary \ref{eqtoeqgeneral} the point $\pi (w^*)$ is not an equilibrium for $\pi\circ\phi^\sigma.$
According to Lemma \ref{sectionsnoneq} there exist a section ${\mathscr{C}}$ through $\pi(w^*)$.
Consider first $\pi\circ\phi^\sigma(w)$ and recall that by Lemma \ref{injectivityofpi1} the map $\sigma\to\pi\circ\phi^\sigma(w) $ is one-to-one since $\gamma(w)$ is not periodic. Let $\sigma_n\to\infty$ denote
those positive times for which $\pi\circ\phi^{\sigma_n}(w)\in {\mathscr{C}}$. Note that $\{\pi\circ\phi^{\sigma_n}(w)\}_{n=1}^{\infty}$ are all distinct and for
$n$ sufficiently large $y_1=\pi\circ\phi^{\sigma_n}(w)$ and $y_2 = \pi\circ\phi^{\sigma_{n+1}}(w)$ both lie in ${\mathscr{C}}_0$.
Denote $\widetilde{\sigma} = \sigma_{n+1}-\sigma_n$, so that $y_2=\psi^{\widetilde{\sigma}}(y_1)$.
We apply the construction of Remark~\ref{r:J0}(i) to these $y_1$ and $y_2$.
In addition to ${\mathscr{J}}_0$ and ${\mathscr{J}}_\pm$ we obtain three more Jordan curves (the first two are the same as in the proof of Proposition~\ref{softversion})
\begin{alignat*}{1}
{\mathscr{G}}_- &= \{ \psi^\sigma (y_1) : \sigma^-_1 \leq \sigma \leq \widetilde{\sigma} + \sigma^-_2 \} \cup \ell_- \\
{\mathscr{G}}_+ &= \{ \psi^\sigma (y_1) : \sigma^+_1 \leq \sigma \leq \widetilde{\sigma} + \sigma^+_2 \} \cup \ell_+ \\
{\mathscr{G}}_0 &= \{ \psi^\sigma (y_1) : \sigma^0_1 \leq \sigma \leq \widetilde{\sigma} + \sigma^0_2 \} \cup \ell_0 .
\end{alignat*}
These three curves separate ${ \mathbb{R}}^2$ into two open sets, say $A_{j}^1$ and $A_{j}^2$, with $j\in \{-,0,+\}$. To fix notation,
we require that $J_0 \subset A_{+}^1$ and $J_0 \subset A_{-}^2$ and $J_+ \subset A_+^2$, see Figure~\ref{f:strongversion}.
In particular, this implies that $A_+^2 \subset A_0^2 \subset A_-^2$ and $A_+^2 \cap A_-^1 =\varnothing$,
as well as $A_+^2 \cap A_0^1 = \varnothing $ and $A_-^1 \cap A_0^2 = \varnothing$.
It follows from the properties of $J_0$ and $J_\pm$ described in Remark~\ref{r:J0}(ii)
and invariance of
$\{ \psi^\sigma (y_1) : \sigma^-_1 \leq \sigma \leq \widetilde{\sigma} + \sigma^+_2 \} $
that in \emph{forward} time once a flow line is in $A_+^2$ it can never enter $A_0^1$,
while in \emph{backward} time once a flow line is in $A_-^1$ it can never enter $A_0^2$.
We note that Remark~\ref{r:J0}(iii) implies that
$x_1=\pi\circ\phi^{\sigma_{n}-\delta} (w) $ lies in $A_-^1$,
while $x_2=\pi\circ\phi^{\sigma_{n+1}+\delta} (w) $ lies in $A_+^2$.
Therefore,
$\pi\omega(w) \subset A_0^2$, while $\pi\alpha(w) \subset A_0^1$, cf.\ Figure~\ref{f:strongversion}.
Hence $ \pi\omega(w) \cap \pi\alpha(w) = \varnothing$.
We infer from Lemma \ref{injectivityofpi1} that $\alpha(w)\cap\omega(w)=\varnothing$.
\begin{figure}[t]
\centerline{\includegraphics[width=9cm]{picture5}}
\caption{Sketch of the construction of $A_\pm^0$. Note that $J_+=A_-^2 \cap A_0^2$ and $J_-=A_+^1 \cap A_0^1$.}
\label{f:strongversion}
\end{figure}
Next we consider the orbit of $u$.
The assumptions of Lemma~\ref{lemmak1} are satisfied and hence there exists a time $\sigma_*$, such that the curve $\{ \pi\circ \phi^\sigma(u) : \sigma\ge \sigma_* \}$ cannot cross
the curve $\pi\circ\phi^\sigma (w)$. Furthermore, it follows from Remarks~\ref{rmk:restrictionFBT} and~\ref{r:flowboxextends} and the above construction, that
once the flow line $\pi\circ\phi^{\sigma}(u)$ is in $A_+^2$ it can never enter $A_0^1$ (in forward time).
Moreover, by Remark~\ref{r:J0}(ii), once a flow line is in $A_0^2$ then it must enter $A_+^2$ in forward time, after which it can no longer enter $A_0^1$.
On the other hand, since both $\omega(w)$ and $\alpha(w)$ are contained in $\omega(u)$, the forward orbit
$\pi\circ \phi^\sigma(u)$ will have $\omega$-limit points when $\sigma\to
\infty$ in both $\pi\alpha(w) \subset A_0^1$ and $\pi\omega(w) \subset A_0^2$.
This is a contradiction.
\end{proof}
\begin{proof}[Proof of Proposition \ref{pr3} (cf.\
\cite{fiedlermallet}, Proposition 2).]
Suppose that $\omega(u)$ contains a periodic orbit $\gamma(p)$ as a strict subset. Let $V\subseteq X$ be a closed tubular neighborhood of $\gamma(p).$ Choose $V$ small enough such that it does not contain equilibria and such that $\omega(u)$ still has elements outside $V.$ Since there are accumulation points (for $\phi^\sigma(u)$ when $\sigma$ goes to infinity) both inside and outside $V,$ then $\phi^\sigma(u)$ must enter and leave $V$ infinitely often. Let $\sigma_n\to\infty$ be a sequence such that
$$
p=\lim_{n\to\infty}\phi^{\sigma_n}(u)
$$
and such that $\phi^\sigma(u)$ leaves $V$ between any two consecutive times $\sigma_n.$ Let $I_n:=[\sigma_n-\alpha_n,\sigma_n+\beta_n]$ be the maximal time interval containing $\sigma_n$ such that
$$
\phi^\sigma(u)\in V \ \ \ \text{for all }\sigma\in I_n.
$$
Since $\partial V$ is closed, we may assume convergence (passing to a subsequence, if necessary) of $\phi^{\sigma_n-\alpha_n}(u).$ Note that $\sigma_{n-1}<\sigma_{n}-\alpha_{n}$ thus $\sigma_n-\alpha_n\to\infty.$
Let
$$
q:=\lim_{n\to\infty}\phi^{\sigma_n-\alpha_n}(u)\in\omega(u),
$$
and $q\in\partial V.$ Moreover we may assume that $\alpha_n+\beta_n\to\infty$ (at least for a subsequence) since $\omega(u)$ contains a periodic orbit in the interior of $V.$ We have thus
$$
\omega(q)\subseteq \clos(\phi^\sigma(q))\subseteq V,\ \ \sigma>0.
$$
From Proposition \ref{pr2} we conclude that $\gamma(q)$ is periodic. By construction $\gamma(q)$ and $\gamma(p)$ are distinct and $\gamma(q)$ is contained in $V.$ By continuity of the flow and the projection $\pi$ and by the compactness of $V$, the sets $\pi\gamma(p)$ and $\pi\gamma(q)$ are close in the Hausdorff metric (of compact subsets of ${ \mathbb{R}}^2$)
provided that we take the tubular neighborhood $V$ sufficiently small. From this it follows that
$\pi \gamma(q)$ and $\pi\gamma(p)$ are nested closed curves.
Reducing $V$ to separate $\gamma(p)$ from $\gamma(q),$ a periodic solution $\gamma(r)$ can be constructed in the same way. Note once more that $\pi \gamma(q), \pi\gamma(p)$ and $\pi\gamma(r)$ are nested closed curves.
Applying Lemma \ref{lemma3.3mp} to the trajectories $\gamma(p)$ and $\gamma(q)$ we conclude
that there exists a $k\in { \mathbb{Z}}$ such that
$$
W(p^1,q^1)=k,
$$
for all $p^1\in\gamma(p)$ and $q^1\in\gamma(q).$ By continuity of $W$ (Axiom (\ref{continuityofW})) this implies that
$$
W(p^1,\phi^{\sigma_n-\alpha_n}(u))=k,
$$
for all $p^1\in\gamma(p)$ when $n$ is big enough, since $\phi^{\sigma_n-\alpha_n}(u)\to q\in\gamma(q).$
By Assumption (\ref{Wdropping}) we get $\pi\circ\phi^\sigma(u)\not\in\pi\gamma(p)$ for every $\sigma$ in the open interval with endpoints $\sigma_n-\alpha_n, \sigma_m-\alpha_m,$ provided $n,m$ are chosen large enough. Since $\sigma_m-\alpha_m\to\infty,$ as $m\to\infty,$ it follows that $\pi\circ\phi^{\sigma}(u)\not\in\pi\gamma(p),$ for any $\sigma$ large enough.
In an analogous manner we can prove that, for $\sigma$ large enough, the curve $\pi\circ\phi^\sigma(u) $ can never intersect $\pi\gamma(q)$ and $\pi{\gamma}(r),$ but this is a contradiction since $\pi\circ\phi^\sigma(u)$ has $\omega$-limit points as $\sigma\to\infty$ in the three nested curves $\pi{\gamma}(p), \pi{\gamma}(q),\pi{\gamma}(r).$
\end{proof}
\begin{proposition}\label{th2fmp}
Let $u\in X$. Then,
$$
\pi :\omega(u)\to\pi(\omega(u))
$$
is a homeomorphism onto its image. Hence $\pi\circ\phi^\sigma$ is a flow on $\pi(\omega(u)).$
\begin{proof}[Proof (cf.\ \cite{fiedlermallet}, Theorem 2).]
By Axiom (\ref{Wdropping}) it is enough to show that there exists a $k_0\in { \mathbb{Z}}$ such that
\begin{equation}\label{6.1}
W(w^1,w^2)=k_0,
\end{equation}
for all $w^1,w^2\in \omega(u), w^1\not=w^2.$
We now apply Theorem \ref{pb} (Poincar\'{e}-Bendixson). If $\omega(u)$ consists of a single periodic orbit, then (\ref{6.1}) holds by Lemma \ref{lemma3.3mp}. We may therefore assume for the remainder of the proof that for every $w\in \omega(u)$ we have $\alpha(w),\omega(w)\subseteq E.$
If either $w^1$ or $w^2$ is an equilibrium then (\ref{6.1}) holds with $k_0$ defined in Lemma \ref{3.4}. We may therefore assume that $w^1\not\in E.$
Suppose now, by contradiction, that there exist $(w^1,w^2) \in \Sigma\setminus \Delta.$ By Axioms (\ref{thingeneral}) and (\ref{Wdropping}) there exists an ${\varepsilon}_0>0$ such that
$\bigl(\phi^{\sigma}(w^1),\phi^{\sigma}(w^2)\bigr)\not\in\Sigma$,
for all $\sigma \in (-{\varepsilon}_0,{\varepsilon}_0)\setminus \{0\}$
and
$$
W(\phi^{\sigma'}(w^1),\phi^{\sigma'}(w^2))<W(\phi^{\sigma}(w^1),\phi^{\sigma}(w^2)),
$$
for all $\sigma \in (-{\varepsilon}_0,0)$ and all $\sigma' \in (0,{\varepsilon}_0)$.
Set $\sigma = -{\varepsilon}$ and $\sigma' = {\varepsilon}$, with $0<{\varepsilon} <{\varepsilon}_0$.
Since $w^1\in\omega(u),$
there exists $\sigma_n\to\infty$ such that
$$
w^1=\lim_{n\to\infty}\phi^{\sigma_n}(u),
$$
and
$$
0<\sigma_{n+1}-\sigma_n\to\infty, \ \ \text{as}\ \ n \to\infty.
$$
Define $\hat \sigma_{n}:=(\sigma_{n+1}-\sigma_n)\to\infty$. Then, passing to a subsequence if necessary, the limits
$$
e:=\lim_{n\to\infty}\phi^{-\hat\sigma_n}(\phi^{-{\varepsilon}}(w^2)) \quad \text{and} \quad \tilde{e}:=\lim_{n\to\infty}\phi^{\hat\sigma_n}(\phi^{{\varepsilon}}(w^2))
$$
exist, and $e,\tilde{e}\in E,$ since $\alpha(w^2)\subseteq E$ and $\omega(w^2)\subseteq E.$
By Axiom (\ref{continuityofW}), Lemma \ref{decreasing lemma}, Lemma \ref{3.4} and the fact that $w^1\not\in E$
we infer that, for $n$ sufficiently large (slightly shifting ${\varepsilon}$ if necessary to make $W$ well-defined for all relevant pairs)
$$
\begin{array}{lll}
W(\phi^{{\varepsilon}}(w^1),\phi^{{\varepsilon}}(w^2))&<& W(\phi^{-{\varepsilon}}(w^1),\phi^{-{\varepsilon}}(w^2))\\
&=&W(\phi^{\sigma_{n+1}-{\varepsilon}}(u),\phi^{-{\varepsilon}}(w^2))\\
&\le& W(\phi^{\sigma_{n+1}-\hat{\sigma}_n-{\varepsilon}}(u),\phi^{-\hat{\sigma}_n-{\varepsilon}}(w^2))\\
&=&W(\phi^{\sigma_n-{\varepsilon}}(u),e)\\
&=& W(\phi^{-{\varepsilon}}(w^1),e)\\
&=& W(\phi^{-{\varepsilon}}(w^1),\tilde{e})\\
&=& W(\phi^{{\varepsilon}}(w^1),\tilde{e})\\
&=& W(\phi^{\sigma_{n+1}+{\varepsilon}}(u),\tilde{e})\\
&=&W(\phi^{\hat{\sigma}_n+\sigma_n+{\varepsilon}}(u),\phi^{\hat{\sigma}_n+{\varepsilon}}(w^2))\\
&\le&W(\phi^{\sigma_n+{\varepsilon}}(u),\phi^{{\varepsilon}}(w^2))\\
&=&W(\phi^{{\varepsilon}}(w^1),\phi^{{\varepsilon}}(w^2)),
\end{array}
$$
which is a contradiction. In the sixth and in the seventh equality we used Lemma \ref{3.4}.
\end{proof}
\end{proposition}
Since the Cauchy-Riemann Equations satisfy the Axioms (A1)-(A5) Theorem \ref{teorema2} follows from Proposition \ref{th2fmp}.
\section{Proofs of Propositions \ref{Xcompact} and \ref{prop:aron}}
\label{proofoflemmas}
Consider the operators
$$
\partial=\partial_s-J\partial_t\ \ \text{and}\ \ \overline{\partial}=\partial_s+J\partial_t,
$$
and recall the following regularity estimates:
\begin{lemma}\label{lemmaabb}
Let $g$ be a function in $\in C^{\infty}_c({ \mathbb{R}}\times S^1;{ \mathbb{R}}^2).$ For every $1<p<\infty$, there exists a constant $C_p>0$, such that
\begin{equation}\label{abb}
\Vert \nabla g\Vert_ {L^p({ \mathbb{R}}\times S^1)}\leq C_p \Vert \bar{\partial}g\Vert_ {L^p({ \mathbb{R}}\times S^1)}.
\end{equation}
The same estimate holds for $\partial$ via $t\mapsto -t$.
\end{lemma}
\begin{proof}
See \cite{abbondandolo}, \cite{niremdouglis}
\cite{hoferzehnder}, \cite[appendix B]{mcduffsalamon}.
\end{proof}
\begin{proof}[Proof of Proposition \ref{Xcompact}]
For a solution $u\in X,$ we can write
\begin{equation}\label{lincr}
\overline{\partial}u=-JF(t,u)=f(s,t),
\end{equation}
where $F,$ and therefore $f$, are uniformly bounded since for every $u\in X$ we have
\begin{equation}\label{estimateLinfty}
\Vert u\Vert_ {L^{\infty}({ \mathbb{R}}\times S^1)}\leq 1.
\end{equation}
Extend $f$ and $u$ via periodic extension to a function on ${ \mathbb{R}}^2$ in the $t$-direction. By $L^\infty$-bound on $u$
we obtain the existence of a constant $M>0,$ such that
\begin{equation}\label{festimateLinfty}
\Vert f\Vert_ {L^\infty({ \mathbb{R}}^2)}\leq M.
\end{equation}
Let $K,L, G$ be compact sets contained in ${ \mathbb{R}}^2$ such that $K\Subset L \Subset G \subset \mathbb{R}^2,$ and let ${\varepsilon}$ be positive such that ${\varepsilon}<\dist(L,\partial G).$ By compactness, $L$ can be covered by finitely many open balls of radius ${\varepsilon}/2:$
$$
L\subset \bigcup_{i=1}^{N_{\varepsilon}} B_{{\varepsilon}/2}(x_i).
$$
Consider a partition of unity $\{\rho_{{\varepsilon},x_i}\}_{i=1,\dots, N_{\varepsilon}}$ on $L$ subordinate to $\left\{B_{{\varepsilon}}(x_i)\right\}_{i=1,\dots,N_{\varepsilon}} \!\! .$
In particular the supports of $\rho_{{\varepsilon},x_i}$ are contained in $ B_{{\varepsilon}}(x_i),$ for every $i=1\dots N_{{\varepsilon}}.$
Then, for every $u,$ every small ${\varepsilon}>0$ and every $i=1\dots N_{{\varepsilon}},$ the function $v_{{\varepsilon},i}:=\rho_{{\varepsilon},x_i}u $ belongs to $ W^{k,p}_0({ \mathbb{R}}^2),$ for every $p\geq1,$ and every $k\in{ \mathbb{N}}.$
For such functions the
Poincar\'{e} inequality $\Vert v_{{\varepsilon},i}\Vert_{L^p(B_{\varepsilon}(x_i))} \le C \Vert \nabla v_{{\varepsilon},i}\Vert_{L^p(B_{\varepsilon}(x_i))}$ holds. Combining the latter
with Lemma \ref{lemmaabb} yields (with $C$ changing from line to line)
\begin{equation}\label{stima1}
\begin{array}{ll}
\Vert v_{{\varepsilon},i}\Vert_ {W^{1,p}({ \mathbb{R}}^2)}&= \Vert v_{{\varepsilon},i}\Vert_ {W^{1,p}(B_{\varepsilon}(x_i))} \leq C\Vert v_{{\varepsilon},i}\Vert_ {W^{1,p}_0(B_{\varepsilon}(x_i))}\\
& \leq C\Vert \overline{\partial}v_{{\varepsilon},i}\Vert_ {L^p(B_{\varepsilon}(x_i))}\\
& \leq C\Vert \rho_{{\varepsilon}, x_i}\overline{\partial}u\Vert_ {L^p(B_{\varepsilon}(x_i))}+
C\Vert u\overline{\partial}\rho_{{\varepsilon}, x_i}\Vert_ {L^p(B_{\varepsilon}(x_i))}\\
& \leq C \Vert \overline{\partial}u\Vert_ {L^p(G)}+C\Vert u\Vert_ {L^p(G)}.
\end{array}
\end{equation}
As $\left\{\rho_{{\varepsilon}, x_i}\right\}_{i=1,\dots, N_{{\varepsilon}}}$ is a partition of unity it follows that
\begin{equation}\label{stima2}
\Vert u\Vert_ {W^{1,p}(L)}=\left|\left|\sum_{i=1}^{N_{{\varepsilon}}}v_{{\varepsilon},i}\right|\right|_{W^{1,p}(L)}\leq
\sum_{i=1}^{N_{{\varepsilon}}}\Vert v_{{\varepsilon},i}\Vert_{W^{1,p}(B_{\varepsilon}(x_i))}.
\end{equation}
By (\ref{stima1}) and (\ref{stima2}) we obtain
\begin{equation}\label{3.9 di wojciech}
\Vert u\Vert_ {W^{1,p}(L)}\leq C_{p,L,G}\left(\Vert \overline{\partial}u\Vert_ {L^p(G)}+\Vert u\Vert_ {L^p(G)}\right).
\end{equation}
Combining (\ref{3.9 di wojciech}) with (\ref{lincr}), (\ref{estimateLinfty}) and (\ref{festimateLinfty}) yields
\begin{equation}\label{estimateW1}
\Vert u\Vert_ {W^{1,p}(L)}\leq C_{p,L,G}\left(\Vert f\Vert_ {L^p(G)}+\Vert u\Vert_ {L^p(G)}\right)\le C_{p,L,G}^1,
\end{equation}
where the constant $C_{p,L,G}^1$ depends on $p,L,G$, but not on $u.$
By the compactness of the Sobolev compact embedding
$W^{1,p}(L)\hookrightarrow C^{0}(L)$, cf.\ \cite{adams}, sequences $\{u^n\}\subset X$ have convergent subsequences in
$C^0_{\text{loc}}(L).$
Since the latter holds for every $L\subset { \mathbb{R}}^2,$
the convergence is in $C^0_{\text{loc}}({ \mathbb{R}}^2)$ and the limit $u$ is a continuous function.
It remains to show that the limit $u$ solves Equation (\ref{nonlinearCR}).
Consider a partition of unity of $K\Subset L,$ denoted $\{\rho_{{\varepsilon}, x_i}\}_{i=1,\dots N_{{\varepsilon}}}$, where
$0<{\varepsilon}<\dist(K,\partial L).$ On balls $B_{{\varepsilon}}(x_i)$ we obtain
$$
\begin{array}{ll}
\Vert \rho_{{\varepsilon},x_i}u\Vert_ {W^{2,p}(B_{{\varepsilon}})} &\leq C\Vert \rho_{{\varepsilon}, x_i}u\Vert_ {W^{2,p}_0(B_{{\varepsilon}}(x_i))}\leq C\Vert \overline{\partial}(\rho_{{\varepsilon},x_i}u)\Vert_ {W^{1,p}(B_{{\varepsilon}}(x_i))}\nonumber \\
&\leq C\displaystyle \left(\Vert \rho_{{\varepsilon},x_i}\overline{\partial}u\Vert_ {W^{1,p}(B_{{\varepsilon}}(x_i))}+\Vert u\overline{\partial}\rho_{{\varepsilon}, x_i}\Vert_ {W^{1,p}(B_{{\varepsilon}}(x_i))}\right)\nonumber \\
& \leq C\left(\Vert \overline{\partial}u\Vert_ {L^\infty(L)}+\Vert \overline{\partial}u\Vert_ {W^{1,p}(L)}+\Vert u\Vert_ {L^\infty(L)}+\Vert u\Vert_ {W^{1,p}(L)}\right).\nonumber
\end{array}
$$
As in (\ref{stima2}), using (\ref{lincr}), we obtain
\begin{equation}\label{stimaW2}
\Vert u\Vert_ {W^{2,p}(K)}\leq \tilde{C}_{p,K,L,G}\left(\Vert f\Vert_ {L^\infty(L)}+\Vert f\Vert_ {W^{1,p}(L)}+\Vert u\Vert_ {L^\infty(L)}+\Vert u\Vert_ {W^{1,p}(L)}\right).
\end{equation}
To estimate the three terms $\Vert f\Vert_ {L^\infty(L)},$ $\Vert u\Vert_ {L^\infty(L)}$ and $\Vert u\Vert_ {W^{1,p}(L)}$
we use (\ref{estimateLinfty}), (\ref{festimateLinfty}), and (\ref{estimateW1}).
In order to control $\Vert f\Vert_ {W^{1,p}(L)}$, differentiate the smooth vector field $F$:
\begin{eqnarray}
f_s(s,t)=(F(t,u))_s= D_{t,u} X(t,u)(0,u_s)\nonumber\\
f_t(s,t)=(F(t,u))_t= D_{t,u} X(t,u)(1,u_t).\nonumber
\end{eqnarray}
Both right hand sides lie in $L^{p}(L)$ and hence $Df=(f_s,f_t)$ is in $L^p(L).$ By (\ref{stimaW2})
there exists a constant ${C}_{p,K,L,G}^2$ independent of $u$ such that
$$
\Vert u\Vert_ {W^{2,p}(K)}\leq {C}_{p,K,L,G}^2.
$$
By taking $p>2$ the compact Sobolev embedding
$W^{2,p}(K)\hookrightarrow C^{1}({K})$
implies that $u\in X.$
\end{proof}
\begin{proof}[Proof of Proposition \ref{prop:aron}]
As in the proof of Lemma \ref{injectivityofpi1} if suffices to show that $\iota$ is injective.
Suppose there exist $u_1,u_2\in X$ such that $\iota(u_1) = \iota(u_2). $ By definition of $\iota$ we have
\begin{equation}\label{defiota}
u_1(0,\cdot) = u_2(0,\cdot).
\end{equation}
Define $v(s,t):=u_1(s,t)-u_2(s,t),$ for all $(s,t)\in { \mathbb{R}}\times S^1.$
By (\ref{defiota}) we have $v(0,t)=0$ for all $t\in S^1.$
By smoothness of the vector field $F$ we can write
$$
F(t,u_1)=F(t,u_2)+R(t,u_1,u_2-u_1)(u_2-u_1),
$$
where $R_1$ is a smooth function of its arguments. Upon substitution this gives
\begin{equation}\label{crlin1}
v_{s}-Jv_{t}+A(s,t)v=0, \quad v(0,t)=0\ \ \ \text{for all}\ t\in S^1,
\end{equation}
and $A(s,t)=R(t,u_1(s,t),v(s,t))$ is (at least) continuous on ${ \mathbb{R}}\times S^1.$ Evaluating (\ref{crlin1}) at $t=0$ we obtain,
\begin{equation}\label{crlin2}
v_{s}-Jv_{t}+A(s,t)v=0, \quad v(0,0)=0
\end{equation}
Introducing complex coordinates $z:=s+it,$ (\ref{crlin2}) becomes
\begin{equation}\label{crcomplex}
\partial_{}v+A(z)v=0, \quad v(0)=0,
\end{equation}
where the operator $\partial_{}:=\partial_s-i\partial_t$ is the standard anti-holomorphic derivative. We used the identification between the complex structure $J$ in ${ \mathbb{R}}^2$ and $i$ in $\mathbb{C}.$
Multiplying (\ref{crcomplex}) by $e^{\int_0^{z}A(\zeta)d\zeta}$ and defining
$$
w(z):=e^{\int_{0}^{z}A(\zeta)d\zeta}v(z),
$$
gives
$$
\partial_{} w=0, \quad w(0)=0.
$$
which implies that $w$ is analytic. The latter yields that either $0$ is an isolated zero for $w$, or there exists a $\delta>0,$ such that $w(z)=0,$ on $U_{\delta}:=\{z\in \mathbb{C}:|z|\leq \delta\}.$ By (\ref{crlin1}) we conclude that 0 cannot be an isolated zero for $w$, hence $w\equiv 0$ in $U_{\delta}:=\{z\in \mathbb{C}:|z|\leq \delta\}.$ Repeating these arguments we obtain that $w(s,t)=0 $ for all $(s,t)\in { \mathbb{R}}\times S^1$ and hence $v\equiv0.$ This implies $u_1=u_2,$ which concludes the proof.\end{proof}
\begin{remark}
{\em
The same proof can be carried out in case $J$ is a smooth map ${ \mathbb{R}}\times S^1\to \Sp(2,{ \mathbb{R}})$ such that $J^2=-\Id$.
In this case one can prove that the equation
$
u_s-J(s,t)(u_t-F(t,u))=0
$
can be transformed into (\ref{nonlinearCR}) using \cite[Theorem 12, Appendix A.6]{hoferzehnder}.
}
\end{remark}
\bibliographystyle{amsplain}
|
\section{Introduction}
A Bose-Einstein condensate (BEC) is a state of a dilute gas of bosons cooled
to temperature very close to absolute zero. Under such condition, a large fraction
of bosons will occupy the lowest quantum state,
at which point, macroscopic quantum becomes apparent. BEC was first proposed by A.
Einstein who
generalized a work of S. N. Bose on the quantum statistics for photons \cite{Bose} to a
gas of non-interacting bosons \cite{Einstein1,Einstein2}.
Then Gross-Pitaevskii theory was developed by Gross \cite{G} and Pitaevskii \cite{P}
independently in 1960s to describe the dynamics of a BEC \cite{PitaevskiiStringari}.
Since the first experimental
observation of BEC in 1995, much attention has been paid to the Gross-Pitaevskii equation (GPE).
In the past decades, there have existed many papers discussing the numerical methods for the
time-dependent GPEs and time-independent GPEs. Please refer to \cite{Adhikari,AdhikariMuruganandam,AnglinKetterle,BaoCai,BaoDu}
and the papers cited therein. Especially, in \cite{CancesChakirMaday,ZhouBEC}, the convergence
and the priori error estimates of the finite element method for GPEs have been proved, which will be used later in this paper.
Solving such kind of nonlinear eigenvalue problem is an important but difficult problem in science and engineering computation.
As is known to us all, the multigrid method provides an optimal
complexity algorithm to solve discrete boundary value problems.
The aim of this paper is to propose a multigrid scheme for GPEs based on Newton iteration method. More precisely, GPE is regarded as a
nonlinear problem in the composite space $\R\times H_0^1(\Omega)$ and then Newton iteration is adopted to derive a linearized
boundary value problem. Thus, we just need to solve a linear problem with finite element method in every refined space.
With this multigrid scheme, solving GPE problem will not be more difficult than solving the corresponding boundary value problem.
Besides, the convergence rate and computational work of this method are also analyzed in this paper.
An outline of the paper goes as follows. In Section 2, we introduce the finite element
method and corresponding convergence estimates for the ground state solution of BEC, i.e.
non-dimensionalized GPE.
A Newton iteration method for GPE is presented in Section 3.
In Section 4, we propose a type of multigrid algorithm for
GPE based on Newton iteration method. Section 5 is devoted to
estimating the computational work of the multigrid method designed in Section 4.
Two numerical examples are presented in Section 6 to validate the theoretical analysis.
Finally, some concluding remarks are given in the last section.
\section{Finite element method for Gross-Pitaevskii equation}
This section is devoted to introducing some notation and the finite element method for GPE problem.
The letter $C$ (with or without subscripts) denotes a generic
positive constant which may be different at its different occurrences.
For convenience, the symbols $\lesssim$, $\gtrsim$ and $\approx$
will be used in this paper to denote $x_1\leq C_1y_1$, $x_2 \geq c_2y_2$
and $c_3x_3\leq y_3\leq C_3x_3$ for some constants $C_1, c_2, c_3$, $C_3$
that are independent of mesh sizes (see, e.g., \cite{Xu}).
We shall use the standard notation for Sobolev spaces $W^{s,p}(\Omega)$ and their
associated norms $\|\cdot\|_{s,p,\Omega}$ and seminorms $|\cdot|_{s,p,\Omega}$
(see, e.g., \cite{Adams}). For $p=2$, we denote
$H^s(\Omega)=W^{s,2}(\Omega)$, $H_0^1(\Omega)=\{v\in H^1(\Omega):\ v|_{\partial\Omega}=0\}$,
where $v|_{\partial\Omega}=0$ is in the sense of trace and
$\|\cdot\|_{s,\Omega}=\|\cdot\|_{s,2,\Omega}$. In this paper, we set $V=H_0^1(\Omega)$
and use $\|\cdot\|_s$ to denote $\|\cdot\|_{s,\Omega}$ for simplicity.
It is known that the wave function $\psi$ of a sufficiently dilute condensate,
in the presence of an external potential $\widetilde{W,}$ satisfies the following GPE
\begin{eqnarray}\label{GPE}
\left(-\frac{\hbar^2}{2m}\Delta + \widetilde{W} + \frac{4\pi\hbar^2aN}{m}|\psi|^2\right)\psi &=&\mu\psi,
\end{eqnarray}
where $\mu$ is the chemical potential and $N$ is the number of atoms
in the condensate, $4\pi\hbar^2a/m$ represents the effective two-body interaction, $\hbar$ is the
Plank constant, $a$ is the scattering length (positive for repulsive interaction and negative for
attractive interaction) and $m$ is the particle mass. In this paper, we assume the external potential
$\widetilde{W}(x)$ is measurable, locally bounded and tends to infinity as $|x|\rightarrow\infty$
in the sense that
\begin{eqnarray*}
\inf_{|x|\geq r}\widetilde{W}(x)\rightarrow \infty\ \ \ \ {\rm as}\ r\rightarrow \infty.
\end{eqnarray*}
Then the wave function $\psi$ must vanish exponentially fast as $|x|\rightarrow \infty$.
Furthermore, (\ref{GPE}) can be written as
\begin{eqnarray}\label{GPE_Simple}
\left(-\Delta +\frac{2m}{\hbar^2}\widetilde{W}+8\pi aN|\psi|^2\right)\psi&=&\frac{2m\mu}{\hbar^2}\psi.
\end{eqnarray}
Hence in this paper, we are concerned with the smallest eigenpair for
the following non-dimensionalized GPE problem:
\begin{equation}\label{GPEsymply2}
\left\{
\begin{array}{rcl}
-{\Delta} u + Wu + \zeta |u|^2u &=& \lambda u,\ \ \ {\rm in}\ \Omega,\\
u &=& 0,\ \ \ \ \ {\rm on}\ \partial \Omega,\\
\int_\Omega|u|^2{d\Omega} &=& 1,
\end{array}
\right.
\end{equation}
where $\Omega \subset \mathbb{R}^d$ $( d = 1, 2, 3)$ denotes the computing
domain which has the cone property \cite{Adams}, $\zeta$ is some positive constant and
$W(x) = \gamma_1 x^2_1 +\cdots +\gamma_d x^2_d \geq 0$
with $\gamma_1,\cdots , \gamma_d > 0$ \cite{BaoTang,ZhouBEC}.
For the aim of finite element
discretization, the corresponding weak form for (\ref{GPEsymply2}) can be described as follows:
Find $(\lambda,u)\in \R\times V$ such that $b(u,u) = 1$ and
\begin{equation}\label{GPEweakform}
a(u,v) = \lambda b(u,v),\ \ \ \forall v \in V,
\end{equation}
where
\[
a(u,v) = \int_\Omega\big( \nabla u\cdot\nabla v+Wuv+\zeta |u|^2uv\big)d\Omega,
\ \ \ \ b(u,v) = \int_\Omega uvd\Omega.
\]
We also introduce the linearized form $a'(u;v,w)$ by
\begin{eqnarray}
a'(u;v,w) = \int_\Omega\big(\nabla v\cdot\nabla w + Wvw
+ 3\zeta|u|^2vw\big)d\Omega, \quad \forall v,w\in V.
\end{eqnarray}
Here and hereafter in this paper, we only consider the smallest eigenvalue and
the corresponding eigenfunction of the problem (\ref{GPEweakform}).
For GPE problem, we can find the following estimates from \cite{CancesChakirMaday}.
\begin{lemma}
There exist positive constants $M,\ C_L$ and $C_U$ such that for all $v\in H_0^1(\Omega)$,
\begin{eqnarray}
0\leq ( \nabla v,\nabla v)+(Wv+\zeta |u|^2v,v)-\lambda(v,v) \leq M\|v\|_1^2
\end{eqnarray}
and
\begin{eqnarray}\label{coercive a'}
C_L \|v\|_1^2\leq a'(u;v,v)-\lambda(v,v) \leq C_U\|v\|_1^2.
\end{eqnarray}
\end{lemma}
Now, let us define the finite element method \cite{BrennerScott,Ciarlet}
for the problem (\ref{GPEweakform}). First we
generate a shape-regular decomposition of the computing domain
$\Omega \subset \mathbb{R}^d$ and the diameter of a cell $K \in \mathcal{T}_h$ is
denoted by $h_K$. The mesh diameter $h$ describes the maximum diameter of all cells
$K \in \mathcal{T}_h$. Based on the mesh $\mathcal{T}_h$, we construct the
linear finite element space denoted by $V_h\subset V$.
We assume that $V_h\subset V$ satisfies the following assumption:
\begin{equation}
\lim_{h\rightarrow 0}\inf_{v \in V_h} \|w - v\|_1 = 0,\ \ \ \forall w\in V.
\end{equation}
The standard finite element method for (\ref{GPEweakform}) is to solve the following eigenvalue problem:
Find $(\lambda_h,u_h)\in \R\times V_h$ such that $b(u_h,u_h) = 1$ and
\begin{equation}\label{GPEfem}
a(u_h,v_h) = \lambda_h b(u_h,v_h),\ \ \ \forall v_h \in V_h.
\end{equation}
Then we define
\begin{equation}\label{delta}
\delta_h(u) := \inf_{v_h\in V_h}\|u - v_h\|_1.
\end{equation}
The convergence estimates of the finite element method for (\ref{GPEweakform}) are
presented in the following lemma which can be found in \cite{CancesChakirMaday,ZhouBEC}.
\begin{lemma}\label{lemma:Maday}
(\cite[Theorem 1]{CancesChakirMaday})
There exists $h_0 > 0$, such that for all $0 < h < h_0$, the smallest eigenpair approximation
$(\lambda_h,u_h)$ of (\ref{GPEfem}) has the following error estimates
\begin{eqnarray}
\|u - u_h\|_1 &\lesssim& \delta_h(u),\\
\|u - u_h\|_0 &\lesssim& \eta_a(V_h)\|u -u_h\|_1 \lesssim \eta_a(V_h)\delta_h(u),\\
|\lambda - \lambda_h| &\lesssim& \|u - u_h\|^2_1
+ \|u - u_h\|_0\lesssim \eta_a(V_h)\delta_h(u),
\end{eqnarray}
where $\eta_a(V_h)$ is defined as follows
\begin{eqnarray}\label{eta_a_h}
\eta_a(V_h)=\|u-u_h\|_1+ \sup_{f\in L^2(\Omega),\|f\|_0=1}\inf_{v_h\in V_h}\|Tf-v_h\|_1
\end{eqnarray}
with the operator $T$ being defined as follows:
Find $Tf\in u^{\perp}$ such that
\vskip-0.7cm
\begin{eqnarray*}
a'(u;Tf,v)- (\lambda(Tf),v)=(f,v),\ \ \ \ \forall v\in u^{\perp},
\end{eqnarray*}
and $u^{\perp}=\big\{v\in H_0^1(\Omega) | \int_{\Omega}uvd\Omega=0\big\}$.
\end{lemma}
\section{Newton iteration method for Gross-Pitaevskii equation}
In this section, Newton iteration method is introduced to solve the GPE
problem in a composite space defined as follows:
Denote the space $\R\times H_0^1(\Omega)$ by $X$ and $\R\times H^{-1}(\Omega)$
by $X^*$ with the norm
\begin{eqnarray*}
\|(\gamma,w)\|_X=|\gamma |+\|w\|_1 \quad
\text{and} \quad
\|(\gamma,w)\|_0=|\gamma |+\|w\|_0, \quad \forall (\gamma,w)\in X.
\end{eqnarray*}
And the corresponding finite element space $\R\times V_h$ is denoted by $X_h$.
For any $(\gamma,w),\ (\mu,v)\in X$, we define a nonlinear operator $\cG: X \rightarrow X^*$ as follows
\begin{eqnarray}\label{definition of g}
\langle\cG(\gamma,w),(\mu,v)\rangle &=& ( \nabla w,\nabla v)+(Ww+\zeta |w|^2w-\gamma w,v)\nonumber\\
&&\ \ \ +\frac{1}{2}\mu\left(1-\int_{\Omega}w^2d\Omega\right).
\end{eqnarray}
Since we request $\|u\|_0^2=1$, (\ref{GPEweakform}) can be rewritten as: Find $(\lambda,u)\in X$ such that
\begin{eqnarray}\label{rewrittem g}
\langle\cG(\lambda,u),(\mu,v)\rangle=0, \quad \forall (\mu,v) \in X.
\end{eqnarray}
The Fr\'{e}chet derivation of $\cG$ at $(\lambda,u)$ is given by
\begin{eqnarray}\label{definition of g'}
\langle\cG'(\lambda,u)(\gamma,w),(\mu,v)\rangle&=&(\nabla w,\nabla v)+((W+3\zeta u^2-\lambda)w,v)\nonumber\\
&&\ \ \ -\gamma(u,v)-\mu(u,w)\nonumber\\
&=&a'(u;w,v)-\lambda (w,v)-\gamma(u,v)-\mu(u,w).
\end{eqnarray}
Assume we have an initial eigenpair approximation $(\lambda^{'},u^{'})$ on the finite element space $X_h$,
Newton iteration method for GPE
is defined as follows to get a better eigenpair approximation $(\lambda^{''},u^{''})\in X_h$:
\begin{eqnarray}\label{Newton Iteration}
\langle \cG'(\lambda^{'},u^{'})(\lambda^{''}-\lambda^{'},u^{''}-u^{'}),(\mu,v)\rangle
=-\langle\cG(\lambda^{'},u^{'}),(\mu,v)\rangle, \quad \forall (\mu,v)\in X_h.
\end{eqnarray}
From (\ref{definition of g}) and (\ref{definition of g'}), (\ref{Newton Iteration})
can be rewritten as follows: Find$(\lambda^{''},u^{''})\in X_h$, such that
\begin{eqnarray}\label{newton step}
\begin{cases}
a(u^{'};u^{''},v)-\lambda^{''}(u^{'},v)
=(2\zeta (u^{'})^3-\lambda^{'}u^{'},v),\quad \forall v\in V_h,\\
-\mu (u^{'},u^{''})=-\mu/2-\mu(u^{'},u^{'})/2,\qquad\qquad\quad\ \ \forall \mu\in \R
\end{cases}
\end{eqnarray}
with $a(u^{'};u^{''},v)=a'(u^{'};u^{''},v)-\lambda^{'}(u^{''},v)$.
The isomorphism property of $\cG'$ is analyzed in the following theorem.
\begin{theorem}
If the mesh size $h$ is sufficiently small, then for the linearized operator
$\cG'$ presented in (\ref{definition of g'}), we have
\begin{eqnarray}\label{coercive of g1}
\|(\gamma,w)\|_X \lesssim \mathop {\sup}
\limits_{(\mu,v)\in X}\dfrac{\langle\cG'(\lambda,u)(\gamma,w),(\mu,v)\rangle}{\|(\mu,v)\|_X},
\quad \forall (\gamma,w)\in X
\end{eqnarray}
and
\begin{eqnarray}\label{coercive of g2}
\|(\gamma,w)\|_X \lesssim \mathop {\sup}
\limits_{(\mu,v)\in X_h}\dfrac{\langle\cG'(\lambda,u)(\gamma,w),(\mu,v)\rangle}{\|(\mu,v)\|_X},
\quad \forall (\gamma,w)\in X_h.
\end{eqnarray}
For any $(\hat{\lambda},\hat{u})\in X$ such that
$\|(\hat{\lambda}-\lambda,\hat{u}-u)\|_X$ is small enough, there holds
\begin{eqnarray}\label{coercive of g3}
\|(\gamma,w)\|_X \lesssim \mathop {\sup} \limits_{(\mu,v)\in X_h}\dfrac{\langle\cG'(\hat{\lambda},\hat{u})(\gamma,w),(\mu,v)\rangle}{\|(\mu,v)\|_X},
\quad \forall (\gamma,w)\in X_h.
\end{eqnarray}
\end{theorem}
\begin{proof}
For the first estimate (\ref{coercive of g1}), we just need to prove that the equation
\begin{eqnarray}\label{linear equation}
\cG'(\lambda,u)(\gamma,w)=(\tau,f)
\end{eqnarray}
is uniquely solvable in $X$ for any $(\tau,f)\in X^*$.
From (\ref{definition of g'}), we obtain that (\ref{linear equation}) can be rewritten as
\begin{eqnarray*}
\begin{cases}
a'(u;w,v)-\lambda(w,v)+b_u(\gamma,v)=(f,v), \quad \forall v\in V,\\
b_u(\mu,w)=\mu\tau, \qquad \qquad \qquad \qquad\qquad ~~~ \quad\forall \mu \in \R,
\end{cases}
\end{eqnarray*}
where $b_u(\mu,v)=-\mu(u,v)$.
For this saddle problem, the solvable condition is (Theorem 1.1 in \cite{Fortin},
\uppercase\expandafter{\romannumeral2}):
Firstly, the following variational problem
\begin{eqnarray}\label{unique of a}
a'(u;w,v)-\lambda (w,v)=(f,v), \quad \forall v\in V_0
\end{eqnarray}
is uniquely solvable for any $f\in H^{-1}(\Omega)$ and $V_0:=\{v\in V: b_u(\mu,v)=0, \forall \mu \in \R\}$.
Secondly, $b_u(\cdot,\cdot)$ satisfies the inf-sup condition
\begin{eqnarray}\label{infsup}
\inf_{\mu\in \R}\sup_{v\in V}\dfrac{b_u(\mu,v)}{\|v\|_1|\mu|}\geq k_b
\end{eqnarray}
for some constant $k_b>0$.
The well-poseness of (\ref{unique of a}) can be derived from (\ref{coercive a'}) directly.
For the second condition (\ref{infsup}), take $v=-\mu u$. Since $\|u\|_0=1$, there holds
\begin{eqnarray*}
\inf_{\mu\in \R}\sup_{v\in V}\dfrac{b_u(\mu,v)}{\|v\|_1|\mu|} \geq
\inf_{\mu\in \R}\dfrac{\mu^2(u,u)}{\|u\|_1|\mu|^2}=\frac{1}{\|u\|_1}=: k_b.
\end{eqnarray*}
This completes the proof of (\ref{coercive of g1}).
From (\ref{coercive a'}), we can define a project operator $P_h:V \rightarrow V_h$ by
\begin{eqnarray}
a'(u;w,v-P_hv)-\lambda(w,v-P_hv)=0, \quad \forall w\in V_h,\ v\in V.
\end{eqnarray}
There apparently holds
\begin{eqnarray}\label{projection}
\|P_hv\|_1 \lesssim \|v\|_1, \quad\forall v \in V.
\end{eqnarray}
From the Aubin-Nitsche lemma, we have
\begin{eqnarray}\label{L2_Estimate}
\|v-P_hv\|_0\lesssim \eta_a(V_h)\|v\|_1, \quad\forall v \in V.
\end{eqnarray}
So for any $(\gamma,w)\in X_h$, from (\ref{L2_Estimate}), the following estimates hold
\begin{eqnarray}\label{isomorphism}
\|(\gamma,w)\|_X &\lesssim& \mathop {\sup} \limits_{(\mu,v)\in X}\dfrac{\langle\cG'(\lambda,u)(\gamma,w),(\mu,v)\rangle}{\|(\mu,v)\|_X}\nonumber\\
&=&\mathop {\sup} \limits_{(\mu,v)\in X}\dfrac{\langle\cG'(\lambda,u)(\gamma,w),(\mu,P_hv)\rangle
+\langle\cG'(\lambda,u)(\gamma,w),(0,v-P_hv)\rangle}{\|(\mu,v)\|_X}\nonumber\\
&=&\mathop {\sup} \limits_{(\mu,v)\in X}\dfrac{\langle\cG'(\lambda,u)(\gamma,w),(\mu,P_hv)\rangle
-\gamma(u,v-P_hv)}{\|(\mu,v)\|_X}\nonumber\\
&\lesssim&\mathop {\sup} \limits_{(\mu,v)\in X}\dfrac{\langle\cG'(\lambda,u)(\gamma,w),(\mu,P_hv)\rangle+\gamma \|u\|_0\|v-P_hv\|_0}{\|(\mu,v)\|_X}\nonumber\\
&\lesssim&\mathop {\sup} \limits_{(\mu,v)\in X}\dfrac{\langle\cG'(\lambda,u)(\gamma,w),(\mu,P_hv)\rangle+\gamma \eta_a(V_h)\|u\|_0\|v\|_1}{\|(\mu,v)\|_X}\nonumber\\
&\lesssim&\mathop {\sup} \limits_{(\mu,v)\in X}\dfrac{\langle\cG'(\lambda,u)(\gamma,w),(\mu,P_hv)\rangle}{\|(\mu,v)\|_X}+\eta_a(V_h)\|(\gamma,w)\|_X.
\end{eqnarray}
Combing (\ref{projection}) and (\ref{isomorphism}) leads to
\begin{eqnarray*}
\|(\gamma,w)\|_X &\lesssim&\mathop {\sup} \limits_{(\mu,v)\in X}\dfrac{\langle\cG'(\lambda,u)(\gamma,w),(\mu,P_hv)\rangle}{\|(\mu,v)\|_X}\\
&\lesssim&\mathop {\sup} \limits_{(\mu,v)\in X}
\dfrac{\langle\cG'(\lambda,u)(\gamma,w),(\mu,P_hv)\rangle}{\|(\mu,P_hv)\|_X}\\
&\lesssim&\mathop {\sup} \limits_{(\mu,v)\in X_h}
\dfrac{\langle\cG'(\lambda,u)(\gamma,w),(\mu,v)\rangle}{\|(\mu,v)\|_X}.
\end{eqnarray*}
Then we get the desired conclusion (\ref{coercive of g2}).
For the last inequality (\ref{coercive of g3}), we assume there exists
a sufficiently small constant $\varepsilon$ such that
$\|(\hat{\lambda}-\lambda,\hat{u}-u)\|_X\leq \varepsilon$. Then for any $(\gamma,w)\in X_h$
\begin{eqnarray*}
\|(\gamma,w)\|_X &\lesssim& \mathop {\sup} \limits_{(\mu,v)\in X_h}\dfrac{\langle\cG'(\lambda,u)(\gamma,w),(\mu,v)\rangle}{\|(\mu,v)\|_X}\\
&\lesssim&\mathop {\sup} \limits_{(\mu,v)\in X_h}
\dfrac{\langle\cG'(\hat{\lambda},\hat{u})(\gamma,w),(\mu,v)\rangle+
\varepsilon \|(\gamma,w)\|_X\|(\mu,v)\|_X }{\|(\mu,v)\|_X}.
\end{eqnarray*}
The desired result $(\ref{coercive of g3})$ then easily follows if $\varepsilon$ is sufficiently small.
\end{proof}
Applying Newton iteration method to GPE leads to a linearized problem,
the corresponding residual estimate can be derived from the following theorem.
\begin{theorem}\label{residual estiamte}
For the nonlinear operator $\cG$ and any $(\mu_h,v_h), (\mu,v)\in X$, we have
\begin{eqnarray}\label{error of Newton Iteration}
\langle \cG(\mu_h,v_h),(\sigma,\eta)\rangle&=&\langle\cG(\mu,v),(\sigma,\eta)\rangle
+\langle \cG'(\mu,v)(\mu_h-\mu,v_h-v),(\sigma,\eta)\rangle \nonumber\\
&&+R\big((\mu,v),(\mu_h,v_h),(\sigma,\eta)\big),\quad\quad\forall (\sigma,\eta)\in X
\end{eqnarray}
with $R\big((\mu,v),(\mu_h,v_h),(\sigma,\eta)\big)$ being the residual which can be estimated as follows:
\begin{eqnarray*}
| R\big((\mu,v),(\mu_h,v_h),(\sigma,\eta)\big)|
\lesssim \|(\mu-\mu_h,v-v_h)\|_X\|(\mu-\mu_h,v-v_h)\|_0\|(\sigma,\eta)\|_X.
\end{eqnarray*}
\end{theorem}
\begin{proof}
Define
\begin{eqnarray}
\varphi(t)=\langle \cG((\mu,v)+t(\mu_h-\mu,v_h-v)),(\sigma,\eta)\rangle.
\end{eqnarray}
Then the derivative of $\varphi$ with respect to $t$ can be derived trivially.
\begin{eqnarray*}
\varphi'(t)&=&(\nabla (v_h-v),\nabla \eta)+(W(v_h-v),\eta)+3 \big(\zeta(v+t(v_h-v))^2(v_h-v),\eta\big)\\
&&-(\mu_h-\mu)(v+t(v_h-v),\eta)-(\mu+t(\mu_h-\mu))(v_h-v,\eta)\\
&&-\sigma (v+t(v_h-v),v_h-v)\\
&=&\langle \cG'((\mu,v)+t(\mu_h-\mu,v_h-v))(\mu_h-\mu,v_h-v),(\sigma,\eta)\rangle
\end{eqnarray*}
and
\begin{eqnarray}\label{eta''}
\varphi''(t)&=&-2(\mu_h-\mu)(v_h-v,\eta)-\sigma (v_h-v,v_h-v) \nonumber\\
&& \ \ +6(\zeta(v+t(v_h-v))(v_h-v)^2,\eta).
\end{eqnarray}
Denote $\xi = v+t(v_h-v)$ and from the imbedding theorem, we have
$$\|\xi\|_{0,6}\lesssim \|\xi\|_1 \lesssim \|v\|_1+\|v_h\|_1.$$
For the last term of (\ref{eta''}),
\begin{eqnarray}
|(\xi(v_h-v)^2,\eta)| &\lesssim& \int_{\Omega}|\xi|(v_h-v)^2|\eta| dx \nonumber\\
&\lesssim& \|\xi\|_{0,6}\|v_h-v\|_{0}\|v_h-v\|_{0,6}\|\eta\|_{0,6} \nonumber\\
&\lesssim& \|\xi\|_1\|v_h-v\|_1\|v_h-v\|_0\|\eta\|_1.
\end{eqnarray}
Thus, (\ref{error of Newton Iteration}) can be derived from the following Taylor expansion
\begin{eqnarray}\label{talor expansion}
\varphi(1)=\varphi(0)+\varphi'(0)+\int_{0}^{1}\varphi''(t)(1-t)dt.
\end{eqnarray}
Due to (\ref{eta''})-(\ref{talor expansion}), the residual $R$ satisfies
\begin{eqnarray*}
| R\big((\mu,v),(\mu_h,v_h),(\sigma,\eta)\big)|
\lesssim \|(\mu-\mu_h,v-v_h)\|_X\|(\mu-\mu_h,v-v_h)\|_0\|(\sigma,\eta)\|_X.
\end{eqnarray*}
Then we complete the proof.
\end{proof}
\section{Multigrid algorithm based on Newton iteration method}
In this section, we propose a multigrid scheme based on Newton iteration method.
In this algorithm, we only need to solve a linearized mixed variational problem
on each refined finite element space.
\subsection{One Newton iteration step}
In order to design the multigrid method, we first introduce an one Newton iteration
step in this subsection. Assume we have obtained an eigenpair approximation
$(\lambda^{h_k},u^{h_k})\in \mathcal{R}\times V_{h_k}$, a type of iteration
step will be introduced to derive an eigenpair
$(\lambda^{h_{k+1}},u^{h_{k+1}})\in \mathcal{R}\times V_{h_{k+1}}$ with a better accuracy.
In this paper, we denote by $(\lambda_{h_k},u_{h_k})$ the standard finite element solution of (\ref{GPEweakform}).
\begin{algorithm}\label{One Correction Step}
One Newton Iteration Step
\begin{enumerate}
\item Define the linearized mixed variational equation on the finite element space $X_{h_{k+1}}$ as follows:
Find $(\hat{\lambda}^{h_{k+1}},\hat{u}^{h_{k+1}})\in X_{h_{k+1}}$
such that for all $(\mu,v_{h_{k+1}})\in X_{h_{k+1}}$
\begin{eqnarray}\label{one correction bvp}
\begin{cases}
a(u^{h_{k}};\hat{u}^{h_{k+1}},v_{h_{k+1}})-\hat{\lambda}^{h_{k+1}}(u^{h_{k}},v_{h_{k+1}})
=(2\zeta(u^{h_{k}})^3-\lambda^{h_{k}}u^{h_{k}},v_{h_{k+1}}), \\
-\mu (\hat{u}^{h_{k+1}}, u^{h_{k}})=-\mu/2-\mu(u^{h_{k}},u^{h_{k}})/2,
\end{cases}
\end{eqnarray}
where
$a(u^{h_{k}};\hat{u}^{h_{k+1}},v_{h_{k+1}})=a'(u^{h_{k}};\hat{u}^{h_{k+1}},
v_{h_{k+1}})-\lambda^{h_{k}}(\hat{u}^{h_{k+1}},v_{h_{k+1}})$.
\item Solve equation $(\ref{one correction bvp})$ to obtain an eigenpair
approximation $(\lambda^{h_{k+1}},u^{h_{k+1}})$
satisfying $\|(\lambda^{h_{k+1}}-\hat{\lambda}^{h_{k+1}},u^{h_{k+1}}-\hat{u}^{h_{k+1}})\|_X\lesssim \eta_a(V_{h_{k+1}})\delta_{h_{k+1}}(u) $.
\end{enumerate}
In order to simplify the notation and summarize the above two steps, we define
\begin{eqnarray*}
(\lambda^{h_{k+1}},u^{h_{k+1}})=Newton_{-}Iteration(\lambda^{h_k}, u^{h_k},V_{h_{k+1}}).
\end{eqnarray*}
\end{algorithm}
\begin{theorem}\label{One Correction Step estimate}
After implementing Algorithm $\ref{One Correction Step}$, the resultant
eigenpair approximation $(\lambda^{h_{k+1}},u^{h_{k+1}})$ has the following error estimate
\begin{eqnarray}\label{estimate}
&&\|(\lambda^{h_{k+1}}-\lambda_{h_{k+1}},u^{h_{k+1}}-u_{h_{k+1}})\|_X\nonumber\\
&\lesssim& \eta_a(V_{h_{k+1}})\delta_{h_{k+1}}(u)+\delta_{h_{k}}(u)
\|(\lambda_{h_{k}}-\lambda^{h_{k}},u_{h_{k}}-u^{h_{k}})\|_X\nonumber\\
&&+\|(\lambda_{h_{k}}-\lambda^{h_{k}},u_{h_{k}}-u^{h_{k}})\|_X
\|(\lambda_{h_{k}}-\lambda^{h_{k}},u_{h_{k}}-u^{h_{k}})\|_0.
\end{eqnarray}
\end{theorem}
\begin{proof}
For the standard finite element solution $(\lambda_{h_{{k+1}}},u_{h_{{k+1}}})$, we have
\begin{eqnarray}
\langle\cG(\lambda_{h_{{k+1}}},u_{h_{{k+1}}}),(\mu,v_{h_{{k+1}}})\rangle=0,
\quad \forall (\mu,v_{h_{{k+1}}}) \in X_{h_{k+1}}.
\end{eqnarray}
Together with Theorem \ref{residual estiamte} and Algorithm \ref{One Correction Step}, there holds
\begin{eqnarray*}
&&\langle \cG'(\lambda^{h_{k}},u^{h_{k}})(\lambda_{h_{k+1}}-\hat{\lambda}^{h_{k+1}},u_{h_{k+1}}
-\hat{u}^{h_{k+1}}),(\mu,v_{h_{k+1}})\rangle \\
&=& \langle \cG(\lambda^{h_{k}},u^{h_{k}}),(\mu,v_{h_{k+1}})\rangle\\
&&+\langle \cG'(\lambda^{h_{k}},u^{h_{k}})(\lambda_{h_{k+1}}
-\lambda^{h_{k}},u_{h_{k+1}}-u^{h_{k}}),(\mu,v_{h_{k+1}})\rangle \\
&=& \langle \cG(\lambda^{h_{k}},u^{h_{k}}),(\mu,v_{h_{k+1}})\rangle
-\langle\cG(\lambda_{h_{k+1}},u_{h_{k+1}}),(\mu,v_{h_{k+1}})\rangle\\
&&+\langle \cG'(\lambda^{h_{k}},u^{h_{k}})(\lambda_{h_{k+1}}
-\lambda^{h_{k}},u_{h_{k+1}}-u^{h_{k}}),(\mu,v_{h_{k+1}})\rangle \\
&=&-R\big((\lambda^{h_{k}},u^{h_{k}}),(\lambda_{h_{k+1}},u_{h_{k+1}}),(\mu,v_{h_{k+1}})\big).
\end{eqnarray*}
Using (\ref{coercive of g3}) and Theorem \ref{residual estiamte}, we derive
\begin{eqnarray}\label{coercive in Newtopn}
&&\|(\lambda_{h_{k+1}}-\hat{\lambda}^{h_{k+1}},u_{h_{k+1}}-\hat{u}^{h_{k+1}})\|_X\nonumber\\
&\lesssim& \|(\lambda_{h_{k+1}}-\lambda^{h_{k}},u_{h_{k+1}}-u^{h_{k}})\|_X\|(\lambda_{h_{k+1}}
-\lambda^{h_{k}},u_{h_{k+1}}-u^{h_{k}})\|_0\nonumber\\
&\lesssim& \eta_a(V_{h_{k}})\delta_{h_{k}}^2(u)+\delta_{h_{k}}(u)\|(\lambda_{h_{k}}
-\lambda^{h_{k}},u_{h_{k}}-u^{h_{k}})\|_X\nonumber\\
&&+\|(\lambda_{h_{k}}-\lambda^{h_{k}},u_{h_{k}}-u^{h_{k}})\|_X\|(\lambda_{h_{k}}
-\lambda^{h_{k}},u_{h_{k}}-u^{h_{k}})\|_0.
\end{eqnarray}
Since
\begin{eqnarray*}
\|(\lambda^{h_{k+1}}-\hat{\lambda}^{h_{k+1}},u^{h_{k+1}}-\hat{u}^{h_{k+1}})\|_X
\lesssim \eta_a(V_{h_{k+1}})\delta_{h_{k+1}}(u),
\end{eqnarray*}
we arrive at
\begin{eqnarray*}
&&\|(\lambda^{h_{k+1}}-\lambda_{h_{k+1}},u^{h_{k+1}}-u_{h_{k+1}})\|_X\\
&\lesssim& \eta_a(V_{h_{k+1}})\delta_{h_{k+1}}(u)+\delta_{h_{k}}(u)\|(\lambda_{h_{k}}
-\lambda^{h_{k}},u_{h_{k}}-u^{h_{k}})\|_X\\
&&+\|(\lambda_{h_{k}}-\lambda^{h_{k}},u_{h_{k}}-u^{h_{k}})\|_X\|(\lambda_{h_{k}}
-\lambda^{h_{k}},u_{h_{k}}-u^{h_{k}})\|_0..
\end{eqnarray*}
This completes the proof.
\end{proof}
\subsection{Multigrid method}
In order to do multigrid iteration, we define a sequence of triangulations
$\cT_{h_k}$ and $\cT_{h_{k+1}}$ is produced from $\cT_{h_k}$ via a regular
refinement (produce $\beta^d$ congruent elements) such that
\begin{eqnarray}\label{mesh_size_recur}
h_k\approx\frac{1}{\beta}h_{k-1},
\end{eqnarray}
where the integer $\beta$ denotes the refinement index and larger than $1$ (always equals $2$).
Based on the mesh sequence, we construct a sequence of linear finite element spaces satisfying
\begin{eqnarray}\label{mesh relationship}
V_{h_{1}}\subset V_{h_{2}}\subset \cdots \subset V_{h_n}\subset V
\end{eqnarray}
and assume the following relations of approximation errors hold
\begin{eqnarray}\label{delta_recur_relation}
\eta_a(V_{h_k})\approx\frac{1}{\beta}\eta_a(V_{h_{k-1}}),\quad
\delta_{h_k}(u)\approx\frac{1}{\beta}\delta_{h_{k-1}}(u),\ \ \ k=1,2,\cdots,n.
\end{eqnarray}
Obviously, the following relationship is also valid
\begin{eqnarray}
X_{h_{1}}\subset X_{h_{2}}\subset \cdots \subset X_{h_n}\subset X.
\end{eqnarray}
The multigrid method based on one Newton iteration step is proposed in the following algorithm.
\begin{algorithm}\label{mg}
Multigrid Algorithm
\begin{enumerate}
\item Construct a series of nested finite element spaces $V_{h_1},V_{h_2},\cdots,V_{h_n}$
such that $(\ref{mesh relationship})$ and $(\ref{delta_recur_relation})$ hold.
\item Solve the GPE on the initial finite element space $X_{h_1}$:
Find $(\lambda^{h_1},u^{h_1})\in X_{h_1}$ such that
\begin{equation*}
(\nabla u^{h_1},\nabla v_{h_1})+(Wu^{h_1},v_{h_1})+(\zeta( u^{h_1})^3,v_{h_1})
=\lambda^{h_1}(u^{h_1},v_{h_1}), \quad \forall v\in V_{h_1}.
\end{equation*}
\item Do $k=1,\cdots,n-1$\\
Obtain a new eigenpair approximation $(\lambda^{h_{k+1}},u^{h_{k+1}})$ by a Newton iteration step
\begin{eqnarray}
(\lambda^{h_{k+1}},u^{h_{k+1}}) = Newton_{-}Iteration(\lambda^{h_k},u^{h_k},V_{h_{k+1}}).
\end{eqnarray}
End Do.
\end{enumerate}
\end{algorithm}
\begin{theorem}\label{mg estimate}
Assume the initial mesh size $h_1$ is sufficiently small, after implementing
Algorithm \ref{mg}, the resultant eigenpair
approximation $(\lambda^{h_n},u^{h_n})$ has the following error estimate
\begin{eqnarray}\label{estimate}
\|(\lambda_{h_n}-\lambda^{h_n},u_{h_n}-u^{h_n})\|_X &\lesssim& \eta_a(V_{h_n})\delta_{h_n}(u).
\end{eqnarray}
\end{theorem}
\begin{proof}
From the second step of Algorithm \ref{mg},
we have
\begin{eqnarray}\label{initial mesh}
0=\|(\lambda_{h_1}-\lambda^{h_1},u_{h_1}-u^{h_1})\|_X &\lesssim& \eta_a(V_{h_1})\delta_{h_1}(u).
\end{eqnarray}
Using Theorem \ref{One Correction Step estimate}, we derive
\begin{eqnarray}\label{coercive in Newtopn}
&&\|(\lambda_{h_{n}}-\hat{\lambda}^{h_{n}},u_{h_{n}}-\hat{u}^{h_{n}})\|_X\nonumber\\
&\lesssim& \|(\lambda_{h_{n}}-\lambda^{h_{n-1}},u_{h_{n}}-u^{h_{n-1}})\|_X\|(\lambda_{h_{n}}
-\lambda^{h_{n-1}},u_{h_{n}}-u^{h_{n-1}})\|_0\nonumber\\
&\lesssim& \eta_a(V_{h_{n}})\delta_{h_{n}}(u)+\delta_{h_{n-1}}(u)\|(\lambda_{h_{n-1}}
-\lambda^{h_{n-1}},u_{h_{n-1}}-u^{h_{n-1}})\|_X\nonumber\\
&&\hskip-1cm+\|(\lambda_{h_{n-1}}-\lambda^{h_{n-1}},u_{h_{n-1}}-u^{h_{n-1}})\|_X\|(\lambda_{h_{n-1}
}-\lambda^{h_{n-1}},u_{h_{n-1}}-u^{h_{n-1}})\|_0.
\end{eqnarray}
Inequality (\ref{initial mesh}) means that (\ref{estimate}) holds for the initial finite element space $X_{h_1}$.
Assume that (\ref{estimate}) is true for the space $V_{h_{n-1}}$, i.e.,
\begin{eqnarray}\label{estimate n-1}
\|(\lambda_{h_{n-1}}-\lambda^{h_{n-1}},u_{h_{n-1}}-u^{h_{n-1}})\|_X \lesssim \eta_a(V_{h_{n-1}})\delta_{h_{n-1}}(u).
\end{eqnarray}
Combining (\ref{coercive in Newtopn}) and (\ref{estimate n-1}) leads to
\begin{eqnarray*}
\|(\lambda_{h_{n}}-\hat{\lambda}^{h_{n}},u_{h_{n}}-\hat{u}^{h_{n}})\|_X \lesssim \eta_a(V_{h_n})\delta_{h_{n}}(u).
\end{eqnarray*}
Since
\begin{eqnarray*}
\|(\lambda^{h_{n}}-\hat{\lambda}^{h_{n}},u^{h_{n}}-\hat{u}^{h_{n}})\|_X
\lesssim \eta_a(V_{h_n})\delta_{h_{n}}(u),
\end{eqnarray*}
we arrive at
\begin{eqnarray*}
\|(\lambda^{h_{n}}-\lambda_{h_{n}},u^{h_{n}}-u_{h_{n}})\|_X
\lesssim \eta_a(V_{h_n})\delta_{h_{n}}(u).
\end{eqnarray*}
This completes the proof.
\end{proof}
\begin{theorem}\label{event}
For Algorithm \ref{mg}, under the conditions of Thoerem \ref{mg estimate}, we have
\begin{eqnarray}
\|(\lambda-\lambda^{h_n},u-u^{h_n})\|_X &\lesssim& \delta_{h_n}(u),\\
\|(\lambda-\lambda^{h_n},u-u^{h_n})\|_0 &\lesssim& \eta_a(V_{h_n})\delta_{h_n}(u).
\end{eqnarray}
\end{theorem}
\begin{proof}
Theorem \ref{event} can be derived from Lemma \ref{lemma:Maday},
Theorem \ref{mg estimate} and triangle inequality.
\end{proof}
\section{Work estimate of multigrid algorithm}
In this section, the computational work of Algorithm \ref{mg} is presented to
show the efficiency of this multigrid scheme.
Denote the dimension of finite element space $X_{h_k}$ by $N_k$. Then we have
$$N_k \approx \beta^{d(k-n)}N_n,\ \ \ k=1,2,\cdots,n.$$
\begin{theorem}
Assume the work of GPE problem in the initial finite element space $X_{h_1}$
is $\cO(M_{h_1})$ and that of the linear boundary value
problem in each level $X_{h_k}$ is $\cO(N_k)$ for $k=1,2,\cdots,n$.
Then the work involved in the multigrid method is $\cO(N_n+M_{h_1})$.
Furthermore, the complexity can be $\cO(N_n)$ provided $M_{h_1}\leq N_n$.
\end{theorem}
\begin{proof}
Denote the work in the $k-th$ finite element space $X_{h_k}$ by $W_k$ and the total work by $W$.
Then
\begin{eqnarray*}
W &=& \sum_{k=1}^{n}W_k = \cO(M_{h_1}+\sum_{k=2}^{n}N_k) \\
&=& \cO( M_{h_1}+\sum_{k=2}^{n}\beta^{d(k-n)}N_n ) \\
&=& \cO(M_{h_1}+N_n).
\end{eqnarray*}
Then we derive the desired result and $W=\cO(N_n)$ when $M_{h_1}\leq N_n$.
\end{proof}
\section{Numerical results}
In this section, two numerical examples are presented to illustrate the
efficiency of the multigrid scheme proposed in this
paper.
\subsection{Example 1}
In the first example, we use Algorithm \ref{mg} to solve the following GPE:
Find $(\lambda,u)$ such that
\begin{equation}\label{nonlinear_pde}
\left\{
\begin{array}{rcl}
-\triangle u+Wu +\zeta|u|^2 u&=&\lambda u, \quad {\rm in} \ \Omega,\\
u&=&0, \ \ \quad {\rm on}\ \partial\Omega,\\
\int_{\Omega}u^2d\Omega&=&1,
\end{array}
\right.
\end{equation}
where $\Omega$ denotes the three dimensional domain $(0,1)^3$, $ \zeta=1$
and $W=x_1^2+x_2^2+x_3^2$.
The sequence of finite element spaces are constructed by linear element on a series of meshes
produced by regular refinement with $\beta=2$ (producing $\beta^3$ congruent subelements).
Since the exact solution is not known, an adequate accurate approximation is choosen as the exact solution
to investigate the convergence behavior.
The optimal error estimates can be obtained from the numerical results
which are presented in Figure \ref{error of bec1}.
In order to show the efficiency of Algorithm \ref{mg},
we also provide the running time of Algorithm \ref{mg}.
Here, all schemes are running on the same machine PowerEdge R720 with the linux system hereafter.
The corresponding results are presented in Table \ref{table1} and Figure \ref{error of bec1},
which imply the efficiency and linear complexity of Algorithm \ref{mg}.
\begin{figure}[ht]
\centering
\includegraphics[width=7cm]{error1.eps}
\includegraphics[width=7cm]{time1.eps}
\caption{\footnotesize \texttt Left: The errors of the multigrid method for the ground state solution of GPE,
where $\lambda_h$ and $u_h$ denote the numerical solutions of Algorithm \ref{mg}.
Right: CPU Time of Algorithm \ref{mg} for Example 1.}\label{error of bec1}
\end{figure}
\begin{table}[ht]
\begin{center}
\caption{\footnotesize The CPU time of Algorithm \ref{mg} for Example 1.}
\label{table1}
\begin{tabular}{|c|c|c|}\hline
Number of levels & Number of elements & Time for Algorithm \ref{mg}\\
\hline
1 & 3072 & 0.1089 \\ \hline
2 & 24576 & 0.5249 \\ \hline
3 & 196608 & 2.1467 \\ \hline
4 & 1572846 & 15.7916 \\ \hline
5 & 12582912 & 131.3590 \\ \hline
\end{tabular}
\end{center}
\end{table}
\subsection{Example 2}
In the second example, we consider
the GPE (\ref{nonlinear_pde}) on the domain $\Omega = (0,1)^3$ with the
coefficient $\zeta=100$ and $W=x_1^2+2x_2^2+4x_3^2$.
Numerical results are presented in Table \ref{table2} and Figure \ref{error of bec100}.
Hence the efficiency and linear complexity of Algorithm \ref{mg} can also be validated.
\begin{figure}[ht]
\centering
\includegraphics[width=7cm]{error2.eps}
\includegraphics[width=7cm]{time2.eps}
\caption{\footnotesize Left: The errors of the multigrid method for the ground state solution of GPE,
where $\lambda_h$ and $u_h$ denote the numerical solutions of Algorithm \ref{mg}.
Right: CPU Time of Algorithm \ref{mg} for Example 2.}\label{error of bec100}
\end{figure}
\begin{table}[htp]
\begin{center}
\caption{\footnotesize The CPU time of Algorithm \ref{mg} for Example 2.}
\label{table2}
\begin{tabular}{|c|c|c|}\hline
Number of levels & Number of elements & Time of Algorithm \ref{mg} \\ \hline
1 & 24576 & 2.4686 \\ \hline
2 & 196608 & 4.8973 \\ \hline
3 & 1572846 & 18.3522 \\ \hline
4 & 12582912 & 138.0450 \\ \hline
\end{tabular}
\end{center}
\end{table}
\section{Concluding remarks}
In this paper, we propose a type of multigrid method for GPE problems based on
Newton iteration. Different from the classical finite element method for
GPE problems, the proposed method transforms the nonlinear eigenvalue problem solving
to a series of linear boundary value problems solving and a eigenvalue
problem solving in the coarsest finite element space.
The high efficiency of linear boundary value problems solving can improve
the overall efficiency of the simulation for BEC.
The corresponding analysis about the computational complexity has also been given.
The idea proposed here can also be extend to other nonlinear eigenvalue problems,
i.e., Kohn-Sham equation, which always arises from the electronic structure computation.
|
\section{Introduction}
One of the most commonly used frameworks for describing choices by economic agents is Expected Utility. But what if one of the outcomes is death? Can expected utility still be consistent with real-life choices? This question is fundamental when it comes to decision implying catastrophic outcomes. Based on the experiments conducted by Chanel and Chichilnisky (2013) \cite{chanel}, issues raised by the use of expected utility when confronted to rare and catastrophic events are discussed. \\
In \cite{chanel}, several subjects are presented 1 billion identical pills. They are paid \$220,000 to take and swallow one, knowing that one out of 1 billion is deadly. In this experiment conducted in 1998, about half of the subjects accept the deal, and the other half refuses it. The following symbols will be used: the subject has an initial wealth $l$, which corresponds to their life and of which the value is yet to be determined. By accepting the deal, the subject is rewarded with an amount $r=220000$. With a probability $p=10^{-9}$, the subject dies (their wealth becomes $r$), and with a probability $1-p$, the subject survives (hence their wealth becomes $l+r$).\\
\section{Using mean gain: linear preferences}
\label{mean}
At first, in \cite{chanel}, a naive approach is adopted. It is assumed that a subject who refuses the deal automatically values their life at more than $l_0=220000/10^{-9}$. Why? Because the subject thinks that the value of their life is greater than the mean gain $m(p)$ they will get by taking the deal. This can be expressed as follows:
\begin{gather*} m(p)=pr+(1-p)(l+r)<l \\
\text{i.e.}\quad r<pl \\
\text{which is equivalent to}
\end{gather*}
\begin{equation}\label{l0}l>\frac{r}{p}=l_0 \end{equation}
The value of $l_0$ is much greater than the value of life that is generally admitted in literature, i.e.\ between \$1.7 and \$7 million \cite{chanel}. The singularity of the experiment results will be explained later on.
\\
The computation which leads to \eqref{l0} implicitly makes the assumption that the utility function $u$ is linear. Indeed, in expected utility theory, an economic agent makes choices regarding the utilities of every outcome, not their gross values. Hence, the only equation that can be inferred from the fact that the subject refuses the deal is what follows:
\begin{equation}pu(r)+(1-p)u(l+r)<u(l)\end{equation}
However, the result \eqref{l0} is still valid if the utility function is linear. But this is not generally true. By assuming that hypothesis, one of the effects that could explain the singular experimental results is eliminated. Indeed, risk aversion phenomenon could be the reason why subjects do not want to take a chance by choosing a pill, even if the mean gain is greater than the value they assign to their own lives.\\
Let us focus on a subject who would not mind accepting the deal, that is to say who gets the same satisfaction either while swallowing the pill, or while refusing the deal. The following equation is implied by this statement:
\begin{equation} \label{debut} pu(r)+(1-p)u(l+r)=u(l) \end{equation}
\section{Utility functions with risk aversion}
Risk aversion can simply be summed up by the famous saying ``a bird in hand is worth two in the bush''. An economic agent will generally prefer getting \$100 in hard cash rather than playing head or tails and have 1 chance out of 2 to gain \$200. In general, if the mean value of a lottery $p$ is $v$, then the utility of $v$ will be greater than the expected utility of the lottery $p$:
\begin{equation}\label{jensen}u(v)>EU(p)\end{equation}
In terms of utility function, this is equivalent to say that $u$ is a concave. It is thus clear that inequation \eqref{jensen} is simply a Jensen inequality. Risk aversion can be assessed, thanks to Arrow-Pratt Absolute Risk Aversion (ARA) measure $A$, which is defined as follows:
\begin{equation}A= -\frac{u''}{u'} \end{equation}
where $u'$ is the first derivative of $u$, and $u''$ its second derivative. If the preferences are increasing and concave, $A$ is positive.
\subsection{Search of a consistent utility function}
The objective of this section is to find a utility function which explains the results of the pill experiment. Some famous models will be proposed and their parameters adjusted. Thanks to equation \eqref{debut}, for every utility function that is used, the implied value of life $l$ can be found. The tests will be made with two kinds of utility function. The results are summed up in the following table \ref{life}, which indicates the values of the parameter $\gamma$ for which $l$ is within the borders of the value of a statistical life (i.e.\ between \$1.7 and \$7 million). \\
\begin{table}[h]
\caption{Value of life depending on the utility chosen}
\begin{tabular}{r|c|c|c|}
\cline{2-4}
&\multicolumn{2}{ c| }{expressions of u} & value of life \\ \cline{2-4}
linear preferences& \multicolumn{2}{ c| }{$u(x)=ax+b$}& $220000/10^{-9}$ \\
\cline{2-4}
\multirow{2}{*}{constant ARA}&$u(x)=-e ^{-\gamma x}$& $\gamma =10^{-5.53}$ & $l=7.0\times 10^{6}$ \\
\cline{3-4}
&$A=\gamma$ & $\gamma =10^{-4.86}$ & $l=1.7\times 10^{6}$ \\
\cline{2-4}
\multirow{2}{*}{variable ARA}& $u(x)=-x^{-\gamma}$ & $\gamma =5.3 $& $l=7.0\times 10^{6}$ \\
\cline{3-4}
& $A=(1+\gamma)/x$ & $\gamma =10 $ & $l=1.7\times 10^{6}$ \\
\cline{2-4}
\multicolumn{4}{c}{ }
\end{tabular}
\label{life}
\end{table}
These are two examples of functions that can explain why some people refuse the deal. They do not necessarily value their lives at more than \$220 trillion: maybe they just have a high risk aversion. It would be interesting to see whether those utility functions are consistent with other lotteries.
\subsection{Test of various utility functions}
Let us build a very simple test: this is a classic ``head or tails'' lottery. Head, the subject wins \$100. Tails, he wins \$200. This is an interesting deal indeed. The question is: how much is a subject ready to pay for such a lottery? The following table shows the results, for the three reference functions.
\begin{table}[h]
\centering
\caption{Value of the head or tails deal}
\begin{tabular}{|c|c|}
\hline
expressions of $u$ & value of the deal \\
\hline
$u(x)=ax+b$ & 150 \\
\hline
$u(x)=-e^{-x\times 10^{-5}}$ & 149.98 \\
\hline
$u(x)=-x^{-7}$ & 110.3 \\
\hline
\end{tabular}
\end{table}
The third function seems inconsistent with day-to-day experiments: its risk aversion is too high. A random subject would generally prefer to play the game rather than being paid \$110.3. \\
The exponential function, though, gives a relatively good result with respect to the mean gain of the deal. For now, this seems to be a consistent utility function which could explain the results of O. Chanel and G. Chichilnisky's experiments on the value of life.
\section{The non-takers}
\subsection{Failure of expected utility}
During the 1998 experiment and the one that followed in 2009, some subjects not only refused the deal, but would not take a pill no matter what, and regardless of the probability of the deadly pill. This is a response that cannot be explained by standard expected utility. \\
The utility function is necessarily increasing, so $u(l+r)>u(l)$. Hence:
\begin{equation}
\label{limit}
\lim_{p\rightarrow 0}EU(p)=\lim_{p\rightarrow 0}\left[ pu(r)+(1-p)u(l+r)\right] =u(l+r)>u(l) \end{equation}
The conclusion is that for every kind of utility function, and regardless of risk aversion, there will always be a small enough probability $p$ --or a big enough stack of pills-- such that the subject will accept to take the pill. The table \ref{table:pill} shows the probability thresholds for different risk aversions, given a value of life of \$2 million (the deal is acceptable if its value is over \$2 million).
\begin{table}[h]
\centering
\caption{Value of the pill deal}
\label{table:pill}
\begin{tabular}{|c|c|c|}
\hline
$u(x)=-e^{-\gamma x}$ where $\gamma =$... & probability $p$ & value of the deal \\
\hline
$10^{-5}$ & $10^{-9}$ & $2.18\times 10^6$ \\
\hline
$10^{-4.9}$& $10^{-10}$& $2.04\times 10^6$ \\
\hline
$10^{-4.8}$& $10^{-13}$ & $2.10\times 10^6$\\
\hline
\end{tabular}
\end{table}
\\
The following graph describes the evolution of the value $v$ given to the pill deal according to the probability $p$ of finding the deadly pill.\\
\begin{tikzpicture}
\begin{axis}[xscale=1.2,
axis x line=bottom,
xlabel={\large{$1/p$}},
ylabel={\large{value $v$}},
title={Influence of the $\gamma$ parameter},
axis y line = left,
xmin=0,xmax=1e9,
ymin=1.7e6,ymax=2.3e6,
ytick={1.8e6,1.9e6,2.0e6,2.1e6,2.2e6},
legend style={at={(1,0.94)},anchor=north west,draw=none,row sep=0.1cm},
legend entries={$l+r$,$\gamma = 10^{-5}$,$\gamma=10^{-4.5}$,value of life $l$}
]
\addplot[
domain=0:1e9,
thick
]
{ 2220000};
\addplot[
red,
domain=0:1e9,
samples=500,
]
{ -1e5 * ln (-( -1/x * exp(-220000*1e-5) - (1-1/x)*exp(-1e-5 * 2220000) )};
\addplot[
brown,
domain=0:1e9,
samples=500,
]
{ -1/10^(-4.95) * ln (-( -1/x * exp(-220000*10^(-4.95)) - (1-1/x)*exp(-10^(-4.95) * 2220000) )};
\addplot[
blue,
thick,
domain=0:1e9,
]
{ 2000000};
\end{axis}
\end{tikzpicture}
The above data is not consistent with the results obtained with part of the subjects. Indeed, some people will not accept to play under any conditions, due to the catastrophic outcome that is death. Classic expected utility tends to under-estimate the impact of such catastrophic events on our decision-making (see \cite{chanelfear} for other experimental evidence). \\
There is a need for a utility function that takes into account catastrophic events, even when probabilities are very low.
\subsection{Taking into account catastrophic events}
\subsubsection{A new kind of utility function}
In Chichilnisky (2009) \cite{chichifear}, a new kind of utility function is proposed, which takes into account events with arbitrarily small probabilities, but with huge effects. To understand precisely what modifications has to be done to the classical expected utility, one has to define explicitly the underlying mathematical framework. \\
A lottery is an essentially bounded function $f\in L_\infty (\mathbb{R})$ which represents the utility of every outcome $x\in \mathbb{R}$. In order to rank the different lotteries, expected utility is defined by $W(f)=\int_\mathbb{R} f(x)d\mu(x)$ where $\mu$ is a measure with an integrable density function $\phi_1\in L_1(\mathbb{R})$. $W$ is a linear functional on the lottery space. $f$ is said to be ``preferable to $g$'' if and only if $W(f)>W(g)$. The issue is that this ranking is insensitive to rare events: it means that if a catastrophic outcome is added to the lottery $f$, and its probability is low enough, the ranking will not be modified. \\
Before introducing the new utility function found by G. Chichlnisky, one has to remember that any linear functional on $L_\infty(\mathbb{R})$ can be expressed as a Radon integral, with respect to a measure that is absolutely continuous with respect to Lebesgue measure \cite{french}. However, those Radon integrals can be expressed as Lebesgue integrals if and only if that measure is $\sigma$-additive. Otherwise (i.e.\ if the measure is additive but not $\sigma$-additive), the result cannot be expressed as a Lebesgue integral. This has been proven among others by Fichtenholz and Kantorovitch (1934) \cite{french}. \\
The inconsistency of expected utility is solved by Chichilnisky (2009) \cite{chichifear} by modifying its expression and adding a second term. This time, a continuous linear functional $\phi_2$ is introduced, and its associated measure $\mu$ is additive but not $\sigma$-additive. The new form of the ranking is then:
\begin{align*}
W(f)=& \lambda\int_\mathbb{R}f(x)\phi_1(x)dx + (1-\lambda)\langle \phi_2,f\rangle \\ W(f)=& \lambda\int_\mathbb{R}f(x)\phi_1(x)dx + (1-\lambda) \int_\mathbb{R}f(x)d\mu(x)\end{align*}
where $\lambda\in\left]0,1\right[$, $\phi_1\in L_1(\mathbb{R})$ and $\mu$ a purely finitely additive measure. \\
It has been proven in Chichilnisky (2010) \cite{chichiswan} that this new ranking is sensitive to rare events, which means that it satisfies the appropriate axiom of ``sensitivity to rare events'' \cite{chichifear}, and therefore takes into account catastrophic events. Let us build a utility function of this kind, in order to see its evolution according to the probability $p$ of picking the deadly pill. \\
Let us take a simple framework: the preferences are linear. The preferences function is
\begin{align*}
f\colon & \mathbb{R}\longrightarrow\mathbb{R}^+\\
f(x)=&\begin{cases}
r &\text{if $x<1$}\\
l+r &\text{if $x\geq 1$}
\end{cases}
\end{align*}
where $l$ is the unknown value of life.
The ``Lebesgue'' part of the utility function shall be:
$$ \phi_1(x)=p\times \chi _{[0,1/p]}(x)$$
Where $\chi_A$ is the characteristic function of the set $A$. The $\sigma$-additive measure associated with $\phi_1$ is the uniform probability on $[0,1/p]$, so that there is a probability $p$ to pick the $[0,1]$ interval. \\
At this stage, the results obtained would be the same that in Section \ref{mean}, by reasoning with the mean gain. Let us add the purely finitely additive part. Let $\mu$ be the following measure: \\
\[ \forall A\subset\mathbb{R},\quad \mu(A)= \begin{cases}1& \text{if $\exists\ \mathcal{N}(o)\subset A$} \\ 0 &\text{otherwise}\end{cases} \]
$\mathcal{N}(0)$ is a ``neighbourhood'' of $0$. The first condition can be understood as ``there exists an open interval centered on 0 that is entirely included in $A$''. By using this definition, the measure $0$ is assigned to the singleton $\{0\}$, so that the measure $\mu$ is still absolutely continuous with respect to Lebesgue measure. \\
In \cite{chichiswan}, Chichilnisky shows that the measure $\mu$ is a purely finite additive measure. The explicit definition of its associated linear functional $\phi_2$ on $L_\infty(\mathbb{R})$ is only given on the subspace $CL_\infty$ of all continuous functions $f\in L_\infty(\mathbb{R})$ that have a limit towards 0.
\[
\forall f\in CL_\infty,\quad \langle\phi_2,f\rangle = \lim_{x\rightarrow 0} f(x)
\]
Since the chosen preferences are continuous at 0, the new utility function is now:
\begin{align*}
W(f)=&\lambda\int_\mathbb{R}f(x)\phi_1(x)dx + (1-\lambda)\langle \phi_2,f\rangle \\
W(f)=& \lambda \left[pr+(1-p)(l+r)\right] + (1-\lambda)\times \underbrace{\lim_{x\rightarrow 0} f(x)}_{r}
\end{align*}
\subsubsection{Application and numerical values}
The value of $W(f)$ has to be compared to $l$, in order to know if the game is worth playing or not. As a reminder:
\begin{enumerate}[label=--]
\item $l$ = \$3,000,000
\item $r$ = \$220,000
\item $p$ = $10^{-9}$
\end{enumerate}
Let us write the utility of the deal as a function of $p$ which depends on a parameter $\lambda\in]0,1[$ :
\begin{equation}
W_\lambda (p)= \lambda \left[pr+(1-p)(l+r)\right] + (1-\lambda)r
\end{equation}
As in \eqref{limit}, let us see the evolution of $W$ when the probability of the deadly pill converges towards 0 (i.e.\ when the size of the pile expands towards infinity).
\begin{equation*}
\lim_{p\rightarrow 0}W_\lambda(p)=\lim_{p\rightarrow 0}\lambda \left[pr+(1-p)(l+r)\right] + (1-\lambda)r
\end{equation*}
\begin{equation}
\lim_{p\rightarrow 0}W_\lambda(p) = \lambda (l+r) + (1-\lambda)r = \lambda l + r
\end{equation}
Since $\lambda<1$, it is impossible to determine at first if this limit is greater or smaller than $l$: it depends on the value of $\lambda$. If $\lambda l+r<l$, the deal cannot be acceptable, regardless of how small $p$ is. If $\lambda l+r>l$, sometimes the deal will be acceptable, sometimes it will not (depending on the probability $p$). \\
With the present parameters, the threshold is $\displaystyle\lambda_0=\frac{l-r}{l}\approx 0.926$: if $\lambda$ is smaller than this value, the subject will never accept the deal. If $\lambda$ is greater, sometimes they will, sometimes they will not. \\
The following graph shows evolution of the value of the deal with respect to $p$, with two different given values of $\lambda$: one is greater than $\lambda_0$, the other is smaller. \\
\begin{tikzpicture}
\begin{axis}[
title={Influence of the $\lambda$ parameter},
xlabel={\large{$1/p$}},
ylabel={\large{value $v$}},
xscale=1.2,
axis x line=bottom, axis y line = left,
ymin = 2.968e6, ymax = 3.012e6,
legend entries={
,$W_\lambda (p)$ for $\lambda>\lambda_0$,value of life $l$,,$W_\lambda (p)$ for $\lambda<\lambda_0$
},
legend style={at={(1,1)},anchor=north west,draw=none,row sep=0.5cm},
]
\addplot[domain=0:1e9, blue, dashed]
{3.01*10^6} ;
\addplot+[mark=none, blue,smooth] coordinates {
(58*10^5 + 10^6+9*10^5,2.96851*10^6)
(59*10^5 + 10^6+9*10^5,2.96912*10^6)
(60*10^5 + 10^6+9*10^5,2.96971*10^6)
(61*10^5 + 10^6+9*10^5,2.97029*10^6)
(62*10^5 + 10^6+9*10^5,2.97085*10^6)
(63*10^5 + 10^6+9*10^5,2.97139*10^6)
(64*10^5 + 10^6+9*10^5,2.97192*10^6)
(65*10^5 + 10^6+9*10^5,2.97243*10^6)
(66*10^5 + 10^6+9*10^5,2.97293*10^6)
(67*10^5 + 10^6+9*10^5,2.97342*10^6)
(68*10^5 + 10^6+9*10^5,2.9739*10^6)
(69*10^5 + 10^6+9*10^5,2.97436*10^6)
(70*10^5 + 10^6+9*10^5,2.97481*10^6)
(71*10^5 + 10^6+9*10^5,2.97525*10^6)
(72*10^5 + 10^6+9*10^5,2.97568*10^6)
(73*10^5 + 10^6+9*10^5,2.9761*10^6)
(74*10^5 + 10^6+9*10^5,2.97651*10^6)
(75*10^5 + 10^6+9*10^5,2.9769*10^6)
(76*10^5 + 10^6+9*10^5,2.97729*10^6)
(77*10^5 + 10^6+9*10^5,2.97767*10^6)
(78*10^5 + 10^6+9*10^5,2.97805*10^6)
(79*10^5 + 10^6+9*10^5,2.97841*10^6)
(80*10^5 + 10^6+9*10^5,2.97876*10^6)
(81*10^5 + 10^6+9*10^5,2.97911*10^6)
(82*10^5 + 10^6+9*10^5,2.97945*10^6)
(83*10^5 + 10^6+9*10^5,2.97978*10^6)
(84*10^5 + 10^6+9*10^5,2.98011*10^6)
(85*10^5 + 10^6+9*10^5,2.98043*10^6)
(86*10^5 + 10^6+9*10^5,2.98074*10^6)
(87*10^5 + 10^6+9*10^5,2.98104*10^6)
(88*10^5 + 10^6+9*10^5,2.98134*10^6)
(89*10^5 + 10^6+9*10^5,2.98163*10^6)
(90*10^5 + 10^6+9*10^5,2.98192*10^6)
(91*10^5 + 10^6+9*10^5,2.9822*10^6)
(1*10^6 + 10^7,2.9822*10^6)
(2*10^6 + 10^7,2.98473*10^6)
(3*10^6 + 10^7,2.98683*10^6)
(4*10^6 + 10^7,2.98862*10^6)
(5*10^6 + 10^7,2.99014*10^6)
(6*10^6 + 10^7,2.99147*10^6)
(7*10^6 + 10^7,2.99262*10^6)
(8*10^6 + 10^7,2.99365*10^6)
(9*10^6 + 10^7,2.99456*10^6)
(10*10^6 + 10^7,2.99537*10^6)
(11*10^6 + 10^7,2.9961*10^6)
(12*10^6 + 10^7,2.99676*10^6)
(13*10^6 + 10^7,2.99736*10^6)
(14*10^6 + 10^7,2.99791*10^6)
(15*10^6 + 10^7,2.99842*10^6)
(16*10^6 + 10^7,2.99888*10^6)
(17*10^6 + 10^7,2.99931*10^6)
(18*10^6 + 10^7,2.9997*10^6)
(19*10^6 + 10^7,3.00007*10^6)
(20*10^6 + 10^7,3.00041*10^6)
(21*10^6 + 10^7,3.00073*10^6)
(22*10^6 + 10^7,3.00103*10^6)
(23*10^6 + 10^7,3.00131*10^6)
(24*10^6 + 10^7,3.00158*10^6)
(25*10^6 + 10^7,3.00182*10^6)
(26*10^6 + 10^7,3.00206*10^6)
(27*10^6 + 10^7,3.00228*10^6)
(28*10^6 + 10^7,3.00249*10^6)
(29*10^6 + 10^7,3.00268*10^6)
(30*10^6 + 10^7,3.00287*10^6)
(31*10^6 + 10^7,3.00305*10^6)
(32*10^6 + 10^7,3.00322*10^6)
(33*10^6 + 10^7,3.00338*10^6)
(34*10^6 + 10^7,3.00353*10^6)
(35*10^6 + 10^7,3.00368*10^6)
(36*10^6 + 10^7,3.00382*10^6)
(37*10^6 + 10^7,3.00396*10^6)
(38*10^6 + 10^7,3.00409*10^6)
(39*10^6 + 10^7,3.00421*10^6)
(40*10^6 + 10^7,3.00433*10^6)
(41*10^6 + 10^7,3.00444*10^6)
(42*10^6 + 10^7,3.00455*10^6)
(43*10^6 + 10^7,3.00465*10^6)
(44*10^6 + 10^7,3.00475*10^6)
(45*10^6 + 10^7,3.00485*10^6)
(46*10^6 + 10^7,3.00495*10^6)
(47*10^6 + 10^7,3.00504*10^6)
(48*10^6 + 10^7,3.00512*10^6)
(49*10^6 + 10^7,3.00521*10^6)
(50*10^6 + 10^7,3.00529*10^6)
(51*10^6 + 10^7,3.00537*10^6)
(52*10^6 + 10^7,3.00544*10^6)
(53*10^6 + 10^7,3.00552*10^6)
(54*10^6 + 10^7,3.00559*10^6)
(55*10^6 + 10^7,3.00566*10^6)
(56*10^6 + 10^7,3.00572*10^6)
(57*10^6 + 10^7,3.00579*10^6)
(58*10^6 + 10^7,3.00585*10^6)
(59*10^6 + 10^7,3.00591*10^6)
(60*10^6 + 10^7,3.00597*10^6)
(61*10^6 + 10^7,3.00603*10^6)
(62*10^6 + 10^7,3.00608*10^6)
(63*10^6 + 10^7,3.00614*10^6)
(64*10^6 + 10^7,3.00619*10^6)
(65*10^6 + 10^7,3.00624*10^6)
(66*10^6 + 10^7,3.00629*10^6)
(67*10^6 + 10^7,3.00634*10^6)
(68*10^6 + 10^7,3.00639*10^6)
(69*10^6 + 10^7,3.00644*10^6)
(70*10^6 + 10^7,3.00648*10^6)
(71*10^6 + 10^7,3.00652*10^6)
(72*10^6 + 10^7,3.00657*10^6)
(73*10^6 + 10^7,3.00661*10^6)
(74*10^6 + 10^7,3.00665*10^6)
(75*10^6 + 10^7,3.00669*10^6)
(76*10^6 + 10^7,3.00673*10^6)
(77*10^6 + 10^7,3.00677*10^6)
(78*10^6 + 10^7,3.0068*10^6)
(79*10^6 + 10^7,3.00684*10^6)
(80*10^6 + 10^7,3.00688*10^6)
(81*10^6 + 10^7,3.00691*10^6)
(82*10^6 + 10^7,3.00695*10^6)
(83*10^6 + 10^7,3.00698*10^6)
(84*10^6 + 10^7,3.00701*10^6)
(85*10^6 + 10^7,3.00704*10^6)
(86*10^6 + 10^7,3.00707*10^6)
(87*10^6 + 10^7,3.0071*10^6)
(88*10^6 + 10^7,3.00713*10^6)
(89*10^6 + 10^7,3.00716*10^6)
(90*10^6 + 10^7,3.00719*10^6)
(91*10^6 + 10^7,3.00722*10^6)
(92*10^6 + 10^7,3.00725*10^6)
(93*10^6 + 10^7,3.00727*10^6)
(94*10^6 + 10^7,3.0073*10^6)
(95*10^6 + 10^7,3.00733*10^6)
(96*10^6 + 10^7,3.00735*10^6)
(97*10^6 + 10^7,3.00738*10^6)
(98*10^6 + 10^7,3.0074*10^6)
(99*10^6 + 10^7,3.00743*10^6)
(100*10^6 + 10^7,3.00745*10^6)
(101*10^6 + 10^7,3.00747*10^6)
(102*10^6 + 10^7,3.0075*10^6)
(103*10^6 + 10^7,3.00752*10^6)
(104*10^6 + 10^7,3.00754*10^6)
(105*10^6 + 10^7,3.00756*10^6)
(106*10^6 + 10^7,3.00758*10^6)
(107*10^6 + 10^7,3.0076*10^6)
(108*10^6 + 10^7,3.00762*10^6)
(109*10^6 + 10^7,3.00764*10^6)
(110*10^6 + 10^7,3.00766*10^6)
(111*10^6 + 10^7,3.00768*10^6)
(112*10^6 + 10^7,3.0077*10^6)
(113*10^6 + 10^7,3.00772*10^6)
(114*10^6 + 10^7,3.00774*10^6)
(115*10^6 + 10^7,3.00776*10^6)
(116*10^6 + 10^7,3.00778*10^6)
(117*10^6 + 10^7,3.00779*10^6)
(118*10^6 + 10^7,3.00781*10^6)
(119*10^6 + 10^7,3.00783*10^6)
(120*10^6 + 10^7,3.00784*10^6)
(121*10^6 + 10^7,3.00786*10^6)
(122*10^6 + 10^7,3.00788*10^6)
(123*10^6 + 10^7,3.00789*10^6)
(124*10^6 + 10^7,3.00791*10^6)
(125*10^6 + 10^7,3.00793*10^6)
(126*10^6 + 10^7,3.00794*10^6)
(127*10^6 + 10^7,3.00796*10^6)
(128*10^6 + 10^7,3.00797*10^6)
(129*10^6 + 10^7,3.00799*10^6)
(130*10^6 + 10^7,3.008*10^6)
(131*10^6 + 10^7,3.00801*10^6)
(132*10^6 + 10^7,3.00803*10^6)
(133*10^6 + 10^7,3.00804*10^6)
(134*10^6 + 10^7,3.00806*10^6)
(135*10^6 + 10^7,3.00807*10^6)
(136*10^6 + 10^7,3.00808*10^6)
(137*10^6 + 10^7,3.0081*10^6)
(138*10^6 + 10^7,3.00811*10^6)
(139*10^6 + 10^7,3.00812*10^6)
(140*10^6 + 10^7,3.00813*10^6)
(141*10^6 + 10^7,3.00815*10^6)
(142*10^6 + 10^7,3.00816*10^6)
(143*10^6 + 10^7,3.00817*10^6)
(144*10^6 + 10^7,3.00818*10^6)
(145*10^6 + 10^7,3.00819*10^6)
(146*10^6 + 10^7,3.00821*10^6)
(147*10^6 + 10^7,3.00822*10^6)
(148*10^6 + 10^7,3.00823*10^6)
(149*10^6 + 10^7,3.00824*10^6)
(150*10^6 + 10^7,3.00825*10^6)
(151*10^6 + 10^7,3.00826*10^6)
(152*10^6 + 10^7,3.00827*10^6)
(153*10^6 + 10^7,3.00828*10^6)
(154*10^6 + 10^7,3.00829*10^6)
(155*10^6 + 10^7,3.0083*10^6)
(156*10^6 + 10^7,3.00832*10^6)
(157*10^6 + 10^7,3.00833*10^6)
(158*10^6 + 10^7,3.00834*10^6)
(159*10^6 + 10^7,3.00835*10^6)
(160*10^6 + 10^7,3.00836*10^6)
(161*10^6 + 10^7,3.00836*10^6)
(162*10^6 + 10^7,3.00837*10^6)
(163*10^6 + 10^7,3.00838*10^6)
(164*10^6 + 10^7,3.00839*10^6)
(165*10^6 + 10^7,3.0084*10^6)
(166*10^6 + 10^7,3.00841*10^6)
(167*10^6 + 10^7,3.00842*10^6)
(168*10^6 + 10^7,3.00843*10^6)
(169*10^6 + 10^7,3.00844*10^6)
(170*10^6 + 10^7,3.00845*10^6)
(171*10^6 + 10^7,3.00846*10^6)
(172*10^6 + 10^7,3.00846*10^6)
(173*10^6 + 10^7,3.00847*10^6)
(174*10^6 + 10^7,3.00848*10^6)
(175*10^6 + 10^7,3.00849*10^6)
(176*10^6 + 10^7,3.0085*10^6)
(177*10^6 + 10^7,3.00851*10^6)
(178*10^6 + 10^7,3.00851*10^6)
(179*10^6 + 10^7,3.00852*10^6)
(180*10^6 + 10^7,3.00853*10^6)
(181*10^6 + 10^7,3.00854*10^6)
(182*10^6 + 10^7,3.00854*10^6)
(183*10^6 + 10^7,3.00855*10^6)
(184*10^6 + 10^7,3.00856*10^6)
(185*10^6 + 10^7,3.00857*10^6)
(186*10^6 + 10^7,3.00857*10^6)
(187*10^6 + 10^7,3.00858*10^6)
(188*10^6 + 10^7,3.00859*10^6)
(189*10^6 + 10^7,3.0086*10^6)
(190*10^6 + 10^7,3.0086*10^6)
(191*10^6 + 10^7,3.00861*10^6)
(192*10^6 + 10^7,3.00862*10^6)
(193*10^6 + 10^7,3.00862*10^6)
(194*10^6 + 10^7,3.00863*10^6)
(195*10^6 + 10^7,3.00864*10^6)
(196*10^6 + 10^7,3.00864*10^6)
(197*10^6 + 10^7,3.00865*10^6)
(198*10^6 + 10^7,3.00866*10^6)
(199*10^6 + 10^7,3.00866*10^6)
(200*10^6 + 10^7,3.00867*10^6)
(201*10^6 + 10^7,3.00868*10^6)
(202*10^6 + 10^7,3.00868*10^6)
(203*10^6 + 10^7,3.00869*10^6)
(204*10^6 + 10^7,3.00869*10^6)
(205*10^6 + 10^7,3.0087*10^6)
(206*10^6 + 10^7,3.00871*10^6)
(207*10^6 + 10^7,3.00871*10^6)
(208*10^6 + 10^7,3.00872*10^6)
(209*10^6 + 10^7,3.00872*10^6)
(210*10^6 + 10^7,3.00873*10^6)
(211*10^6 + 10^7,3.00874*10^6)
(212*10^6 + 10^7,3.00874*10^6)
(213*10^6 + 10^7,3.00875*10^6)
(214*10^6 + 10^7,3.00875*10^6)
(215*10^6 + 10^7,3.00876*10^6)
(216*10^6 + 10^7,3.00876*10^6)
(217*10^6 + 10^7,3.00877*10^6)
(218*10^6 + 10^7,3.00878*10^6)
(219*10^6 + 10^7,3.00878*10^6)
(220*10^6 + 10^7,3.00879*10^6)
(221*10^6 + 10^7,3.00879*10^6)
(222*10^6 + 10^7,3.0088*10^6)
(223*10^6 + 10^7,3.0088*10^6)
(224*10^6 + 10^7,3.00881*10^6)
(225*10^6 + 10^7,3.00881*10^6)
(226*10^6 + 10^7,3.00882*10^6)
(227*10^6 + 10^7,3.00882*10^6)
(228*10^6 + 10^7,3.00883*10^6)
(229*10^6 + 10^7,3.00883*10^6)
(230*10^6 + 10^7,3.00884*10^6)
(231*10^6 + 10^7,3.00884*10^6)
(232*10^6 + 10^7,3.00885*10^6)
(233*10^6 + 10^7,3.00885*10^6)
(234*10^6 + 10^7,3.00886*10^6)
(235*10^6 + 10^7,3.00886*10^6)
(236*10^6 + 10^7,3.00887*10^6)
(237*10^6 + 10^7,3.00887*10^6)
(238*10^6 + 10^7,3.00887*10^6)
(239*10^6 + 10^7,3.00888*10^6)
(240*10^6 + 10^7,3.00888*10^6)
(241*10^6 + 10^7,3.00889*10^6)
(242*10^6 + 10^7,3.00889*10^6)
(243*10^6 + 10^7,3.0089*10^6)
(244*10^6 + 10^7,3.0089*10^6)
(245*10^6 + 10^7,3.00891*10^6)
(246*10^6 + 10^7,3.00891*10^6)
(247*10^6 + 10^7,3.00891*10^6)
(248*10^6 + 10^7,3.00892*10^6)
(249*10^6 + 10^7,3.00892*10^6)
(250*10^6 + 10^7,3.00893*10^6)
(251*10^6 + 10^7,3.00893*10^6)
(252*10^6 + 10^7,3.00893*10^6)
(253*10^6 + 10^7,3.00894*10^6)
(254*10^6 + 10^7,3.00894*10^6)
(255*10^6 + 10^7,3.00895*10^6)
(256*10^6 + 10^7,3.00895*10^6)
(257*10^6 + 10^7,3.00895*10^6)
(258*10^6 + 10^7,3.00896*10^6)
(259*10^6 + 10^7,3.00896*10^6)
(260*10^6 + 10^7,3.00897*10^6)
(261*10^6 + 10^7,3.00897*10^6)
(262*10^6 + 10^7,3.00897*10^6)
(263*10^6 + 10^7,3.00898*10^6)
(264*10^6 + 10^7,3.00898*10^6)
(265*10^6 + 10^7,3.00899*10^6)
(266*10^6 + 10^7,3.00899*10^6)
(267*10^6 + 10^7,3.00899*10^6)
(268*10^6 + 10^7,3.009*10^6)
(269*10^6 + 10^7,3.009*10^6)
(270*10^6 + 10^7,3.009*10^6)
(271*10^6 + 10^7,3.00901*10^6)
(272*10^6 + 10^7,3.00901*10^6)
(273*10^6 + 10^7,3.00901*10^6)
(274*10^6 + 10^7,3.00902*10^6)
(275*10^6 + 10^7,3.00902*10^6)
(276*10^6 + 10^7,3.00902*10^6)
(277*10^6 + 10^7,3.00903*10^6)
(278*10^6 + 10^7,3.00903*10^6)
(279*10^6 + 10^7,3.00903*10^6)
(280*10^6 + 10^7,3.00904*10^6)
(281*10^6 + 10^7,3.00904*10^6)
(282*10^6 + 10^7,3.00904*10^6)
(283*10^6 + 10^7,3.00905*10^6)
(284*10^6 + 10^7,3.00905*10^6)
(285*10^6 + 10^7,3.00905*10^6)
(286*10^6 + 10^7,3.00906*10^6)
(287*10^6 + 10^7,3.00906*10^6)
(288*10^6 + 10^7,3.00906*10^6)
(289*10^6 + 10^7,3.00907*10^6)
(290*10^6 + 10^7,3.00907*10^6)
(291*10^6 + 10^7,3.00907*10^6)
(292*10^6 + 10^7,3.00908*10^6)
(293*10^6 + 10^7,3.00908*10^6)
(294*10^6 + 10^7,3.00908*10^6)
(295*10^6 + 10^7,3.00909*10^6)
(296*10^6 + 10^7,3.00909*10^6)
(297*10^6 + 10^7,3.00909*10^6)
(298*10^6 + 10^7,3.00909*10^6)
(299*10^6 + 10^7,3.0091*10^6)
(300*10^6 + 10^7,3.0091*10^6)
(301*10^6 + 10^7,3.0091*10^6)
(302*10^6 + 10^7,3.00911*10^6)
(303*10^6 + 10^7,3.00911*10^6)
(304*10^6 + 10^7,3.00911*10^6)
(305*10^6 + 10^7,3.00911*10^6)
(306*10^6 + 10^7,3.00912*10^6)
(307*10^6 + 10^7,3.00912*10^6)
(308*10^6 + 10^7,3.00912*10^6)
(309*10^6 + 10^7,3.00913*10^6)
(310*10^6 + 10^7,3.00913*10^6)
(311*10^6 + 10^7,3.00913*10^6)
(312*10^6 + 10^7,3.00913*10^6)
(313*10^6 + 10^7,3.00914*10^6)
(314*10^6 + 10^7,3.00914*10^6)
(315*10^6 + 10^7,3.00914*10^6)
(316*10^6 + 10^7,3.00914*10^6)
(317*10^6 + 10^7,3.00915*10^6)
(318*10^6 + 10^7,3.00915*10^6)
(319*10^6 + 10^7,3.00915*10^6)
(320*10^6 + 10^7,3.00916*10^6)
(321*10^6 + 10^7,3.00916*10^6)
(322*10^6 + 10^7,3.00916*10^6)
(323*10^6 + 10^7,3.00916*10^6)
(324*10^6 + 10^7,3.00917*10^6)
(325*10^6 + 10^7,3.00917*10^6)
(326*10^6 + 10^7,3.00917*10^6)
(327*10^6 + 10^7,3.00917*10^6)
(328*10^6 + 10^7,3.00918*10^6)
(329*10^6 + 10^7,3.00918*10^6)
(330*10^6 + 10^7,3.00918*10^6)
(331*10^6 + 10^7,3.00918*10^6)
(332*10^6 + 10^7,3.00918*10^6)
(333*10^6 + 10^7,3.00919*10^6)
(334*10^6 + 10^7,3.00919*10^6)
(335*10^6 + 10^7,3.00919*10^6)
(336*10^6 + 10^7,3.00919*10^6)
(337*10^6 + 10^7,3.0092*10^6)
(338*10^6 + 10^7,3.0092*10^6)
(339*10^6 + 10^7,3.0092*10^6)
(340*10^6 + 10^7,3.0092*10^6)
(341*10^6 + 10^7,3.00921*10^6)
(342*10^6 + 10^7,3.00921*10^6)
(343*10^6 + 10^7,3.00921*10^6)
(344*10^6 + 10^7,3.00921*10^6)
(345*10^6 + 10^7,3.00921*10^6)
(346*10^6 + 10^7,3.00922*10^6)
(347*10^6 + 10^7,3.00922*10^6)
(348*10^6 + 10^7,3.00922*10^6)
(349*10^6 + 10^7,3.00922*10^6)
(350*10^6 + 10^7,3.00923*10^6)
(351*10^6 + 10^7,3.00923*10^6)
(352*10^6 + 10^7,3.00923*10^6)
(353*10^6 + 10^7,3.00923*10^6)
(354*10^6 + 10^7,3.00923*10^6)
(355*10^6 + 10^7,3.00924*10^6)
(356*10^6 + 10^7,3.00924*10^6)
(357*10^6 + 10^7,3.00924*10^6)
(358*10^6 + 10^7,3.00924*10^6)
(359*10^6 + 10^7,3.00924*10^6)
(360*10^6 + 10^7,3.00925*10^6)
(361*10^6 + 10^7,3.00925*10^6)
(362*10^6 + 10^7,3.00925*10^6)
(363*10^6 + 10^7,3.00925*10^6)
(364*10^6 + 10^7,3.00925*10^6)
(365*10^6 + 10^7,3.00926*10^6)
(366*10^6 + 10^7,3.00926*10^6)
(367*10^6 + 10^7,3.00926*10^6)
(368*10^6 + 10^7,3.00926*10^6)
(369*10^6 + 10^7,3.00926*10^6)
(370*10^6 + 10^7,3.00927*10^6)
(371*10^6 + 10^7,3.00927*10^6)
(372*10^6 + 10^7,3.00927*10^6)
(373*10^6 + 10^7,3.00927*10^6)
(374*10^6 + 10^7,3.00927*10^6)
(375*10^6 + 10^7,3.00928*10^6)
(376*10^6 + 10^7,3.00928*10^6)
(377*10^6 + 10^7,3.00928*10^6)
(378*10^6 + 10^7,3.00928*10^6)
(379*10^6 + 10^7,3.00928*10^6)
(380*10^6 + 10^7,3.00929*10^6)
(381*10^6 + 10^7,3.00929*10^6)
(382*10^6 + 10^7,3.00929*10^6)
(383*10^6 + 10^7,3.00929*10^6)
(384*10^6 + 10^7,3.00929*10^6)
(385*10^6 + 10^7,3.00929*10^6)
(386*10^6 + 10^7,3.0093*10^6)
(387*10^6 + 10^7,3.0093*10^6)
(388*10^6 + 10^7,3.0093*10^6)
(389*10^6 + 10^7,3.0093*10^6)
(390*10^6 + 10^7,3.0093*10^6)
(391*10^6 + 10^7,3.0093*10^6)
(392*10^6 + 10^7,3.00931*10^6)
(393*10^6 + 10^7,3.00931*10^6)
(394*10^6 + 10^7,3.00931*10^6)
(395*10^6 + 10^7,3.00931*10^6)
(396*10^6 + 10^7,3.00931*10^6)
(397*10^6 + 10^7,3.00932*10^6)
(398*10^6 + 10^7,3.00932*10^6)
(399*10^6 + 10^7,3.00932*10^6)
(400*10^6 + 10^7,3.00932*10^6)
(401*10^6 + 10^7,3.00932*10^6)
(402*10^6 + 10^7,3.00932*10^6)
(403*10^6 + 10^7,3.00933*10^6)
(404*10^6 + 10^7,3.00933*10^6)
(405*10^6 + 10^7,3.00933*10^6)
(406*10^6 + 10^7,3.00933*10^6)
(407*10^6 + 10^7,3.00933*10^6)
(408*10^6 + 10^7,3.00933*10^6)
(409*10^6 + 10^7,3.00933*10^6)
(410*10^6 + 10^7,3.00934*10^6)
(411*10^6 + 10^7,3.00934*10^6)
(412*10^6 + 10^7,3.00934*10^6)
(413*10^6 + 10^7,3.00934*10^6)
(414*10^6 + 10^7,3.00934*10^6)
(415*10^6 + 10^7,3.00934*10^6)
(416*10^6 + 10^7,3.00935*10^6)
(417*10^6 + 10^7,3.00935*10^6)
(418*10^6 + 10^7,3.00935*10^6)
(419*10^6 + 10^7,3.00935*10^6)
(420*10^6 + 10^7,3.00935*10^6)
(421*10^6 + 10^7,3.00935*10^6)
(422*10^6 + 10^7,3.00935*10^6)
(423*10^6 + 10^7,3.00936*10^6)
(424*10^6 + 10^7,3.00936*10^6)
(425*10^6 + 10^7,3.00936*10^6)
(426*10^6 + 10^7,3.00936*10^6)
(427*10^6 + 10^7,3.00936*10^6)
(428*10^6 + 10^7,3.00936*10^6)
(429*10^6 + 10^7,3.00937*10^6)
(430*10^6 + 10^7,3.00937*10^6)
(431*10^6 + 10^7,3.00937*10^6)
(432*10^6 + 10^7,3.00937*10^6)
(433*10^6 + 10^7,3.00937*10^6)
(434*10^6 + 10^7,3.00937*10^6)
(435*10^6 + 10^7,3.00937*10^6)
(436*10^6 + 10^7,3.00938*10^6)
(437*10^6 + 10^7,3.00938*10^6)
(438*10^6 + 10^7,3.00938*10^6)
(439*10^6 + 10^7,3.00938*10^6)
(440*10^6 + 10^7,3.00938*10^6)
(441*10^6 + 10^7,3.00938*10^6)
(442*10^6 + 10^7,3.00938*10^6)
(443*10^6 + 10^7,3.00938*10^6)
(444*10^6 + 10^7,3.00939*10^6)
(445*10^6 + 10^7,3.00939*10^6)
(446*10^6 + 10^7,3.00939*10^6)
(447*10^6 + 10^7,3.00939*10^6)
(448*10^6 + 10^7,3.00939*10^6)
(449*10^6 + 10^7,3.00939*10^6)
(450*10^6 + 10^7,3.00939*10^6)
(451*10^6 + 10^7,3.0094*10^6)
(452*10^6 + 10^7,3.0094*10^6)
(453*10^6 + 10^7,3.0094*10^6)
(454*10^6 + 10^7,3.0094*10^6)
(455*10^6 + 10^7,3.0094*10^6)
(456*10^6 + 10^7,3.0094*10^6)
(457*10^6 + 10^7,3.0094*10^6)
(458*10^6 + 10^7,3.0094*10^6)
(459*10^6 + 10^7,3.00941*10^6)
(460*10^6 + 10^7,3.00941*10^6)
(461*10^6 + 10^7,3.00941*10^6)
(462*10^6 + 10^7,3.00941*10^6)
(463*10^6 + 10^7,3.00941*10^6)
(464*10^6 + 10^7,3.00941*10^6)
(465*10^6 + 10^7,3.00941*10^6)
(466*10^6 + 10^7,3.00941*10^6)
(467*10^6 + 10^7,3.00942*10^6)
(468*10^6 + 10^7,3.00942*10^6)
(469*10^6 + 10^7,3.00942*10^6)
(470*10^6 + 10^7,3.00942*10^6)
(471*10^6 + 10^7,3.00942*10^6)
(472*10^6 + 10^7,3.00942*10^6)
(473*10^6 + 10^7,3.00942*10^6)
(474*10^6 + 10^7,3.00942*10^6)
(475*10^6 + 10^7,3.00943*10^6)
(476*10^6 + 10^7,3.00943*10^6)
(477*10^6 + 10^7,3.00943*10^6)
(478*10^6 + 10^7,3.00943*10^6)
(479*10^6 + 10^7,3.00943*10^6)
(480*10^6 + 10^7,3.00943*10^6)
(481*10^6 + 10^7,3.00943*10^6)
(482*10^6 + 10^7,3.00943*10^6)
(483*10^6 + 10^7,3.00943*10^6)
(484*10^6 + 10^7,3.00944*10^6)
(485*10^6 + 10^7,3.00944*10^6)
(486*10^6 + 10^7,3.00944*10^6)
(487*10^6 + 10^7,3.00944*10^6)
(488*10^6 + 10^7,3.00944*10^6)
(489*10^6 + 10^7,3.00944*10^6)
(490*10^6 + 10^7,3.00944*10^6)
(491*10^6 + 10^7,3.00944*10^6)
(492*10^6 + 10^7,3.00945*10^6)
(493*10^6 + 10^7,3.00945*10^6)
(494*10^6 + 10^7,3.00945*10^6)
(495*10^6 + 10^7,3.00945*10^6)
(496*10^6 + 10^7,3.00945*10^6)
(497*10^6 + 10^7,3.00945*10^6)
(498*10^6 + 10^7,3.00945*10^6)
(499*10^6 + 10^7,3.00945*10^6)
(500*10^6 + 10^7,3.00945*10^6)
(501*10^6 + 10^7,3.00945*10^6)
(502*10^6 + 10^7,3.00946*10^6)
(503*10^6 + 10^7,3.00946*10^6)
(504*10^6 + 10^7,3.00946*10^6)
(505*10^6 + 10^7,3.00946*10^6)
(506*10^6 + 10^7,3.00946*10^6)
(507*10^6 + 10^7,3.00946*10^6)
(508*10^6 + 10^7,3.00946*10^6)
(509*10^6 + 10^7,3.00946*10^6)
(510*10^6 + 10^7,3.00946*10^6)
(511*10^6 + 10^7,3.00947*10^6)
(512*10^6 + 10^7,3.00947*10^6)
(513*10^6 + 10^7,3.00947*10^6)
(514*10^6 + 10^7,3.00947*10^6)
(515*10^6 + 10^7,3.00947*10^6)
(516*10^6 + 10^7,3.00947*10^6)
(517*10^6 + 10^7,3.00947*10^6)
(518*10^6 + 10^7,3.00947*10^6)
(519*10^6 + 10^7,3.00947*10^6)
(520*10^6 + 10^7,3.00947*10^6)
(521*10^6 + 10^7,3.00948*10^6)
(522*10^6 + 10^7,3.00948*10^6)
(523*10^6 + 10^7,3.00948*10^6)
(524*10^6 + 10^7,3.00948*10^6)
(525*10^6 + 10^7,3.00948*10^6)
(526*10^6 + 10^7,3.00948*10^6)
(527*10^6 + 10^7,3.00948*10^6)
(528*10^6 + 10^7,3.00948*10^6)
(529*10^6 + 10^7,3.00948*10^6)
(530*10^6 + 10^7,3.00948*10^6)
(531*10^6 + 10^7,3.00949*10^6)
(532*10^6 + 10^7,3.00949*10^6)
(533*10^6 + 10^7,3.00949*10^6)
(534*10^6 + 10^7,3.00949*10^6)
(535*10^6 + 10^7,3.00949*10^6)
(536*10^6 + 10^7,3.00949*10^6)
(537*10^6 + 10^7,3.00949*10^6)
(538*10^6 + 10^7,3.00949*10^6)
(539*10^6 + 10^7,3.00949*10^6)
(540*10^6 + 10^7,3.00949*10^6)
(541*10^6 + 10^7,3.00949*10^6)
(542*10^6 + 10^7,3.0095*10^6)
(543*10^6 + 10^7,3.0095*10^6)
(544*10^6 + 10^7,3.0095*10^6)
(545*10^6 + 10^7,3.0095*10^6)
(546*10^6 + 10^7,3.0095*10^6)
(547*10^6 + 10^7,3.0095*10^6)
(548*10^6 + 10^7,3.0095*10^6)
(549*10^6 + 10^7,3.0095*10^6)
(550*10^6 + 10^7,3.0095*10^6)
(551*10^6 + 10^7,3.0095*10^6)
(552*10^6 + 10^7,3.0095*10^6)
(553*10^6 + 10^7,3.00951*10^6)
(554*10^6 + 10^7,3.00951*10^6)
(555*10^6 + 10^7,3.00951*10^6)
(556*10^6 + 10^7,3.00951*10^6)
(557*10^6 + 10^7,3.00951*10^6)
(558*10^6 + 10^7,3.00951*10^6)
(559*10^6 + 10^7,3.00951*10^6)
(560*10^6 + 10^7,3.00951*10^6)
(561*10^6 + 10^7,3.00951*10^6)
(562*10^6 + 10^7,3.00951*10^6)
(563*10^6 + 10^7,3.00951*10^6)
(564*10^6 + 10^7,3.00951*10^6)
(565*10^6 + 10^7,3.00952*10^6)
(566*10^6 + 10^7,3.00952*10^6)
(567*10^6 + 10^7,3.00952*10^6)
(568*10^6 + 10^7,3.00952*10^6)
(569*10^6 + 10^7,3.00952*10^6)
(570*10^6 + 10^7,3.00952*10^6)
(571*10^6 + 10^7,3.00952*10^6)
(572*10^6 + 10^7,3.00952*10^6)
(573*10^6 + 10^7,3.00952*10^6)
(574*10^6 + 10^7,3.00952*10^6)
(575*10^6 + 10^7,3.00952*10^6)
(576*10^6 + 10^7,3.00952*10^6)
(577*10^6 + 10^7,3.00953*10^6)
(578*10^6 + 10^7,3.00953*10^6)
(579*10^6 + 10^7,3.00953*10^6)
(580*10^6 + 10^7,3.00953*10^6)
(581*10^6 + 10^7,3.00953*10^6)
(582*10^6 + 10^7,3.00953*10^6)
(583*10^6 + 10^7,3.00953*10^6)
(584*10^6 + 10^7,3.00953*10^6)
(585*10^6 + 10^7,3.00953*10^6)
(586*10^6 + 10^7,3.00953*10^6)
(587*10^6 + 10^7,3.00953*10^6)
(588*10^6 + 10^7,3.00953*10^6)
(589*10^6 + 10^7,3.00954*10^6)
(590*10^6 + 10^7,3.00954*10^6)
(591*10^6 + 10^7,3.00954*10^6)
(592*10^6 + 10^7,3.00954*10^6)
(593*10^6 + 10^7,3.00954*10^6)
(594*10^6 + 10^7,3.00954*10^6)
(595*10^6 + 10^7,3.00954*10^6)
(596*10^6 + 10^7,3.00954*10^6)
(597*10^6 + 10^7,3.00954*10^6)
(598*10^6 + 10^7,3.00954*10^6)
(599*10^6 + 10^7,3.00954*10^6)
(600*10^6 + 10^7,3.00954*10^6)
(601*10^6 + 10^7,3.00954*10^6)
(602*10^6 + 10^7,3.00955*10^6)
(603*10^6 + 10^7,3.00955*10^6)
(604*10^6 + 10^7,3.00955*10^6)
(605*10^6 + 10^7,3.00955*10^6)
(606*10^6 + 10^7,3.00955*10^6)
(607*10^6 + 10^7,3.00955*10^6)
(608*10^6 + 10^7,3.00955*10^6)
(609*10^6 + 10^7,3.00955*10^6)
(610*10^6 + 10^7,3.00955*10^6)
(611*10^6 + 10^7,3.00955*10^6)
(612*10^6 + 10^7,3.00955*10^6)
(613*10^6 + 10^7,3.00955*10^6)
(614*10^6 + 10^7,3.00955*10^6)
(615*10^6 + 10^7,3.00955*10^6)
(616*10^6 + 10^7,3.00956*10^6)
(617*10^6 + 10^7,3.00956*10^6)
(618*10^6 + 10^7,3.00956*10^6)
(619*10^6 + 10^7,3.00956*10^6)
(620*10^6 + 10^7,3.00956*10^6)
(621*10^6 + 10^7,3.00956*10^6)
(622*10^6 + 10^7,3.00956*10^6)
(623*10^6 + 10^7,3.00956*10^6)
(624*10^6 + 10^7,3.00956*10^6)
(625*10^6 + 10^7,3.00956*10^6)
(626*10^6 + 10^7,3.00956*10^6)
(627*10^6 + 10^7,3.00956*10^6)
(628*10^6 + 10^7,3.00956*10^6)
(629*10^6 + 10^7,3.00956*10^6)
(630*10^6 + 10^7,3.00956*10^6)
(631*10^6 + 10^7,3.00957*10^6)
(632*10^6 + 10^7,3.00957*10^6)
(633*10^6 + 10^7,3.00957*10^6)
(634*10^6 + 10^7,3.00957*10^6)
(635*10^6 + 10^7,3.00957*10^6)
(636*10^6 + 10^7,3.00957*10^6)
(637*10^6 + 10^7,3.00957*10^6)
(638*10^6 + 10^7,3.00957*10^6)
(639*10^6 + 10^7,3.00957*10^6)
(640*10^6 + 10^7,3.00957*10^6)
(641*10^6 + 10^7,3.00957*10^6)
(642*10^6 + 10^7,3.00957*10^6)
(643*10^6 + 10^7,3.00957*10^6)
(644*10^6 + 10^7,3.00957*10^6)
(645*10^6 + 10^7,3.00957*10^6)
(646*10^6 + 10^7,3.00958*10^6)
(647*10^6 + 10^7,3.00958*10^6)
(648*10^6 + 10^7,3.00958*10^6)
(649*10^6 + 10^7,3.00958*10^6)
(650*10^6 + 10^7,3.00958*10^6)
(651*10^6 + 10^7,3.00958*10^6)
(652*10^6 + 10^7,3.00958*10^6)
(653*10^6 + 10^7,3.00958*10^6)
(654*10^6 + 10^7,3.00958*10^6)
(655*10^6 + 10^7,3.00958*10^6)
(656*10^6 + 10^7,3.00958*10^6)
(657*10^6 + 10^7,3.00958*10^6)
(658*10^6 + 10^7,3.00958*10^6)
(659*10^6 + 10^7,3.00958*10^6)
(660*10^6 + 10^7,3.00958*10^6)
(661*10^6 + 10^7,3.00959*10^6)
(662*10^6 + 10^7,3.00959*10^6)
(663*10^6 + 10^7,3.00959*10^6)
(664*10^6 + 10^7,3.00959*10^6)
(665*10^6 + 10^7,3.00959*10^6)
(666*10^6 + 10^7,3.00959*10^6)
(667*10^6 + 10^7,3.00959*10^6)
(668*10^6 + 10^7,3.00959*10^6)
(669*10^6 + 10^7,3.00959*10^6)
(670*10^6 + 10^7,3.00959*10^6)
(671*10^6 + 10^7,3.00959*10^6)
(672*10^6 + 10^7,3.00959*10^6)
(673*10^6 + 10^7,3.00959*10^6)
(674*10^6 + 10^7,3.00959*10^6)
(675*10^6 + 10^7,3.00959*10^6)
(676*10^6 + 10^7,3.00959*10^6)
(677*10^6 + 10^7,3.00959*10^6)
(678*10^6 + 10^7,3.0096*10^6)
(679*10^6 + 10^7,3.0096*10^6)
(680*10^6 + 10^7,3.0096*10^6)
(681*10^6 + 10^7,3.0096*10^6)
(682*10^6 + 10^7,3.0096*10^6)
(683*10^6 + 10^7,3.0096*10^6)
(684*10^6 + 10^7,3.0096*10^6)
(685*10^6 + 10^7,3.0096*10^6)
(686*10^6 + 10^7,3.0096*10^6)
(687*10^6 + 10^7,3.0096*10^6)
(688*10^6 + 10^7,3.0096*10^6)
(689*10^6 + 10^7,3.0096*10^6)
(690*10^6 + 10^7,3.0096*10^6)
(691*10^6 + 10^7,3.0096*10^6)
(692*10^6 + 10^7,3.0096*10^6)
(693*10^6 + 10^7,3.0096*10^6)
(694*10^6 + 10^7,3.0096*10^6)
(695*10^6 + 10^7,3.00961*10^6)
(696*10^6 + 10^7,3.00961*10^6)
(697*10^6 + 10^7,3.00961*10^6)
(698*10^6 + 10^7,3.00961*10^6)
(699*10^6 + 10^7,3.00961*10^6)
(700*10^6 + 10^7,3.00961*10^6)
(701*10^6 + 10^7,3.00961*10^6)
(702*10^6 + 10^7,3.00961*10^6)
(703*10^6 + 10^7,3.00961*10^6)
(704*10^6 + 10^7,3.00961*10^6)
(705*10^6 + 10^7,3.00961*10^6)
(706*10^6 + 10^7,3.00961*10^6)
(707*10^6 + 10^7,3.00961*10^6)
(708*10^6 + 10^7,3.00961*10^6)
(709*10^6 + 10^7,3.00961*10^6)
(710*10^6 + 10^7,3.00961*10^6)
(711*10^6 + 10^7,3.00961*10^6)
(712*10^6 + 10^7,3.00961*10^6)
(713*10^6 + 10^7,3.00961*10^6)
(714*10^6 + 10^7,3.00962*10^6)
(715*10^6 + 10^7,3.00962*10^6)
(716*10^6 + 10^7,3.00962*10^6)
(717*10^6 + 10^7,3.00962*10^6)
(718*10^6 + 10^7,3.00962*10^6)
(719*10^6 + 10^7,3.00962*10^6)
(720*10^6 + 10^7,3.00962*10^6)
(721*10^6 + 10^7,3.00962*10^6)
(722*10^6 + 10^7,3.00962*10^6)
(723*10^6 + 10^7,3.00962*10^6)
(724*10^6 + 10^7,3.00962*10^6)
(725*10^6 + 10^7,3.00962*10^6)
(726*10^6 + 10^7,3.00962*10^6)
(727*10^6 + 10^7,3.00962*10^6)
(728*10^6 + 10^7,3.00962*10^6)
(729*10^6 + 10^7,3.00962*10^6)
(730*10^6 + 10^7,3.00962*10^6)
(731*10^6 + 10^7,3.00962*10^6)
(732*10^6 + 10^7,3.00962*10^6)
(733*10^6 + 10^7,3.00963*10^6)
(734*10^6 + 10^7,3.00963*10^6)
(735*10^6 + 10^7,3.00963*10^6)
(736*10^6 + 10^7,3.00963*10^6)
(737*10^6 + 10^7,3.00963*10^6)
(738*10^6 + 10^7,3.00963*10^6)
(739*10^6 + 10^7,3.00963*10^6)
(740*10^6 + 10^7,3.00963*10^6)
(741*10^6 + 10^7,3.00963*10^6)
(742*10^6 + 10^7,3.00963*10^6)
(743*10^6 + 10^7,3.00963*10^6)
(744*10^6 + 10^7,3.00963*10^6)
(745*10^6 + 10^7,3.00963*10^6)
(746*10^6 + 10^7,3.00963*10^6)
(747*10^6 + 10^7,3.00963*10^6)
(748*10^6 + 10^7,3.00963*10^6)
(749*10^6 + 10^7,3.00963*10^6)
(750*10^6 + 10^7,3.00963*10^6)
(751*10^6 + 10^7,3.00963*10^6)
(752*10^6 + 10^7,3.00963*10^6)
(753*10^6 + 10^7,3.00964*10^6)
(754*10^6 + 10^7,3.00964*10^6)
(755*10^6 + 10^7,3.00964*10^6)
(756*10^6 + 10^7,3.00964*10^6)
(757*10^6 + 10^7,3.00964*10^6)
(758*10^6 + 10^7,3.00964*10^6)
(759*10^6 + 10^7,3.00964*10^6)
(760*10^6 + 10^7,3.00964*10^6)
(761*10^6 + 10^7,3.00964*10^6)
(762*10^6 + 10^7,3.00964*10^6)
(763*10^6 + 10^7,3.00964*10^6)
(764*10^6 + 10^7,3.00964*10^6)
(765*10^6 + 10^7,3.00964*10^6)
(766*10^6 + 10^7,3.00964*10^6)
(767*10^6 + 10^7,3.00964*10^6)
(768*10^6 + 10^7,3.00964*10^6)
(769*10^6 + 10^7,3.00964*10^6)
(770*10^6 + 10^7,3.00964*10^6)
(771*10^6 + 10^7,3.00964*10^6)
(772*10^6 + 10^7,3.00964*10^6)
(773*10^6 + 10^7,3.00964*10^6)
(774*10^6 + 10^7,3.00964*10^6)
(775*10^6 + 10^7,3.00965*10^6)
(776*10^6 + 10^7,3.00965*10^6)
(777*10^6 + 10^7,3.00965*10^6)
(778*10^6 + 10^7,3.00965*10^6)
(779*10^6 + 10^7,3.00965*10^6)
(780*10^6 + 10^7,3.00965*10^6)
(781*10^6 + 10^7,3.00965*10^6)
(782*10^6 + 10^7,3.00965*10^6)
(783*10^6 + 10^7,3.00965*10^6)
(784*10^6 + 10^7,3.00965*10^6)
(785*10^6 + 10^7,3.00965*10^6)
(786*10^6 + 10^7,3.00965*10^6)
(787*10^6 + 10^7,3.00965*10^6)
(788*10^6 + 10^7,3.00965*10^6)
(789*10^6 + 10^7,3.00965*10^6)
(790*10^6 + 10^7,3.00965*10^6)
(791*10^6 + 10^7,3.00965*10^6)
(792*10^6 + 10^7,3.00965*10^6)
(793*10^6 + 10^7,3.00965*10^6)
(794*10^6 + 10^7,3.00965*10^6)
(795*10^6 + 10^7,3.00965*10^6)
(796*10^6 + 10^7,3.00965*10^6)
(797*10^6 + 10^7,3.00966*10^6)
(798*10^6 + 10^7,3.00966*10^6)
(799*10^6 + 10^7,3.00966*10^6)
(800*10^6 + 10^7,3.00966*10^6)
(801*10^6 + 10^7,3.00966*10^6)
(802*10^6 + 10^7,3.00966*10^6)
(803*10^6 + 10^7,3.00966*10^6)
(804*10^6 + 10^7,3.00966*10^6)
(805*10^6 + 10^7,3.00966*10^6)
(806*10^6 + 10^7,3.00966*10^6)
(807*10^6 + 10^7,3.00966*10^6)
(808*10^6 + 10^7,3.00966*10^6)
(809*10^6 + 10^7,3.00966*10^6)
(810*10^6 + 10^7,3.00966*10^6)
(811*10^6 + 10^7,3.00966*10^6)
(812*10^6 + 10^7,3.00966*10^6)
(813*10^6 + 10^7,3.00966*10^6)
(814*10^6 + 10^7,3.00966*10^6)
(815*10^6 + 10^7,3.00966*10^6)
(816*10^6 + 10^7,3.00966*10^6)
(817*10^6 + 10^7,3.00966*10^6)
(818*10^6 + 10^7,3.00966*10^6)
(819*10^6 + 10^7,3.00966*10^6)
(820*10^6 + 10^7,3.00966*10^6)
(821*10^6 + 10^7,3.00967*10^6)
(822*10^6 + 10^7,3.00967*10^6)
(823*10^6 + 10^7,3.00967*10^6)
(824*10^6 + 10^7,3.00967*10^6)
(825*10^6 + 10^7,3.00967*10^6)
(826*10^6 + 10^7,3.00967*10^6)
(827*10^6 + 10^7,3.00967*10^6)
(828*10^6 + 10^7,3.00967*10^6)
(829*10^6 + 10^7,3.00967*10^6)
(830*10^6 + 10^7,3.00967*10^6)
(831*10^6 + 10^7,3.00967*10^6)
(832*10^6 + 10^7,3.00967*10^6)
(833*10^6 + 10^7,3.00967*10^6)
(834*10^6 + 10^7,3.00967*10^6)
(835*10^6 + 10^7,3.00967*10^6)
(836*10^6 + 10^7,3.00967*10^6)
(837*10^6 + 10^7,3.00967*10^6)
(838*10^6 + 10^7,3.00967*10^6)
(839*10^6 + 10^7,3.00967*10^6)
(840*10^6 + 10^7,3.00967*10^6)
(841*10^6 + 10^7,3.00967*10^6)
(842*10^6 + 10^7,3.00967*10^6)
(843*10^6 + 10^7,3.00967*10^6)
(844*10^6 + 10^7,3.00967*10^6)
(845*10^6 + 10^7,3.00967*10^6)
(846*10^6 + 10^7,3.00967*10^6)
(847*10^6 + 10^7,3.00968*10^6)
(848*10^6 + 10^7,3.00968*10^6)
(849*10^6 + 10^7,3.00968*10^6)
(850*10^6 + 10^7,3.00968*10^6)
(851*10^6 + 10^7,3.00968*10^6)
(852*10^6 + 10^7,3.00968*10^6)
(853*10^6 + 10^7,3.00968*10^6)
(854*10^6 + 10^7,3.00968*10^6)
(855*10^6 + 10^7,3.00968*10^6)
(856*10^6 + 10^7,3.00968*10^6)
(857*10^6 + 10^7,3.00968*10^6)
(858*10^6 + 10^7,3.00968*10^6)
(859*10^6 + 10^7,3.00968*10^6)
(860*10^6 + 10^7,3.00968*10^6)
(861*10^6 + 10^7,3.00968*10^6)
(862*10^6 + 10^7,3.00968*10^6)
(863*10^6 + 10^7,3.00968*10^6)
(864*10^6 + 10^7,3.00968*10^6)
(865*10^6 + 10^7,3.00968*10^6)
(866*10^6 + 10^7,3.00968*10^6)
(867*10^6 + 10^7,3.00968*10^6)
(868*10^6 + 10^7,3.00968*10^6)
(869*10^6 + 10^7,3.00968*10^6)
(870*10^6 + 10^7,3.00968*10^6)
(871*10^6 + 10^7,3.00968*10^6)
(872*10^6 + 10^7,3.00968*10^6)
(873*10^6 + 10^7,3.00968*10^6)
(874*10^6 + 10^7,3.00969*10^6)
(875*10^6 + 10^7,3.00969*10^6)
(876*10^6 + 10^7,3.00969*10^6)
(877*10^6 + 10^7,3.00969*10^6)
(878*10^6 + 10^7,3.00969*10^6)
(879*10^6 + 10^7,3.00969*10^6)
(880*10^6 + 10^7,3.00969*10^6)
(881*10^6 + 10^7,3.00969*10^6)
(882*10^6 + 10^7,3.00969*10^6)
(883*10^6 + 10^7,3.00969*10^6)
(884*10^6 + 10^7,3.00969*10^6)
(885*10^6 + 10^7,3.00969*10^6)
(886*10^6 + 10^7,3.00969*10^6)
(887*10^6 + 10^7,3.00969*10^6)
(888*10^6 + 10^7,3.00969*10^6)
(889*10^6 + 10^7,3.00969*10^6)
(890*10^6 + 10^7,3.00969*10^6)
(891*10^6 + 10^7,3.00969*10^6)
(892*10^6 + 10^7,3.00969*10^6)
(893*10^6 + 10^7,3.00969*10^6)
(894*10^6 + 10^7,3.00969*10^6)
(895*10^6 + 10^7,3.00969*10^6)
(896*10^6 + 10^7,3.00969*10^6)
(897*10^6 + 10^7,3.00969*10^6)
(898*10^6 + 10^7,3.00969*10^6)
(899*10^6 + 10^7,3.00969*10^6)
(900*10^6 + 10^7,3.00969*10^6)
(901*10^6 + 10^7,3.00969*10^6)
(902*10^6 + 10^7,3.00969*10^6)
(903*10^6 + 10^7,3.0097*10^6)
(904*10^6 + 10^7,3.0097*10^6)
(905*10^6 + 10^7,3.0097*10^6)
(906*10^6 + 10^7,3.0097*10^6)
(907*10^6 + 10^7,3.0097*10^6)
(908*10^6 + 10^7,3.0097*10^6)
(909*10^6 + 10^7,3.0097*10^6)
(910*10^6 + 10^7,3.0097*10^6)
(911*10^6 + 10^7,3.0097*10^6)
(912*10^6 + 10^7,3.0097*10^6)
(913*10^6 + 10^7,3.0097*10^6)
(914*10^6 + 10^7,3.0097*10^6)
(915*10^6 + 10^7,3.0097*10^6)
(916*10^6 + 10^7,3.0097*10^6)
(917*10^6 + 10^7,3.0097*10^6)
(918*10^6 + 10^7,3.0097*10^6)
(919*10^6 + 10^7,3.0097*10^6)
(920*10^6 + 10^7,3.0097*10^6)
(921*10^6 + 10^7,3.0097*10^6)
(922*10^6 + 10^7,3.0097*10^6)
(923*10^6 + 10^7,3.0097*10^6)
(924*10^6 + 10^7,3.0097*10^6)
(925*10^6 + 10^7,3.0097*10^6)
(926*10^6 + 10^7,3.0097*10^6)
(927*10^6 + 10^7,3.0097*10^6)
(928*10^6 + 10^7,3.0097*10^6)
(929*10^6 + 10^7,3.0097*10^6)
(930*10^6 + 10^7,3.0097*10^6)
(931*10^6 + 10^7,3.0097*10^6)
(932*10^6 + 10^7,3.0097*10^6)
(933*10^6 + 10^7,3.0097*10^6)
(934*10^6 + 10^7,3.00971*10^6)
(935*10^6 + 10^7,3.00971*10^6)
(936*10^6 + 10^7,3.00971*10^6)
(937*10^6 + 10^7,3.00971*10^6)
(938*10^6 + 10^7,3.00971*10^6)
(939*10^6 + 10^7,3.00971*10^6)
(940*10^6 + 10^7,3.00971*10^6)
(941*10^6 + 10^7,3.00971*10^6)
(942*10^6 + 10^7,3.00971*10^6)
(943*10^6 + 10^7,3.00971*10^6)
(944*10^6 + 10^7,3.00971*10^6)
(945*10^6 + 10^7,3.00971*10^6)
(946*10^6 + 10^7,3.00971*10^6)
(947*10^6 + 10^7,3.00971*10^6)
(948*10^6 + 10^7,3.00971*10^6)
(949*10^6 + 10^7,3.00971*10^6)
(950*10^6 + 10^7,3.00971*10^6)
(951*10^6 + 10^7,3.00971*10^6)
(952*10^6 + 10^7,3.00971*10^6)
(953*10^6 + 10^7,3.00971*10^6)
(954*10^6 + 10^7,3.00971*10^6)
(955*10^6 + 10^7,3.00971*10^6)
(956*10^6 + 10^7,3.00971*10^6)
(957*10^6 + 10^7,3.00971*10^6)
(958*10^6 + 10^7,3.00971*10^6)
(959*10^6 + 10^7,3.00971*10^6)
(960*10^6 + 10^7,3.00971*10^6)
(961*10^6 + 10^7,3.00971*10^6)
(962*10^6 + 10^7,3.00971*10^6)
(963*10^6 + 10^7,3.00971*10^6)
(964*10^6 + 10^7,3.00971*10^6)
(965*10^6 + 10^7,3.00971*10^6)
(966*10^6 + 10^7,3.00971*10^6)
(967*10^6 + 10^7,3.00972*10^6)
(968*10^6 + 10^7,3.00972*10^6)
(969*10^6 + 10^7,3.00972*10^6)
(970*10^6 + 10^7,3.00972*10^6)
(971*10^6 + 10^7,3.00972*10^6)
(972*10^6 + 10^7,3.00972*10^6)
(973*10^6 + 10^7,3.00972*10^6)
(974*10^6 + 10^7,3.00972*10^6)
(975*10^6 + 10^7,3.00972*10^6)
(976*10^6 + 10^7,3.00972*10^6)
(977*10^6 + 10^7,3.00972*10^6)
(978*10^6 + 10^7,3.00972*10^6)
(979*10^6 + 10^7,3.00972*10^6)
(980*10^6 + 10^7,3.00972*10^6)
(981*10^6 + 10^7,3.00972*10^6)
(982*10^6 + 10^7,3.00972*10^6)
(983*10^6 + 10^7,3.00972*10^6)
(984*10^6 + 10^7,3.00972*10^6)
(985*10^6 + 10^7,3.00972*10^6)
(986*10^6 + 10^7,3.00972*10^6)
(987*10^6 + 10^7,3.00972*10^6)
(988*10^6 + 10^7,3.00972*10^6)
(989*10^6 + 10^7,3.00972*10^6)
(990*10^6 + 10^7,3.00972*10^6)
(991*10^6 + 10^7,3.00972*10^6)
};
\addplot[domain=0:10^9, thick] {3e6};
\addplot[domain=0:1e9, red, dashed]
{2.995*10^6} ;
\addplot[mark=none, red, smooth] coordinates {
(1*10^6 + 10^7,2.9672*10^6)
(2*10^6 + 10^7,2.96973*10^6)
(3*10^6 + 10^7,2.97183*10^6)
(4*10^6 + 10^7,2.97362*10^6)
(5*10^6 + 10^7,2.97514*10^6)
(6*10^6 + 10^7,2.97647*10^6)
(7*10^6 + 10^7,2.97763*10^6)
(8*10^6 + 10^7,2.97865*10^6)
(9*10^6 + 10^7,2.97956*10^6)
(10*10^6 + 10^7,2.98037*10^6)
(11*10^6 + 10^7,2.9811*10^6)
(12*10^6 + 10^7,2.98176*10^6)
(13*10^6 + 10^7,2.98236*10^6)
(14*10^6 + 10^7,2.98291*10^6)
(15*10^6 + 10^7,2.98342*10^6)
(16*10^6 + 10^7,2.98388*10^6)
(17*10^6 + 10^7,2.98431*10^6)
(18*10^6 + 10^7,2.9847*10^6)
(19*10^6 + 10^7,2.98507*10^6)
(20*10^6 + 10^7,2.98541*10^6)
(21*10^6 + 10^7,2.98573*10^6)
(22*10^6 + 10^7,2.98603*10^6)
(23*10^6 + 10^7,2.98631*10^6)
(24*10^6 + 10^7,2.98658*10^6)
(25*10^6 + 10^7,2.98682*10^6)
(26*10^6 + 10^7,2.98706*10^6)
(27*10^6 + 10^7,2.98728*10^6)
(28*10^6 + 10^7,2.98749*10^6)
(29*10^6 + 10^7,2.98768*10^6)
(30*10^6 + 10^7,2.98787*10^6)
(31*10^6 + 10^7,2.98805*10^6)
(32*10^6 + 10^7,2.98822*10^6)
(33*10^6 + 10^7,2.98838*10^6)
(34*10^6 + 10^7,2.98853*10^6)
(35*10^6 + 10^7,2.98868*10^6)
(36*10^6 + 10^7,2.98882*10^6)
(37*10^6 + 10^7,2.98896*10^6)
(38*10^6 + 10^7,2.98909*10^6)
(39*10^6 + 10^7,2.98921*10^6)
(40*10^6 + 10^7,2.98933*10^6)
(41*10^6 + 10^7,2.98944*10^6)
(42*10^6 + 10^7,2.98955*10^6)
(43*10^6 + 10^7,2.98965*10^6)
(44*10^6 + 10^7,2.98975*10^6)
(45*10^6 + 10^7,2.98985*10^6)
(46*10^6 + 10^7,2.98995*10^6)
(47*10^6 + 10^7,2.99004*10^6)
(48*10^6 + 10^7,2.99012*10^6)
(49*10^6 + 10^7,2.99021*10^6)
(50*10^6 + 10^7,2.99029*10^6)
(51*10^6 + 10^7,2.99037*10^6)
(52*10^6 + 10^7,2.99044*10^6)
(53*10^6 + 10^7,2.99052*10^6)
(54*10^6 + 10^7,2.99059*10^6)
(55*10^6 + 10^7,2.99066*10^6)
(56*10^6 + 10^7,2.99072*10^6)
(57*10^6 + 10^7,2.99079*10^6)
(58*10^6 + 10^7,2.99085*10^6)
(59*10^6 + 10^7,2.99091*10^6)
(60*10^6 + 10^7,2.99097*10^6)
(61*10^6 + 10^7,2.99103*10^6)
(62*10^6 + 10^7,2.99108*10^6)
(63*10^6 + 10^7,2.99114*10^6)
(64*10^6 + 10^7,2.99119*10^6)
(65*10^6 + 10^7,2.99124*10^6)
(66*10^6 + 10^7,2.99129*10^6)
(67*10^6 + 10^7,2.99134*10^6)
(68*10^6 + 10^7,2.99139*10^6)
(69*10^6 + 10^7,2.99144*10^6)
(70*10^6 + 10^7,2.99148*10^6)
(71*10^6 + 10^7,2.99153*10^6)
(72*10^6 + 10^7,2.99157*10^6)
(73*10^6 + 10^7,2.99161*10^6)
(74*10^6 + 10^7,2.99165*10^6)
(75*10^6 + 10^7,2.99169*10^6)
(76*10^6 + 10^7,2.99173*10^6)
(77*10^6 + 10^7,2.99177*10^6)
(78*10^6 + 10^7,2.9918*10^6)
(79*10^6 + 10^7,2.99184*10^6)
(80*10^6 + 10^7,2.99188*10^6)
(81*10^6 + 10^7,2.99191*10^6)
(82*10^6 + 10^7,2.99195*10^6)
(83*10^6 + 10^7,2.99198*10^6)
(84*10^6 + 10^7,2.99201*10^6)
(85*10^6 + 10^7,2.99204*10^6)
(86*10^6 + 10^7,2.99207*10^6)
(87*10^6 + 10^7,2.9921*10^6)
(88*10^6 + 10^7,2.99213*10^6)
(89*10^6 + 10^7,2.99216*10^6)
(90*10^6 + 10^7,2.99219*10^6)
(91*10^6 + 10^7,2.99222*10^6)
(92*10^6 + 10^7,2.99225*10^6)
(93*10^6 + 10^7,2.99227*10^6)
(94*10^6 + 10^7,2.9923*10^6)
(95*10^6 + 10^7,2.99233*10^6)
(96*10^6 + 10^7,2.99235*10^6)
(97*10^6 + 10^7,2.99238*10^6)
(98*10^6 + 10^7,2.9924*10^6)
(99*10^6 + 10^7,2.99243*10^6)
(100*10^6 + 10^7,2.99245*10^6)
(101*10^6 + 10^7,2.99247*10^6)
(102*10^6 + 10^7,2.9925*10^6)
(103*10^6 + 10^7,2.99252*10^6)
(104*10^6 + 10^7,2.99254*10^6)
(105*10^6 + 10^7,2.99256*10^6)
(106*10^6 + 10^7,2.99258*10^6)
(107*10^6 + 10^7,2.9926*10^6)
(108*10^6 + 10^7,2.99262*10^6)
(109*10^6 + 10^7,2.99264*10^6)
(110*10^6 + 10^7,2.99266*10^6)
(111*10^6 + 10^7,2.99268*10^6)
(112*10^6 + 10^7,2.9927*10^6)
(113*10^6 + 10^7,2.99272*10^6)
(114*10^6 + 10^7,2.99274*10^6)
(115*10^6 + 10^7,2.99276*10^6)
(116*10^6 + 10^7,2.99278*10^6)
(117*10^6 + 10^7,2.99279*10^6)
(118*10^6 + 10^7,2.99281*10^6)
(119*10^6 + 10^7,2.99283*10^6)
(120*10^6 + 10^7,2.99284*10^6)
(121*10^6 + 10^7,2.99286*10^6)
(122*10^6 + 10^7,2.99288*10^6)
(123*10^6 + 10^7,2.99289*10^6)
(124*10^6 + 10^7,2.99291*10^6)
(125*10^6 + 10^7,2.99293*10^6)
(126*10^6 + 10^7,2.99294*10^6)
(127*10^6 + 10^7,2.99296*10^6)
(128*10^6 + 10^7,2.99297*10^6)
(129*10^6 + 10^7,2.99299*10^6)
(130*10^6 + 10^7,2.993*10^6)
(131*10^6 + 10^7,2.99301*10^6)
(132*10^6 + 10^7,2.99303*10^6)
(133*10^6 + 10^7,2.99304*10^6)
(134*10^6 + 10^7,2.99306*10^6)
(135*10^6 + 10^7,2.99307*10^6)
(136*10^6 + 10^7,2.99308*10^6)
(137*10^6 + 10^7,2.9931*10^6)
(138*10^6 + 10^7,2.99311*10^6)
(139*10^6 + 10^7,2.99312*10^6)
(140*10^6 + 10^7,2.99313*10^6)
(141*10^6 + 10^7,2.99315*10^6)
(142*10^6 + 10^7,2.99316*10^6)
(143*10^6 + 10^7,2.99317*10^6)
(144*10^6 + 10^7,2.99318*10^6)
(145*10^6 + 10^7,2.99319*10^6)
(146*10^6 + 10^7,2.99321*10^6)
(147*10^6 + 10^7,2.99322*10^6)
(148*10^6 + 10^7,2.99323*10^6)
(149*10^6 + 10^7,2.99324*10^6)
(150*10^6 + 10^7,2.99325*10^6)
(151*10^6 + 10^7,2.99326*10^6)
(152*10^6 + 10^7,2.99327*10^6)
(153*10^6 + 10^7,2.99328*10^6)
(154*10^6 + 10^7,2.99329*10^6)
(155*10^6 + 10^7,2.9933*10^6)
(156*10^6 + 10^7,2.99332*10^6)
(157*10^6 + 10^7,2.99333*10^6)
(158*10^6 + 10^7,2.99334*10^6)
(159*10^6 + 10^7,2.99335*10^6)
(160*10^6 + 10^7,2.99336*10^6)
(161*10^6 + 10^7,2.99336*10^6)
(162*10^6 + 10^7,2.99337*10^6)
(163*10^6 + 10^7,2.99338*10^6)
(164*10^6 + 10^7,2.99339*10^6)
(165*10^6 + 10^7,2.9934*10^6)
(166*10^6 + 10^7,2.99341*10^6)
(167*10^6 + 10^7,2.99342*10^6)
(168*10^6 + 10^7,2.99343*10^6)
(169*10^6 + 10^7,2.99344*10^6)
(170*10^6 + 10^7,2.99345*10^6)
(171*10^6 + 10^7,2.99346*10^6)
(172*10^6 + 10^7,2.99346*10^6)
(173*10^6 + 10^7,2.99347*10^6)
(174*10^6 + 10^7,2.99348*10^6)
(175*10^6 + 10^7,2.99349*10^6)
(176*10^6 + 10^7,2.9935*10^6)
(177*10^6 + 10^7,2.99351*10^6)
(178*10^6 + 10^7,2.99351*10^6)
(179*10^6 + 10^7,2.99352*10^6)
(180*10^6 + 10^7,2.99353*10^6)
(181*10^6 + 10^7,2.99354*10^6)
(182*10^6 + 10^7,2.99354*10^6)
(183*10^6 + 10^7,2.99355*10^6)
(184*10^6 + 10^7,2.99356*10^6)
(185*10^6 + 10^7,2.99357*10^6)
(186*10^6 + 10^7,2.99357*10^6)
(187*10^6 + 10^7,2.99358*10^6)
(188*10^6 + 10^7,2.99359*10^6)
(189*10^6 + 10^7,2.9936*10^6)
(190*10^6 + 10^7,2.9936*10^6)
(191*10^6 + 10^7,2.99361*10^6)
(192*10^6 + 10^7,2.99362*10^6)
(193*10^6 + 10^7,2.99362*10^6)
(194*10^6 + 10^7,2.99363*10^6)
(195*10^6 + 10^7,2.99364*10^6)
(196*10^6 + 10^7,2.99364*10^6)
(197*10^6 + 10^7,2.99365*10^6)
(198*10^6 + 10^7,2.99366*10^6)
(199*10^6 + 10^7,2.99366*10^6)
(200*10^6 + 10^7,2.99367*10^6)
(201*10^6 + 10^7,2.99368*10^6)
(202*10^6 + 10^7,2.99368*10^6)
(203*10^6 + 10^7,2.99369*10^6)
(204*10^6 + 10^7,2.99369*10^6)
(205*10^6 + 10^7,2.9937*10^6)
(206*10^6 + 10^7,2.99371*10^6)
(207*10^6 + 10^7,2.99371*10^6)
(208*10^6 + 10^7,2.99372*10^6)
(209*10^6 + 10^7,2.99372*10^6)
(210*10^6 + 10^7,2.99373*10^6)
(211*10^6 + 10^7,2.99374*10^6)
(212*10^6 + 10^7,2.99374*10^6)
(213*10^6 + 10^7,2.99375*10^6)
(214*10^6 + 10^7,2.99375*10^6)
(215*10^6 + 10^7,2.99376*10^6)
(216*10^6 + 10^7,2.99376*10^6)
(217*10^6 + 10^7,2.99377*10^6)
(218*10^6 + 10^7,2.99378*10^6)
(219*10^6 + 10^7,2.99378*10^6)
(220*10^6 + 10^7,2.99379*10^6)
(221*10^6 + 10^7,2.99379*10^6)
(222*10^6 + 10^7,2.9938*10^6)
(223*10^6 + 10^7,2.9938*10^6)
(224*10^6 + 10^7,2.99381*10^6)
(225*10^6 + 10^7,2.99381*10^6)
(226*10^6 + 10^7,2.99382*10^6)
(227*10^6 + 10^7,2.99382*10^6)
(228*10^6 + 10^7,2.99383*10^6)
(229*10^6 + 10^7,2.99383*10^6)
(230*10^6 + 10^7,2.99384*10^6)
(231*10^6 + 10^7,2.99384*10^6)
(232*10^6 + 10^7,2.99385*10^6)
(233*10^6 + 10^7,2.99385*10^6)
(234*10^6 + 10^7,2.99386*10^6)
(235*10^6 + 10^7,2.99386*10^6)
(236*10^6 + 10^7,2.99387*10^6)
(237*10^6 + 10^7,2.99387*10^6)
(238*10^6 + 10^7,2.99387*10^6)
(239*10^6 + 10^7,2.99388*10^6)
(240*10^6 + 10^7,2.99388*10^6)
(241*10^6 + 10^7,2.99389*10^6)
(242*10^6 + 10^7,2.99389*10^6)
(243*10^6 + 10^7,2.9939*10^6)
(244*10^6 + 10^7,2.9939*10^6)
(245*10^6 + 10^7,2.99391*10^6)
(246*10^6 + 10^7,2.99391*10^6)
(247*10^6 + 10^7,2.99391*10^6)
(248*10^6 + 10^7,2.99392*10^6)
(249*10^6 + 10^7,2.99392*10^6)
(250*10^6 + 10^7,2.99393*10^6)
(251*10^6 + 10^7,2.99393*10^6)
(252*10^6 + 10^7,2.99393*10^6)
(253*10^6 + 10^7,2.99394*10^6)
(254*10^6 + 10^7,2.99394*10^6)
(255*10^6 + 10^7,2.99395*10^6)
(256*10^6 + 10^7,2.99395*10^6)
(257*10^6 + 10^7,2.99395*10^6)
(258*10^6 + 10^7,2.99396*10^6)
(259*10^6 + 10^7,2.99396*10^6)
(260*10^6 + 10^7,2.99397*10^6)
(261*10^6 + 10^7,2.99397*10^6)
(262*10^6 + 10^7,2.99397*10^6)
(263*10^6 + 10^7,2.99398*10^6)
(264*10^6 + 10^7,2.99398*10^6)
(265*10^6 + 10^7,2.99399*10^6)
(266*10^6 + 10^7,2.99399*10^6)
(267*10^6 + 10^7,2.99399*10^6)
(268*10^6 + 10^7,2.994*10^6)
(269*10^6 + 10^7,2.994*10^6)
(270*10^6 + 10^7,2.994*10^6)
(271*10^6 + 10^7,2.99401*10^6)
(272*10^6 + 10^7,2.99401*10^6)
(273*10^6 + 10^7,2.99401*10^6)
(274*10^6 + 10^7,2.99402*10^6)
(275*10^6 + 10^7,2.99402*10^6)
(276*10^6 + 10^7,2.99402*10^6)
(277*10^6 + 10^7,2.99403*10^6)
(278*10^6 + 10^7,2.99403*10^6)
(279*10^6 + 10^7,2.99403*10^6)
(280*10^6 + 10^7,2.99404*10^6)
(281*10^6 + 10^7,2.99404*10^6)
(282*10^6 + 10^7,2.99404*10^6)
(283*10^6 + 10^7,2.99405*10^6)
(284*10^6 + 10^7,2.99405*10^6)
(285*10^6 + 10^7,2.99405*10^6)
(286*10^6 + 10^7,2.99406*10^6)
(287*10^6 + 10^7,2.99406*10^6)
(288*10^6 + 10^7,2.99406*10^6)
(289*10^6 + 10^7,2.99407*10^6)
(290*10^6 + 10^7,2.99407*10^6)
(291*10^6 + 10^7,2.99407*10^6)
(292*10^6 + 10^7,2.99408*10^6)
(293*10^6 + 10^7,2.99408*10^6)
(294*10^6 + 10^7,2.99408*10^6)
(295*10^6 + 10^7,2.99409*10^6)
(296*10^6 + 10^7,2.99409*10^6)
(297*10^6 + 10^7,2.99409*10^6)
(298*10^6 + 10^7,2.99409*10^6)
(299*10^6 + 10^7,2.9941*10^6)
(300*10^6 + 10^7,2.9941*10^6)
(301*10^6 + 10^7,2.9941*10^6)
(302*10^6 + 10^7,2.99411*10^6)
(303*10^6 + 10^7,2.99411*10^6)
(304*10^6 + 10^7,2.99411*10^6)
(305*10^6 + 10^7,2.99411*10^6)
(306*10^6 + 10^7,2.99412*10^6)
(307*10^6 + 10^7,2.99412*10^6)
(308*10^6 + 10^7,2.99412*10^6)
(309*10^6 + 10^7,2.99413*10^6)
(310*10^6 + 10^7,2.99413*10^6)
(311*10^6 + 10^7,2.99413*10^6)
(312*10^6 + 10^7,2.99413*10^6)
(313*10^6 + 10^7,2.99414*10^6)
(314*10^6 + 10^7,2.99414*10^6)
(315*10^6 + 10^7,2.99414*10^6)
(316*10^6 + 10^7,2.99414*10^6)
(317*10^6 + 10^7,2.99415*10^6)
(318*10^6 + 10^7,2.99415*10^6)
(319*10^6 + 10^7,2.99415*10^6)
(320*10^6 + 10^7,2.99416*10^6)
(321*10^6 + 10^7,2.99416*10^6)
(322*10^6 + 10^7,2.99416*10^6)
(323*10^6 + 10^7,2.99416*10^6)
(324*10^6 + 10^7,2.99417*10^6)
(325*10^6 + 10^7,2.99417*10^6)
(326*10^6 + 10^7,2.99417*10^6)
(327*10^6 + 10^7,2.99417*10^6)
(328*10^6 + 10^7,2.99418*10^6)
(329*10^6 + 10^7,2.99418*10^6)
(330*10^6 + 10^7,2.99418*10^6)
(331*10^6 + 10^7,2.99418*10^6)
(332*10^6 + 10^7,2.99418*10^6)
(333*10^6 + 10^7,2.99419*10^6)
(334*10^6 + 10^7,2.99419*10^6)
(335*10^6 + 10^7,2.99419*10^6)
(336*10^6 + 10^7,2.99419*10^6)
(337*10^6 + 10^7,2.9942*10^6)
(338*10^6 + 10^7,2.9942*10^6)
(339*10^6 + 10^7,2.9942*10^6)
(340*10^6 + 10^7,2.9942*10^6)
(341*10^6 + 10^7,2.99421*10^6)
(342*10^6 + 10^7,2.99421*10^6)
(343*10^6 + 10^7,2.99421*10^6)
(344*10^6 + 10^7,2.99421*10^6)
(345*10^6 + 10^7,2.99421*10^6)
(346*10^6 + 10^7,2.99422*10^6)
(347*10^6 + 10^7,2.99422*10^6)
(348*10^6 + 10^7,2.99422*10^6)
(349*10^6 + 10^7,2.99422*10^6)
(350*10^6 + 10^7,2.99423*10^6)
(351*10^6 + 10^7,2.99423*10^6)
(352*10^6 + 10^7,2.99423*10^6)
(353*10^6 + 10^7,2.99423*10^6)
(354*10^6 + 10^7,2.99423*10^6)
(355*10^6 + 10^7,2.99424*10^6)
(356*10^6 + 10^7,2.99424*10^6)
(357*10^6 + 10^7,2.99424*10^6)
(358*10^6 + 10^7,2.99424*10^6)
(359*10^6 + 10^7,2.99424*10^6)
(360*10^6 + 10^7,2.99425*10^6)
(361*10^6 + 10^7,2.99425*10^6)
(362*10^6 + 10^7,2.99425*10^6)
(363*10^6 + 10^7,2.99425*10^6)
(364*10^6 + 10^7,2.99425*10^6)
(365*10^6 + 10^7,2.99426*10^6)
(366*10^6 + 10^7,2.99426*10^6)
(367*10^6 + 10^7,2.99426*10^6)
(368*10^6 + 10^7,2.99426*10^6)
(369*10^6 + 10^7,2.99426*10^6)
(370*10^6 + 10^7,2.99427*10^6)
(371*10^6 + 10^7,2.99427*10^6)
(372*10^6 + 10^7,2.99427*10^6)
(373*10^6 + 10^7,2.99427*10^6)
(374*10^6 + 10^7,2.99427*10^6)
(375*10^6 + 10^7,2.99428*10^6)
(376*10^6 + 10^7,2.99428*10^6)
(377*10^6 + 10^7,2.99428*10^6)
(378*10^6 + 10^7,2.99428*10^6)
(379*10^6 + 10^7,2.99428*10^6)
(380*10^6 + 10^7,2.99429*10^6)
(381*10^6 + 10^7,2.99429*10^6)
(382*10^6 + 10^7,2.99429*10^6)
(383*10^6 + 10^7,2.99429*10^6)
(384*10^6 + 10^7,2.99429*10^6)
(385*10^6 + 10^7,2.99429*10^6)
(386*10^6 + 10^7,2.9943*10^6)
(387*10^6 + 10^7,2.9943*10^6)
(388*10^6 + 10^7,2.9943*10^6)
(389*10^6 + 10^7,2.9943*10^6)
(390*10^6 + 10^7,2.9943*10^6)
(391*10^6 + 10^7,2.99431*10^6)
(392*10^6 + 10^7,2.99431*10^6)
(393*10^6 + 10^7,2.99431*10^6)
(394*10^6 + 10^7,2.99431*10^6)
(395*10^6 + 10^7,2.99431*10^6)
(396*10^6 + 10^7,2.99431*10^6)
(397*10^6 + 10^7,2.99432*10^6)
(398*10^6 + 10^7,2.99432*10^6)
(399*10^6 + 10^7,2.99432*10^6)
(400*10^6 + 10^7,2.99432*10^6)
(401*10^6 + 10^7,2.99432*10^6)
(402*10^6 + 10^7,2.99432*10^6)
(403*10^6 + 10^7,2.99433*10^6)
(404*10^6 + 10^7,2.99433*10^6)
(405*10^6 + 10^7,2.99433*10^6)
(406*10^6 + 10^7,2.99433*10^6)
(407*10^6 + 10^7,2.99433*10^6)
(408*10^6 + 10^7,2.99433*10^6)
(409*10^6 + 10^7,2.99433*10^6)
(410*10^6 + 10^7,2.99434*10^6)
(411*10^6 + 10^7,2.99434*10^6)
(412*10^6 + 10^7,2.99434*10^6)
(413*10^6 + 10^7,2.99434*10^6)
(414*10^6 + 10^7,2.99434*10^6)
(415*10^6 + 10^7,2.99434*10^6)
(416*10^6 + 10^7,2.99435*10^6)
(417*10^6 + 10^7,2.99435*10^6)
(418*10^6 + 10^7,2.99435*10^6)
(419*10^6 + 10^7,2.99435*10^6)
(420*10^6 + 10^7,2.99435*10^6)
(421*10^6 + 10^7,2.99435*10^6)
(422*10^6 + 10^7,2.99435*10^6)
(423*10^6 + 10^7,2.99436*10^6)
(424*10^6 + 10^7,2.99436*10^6)
(425*10^6 + 10^7,2.99436*10^6)
(426*10^6 + 10^7,2.99436*10^6)
(427*10^6 + 10^7,2.99436*10^6)
(428*10^6 + 10^7,2.99436*10^6)
(429*10^6 + 10^7,2.99437*10^6)
(430*10^6 + 10^7,2.99437*10^6)
(431*10^6 + 10^7,2.99437*10^6)
(432*10^6 + 10^7,2.99437*10^6)
(433*10^6 + 10^7,2.99437*10^6)
(434*10^6 + 10^7,2.99437*10^6)
(435*10^6 + 10^7,2.99437*10^6)
(436*10^6 + 10^7,2.99438*10^6)
(437*10^6 + 10^7,2.99438*10^6)
(438*10^6 + 10^7,2.99438*10^6)
(439*10^6 + 10^7,2.99438*10^6)
(440*10^6 + 10^7,2.99438*10^6)
(441*10^6 + 10^7,2.99438*10^6)
(442*10^6 + 10^7,2.99438*10^6)
(443*10^6 + 10^7,2.99438*10^6)
(444*10^6 + 10^7,2.99439*10^6)
(445*10^6 + 10^7,2.99439*10^6)
(446*10^6 + 10^7,2.99439*10^6)
(447*10^6 + 10^7,2.99439*10^6)
(448*10^6 + 10^7,2.99439*10^6)
(449*10^6 + 10^7,2.99439*10^6)
(450*10^6 + 10^7,2.99439*10^6)
(451*10^6 + 10^7,2.9944*10^6)
(452*10^6 + 10^7,2.9944*10^6)
(453*10^6 + 10^7,2.9944*10^6)
(454*10^6 + 10^7,2.9944*10^6)
(455*10^6 + 10^7,2.9944*10^6)
(456*10^6 + 10^7,2.9944*10^6)
(457*10^6 + 10^7,2.9944*10^6)
(458*10^6 + 10^7,2.9944*10^6)
(459*10^6 + 10^7,2.99441*10^6)
(460*10^6 + 10^7,2.99441*10^6)
(461*10^6 + 10^7,2.99441*10^6)
(462*10^6 + 10^7,2.99441*10^6)
(463*10^6 + 10^7,2.99441*10^6)
(464*10^6 + 10^7,2.99441*10^6)
(465*10^6 + 10^7,2.99441*10^6)
(466*10^6 + 10^7,2.99441*10^6)
(467*10^6 + 10^7,2.99442*10^6)
(468*10^6 + 10^7,2.99442*10^6)
(469*10^6 + 10^7,2.99442*10^6)
(470*10^6 + 10^7,2.99442*10^6)
(471*10^6 + 10^7,2.99442*10^6)
(472*10^6 + 10^7,2.99442*10^6)
(473*10^6 + 10^7,2.99442*10^6)
(474*10^6 + 10^7,2.99442*10^6)
(475*10^6 + 10^7,2.99443*10^6)
(476*10^6 + 10^7,2.99443*10^6)
(477*10^6 + 10^7,2.99443*10^6)
(478*10^6 + 10^7,2.99443*10^6)
(479*10^6 + 10^7,2.99443*10^6)
(480*10^6 + 10^7,2.99443*10^6)
(481*10^6 + 10^7,2.99443*10^6)
(482*10^6 + 10^7,2.99443*10^6)
(483*10^6 + 10^7,2.99443*10^6)
(484*10^6 + 10^7,2.99444*10^6)
(485*10^6 + 10^7,2.99444*10^6)
(486*10^6 + 10^7,2.99444*10^6)
(487*10^6 + 10^7,2.99444*10^6)
(488*10^6 + 10^7,2.99444*10^6)
(489*10^6 + 10^7,2.99444*10^6)
(490*10^6 + 10^7,2.99444*10^6)
(491*10^6 + 10^7,2.99444*10^6)
(492*10^6 + 10^7,2.99445*10^6)
(493*10^6 + 10^7,2.99445*10^6)
(494*10^6 + 10^7,2.99445*10^6)
(495*10^6 + 10^7,2.99445*10^6)
(496*10^6 + 10^7,2.99445*10^6)
(497*10^6 + 10^7,2.99445*10^6)
(498*10^6 + 10^7,2.99445*10^6)
(499*10^6 + 10^7,2.99445*10^6)
(500*10^6 + 10^7,2.99445*10^6)
(501*10^6 + 10^7,2.99445*10^6)
(502*10^6 + 10^7,2.99446*10^6)
(503*10^6 + 10^7,2.99446*10^6)
(504*10^6 + 10^7,2.99446*10^6)
(505*10^6 + 10^7,2.99446*10^6)
(506*10^6 + 10^7,2.99446*10^6)
(507*10^6 + 10^7,2.99446*10^6)
(508*10^6 + 10^7,2.99446*10^6)
(509*10^6 + 10^7,2.99446*10^6)
(510*10^6 + 10^7,2.99446*10^6)
(511*10^6 + 10^7,2.99447*10^6)
(512*10^6 + 10^7,2.99447*10^6)
(513*10^6 + 10^7,2.99447*10^6)
(514*10^6 + 10^7,2.99447*10^6)
(515*10^6 + 10^7,2.99447*10^6)
(516*10^6 + 10^7,2.99447*10^6)
(517*10^6 + 10^7,2.99447*10^6)
(518*10^6 + 10^7,2.99447*10^6)
(519*10^6 + 10^7,2.99447*10^6)
(520*10^6 + 10^7,2.99447*10^6)
(521*10^6 + 10^7,2.99448*10^6)
(522*10^6 + 10^7,2.99448*10^6)
(523*10^6 + 10^7,2.99448*10^6)
(524*10^6 + 10^7,2.99448*10^6)
(525*10^6 + 10^7,2.99448*10^6)
(526*10^6 + 10^7,2.99448*10^6)
(527*10^6 + 10^7,2.99448*10^6)
(528*10^6 + 10^7,2.99448*10^6)
(529*10^6 + 10^7,2.99448*10^6)
(530*10^6 + 10^7,2.99448*10^6)
(531*10^6 + 10^7,2.99449*10^6)
(532*10^6 + 10^7,2.99449*10^6)
(533*10^6 + 10^7,2.99449*10^6)
(534*10^6 + 10^7,2.99449*10^6)
(535*10^6 + 10^7,2.99449*10^6)
(536*10^6 + 10^7,2.99449*10^6)
(537*10^6 + 10^7,2.99449*10^6)
(538*10^6 + 10^7,2.99449*10^6)
(539*10^6 + 10^7,2.99449*10^6)
(540*10^6 + 10^7,2.99449*10^6)
(541*10^6 + 10^7,2.99449*10^6)
(542*10^6 + 10^7,2.9945*10^6)
(543*10^6 + 10^7,2.9945*10^6)
(544*10^6 + 10^7,2.9945*10^6)
(545*10^6 + 10^7,2.9945*10^6)
(546*10^6 + 10^7,2.9945*10^6)
(547*10^6 + 10^7,2.9945*10^6)
(548*10^6 + 10^7,2.9945*10^6)
(549*10^6 + 10^7,2.9945*10^6)
(550*10^6 + 10^7,2.9945*10^6)
(551*10^6 + 10^7,2.9945*10^6)
(552*10^6 + 10^7,2.9945*10^6)
(553*10^6 + 10^7,2.99451*10^6)
(554*10^6 + 10^7,2.99451*10^6)
(555*10^6 + 10^7,2.99451*10^6)
(556*10^6 + 10^7,2.99451*10^6)
(557*10^6 + 10^7,2.99451*10^6)
(558*10^6 + 10^7,2.99451*10^6)
(559*10^6 + 10^7,2.99451*10^6)
(560*10^6 + 10^7,2.99451*10^6)
(561*10^6 + 10^7,2.99451*10^6)
(562*10^6 + 10^7,2.99451*10^6)
(563*10^6 + 10^7,2.99451*10^6)
(564*10^6 + 10^7,2.99451*10^6)
(565*10^6 + 10^7,2.99452*10^6)
(566*10^6 + 10^7,2.99452*10^6)
(567*10^6 + 10^7,2.99452*10^6)
(568*10^6 + 10^7,2.99452*10^6)
(569*10^6 + 10^7,2.99452*10^6)
(570*10^6 + 10^7,2.99452*10^6)
(571*10^6 + 10^7,2.99452*10^6)
(572*10^6 + 10^7,2.99452*10^6)
(573*10^6 + 10^7,2.99452*10^6)
(574*10^6 + 10^7,2.99452*10^6)
(575*10^6 + 10^7,2.99452*10^6)
(576*10^6 + 10^7,2.99452*10^6)
(577*10^6 + 10^7,2.99453*10^6)
(578*10^6 + 10^7,2.99453*10^6)
(579*10^6 + 10^7,2.99453*10^6)
(580*10^6 + 10^7,2.99453*10^6)
(581*10^6 + 10^7,2.99453*10^6)
(582*10^6 + 10^7,2.99453*10^6)
(583*10^6 + 10^7,2.99453*10^6)
(584*10^6 + 10^7,2.99453*10^6)
(585*10^6 + 10^7,2.99453*10^6)
(586*10^6 + 10^7,2.99453*10^6)
(587*10^6 + 10^7,2.99453*10^6)
(588*10^6 + 10^7,2.99453*10^6)
(589*10^6 + 10^7,2.99454*10^6)
(590*10^6 + 10^7,2.99454*10^6)
(591*10^6 + 10^7,2.99454*10^6)
(592*10^6 + 10^7,2.99454*10^6)
(593*10^6 + 10^7,2.99454*10^6)
(594*10^6 + 10^7,2.99454*10^6)
(595*10^6 + 10^7,2.99454*10^6)
(596*10^6 + 10^7,2.99454*10^6)
(597*10^6 + 10^7,2.99454*10^6)
(598*10^6 + 10^7,2.99454*10^6)
(599*10^6 + 10^7,2.99454*10^6)
(600*10^6 + 10^7,2.99454*10^6)
(601*10^6 + 10^7,2.99454*10^6)
(602*10^6 + 10^7,2.99455*10^6)
(603*10^6 + 10^7,2.99455*10^6)
(604*10^6 + 10^7,2.99455*10^6)
(605*10^6 + 10^7,2.99455*10^6)
(606*10^6 + 10^7,2.99455*10^6)
(607*10^6 + 10^7,2.99455*10^6)
(608*10^6 + 10^7,2.99455*10^6)
(609*10^6 + 10^7,2.99455*10^6)
(610*10^6 + 10^7,2.99455*10^6)
(611*10^6 + 10^7,2.99455*10^6)
(612*10^6 + 10^7,2.99455*10^6)
(613*10^6 + 10^7,2.99455*10^6)
(614*10^6 + 10^7,2.99455*10^6)
(615*10^6 + 10^7,2.99455*10^6)
(616*10^6 + 10^7,2.99456*10^6)
(617*10^6 + 10^7,2.99456*10^6)
(618*10^6 + 10^7,2.99456*10^6)
(619*10^6 + 10^7,2.99456*10^6)
(620*10^6 + 10^7,2.99456*10^6)
(621*10^6 + 10^7,2.99456*10^6)
(622*10^6 + 10^7,2.99456*10^6)
(623*10^6 + 10^7,2.99456*10^6)
(624*10^6 + 10^7,2.99456*10^6)
(625*10^6 + 10^7,2.99456*10^6)
(626*10^6 + 10^7,2.99456*10^6)
(627*10^6 + 10^7,2.99456*10^6)
(628*10^6 + 10^7,2.99456*10^6)
(629*10^6 + 10^7,2.99456*10^6)
(630*10^6 + 10^7,2.99456*10^6)
(631*10^6 + 10^7,2.99457*10^6)
(632*10^6 + 10^7,2.99457*10^6)
(633*10^6 + 10^7,2.99457*10^6)
(634*10^6 + 10^7,2.99457*10^6)
(635*10^6 + 10^7,2.99457*10^6)
(636*10^6 + 10^7,2.99457*10^6)
(637*10^6 + 10^7,2.99457*10^6)
(638*10^6 + 10^7,2.99457*10^6)
(639*10^6 + 10^7,2.99457*10^6)
(640*10^6 + 10^7,2.99457*10^6)
(641*10^6 + 10^7,2.99457*10^6)
(642*10^6 + 10^7,2.99457*10^6)
(643*10^6 + 10^7,2.99457*10^6)
(644*10^6 + 10^7,2.99457*10^6)
(645*10^6 + 10^7,2.99457*10^6)
(646*10^6 + 10^7,2.99458*10^6)
(647*10^6 + 10^7,2.99458*10^6)
(648*10^6 + 10^7,2.99458*10^6)
(649*10^6 + 10^7,2.99458*10^6)
(650*10^6 + 10^7,2.99458*10^6)
(651*10^6 + 10^7,2.99458*10^6)
(652*10^6 + 10^7,2.99458*10^6)
(653*10^6 + 10^7,2.99458*10^6)
(654*10^6 + 10^7,2.99458*10^6)
(655*10^6 + 10^7,2.99458*10^6)
(656*10^6 + 10^7,2.99458*10^6)
(657*10^6 + 10^7,2.99458*10^6)
(658*10^6 + 10^7,2.99458*10^6)
(659*10^6 + 10^7,2.99458*10^6)
(660*10^6 + 10^7,2.99458*10^6)
(661*10^6 + 10^7,2.99459*10^6)
(662*10^6 + 10^7,2.99459*10^6)
(663*10^6 + 10^7,2.99459*10^6)
(664*10^6 + 10^7,2.99459*10^6)
(665*10^6 + 10^7,2.99459*10^6)
(666*10^6 + 10^7,2.99459*10^6)
(667*10^6 + 10^7,2.99459*10^6)
(668*10^6 + 10^7,2.99459*10^6)
(669*10^6 + 10^7,2.99459*10^6)
(670*10^6 + 10^7,2.99459*10^6)
(671*10^6 + 10^7,2.99459*10^6)
(672*10^6 + 10^7,2.99459*10^6)
(673*10^6 + 10^7,2.99459*10^6)
(674*10^6 + 10^7,2.99459*10^6)
(675*10^6 + 10^7,2.99459*10^6)
(676*10^6 + 10^7,2.99459*10^6)
(677*10^6 + 10^7,2.99459*10^6)
(678*10^6 + 10^7,2.9946*10^6)
(679*10^6 + 10^7,2.9946*10^6)
(680*10^6 + 10^7,2.9946*10^6)
(681*10^6 + 10^7,2.9946*10^6)
(682*10^6 + 10^7,2.9946*10^6)
(683*10^6 + 10^7,2.9946*10^6)
(684*10^6 + 10^7,2.9946*10^6)
(685*10^6 + 10^7,2.9946*10^6)
(686*10^6 + 10^7,2.9946*10^6)
(687*10^6 + 10^7,2.9946*10^6)
(688*10^6 + 10^7,2.9946*10^6)
(689*10^6 + 10^7,2.9946*10^6)
(690*10^6 + 10^7,2.9946*10^6)
(691*10^6 + 10^7,2.9946*10^6)
(692*10^6 + 10^7,2.9946*10^6)
(693*10^6 + 10^7,2.9946*10^6)
(694*10^6 + 10^7,2.9946*10^6)
(695*10^6 + 10^7,2.99461*10^6)
(696*10^6 + 10^7,2.99461*10^6)
(697*10^6 + 10^7,2.99461*10^6)
(698*10^6 + 10^7,2.99461*10^6)
(699*10^6 + 10^7,2.99461*10^6)
(700*10^6 + 10^7,2.99461*10^6)
(701*10^6 + 10^7,2.99461*10^6)
(702*10^6 + 10^7,2.99461*10^6)
(703*10^6 + 10^7,2.99461*10^6)
(704*10^6 + 10^7,2.99461*10^6)
(705*10^6 + 10^7,2.99461*10^6)
(706*10^6 + 10^7,2.99461*10^6)
(707*10^6 + 10^7,2.99461*10^6)
(708*10^6 + 10^7,2.99461*10^6)
(709*10^6 + 10^7,2.99461*10^6)
(710*10^6 + 10^7,2.99461*10^6)
(711*10^6 + 10^7,2.99461*10^6)
(712*10^6 + 10^7,2.99461*10^6)
(713*10^6 + 10^7,2.99461*10^6)
(714*10^6 + 10^7,2.99462*10^6)
(715*10^6 + 10^7,2.99462*10^6)
(716*10^6 + 10^7,2.99462*10^6)
(717*10^6 + 10^7,2.99462*10^6)
(718*10^6 + 10^7,2.99462*10^6)
(719*10^6 + 10^7,2.99462*10^6)
(720*10^6 + 10^7,2.99462*10^6)
(721*10^6 + 10^7,2.99462*10^6)
(722*10^6 + 10^7,2.99462*10^6)
(723*10^6 + 10^7,2.99462*10^6)
(724*10^6 + 10^7,2.99462*10^6)
(725*10^6 + 10^7,2.99462*10^6)
(726*10^6 + 10^7,2.99462*10^6)
(727*10^6 + 10^7,2.99462*10^6)
(728*10^6 + 10^7,2.99462*10^6)
(729*10^6 + 10^7,2.99462*10^6)
(730*10^6 + 10^7,2.99462*10^6)
(731*10^6 + 10^7,2.99462*10^6)
(732*10^6 + 10^7,2.99462*10^6)
(733*10^6 + 10^7,2.99463*10^6)
(734*10^6 + 10^7,2.99463*10^6)
(735*10^6 + 10^7,2.99463*10^6)
(736*10^6 + 10^7,2.99463*10^6)
(737*10^6 + 10^7,2.99463*10^6)
(738*10^6 + 10^7,2.99463*10^6)
(739*10^6 + 10^7,2.99463*10^6)
(740*10^6 + 10^7,2.99463*10^6)
(741*10^6 + 10^7,2.99463*10^6)
(742*10^6 + 10^7,2.99463*10^6)
(743*10^6 + 10^7,2.99463*10^6)
(744*10^6 + 10^7,2.99463*10^6)
(745*10^6 + 10^7,2.99463*10^6)
(746*10^6 + 10^7,2.99463*10^6)
(747*10^6 + 10^7,2.99463*10^6)
(748*10^6 + 10^7,2.99463*10^6)
(749*10^6 + 10^7,2.99463*10^6)
(750*10^6 + 10^7,2.99463*10^6)
(751*10^6 + 10^7,2.99463*10^6)
(752*10^6 + 10^7,2.99463*10^6)
(753*10^6 + 10^7,2.99464*10^6)
(754*10^6 + 10^7,2.99464*10^6)
(755*10^6 + 10^7,2.99464*10^6)
(756*10^6 + 10^7,2.99464*10^6)
(757*10^6 + 10^7,2.99464*10^6)
(758*10^6 + 10^7,2.99464*10^6)
(759*10^6 + 10^7,2.99464*10^6)
(760*10^6 + 10^7,2.99464*10^6)
(761*10^6 + 10^7,2.99464*10^6)
(762*10^6 + 10^7,2.99464*10^6)
(763*10^6 + 10^7,2.99464*10^6)
(764*10^6 + 10^7,2.99464*10^6)
(765*10^6 + 10^7,2.99464*10^6)
(766*10^6 + 10^7,2.99464*10^6)
(767*10^6 + 10^7,2.99464*10^6)
(768*10^6 + 10^7,2.99464*10^6)
(769*10^6 + 10^7,2.99464*10^6)
(770*10^6 + 10^7,2.99464*10^6)
(771*10^6 + 10^7,2.99464*10^6)
(772*10^6 + 10^7,2.99464*10^6)
(773*10^6 + 10^7,2.99464*10^6)
(774*10^6 + 10^7,2.99464*10^6)
(775*10^6 + 10^7,2.99465*10^6)
(776*10^6 + 10^7,2.99465*10^6)
(777*10^6 + 10^7,2.99465*10^6)
(778*10^6 + 10^7,2.99465*10^6)
(779*10^6 + 10^7,2.99465*10^6)
(780*10^6 + 10^7,2.99465*10^6)
(781*10^6 + 10^7,2.99465*10^6)
(782*10^6 + 10^7,2.99465*10^6)
(783*10^6 + 10^7,2.99465*10^6)
(784*10^6 + 10^7,2.99465*10^6)
(785*10^6 + 10^7,2.99465*10^6)
(786*10^6 + 10^7,2.99465*10^6)
(787*10^6 + 10^7,2.99465*10^6)
(788*10^6 + 10^7,2.99465*10^6)
(789*10^6 + 10^7,2.99465*10^6)
(790*10^6 + 10^7,2.99465*10^6)
(791*10^6 + 10^7,2.99465*10^6)
(792*10^6 + 10^7,2.99465*10^6)
(793*10^6 + 10^7,2.99465*10^6)
(794*10^6 + 10^7,2.99465*10^6)
(795*10^6 + 10^7,2.99465*10^6)
(796*10^6 + 10^7,2.99465*10^6)
(797*10^6 + 10^7,2.99466*10^6)
(798*10^6 + 10^7,2.99466*10^6)
(799*10^6 + 10^7,2.99466*10^6)
(800*10^6 + 10^7,2.99466*10^6)
(801*10^6 + 10^7,2.99466*10^6)
(802*10^6 + 10^7,2.99466*10^6)
(803*10^6 + 10^7,2.99466*10^6)
(804*10^6 + 10^7,2.99466*10^6)
(805*10^6 + 10^7,2.99466*10^6)
(806*10^6 + 10^7,2.99466*10^6)
(807*10^6 + 10^7,2.99466*10^6)
(808*10^6 + 10^7,2.99466*10^6)
(809*10^6 + 10^7,2.99466*10^6)
(810*10^6 + 10^7,2.99466*10^6)
(811*10^6 + 10^7,2.99466*10^6)
(812*10^6 + 10^7,2.99466*10^6)
(813*10^6 + 10^7,2.99466*10^6)
(814*10^6 + 10^7,2.99466*10^6)
(815*10^6 + 10^7,2.99466*10^6)
(816*10^6 + 10^7,2.99466*10^6)
(817*10^6 + 10^7,2.99466*10^6)
(818*10^6 + 10^7,2.99466*10^6)
(819*10^6 + 10^7,2.99466*10^6)
(820*10^6 + 10^7,2.99466*10^6)
(821*10^6 + 10^7,2.99467*10^6)
(822*10^6 + 10^7,2.99467*10^6)
(823*10^6 + 10^7,2.99467*10^6)
(824*10^6 + 10^7,2.99467*10^6)
(825*10^6 + 10^7,2.99467*10^6)
(826*10^6 + 10^7,2.99467*10^6)
(827*10^6 + 10^7,2.99467*10^6)
(828*10^6 + 10^7,2.99467*10^6)
(829*10^6 + 10^7,2.99467*10^6)
(830*10^6 + 10^7,2.99467*10^6)
(831*10^6 + 10^7,2.99467*10^6)
(832*10^6 + 10^7,2.99467*10^6)
(833*10^6 + 10^7,2.99467*10^6)
(834*10^6 + 10^7,2.99467*10^6)
(835*10^6 + 10^7,2.99467*10^6)
(836*10^6 + 10^7,2.99467*10^6)
(837*10^6 + 10^7,2.99467*10^6)
(838*10^6 + 10^7,2.99467*10^6)
(839*10^6 + 10^7,2.99467*10^6)
(840*10^6 + 10^7,2.99467*10^6)
(841*10^6 + 10^7,2.99467*10^6)
(842*10^6 + 10^7,2.99467*10^6)
(843*10^6 + 10^7,2.99467*10^6)
(844*10^6 + 10^7,2.99467*10^6)
(845*10^6 + 10^7,2.99467*10^6)
(846*10^6 + 10^7,2.99467*10^6)
(847*10^6 + 10^7,2.99468*10^6)
(848*10^6 + 10^7,2.99468*10^6)
(849*10^6 + 10^7,2.99468*10^6)
(850*10^6 + 10^7,2.99468*10^6)
(851*10^6 + 10^7,2.99468*10^6)
(852*10^6 + 10^7,2.99468*10^6)
(853*10^6 + 10^7,2.99468*10^6)
(854*10^6 + 10^7,2.99468*10^6)
(855*10^6 + 10^7,2.99468*10^6)
(856*10^6 + 10^7,2.99468*10^6)
(857*10^6 + 10^7,2.99468*10^6)
(858*10^6 + 10^7,2.99468*10^6)
(859*10^6 + 10^7,2.99468*10^6)
(860*10^6 + 10^7,2.99468*10^6)
(861*10^6 + 10^7,2.99468*10^6)
(862*10^6 + 10^7,2.99468*10^6)
(863*10^6 + 10^7,2.99468*10^6)
(864*10^6 + 10^7,2.99468*10^6)
(865*10^6 + 10^7,2.99468*10^6)
(866*10^6 + 10^7,2.99468*10^6)
(867*10^6 + 10^7,2.99468*10^6)
(868*10^6 + 10^7,2.99468*10^6)
(869*10^6 + 10^7,2.99468*10^6)
(870*10^6 + 10^7,2.99468*10^6)
(871*10^6 + 10^7,2.99468*10^6)
(872*10^6 + 10^7,2.99468*10^6)
(873*10^6 + 10^7,2.99468*10^6)
(874*10^6 + 10^7,2.99469*10^6)
(875*10^6 + 10^7,2.99469*10^6)
(876*10^6 + 10^7,2.99469*10^6)
(877*10^6 + 10^7,2.99469*10^6)
(878*10^6 + 10^7,2.99469*10^6)
(879*10^6 + 10^7,2.99469*10^6)
(880*10^6 + 10^7,2.99469*10^6)
(881*10^6 + 10^7,2.99469*10^6)
(882*10^6 + 10^7,2.99469*10^6)
(883*10^6 + 10^7,2.99469*10^6)
(884*10^6 + 10^7,2.99469*10^6)
(885*10^6 + 10^7,2.99469*10^6)
(886*10^6 + 10^7,2.99469*10^6)
(887*10^6 + 10^7,2.99469*10^6)
(888*10^6 + 10^7,2.99469*10^6)
(889*10^6 + 10^7,2.99469*10^6)
(890*10^6 + 10^7,2.99469*10^6)
(891*10^6 + 10^7,2.99469*10^6)
(892*10^6 + 10^7,2.99469*10^6)
(893*10^6 + 10^7,2.99469*10^6)
(894*10^6 + 10^7,2.99469*10^6)
(895*10^6 + 10^7,2.99469*10^6)
(896*10^6 + 10^7,2.99469*10^6)
(897*10^6 + 10^7,2.99469*10^6)
(898*10^6 + 10^7,2.99469*10^6)
(899*10^6 + 10^7,2.99469*10^6)
(900*10^6 + 10^7,2.99469*10^6)
(901*10^6 + 10^7,2.99469*10^6)
(902*10^6 + 10^7,2.99469*10^6)
(903*10^6 + 10^7,2.9947*10^6)
(904*10^6 + 10^7,2.9947*10^6)
(905*10^6 + 10^7,2.9947*10^6)
(906*10^6 + 10^7,2.9947*10^6)
(907*10^6 + 10^7,2.9947*10^6)
(908*10^6 + 10^7,2.9947*10^6)
(909*10^6 + 10^7,2.9947*10^6)
(910*10^6 + 10^7,2.9947*10^6)
(911*10^6 + 10^7,2.9947*10^6)
(912*10^6 + 10^7,2.9947*10^6)
(913*10^6 + 10^7,2.9947*10^6)
(914*10^6 + 10^7,2.9947*10^6)
(915*10^6 + 10^7,2.9947*10^6)
(916*10^6 + 10^7,2.9947*10^6)
(917*10^6 + 10^7,2.9947*10^6)
(918*10^6 + 10^7,2.9947*10^6)
(919*10^6 + 10^7,2.9947*10^6)
(920*10^6 + 10^7,2.9947*10^6)
(921*10^6 + 10^7,2.9947*10^6)
(922*10^6 + 10^7,2.9947*10^6)
(923*10^6 + 10^7,2.9947*10^6)
(924*10^6 + 10^7,2.9947*10^6)
(925*10^6 + 10^7,2.9947*10^6)
(926*10^6 + 10^7,2.9947*10^6)
(927*10^6 + 10^7,2.9947*10^6)
(928*10^6 + 10^7,2.9947*10^6)
(929*10^6 + 10^7,2.9947*10^6)
(930*10^6 + 10^7,2.9947*10^6)
(931*10^6 + 10^7,2.9947*10^6)
(932*10^6 + 10^7,2.9947*10^6)
(933*10^6 + 10^7,2.9947*10^6)
(934*10^6 + 10^7,2.99471*10^6)
(935*10^6 + 10^7,2.99471*10^6)
(936*10^6 + 10^7,2.99471*10^6)
(937*10^6 + 10^7,2.99471*10^6)
(938*10^6 + 10^7,2.99471*10^6)
(939*10^6 + 10^7,2.99471*10^6)
(940*10^6 + 10^7,2.99471*10^6)
(941*10^6 + 10^7,2.99471*10^6)
(942*10^6 + 10^7,2.99471*10^6)
(943*10^6 + 10^7,2.99471*10^6)
(944*10^6 + 10^7,2.99471*10^6)
(945*10^6 + 10^7,2.99471*10^6)
(946*10^6 + 10^7,2.99471*10^6)
(947*10^6 + 10^7,2.99471*10^6)
(948*10^6 + 10^7,2.99471*10^6)
(949*10^6 + 10^7,2.99471*10^6)
(950*10^6 + 10^7,2.99471*10^6)
(951*10^6 + 10^7,2.99471*10^6)
(952*10^6 + 10^7,2.99471*10^6)
(953*10^6 + 10^7,2.99471*10^6)
(954*10^6 + 10^7,2.99471*10^6)
(955*10^6 + 10^7,2.99471*10^6)
(956*10^6 + 10^7,2.99471*10^6)
(957*10^6 + 10^7,2.99471*10^6)
(958*10^6 + 10^7,2.99471*10^6)
(959*10^6 + 10^7,2.99471*10^6)
(960*10^6 + 10^7,2.99471*10^6)
(961*10^6 + 10^7,2.99471*10^6)
(962*10^6 + 10^7,2.99471*10^6)
(963*10^6 + 10^7,2.99471*10^6)
(964*10^6 + 10^7,2.99471*10^6)
(965*10^6 + 10^7,2.99471*10^6)
(966*10^6 + 10^7,2.99471*10^6)
(967*10^6 + 10^7,2.99472*10^6)
(968*10^6 + 10^7,2.99472*10^6)
(969*10^6 + 10^7,2.99472*10^6)
(970*10^6 + 10^7,2.99472*10^6)
(971*10^6 + 10^7,2.99472*10^6)
(972*10^6 + 10^7,2.99472*10^6)
(973*10^6 + 10^7,2.99472*10^6)
(974*10^6 + 10^7,2.99472*10^6)
(975*10^6 + 10^7,2.99472*10^6)
(976*10^6 + 10^7,2.99472*10^6)
(977*10^6 + 10^7,2.99472*10^6)
(978*10^6 + 10^7,2.99472*10^6)
(979*10^6 + 10^7,2.99472*10^6)
(980*10^6 + 10^7,2.99472*10^6)
(981*10^6 + 10^7,2.99472*10^6)
(982*10^6 + 10^7,2.99472*10^6)
(983*10^6 + 10^7,2.99472*10^6)
(984*10^6 + 10^7,2.99472*10^6)
(985*10^6 + 10^7,2.99472*10^6)
(986*10^6 + 10^7,2.99472*10^6)
(987*10^6 + 10^7,2.99472*10^6)
(988*10^6 + 10^7,2.99472*10^6)
(989*10^6 + 10^7,2.99472*10^6)
(990*10^6 + 10^7,2.99472*10^6)
(991*10^6 + 10^7,2.99472*10^6)
};
\end{axis}
\end{tikzpicture}
It is important to remark that $\lambda$ is an intrinsic parameter of the utility function, while $p$ is a parameter of the deal. Changing $\lambda$ means changing the way the agent evaluates risk. Different values of $\lambda$ can explain the different behaviours of the subjects: some accept the deal, others find the probability of death too high, and others do not accept, regardless of how small $p$ can be. \\
\section{Concluding remarks}
Various hypotheses have been raised in order to explain why some people refuse some deals which have positive mean gains. In some cases, risk aversion could be a solution: there exists concave expected utility functions that explain the results obtained with some subjects during the pill experiment. Some of these functions give coherent results with smaller lotteries too. \\
Some behaviours cannot however be described using expected utility theory. By using a theory wich better takes into account catastrophic events, it is possible to explain the experimental results, including those which are inconsistent with expected utility theory. \\
\newpage
|
\section{Introduction}
Blair \cite{bl2} introduced the notions of a nearly Sasakian manifold as a special class of almost contact metric manifolds. An indefinite nearly Sasakian manifold differs from an indefinite Sasakian manifold, since in the former, the manifold is not necessarily normal \cite{bl1}. In fact, any normal nearly Sasakian manifold is Sasakian (see \cite{bl2} and references therein for more details). From then, many papers have appeared on these manifolds and their submanifolds \cite{bl1}, \cite{be}, \cite{mo} and \cite{ta}. In these papers, the geometry is restricted to a Riemannian case and thus, little or no attempt has been made to investigate their lightlike (null) cases. Lightlike geometry has its applications in mathematical physics, in particular, general relativity and electromagnetism \cite{db}. Differential geometry of lightlike submanifolds was introduced by Bejancu and Duggal \cite{db} and later studied by many authors \cite{dj}, \cite{ds3}, \cite{ds4}, \cite{ma1}, \cite{ma2}, \cite{ma3} and references therein.
In \cite{ds3}, the authors initiated the study of Generalized Cauchy-Riemann (GCR) lightlike submanifolds of an indefinite Sasakian manifold, in which the structural vector field, $\xi$, of the almost contact metric structure $(\overline{\phi},\eta,\xi,\overline{g})$ was assumed to be tangent to the submanifold. Moreover, when $\xi$ is tangent to the submanifold, Calin \cite{ca} proved that it belongs to the screen distribution. However, the structural vector field is globally defined on the tangent bundle of the ambient manifold, which implies that other classes of submanifolds with non-tangential structural vector fields are certainly possible. Recently, a few papers have been published on the subject, focusing on ascreen and generic lightlike submanifolds (\cite{ds4}, \cite{ji}). Thus, the absence of evidence of research in the geometry of lightlike submanifolds of nearly Sasakian manifolds and the fact that $\xi$ belongs to the tangent bundle of the ambient space has motivated us to introduce a new class of CR-lightlike submanifold of a nearly Sasakian manifold, known as Quasi Generalized Cauchy-Riemann (QGCR) lightlike submanifold.
The objective of this paper is to characterize totally umbilical and totally geodesic QGCR-lightlike submanifolds of a nearly Sasakian manifold. The rest of the paper is organized as follows. In Section \ref{Preli}, we present the basic notions of nearly Sasakian structures and lightlike submanifolds which we refer to in the remaining sections. In Section \ref{AlmostGe}, we introduce QGCR-lightlike submanifolds. Section \ref{existence} is devoted to the non-existance theorms regarding totally umbilical and totally geodesic QGCR-lightlike submanifolds. Finally, in Section \ref{Integra} we derive the necessarily and sufficient conditions for the integrability of the key distributions of a QGCR-lightlike submanifold of an indefinite nearly Sasakian manifold.
\section{Preliminaries}\label{Preli}
Let $\overline{M}$ be a $(2n + 1)$-dimensional manifold endowed with an almost contact structure $(\overline{\phi}, \xi, \eta)$, i.e. $\overline{\phi}$ is a tensor field of type $(1, 1)$, $\xi$ is a vector field, and $\eta$ is a 1-form satisfying
\begin{equation}\label{equa1}
\overline{\phi}^{2} = -\mathbb{I} + \eta
\otimes\xi,\;\;\eta(\xi)= 1 ,\;\;\eta\circ\overline{\phi} =
0 \;\;\mbox{and}\;\;\overline{\phi}(\xi) = 0.
\end{equation}
Then $(\overline{\phi}, \xi, \eta,\,\overline{g})$ is called an indefinite almost contact metric structure on $\overline{M}$ if $(\overline{\phi}, \xi, \eta)$ is an almost contact structure on $\overline{M}$ and $\overline{g}$ is a semi-Riemannian metric on $\overline{M}$ such that \cite{bcgh}, for any vector field $\overline{X}$, $\overline{Y}$ on $\overline{M}$,
\begin{equation}\label{equa2}
\overline{g}(\overline{\phi}\,\overline{X}, \overline{\phi}\,\overline{Y}) = \overline{g}(\overline{X}, \overline{Y}) - \eta(\overline{X})\,\eta(\overline{Y}),
\end{equation}
It follows that, for any vector $\overline{X}$ on $\overline{M}$,
\begin{equation}\label{equa3}
\eta(\overline{X}) = \overline{g}(\xi,\overline{X}).
\end{equation}
If, moreover,
\begin{equation}\label{eqz}
(\overline{\nabla}_{\overline{X}} \overline{\phi})\overline{Y}+(\overline{\nabla}_{\overline{Y}} \overline{\phi})\overline{X}=2\overline{g}(\overline{X}, \overline{Y})\xi-\eta(\overline{Y})\overline{X}-\eta(\overline{X})\overline{Y},
\end{equation}
for any vector fields $\overline{X}$, $\overline{Y}$ on $\overline{M}$, where $\overline{\nabla}$ is the Levi-Civita connection for the semi-Riemannian metric $\overline{g}$, we call $\overline{M}$ an \textit{indefinite nearly Sasakian manifold}.
We denote by $\Gamma(\Xi)$ the set of smooth sections of the vector bundle $\Xi$. Let $\Omega$ be the fundamental 2-form of $\overline{M}$ defined by
\begin{equation}
\Omega(\overline{X}, \overline{Y}) = \overline{g}(\overline{X}, \overline{\phi}\,\overline{Y}),\;\;\overline{X},\;\overline{Y}\in\Gamma(T \overline{M}).
\end{equation}
Replacing $\overline{Y}$ by $\xi$ in (\ref{eqz}) we obtain
\begin{equation}
\overline{\nabla}_{\overline{X}} \xi-\overline{\phi}^2\overline{\nabla}_\xi \overline{X}+\overline{\phi}\,\overline{\nabla}_\xi \overline{\phi}\,\overline{X} =-\overline{\phi}\,\overline{X},\label{eq10}
\end{equation}
for any $\overline{X}\in \Gamma (T\overline{M})$.
Introduce a (1,1)-tensor $\overline{H}$ on $\overline{M}$ taking
\begin{equation*}
\overline{H}\,\overline{X}=-\overline{\phi}^2\overline{\nabla}_\xi \overline{X} + \overline{\phi}\,\overline{\nabla}_\xi \overline{\phi}\,\overline{X},
\end{equation*}
for any $\overline{X}\in \Gamma (T\overline{M})$, such that (\ref{eq10}) reduces to
\begin{equation}\label{v10}
\overline{\nabla}_{\overline{X}} \xi+\overline{H}\,\overline{X} =-\overline{\phi}\, \overline{X}.
\end{equation}
\begin{lemma}
The linear operator $\overline{H}$ has the properties
\begin{align}
& \overline{H}\,\overline{\phi} + \overline{\phi}\,\overline{H}=0,\;\;\overline{H}\xi=0,\;\;\eta\circ \overline{H}=0, \nonumber\\
\mbox{and}\;\;& \overline{g}(\overline{H}\,\overline{X}, \overline{Y})=-\overline{g}(\overline{X}, \overline{H}\,\overline{Y})\;\;\;\; (\mbox{i.e.}\;\; \overline{H} \;\;\mbox{is skew-symmetric}).
\end{align}
\end{lemma}
\begin{proof}
The proof follows from a straightforward calculation.
\end{proof}
By (\ref{v10}), it is easy to check that
\begin{equation}\label{p}
\overline{\nabla}_\xi \xi=0.
\end{equation}
The fundamental 2-form $\Omega$ and the 1-form $\eta$ are related as follows.
\begin{lemma}
Let $(\overline{M}, \overline{\phi}, \xi, \eta,\,\overline{g})$ be an indefinite nearly Sasakian manifold. Then,
\begin{equation}\label{RelaOmegaETa}
\Omega(\overline{X}, \overline{Y}) = d\eta(\overline{X}, \overline{Y}) + \overline{g}(\overline{H}\, \overline{X}, \overline{Y}),
\end{equation}
for any $\overline{X}$, $\overline{Y}\in\Gamma(T \overline{M})$. Moreover, $\overline{M}$ is Sasakian if and only if $\overline{H}$ vanishes identically on $\overline{M}$.
\end{lemma}
\begin{proof}
The relation (\ref{RelaOmegaETa}) follows from a straightforward calculation. The second assertion follows from Theorem 3.2 in \cite{bl1}.
\end{proof}
Note that, for any $\overline{X}$, $\overline{Y}$, $\overline{Z}\in\Gamma(T \overline{M})$,
\begin{equation}
\overline{g}((\overline{\nabla}_{\overline{Z}}\overline{\phi})\overline{X}, \overline{Y}) = - \overline{g}( \overline{X}, (\overline{\nabla}_{\overline{Z}}\overline{\phi})\overline{Y}).
\end{equation}
This means that the tensor $\overline{\nabla}\,\overline{\phi}$ is skew-symmetric.
Let $(\overline{M},\overline{g})$ be an $(m + n)$-dimensional semi-Riemannian manifold of constant index $\nu$, $1\le \nu\le m+n$ and $M$ be a submanifold of $\overline{M}$ of codimension $n$. We assume that both $m$ and $n$ are $\ge 1$. At a point $p\in M$, we define the orthogonal complement $T_{p} M^{\perp}$ of the tangent space $T_{p} M$ by
$$
T_{p} M^{\perp} = \{X\in\Gamma(T_{p} M): \overline{g}(X, Y)=0,\; \forall \, Y\in\Gamma(T_{p} M)\}.
$$
We put $\mathrm{Rad} \, T_{p} M = \mathrm{Rad}\, T_{p} M^{\perp} = T_{p} M \cap T_{p} M^{\perp}$. The submanifold $M$ of $\overline{M}$ is said to be $r$-lightlike submanifold (one supposes that the index of $\overline{M}$ is $\nu \ge r$), if the mapping
$$
\mathrm{Rad} \, T M: p\in M \longrightarrow\mathrm{Rad}\, T_{p} M
$$
defines a smooth distribution on $M$ of rank $r > 0$. We call $\mathrm{Rad}\,T M$ the radical distribution on $M$. In the sequel, an $r$-lightlike submanifold will simply be called a \textit{lightlike submanifold} and $g$ is \textit{lightlike metric}, unless we need to specify $r$.
Let $S(T M)$ be a screen distribution which is a semi-Riemannian complementary distribution of $\mathrm{Rad}\,T M$ in $T M$, that is,
\begin{equation}\label{eq05}
T M = \mathrm{Rad}\,T M \perp S(T M).
\end{equation}
Choose a screen transversal bundle $S(TM^\perp)$, which is semi-Riemannian and complementary to $\mathrm{Rad}\, TM$ in $TM^\perp$. Since, for any local basis $\{E_i \}$ of $\mathrm{Rad}\,TM$, there exists a local null frame $\{N_i\}$ of sections with values in the orthogonal complement of $S(T M^\perp)$ in $S(T M )^\perp$ such that $g(E_i , N_j ) = \delta_{ij}$, it follows that there exists a lightlike transversal vector bundle $l\mathrm{tr}(TM)$ locally spanned by $\{N_i\}$ \cite{db}.
Let $\mathrm{tr}(TM)$ be complementary (but not orthogonal) vector bundle to $TM$ in $T\overline{M}$. Then,
\begin{align}\label{eq04}
&\mathrm{tr}(TM)=l\mathrm{tr}(TM)\perp S(TM^\perp),\\\label{eq08}
T\overline{M}= & S(TM)\perp S(TM^\perp)\perp\{\mathrm{Rad}\, TM\oplus l\mathrm{tr}(TM)\} .
\end{align}
Note that the distribution $S(TM)$ is not unique, and is canonically isomorphic to the factor vector bundle $TM/ \mathrm{Rad}\, TM$. \cite{ds3}
We say that a lightlike submanifold $M$ of $\overline{M}$ is
\begin{enumerate}
\item $r$-lightlike if $1\leq r< min\{m,n\}$;
\item co-isotropic if $1\leq r=n<m$, $S(TM^\perp)=\{0\}$;
\item isotropic if $1\leq r=m<n$, $S(TM)=\{0\}$;
\item totally lightlike if $r=n=m$, $S(TM)=S(TM^\perp)=\{0\}$.
\end{enumerate}
Similar to \cite{ds4}, we use the following range of indices in this paper,
\begin{equation*}
i,j,k\in\{1,\ldots, r\}, \hspace{.2cm}\alpha,\beta,\gamma\in\{r+1,\ldots, n\}.
\end{equation*}
Consider a local quasi-orthonormal fields of frames of $\overline{M}$ along $M$, on $U$ as
\begin{equation*}
\{ E_1,\cdots, E_r,N_1,\cdots, N_r,X_{r+1},\cdots,X_{m},W_{1+r},\cdots, W_{n}\},
\end{equation*}
where
$\{X_{r+1},\cdots,X_{m}\}$ and $\{W_{1+r},\ldots, W_n\}$ are respectively othornomal bases of $\Gamma(S(TM)|_{U})$ and $\Gamma(S(TM^{\perp})|_{U})$ and that $\epsilon_\alpha=\overline{g}(W_\alpha,W_\alpha)$ be the signatures of $W_\alpha$.
Let $P$ be the projection morphism of $TM$ on to $S(TM)$. Using the decomposition (\ref{eq08}), consider the projection morphisms $L$ and $S$ of
$\mathrm{tr}(T M )$ on $l\mathrm{tr}(T M)$ and $S(T M^{\perp})$, respectively. Then, the Gauss-Wiengartein equations \cite{ds2} of an $r$-lightlike submanifold $M$ and $S(TM)$ are the following;
\begin{align}
& \overline{\nabla}_X Y=\nabla_X Y+\sum_{i=1}^r h_i^l(X,Y)N_i+\sum_{\alpha=r+1}^n h_\alpha^s(X,Y)W_\alpha,\label{eq11}\\
& \overline{\nabla}_X N_i=-A_{N_i} X+\sum_{j=1}^r \tau_{ij}(X) N_j+\sum_{\alpha=r+1}^n \rho_{i\alpha}(X)W_\alpha,\label{eq31}\\
& \overline{\nabla}_X W_\alpha=-A_{W_\alpha} X+\sum_{i=1}^r \varphi_{\alpha i}(X) N_i+\sum_{\beta=r+1}^n \sigma_{\alpha\beta}(X)W_\beta,\label{eq32}\\
& \nabla_X P Y=\nabla_X^* PY+\sum_{i=1}^r h_i^*(X, P Y)E_i,\\
& \nabla_X E_i=-A_{E_i}^* X-\sum_{j=1}^r \tau_{ji}(X) E_j,\;\;\;\; \forall\; X,Y\in \Gamma(TM)\label{eq50},
\end{align}
where $h^{l}(X, Y)= L h(X, Y)$, $h^{s}(X, Y)= S h(X, Y)$, $\nabla$ and $\nabla^*$ are the induced connections on $TM$ and $S(TM)$ respectively, $h_i^l$ and $h_\alpha^s$ are symmetric bilinear forms known as \textit{local lightlike} and \textit{screen fundamental} forms of $TM$ respectively. Also $h_i^*$ are the \textit{ second fundamental forms} of $S(TM)$. $A_{N_i}$, $A_{E_i}^*$ and $A_{W_\alpha}$ are linear operators on $TM$ while $\tau_{ij}$, $\rho_{i\alpha}$, $\varphi_{\alpha i}$ and $\sigma_{\alpha\beta}$ are 1-forms on $TM$. It is known \cite{db, ds2} that
\begin{equation}\label{13}
h_i^l(X,Y)= \overline{g}(\overline{\nabla}_X Y,E_i),\hspace{.3cm} \forall X,Y\in \Gamma(TM),
\end{equation}
from which we deduce the independence of $h_i^l$ on the choice of $S(TM)$.
The \textit{second fundamental tensor} of $M$ is given by
\begin{equation}\label{h1}
h(X,Y)=\sum_{i=1}^r h_i^l(X,Y)N_i+\sum_{\alpha=r+1}^n h_\alpha^s(X,Y)W_\alpha,
\end{equation}
for any $X,Y\in \Gamma(TM)$. It is easy to see that $\nabla^*$ is a metric connection on $S(TM)$ while $\nabla$ is generally not a metric connection and is given by
\begin{equation*}
(\nabla_X g)(Y,Z)=\sum_{i=1}^r\{h_i^l(X,Y)\lambda_i(Z)+h_i^l(X,Z)\lambda_i(Y)\},
\end{equation*}
for any $X,Y\in \Gamma(TM)$ and $\lambda_i$ are 1-forms given by
\begin{equation}\label{eqc}
\lambda_i(X)=\overline{g}(X,N_i), \hspace{.2cm} \forall X\in \Gamma(TM).
\end{equation}
The above three local second fundamental forms are related to their shape operators by the following set of equations
\begin{align}
& g(A_{E_i}^*X,Y)=h_i^l(X,Y)+\sum_{j=1}^rh_j^l(X,E_i)\lambda_j(Y),\hspace{.1cm}\bar{g}(A_{E_i}^*X,N_j)=0,\label{eqe}\\
& g(A_{W_\alpha}X,Y)=\epsilon_\alpha h_\alpha^s(X,Y)+\sum_{i=1}^r \varphi_{\alpha i}(X)\lambda_i(Y),\label{eq07}\\
& \bar{g}(A_{W_\alpha}X,N_i)=\epsilon_\alpha \rho_{i\alpha}(X),\\
& g(A_{N_i}X,Y)=h_i^*(X,\mathcal{P}Y),\;\;\; \lambda_j(A_{N_i}X)+\lambda_i(A_{N_j}X)=0\label{k},
\end{align}
for any $X,Y\in \Gamma(TM)$.
For any $r$-lightlike submanifold, replacing $Y$ by $E_i$ in (\ref{eq07}), we get
\begin{equation}\label{eqg}
h_\alpha^s(X,E_i)=-\epsilon_\alpha \varphi_{\alpha i}(X), \hspace{.3cm} \forall X\in \Gamma(TM).
\end{equation}
A lightlike submanifold $(M,g)$, of a semi-Riemannian manifold $(\overline{M},\overline{g})$ is said to be totally umbilical in $\overline{M}$ \cite{ds2} if there is a smooth transversal vector field $\mathcal{H}\in \Gamma(\mathrm{tr}(TM))$, called the transversal curvature vector of $M$ such that
\begin{align}\label{eq17}
h(X,Y)=\mathcal{H}g(X,Y),
\end{align}
for all $X,Y\in \Gamma(TM)$.
Moreover, it is easy to see that $M$ is totally umbilical in $\overline{M}$, if and only if on each coordinate neighborhood $\mathscr{U}$ there exist smooth vector fields $\mathscr{H}^l\in\Gamma(l\mathrm{tr}(TM))$ and $\mathscr{H}^s\in\Gamma(S(TM^\perp))$ and smooth functions $\mathscr{H}_i^l\in F(l\mathrm{tr}(TM))$ and $\mathscr{H}_\alpha^s\in F(S(TM^\perp))$ such that
\begin{align}
h^l(X,Y) & =\mathscr{H}^l g(X,Y),\;\;\; h^s(X,Y)=\mathscr{H}^s g(X,Y),\nonumber\\
h_i^l(X,Y) & =\mathscr{H}_i^l g(X,Y),\;\;\;h_\alpha^s(X,Y)=\mathscr{H}_\alpha^s g(X,Y),
\end{align}
for all $X,Y\in\Gamma(TM)$.
The above definition is independent of the choice of the screen distribution.
\section{Quasi Generalized CR-lightlike Submanifolds}\label{AlmostGe}
Generally, the structure vector field $\xi$ belongs to $T\overline{M}$. Therefore, we define it according to decomposition (\ref{eq08}) as follows;
\begin{equation}\label{eq2}
\xi=\xi_S+\xi_{S^\perp}+\xi_R+\xi_l,
\end{equation}
where $\xi_S$ is a smooth vector field of $S(TM)$ and $\xi_{S^\perp}$, $\xi_R$, $\xi_l$ are defined as follows
\begin{equation}\label{eq0}
\xi_{R}=\sum_{i=1}^ra_i E_i, \;\; \xi_{l}=\sum_{i=1}^rb_i N_i, \;\;
\xi_{S^\perp}=\sum_{\alpha=r+1}^nc_\alpha W_\alpha
\end{equation}
with $a_i=\eta(N_i)$, $b_i=\eta(E_i)$ and $c_\alpha=\epsilon_\alpha\eta(W_\alpha)$ all smooth functions on $\overline{M}$.
Generalised Cauchy Riemann (GCR) lightlike submanifolds were introduced in \cite{ds2, ds3}, in which the structure vector field $\xi$ was assumed tangent to the submanifold. Contrary to this assumption, we introduce a special class of $CR$-lightlike submanifold in which $\xi$ belongs to $T\overline{M}$, called \textit{Quasi Generalized Cauchy-Riemann (QGCR)-lightlike submanifold} as follows.
\begin{definition}\label{def2}{\rm
Let $(M,g,S(TM),S(TM^\perp))$ be a lightlike submanifold of an indefinite nearly Sasakian manifold $(\overline{M}, \overline{g}, \overline{\phi},\xi,\eta)$. We say that $M$ is Quasi Generalized Cauchy-Riemann (QGCR)-lightlike submanifold of $\overline{M}$ if the following conditions are satisfied:
\begin{enumerate}
\item [(i)] there exist two distributions $D_1$ and $D_2$ of $Rad(TM)$ such that
\begin{equation}\label{eq03}
\mathrm{Rad}\, TM = D_1\oplus D_2, \;\;\overline{\phi} D_1=D_1, \;\;\overline{\phi} D_2\subset S(TM),
\end{equation}
\item [(ii)] there exist vector bundles $D_0$ and $\overline{D}$ over $S(TM)$ such that
\begin{align}
& S(TM)=\{\overline{\phi} D_2 \oplus \overline{D}\}\perp D_0,\\
\mbox{with}\;\;\; &\overline{\phi}D_{0} \subseteq D_{0},\;\; \overline{D}= \overline{\phi} \, \mathcal{S}\oplus \overline{\phi} \,\mathcal{L}, \label{s81}
\end{align}
\end{enumerate}
where $D_0$ is a non-degenerate distribution on $M$, $\mathcal{L}$ and $\mathcal{S}$ are respectively vector subbundles of $l\mathrm{tr}(TM)$ and $S(TM^{\perp})$.
}
\end{definition}
If $D_{1}\neq \{0\}$, $D_0\neq \{0\}$, $D_2\neq \{0\}$ and $\mathcal{S}\neq \{0\}$, then $M$ is called a \textit{proper QGCR-lightlike submanifold}.
Let $M$ be a QGCR-lightlike submanifold of an indefinite nearly Sasakian manifold $\overline{M}$. If the structure vector field $\xi$ is tangent to $M$, then, $\xi\in\Gamma(S(T M))$. The proof of this is similar to one given by Calin in Sasakian case \cite{ca}. In this case, if $X\in\Gamma(\mathcal{S})$ and $Y\in\Gamma(\mathcal{L})$, then $\eta(X)=\eta(Y)=0$ and
$$
\overline{g}(\overline{\phi}X, \overline{\phi}Y) = \overline{g}(X, Y) - \eta(X)\eta(Y) =0,
$$
which reduces the direct sum $ \overline{D}$ in (\ref{s81}) to the orthogonal direct sum $ \overline{D}= \overline{\phi} \,\mathcal{S}\perp \overline{\phi} \,\mathcal{L}$, and thus $ \overline{\phi} \,\overline{D}= \mathcal{S}\perp \mathcal{L}$. Since $\xi\in\Gamma(S(T M))$ and $\xi$ is neither a vector field in $\overline{\phi} D_2$ nor in $\overline{D}$, $\xi$ is in $D_{0}$. By $\overline{\phi}D_{0} \subseteq D_{0}$, there exist a distribution $D_{0}'$ of rank $(rank(D_{0})-1)$ and satisfying $\overline{\phi}D_{0}' = D_{0}'$ such that $D_{0}=D_{0}'\perp\langle\xi\rangle$, where $\langle\xi\rangle$ is the 1-dimensional distribution spanned by $\xi$. Therefore, the QGCR-lightlike submanifold tangent to $\xi$ reverts to a GCR-lightlike submanifold \cite{ds3}.
\begin{proposition}
A QGCR-lightlike submanifold $M$ of an indefinite nearly Sasakian manifold $\overline{M}$ tangent to the structure vector field $\xi$ is a GCR-lightlike submanifold.
\end{proposition}
Next, we follow Yano-Kon \cite[p. 353]{yk} definition of contact CR-submanifolds and state the following definition for a quasi contact CR-lightlike submanifold.
\begin{definition}\label{def3}{\rm
Let $(M,g,S(TM),S(TM^\perp))$ be a lightlike submanifold of an indefinite nearly Sasakian manifold $(\overline{M}, \overline{g}, \overline{\phi},\xi,\eta)$. We say that $M$ is quasi contact CR-lightlike submanifold of $\overline{M}$ if the following conditions are satisfied;
\begin{enumerate}
\item [(i)] $\mathrm{Rad}\,TM$ is a distribution on M such that $\mathrm{Rad}\,TM\cap\overline{\phi}(\mathrm{Rad}\,TM)=\{0\}$;
\item [(ii)] there exist vector bundles $D_0$ and $D'$ over $S(TM)$ such that
\begin{align}
& S(TM)=\{\overline{\phi}(\mathrm{Rad}\,TM)\oplus D'\}\perp D_0,\\
\mbox{with}\;\;\; &\overline{\phi}D_{0} \subseteq D_{0},\;\; D'=\overline{\phi} L_{1} \oplus \overline{\phi}l\mathrm{tr} (T M), \label{s888}
\end{align}
\end{enumerate}
where $D_0$ is a non-degenerate, $L_{1}$ is vector subbundle of $S(TM^{\perp})$.
}
\end{definition}
It is easy to see that when the structure vector field $\xi$ is tangent to the quasi Contact CR-lightlike submanifold $M$, then $M$ is a contact CR.
\begin{proposition}
A QGCR-lightlike submanifold of an indefinite nearly Sasakian manifold $\overline{M}$, is a quasi contact CR if and only if $D_{1} = \{0\}$.
\end{proposition}
\begin{proof}
Let $M$ be a quasi contact CR-lightlike submanifold. Then $\overline{\phi}(\mathrm{Rad}\,TM)$ is a distribution on $M$ such that $ \overline{\phi}(\mathrm{Rad}\,TM)\cap\mathrm{Rad}\,TM=\{0\}$. Therefore, $D_{2} = \mathrm{Rad}\,TM$ and $D_{1}=\{0\}$. Hence, $ \overline{\phi}(l\mathrm{tr} (T M)) \cap l\mathrm{tr} (T M)=\{0\}$. Then it follows that $\overline{\phi}(l\mathrm{tr} (T M))\subset S(T M)$. The converse is obvious.
\end{proof}
From (\ref{eq05}), the tangent bundle of any QGCR lightlike submanifold, $TM$, can be rewritten as
\begin{equation*}
TM=D \oplus \widehat{D},\;\;\mbox{where}\;D=D_0\perp D_{1}\;\mbox{and}\;\widehat{D}=\{D_{2}\perp\overline{\phi} D_{2}\} \oplus\overline{D}.
\end{equation*}
Notice that $D$ is invariant with respect to $\overline{\phi}$ while $\widehat{D}$ is not generally anti-invariant with respect to $\overline{\phi}$.
Note the following for a proper QGCR-lightlike submanifold $(M,g,S(TM)$, $S(TM^\perp))$ of an indefinite almost contact metric manifolds $\overline{M}$ according to Definition \ref{def2}:
\begin{enumerate}
\item Condition (i) implies that $\dim(\mathrm{Rad}\, TM)=s\ge 3$,
\item Condition (ii) implies that $\dim(D)\ge 4l\ge 4$ and $\dim(D_2)= \dim(\mathcal{L})$.
\end{enumerate}
Next we adopt the definition of ascreen lightlike submanifolds used by Jin in \cite{ji} for the case of contact ambient manifold in case of lightlike submanifolds of an almost contact manifold.
\begin{definition}\label{def3} \cite{ji} {\rm
A lightlike submanifold $M$, immersed in a semi-Riemannian manifold $\overline{M}$ is said to be ascreen if the structural vector field, $\xi$, belongs to $\mathrm{Rad}\, TM$ $\oplus l\mathrm{tr}(T M)$.
}
\end{definition}
Note that, since $\mathcal{L}$ defined in Definition \ref{def2} is a subbundle of $l\mathrm{tr}(T M)$, there is a complementary subbundle $\nu$ of $l\mathrm{tr}(T M)$ such that
$$
l\mathrm{tr}(T M) = \mathcal{L}\perp\nu.
$$
It is easy to check that the complementary subbundle $\nu$ is invariant under $\overline{\phi}$, i.e. $\overline{\phi}\nu =\nu$.
Let $M$ be an ascreen QGCR-lightlike submanifold of an indefinite nearly Sasakian manifold $\overline{M}$. Then by Definition \ref{def3}, the structural vector field $\xi\in\mathrm{Rad}\, TM$ $\oplus l\mathrm{tr}(T M)$. This means that $\xi$ is either in $\mathrm{Rad}\,TM$ or $l\mathrm{tr}(T M)$. If $\xi\in \mathrm{Rad}\, T M$, then $\xi \in D_{2}$ since $\overline{\phi}D_{1} = D_{1}$ and $\overline{\phi}\xi=0$. On the other hand, if $\xi\in l\mathrm{tr}(T M)$, then $\xi\in\Gamma(\mathcal{L})$ because of the fact that $\overline{\phi}\nu =\nu$ and $\overline{\phi}\xi=0$. Therefore, we have the following.
\begin{lemma}\label{Lemma1}
If $M$ is an ascreen QGCR-lightlike submanifold of an indefinite nearly Sasakian manifold $\overline{M}$, then $\xi\in\Gamma(D_{2}\oplus\mathcal{L})$.
\end{lemma}
\begin{theorem}\label{asc}
Let $(M,g,S(TM),S(TM^\perp))$ be a 3-lightlike QGCR submanifold of an indefinite almost contact manifold $(\overline{M}, \overline{g}, \overline{\phi},\xi,\eta)$. Then $M$ is ascreen lightlike submanifold if and only if $\overline{\phi}\mathcal{L}=\overline{\phi} D_{2}$.
\end{theorem}
\begin{proof}
Suppose that $M$ is ascreen. Then, by Lemma \ref{Lemma1}, $\xi\in\Gamma(D_{2}\oplus\mathcal{L})$. Since $M$ is a 3-lightlike QGCR submanifold, and $\mathrm{Rad}\, T M= D_{1}\oplus D_{2}$ with $\overline{\phi}D_{1}= D_{1}$ and $l\mathrm{tr}(T M) = \mathcal{L}\perp\nu$ with $\overline{\phi}\nu=\nu$, the distributions $D_{2}$ and $\mathcal{L}$ are of rank 1. Consequently,
\begin{equation}\label{s80}
\xi=a E+ b N,
\end{equation}
where $E\in\Gamma(D_2)$ and $N\in\Gamma(\mathcal{L})$, and $a=\eta(N)$ and $b=\eta(E)$ are non-zero smooth functions. Applying $\overline{\phi}$ to the first relation of (\ref{s80}) and using the fact that $\overline{\phi}\xi=0$, we get
\begin{equation}\label{s82}
a \overline{\phi}E+b \overline{\phi}N=0.
\end{equation}
From (\ref{s82}), one gets $\overline{\phi}E=\omega\overline{\phi}N$, where $\omega=-\frac{b}{a}\neq0$, a non vanishing smooth function. This implies that $\overline{\phi}\mathcal{L}\cap\overline{\phi} D_2\neq\{0\}$. Since $rank(\overline{\phi} D_2)=rank(\overline{\phi}\mathcal{L})=1$, it follows that $\overline{\phi}\mathcal{L}=\overline{\phi} D_2$.
Conversely, suppose that $\overline{\phi}\mathcal{L}=\overline{\phi} D_2$. Then, there exists a non-vanishing smooth function $\omega$ such that
\begin{equation}\label{s84}
\overline{\phi}E=\omega\overline{\phi}N.
\end{equation}
Taking the $ \overline{g}$--product of (\ref{s84}) with respect to $\overline{\phi}E$ and $\overline{\phi}N$ in turn, we get
\begin{equation}\label{s85}
b^2=\omega(ab-1)\;\;\mbox{and}\;\;\omega a^2=a b-1.
\end{equation}
Since $\omega\neq 0$, by (\ref{s85}), we have $a\neq0$, $b\neq0$ and $b^2=(\omega a)^2$. The latter gives $b= \pm \omega a$. The case $b=\omega a $ implies that $a b =\omega a ^2=a b -1$, which is a contradiction. Thus $b =-\omega a $, from which $2a b=1$. Since $\omega =-\frac{b}{a}$, $a\neq0$ and $\overline{\phi}E=\omega\overline{\phi}N$, it is easy to see that $a \overline{\phi}E+b \overline{\phi}N=0$. Applying $\overline{\phi}$ to this equation, and using the first relation in (\ref{equa1}), together with $2ab=1$, we get
$\xi=aE+bN$. Therefore, $M$ is ascreen lightlike submanifold of $\overline{M}$.
\end{proof}
In the ascreen QGCR-lightlike submanifold case, the item (ii) of Definition \ref{def2} implies that $\dim(D)\ge 4l\ge 4$ and $\dim(D_2)=\dim(\mathcal{L})$. Thus $\dim(M)\ge 7$ and $\dim(\overline{M})\ge 11$, and any 7-dimensional ascreen QGCR-lightlike submanifold is 3-lightlike.
As an example for QGCR-lightlike submanifold of indefinite nearly Sasakian manifold, we have the following.
\begin{example}\label{exa1}
{\rm
Let $\overline{M}=(\mathbb{R}_4^{11}, \overline{g})$ be a semi-Euclidean space, where $\overline{g}$ is of signature $(-,-,+,+,+, - , -,+,+,+,+)$ with respect to the canonical basis
\begin{equation*}
(\partial x_1,\partial x_2,\partial x_3,\partial x_4,\partial x_5,\partial y_1,\partial y_2,\partial y_3,\partial y_4,\partial y_{5},\partial z).
\end{equation*}
Let $(M,g)$ be a submanifold of $\overline{M}$ given by
\begin{equation*}
x^1=y^4,\;\; y^1=-x^4,\;\; z= x^2\sin\theta + y^2\cos\theta \;\;\mbox{and}\;\; y^5=(x^5)^{\frac{1}{2}},
\end{equation*}
where $\theta\in(0,\frac{\pi}{2})$. By direct calculations, we can easily check that the vector fields
\begin{align*}
E_1 & =\partial x_4+\partial y_1+y^4\partial z,\;\;\; E_2=\partial x_1-\partial y_4+y^1\partial z,\\
E_3 & =\sin\theta \partial x_2 +\cos\theta \partial y_2+\partial z, \; \;\; X_1=2y^5\partial x_5+\partial y_5+2(y^5)^2\partial z,\\
X_2 & =-\cos\theta \partial x_2 +\sin\theta \partial y_2-y^2\cos\theta\partial z,\;\;\; X_3=2\partial y_3,\; X_4=2(\partial x_3+y^3\partial z),
\end{align*}
form a local frame of $TM$. From this, we can see that $\mathrm{Rad} \, TM$ is spanned by $\{E_1, E_2, E_3\}$, and therefore, $M$ is 3-lightlike. Further, $\overline{\phi}_0 E_1=E_2$, therefore we set $D_1=\mbox{Span}\{E_1,E_2\}$. Also $\overline{\phi}_0 E_3=-X_2$ and thus $D_2=\mathrm{Span}\{E_3\}$. It is easy to see that $\overline{\phi}_0 X_3=X_4$, so we set $D_0=\mathrm{Span}\{X_3,X_4\}$. On the other hand, following direct calculations, we have
\begin{align}
N_1 & =\frac{1}{2}(\partial x_4-\partial y_1+y^4\partial z),\;\; \; N_2=\frac{1}{2}(-\partial x_1-\partial y_4+y^1\partial z),\nonumber\\
N_3 & =\frac{1}{2}(-\sin\theta \partial x_2 -\cos\theta \partial y_2+\partial z),\;\; \; W=\partial x_5-2y^5\partial y_5+y^5\partial z, \nonumber
\end{align}
from which $l\mathrm{tr}(TM)=\mathrm{Span}\{N_1,N_2,N_3\}$ and $S(TM^\perp)=\mathrm{Span}\{W\}$. Clearly, $\overline{\phi}_0 N_2=-N_1$. Further, $\overline{\phi}_0 N_3=\frac{1}{2} X_2$ and thus $\mathcal{L}=\mbox{Span}\{N_3\}$. Notice that $\overline{\phi}_0N_3=-\frac{1}{2}\overline{\phi}_0 E_3$ and therefore $\overline{\phi}_0\mathcal{L}=\overline{\phi}_0 D_2$. Also, $\overline{\phi}_0 W=-X_1$ and therefore $\mathcal{S}=\mbox{Span}\{W\}$. Finally, we calculate $\xi$ as follows; Using Theorem \ref{asc} we have $\xi=a E_3+b N_3$. Applying $\overline{\phi}_0$ to this equation we obtain $a\overline{\phi}_0 E_3+b\overline{\phi}_0 N_3=0$. Now, substituting for $\overline{\phi}_0 E_3$ and $\overline{\phi}_0 N_3$ in this equation we get $2a=b$, from which we get $\xi=\frac{1}{2}(E_3+2N_3)$. Since $\overline{\phi}_0\xi=0$ and $\overline{g}(\xi,\xi)=1$, we conclude that $(M,g)$ is an ascreen QGCR-lightlike submanifold of $\overline{M}$. }
\end{example}
\begin{proposition}
There exist no co-isotropic, isotropic or totally lightlike proper QGCR-lightlike submanifolds of an indefinite nearly Sasakian manifold.
\end{proposition}
\section{Some characterization theorems}\label{existence}
In this section, we discuss an existence and some non-existence theorems for proper QGCR-lightlike submanifolds of an indefinite nearly Sasakian manifold $(\overline{M},\overline{\phi},\eta,\xi,\overline{g})$.
\begin{theorem}\label{Thm1}
There exist no totally umbilical proper QGCR-lightlike submanifolds $(M,g,S(TM)$, $S(TM^\perp))$ of an indefinite nearly Sasakian manifold $(\overline{M},\overline{\phi}$ $,\eta,\xi,\overline{g})$ with the structure vector field $\xi$ tangent to $M$.
\end{theorem}
\begin{proof}
Suppose that $\xi\in\Gamma(TM)$ and that $M$ is totally umbilical in $\overline{M}$. Then, $\xi=\xi_R+\xi_S$ and $b_i=c_\alpha=0$. Using (\ref{v10}) and (\ref{eq11}), we get
\begin{equation}\label{eq15}
-\overline{\phi} X=\overline{H}X+\nabla_X \xi+\sum_{i=1}^rh_i^l(X,\xi)N_i+\sum_{\alpha=r+1}^nh_\alpha^s(X,\xi)W_\alpha,
\end{equation}
for all $X\in \Gamma(TM)$. Taking the $\overline{g}$--product of (\ref{eq15}) with respect to $W_\alpha\in \Gamma(\mathcal{S})$ we get
\begin{equation}\label{eqw}
g(X,\overline{\phi} W_\alpha)=\overline{g}(\overline{H}X, W_\alpha)+ \epsilon_\alpha h_\alpha^s(X,\xi),\;\;\forall\,X\in \Gamma(TM).
\end{equation}
Now, letting $X=\overline{\phi} W_\alpha$ in (\ref{eqw}) we obtain
\begin{equation}\label{v2}
g(\overline{\phi} W_\alpha,\overline{\phi} W_\alpha)=\overline{g}(\overline{H}\,\overline{\phi} W_\alpha, W_\alpha)+ \epsilon_\alpha h_\alpha^s(\overline{\phi} W_\alpha,\xi).
\end{equation}
Since $c_\alpha=\epsilon_\alpha\eta(W_\alpha)=0$, then $-\overline{H}\,\overline{\phi} W_\alpha=(\overline{\nabla}_{W_\alpha} \overline{\phi})\xi+W_\alpha$ and the first term on the right hand side of (\ref{v2}) therefore simplifies as follows using (\ref{eqz})
\begin{align}
-\overline{g}(\overline{H}\,\overline{\phi} W_\alpha, W_\alpha)&= \overline{g}((\overline{\nabla}_{W_\alpha} \overline{\phi})\xi, W_\alpha)+\overline{g}(W_\alpha, W_\alpha) \nonumber\\
&= -\overline{g}(\xi, (\overline{\nabla}_{W_\alpha} \overline{\phi})W_\alpha)+\overline{g}(W_\alpha, W_\alpha)\nonumber\\
&= -\overline{g}(\xi,\bar{g}(W_\alpha, W_\alpha)\xi) +\overline{g}(W_\alpha, W_\alpha) \nonumber\\
&= -\overline{g}(W_\alpha, W_\alpha)+\overline{g} (W_\alpha, W_\alpha)=0.
\end{align}
Then substituting $ \overline{g}(\overline{H}\,\overline{\phi} W_\alpha, W_\alpha)=0$ in (\ref{v2}) we obtain
\begin{equation}\label{v16}
g(\overline{\phi} W_\alpha,\overline{\phi} W_\alpha)= \epsilon_\alpha h_\alpha^s(\overline{\phi} W_\alpha,\xi).
\end{equation}
By virtue of the fact that $M$ is totally umbilical in $\overline{M}$, (\ref{v16}) yields
\begin{equation}\label{v17}
g(\overline{\phi} W_\alpha,\overline{\phi} W_\alpha)=\epsilon_\alpha\mathscr{H}_\alpha^s g(\overline{\phi} W_\alpha,\xi)=0.
\end{equation}
Then, simplifying (\ref{v17}) while considering $\eta(W_\alpha)=0$, we get $g(\overline{\phi}W_\alpha, \overline{\phi}W_\alpha)=g(W_\alpha, W_\alpha)=\epsilon_\alpha=0$, which is a contradiction.
\end{proof}
We notice from the above theorem that if $\xi$ is tangent to $M$, then $\bar{g}(\overline{H}\,\overline{\phi} W_\alpha, W_\alpha)$ $=0$. It is easy to see that $\bar{g}(\overline{H}X, W_\alpha)=0$, for all $X\in\Gamma(\overline{\phi}\mathcal{S})$. Hence, $\overline{H}X$ has no component along $\mathcal{S}$ for all $X\in\Gamma(\overline{\phi}\mathcal{S})$.
\begin{corollary}\label{T5}
There exist no totally geodesic proper QGCR-lightlike submanifolds $(M,g,S(TM),S(TM^\perp))$ of an indefinite nearly Sasakian manifold $(\overline{M},\overline{\phi},$ $\eta,\xi,\overline{g})$ with the structure vector field $\xi$ tangent to $M$.
\end{corollary}
Using Theorem \ref{Thm1} and Corollary \ref{T5} above we get the following non-existence theorem;
\begin{theorem}
There exist no totally umbilical or totally geodesic proper QGCR-lightlike submanifolds $(M,g,S(TM)$ $,S(TM^\perp))$ of an indefinite nearly Sasakian manifold $(\overline{M},\overline{\phi},\eta,\xi,\overline{g})$ with the structure vector field $\xi$ tangent to $M$.
\end{theorem}
When the structure vector field $\xi$ is normal, we have the following.
\begin{theorem}
There exist no proper QGCR-lightlike submanifolds $(M,g,S(TM)$, $S(TM^\perp))$ of an indefinite nearly Sasakian manifold $(\overline{M},\overline{\phi},\eta,\xi,\overline{g})$ with the structure vector field $\xi$ normal to $M$.
\end{theorem}
\begin{proof}
Suppose that $\xi\in \Gamma(TM^\perp)$, then
\begin{equation}\label{eqb}
\xi=\xi_R+\xi_{S^\perp},\;\;\xi_l=\xi_S=0, \;\; b_i=0, \;\; a_i\neq 0\hspace{.2cm}\mbox{and} \;\; c_{\alpha} \neq 0.
\end{equation}
Differentiating the first equation of (\ref{eqb}) with respect to $X$ and using (\ref{eq10}), (\ref{eq11}) and (\ref{eq32}), we get
\begin{align}\label{a}
-\overline{\phi} X &= \sum_{i=1}^rX(a_i)E_i+\sum_{\alpha=r+1}^nX(c_\alpha)W_\alpha\nonumber\\
&+\sum_{i=1}^ra_i \{\nabla_X E_i +\sum_{j=1}^r h_j^l(X,E_i)N_j+\sum_{\beta=r+1}^n h_\beta^s(X,E_i)W_\beta\}\nonumber\\
&+\sum_{\alpha=r+1}^nc_\alpha\{-A_{W_\alpha} X+\sum_{i=1}^r \varphi_{\alpha i}(X) N_i +\sum_{\beta=r+1}^n \sigma_{\alpha\beta}(X)W_\beta\}+\overline{H}X,
\end{align}
for all $X\in\Gamma(TM)$. Taking the $\overline{g}$-product of (\ref{a}) with respect to $E_k$ and $\overline{\phi} N_k\in \Gamma(S(TM))$ in turn, where $N_k\in\Gamma(\mathcal{L})$, we get
\begin{equation}\label{eqf}
\overline{g}(X,\overline{\phi} E_k)=-\sum_{i=1}^r a_i h_i^l(X,E_k)-\sum_{\alpha=r+1}^nc_\alpha h_\alpha^s(X,E_k)+\overline{g}(\overline{H}X,E_k).
\end{equation}
Replacing $X$ with $\overline{\phi} N_k$ in (\ref{eqf}) we obtain
\begin{equation}\label{b}
\overline{g}(N_k,E_k)=-\sum_{i=1}^r a_i h_i^l(\overline{\phi} N_k,E_k)-\sum_{\alpha=r+1}^nc_\alpha h_\alpha^s(\overline{\phi} N_k,E_k)+\overline{g}(\overline{H}\,\overline{\phi} N_k,E_k).
\end{equation}
The $\overline{g}$-product with $\overline{\phi} N_k$ yields
\begin{align}\label{c}
-\overline{g}(\overline{\phi} X, \overline{\phi}N_k)&= -\sum_{i=1}^ra_i\overline{g}(A_{E_i}^{*}X, \overline{\phi} N_k)+\sum_{i=1}^{r}a_{i} \sum_{j=1}^{r}h_{j}^{l}(X,E_i)\lambda_j(\overline{\phi} N_k)\nonumber\\
&-\sum_{\alpha=r+1}^nc_\alpha \overline{g}(A_{W_\alpha}X, \overline{\phi} N_k)+\sum_{\alpha=r+1}^nc_\alpha \sum_{j=1}^r\varphi_{\alpha j}(X)\lambda_j(\overline{\phi} N_k)\nonumber\\
&+\overline{g}(\overline{H}X, \overline{\phi} N_k).
\end{align}
Now, using (\ref{eqc}), (\ref{eqe}) and (\ref{eq07}) in (\ref{c}), we obtain
\begin{align*}
\overline{g}(\overline{\phi} X,\overline{\phi} N_k)& = \sum_{i=1}^ra_i\overline{g}(A_{E_i}^*X, \overline{\phi} N_k)+\sum_{\alpha=r+1}^nc_\alpha \overline{g}(A_{W_\alpha}X, \overline{\phi} N_k)\\
&-\overline{g}(\overline{H}X,\overline{\phi} N_k),
\end{align*}
which on replacing $X$ with $E_k$ and simplifying gives
\begin{equation}\label{eqr}
\begin{aligned}
\overline{g}(E_k,N_k)=&\;b_ka_k+\sum_{i=1}^ra_ih_i^l(E_k,\overline{\phi} N_k)+\sum_{\alpha=r+1}^nc_\alpha h_\alpha^s(E_k, \overline{\phi}N_k)\\
&-\overline{g}(\overline{H}E_k,\overline{\phi} N_k).
\end{aligned}
\end{equation}
Adding (\ref{b}) to (\ref{eqr}) yields
\begin{equation}\label{g1}
2\overline{g}(E_k,N_k)=\overline{g}(\overline{H}\,\overline{\phi}N_k,E_k)-\overline{g}(\overline{H}E_k,\overline{\phi} N_k).
\end{equation}
But $\overline{H}$ is skew-symmetric and thus (\ref{g1}) becomes
\begin{equation}\label{g2}
\overline{g}(E_k,N_k)=\overline{g}(\overline{H}\,\overline{\phi} N_k,E_k)=1.
\end{equation}
By virtue of (\ref{g2}), it easy to see that $\overline{H}\,\overline{\phi} N_k\in\Gamma(l\mathrm{tr}(TM))$, particularly, in the direction of $N_k$. Hence, there exist a non vanishing smooth function $f_k$ such that $\overline{H}\,\overline{\phi} N_k=f_{k} N_k$. Taking the $\overline{g}$-product of this equation with respect to $\xi$, we get $0=\overline{g}(\overline{H}\,\overline{\phi} N_k,\xi)=\overline{g}(f_k N_k,\xi)=f_k\overline{g}( N_k,\xi)=f_k a_k$, from which $a_k=0$, a contradiction. Therefore, in a proper QGCR-lightlike submanifold of an indefinite nearly Sasakian manifold, $\xi$ does not belong to $TM^\perp$.
\end{proof}
In particular, we have the following.
\begin{corollary}
There exist no totally umbilical or totally geodesic proper QGCR-lightlike submanifolds $(M, g, S(TM), S(TM^\perp))$ of an indefinite nearly Sasakian manifold $(\overline{M},\overline{\phi},\eta,\xi,\overline{g})$ with the structure vector field $\xi$ normal to $M$.
\end{corollary}
\begin{corollary}
Let $(M,g,S(TM),S(TM^\perp))$ be a proper QGCR-lightlike submanifold of an indefinite nearly Sasakian manifold $(\overline{M},\overline{\phi},\eta,\xi,\overline{g})$. If the structure vector field $\xi$ is normal to $M$, then
\begin{enumerate}
\item $ \overline{H}X$ belongs to $l\mathrm{tr}(TM)$ for all $X\in\Gamma(\overline{\phi}\mathcal{L})$.
\item $ \overline{H}X$ belongs to $\mathrm{Rad}\,TM$ for all $X\in\Gamma(\overline{\phi}D_2)$.
\end{enumerate}
\end{corollary}
\begin{theorem}
There exist no totally umbilical proper QGCR-lightlike submanifolds $(M,g,S(TM), S(TM^\perp))$, with totally umbilical screen distributions, of an indefinite nearly Sasakian manifold $(\overline{M},\overline{\phi},\eta,\xi,\overline{g})$ with the structure vector field $\xi$ transversal to $M$.
\end{theorem}
\begin{proof}
Suppose that $\xi\in \Gamma(\mathrm{tr}(TM))$ and that $M$ is totally umbilical in $\overline{M}$, then
\begin{equation}\label{eqA}
\xi=\xi_l+\xi_{S^\perp},\;\;\xi_R=\xi_S=0, \;\; a_i=0, \;\; b_i\neq 0\;\;\mbox{and} \;\; c_\alpha \neq 0.
\end{equation}
Differentiating the first equation of (\ref{eqA}) with respect to $X$ and using (\ref{eq10}), (\ref{eq31}) and (\ref{eq32}), we get
\begin{align*}
-\overline{\phi} X & = \sum_{i=1}^rX(b_i)N_i+\sum_{\alpha=r+1}^nX(c_\alpha)W_\alpha+\sum_{i=1}^rb_i \{-A_{N_i} X+\sum_{j=1}^r \tau_{ij}(X) N_j\\
&+\sum_{\alpha=r+1}^n \rho_{i\alpha}(X)W_\alpha\}+\sum_{\alpha=r+1}^nc_\alpha\{-A_{W_\alpha} X+\sum_{i=1}^r \varphi_{\alpha i}(X) N_i\\
&+\sum_{\beta=r+1}^n \sigma_{\alpha\beta}(X)W_\beta\}+\overline{H}X,
\end{align*}
for all $X\in\Gamma(TM)$. Now, taking the $\overline{g}$-product of the above equation with respect to $\overline{\phi} N_k\in \Gamma(S(TM))$ where $N_k\in\Gamma(\mathcal{L})$, we get
\begin{align}\label{eqB}
-\overline{g}(\overline{\phi} X, \overline{\phi}N_k)&= -\sum_{i=1}^rb_i g(A_{N_i}X, \overline{\phi}N_k)-\sum_{\alpha=r+1}^nc_\alpha g(A_{W_\alpha}X, \overline{\phi}N_k)\nonumber\\
&+\overline{g}(\overline{H}X,\overline{\phi} N_k).
\end{align}
Replacing $X$ with $E_k\in\Gamma(D_2)$ in (\ref{eqB}), we obtain
\begin{align}\label{j}
-\overline{g}(\overline{\phi} E_k, \overline{\phi} N_k)& = -\sum_{i=1}^rb_i g(A_{N_i}E_k,\overline{\phi} N_k)-\sum_{\alpha=r+1}^nc_\alpha g(A_{W_\alpha}E_k,\overline{\phi} N_k)\nonumber\\
&+\overline{g}(\overline{H}E_k,\overline{\phi} N_k).
\end{align}
Substituting (\ref{eqe}) and the first equation of (\ref{k}) in (\ref{j}) gives
\begin{align}\label{i}
-\overline{g}(\overline{\phi} E_k, \overline{\phi} N_k)&= -\sum_{i=1}^rb_i h_i^*(E_k,\overline{\phi} N_k)-\sum_{\alpha=r+1}^nc_\alpha h_\alpha^s(E_k,\overline{\phi} N_k)\nonumber\\
&+\bar{g}(\overline{H}E_k,\overline{\phi} N_k).
\end{align}
Since $M$ is totally umbilical in $\overline{M}$, with a totally umbilical screen, then (\ref{i}) yields
\begin{equation}\label{td}
-\overline{g}( \overline{\phi}E_k, \overline{\phi} N_k)=\overline{g}(\overline{H}E_k, \overline{\phi}N_k),
\end{equation}
which reduces to $\overline{g}(E_k, N_k)=\overline{g}(\overline{\phi}\,\overline{H}E_k, N_k)=1$. It is easy to see from this equation that $\overline{\phi}\,\overline{H}E_k\in\Gamma(\mathrm{Rad}\,TM)$. In particular, there exist non vanishing smooth functions $w_{k}$ such that $\overline{\phi}\,\overline{H}E_k=w_k E_k$. Taking the $\overline{g}$--product of this lat equation with respect to $\xi$, we obtain $0=\overline{g}(\overline{\phi}\,\overline{H}E_k,\xi)=w_k\overline{g}(E_k,\xi)=w_{k} b_{k}$. Hence, $b_{k}=0$, and this contradiction completes the proof.
\end{proof}
\begin{corollary}
There exist no totally geodesic proper QGCR-lightlike submanifolds $(M,g,S(TM),S(TM^\perp))$, with totally geodesic screen distributions, of an indefinite nearly Sasakian manifold $(\overline{M},\overline{\phi},\eta,\xi,\overline{g})$ with the structure vector field $\xi$ transversal to $M$.
\end{corollary}
Next, we consider the special case $\overline{H}=0$. In particular, the indefinite nearly Sasakian manifold $(\overline{M},\overline{\phi},\eta,\xi,\overline{g})$ with $\overline{H}=0$ becomes Sasakian. An indefinite Sasakian manifold $\overline{M}$ is called an indefinite Sasakian space form, denoted by $\overline{M}(c)$, if it has the constant $\overline{\phi}$-sectional curvature $c$ \cite{ma1}. The curvature tensor $\overline{R}$ of the indefinite space form $\overline{M}(c)$ is given by
\begin{align}\label{ms1}
4\overline{R}(\overline{X},\overline{Y})\overline{Z} &= (c+3)\{\overline{g}(\overline{Y},\overline{Z})\overline{X}-\overline{g}(\overline{X},\overline{Z})\overline{Y}\}+(1-c)\{\eta(\overline{X})\eta(\overline{Z})\overline{Y}\nonumber\\
&-\eta(\overline{Y})\eta(\overline{Z})\overline{X}+\overline{g}(\overline{X},\overline{Z})\eta(\overline{Y})\xi-\overline{g}(\overline{Y},\overline{Z})\eta(\overline{X})\xi\nonumber\\
&+\overline{g}(\overline{\phi}\, \overline{Y},\overline{Z})\overline{\phi}\, \overline{X}+\overline{g}(\overline{\phi}\, \overline{Z},\overline{X})\overline{\phi}\, \overline{Y}-2\overline{g}(\overline{\phi}\, \overline{X},\overline{Y})\overline{\phi}\, \overline{Z}\},
\end{align}
for any $\overline{X},\overline{Y},\overline{Z}\in \Gamma(T \overline{M})$.
Now, using (\ref{ms1}) we have the following existence theorem.
\begin{theorem}
Let $(M,g,S(TM),S(TM^\perp))$ be a lightlike submanifold of an indefinite Sasakian space form $\overline{M}(c)$ with $c\neq1$. Then, $M$ is a QGCR-lightlike submanifold of $\overline{M}(c)$ if and only if
\begin{enumerate}
\item[(a)] The maximal invariant subspaces of $T_{p}M$, $p\in M$ define a distribution
\begin{equation*}
D=D_0\perp D_{1},
\end{equation*}
where $\mathrm{Rad}\, TM=D_{1}\oplus D_{2}$ and $D_{0}$ is a non-degenerate invariant distribution.
\item[(b)] There exists a lightlike transversal vector bundle $l\mathrm{tr}(TM)$ such that
\begin{equation*}
\overline{g}(\overline{R}(X, Y)E, N) = 0,\;\forall\, X, Y \in\Gamma(D_{0}),\;E \in \Gamma(\mathrm{Rad}\, TM),\;N\in\Gamma(l\mathrm{tr}(TM)).
\end{equation*}
\item[(c)] There exists a vector subbundle $M_{2}$ on $M$ such that
\begin{equation*}
\overline{g}(\overline{R}(X,Y)W, W^{\prime}) = 0,\;\;\forall\, W, W^{\prime} \in\Gamma(M_{2}),
\end{equation*}
where $M_{2}$ is orthogonal to $D$ and $\overline{R}$ is the curvature tensor of $\overline{M}(c)$.
\end{enumerate}
\end{theorem}
\begin{proof}
Suppose $M$ is a QGCR-lightlike submanifold of $\overline{M}(c)$ with $c\neq1$. Then, $D=D_0\perp D_{1}$ is a maximal invariant subspace. Next, from (\ref{ms1}), for $X,Y\in\Gamma(D_{0})$, $E\in\Gamma(D_{2})$ and $N\in\Gamma(l\mathrm{tr}(TM))$ we have
\begin{align*}
\overline{g}(\overline{R}(X, Y)E, N)& =\frac{c-1}{4}\{\eta(X)\eta(E)\overline{g}(Y,N)-\eta(Y)\eta(E)\overline{g}(X,N)\\ &-2g(\overline{\phi}X,Y)\overline{g}(\overline{\phi}E,N)\}\\
&=\frac{1-c}{2}g(\overline{\phi}X,Y)\overline{g}(\overline{\phi}E,N).
\end{align*}
Since $g(\overline{\phi}X,Y)\neq0$ and $\overline{g}(\overline{\phi}E,N)=0$, we have $\overline{g}(\overline{R}(X, Y)E, N)=0$. Similarly, from (\ref{ms1}), one obtains
\begin{equation*}
\overline{g}(\overline{R}(X,Y)W, W^{\prime})=\frac{1-c}{2}g(\overline{\phi}X,Y)\overline{g}(\overline{\phi}W,W^{\prime}),
\end{equation*}
$\forall\,X,Y\in\Gamma(D_{0})$ and $W,W'\in\Gamma(\overline{\phi}\mathcal{S})$. Let $W=\overline{\phi}W_{1}$ and $W'=\overline{\phi}W_{2}$ with $W_{1},W_{2}\in\Gamma(\mathcal{S})$. Since $g(\overline{\phi}X,Y)\neq0$ and $\overline{g}(\overline{\phi}W,W')=\overline{g}(\overline{\phi}^{2}W_{1},\overline{\phi}W_{2})=\overline{g}(\overline{\phi}W_{1},W_{2})=0$. Therefore, we have $\overline{g}(\overline{R}(X, Y)W, W^{\prime})=0$.
Conversely, assume that (a), (b) and (c) are satisfied. Then (a) implies that $D = D_{0}\perp D_{1}$ is invariant. From (b) and (\ref{ms1}) we get
\begin{equation}\label{ms2}
\overline{g}(\overline{\phi}E,N)=0,
\end{equation}
which implies $\overline{\phi}E \in \Gamma(S(TM))$. Thus, some part of $\mathrm{Rad}\,TM$, say $D_{2}$, belongs to $S(TM)$ under the action of $\overline{\phi}$. Further, (\ref{ms2}) implies $\overline{g}(\overline{\phi}E,N)=\overline{g}(\overline{\phi}^{2}E,\overline{\phi}N)=\overline{g}(-E+\eta(E)\xi,\overline{\phi}N)=-\overline{g}(E,\overline{\phi}N)=0$. Therefore, a part of $l\mathrm{tr}(TM)$, say $\mathcal{L}$, also belongs to $S(TM)$ under the action of $\overline{\phi}$. On the other hand, (c) and (\ref{ms1}) imply $\overline{g}(\overline{\phi}W,W^{\prime})=0$. Hence we obtain $\overline{\phi}M_{2}\perp M_{2}$. Also, $g(\overline{\phi} E, W) = -g(E, \overline{\phi}W ) = -c_{\alpha}\eta(E)$ implies that generally $\overline{\phi}M_{2}\oplus \mathrm{Rad} TM$ or equivalently, $M_{2}\oplus \overline{\phi}\mathrm{Rad} TM$. Now, from $M_{2}\oplus \overline{\phi}\mathrm{Rad} TM$ and the fact that $\overline{\phi}D_{1}=D_{1}$, then $M_{2}\perp D_{1}$ and $M_{2}\oplus \overline{\phi}D_{2}$. This also tells us that $\overline{\phi}M_{2}$ has a component along $l\mathrm{tr}(TM)$, essentially coming from $\xi$. On the other hand, invariant and non-degenerate $D_{0}$ implies $g(\overline{\phi}W, X) = 0$, for $X\in\Gamma(D_{0})$. Thus, $M_{2} \perp D_{0}$ and $\overline{\phi}M_{2} \perp D_{0}$. Since $\xi\in\Gamma(T\overline{M})$, we sum up the above results and conclude that
\begin{equation*}
S(T M ) = \{\overline{\phi}D_{2} \oplus M_{1}\oplus M_{2}\}\perp D_{0},
\end{equation*}
where $M_{1}=\overline{\phi}\mathcal{L}$. Hence $M$ is QGCR-lightlike submanifold of $\overline{M}(c)$ and the proof is completed.
\end{proof}
Note that conditions (b) and (c) are independent of the position of $\xi$ and hence valid for GCR-lightlike submanifolds \cite{ds3} and QGCR-lightlike submanifolds of an indefinte Sasakian space form $\overline{M}(c)$. When $\xi$ is tangent to $M$, it is well known \cite{ca} that $\xi\in\Gamma(S(TM))$. In this case, one has a GCR-lightlike submanifold, in which $D_{2}\perp\overline{\phi}D_{2}$ is an invariant subbundle of $TM$, leading to $D=D_{1}\perp D_{2}\perp\overline{\phi}D_{2}\perp D_{0}$ as the maximal invariant subspace of $TM$. On the other hand, when $M$ is QGCR-lightlike submanifold then $\xi\in\Gamma(T\overline{M})$ and thus $D_{2}\perp\overline{\phi}D_{2}$ is generally not an invariant subbundle of $TM$ since the action of $\overline{\phi}$ on it gives a component along $\xi$. In particular, let $E\in\Gamma(D_{2})$ then $E+\overline{\phi}E\in\Gamma(D_{2}\perp\overline{\phi}D_{2})$. But on applying $\overline{\phi}$ to this subbundle and considering the fact that $\eta(E)\neq0$ we get $-E+\overline{\phi}E+\eta(E)\xi\notin \Gamma(D_{2}\perp\overline{\phi}D_{2})$. Hence, $D=D_{0}\perp D_{1}$ is the maximal invariant subbundle of $TM$. Further, in the case of QGCR-lightlike submanifold, $\overline{\phi}D_{2}\oplus M_{2}$. In fact, let $\overline{\phi}E\in\Gamma(\overline{\phi}D_{2})$ and $W=\overline{\phi}W_{1}\in\Gamma(M_{2})$, where $W_{1}\in\Gamma(\mathcal{S})$. Then, $\overline{g}(\overline{\phi}E,W)=\overline{g}(\overline{\phi}E,\overline{\phi}W_{1})=-\eta(E)\eta(W_{1})\neq0$. This explains the second direct sum in decomposition $S(TM)=\{\overline{\phi}D_{2} \oplus M_{1}\oplus M_{2}\}\perp D_{0}$. For the case of GCR-lightlike submanifold, $\eta(E)=\eta(W_{1})=0$, hence $\overline{g}(\overline{\phi}E,W)=\overline{g}(\overline{\phi}E,\overline{\phi}W_{1})=0$. This implies that $\overline{\phi}D_{2}\perp M_{2}$ and hence the first direct orthogonal sum in the decomposition $S(TM)=\{\overline{\phi}D_{2} \oplus M_{1}\}\perp M_{2}\perp D_{0}\perp \langle\xi\rangle$.
\section{Integrability of the distributions $D$ and $\widehat{D}$}\label{Integra}
Let $M$ be a QGCR-lightlike submanifold of an indefinite nearly Sasakian manifold $(\overline{M}, \overline{g}, \overline{\phi},\xi,\eta)$. From (\ref{eq05}), the tangent bundle of any QGCR lightlike submanifold, $TM$, can be rewritten as
\begin{equation}\label{eq13}
TM=D \oplus \widehat{D},
\end{equation}
where $D=D_0\perp D_{1}$ and $\widehat{D}=\{D_{2}\perp\overline{\phi} D_{2}\} \oplus\overline{D}$.
Notice that $D$ is invariant with respect to $\overline{\phi}$ while $\widehat{D}$ is not generally anti-invariant with respect to $\overline{\phi}$.
Let $\pi$ and $\widehat{\pi}$ be the projections of $TM$ onto $D$ and $\widehat{D}$ respectively. Then, using the first equation of (\ref{eq13}) we can decompose $X$ as
\begin{equation}\label{16}
X=\pi X + \widehat{\pi}X,\;\; \forall X\in \Gamma(TM).
\end{equation}
It is easy to see that $\overline{\phi}\pi X\in\Gamma(D)$. However, the action of $\overline{\phi}$ on $\widehat{\pi}X$ gives a tangential and transversal component due to a generalized $\xi$, i.e.,
\begin{equation}\label{100}
\overline{\phi} X=P_{1}X+P_{2}X+QX,\;\; \forall X\in \Gamma(TM),
\end{equation}
where $P_{1}X=\overline{\phi}\pi X$ while $P_{2}X$ is the tangential component of $\overline{\phi}\widehat{\pi}X$ and $QX$ is the transversal component of $\overline{\phi}X$, essentially coming from $\overline{\phi}\widehat{\pi}X$ since $\overline{\phi}D=D$.
By grouping the tangential and transversal parts in (\ref{100}), it is easy to see that
\begin{equation}\label{18}
\overline{\phi} X=PX+QX,\;\; \forall X\in \Gamma(TM),
\end{equation}
where $PX=P_{1}X+P_{2}X$.
Note that if $X\in\Gamma{(D)}$, then $P_{2}X = QX=0$, and $ \overline{\phi} X=P_{1}X$.
The equation (\ref{18}) can be properly understood through the following specific case of vector field in $\overline{D}\subset\widehat{D}$. Let $\xi_{M}$ and $\xi_{\mathrm{tr} M}$ be the tangential and transversal components of $\xi$. If $X\in\Gamma(\overline{D})$ and since $ \overline{D}= \overline{\phi} \, \mathcal{S}\oplus \overline{\phi} \,\mathcal{L}$, then
$$
\overline{\phi} X = S X + L X -\{\eta(SX) + \eta(LY)\}\xi_{M} -\{\eta(SX) + \eta(LY)\}\xi_{\mathrm{tr} M}.
$$
Consequently, for $X\in\Gamma( \overline{D})$,
\begin{align}
P_{1}X & =0,\nonumber\\
P_{2}X & =-\{\eta(SX) + \eta(LY)\}\xi_{M},\nonumber\\
\mbox{and}\;\; QX &= S X + L X -\{\eta(SX) + \eta(LY)\}\xi_{\mathrm{tr} M}.\nonumber
\end{align}
Similarly, for any $V\in\Gamma(\mathrm{tr}(TM))$, $V= SV + LV$, and
\begin{equation}
\overline{\phi} V = t V + f V,
\end{equation}
where $tV$ and $fV$ are the tangential and transversal components of $\overline{\phi} V$, respectively.
Differentiating (\ref{18}) with respect to $Y$ we get
\begin{equation}\label{20}
\overline{\nabla}_YPX+\overline{\nabla}_YQX= \overline{\nabla}_Y\overline{\phi} X.
\end{equation}
Then using (\ref{eq11}), (\ref{eq31}), (\ref{eq32}) and (\ref{eqz}) we have
\begin{equation}\label{21}
\overline{\nabla}_YPX+\overline{\nabla}_YQX=\nabla_Y PX+h(PX,Y)-A_{QX}Y+\nabla_Y^t QX,
\end{equation}
and from (\ref{eqz}), we have;
\begin{align}\label{22}
\overline{\nabla}_Y\overline{\phi} X& =\overline{\phi}(\nabla_YX)+\overline{\phi}(\nabla_XY)+2\overline{\phi} h(X,Y)-\overline{\nabla}_X\overline{\phi} Y\nonumber\\
&+2\overline{g}(X,Y)\xi_M+2\overline{g}(X,Y)\xi_{\mathrm{tr} M}-\eta(Y)X-\eta(X)Y\nonumber\\
&=P(\nabla_YX)+Q(\nabla_YX)+P(\nabla_XY)+Q(\nabla_XY)\nonumber\\
&+2th(X,Y)+2fh(X,Y)-\nabla_XPY-\nabla_X^tQY\nonumber\\
&-h(X,PY)+A_{QY}X+2\overline{g}(X,Y)\xi_M+2\overline{g}(X,Y)\xi_{\mathrm{tr} M}\nonumber\\
&-\eta(Y)X-\eta(X)Y.
\end{align}
Finally putting (\ref{21}) and (\ref{22}) in (\ref{20}) and then comparing the tangential and transversal components of the resulting equation, we obtain
\begin{align}\label{s102}
(\nabla_Y P)X+(\nabla_X P)Y&= A_{QX}Y+A_{QY}X+2th(X,Y)\nonumber\\
&+2\overline{g}(X,Y)\xi_M-\eta(X)Y-\eta(Y)X,
\end{align}
and
\begin{align}\label{s103}
(\nabla_Y^TQ)X+(\nabla_X^TQ)Y& = -h(PX,Y)-h(X,PY)\nonumber\\
&+2fh(X,Y)+2\overline{g}(X,Y)\xi_{\mathrm{tr} M},
\end{align}
for all $X,Y\in\Gamma(TM)$, where
\begin{equation}\label{25}
(\nabla_Y P)X=\nabla_Y PX-P(\nabla_YX)\;\;\mbox{and}\;\;(\nabla_Y^T Q)X=\nabla_Y^t QX-Q(\nabla_YX).
\end{equation}
\begin{proposition}
Let $(M,g, S(TM),S(TM^\perp))$ be a QGCR-lightlike submanifold of an indefinite nearly Sasakian manifold $(\overline{M},\overline{\phi},\eta,\xi,\overline{g})$. Then,
\begin{align}\label{23}
P[X,Y]=&\; -\nabla_YPX-\nabla_XPY+2P\nabla_{X}Y +A_{QX}Y+A_{QY}X\nonumber\\
&+2th(X,Y) +2\overline{g}(X,Y)\xi_M-\eta(X)Y-\eta(Y)X,
\end{align}
and
\begin{align}\label{26}
Q[X,Y]&=-\nabla_{Y}^tQX-\nabla_X^tQY+2Q\nabla_{X}Y -h(PX,Y)-h(X,PY)\nonumber\\
&+2fh(X,Y) +2\overline{g}(X,Y)\xi_{\mathrm{tr} M},
\end{align}
for all $X,Y\in\Gamma(TM)$.
\end{proposition}
\begin{proof}
The proof follows from (\ref{s102}) and (\ref{s103}).
\end{proof}
\begin{theorem}\label{th4}
Let $(M,g, S(TM),S(TM^\perp))$ be a QGCR-lightlike submanifold of an indefinite nearly Sasakian manifold $(\overline{M},\overline{\phi},\eta,\xi,\overline{g})$. Then, the distribution $D$ is integrable if and only if
\begin{align}
& h(P_{1} X,Y) + h(X,P_{1} Y)=2(Q\nabla_XY+fh(X,Y)+\overline{g}(X,Y)\xi_{\mathrm{tr} M}), \nonumber\\
\mbox{and}\;\; & P_{2}[X, Y]=0. \nonumber
\end{align}
for all $X,Y\in \Gamma(D)$.
\end{theorem}
\begin{proof}
The proof is a straightforward calculation.
\end{proof}
The integrability of $\widehat{D}$ is discussed as follows. Note that the distribution $\widehat{D}$ is integrable if and only if, for any $X$, $Y\in\Gamma(\widehat{D})$, $[X, Y]\in\Gamma(\widehat{D})$. The latter is equivalent to $P_{1}[X, Y]=0$.
\begin{theorem}\label{th5}
Let $(M,g, S(TM),S(TM^\perp))$ be a QGCR-lightlike submanifold of an indefinite nearly Sasakian manifold $(\overline{M},\overline{\phi},\eta,\xi,\overline{g})$. Then, the distribution $\widehat{D}$ is integrable if and only if
\begin{align*}
&A_{QX}Y+A_{QY}X-\nabla_YP_{2}X-\nabla_XP_{2}Y\\
&+2(P_{1}(\nabla_{X}Y)+\overline{g}(X,Y)\xi_M+th(X,Y))\in\Gamma(\widehat{D}),
\end{align*}
for all $X,Y\in \Gamma(\widehat{D})$.
\end{theorem}
\begin{proof}
Let $X,Y\in \Gamma(\widehat{D})$, then it is easy to see that $P_{1}X=P_{1}Y=0$. Hence, $PX=P_{2}X$ and $PY=P_{2}Y$. Now using (\ref{23}), we derive
\begin{align}\label{s107}
\overline{\phi}[X,Y]&=P[X,Y]+Q[X,Y]\nonumber\\
&=-\nabla_YPX-\nabla_XPY+2P\nabla_{X}Y+A_{QX}Y\nonumber\\
&+A_{QY}X+2th(X,Y) +2\overline{g}(X,Y)\xi_M-\eta(X)Y\nonumber\\
&-\eta(Y)X+Q[X,Y]\nonumber\\
&=-\nabla_YP_{2}X-\nabla_XP_{2}Y+2P_{1}\nabla_{X}Y+A_{QX}Y\nonumber\\
&+A_{QY}X+2th(X,Y) +2\overline{g}(X,Y)\xi_M+2P_{2}\nabla_{X}Y\nonumber\\
&-\eta(X)Y-\eta(Y)X+Q[X,Y].
\end{align}
It is obvious from (\ref{s107}) that the last four terms belongs to $\widehat{D}$. Hence, the assertation follows from the remaining terms.
\end{proof}
Let consider the lightlike submanifold $M$ given in Example \ref{exa1}. The distribution $D$ is spanned by $\{E_{1}, E_{2}, X_{3}, X_{4}\}$ while $\widehat{D}$ is spanned by $\{E_{3},\overline{\phi}_0 E_{3}, \overline{\phi}_0 W\}$. By straightforward calculations, we can see that $[E_{1},E_{2}]=2\partial z=2\xi$. Thus, $[E_{1},E_{2}]$ does not belong to $D$ and hence non integrable. On the other hand, $[E_3,\overline{\phi}_0 E_{3}]=-[E_3,X_{2}]=\cos^2\theta\partial z=\cos^2\theta\xi$. Since $\xi$ does not belong to $\widehat{D}$, we can see that $\widehat{D}$ is not integrable.
\section*{Acknowledgments}
S. Ssekajja is grateful to the African Institute of Mathematical Sciences, AIMS, in S\'en\'egal and the University of KwaZulu-Natal, South Africa, for their financial support during this research. The authors thank the referees for helping them to improve the presentation.
|
\section{Introduction}
Across the breadth of theoretical physics and mathematics, one concept leveraged in numerous settings and to numerous ends is that of the instanton.
These are non-singular finite action solutions to Euclidean field equations, which in turn imply an (anti)self-duality condition on the corresponding field strength.
More precisely, in the presence of (anti)self-dual field strength the Yang-Mills equations are satisfied automatically, in the simplest case arising from characteristic field configurations of the form
\begin{align}
A_a=\frac{1}{g}\frac{x^b\sigma_{ab}}{x^2+\rho^2}\,,
\label{BPST instanton}
\end{align}
where $g$ is the coupling constant, $\sigma_{ab}$ the self-dual Lorentz generator, and $\rho$ is a scale associated to the size of the instanton.
These solutions approach pure gauge at infinity, and are thereby associated to quantum mechanical tunnelling between topologically distinct vacua indexed by
\begin{align}
k\equiv-\frac{1}{4\pi^2}\int_\mathcal{M}\, \mathrm{Tr}\left(F\wedge F\right)\,,\quad
F\equiv dA+A\wedge A\,.
\label{Pontryagin number}
\end{align}
As canonical examples of non-perturbative phenomena, they are also invisible in perturbation theory by virtue of their inverse dependence on $g$.
Originally elucidated more than forty years ago \cite{Belavin:1975fg}, these field configurations are now known to be a characteristic feature of the QCD vacuum, thereby responsible for many aspects of the resulting phenomenology \cite{Schafer:1996wv}, and have found further application across a wide swathe of topics in theoretical physics \cite{Bianchi:2007ft}.
In addition to their physical utility, instantons have also found an array of applications in purely mathematical contexts \cite{Freed:1984xe}.
Furthermore, we may note that these concepts can be usefully imported into the gravitational context, given that the Einstein field equations are also automatically satisfied in the presence of (anti)self-dual Riemann curvature.
This leads to the notion of gravitational instantons; finite action asymptotically locally Euclidean solutions of the Einstein equations, indexed respectively by the Euler number and Hirzebruch signature
\begin{align}
\chi\equiv\frac{1}{16\pi^2}\int_\mathcal{M} \,R_{ab}\wedge*R^{ab}\,,\quad
\tau\equiv-\frac{1}{24\pi^2}\int_\mathcal{M} \,\mathrm{Tr}\left(R_{ab}\wedge R^{bc}\right) \,,
\label{topological invariants}
\end{align}
where $*$ is the Hodge dual.
Originating from the same era and considerations as the analogous gauge theory solutions \cite{Eguchi:1978gw}, known examples of gravitational instantons also find wide application across a variety of contexts.
The line of reasoning connecting both of these scenarios is the status of the underlying degrees of freedom as gauge fields, or in more mathematical terms, connections on principal bundles.
In the former case $A$ is of course the familiar gauge field of Yang-Mills theory, and in the latter we have the spin connection $\omega^{ab}$, which can be thought of as arising from the gauging of Lorentz symmetry into the full diffeomorphism group.
As is well established, given supersymmetry transformations parametrised by a spinor $\epsilon$, promoting this field to a function of local coordinates also necessarily mandates a gauge field, the spin 3/2 gravitino $\psi$.
This may be accounted for via the observation that if supersymmetry is made local we then expect a new transformation $\delta\left(\dots\right)\sim \partial_\mu\epsilon\left(x\right)$, implying the existence of a previously absent field carrying both a vector and a spinor index.
This perspective suggests the existence of a previously unexplored third class of instanton, complementary to the gauge and gravitational phenomena outlined above.
This being the case, the considerations which have been so useful elsewhere may bear yet more fruit when transplanted into this novel context.
Indeed, in the following we will establish that:
\begin{enumerate}
\item Supergravity configurations $\left(e^a, \psi\right)$ for which the torsion-free Riemann curvature obeys a duality condition and appropriate boundary conditions, whilst the gravitino generates torsion and is constructed via derivatives of torsion-free Killing spinors, automatically satisfy the associated equations of motion with zero action and are half-BPS.
\item By constructing the gravitino in this fashion we may import many of the notions and techniques of Yang-Mills instanton calculus, such that the task of finding explicit field configurations satisfying these conditions can be reduced in certain backgrounds to a problem for which the solution is already known.
\item This results in characteristic solutions which are schematically of the form
\begin{align}
\psi_\mu=\frac{1}{\kappa}A_\mu\epsilon\,,\nonumber
\end{align}
where $A_\mu$ is an (anti)self-dual Yang-Mills gauge field, $\epsilon$ is a Killing spinor of the corresponding torsion-free background, and $\kappa^2=8\pi G$ is the usual gravitational coupling.
We identify these as fermionic instantons associated to the status of the gravitino as the gauge field of local supersymmetry.
\end{enumerate}
Although there exists a large body of literature on exact supergravity solutions, including a number of comprehensive results \cite{Gibbons:1982fy, Tod:1983pm, FigueroaO'Farrill:2002ft, Gauntlett:2002fz, Gauntlett:2002nw, Gutowski:2003rg, Bellorin:2005zc, Cacciatori:2007vn, Bellorin:2007yp, Gran:2008vx}, these solutions are overwhelmingly of the `bosonic' type, where fermionic backgrounds are trivial.
A significantly smaller fraction of this research effort involves non-trivial solutions for the gravitino field \cite{Urrutia:1981sk, Hull:1983aw, Hull:1984vh, Aichelburg:1986wv}, albeit also often neglecting the non-linear, and in this context essential, effect of gravitino-induced spacetime torsion.
To the best of our knowledge the solutions presented herein, their method of construction and indeed the notion of fermionic instantons, are novel.
\section{Preliminaries}
Before proceeding further we will establish some notation and conventions for what follows.
As one may imagine, there exist a number of non-trivial aspects to solving the fully non-linear supergravity equations of motion.
These may be ameliorated to some extent by framing the problem appropriately.
\subsection{Duality structure}
We may firstly note that in Euclidean signature
the Hodge star satisfies the condition $*^2=1$, implying a canonical decomposition on the bundle of two-forms
\begin{align}
\Lambda^2=\Lambda_+^2\oplus\Lambda_-^2\,,
\label{decomposition}
\end{align}
where $\Lambda^2_\pm$ are the $\pm1$, or equivalently self and antiself-dual, eigenspaces of $*$.
For concreteness we will specialise in the following to self-dual instanton configurations only.
Whilst independently useful, this decomposition also implies the group isomorphism
\begin{align}
\mathrm{Spin}\left(4\right)\simeq SU\left(2\right)_+\times SU\left(2\right)_-\,,
\end{align}
in terms of which the underlying problem may be usefully expressed.
The corresponding self and antiself-dual generators are
\begin{align}
\sigma_{ab}\equiv\frac{1}{4}\left(\sigma_a\overline\sigma_b-\sigma_b\overline\sigma_a\right)\,,\quad
\overline\sigma_{ab}\equiv\frac{1}{4}\left(\overline\sigma_a\sigma_b-\overline\sigma_b\sigma_a\right)\,,
\end{align}
where $\left(\sigma_a\right)_{A\dot A}=\left(i\vec\tau,1_{2\times2}\right)$ and $\left(\bar\sigma_a\right)^{\dot AA}=\left(-i\vec\tau,1_{2\times2}\right)$ are the Euclidean sigma matrices, with $\vec\tau$ the ordinary Pauli matrices, and $A, \dot A=\{1,2\}$ are respectively the spinor indices of $SU\left(2\right)_+$ and $SU\left(2\right)_-$.
We will use lowercase roman characters $\{a,b,\dots\}$ for tangent space indices and greek characters $\{\alpha,\beta,\dots\}$ for spacetime indices, with three-vector indices exclusively represented via $\{i,j,k\}$.
Following the conventions of \cite{Dorey:2002ik}, our Euclidean gamma matrices are then
\begin{align}
\gamma^a=
\begin{pmatrix}
0 & -i\sigma^a\\
i\overline\sigma^a & 0\\
\end{pmatrix}\,,
\label{gamma matrix convention}
\end{align}
such that we have the useful chiral-duality identity
\footnote{\,We (anti)symmetrise always with unit weight, such that e.g. $\gamma^{[mn]}=\frac{1}{2}\left(\gamma^{mn}-\gamma^{nm}\right)$.}
\begin{align}
\gamma^{ab}\equiv
\gamma^{[a}\gamma^{b]}
=\frac{1}{2}\gamma^5\epsilon^{abcd}\gamma_{cd}\,.
\label{chiral-duality identity}
\end{align}
\subsection{Euclidean fermions}
This structure is further reflected in the standard two-component notation for Dirac spinors, where fields in the $\left(\frac{1}{2},0\right)\oplus\left(0,\frac{1}{2}\right)$ representation are written
\begin{align}
\psi=
\begin{pmatrix}
\chi_{A}\vspace{2pt}\\
\bar{\xi}^{\dot A}
\end{pmatrix}=
\begin{pmatrix}
\psi_+\vspace{2pt}\\
\psi_-
\end{pmatrix}\,,\quad
\chi\phi\equiv\chi^A\phi_A\,,\quad
\bar\xi\bar\phi\equiv\bar\xi_{\dot A}\bar\phi^{\dot A}\,,
\label{fermion components}
\end{align}
with $\psi_+$ and $\psi_-$ independent, and so labelled in accordance with the usual projection operators $P_\pm=\frac{1}{2}\left(1\pm\gamma^5\right)$.
Although this fits neatly, there does exist however a well-known problem in this context; that of fermions in Euclidean signature.
It is first of all notable that there are no Majorana representations in Euclidean signature since $SU\left(2\right)_+$ and $SU\left(2\right)_-$ do not mix under conjugation.
This precludes the Majorana reality condition which would otherwise relate $\psi_+$ and $\psi_-$, which is of course problematic for theories exhibiting $\mathcal{N}=1$ supersymmetry, reliant as they are upon such representations.
As such, we will necessarily promote our gravitino from a Majorana field to the Dirac gravitino typically encountered in $\mathcal{N}=2$ supergravity, with the hope that whatever results we derive may still be of relevance to the $\mathcal{N}=1$ case
\footnote{\,At any rate, the solutions we ultimately find will only preserve half of the underlying $\mathcal{N}=2$ supersymmetry as a consequence of self-duality.}.
Unfortunately, there are yet further issues in that the Lorentzian inner product, $\overline\psi\psi\equiv\psi^\dagger\gamma^0\psi$, is not preserved in Euclidean signature, since $\gamma^0$ has the effect of mixing dotted and undotted spinors.
Therefore, we should apparently instead utilise the $\mathrm{Spin}\left(4\right)$ invariant $\psi^\dagger\psi=\psi_+^\dagger\psi_++\psi_-^\dagger\psi_-$ which comes at the price, given the absence of $\gamma^0$, of the loss of a definite Hermiticity property of any resultant action.
As discussed in \cite{Dorey:2002ik}, there exist a number of workarounds and perspectives on this issue.
The most conservative viewpoint, which we will espouse in the following, is that our primary concern is simply the computation of Minkowski space Green's functions.
The standard Wick rotation into Euclidean signature offers a convenient and well-defined method of calculation, from which these can be extracted.
That fermionic actions cease to be real-valued after Wick rotation is then something of an irrelevance, in that we can regardless arrive at the correct Minkowski signature result.
It does however result in a further non-triviality in that, under the standard Euclideanisation prescription \cite{Osterwalder:1973dx}, this implies that the number of fermionic degrees of freedom, Dirac or otherwise, must be effectively doubled.
In practice this amounts to replacing $\psi^\dagger$ with a $\psi$-independent field $\chi^\dagger$, although the number of Grassman integration variables ultimately remains unchanged.
However, it should be noted that there also exist a variety of other techniques for the Euclideanisation of fermions \cite{Fubini:1972mf, Zumino:1977yh, Nicolai:1978vc,Mehta:1986mi,vanNieuwenhuizen:1996tv}, some of which do not involve any kind of doubling, and some of which do preserve Hermiticity.
Furthermore, at present there seems to be no clear consensus on a `best' approach, resulting in a rather unclear situation overall.
As such it seems best to take an agnostic perspective on the issue, and eschew arguments entirely which rely on a choice of inner product.
For notational familiarity we will still write barred spinors such as $\overline\psi$, but without assuming any precise relationship to $\psi$.
\subsection{Cartan formalism}
On the geometrical side we will also require some standard results from the Cartan formalism; given a set of frame one-forms $e^a=e^a{}_\mu dx^\mu$, the first Cartan structure equation provides the torsion
\begin{align}
T^a\equiv de^a+\omega^{ab}\wedge e_b\,,
\label{first Cartan}
\end{align}
in terms of a spin connection $\omega^{ab}$,
which then yields the Riemann curvature via
\begin{align}
R^{ab}\equiv d\omega^{ab}+\omega^a{}_c\wedge\omega^{cb}\,.
\end{align}
In practice it will be expedient to decompose the spin connection into
\begin{align}
\omega^{ab}=\omega_\circ^{ab}+K^{ab}\,,\quad
de^a+\omega_\circ^{ab}\wedge e^b=0\,,\quad
T^a=K^{ab}\wedge e^b\,,
\label{decomposed first Cartan}
\end{align}
where $\omega_\circ^{ab}$ is the unique torsion-free spin connection, and $K^{ab}$ is the contortion one-form.
In this notation the supergravity Lagrangian is
\begin{align}
\mathcal{L}=\frac{1}{2}\epsilon_{abcd} e^a\wedge e^b\wedge R^{cd}-\overline\psi \wedge \gamma^5\gamma\wedge D \psi\,,\quad
D\psi\equiv d\psi +\frac{1}{4}\omega^{ab}\gamma_{ab}\wedge\psi\,,
\label{supergravity Lagrangian}
\end{align}
where we have the following definitions
\begin{align}
\gamma\equiv \gamma_ae^a\,,\quad
\gamma^5\equiv
\begin{pmatrix}
1 & 0\\
0 & -1\\
\end{pmatrix}\,,\quad
\psi\equiv \psi_a e^a=\psi_\mu dx^\mu\,,\quad
\label{definitions}
\end{align}
and invariance under the transformations
\begin{align}
\delta \psi= D\chi\,,\quad
\delta e^a =\frac{1}{2}\left(\overline\chi\gamma^a\psi-\overline\psi\gamma^a\chi\right)\,.
\label{supersymmetry variations}
\end{align}
To streamline presentation we are evidently neglecting the $U\left(1\right)$ graviphoton field of $\mathcal{N}=2$ supergravity, although it may of course be straightforwardly incorporated in what follows.
Since it will be of relevance later on, we also note that the Rarita-Schwinger prefactor here is the correct choice for a Dirac field.
A Majorana gravitino would require the more conventional factor of 1/2 to correct for overcounting arising from self-conjugacy.
\section{Fermionic instantons}
Having established sufficient formalism, we may now search for the instanton solutions which the arguments of the introduction suggest should exist.
\subsection{Chiral-duality symmetry}
We firstly recall that since both the Einstein and Yang-Mills equations are automatically satisfied given a duality condition on the field strength, it is sensible to pursue a similar result for the Rarita-Schwinger equations,
\begin{align}
\gamma\wedge D\psi
=\frac{1}{2}\gamma_\alpha\psi_{\mu\nu} \,e^\alpha\wedge e^\mu\wedge e^\nu
=0\,,\quad
\psi_{\mu\nu}\equiv D_{\mu}\psi_{\nu}-D_{\nu}\psi_{\mu}\,.
\label{Rarita-Schwinger equations 1}
\end{align}
By contracting the components with $\epsilon^{\alpha\beta\mu\nu}$ we can arrive at two equivalent relations,
\begin{align}
\gamma^\mu\psi_{\mu\nu}=0\,,\quad
\gamma^\mu*\psi_{\mu\nu}=0\,,\quad
{}*\psi_{\alpha\beta}\equiv\frac{1}{2}\epsilon^{\alpha\beta\mu\nu}\psi_{\mu\nu}\,,
\label{Rarita-Schwinger equations 2}
\end{align}
which are indeed suggestive of some underlying duality structure.
Use of the chiral-duality identity \eqref{chiral-duality identity} and $\gamma^\mu\gamma^\nu=\gamma^{\mu\nu}+\delta^{\mu\nu}$ further yields
\begin{align}
\gamma_\alpha\gamma^\beta\psi_{\beta\mu}
=\psi_{\alpha\mu}+\gamma^5\left(\gamma^\mu\gamma^\nu *\psi_{\alpha\nu}-{}*\psi_{\alpha\mu}\right)\,,
\end{align}
indicating that the equations in \eqref{Rarita-Schwinger equations 2} imply, and are in turn interrelated by, the chiral-duality symmetry
\footnote{\,Care should be exercised in comparison with the literature in that \eqref{chiral-duality identity} is signature-dependent, such that $\psi_{\mu\nu}=-\gamma^5*\psi_{\mu\nu}$ in the Lorentzian case \cite{Deser:1977ur}.}
\begin{align}
\psi_{\mu\nu}=\gamma^5*\psi_{\mu\nu}\,.
\label{chiral-duality symmetry}
\end{align}
In form notation this is equivalent to
\begin{align}
\begin{pmatrix}
D\psi_+\\
D\psi_-
\end{pmatrix}
=
\begin{pmatrix}
+*D\psi_+\\
-*D\psi_-
\end{pmatrix}\,,
\label{chiral-duality}
\end{align}
which we may recognise as self and anti-self duality in the positive and negative chirality projections, respectively.
This then indicates that in fact every solution of the Rarita-Schwinger equations obeys a duality condition, but also that this chiral-duality is not sufficient in and of itself to ensure solution.
Building upon the reasoning surrounding instanton solutions in general relativity and Yang-Mills theory, we therefore require some further condition to delineate those field configurations which are `special' in some sense; in that they possess non-trivial topological character and automatically solve the equations of motion.
\subsection{Geometric \& topological considerations}
To find such a condition we may note that for any spinor $\epsilon$ the ansatz $\psi=D\epsilon$ must always be a valid solution, since $\delta\psi=D\epsilon$ under supersymmetry.
Clearly some subset of these solutions are trivial, in that they are merely gauge transformations of $\psi=0$.
To delineate these possibilities, we may specialise for concreteness to spacetimes which locally approximate flat spacetime at infinity, and examine their asymptotic behaviour.
\begin{enumerate}
\item If $\epsilon$ is first of all an increasing function at infinity, then $\psi$ will not be normalisable and hence not a valid solution for our purposes.
\item If $\epsilon$ vanishes at infinity, then the associated transformation will be asymptotic to the identity. $\psi$ will therefore be pure gauge and hence may be removed by gauge fixing.
\item If $\epsilon$ is asymptotic to a constant value at infinity, it is non-normalisable and as such inadmissible as a gauge parameter.
Since $D\epsilon$ will nonetheless vanish at infinity, $\psi$ itself can in contrast be normalisable.
This is the subset of solutions we will consider.
\end{enumerate}
We need only consider asymptotic behaviour since the difference of any two $\psi$ in the same asymptotic class must vanish at infinity, and so can be removed via gauge transformation.
As observed in \cite{Witten:1981nf}, it is only the latter class which incorporate zero modes associated to supersymmetry transformations.
This may be considered a foreshadowing of the zero modes we expect any instanton solution to possess as a result of collective coordinate invariance.
It is first of all evident that we expect instantons to minimise the energy within a given homotopy class, and in so doing saturate a Bogomol'nyi bound.
In general relativity the corresponding relation is
\begin{align}
M\geq\sqrt{Q^2+P^2}\,,
\end{align}
where $M$ is the ADM mass of the spacetime, and $Q$ and $P$ are the electric and magnetic charges respectively.
As demonstrated in \cite{Gibbons:1982fy}, saturation of this bound implies the existence of solutions to the equation $D\epsilon=0$.
These Killing, or equivalently supercovariantly constant, spinors are of particular importance in supergravity and indeed differential geometry in general.
Their relevance to our picture is as follows.
Since the metric must approximate locally flat spacetime at infinity, whatever non-triviality is present must be suppressed by powers of $r$.
Given that the connection components are defined via derivatives of the metric, their contribution at infinity must therefore be at most $\mathcal{O}\left(1/r^2\right)$.
Evidently the Killing spinor equation at infinity is then $d\epsilon=0$, which implies that any non-trivial solution $\epsilon$ provides a characteristic representative of the class of spinors which are constant at infinity.
Relative to our original delineation, this appears to be paradoxical.
If $\epsilon$ vanishes at infinity, then $\psi$ is pure gauge and therefore trivial.
If however $\epsilon$ is constant at infinity, then it is related by gauge transformation to a Killing spinor, and $\psi=D\epsilon$ again vanishes identically and is unsuitable for our purposes.
The resolution to this quandary lies in the fact that our argument is valid for general relativity only, and so neglects spacetime torsion.
In supergravity, as with any theory of gravity coupled to fermions, the possibility of this torsion must be accounted for.
It is furthermore inescapable if, as in the present setting, one seeks non-trivial background configurations for the fermion fields.
If, as before, $\epsilon$ is Killing relative to the torsion-free background we then have
\begin{align}
\psi=D\epsilon
=\left(d+\frac{1}{4}\gamma_{ab}\left(\omega^{ab}_\circ+K^{ab}\right)\right)\epsilon
=\frac{1}{4}\gamma_{ab}K^{ab}\epsilon\,,
\label{Killing-modulo-torsion}
\end{align}
where we have decomposed the full spin connection into the unique torsion-free part $\omega_\circ^{ab}$, and the contortion one-form $K^{ab}$, which ultimately will be sourced by the gravitino.
The apparent overlap between the pure gauge and non-gauge asymptotic classes is then seen to be a consequence of having implicitly selected the zero instanton sector, when $\gamma_{ab}K^{ab}$ vanishes.
Despite no longer satisfying $D\epsilon=0$, spinors such as $\epsilon$ are nonetheless sensitive to the underlying geometric information in that their bilinears still form Killing vectors via
\begin{align}
\xi_\nu=\overline\epsilon\, e^a{}_\nu\gamma^a\,\epsilon\,,\quad
\nabla_\mu\xi_\nu+\nabla_\nu\xi_\mu=0\,.
\label{Killing equation}
\end{align}
This follows from the fact that the torsion resides in the antisymmetric part of the affine connection, which is removed by the symmetry of Killing's equation.
\subsection{Connecting connections}
Given the somewhat slippery nature of spacetime torsion, it is not necessarily clear how we should interpret \eqref{Killing-modulo-torsion} in relation to the more familiar Yang-Mills instanton solutions.
We may however make a connection explicit in the following way.
By virtue of \eqref{chiral-duality identity} the positive chirality gravitino satisfies
\begin{align}
\gamma^5\psi_+
=\gamma_{cd}K^{cd}\epsilon_+
=\frac{1}{2}\epsilon^{abcd}\gamma_{cd}K_{ab}\epsilon_+\,,
\end{align}
which is eminently suggestive of a self-duality condition on the contortion one form,
\begin{align}
K^{cd}=\frac{1}{2}\epsilon^{abcd}K_{ab}\,.
\label{self-dual contortion 1}
\end{align}
Taking some inspiration from the approach of \cite{Charap:1977ww}, this may be engineered by interpreting the contortion as a gauge field via
\begin{align}
K^{ab}=A^i\eta^{iab}\,,
\label{contortion gauge field}
\end{align}
where $A^i$ is a one-form carrying a single $\mathfrak{su\left(2\right)}$ index
and $\eta^{iab}$ is the self-dual 't Hooft symbol.
We then have
\begin{align}
\frac{1}{4}K^{ab}\gamma_{ab}
=\frac{1}{2}K^{ab}\sigma_{ab}
=A^i\sigma_i
\equiv A\,,
\label{spin connection embedding}
\end{align}
where we have made use of the identity $\sigma_{ab}=\frac{1}{2}\eta_{jab}\sigma^j$, and
\begin{align}
K^{ab}\gamma_{ab}
=\frac{1}{2}\left(K^{ab}\gamma_{ab}+\frac{1}{2}\epsilon^{abcd}K_{cd}\gamma_{ab}\right)
=\frac{1}{2}K^{ab}\gamma_{ab}\left(1+\gamma_5\right)\,.
\label{self-dual contortion 2}
\end{align}
Equation \eqref{Killing-modulo-torsion} then implies
\begin{align}
\psi_+=A\epsilon_+\,,\quad
D\psi_+
=d\left(A\epsilon_+\right)+\left(\frac{1}{4}\gamma_{ab}\omega_\circ^{ab}+A\right)\wedge A\epsilon_+
=\left(dA+A\wedge A\right)\epsilon_+\,.
\label{Dpsi F relation}
\end{align}
Compatibility with the underlying chiral-duality of the Rarita-Schwinger equations evidently enforces self-duality of $F\equiv dA+A\wedge A$, as a consequence of \eqref{chiral-duality}.
This is however unproblematic as we already know how to construct self-dual gauge fields, and hence the corresponding gravitino configurations, via the ADHM method \cite{Atiyah:1978ri} and generalisations thereof.
This established, we postpone further exploration of this perspective until later on; before proceeding there are a number of important aspects we must firstly take account of.
\subsection{Field strength}
For any $\epsilon$, the associated gravitino field strength is
\begin{align}
D\psi
=D^2\epsilon
=\frac{1}{4}R^{ab}\gamma_{ab}\epsilon\,,
\label{integrable Dpsi 1}
\end{align}
one side of which is just the standard integrability condition used in the characterisation of supersymmetric backgrounds
\footnote{\, Using the coordinate covariant derivative $\nabla$ instead yields extra terms proportional to $T^a$ \cite{Freedman:2012zz}.}.
Since we require the existence of solutions to $D\epsilon_+=0$ in the torsion-free limit, any torsion-free Riemann curvature must satisfy $R_\circ^{ab}\gamma_{ab}\epsilon_+=0$.
This requirement is restrictive, but may be engineered in the non-trivial case if the curvature satisfies an antiself-duality condition, which implies
\begin{align}
R_\circ^{ab}\gamma_{ab}
=R_\circ^{ab}\gamma_{ab}P_-\,,
\label{self-dual Riemann}
\end{align}
as follows from the same argument used in \eqref{self-dual contortion 2}.
A useful corollary \cite{Atiyah:1978wi} of this result is that given antiself-dual Riemann curvature, there always exists a frame in which the spin connection satisfies the analogous relations
\begin{align}
\omega^{ab}_\circ=-\frac{1}{2}\epsilon^{abcd}\omega^{cd}_\circ\,,\quad
\omega^{ab}_\circ\gamma_{ab}
=\omega^{ab}_\circ\gamma_{ab}P_-\,.
\label{antiself-dual spin connection}
\end{align}
The condition $D\epsilon_+=d\epsilon_+=0$ is now trivial, since we may always find constant spinors.
Returning to the torsionful context, we may note an interesting consequence of the contrasting duality structures of $K^{ab}$ and $\omega_\circ^{ab}$.
In light of our underlying decomposition into self and antiself-dual two-forms, encoded in \eqref{decomposition}, the torsionful Riemann curvature should similarly factorise into
\begin{align}
R^{ab}=R_\circ^{ab}+F^i\eta^{iab}\,.
\label{Riemann decomposition}
\end{align}
In practice we may verify by inserting \eqref{self-dual contortion 1} and \eqref{antiself-dual spin connection} and contracting in the cross terms
\begin{align}
\omega_\circ^{ae}\wedge K^{eb}-\left(a\leftrightarrow b\right)
=\frac{1}{4}\delta^{[a}{}_{[b}\delta^c{}_f\delta^{e]}{}_{g]}\omega_\circ^{ce}\wedge K^{fg}-\left(a\leftrightarrow b\right)
=\omega_\circ^{be}\wedge K^{ea}-\left(a\leftrightarrow b\right)\,,
\end{align}
which obviously vanishes.
This then allows the convenience of separating the torsionful and torsion-free aspects of the analysis.
Returning to the gravitino, we already know that $\psi_+=D\epsilon_+=A\epsilon_+$ and so it simply remains to construct $\psi_-$.
Since the arguments of the previous section suggest that the solutions we seek should be trivial in the torsion-free limit, which in any case has no effect on $\psi_-$ thanks to \eqref{self-dual contortion 2}, it is evident that we require
\begin{align}
D\psi_-=d\psi_-+\frac{1}{4}\gamma_{ab}\omega_\circ^{ab}\wedge\psi_-=0\,,
\end{align}
and likewise for $D\overline\psi_-$.
In either case we may construct an appropriate solution incorporating again a constant anticommuting $\epsilon_+$, via
\begin{align}
\psi_{-}^{\dot A}
=2ie^a\left(\overline\sigma_a\right)^{\dot A A}\left(\epsilon_+\right)_A
=2e^a\gamma_a\epsilon_+\,,
\end{align}
where we have reinstated spinor indices for clarity.
Since negative chirality spinors such as $\gamma^a\epsilon_+$ are insensitive to the spacetime torsion $T^a\equiv De^a$ here, $D\psi_-$ should evidently vanish.
In practice $\overline\psi_-$ will actually be more important to us, the same argument gives
\begin{align}
\overline\psi_{-\dot A}
=2i\epsilon_+^A\left(\sigma_a\right)_{A\dot A}e^a
=-2\epsilon_+\gamma_ae^a\,.
\label{overline psi}
\end{align}
In light of our preliminary comments on Euclidean spinors it isn't entirely clear if we require some fixed relationship between barred and unbarred spinors here, although thankfully this isn't necessarily problematic.
Either we may independently set $\overline\psi_+$ and $\psi_-$ to zero, or, if some conventional mapping exists their contribution will in any case mirror that of $\psi_+$ and $\overline\psi_-$.
As such we restrict attention to $\psi_+$ and $\overline\psi_-$ in the following, this being the minimal set of spinors we require.
\subsection{Action \& equations of motion}
Given that $\psi_+=D\epsilon_+$, consistency of the theory should guarantee solution of the equations of motion, since the variation of the action under local supersymmetry is now proportional to the corresponding Euler-Lagrange equations.
We may nonetheless verify.
Varying the Rarita-Schwinger Lagrangian with respect to the gravitino, \eqref{Dpsi F relation} provides
\begin{align}
\delta\overline\psi_-\wedge\gamma^5\gamma\wedge D\psi_+
=-\delta\overline\psi_-\wedge\gamma\wedge \left(dA+A\wedge A\right)\epsilon_+\,.
\end{align}
The latter term may be rewritten, noting \eqref{self-dual contortion 2}, via
\begin{align}
\frac{1}{4}\gamma^b\gamma_{cd}\,K^{cd}\epsilon_+
=\frac{1}{4}\left(\gamma^{b}{}_{cd}+2\delta^{b}{}_{[c}\gamma_{d]}\right)K^{cd}\epsilon_+
=\gamma_{d}\,K^{bd}\epsilon_+
=P_-\gamma_{d}\,K^{bd}\epsilon_+\,,
\label{three gamma identity}
\end{align}
where $\gamma^{abc}\equiv\gamma^{[a}\gamma^b\gamma^{c]}=\epsilon^{abcd}\gamma_d\gamma^5$, giving
\begin{align}
\frac{1}{4}\gamma\wedge A\wedge A\epsilon_+
=\gamma^a K^{ab}\wedge e^b\wedge\psi_+
=\gamma^aT^a\wedge\psi_+\,.
\end{align}
This vanishes when the torsion constraint is satisfied thanks to the Fierz identity
\begin{align}
\gamma^a\left(\overline\psi\wedge\gamma^a\psi\right)\wedge\psi
=0\,,
\end{align}
which unsurprisingly also appears in proofs of local supersymmetry invariance \cite{Freedman:2012zz}.
Also,
\begin{align}
d\left(\overline\psi_-\wedge\gamma\right)
=2d\left(\epsilon_+\gamma^a\gamma^b e^b\wedge e^a\right)
=-4\epsilon_+\gamma^a\gamma^b\omega_\circ^{bc}\wedge e^c\wedge e^a
=0\,,
\end{align}
since, by the analogue of \eqref{three gamma identity}, $\gamma^b\omega_\circ^{bc}=P_+\gamma^b\omega_\circ^{bc}$.
Given that $d\delta\overline\psi_-=\delta d\overline\psi_-$, the remaining $dA$ term may therefore be rewritten as a total derivative.
Solution of the Rarita-Schwinger equations is then assured.
Since the torsion-free curvature obeys a duality condition, it follows that the associated equations of motion are satisfied with zero action, by virtue of the first Bianchi identity
\begin{align}
R^{ab}_\circ\wedge e^b\
=0\,.
\end{align}
As such, we need consider only the torsionful piece of the Einstein-Hilbert action.
Noting that the Rarita-Schwinger action vanishes on shell, we may expand
\begin{align}
\overline\psi_-\wedge\gamma^5\gamma\wedge D\psi_+
=\frac{1}{2}\epsilon_+\gamma_a\gamma_b\gamma_{cd}\,e^a\wedge e^b\wedge F^i\eta^{icd}\epsilon_+
=2\epsilon_+\gamma_a\gamma_c\,e^a\wedge e^b\wedge F^i\eta^{ibc}\epsilon_+\,,
\end{align}
where we have used the $\eta^{icd}$ analogue of \eqref{three gamma identity}.
The Fierz identity
\begin{align}
\chi_1\sigma^{ab}\chi_2=-\chi_2\sigma^{ab}\chi_1\,,
\label{Fierz identity}
\end{align}
then removes the antisymmetric piece of $\gamma_a\gamma_c$, leaving
\begin{align}
2e^a\wedge e^b\wedge F^i\eta^{iba}\epsilon_+\,\epsilon_+
=-\epsilon_{abcd}\, e^a\wedge e^b\wedge F^i\eta^{icd}\epsilon_+\,\epsilon_+\,,
\end{align}
where similarity with the torsionful piece of the Einstein-Hilbert Lagrangian is self-evident.
Since we may assume the normalisation $\left(\epsilon_+\right)^A\,\left(\epsilon_+\right)_A=1$ without loss of generality, the on-shell Einstein-Hilbert action evidently vanishes too.
Repeating these steps from a slightly different starting point also yields
\begin{align}
\overline\psi_-\wedge\gamma^5\gamma_b\delta e^b\wedge D\psi_+
=\epsilon_{abcd}\, \delta e^a\wedge e^b\wedge F^i\eta^{icd}\,,
\label{Einstein equations}
\end{align}
where we may recognise the latter term from variation of the Einstein-Hilbert Lagrangian.
Given the relative sign in \eqref{supergravity Lagrangian}, this then implies that the Einstein equations are also automatically satisfied.
A similar argument can be made to demonstrate invariance under $\delta\omega^{ab}$, and hence solution of the algebraic torsion constraint, but it is straightforward to simply note that
\begin{align}
\frac{1}{2}\overline\psi_-\wedge\gamma^b\psi_+
=-\frac{1}{4}\epsilon_+\gamma_a e^a\gamma^b\gamma^{cd}\wedge K^{cd}\epsilon_+
=K^{ba}\wedge e^a
=T^b\,,
\label{algebraic torsion constraint}
\end{align}
as required, where we have used \eqref{three gamma identity} and \eqref{Fierz identity}
\footnote{\,As the Einstein-Hilbert action yields a factor of two when varying $e^a$ or $\omega^{ab}$, whilst the Rarita-Schwinger action does not, we can be confident the correct $\overline\psi_-$ prefactor for \eqref{Einstein equations} is the same as for \eqref{algebraic torsion constraint}.}.
\subsection{Supersymmetry invariance}
In addition to satisfying the equations of motion, we furthermore require invariance under transformations of the form of \eqref{supersymmetry variations}.
Solutions which saturate a Bogomol'nyi bound are of course BPS and so should preserve only some fraction of the underlying supersymmetry, which in practice amounts to non-conservation of some of the supercharges $Q_\pm$.
In the context of `bosonic' supergravity solutions the background value of the gravitino is set to zero, so $\delta e^a$ is also zero and we need only demonstrate invariance under $\delta\psi$ to determine the residual global supersymmetry algebra of any solution.
Such an approach also evades the complications of spacetime torsion in that the background value of the contortion tensor will be zero.
In the present context, since we are instead seeking topologically non-trivial configurations for the gravitino field, no such simplification is possible.
There is however an obvious generalisation from the antiself-dual bosonic case, where we need only demonstrate that $\delta\psi_+$ is a symmetry of the theory, to the requirement of invariance under both constant shifts generated by $Q_+$,
\begin{align}
\delta\psi_+
=D\chi_+,\quad
\delta e^a
=-\frac{1}{2}\overline\psi_-\gamma^a\chi_+\,.
\end{align}
Since $\chi_+$ is constant it must be proportional to $\epsilon_+$, which then implies
\begin{align}
\delta\psi_+
\sim D\epsilon_+
=\psi_+,\quad
\delta e^a
\sim-\frac{1}{2}\overline\psi_-\gamma^a\epsilon_+
=\epsilon_+\gamma^b\gamma^a\epsilon_+e^b
=e^a\,,
\end{align}
where we have used the Fierz identity \eqref{Fierz identity}.
Evidently any solution is simply rescaled by some constant value and, as the constant of proportionality is the same for both fields, varying the total action simply rescales it by a fixed amount.
Invariance is nonetheless assured as the action vanishes regardless.
In the context of the full $\mathcal{N}=2$ supergravity, invariance of the $U\left(1\right)$ graviphoton field $V$ is also required.
It is however straightforward to note via \eqref{Fierz identity} that under the corresponding $Q_+$ transformation
\begin{align}
\delta V
=\frac{1}{2}\chi_+\,\psi_+
\sim\epsilon_+\gamma^{ab}\epsilon_+K^{ab}
=0\,.
\end{align}
As such, invariance under half of the underlying supersymmetry is still preserved.
\subsection{Explicit solutions}
These points established, we may now return to constructing solutions and their properties.
To fully isolate the fermionic degrees of freedom, we will specialise presently to the case of zero spacetime curvature.
In this case $\omega_\circ^{ab}$ vanishes, and the Riemann tensor becomes
\begin{align}
R^{ab}=F^i\eta^{iab}\,.
\label{F_K}
\end{align}
Whilst this background is certainly flat, we of course also require it to differ topologically from Euclidean spacetime
\footnote{\,Non-trivial topology needn't be an obstruction to the applicability of conventional instanton techniques, in that we may recognise a parallel between this situation and that of instanton calculus in singular gauge.
More specifically, on a formal level the use of singular gauge requires placing the theory on punctured Euclidean spacetime, which whilst flat, nonetheless also differs on a topological level from unpunctured spacetime \cite{Dorey:2002ik}.
Needless to say, this does not however impede the application of standard methods.}.
Since the topological invariants of supergravity are exactly those of general relativity \cite{Townsend:1979js}, albeit allowing for torsion, from \eqref{topological invariants} we then find
\begin{align}
\chi&=\frac{1}{16\pi^2}\int_\mathcal{M} \,R_{ab}\wedge *R^{ab}
=\frac{1}{4\pi^2}\int_\mathcal{M} F^i\wedge *F^{i}
=|k| \,,\nonumber\\
\label{fermionic invariants}
\tau
&=\frac{1}{24\pi^2}\int_\mathcal{M} \,R_{ab}\wedge R^{ab}
=\frac{1}{6\pi^2}\int_\mathcal{M} \,F^i\wedge F^{i}
=\frac{2}{3}k\,,
\end{align}
where $k$ is the instanton number from \eqref{Pontryagin number}
\footnote{\,That $\chi=\frac{3}{2}|\tau|$ here is coherent with the general properties of torsionful Riemannian geometry \cite{Ferreira:2011zzb}.}
\footnote{\,Our $\mathfrak{su\left(2\right)}$ convention is $T^a=i\vec\tau$, such that $\mathrm{Tr}\left(T^aT^b\right)=-\delta^{ab}$ and $\left[T^a,T^b\right]=-2\epsilon^{abc}T^c$.}.
Since we may construct every self-dual Yang-Mills connection here via the ADHM method, we may therefore construct all corresponding fermionic instantons on this background.
Reinstating the gravitational coupling
\footnote{\,The dimensionally corrected supersymmetry variation $\delta\psi=D\epsilon/\kappa$ implies that $[\epsilon]=-1/2$.},
this yields in the simplest case
\begin{align}
\psi_+
=\frac{1}{\kappa}A\epsilon_+
=\frac{1}{\kappa}\frac{x^a\sigma_{ab}}{x^2+\rho^2}\,e^b\,\epsilon_+ \,,
\label{BPST gravitino}
\end{align}
where $\epsilon_+$ is a constant spinor, and the analogy with \eqref{BPST instanton} is clear.
We may summarise a number of important further properties.
\begin{enumerate}
\item By virtue of the construction $\psi_+$ must have two degrees of freedom, exactly those of a massless gauge field and importantly, the requisite number for one half of a Dirac vector-spinor.
As any such gauge field is transverse, $\psi_+$ furthermore is.
\item Given their straightforward proportionality, the moduli space of these fermionic instantons is inherited from the corresponding Yang-Mills equivalent.
In the case of \eqref{BPST gravitino} we have eight moduli; four coordinates denoting the centre of the instanton, three determining an orientation within $SU\left(2\right)_+$, and one scale size.
Generalising to higher instanton numbers yields in general $8k$ moduli.
\item Compatibility with the Atiyah-Singer index theorem is self evident, in that for some arbitrary spinor $D\chi_+=d\chi_++A\wedge\chi_+$, exactly as we would have for a spinor in flat torsion-free spacetime in the background of a Yang-Mills instanton.
The number of zero modes of the Dirac operator is then correlated with the $8k$ collective coordinates $A$ possesses.
\item Since $A$ is asymptotically pure gauge, $\epsilon_+$ is asymptotically Killing, and $\psi_+$ is accordingly asymptotic to the supersymmetry transformation $\delta\psi=D\epsilon_+=0$ at infinity.
\item The global $U(1)$ chiral symmetry of $\mathcal{N}=2$ supergravity is violated by these solutions, as expected from the corresponding anomalous divergence relation $D*J\sim R^{ab}\wedge *R_{ab}$.
\end{enumerate}
Although for reasons of clarity we have specialised latterly to the case of zero spacetime curvature, the underlying construction presented in the previous sections is of course valid for general antiself-dual backgrounds.
Existing, and in some cases exhaustive, constructions of Yang-Mills instantons on ALE/ALF spaces \cite{NahmCalorons,KN,Bianchi:1995xd, Kraan:1998xe,Cherkis:2009jm,Cherkis:2010bn} may then be leveraged to arrive at corresponding fermionic solutions.
Conceivably one may also implement the extension of the ADHM method to non-commutative $\mathbb{R}^4$ \cite{Nekrasov:1998ss} to provide analogous solutions in non-commutative generalisations of supergravity \cite{Aschieri:2009mc}
\footnote{\,Intriguingly the requirement of a chiral gravitino, which motivates the present setting of $\mathcal{N}=2$ supergravity, is in fact enforced by the non-commutative $\mathcal{N}=1$ local supersymmetry in four dimensions.}.
In more general backgrounds, the topological invariants in \eqref{fermionic invariants} will of course receive contributions from both bosonic and fermionic sectors.
Since the curvature decomposition in \eqref{Riemann decomposition} is orthogonal, by virtue of mutually incompatible duality conditions, we have
\begin{align}
\chi=\chi_\circ+|k|\,,\quad
\tau=\tau_\circ+\frac{2}{3}k\,,
\end{align}
where $\chi_\circ$ and $\tau_\circ$ are respectively the Euler number and Hirzebruch signature of the gravitational background in question.
\section{Conclusions}
We have demonstrated the existence of a broad class of zero action, half-BPS solutions to the Euclidean equations of motion of supergravity, which we identify as fermionic instantons associated to the status of the gravitino as the gauge field of local supersymmetry.
These may be explicitly constructed in practice from self-dual Yang-Mills gauge fields and the Killing spinors of the torsion-free background.
By leveraging existing results from instanton calculus in this way we may construct all possible solutions on certain backgrounds, including asymptotically locally Euclidean spaces.
A further possibility also exists to implement the construction of instantons in non-commutative $\mathbb{R}^4$ within the known non-commutative generalisations of supergravity.
These fermionic instantons thereby constitute a novel class of topologically non-trivial supergravity backgrounds, which in contrast to conventional `bosonic' solutions feature non-vanishing fermionic character, and as a necessary consequence, spacetime torsion.
As an interesting aside, such backgrounds provide an explicit realisation of the scenario explored in \cite{Hanson:1978eg, D'Auria:1981yg} seeking to relate quantum gravity and superconductivity via spacetime torsion.
Therein, a gravitational Meissner effect was invoked to generate microscopic torsion vortices in an analogous fashion to the creation of magnetic flux vortices in type II superconductors, albeit at the cost of introducing a number of somewhat contrived features, including a spacetime dependent cosmological constant.
In the present context these torsion vortices are supplied by the gravitino instanton cores, which are in contrast natural phenomena within the context of supergravity.
Given the wide range of existing instanton applications and literature, and the fact that the solutions presented herein inherit their form from `conventional' gauge theory instantons, the primary task at hand seems to be to now import known results into this novel fermionic context.
This logic may of course also be extended beyond instantons to other topologically non-trivial phenomena, such as monopoles, vortices and domain walls.
Of course one needn't limit attention to topologically special solutions; we may also leverage these considerations to search for fermionic configurations of more prosaic character.
Going beyond the present minimal setting, we also note that there exists a wide array of supergravity and string theories in diverse dimensions, possessing varied field content and symmetry.
The utility and behaviour of these new solutions within such contexts is also naturally of interest.
One further aspect of particular importance is the need to understand the role of these solutions in the super-Higgs phase, given the relevance that this may have for modern-day phenomenology.
In closing, we also note that it is not necessarily guaranteed that the construction given here of fermionic instantons is complete.
Conceivably there may also be solutions which are not globally of the form $\psi=D\epsilon$.
The existence and possible properties of such configurations is then also an important open question.
\section*{Acknowledgements}
We wish to thank Richard Szabo and Tianjun Li for useful comments and proofreading.
|
\section{ Introduction}
There are several numerical approaches for dealing with problems of quantum dynamics
if a complicated time dependence is present in the Hamiltonian.
Here we are particularly concerned with problems in which a molecule is subjected to an external field.
In such cases, fast oscillations of the (classical) electromagnetic field and of
the wavefunction must be taken into account accurately, as for example in
quantum control algorithms which involve
the intensive use of numerical wavefunction propagation to handle strong molecules-laser coupling
\cite{shapiro2003,werschnik2007}.
If the external field is a continuous wave with a constant envelope and a single well defined frequency,
then the Floquet formalism is very well adapted and gives a basis of periodic solutions to the Schr\"odinger equation (the Floquet states)
\cite{Shirley,Sambe}.
In this case the problem is simplified to require only
the study of a single optical period of the field.
The Floquet states are generally not directly calculated in the time domain but rather via their Fourier coefficients in the frequency domain.
It shall also be noted that the Floquet approach
can be used to prove the equivalence of the purely
quantum approach and the semi-classical one (under some precise conditions) in the strong field
regime \cite{Bialynicki,Guerin2003}.
The standard Floquet approach must be generalized if the field is not a continuous wave.
If the intensity or the frequency of the electromagnetic field are slowly varied, good approximate results can still be obtained from the adiabatic variant of the Floquet
theory \cite{Guerin2003}.
However, the only exact and rigorous way to determine the wave packet evolution in the general case of a rapidly varying or chirped pulse
is to use an exact wavepacket propagation.
This is the topic treated here. Floquet states can still be calculated but they are called
generalized Floquet states and are associated with the total duration of the interaction.
We develop a propagation method which makes use of two important ideas.
The first idea is that, even in the case of a non-adiabatic or complicated pulse,
time-dependence can still be described by using a Fourier basis set,
instead of using the differential step by step scheme adopted by some well established methods \cite{leforestier1991,balakrishnan1997}.
Fourier grids methods have long been used to describe the molecular coordinates in wavepacket propagation
\cite{kosloff1983}.
They have not been so widely used to treat the time dependence of wavepackets, because the real wavepacket is not generally time-periodic.
We shall see that it is possible to resolve this apparent inconsistency by using absorbing potentials such as those introduced in ref. \cite{jolicard2004,leclerc2011}.
The second important idea which we use is that the quantum states are not all equally significant in a given propagation.
For example in a quantum control problem, the initial and the target states are of particular interest while
in a STIRAP process three states are mostly concerned \cite{vitanov2001}, etc.
It is clearly appropriate to reflect this hierarchy of importance in the numerical approach used to solve the Schr\"odinger equation.
In this article we take advantage of the subspace decomposition idea by relying on the time-dependent wave operator theory \cite{Jol3}.
The two main ideas outlined above have been combined to propose a global integration method for the Schr\"odinger equation
within the wave operator formalism in ref. \cite{Lecl2015}.
This first formulation was intended only for hermitian
Hamiltonians and was limited to the use of one-dimensional active spaces; it
appears to be
efficient for investigating near-adiabatic
evolutions. However for many processes such as dissociations,
ionization and more general strong non-adiabatic interactions
this first version cannot be used.
It is thus necessary to generalize it: first, to be able to describe dissipative processes
driven by non-hermitian Hamiltonians and second (and most importantly),
to handle multidimensional active spaces for strong non-adiabatic evolutions, relevant in situations where
the wavefunction escapes too far from a one-dimensional model space.
In section \ref{iterative_proc}
this generalization is achieved by introducing small multidimensional active spaces
in place of the one-dimensional ones
and by using asymptotic complex absorbing potentials to discretize correctly the interacting molecular continua.
Iterative formulae
are derived by combining the two techniques used in
the first version of the algorithm :
the Time Dependent Wave Operator (TDWO) formalism and the calculation of time-dependent integrals
by using fast Fourier techniques (FFT).
This leads to an iterative solution of the global dynamical problem.
Low dimensional effective Hamiltonians are analysed as tools
for measuring the more or less cyclic character of the dynamical processes
and close relationships
are revealed between this cyclic character and the relevance of using the TDWO theory.
In section \ref{num_examples}
we illustrate the algorithm
and the theoretical discussion
by studying a complete vibrational population transfer between the two
wells of a model energy surface representing a system under the influence of laser fields.
A second example describes
the dissociative dynamics of the H$_2^+$ molecular ion
coupled to a laser field. This example confirms the ability
of the method to treat dissipative processes,
if an appropriate multidimensional active space is used.
Section \ref{conclusion} gives a discussion and some concluding remarks.
\section{Time dependent wave operator using multidimensional model spaces \label{iterative_proc}
\subsection{Iterative calculation of the wave operator \label{itcalc}}
Let $\mathcal{H}$ be the Hilbert space associated with a molecular system and let $S_o$ be a model subspace of dimension $m$
which includes the initial molecular state.
The orthogonal projector corresponding to the model space is called $P_o$, with
$P_o^2=P_o$, $P_o^{\dag}=P_o$, $tr(P_o)=m$.
The time-dependent wave operator associated with the two subspaces $S_o$ and $S(t)$ is defined as \cite{Jol3}:
\begin{equation}
\Omega (t)=P(t)(P_oP(t)P_o)^{-1}=U(t,0;H)(P_oU(t,0;H)P_o)^{-1}
\label{WOD}
\end{equation}
where $P(t)$ are the projectors of the successive model spaces $S(t)$, with $S(t=0)=S_o$ and
where $U$ represents the quantum evolution operator associated with the Hamiltonian $H(t)$.
$P(t)$ is the time-dependent transformation of $P_o$ under the influence of the Schr\"odinger equation,
i.e. $P(t)=U(t,0;H)P_o U^{\dagger}(t,0;H)$.
The time-dependent wave operator is a generalization of the M{\o}ller wave operator
and can be used to deduce the true dynamics from the dynamics
within the $m-$dimensional subspace,
governed by $H^{eff}=P_o H\Omega$:
\begin{equation}
U(t,0;H)P_o=\Omega (t) U(t,0;H_{eff}).
\label{evop}
\end{equation}
However, the wave operator exists only if the
Fubini-Study distance between $P_o$ and $P(t)$ is small:
$dist_{FS}(P_o,P(t)) < \frac{\pi}{2}$ \cite{Vien1}.
This means that the real dynamics should not make the wavefunction escape too far from the selected initial subspace.
For strong couplings the limit value $\frac{\pi}{2}$ can easily be reached
if the subspace is the one-dimensional subspace associated with the initial state \cite{Lecl2015}.
The choice of a multidimensional model space $S_o$
which includes all the states which interact strongly with the inital state
can then reduce the Fubini-Study distance and
make the calculation possible.
The wave operator satisfies a Bloch equation in the extended Hilbert space $\mathcal{H} \otimes L_o^2([0,T])$
($T$ is the total duration of the dynamical process and $L_o^2([0,T])$ denotes the space of square integrable functions on
$[0,T]$ with periodic boundary conditions),
\begin{equation}
H_F(t)\Omega(t)=\Omega(t)(H(t)\Omega(t))=\Omega(t) H_{eff}(t).
\label{BAEQ}
\end{equation}
In the above equation $H_F(t)$ is the Floquet hamiltonian associated with the total duration,
$H_F(t)=H(t)-i\hbar \partial/\partial t$.
The main difficulty arising in this formalism is the integration of equation (\ref{BAEQ}).
Although the structure of eq. (\ref{BAEQ}) looks simple, this simplicity is deceptive.
First, this equation is not a pure series of instantaneous eigen-equations, since the time-derivative
present in $H_F$ in the left hand side couples together
the values of $\Omega(t)$ at different times.
Second, the integration of the
Schr\"odinger equation within this formalism
generally requires us to enforce the initial conditions.
If the interaction is located on the finite time interval $[0,T]$
and if the initial wave function $\Psi (t=0)$ is strictly included within the subspace $S_o$, then the integration of equation (\ref{BAEQ})
using tools such as Fourier basis sets
and Fast Fourier Transform (FFT)
can only give strictly T-periodic solutions.
Such solutions do not generally satisfy
the correct initial conditions except under special
adiabatic circumstances (for example
$\Psi (t=T) \propto \Psi (t=0)$).
To recover the correct initial conditions by using a periodic basis set,
we assume that the physical interaction is restricted to a time interval $[0,T_0]$, which is
shorter than the total time interval $[0,T]$ used to describe it numerically, with $T_0<T$.
Then a time-dependent absorbing potential is introduced over the artificial
time extension $[T_o,T]$.
$Q_o$ being the projector on the space complementary to the active space $S_o$ ($P_o+Q_o=1$),
the suitable absorbing potential is \cite{jolicard2004,leclerc2011}
\begin{equation}
V_{abs}=-iV_{opt}(t) \; Q_o
\label{VOPT}
\end{equation}
where $V_{opt}(t)$ is a real positive function localised on the time interval $[T_o,T]$. The results of the
dynamics are analysed at the final physical time $T_o$,
the behaviour of $\Omega$
during the asymptotic time extension being purely artificial
and having no influence back on the physical interval $[0,T_0]$.
Before going into more details about the numerical algorithm used to solve eq. (\ref{BAEQ}),
it is useful to clarify the general framework of the calculation.
In the following the Hamiltonian $H(t)$ which drives the dynamics
is the sum of an unperturbed Hamiltonian $H_o$, a time-dependent
coupling term $V(t)$
(corresponding to the electric dipole coupling $-\vec{\mu}.\vec{E}(t)$ in laser-molecule experiments)
and a time-dependent absorbing potential $V_{abs}$ (eq.\ref{VOPT}).
The Hilbert space $\mathcal{H}$ is assumed to be
truncated to a finite-dimensional space.
If the potential energy curves in $H_o$ are dissociative, a radial optical potential $\tilde{V}_{opt}(r)$
is introduced to discretise the continuum associated with the dissociative radial coordinate.
Finally the Hamiltonian operator is ($r$ is a composite molecular coordinate)
\begin{equation}
H(r,t) = H_o(r) + V(r,t) + \tilde{V}_{opt}(r) + V_{abs}(t).
\label{hamiltonien}
\end{equation}
A complete zeroth-order basis set $\{|j\rangle\}_{j=1,N_m}$
is made up of $N_m$ eigenvectors of $H_o$ (or $H_o+\tilde{V}_{opt}(r)$ if needed).
A Fourier basis set $\{|n \rangle\}_{n=1,N_t}$ with $\langle t|n\rangle=\exp (i 2\pi n t/T)$
is used to represent the space $L_o^2[0,T]$. Finally, if the active space is of dimension $m$,
the wave operator $\Omega$ is represented by $N_t$ rectangular matrices whose size is $(N_m\times m)$ corresponding
to each of the $N_t$ values of the Fourier frequencies (or equivalently to the $N_t$ discrete sampling values in time).
This series of matrices can also be recast into one single $((N_m.N_t) \times m)$ rectangular matrix.
By projecting equation (\ref{BAEQ}) on the left into the complementary space with projector
$Q_o$, with $P_o + Q_o =1$, and by introducing the reduced wave operator $X=Q_oXP_o$, with $\Omega= P_o +X$,
a new reduced equation is obtained:
\begin{equation}
Q_o(1-X(t))H_F(t)(1+X(t))P_o=0
\label{RBAEQ}
\end{equation}
where $H_F(t)$ includes the absorbing potential $V_{abs}(t)$.
An iterative solution of equation (\ref{RBAEQ}) has been proposed in \cite{Lecl2015} for a one-dimensional active space.
We now derive the solution in the case of a multidimensional active space.
By assuming that eq. (\ref{RBAEQ})
is not perfectly satisfied at the finite iteration order $(n)$, the right hand side of this equation being equal
to $\Delta^{(n)}(t)=Q_o(1-X^{(n)}(t))H_F(t)(1+X^{(n)}(t))P_o$
instead of
zero, one can introduce the increment $\delta X^{(n)}(t)$ such that $X^{(n+1)}(t) = X^{(n)}(t) + \delta X^{(n)}(t)$ exactly solves the equation.
Expanding eq. (\ref{RBAEQ}) leads to:
\begin{equation}
i \hbar \frac{\partial}{\partial t}\delta X^{(n)}(t) = \Delta^{(n)}(t)-\delta X^{(n)}(t) H_{eff}^{(n)}(t)
+ \tilde{H}^{(n)}_{diag}(t) \; \delta X^{(n)}(t)
\label{1diff}
\end{equation}
with
\begin{eqnarray}
\left \lbrace \begin{array}{l}
\tilde{H}^{(n)}_{diag}(t)=Q_o[H(t)-X^{(n)}(t)H(t)]_{diag} Q_o \\
H_{eff}^{(n)}(t)=P_o H(t) \Omega^{(n)}(t)=P_o H(t)(P_o+X^{(n)}(t))
\end{array} \right .
\label{TOTAL}
\end{eqnarray}
To derive eq. (\ref{1diff}), some approximations, previously tested in ref. \cite{Lecl2015}
with $m=1$,
have been introduced.
The quadratic terms with respect to the increment $(\delta X^{(n)}(t))$ and the
non-diagonal elements of $Q_o[H(t)-X^{(n)}(t)H(t)]Q_o$
have been neglected. This leads in the multidimensional case to the following rigorous solution of equation (\ref{1diff}),
\begin{eqnarray}
&\delta X^{(n)}(t) &= U(t,0;\tilde{H}^{(n)}_{diag}) \nonumber \\
&&\times \left[ \frac{1}{i\hbar}\int_0^t U^{-1}(t',0;\tilde{H}^{(n)}_{diag})
\Delta^{(n)}(t') U(t',0;H_{eff}^{(n)})dt' \right] \nonumber \\
&& \times U^{-1}(t,0;H_{eff}^{(n)}),
\label{Sol1}
\end{eqnarray}
where the letters
$U$ represent the quantum evolution operators.
At a fixed time $t$,
$\Delta^{(n)}(t)$ is a $(N_m \times m)$ rectangular matrix,
$U(t,0;\tilde{H}^{(n)}_{diag})$ is a diagonal matrix with $(N_m)$ entries
and $U(t,0;H_{eff}^{(n)})$ is a small $(m\times m)$ matrix.
\subsection{Discrete implementation of the iterative solution}
To integrate eq. (\ref{Sol1}), a procedure based on
Fast Fourier Transforms is used.
A discrete finite time-grid is introduced
on the time interval $[0,T]$:
\begin{equation}
t_j=\frac{jT}{N_t}, \;\; j=0,\ldots,N_t-1,
\label{TGRID}
\end{equation}
together with the corresponding frequency representation:
\begin{eqnarray}
\left \lbrace \begin{array}{l}
\nu_j=\frac{j}{T}, \;\;j=0,\ldots,\frac{N_t}{2}-1, \\
\nu_{N_t/2}=-\frac{N_t}{2T},\\
\nu_j=-\nu_{N_t-j}, \;\; j=\frac{N_t}{2}+1,\ldots,N_t-1
\end{array} \right .
\label{NUGRID}
\end{eqnarray}
In eq.(\ref{Sol1}), the various terms are discretized by using the time-grid representation (eq. (\ref{TGRID})).
The calculation of $U(t_j,0;H^{(n)}_{eff})$ takes advantage of the small dimension of the $(m \times m)$ matrix $H^{(n)}_{eff}$.
The evolution operator associated with $H^{(n)}_{eff}$ is calculated using
\begin{equation}
U(t_k,0;H^{(n)}_{eff})=\prod_{j=1}^{k}U(t_j,t_{j-1};H^{(n)}_{eff}),\;k=0,\ldots , N_t-1.
\label{Produc}
\end{equation}
The time evolution associated with $H^{(n)}_{eff}$ between two adjacent discrete time is
approximated by
\begin{equation}
U(t_{j},t_{j-1};H^{(n)}_{eff}) = \exp \left(-\frac{i}{\hbar}\int_{t_{j-1}}^{t_{j}} H^{(n)}_{eff}(t') dt' \right)
\label{Ueff}
\end{equation}
and its action on an arbitrary vector is obtained by diagonalizing the matrix
$\int_{t_{j-1}}^{t_{j}} H^{(n)}_{eff}(t') dt'$.
In eq. (\ref{Sol1}) the matrix $H^{(n)}_{eff}$ exhibits
large time variations and it is essential to retain the exact expression and to make a precise calculation of
$U(t',0;H^{(n)}_{eff})$.
To do this, numerous numerical integrals are needed in eq. (\ref{Ueff}).
At each iteration order $(n)$ the $m^2$ components $[H^{(n)}_{eff}]_{k,l}$ are integrated on the time interval
$[0,T]$ by using the FFT procedure
proposed in ref.\cite{Lecl2015}.
This method requires only two FFT to obtain the $N_t$ definite integrals corresponding to
all the intermediate intervals $t_j$ in eq. (\ref{Ueff}).
The calculation of the evolution operator associated with the matrix $H^{(n)}_{diag}$
can also be done by using a Fourier algorithm.
This matrix includes the asymptotic absorbing potential $V_{opt}(t)$
which can produce numerical instabilities during the discrete calculation of the integrals
(because of its real exponential behavior).
To solve this difficulty, this absorbing potential has been neglected in the term
$U^{-1}(t',0;\tilde{H}^{(n)}_{diag})$
inside the integral $\int_0^t (\ldots)$ (c.f. eq.(\ref {Sol1}))
and has been simultaneously preserved in the term $U(t,0;\tilde{H}^{(n)}_{diag})$ on the left
in order to impose the correct initial conditions.
These apparently arbitrary approximations are justified a posteriori
by the convergence of the iterative solution.
The matrix $\tilde{H}^{(n)}_{diag}$ is diagonal.
The operator $U^{-1}(t',0;\tilde{H}^{(n)}_{diag})$ can be easily calculated as
\begin{equation}
U^{-1}(t',0;\tilde{H}^{(n)}_{diag})=\exp \left( \frac{i}{\hbar}H_o t' \right) \exp \left( \frac{i}{\hbar}\int^{t'}_0\delta \tilde{H}^{(n)}_{diag}dt'' \right).
\label{Udiag}
\end{equation}
with $\delta\tilde{H}^{(n)}_{diag}=\tilde{H}^{(n)}_{diag}-H_o$.
Introducing (\ref{Udiag}) in eq.(\ref{Sol1}) and using the new time-dependent matrix $\Lambda^{(n)}(t)$
defined as
\begin{equation}
\Lambda^{(n)}(t)=\exp \left(\frac{i}{\hbar}\int^{t}_0 \delta{\tilde{H}}^{(n)}_{diag} dt' \right) \, \Delta^{(n)}(t) \, U(t,0;H^{(n)}_{eff}),
\label{DeltTTF}
\end{equation}
eq. (\ref{Sol1}) can be rewritten as
\begin{eqnarray}
\delta X^{(n)} &=& e^{-\frac{i}{\hbar} H_o t} e^{-\frac{i}{\hbar} \int_0^t \delta \tilde{H}_{diag}^{(n)} dt'}
\left( \frac{1}{i\hbar} \int_0^t e^{\frac{i}{\hbar} H_o t'} \Lambda^{(n)} (t') dt' \right) \nonumber \\
&& \times U^{-1} (t,0;H^{(n)}_{eff}).
\label{deltaXint}
\end{eqnarray}
Using the Fourier transform $\tilde{\Lambda}$ of $\Lambda$, such as
\begin{equation}
{\Lambda}^{(n)}( t ) = \int_{\nu} \tilde{\Lambda}^{(n)}(\nu) \exp( i 2\pi\nu t) d\nu,
\end{equation}
eq. (\ref{deltaXint}) can be rearranged in the following form
\begin{eqnarray}
\delta X^{(n)}(t)&=&\exp \left(-\frac{i}{\hbar}\int^{t}_0\delta \tilde{H}^{(n)}_{diag}dt' \right) \nonumber \\
&\times& \left[-Z^{(n)}(t)+\exp \left(-\frac{i}{\hbar}H_o t \right) Z^{(n)}(t=0) \right]
\nonumber \\
&\times & U^{-1} (t,0;H^{(n)}_{eff})
\label{Eqfinal}
\end{eqnarray}
where the matrix $Z^{(n)}$
is obtained by using two back and forth Fourier transforms,
\begin{equation}
Z^{(n)}(t)=FT^{-1}_{(t)} \left[ \frac{FT_{(\nu)}(\Lambda^{(n)}(t) )}{H_o +2\pi \hbar \nu} \right].
\label{Zeq}
\end{equation}
The matrix elements of $Z^{(n)}$ in eq. (\ref{Zeq}) are calculated by using the discretized time/frequency introduced in
eqs (\ref{TGRID}) and (\ref{NUGRID}) and by approximating the Fourier Transforms by discrete Fast Fourier Transforms.
Finally the incrementation rule
\begin{equation}
X^{(n)}=X^{(n-1)} +\delta X^{(n-1)}
\label{Incr}
\end{equation}
and the equations (\ref{DeltTTF}), (\ref{Eqfinal}) and (\ref{Zeq})
constitutes
the iterative scheme leading to the wave operator and
to all the columns of the evolution operator (eq. (\ref{evop})) issuing from subspace $S_o$.
Any wavefunction whose initial state belongs to $S_o$
can be written as
\begin{equation}
|\Psi^{(n)}(t)\rangle=(P_o + X^{(n)}(t)) U(t,0;H^{(n)}_{eff})|\Psi (t=0)\rangle.
\label{PropGlob}
\end{equation}
Some approximations have been introduced
within the above iterative scheme.
Nevertheless the algorithm is global
and these approximations
cannot induce any of the cumulative errors found in a standard differential propagation scheme.
The iterative procedure is stopped when the
following convergence criteria is satisfied:
\begin{equation}
||\delta X^{(n)}||^2/||X^{(n)}||^2 \leq \epsilon \\
\label{IterStop}
\end{equation}
where $\epsilon$ is a fixed convergence factor
and $||.||$ denotes the Frobenius norm.
The solution which satisfies
eq. (\ref{IterStop}) is necessarily the correct and unique solution of the
propagation problem with
an accuracy specified by $\epsilon$.
We would like to stress the fact that a calculation with a subspace of
dimension $m'>m$ gives more results than the calculation
with a subspace of dimension $m$, because more columns of the evolution operator are obtained.
At the same time more columns have to be treated by the Fourier transform steps.
As long as $m$ remains small this part of the calculation takes most of the CPU time.
This CPU time increase is linear with $m$ and even if other parts of the calculation
are not (several matrix products cost $m^2$ and the effective Hamiltonian diagonalizations cost $m^3$)
the final CPU time increase is about linear. Moreover an increase of $m$ can
produce a strong acceleration of the convergence, leading to a final decrase of the total CPU time.
\subsection{Cyclic dynamics and wave operator}
The iterative solution proposed in the previous subsection is relevant for dynamical processes in which the wavefunctions does not escape very far from the model subspace.
The quantum distance between the dynamically developing subspace and the model space $S_o$ can be monitored by using the Fubini-Study distance between
$S_o$ and $S(t)$, namely $dist_{FS}(S_o,S(t))$.
This distance goes from $0$, when the two subspace are equal, and increases to reach its maximum possible value
of $\pi/2$ when the subspaces are orthogonal. This situation could make the iterative algorithm diverge.
If $|i\rangle$ is the initial state and
the wavefunction is $\ket{\Psi_i(t)} = U(t,0;H) \ket{i}$,
the Fubini-Study distance corresponding to a one-dimensional active space is simply equal to:
\begin{equation}
dist_{FS}(S_o,S(t))=
\arccos \left( \parallel \langle i \vert \Psi_i (t) \rangle \parallel \right) = \arccos \left( \frac{1}{\parallel \Omega (t) \parallel} \right).
\label{FSD}
\end{equation}
Eq. (\ref{FSD}) indicates that the limit value is reached if the survival probability vanishes at a given time,
which is equivalent to say that the wave operator diverges at the same time.
There are two different approaches to overcome the possible difficulty due to nearly-orthogonal subspaces.
In ref. \cite{Vien1} time-dependent adiabatic deformations of the active space are shown to be efficient
for describing almost adiabatic quantum systems.
Here
we adopt another point of view and we try to improve the
integration scheme by using multidimensional active spaces in the global integration procedure.
In the multidimensional case, the above definition of the quantum distance is generalized to give
\begin{equation}
dist_{FS}(S_o,S(t))= \arccos \vert \det{ \left( \bf{P_o^{\dagger} . ( U(t,0;H) P_o)} \right)} \vert .
\label{FSD2}
\end{equation}
where $ \bf{P_o^{\dagger} . ( U(t,0;H) P_o) }$ designates the matrix representation of the operator
$ P_o^{\dagger} . ( U(t,0;H) P_o) $ .
The conditions for this distance to reach its limit value of $\pi/2$ are less easily satisfied
and the convergence of the iterative scheme becomes more robust.
In this context cyclic dynamics are a particular case of special interest.
In this case the wavefunction issuing from subspace $S_o$ comes back to $S_o$ at time $T$.
A cyclic dynamics, with respect to the subspace $S_o$ of dimension $m$,
can be defined as follows:
$\forall i \in [1,m]$, let $\Psi_i^o(t)$ be the solution of the Schr\"odinger equation with the
initial condition $\Psi_i^o(t=0)=|i\rangle$, then there exists a unitary gauge transformation $W$ such that
$\Psi_i^o(t)=\sum_{j=1}^m W_{ji}(t) \tilde{\Psi}_j^o(t)$
with $\tilde{\Psi}_i^o(0)=|i\rangle=\tilde{\Psi}_i^o(T)$.
This condition implies
\begin{equation}
P_o \Psi(T)=\Psi(T)
\end{equation}
and by taking eq. (\ref{PropGlob}) into account,
\begin{equation}
X^{N}(t=0)=X^{N}(t=T)=0.
\label{Cycl}
\end{equation}
This means that the TDWO is also cyclic with $\Omega(T)=\Omega(0)=P_o$.
For any Hamiltonian,
a perfect
artificial
cyclic dynamics can always be obtained, independently of the $m$ value, by adding a time-dependent absorbing potential
(eq.(\ref{VOPT})) on the time extension $[T_o,T]$.
This constrained cyclicity is a numerical artefact
which can be seen as the multidimensional generalization of the constrained adiabatic trajectory method
(CATM) of ref. \cite{jolicard2004,leclerc2011}.
A true cyclic (or maybe quasi-cyclic) dynamics can also be obtained in particular cases
by the natural evolution on $[0,T_0]$,
without introducing any artificial absorbing potential.
In the case of a natural cyclicity, eq.(\ref{Cycl}) may not be rigorously satisfied.
Nevertheless, the asymptotic values $X^N(0)=X^N(T)$, even when not exactly equal to zero,
may be small enough to consider the dynamics as cyclic. We will see later
that such a naturally cyclic situation has beneficial consequences on the convergence of the iterative process.
The main question is to select,
with or without an absorbing potential,
the best active space at a fixed small degeneracy, with order $m \not= 1$.
In most cases the choice of the model space should be based on physical considerations,
thus including the initial state, strongly coupled states and states corresponding to resonant transitions.
Choosing too small a dimension $m$ may produce too large a Fubini-Study distance between $S_o$ and $S(t)$.
Including more states in the subspace avoids such problems.
Cyclic dynamical processes belong to
the framework of the non-abelian, non-adiabatic Berry phase formulation,
known as the non-Abelian Aharonov-Anandan phase formulation \cite{Aha}.
This theory is consistent with the wave operator approach used in this article.
More precisely
if $\{\Psi_i^o(t)\}_i$ is a non-abelian
parallel transport associated with the section $\{\tilde{\Psi}_i^o\}_i$, then $\{\Omega \Psi_i^o\}_i$ is
a non-abelian parallel transport associated with the section $\{\Omega \tilde{\Psi}_i^o\}_i$ \cite{Vien2}.
In this cyclic context, important results
can be derived by considering the expansion of the wave function on
the Floquet eigenstates basis set.
In the extended Hilbert space $\mathcal{H} \otimes L_o^2([0,T])$,
the generalized Floquet eigenstates are defined as solutions of the following equation:
\begin{equation}
H_F \ket{\lambda_{j,n}} = E_{j,n} \ket{\lambda_{j,n}}
\end{equation}
where $H_F=H-i\hbar \partial/\partial t$.
The label $n$ corresponds to the different Floquet blocks of eigenstates
and $j$ distinguishes the states within each block
(this index is associated with the molecular Hilbert space).
The eigenfunctions $|\lambda\rangle$ are $T-$periodic on the full interaction interval $[0,T]$
and satisfy the orthonormality condition \cite {Chu89}
\begin{equation}
\langle\langle \lambda_{i',n'}|\lambda_{i,n}\rangle\rangle=\frac{1}{T}\int_0^T dt \langle
\lambda_{i',n'}|\lambda_{i,n}\rangle=\delta_{i',i}\delta_{n',n}.
\label{Ortho}
\end{equation}
The wavefunction can be expanded
on a complete set of Floquet eigenvectors,
\begin{equation}
|\Psi (t)\rangle=\sum_{j=1}^{N_m}\sum_{n=0}^{N_t-1} e^{-iE_{{j,n}}t/\hbar}|\lambda_{j,n}(t)\rangle
\langle\langle \lambda_{j,n}|\Psi(t=0) \rangle\rangle.
\label{DevLam}
\end{equation}
By taking into account the periodicity of
the Floquet blocks,
the double summation in eq.(\ref{DevLam})
can be reduced
to a unique one in the first Brillouin zone without introducing any approximation:
\begin{equation}
|\Psi (t)\rangle=\sum_{j=1}^{N_m}e^{-iE_{{j,0}}t/\hbar}|\lambda_{j,0}(t) \rangle \langle \lambda_{j,0}(t=0)|\Psi(t=0)\rangle
\label{Dev2}
\end{equation}
In the case of a cyclic dynamics within a $m$-dimensional subspace,
\ref{appA} demonstrates that the sum in eq.(\ref{Dev2}) is limited to only $m$ terms.
The wavefunction starting at $\ket{\Psi_i(0)}=\ket{i}$ can be written as
\begin{eqnarray}
\left \lbrace \begin{array}{l}
\vert \Psi_i(t) \rangle =\sum_{j=1}^m e^{-\frac{i}{\hbar}E_{j,0}t} |\lambda_{j,0}(t)\rangle U_{ji} \\
U_{ji}=\langle \lambda_{j,0}(0)|i\rangle
\end{array} \right .
\end{eqnarray}
and
the $m$ relevant Floquet eigenstates have, at the two boundaries $t=0$ and $t=T$,
non-vanishing components within the $S_o$ space exclusively,
\begin{equation}
Q_o |\lambda_{j,0}(0)\rangle=Q_o |\lambda_{j,0}(T)\rangle=0,\; j=1,\ldots , m.
\label{Bound}
\end{equation}
In \ref{appA} we also show that the Floquet eigenvalues $E_{j,0}$ and the $m$ components
of the corresponding eigenstates within $S_o$ at $t=0$ can be easily derived from the time-dependent waveoperator.
In numerical examples, the comparison of the solutions of eq.(\ref{BAEQ}) on the interval $[0,T_o]$, obtained with and without
temporal absorbing potential,
will give us an indication about the
naturally
cyclic character of the dynamics driven by $H(t)$.
The absorbing potential introduced in the interval
$[T_o,T]$ is useless if the dynamics of the wave function is purely cyclic within the
finite active subspace $S_o$.
In what follows we will select situations and laser parameters such that controlled population exchanges
are obtained which are close to such naturally cyclic dynamics.
\section{Two illustrative examples \label{num_examples}}
\subsection{STIRAP in an asymmetric double-well}
Figure \ref{Potential1} shows two potential curves for a model diatomic molecule submitted
to two laser pulses.
These two curves are defined as quartic polynomials,
$\epsilon_1(R)= -5 R^2 + 0.5 R^3 + R^4 $ and
$\epsilon_2(R)= 0.2 R^4$.
They can refer to two electronic states of a 1D vibrational Hamiltonian
in the framework of the Born-Oppenheimer approximation.
Similar potentials are also obtained in effective isomerization problems along a reaction coordinate \cite{Chen12},
or to describe the nitrogen inversion within an one dimensional method,
the asymmetry of the potential appearing when the molecule is put down on a surface.
In all this subsection, arbitrary units (arb. u.) are used with $\hbar=1$
and the various numerical parameters have been adjusted to produce realistic dynamics.
The dipole moment which couples $\epsilon_1$ with $\epsilon_2$ is given an arbitrary constant unit value.
\begin{figure}[htp]
\centering
\includegraphics[width=0.8\linewidth]{fig01_Potentiel_2.ps}
\caption{Potential energy curves and first vibrational eigenstates
of $\epsilon_1(R)$ (full lines) and of $\epsilon_2(R)$ (dashed lines).
The thick lines correspond to the initial, target and intermediate states.
}
\label{Potential1}
\end{figure}
The selected laser
pulses are chosen to produce a complete transfer between the two asymmetric wells of the first surface.
In figure \ref{Potential1}, the vibrational state $(v=0,S=1)$ localized in the first well and
the state $(v=5,S=1)$ localized in the second well have in common a strong overlap with
state $(v=6,S=2)$.
To obtain a stimulated Raman adiabatic passage \cite{vitanov2001,Shore2008}
the laser field
which couples the two surfaces is chosen as the sum of two pulses
with gaussian envelopes and carrier frequencies in resonance with the transitions $(v=0,S=1) \rightarrow (v=6,S=2)$
and $(v=6,S=2) \rightarrow (v=5,S=1)$:
\begin{equation}
E(t)=\sum_{j=1}^2 E_j \cos \left(\omega_j(t-T_j)\right) \exp\left(-\left(\frac{t-T_j}{\tau_j}\right)^2\right)
\label{Echamp}
\end{equation}
with the following numerical parameters
\begin{eqnarray}
\left \lbrace \begin{array}{l}
E_1=0.03,\; \omega_1=4.77725153, \; T_1=250, \; \tau_1=125 \\
E_2=0.03, \; \omega_2=9.9844894, \; T_2=360, \; \tau_2=125
\end{array} \right .
\label{IterPara}
\end{eqnarray}
The nuclear dynamics is governed by the time-dependent Schr\"odinger equation within the framework
of the dipole approximation.
\begin{equation}
i \frac{\partial}{\partial t} U(t,0)=\left[ T_N +\left(
\begin{array}{cc}
\epsilon_1 & -\vec{\mu}_{1,2}.\vec{E}(t) \\
-\vec{\mu}_{1,2}.\vec{E}(t)& \epsilon_2
\end{array}\right) \right] U(t,0)
\label{dynbas}
\end{equation}
where $T_N$ is the relative kinetic energy of the two atoms.
This dynamics is described within a basis set made of
the 30 first vibrational eigenstates for each surface (namely $N_m=60$) and
$N_t=65536$ sampling time values (c.f. eq. \ref{TGRID})
equally distributed over the time interval $[0,T=800]$ and with a time-dependent absorbing potential
(eq. \ref{VOPT}, subsection \ref{itcalc}) localised on the time interval $[600,800]$.
Thirty states per surface are sufficient to give convergence of the calculations with the selected
laser amplitudes and laser frequencies.
A first calculation is made with the wave operator formalism proposed in \cite{Lecl2015}
by using a one-dimensional active space based
on the initial state $(v=0,S=1)$.
This choice produces a strong divergence of the algorithm from the start of
the iterative procedure.
\begin{figure}[htp]
\centering
\includegraphics[width=0.8\linewidth]{fig02_OUP0.ps}
\caption{Evolution of the populations of the initial state, $(v=0,S=1)$, the
target state $(v=5,S=1)$ and the
intermediate state $(v=6,S=2)$ during the molecule-laser interaction.}
\label{Transfer}
\end{figure}
We then applied the formalism of the present paper by using multidimensional active spaces
of increasing dimension.
A second attempt used an active space made up of two states:
the initial state $(v=0,S=1)$ and the target state
$(v=5,S=1)$.
A third attempt involves adding the intermediate state $(v=6,S=2)$ to these two states.
Finally a fourth calculation includes the quasi-resonant states $(v=16,S=2)$ and $(v=6,S=1)$
together with the three previous states
to constitute an active space $S_o$ of dimension $m=5$.
The second choice $(m=2)$
produces, like the first one,
a strong and rapid divergence of
the iterative calculation.
On the contrary the use of the active spaces of dimension $=3$ and $m=5$ lead to converged results, with a much better
precision in the last case $m=5$.
The table (\ref{Table1a}) shows the convergence factor (cf eq. (\ref{IterStop}))
\begin{table}
\begin{tabular}[t]{|c|c|c|c|c|c|c|c|}
\hline Convergence
& \multicolumn{7}{c|}{Iteration number} \\
\cline {2-8}
Factor&n=1&n=2&n=3&n=4&n=5&n=6&n=7\\
\hline
$F^{(m=3)}_n$&2.11 E-02&1.58 E-03&2.09 E-04&4.89 E-04&2.86 E-04&7.78 E-04&4.21 E-04 \\
$F^{(m=5)}_n$&2.22 E-02&1.33 E-03&3.03 E-05&1.29 E-06&1.98 E-07&1.20 E-07&2.00 E-07 \\
\hline
\end{tabular}
\caption{The convergence factor $F^{(n)}_m=||\delta X^{(n)}||^2/||X^{(n)}||^2$ (eq.(\ref{IterStop}))
with respect to the iteration number $n$ for active subspaces of dimension $m=3$ and $m=5$.}
\label{Table1a}
\end{table}
In spite of a much better convergence in the case $m=5$ than in the case $m=3$ the two calculations give
undistinguishable results in figure \ref{Transfer} with an almost complete transfer of population.
We note that the transfer is not perfectly complete ($P(t=T)_{v=0\rightarrow v=5}=0.9896$)
and that the occupation of the
%
intermediate state ($v=6,S=2$) is not strictly equal to zero during the interaction.
\begin{figure}[htp]
\centering
\includegraphics[width=0.8\linewidth]{fig03_PSINOR3.ps}
\caption{Fubini-Study distance (\ref{FSD2}) as a function of time by using a one-dimensional active space
including only the initial state ($v=0,S=1$) (broad full line with a plateau at about $\pi/2$
for $t \geq 400$),
a multidimensional active space of dimension $m=2$ including the
initial state and the target
state ($v=5,S=1$) (full line),
a multidimensional active space of dimension $(m=3)$ obtained by
adding the intermediate state ($v=6,S=2$) to the two previous states (dashed line)
and finally an active space of dimension $m=5$ by adding to the three preceding states
the states ($v=16,S=2$) and ($v=6,S=1$) (broad full line).}
\label{Wonorm}
\end{figure}
The drastically different behaviours observed during the iterative process when the dimension $m$ changes can be understood
by analysing the corresponding Fubini-Study distances \cite{Vien3} between
the active spaces at the initial instant $t=0$ and
at the current time $t$ (see figure \ref{Wonorm}).
The maximum value of $\pi/2$ associated with the notion of quantum incompability of active spaces
is reached in the non-degenerate case ($m=1$) when the population of the initial state tends to zero, i.e. when the
complete population transfer between ($v=0,S=1$) and ($v=5,S=1$) is achieved. This limit produces the divergence of the
one dimensional wave operator, since $||\Omega (t)||=||1/\langle i|\Psi(t)\rangle ||$ and indirectly that of the
effective Hamiltonian $H_{eff}(t)=P_oH(t)\Omega(t)$ which drives the dynamics within
the active subspace.
On the contrary one can observe in figure \ref{Wonorm} that, in the $m=3$ and $m=5$ cases,
the FS distance is far from its limit
$\pi/2$ value at every time. In the last case ($m=5$), this distance even tends to very small values when
the laser is turned off.
These small FS distances illustrate the quantum compatibility of the successive active spaces at any time and induce a fast convergence of the iterative algorithm.
\begin{figure}[htp]
\centering
\includegraphics[width=0.8\linewidth]{fig04_OUP0inv.ps}
\caption{Populations of
the three states ($v=0,S=1$), ($v=5,S=1$) and ($v=6,S=2$) when the laser field
used in the STIRAP experiment (figure \ref{Transfer}) drives a dynamics
starting from the target state ($v=5,S=1$) (full line).
The evolutions of states ($v=0,S=1$) and ($v=6,S=2$) are represented by a dashed line and a broad full line, respectively.}
\label{Evoinv}
\end{figure}
The failure in the case $m=2$ can be understood by comparing figures \ref{Wonorm} and \ref{Evoinv}.
Because all the evolutions starting from the $S_o$ subspace are calculated as a whole,
we shall also look at the one issuing from the target state (cf. figure \ref{Evoinv}).
The comparison with figure \ref{Wonorm} reveals that the eight discrete time values for which the FS distance is close to $\pi/2$
(figure \ref{Wonorm})
are identical
to the time values for which the occupations of the states ($v=0,S=1$) and ($v=5,S=1$)
decrease to zero simultaneously (figure \ref{Evoinv}). This situation is produced by the Rabi oscillations which
affect the initial state $(v=5,S=1)$ for $t<300$ and the state $(v=0,S=1)$ for $t>300$ in this case.
As a consequence, the $(2 \times 2)$ matrix $P_o^{\dagger} [ U(t,0;H)] P_o$ which leads to
the FS distance (equation \ref{FSD2}),
exhibits, at these eight discrete time values, a column
corresponding to the initial state ($v=5,S=1$) equal to zero and consequently a FS distance close to $\pi/2$.
Figure \ref{Evoinv} shows that other Rabi oscillations affect the intermediate state ($v=6,S=2$) but the zero values of these
oscillations correspond to maximum values of the oscillations affecting the initial state ($v=5,S=1$) and the state ($v=0,S=1$). This
explains why correct results with small FS distances are obtained by using an active space of dimension $m=3$.
The best choice for the active space is the one with dimension $m=5$.
This choice induces FS distances wich remain very small at all times.
Moreover these distances converge to very small values when the laser field is turned off (figure \ref{Wonorm}),
indicating that the wave function is, at the end, projected onto the initial $S_o$ subspace.
In other words the dynamics is approximately cyclic within this 5-dimensional subspace.
The selection rules used to build the subspace are simple. The subspace should include the initial and
the target state, namely ($v=0,S=1$) and ($v=5,S=1$) in the STIRAP experiment.
The subspace should also include states which are strongly coupled to these first two ones by near resonant effects,
$E(v=6,S=2)-E(v=0,S=1) \simeq \hbar \omega_2$ and $E(v=16,S=2)-E(v=5,S=1) \simeq \hbar \omega_2$.
Finally the state $(v=6,S=1)$, which is not in exact resonance,
has been added to these first four states.
It is weakly populated during the interaction.
In the one-dimensional subspace case,
the divergence of the wave operator is related to the complete population transfer between
$(v=0,S=1)$ and $(v=5,S=1)$.
This also produces a divergence in the effective Hamiltonian $H_{eff}(t)=P_o H(t) \Omega (t)$ which
drives the dynamics within the active subspace.
On the contrary, the use of an active subspace of dimension $m=5$, induces
a $(5 \times 5)$ $H_{eff}$ matrix whose components are always finite.
\begin{figure}[htp]
\centering
\includegraphics[width=0.45\linewidth]{fig05_O11HEFF.ps}
\includegraphics[width=0.45\linewidth]{fig09_O32HEFF.ps}
\caption{Shift from the non-perturbed values of the
diagonal matrix elements (modulus) of $H_{eff}$, for the initial state $(v=0,S=1)$ (left frame).
The right frame represents the coupling amplitude between states $(v=5,S=1)$ and $(v=6,S=2)$ }
\label{HEFFd}
\end{figure}
The diagonal element showing the largest shift is the one
which corresponds to the initial state $(v=0,S=1)$ and it is presented in
figure (\ref{HEFFd}). It exhibits relatively small modulations
compared with the spacing between the non-perturbed eigenvalues,
$E(v=5,S=1)-E(v=0,S=1) \simeq 5.207 $ arb.u. and $E(v=6,S=2)-E(v=0,S=2) \simeq 9.984 $ arb.u.
Nevertheless correct solutions are obtained if, and only if
these modulations are taken into account during the calculation.
The non-diagonal couplings are much larger,
especially the direct couplings $(v=0,S=1) \leftrightarrow (v=6,S=2)$ and $(v=6,S=2) \leftrightarrow (v=5,S=1)$ (see figure (\ref{HEFFd})).
The effective
Hamiltonian $H^{eff}$ also possesses a small direct coupling between the initial $(v=0,S=1)$ and the final state $(v=5,S=1)$
(not shown).
\begin{figure}[htp]
\centering
\includegraphics[width=0.45\linewidth]{fig11_TROISFINb.ps}
\includegraphics[width=0.45\linewidth]{fig12_TROISFIN.ps}
\caption{Component amplitudes of the five columns which constitute the wave operator at the final time $(t=T)$
when equation (\ref{BAEQ}) is integrated with time-dependent absorbing potential (left frame) and without
time-dependent absorbing potential (right frame).
Five different symbols are
associated to the five
initial
states which compose the active space $S_o$,
$\blacksquare \leftrightarrow (v=0,S=1)$,
$\bullet \leftrightarrow (v=5,S=1)$,
$\blacktriangle \leftrightarrow (v=6,S=2)$
$\blacktriangledown \leftrightarrow (v=16,S=2)$,
$\square \leftrightarrow (v=6,S=1)$}
\label{Cycl1}
\end{figure}
We can analyse the cyclic character of the dynamics with respect to the selected active space with $m=5$.
For doing this analysis we need to remove the artificial influence of the time-dependent absorbing potential defined in equation \ref{VOPT}.
For a purely cyclic dynamics the solutions of eq. (\ref{BAEQ}) obtained with and without time-dependent
absorbing potentials would be strictly equal.
The wave operator components (obtained with and without artificial absorbing potential) are shown in figure \ref{Cycl1}.
Vibrational states are numbered from $v=0$ to $v=29$ for the first surface and from $v=30$ to $v=59$ for the second surface.
In both frames of figure \ref{Cycl1},
the five unit peaks correspond to the return of the wave operator to the initial active space at the end of the dynamics.
The projection of $\Omega$ into the active space at $t=T$ is effectively identical to $P_o$ (the zero terms being approximated by small values of about $10^{-13}$).
However
in the right frame
the ($5 \times 55$) non-diagonal components
coupling the active space to the complementary space
take non-vanishing small values between $10^{-2}$ and $10^{-6}$, which corresponds to
transition probabilities smaller than $10^{-4}$.
This figure proves that the dynamics is largely (but not perfectly) cyclic
within the selected 5-dimensional active space.
In such a case the solution can be expanded on a basis set made from only five periodic Floquet eigenstates associated with the active space. The five eigenvalues and the initial components of the corresponding eigenvectors have been calculated using the method explained in \ref{appA} and are given in table \ref{Table1}. These Floquet eigenstates have non-vanishing components at the two time-boundaries in the active space exclusively.
Note that these vectors and the corresponding eigenvalues depend on the Floquet Hamiltonian but also on the duration $T$ of the selected time interval.
\begin{table}
\begin{tabular}[t]{|c|c|c|c|c|c|}
\hline
& \multicolumn{5}{c|}{Floquet eigenvalues $E_{\lambda_j}$} \\
\cline {2-6}
&5.6692 E-04&-2.8759 E-03&-2.7546 E-03&-1.42049 E-03&-1.6374 E-03 \\
\hline
\hline
$\langle v,S|$ & \multicolumn{5}{c|}{Eigenvector components
$|\langle v,S|\lambda_j (t=0) \rangle|$ }\\
\hline
(v=0,S=1)&0.6531&0.6129&0.2282&0.3110&20376 E-02 \\
(v=5,S=1)&0.6616&0.6106&0.1970&0.3875&2.0543 E-02 \\
(v=6,S=2)&0.3674&0.3765&0.1445&0.8363&5.9142 E-02 \\
(v=16,S=2)&2.4062 E-02&0.3321&0.9424&2.9068 E-02&1.9696 E-03 \\
(v=6,S=1)&7.2863 E-03&4.0218 E-03&1.3086 E-03&6.5247 E-02&0.9978 \\
\hline
\end{tabular}
\caption{The five Floquet eigenstates $\vert \lambda_j \rangle$
over which the cyclic wavefunctions can be expanded and the corresponding eigenvalues. }
\label{Table1}
\end{table}
The small defect with respect to a perfect cyclicity obtained in the waveoperator components
is consistent with the results for the FS distance previously shown in figure \ref{Wonorm}
for an active space of dimension $m=5$.
At time $t=600$, the laser is turned out and the FS distance is about $10^{-2}$ and not strictly equal to zero,
indicating that a small part of the population is present in the complementary space.
\subsection{Dissociative dynamics of $H_2^+$}
The second illustrative example is that of the $H_2^+$ molecule submitted to an intense laser pulse.
The principal aim of this example is to test the ability of the global algorithm
to describe non-adiabatic dynamics driven by a non-hermitian Hamiltonian.
We only take into account the two first effective potentials \cite{Bunkin} corresponding to
the two lowest electronic states $^2\Sigma_g^+$ and $^2\Sigma_u^+$.
We make the assumption that the rotational dynamics is frozen.
This is a sensible assumption because we consider only very short laser pulses.
Before calculating the dynamics, the field-free Hamiltonian of $H_2^+$ has been pre-diagonalized
on a radial grid basis using a grid method with a radial complex absorbing potential \cite{Marston1989, Poirier}.
A non-perturbed vibrational eigenbasis made of
$2 \times 200 $ eigenvalues $\varepsilon_j$ and bi-orthogonal eigenstates $\{|j\rangle, |j^*\rangle\}$
is then used
(see \ref{appnonherm})
to express the electric dipole moment operator and the corresponding
matrix $\mu_{ij}$ which couples the two surfaces.
Within this simple Born-Oppenheimer model, the lower surface supports $N_{BS}= 19$ bound vibrational states.
The electric field is a sum of two slightly detuned simultaneous pulses
(the detuning has been adjusted to correspond to the spacing between the first two vibrational states,
$\omega_1 - \omega_2 \simeq E(v=1)-E(v=0)$).
We use again the expression (\ref{Echamp})
with the following parameters, given in atomic units:
\begin{eqnarray}
\left \lbrace \begin{array}{l}
E_1=E_2=0.03 \; a.u.,\; \omega_1=0.35 \; a.u., \; \omega_2=0.3398 \; a.u., \\
T_1=T_2=250 \; a.u., \;\tau_1=\tau_2=100 \; a.u.
\end{array} \right .
\label{IterPara2}
\end{eqnarray}
This laser pulse is represented in figure (\ref{LASERFIELD}).
The peak value equal to $E=0.06$ a.u. corresponds to an
intensity of $I=1.263 \times 10^{14}$ W/cm$^2$.
An ample Fourier basis set of $N_t=2048$ functions is used to represent the interaction throughout the time interval $[0,640 \;au]$, which is widely sufficient to include all the possible multiphoton processes expected with fields exceeding $10^{14}$ W/cm$^2$ .
\begin{figure}[htp]
\centering
\includegraphics[width=0.8\linewidth]{fig13_AH2PAQUET1.ps}
\caption{Laser field amplitude as a function of time}
\label{LASERFIELD}
\end{figure}
The dynamics is integrated by using an initial active space of dimension $m=41$ which includes
the $N_{BS}=19$ bound states of the first surface $^2\Sigma_g^+$,
the 11 first pseudo-diffusion states which discretize the continum of this surface
and the 11 last pseudo-diffusion states which discretize the continuum of the second surface $^2\Sigma_u^+$.
The dimension of this subspace is important but still small
compared with the dimension of the molecular basis (here $N_m = 400$).
Why do we precisely choose this active subspace~?
Including all the bound states in the active space is certainly a good choice. The initial wavepacket will be in general chosen as a bound wavepacket
and after the pulse is turned off, the remaining bound wavepacket returns to this subspace.
The active subspace can also be completed by including some of the discretized continuum states.
The selection has been done by looking at the relative lifetimes of the different pseudo-diffusion states.
States with long lifetimes may contribute to the final wavepacket and have been included in the active subspace.
There are diffusion states with long lifetimes close to the dissociation limit of the first potential curve $^2\Sigma_g^+$
and other long lifetime states close to the energy trucation of the second curve $^2\Sigma_u^+$.
The complementary space is thus made of all the other pseudo-diffusion states with shorter lifetime, leading to
molecular photodissociation.
\begin{figure}[htp]
\centering
\includegraphics[width=0.8\linewidth]{fig14_AH2OUP0.ps}
\caption{Transition probabilities from the initial state $(v=0)$
as a function of time,
$P(v=0\rightarrow v=0)$,
$P(v=0\rightarrow v=1)$,
$P(v=0\rightarrow v=2)$.}
\label{PROBAH20}
\end{figure}
\begin{figure}[htp]
\centering
\includegraphics[width=0.8\linewidth]{fig15_AH2OUP04.ps}
\caption{Transition probabilities from the initial state $(v=3)$
as a function of time,
$P(v=3\rightarrow v=2)$,
$P(v=3\rightarrow v=3)$,
$P(v=3\rightarrow v=4)$,
$P(v=3\rightarrow v=6)$.}
\label{PROBAH23}
\end{figure}
By including all the bound states in $S_o$, we integrate globally the transition dynamics between these bound states so that the wave operator obtained
by solving eq. (\ref{BAEQ}) gives us all the transition probabilities:
$P_{i\rightarrow j}(t); \;
i=0 \ldots 18, j=0 \ldots 18$.
Two partial results are given in figures (\ref{PROBAH20}) and (\ref{PROBAH23}) for
dynamics issuing from states $(v=0)$ and $(v=3)$, respectively.
Moreover the various dissociation probabilities $P_{diss}(i)$,
for an evolution issuing from the initial state $v=i$ can be obtained as
\begin{equation}
P_{diss}(i)=1-\sum_{j=0}^{18} P_{i \rightarrow j}(t=T)
\label{H2DISS}
\end{equation}
The iterative procedure (eqs \ref{Sol1}- \ref{Incr}) converges after only $n=14$ iterations
to $\epsilon=3. 10^{-8}$,
giving all the
$(N_{BS} \times N_{BS})$
transition probabilities with an accuracy
of four stable digits.
\begin{table}
\begin{tabular}[t]{|c|c|c|c|c|c|c|c|}
\hline
& \multicolumn{7}{c|}{Convergence factor} \\
\hline
Iteration number&n=1&n=2&n=3&n=4&n=5&n=6&n=7\\
\hline
$F^{(m=41)}_n$&5.08 E-03&6.01 E-04&1.02 E-03&6.81 E-04&2.47 E-04&2.75 E-04&1.27 E-04\\
\hline
Iteration number&n=8&n=9&n=10&n=11&n=12&n=13&n=14\\
\hline
$F^{(m=41)}_n$&5.43 E-05&3.87 E-05&1.32 E-05&3.49 E-06&7.32 E-07&1.54 E-07&3.03 E-08 \\
\hline
\end{tabular}
\caption{The convergence factor $F^{(n)}_m=||\delta X^{(n)}||^2/||X^{(n)}||^2$ (eq.(\ref{IterStop}))
with respect to the iteration number $n$ for the active subspace of dimension $m=41$.}
\label{Table2a}
\end{table}
The table (\ref{Table2a}) shows the convergence factor (cf eq. (\ref{IterStop})).
This good result is understandable since the active space includes all the
bound states which mainly participate in the dynamics.
It is true that a large part of the wave packet is projected into the two continua.
But most of the pseudo-diffusion states which span these two continua have small lifetimes and their populations
rapidly decrease to zero.
Some long-lived diffusion states are present and can disturb the cyclic character of the dynamics but this defect is
suppressed in the present treatment by including these states in our active subspace.
As expected the populations of the long-lived diffusion states included in the active subspace states do not converge to zero at $t=T$.
These results are confirmed by testing the convergence versus the composition of the active space.
Including all the bound states is essential in this rather non-adiabatic example. This is the safest way to ensure an easy convergence for any dynamics issuing from bound states (for example, selecting a too small active space of dimension $m=5$ made of the first five bound states $v=0$ to $v=4$ is not sufficient and makes the iterative procedure diverge).
In table \ref{Table2a} which corresponds to $m=41$, the convergence
factor, equal to $5.08 \times 10^{-3}$ for $n=1$, converges to $3.03 \times 10^{-8}$ after $n=14$ iterations.
By reducing the active space to the $m=19$ bound states,
the convergence factor converges from $2.84 \times 10^{-3}$ for $n=1$ to $3.33 \times 10^{-7}$ for $n=14$.
This worse result is due to non-negligible populations of some long-lived diffusion states which subsist at the end of the interaction and are worth being included in the active subspace.
Increasing $n$ from $41$ to $51$ by adding more diffusion states does not significantly affect the results of table \ref{Table2a}.
\begin{figure}[htp]
\centering
\includegraphics[width=0.8\linewidth]{fig16_PDISSFIN.ps}
\caption{Dissociation probabilities associated to the initial states $(v=0, \ldots v=18)$,
obtained by integrating the equation (\ref{BAEQ}) in the presence of a time-dependent absorbing potential
(continuous line),
and without absorbing potential ($\square$). }
\label{PDISS}
\end{figure}
Figure (\ref{PDISS}) displays the dissociation probabilities expressed in eq. (\ref{H2DISS}).
The nearly equal results obtained with and without absorbing potentials confirm that the dynamics is approximately cyclic
with respect to the selected active subspace.
This character is also confirmed by analysing the figure (\ref{FIN512})
which represents the amplitudes of the components of $X=Q_o \Omega$ at the final time $(t=T)$.
All these components are smaller than $10^{-1}$, most of them being between $10^{-2}$ and $10^{-6}$.
\begin{figure}[htp]
\centering
\includegraphics[width=0.8\linewidth]{fig17_AH2TROISFIN.ps}
\caption{Wave operator component amplitudes, for the columns corresponding to the initial states $v=0$ ($+$) and $v=3$ ($\times $)
at the final time $(t=T)$ when the equation (\ref{BAEQ}) is solved without absorbing potential.
The laser field is built on the interval $[0,500]$ a.u. and the final time is $T=640.$ a.u.}
\label{FIN512}
\end{figure}
\section{Conclusion \label{conclusion}}
The two illustrative examples presented in section \ref{num_examples} leads to the following conclusions.
The multidimensional version of the global integrator significantly improves the performances
of the previous one-dimensional integrator of ref. \cite{Lecl2015}.
If the active space is correctly chosen, the divergences appearing in the one-dimensional case
disappear and correct solutions of the Schr\"odinger equation with initial conditions
corresponding to each one of the unperturbed molecular states which compose
the initial active space are obtained, by solving only once the equation (\ref{BAEQ}).
In these ideal situations the convergence is fast and accurate solutions are obtained after only a few iterations.
The present theory treats both the
periodic and the quasi periodic perturbations arising in the interactions between matter and c.w. laser fields or pulsed
laser fields. It is applicable to the non-Hermitian Hamiltonians generated by using
analytical continuations of the resolvent in the complex plane when $L^2$ representations of the continua are used.
Moreover the global character of the integration algorithm makes possible the rapid repetition
of perturbative calculations when some of the physical parameters (intensity, wavelength) are slightly modified.
This feature is well adapted to investigate control processes which call for repeated propagation attempts.
The most delicate point is the selection of a good initial active space.
Several concepts which are closely related
(the cyclic character of the dynamics,
the Fubini-Study distance,
the time-dependent absorbing potential)
participate in the selection of such a
good active space, which should be as small as possible while giving a rapid convergence.
In practice, looking at the coupling strength between states, including resonant and near-resonant states and long-lived continuum states, is a good
guide in selecting the active space.
The quality of the active space (size and choice of the relevant states) has direct consequences on the numerical convergence
and can also be appreciated by monitoring a posteriori the Fubini-Study quantum distance
between the initial, fixed subspace and the dynamical subspace.
For example the iterative treatment diverges
if this FS distance tends to $\pi/2$ at a given arbitrary instant between $t=0$ and $t=T$.
The use of Floquet theory necessitates that the dynamics is cyclic.
We have shown that (see \ref{appA}) in such a case (i.e. if the wave function included
in the active space $S_o$ of dimension $m$ at $t=0$ returns to this subspace at the final time $T$),
the wave function can be rigorously expanded on a very small
Floquet eigenbasis set of dimension $m$. This is an important
result which will be exploited in later work.
Unfortunately, a spontaneous cyclic character is never rigorously observed.
An artificial cyclic dynamics can be obtained by using a generalization of the
constrained adiabatic trajectory method,
i.e. by introducing an asymptotic time-dependent absorbing potential (eq.~\ref{VOPT}) in order to impose the condition $X(t=T)=0$.
The absorbing potential imposes the periodicity
and suppresses the problems near the boundary $t=T$ (except in the case of a complete inversion
with a one-dimensional active space). However it does not suppress the
divergences appearing when the FS distance tends to $\pi/2$ at intermediate instants.
The best scheme for the selection of the active space
is to work first without an absorbing potential by using simple selection criteria
and then to add the absorbing potential at a second stage to suppress the small inconsistencies due to the non-perfect cyclicity.
The selection criteria should take into account the distribution on the energy scale of the eigenstates dressed by the laser field.
The second illustrative example shows that our algorithm works well
for dissipative systems when grouping together all the coupled bound states within the active space.
In the H$_2^+$ case the global integrator dresses all the $N_{BS}=19$ bound states with the
continua and transforms them into $N_{BS}$ resonance states which mainly participate in the dissociative dynamics.
\ack
Simulations have been executed on computers of the Utinam Institute of the Universit\'e de Franche-Comt\'e, supported
by the R\'egion de Franche-Comt\'e and Institut des Sciences de l'Univers (INSU).
|
\section*{SECTION HEADINGS}).
\section{INTRODUCTION}
Though it is typically the first proof-based course most students experience, linear algebra is also \edits{an important topic that is used to solve problems in a wide variety of fields}.
This is why, at many universities, the course is a requirement for a large number of degree programs in engineering and the natural sciences.
However, since many colleges, especially those with a technical focus, possess significantly more of these majors than those within mathematics, the majority of enrolled students often find difficulty with the abstract nature of the subject, especially when the question\edits{s} ``How does this apply to my major?'' \edits{and ``What are the real-world applications?''}, can largely go unanswered.
One valuable application that can be included in a first Linear Algebra course is the method of Principal Component Analysis (PCA).
PCA is a good choice for an applied example to which linear algebra is crucial because it arises in so many different contexts, as we will demonstrate within subsequent sections.
The method arises in countless \edits{disciplines}, including \edits{but not limited to} statistics \cite{J}, electrical engineering \cite{PCAEA},
genetics \cite{RSA}, neuroscience \cite{Peyrache}, facial recognition \cite{Turk}, control theory \cite{PCAEA}, and mechanical and systems engineering \cite{PCAME}.
\edits{Perhaps the largest obstacle to including PCA within a first semester Linear Algebra course is that it is often performed using the Singular Value Decomposition (SVD), which is a topic usually reserved for either a second course in the subject, a course in computational linear algebra, or a graduate linear algebra course (see \cite{Remski,Kalman} for more information on the SVD). Of course, many universities do not offer these follow-on courses, and hence students are not exposed to PCA, even though it is such a widely-utilized tool. However, we note that PCA can be both understood and performed without knowledge of the SVD, using a topic that is usually included within a first-semester course, namely the Spectral Theorem. We will elaborate further on how this is accomplished later on. }
\edits{In addition,} though PCA is sometimes included as an applied topic within linear algebra texts, most notably \cite{Lay} and \cite{Strang}, it is
often overlooked as an important application within other sources.
Even when \edits{discussed in these texts}, it is often difficult to describe the utility or impact of the
method because examples within textbooks \edits{are typically} computed by hand, while real-world implementation is always performed using a computer.
To address these difficulties, we have created resources, both theoretical and computational, for instructional use within the classroom of a first course in linear algebra. These resources require a computer in the classroom, but will not require students to understand numerical aspects of linear algebra.
We also provide the code that generates the data sets, numerics, and images used within our examples. Instructors who are comfortable with {\it MATLAB} can alter our code to make the presentation more interactive, while those with less computational interest or experience need not do so in order to generate all of the material we present.
While we use {\it MATLAB} to perform computations, the principles and algorithms can be applied using other (perhaps open-source) software, such as {\it Octave}.
For instructors without access to {\it MATLAB}, we also provide a number of programs on the first author's website:
\begin{center} \url{http://inside.mines.edu/~pankavic/PCAcode/Octave}.
\end{center}
that are similar to those in the appendix but written using {\it Octave}.
\edits{These computational tools arise from a first-semester Linear Algebra course conducted at the Colorado School of Mines,
and have had a strong impact on the interest of non-majors and, subsequently, the increase in mathematics minors at our institution. Both authors have implemented portions of this material in their classrooms and have received positive feedback from students regarding their interest in PCA applications, especially concerning its use in image compression and statistics. In addition, the inclusion of PCA has benefitted the mathematical breadth and depth of our applied majors and increased their exposure to new and interesting applications of linear algebra.}
Hence, we believe the resources included herein can be used to introduce students to a variety of real-world applications of the subject without the need for a course in scientific computing.
We also mention that the implementation of these materials is fairly robust. Instead of a Linear Algebra course, they could be included within an introductory or second course in statistics for students who have already taken linear algebra, or within a scientific computing course, assuming students possess the necessary background.
In general, this article provides a number of teaching resources and examples to engage students
in learning about this essential application of linear algebra.
\section{BACKGROUND}
We begin by recalling \edits{a crucial} theorem - one of the most important results in all of linear algebra - on which \edits{we base our discussion of PCA}. \edits{Before stating the result, we note that a stronger version of the theorem extends to a more general class of matrices over the complex numbers. }
\begin{theorem*} (Spectral Theorem \cite{Lay})
Let $n \in \mathbb{N}$ be given and $A$ be an $n \times n$ matrix of real numbers with $A^T$ denoting its transpose. \edits{Then, $A$ is symmetric (i.e., $A^T = A$) if and only if $A$ is orthogonally diagonalizable. In this case, $A$ possesses $n$ real eigenvalues, counting multiplicities.}
\end{theorem*}
This is an extremely powerful result and precisely guarantees \newedits{for such A} the existence of
$\lambda_k \in \mathbb{R}$ and orthonormal column vectors $\vect{v}_k \in \mathbb{R}^n$ for every $k=1,...,n$ such that
\begin{equation}
\label{ST}
A = \lambda_1 \vect{v}_1 \vect{v}_1^T + \cdots + \lambda_n \vect{v}_n \vect{v}_n^T
\end{equation}
arising from the orthogonal diagonalization.
Because the $\vect{v}_k$ vectors are orthonormal, each associated matrix $\vect{v}_k\vect{v}_k^T$ \newedits{is orthogonal},
and thus $A$ can be decomposed into a sum wherein each term is an eigenvalue multiplied by a rank one matrix \newedits{generated by a unit vector}.
Hence, the eigenvalues alone determine the magnitude of each term in the sum, while the eigenvectors
determine the directions.
These eigenvectors are called \emph{principal components} or \emph{principal directions} and we will expand upon this further in the next section.
We begin the discussion of the specifics of PCA with an introductory example.
\subsection{Introductory Height \& Weight Problem}
Consider a study in which we want to determine whether or not the heights and weights of a group of individuals are correlated. That is, we want to know
whether the known value of a person's height seems to dictate whether they tend to be heavier or lighter, and thus influences their weight. Assume we are given data for $30$ specific people, displayed within Table~\ref{tab:1}. For this example, our data set originates from a commonly available study \cite{SOCR}. In practice and for large enough class sizes,
the data can be obtained in the classroom, directly from students. For instance, \edits{during} the class period before implementation of this example, the instructor can collect anonymous information regarding student height and weight, compile and store this data, and integrate it into the project for the following class period. \edits{As an alternative, this problem could serve as a project for a group of students within the course, wherein the group collects the data, performs PCA using the code provided in the appendix, interprets the results, and presents their findings in a brief class seminar.} For those with smaller class sizes or concerns regarding anonymity, data can be taken from our source \cite{SOCR} that is readily available on the \newedits{Internet}.
\begin{table}[h]
\begin{tabular}{|l |*{6}{c}|}
\hline
Person & 1 & 2 & 3 & 4 & 5 & 6\\
\hline
\hline
Height & 67.78 & 73.52 & 71.40 & 70.22 & 69.79 & 70.70\\
Weight & 132.99 & 176.49 & 173.03 & 162.34 & 164.30 & 143.30\\
\hline
Person & 7 & 8 & 9 & 10 & 11& 12\\
\hline
\hline
Height & 71.80& 72.01& 69.90 & 68.78 & 68.49 & 69.62 \\
Weight & 161.49 & 166.46 & 142.37 & 150.67 & 147.45 & 144.14\\
\hline
Person & 13 & 14 & 15 & 16 & 17 & 18\\
\hline
\hline
Height & 70.30 & 69.12 & 70.28 & 73.09 & 68.46 & 70.65\\
Weight & 155.61 & 142.46 & 146.09 & 175.00 & 149.50 & 162.97\\
\hline
Person & 19 & 20 & 21 & 22 & 23 & 24\\
\hline
\hline
Height & 73.23 & 69.13 & 69.83 & 70.88 & 65.48 & 70.42\\
Weight & 177.90 & 144.04 & 161.28 & 163.54 & 126.90 & 149.50\\
\hline
Person & 25 & 26 & 27 & 28 & 29 & 30\\
\hline
\hline
Height & 69.63 & 69.21 & 72.84 & 69.49 & 68.53 & 67.44\\
Weight & 161.85 & 149.72 & 172.42 & 151.55 & 138.33 & 133.89\\
\hline
\end{tabular}
\centering \caption { \footnotesize Heights (in.) and Weights (lbs.) for $30$ young adults \cite{SOCR}.}
\label{tab:1}
\end{table}
\begin{figure}[t]
\centering
\includegraphics[scale=0.4]{PCA_Ht_Wt_1}
\vspace{-0.2in}
\caption{ \label{fig:data} \footnotesize \edits{Plot} of Height/Weight \edits{datapoints}.}
\end{figure}
\begin{figure}[t]
\begin{subfigure}[t]{0.45\textwidth}
\hspace{-0.3in}
\includegraphics[scale=0.33]{PCA_Ht_Wt_Comp1}
\vspace{-0.2in}
\end{subfigure}
\hspace{0.1in}
\begin{subfigure}[t]{0.45\textwidth}
\includegraphics[scale=0.33]{PCA_Ht_Wt_Comp2}
\vspace{-0.2in}
\end{subfigure}
\caption{ \label{fig:PCintro} \footnotesize Height/Weight data projected onto the principal components (left - $v_1$; right - $v_2$) . By the Spectral Theorem, the data represented in Fig.~\ref{fig:data}
is exactly the sum of the projections onto these two components.}
\end{figure}
Since the question of interest is whether the two measured variables, height and weight, seem to change together, the relevant quantity to consider is the covariance of the two characteristics within the data set.
This can be formed in the following way.
First, the data is stored in $X$, a $2 \times 30$ matrix.
\edits{Then, the entries are used to compute the mean in each row, which will be used to center \edits{or ``mean-subtract''} the data}. \edits{This latter step is essential, as many of the results concerning PCA are only valid upon centering the data at the origin.} Computing the means of our measurements (Table~\ref{tab:1}), we find
$$\mbox{\boldmath${\mu}$} = \left[\begin{array}{r} 70.06 \\ 154.25 \end{array}\right].$$
Using $x_{ij}$, the entries of the data matrix $X$, the associated $2 \times 2$ covariance matrix $S$ is constructed with entries
$$s_{ik} = \frac{1}{30-1} \sum_{j=1}^{30} (x_{ij} - \mu_i) (x_{kj} - \mu_k)$$
so that
$$S = \left[\begin{array}{rr} 3.26 & 21.72 \\ 21.72 & 188.96 \end{array}\right]. $$
Notice that this matrix is necessarily symmetric, so using the Spectral Theorem it can be orthogonally diagonalized. Upon computing the eigenvalues and eigenvectors \newedits{of S}, we find $\lambda_1 = 191.46$, $\lambda_2 = 0.76$, and
$$ \vect{v}_1 = \left[\begin{array}{r} 0.11 \\ 0.99 \end{array}\right]
\qquad
\vect{v}_2 = \left[\begin{array}{r} -0.99 \\ 0.11 \end{array}\right]. $$
Here, $\vect{v}_1$ and $\vect{v}_2$ are the \emph{principal components} of the \edits{covariance matrix $S$ generated by the data matrix $X$,}
as previously described.
Thus, we see from (\ref{ST}) that
$$S = \lambda_1 \vect{v}_1 \vect{v}_1^T + \lambda_2 \vect{v}_2 \vect{v}_2^T$$
and because the difference in eigenvalues is so large, it appears
that the first term is responsible for most of the information encapsulated
within $S$.
Regardless, we can re-express the given data in the new orthonormal basis generated by $\vect{v}_1$ and $\vect{v}_2$
by computing the coordinates $P^T X$ where
$$P = \left[\begin{array}{rr} 0.11 & -0.99 \\ 0.99 & 0.11 \end{array}\right]$$
is the orthogonal matrix whose columns are $\vect{v}_1$ and $\vect{v}_2$.
In fact, we could left multiply the data matrix by each component separately, namely $\vect{v}_1^T X$
and $\vect{v}_2^T X$, to project the data onto each principal direction (Fig.~\ref{fig:PCintro}).
Hence, the data can be separated into projections along $\vect{v}_1$ and $\vect{v}_2$, respectively.
\edits{We see from looking at the scales} in Figure~\ref{fig:PCintro} that the heights and
weights along $\vect{v}_2$ are significantly less than those along $\vect{v}_1$, which tells us that the majority of the information contained within $X$ lies along $\vect{v}_1$.
Computing the slope of the line in the direction of $\vect{v}_1$ and choosing a point thru which
it passes, we can represent it by
$$y - 154.25 = 9 (x - 70.06),$$ where $x$ represents the height of a given individual and $y$ is
their corresponding weight.
Hence, we see that height and weight appear to be strongly correlated,
and PCA has determined the direction with optimal correlation between the variables.
\begin{figure}[t]
\centering
\includegraphics[scale=0.4]{HtWt_biplot}
\vspace{-0.2in}
\caption{ \footnotesize \label{fig:HtWt_biplot} Biplot of Height/Weight data with $2$ principal components. \edits{The blue Height and Weight vectors are displayed as linear combinations of the principal components.} Note that \edits{these principal components} effectively rotate the \edits{height and weight} data in the plane.}
\end{figure}
The principal component analysis for this example took a small set of data and identified
a new orthonormal basis in which to re-express it.
In two dimensions the data are effectively rotated to lie along the line of best fit (Fig.~\ref{fig:HtWt_biplot}), with the second principal
direction merely representing the associated unit orthogonal complement of the first.
This mirrors the general aim of PCA: to obtain a new orthonormal basis that organizes the data optimally, in the sense that the variance contained within the vectors is maximized along \edits{successive} principal component(s).
\subsection{Summary of PCA}
\label{sec:steps}
In short, PCA can be performed to compute an optimal\newedits{, ordered} orthonormal basis of a given set of vectors, or data set, in the following steps.
\begin{enumerate}
\item Gather $n$ samples of $m$-dimensional data, i.e. vectors $\vect{d}_1, ..., \vect{d}_n \in \mathbb{R}^m$ stored in the
\edits{$m \times n$} matrix $X$ with columns $\vect{d}_1, ..., \vect{d}_n$, so that $x_{ij}$ represents
the $i^{th}$ entry of the $j^{th}$ sample vector, and compute
the mean vector (in $\mathbb{R}^m$)
$$ \mbox{\boldmath${\mu}$} = \frac{1}{n}\sum_{k=1}^n \vect{d}_k,$$
\item Build the corresponding mean-centered data matrix $B$ with columns given by $\vect{d}_j - \mbox{\boldmath${\mu}$}$ so that the entries are
$$b_{ij} = x_{ij} - \mu_i$$
for every $i=1,...,m$ and $j=1,...,n$.
\item Use $B$ to compute the symmetric, $m \times m$ covariance matrix
$$ S = \frac{1}{n-1}B B^T.$$
\item Find the eigenvalues $\lambda_1,..., \lambda_m$ of $S$ (arranged in decreasing order including multiplicity) and an orthonormal set of \edits{corresponding} eigenvectors
$\vect{v}_1, ..., \vect{v}_m$. These create a new basis for $\mathbb{R}^m$ in which the data can be expressed.
\item Finally, the data is represented in terms of the new basis vectors $\vect{v}_1, ..., \vect{v}_m$ using the coordinates $\vect{y}_1 = \vect{v}_1^T X, ..., \vect{y}_m = \vect{v}_m^T X$. This can also be represented as the matrix $Y = P^TX$ where $P$ is the matrix with columns $\vect{v}_1, ..., \vect{v}_m$. Should we wish to convert the data back to the original basis, we merely utilize the orthogonality of $P$ and compute $PY$ to find $X$
\end{enumerate}
In the final sections, we will extend our introductory example while presenting additional applications in which PCA appears prominently \edits{and can} be implemented within a classroom environment. \edits{For each of the subsequent examples, an instructor could integrate the content into handouts or group worksheets, assign group projects with brief presentations during class, or merely use the given materials to present the information in an interactive lecture format.}
\section{Application - Data Analysis}
\label{data}
In the previous section, we developed a method for principal component analysis which determined \edits{a} basis with maximal variance. Notice that the first component really encapsulated the majority of the information
embedded within the data.
Since the eigenvalues can be ordered, we might also
be able to truncate the sum in (\ref{ST}) to reduce the amount of stored data.
For instance, in our previous example, we might only keep the first principal component since
the data can be mostly explained just by knowing this characteristic, rather than every height and weight.
\edits{In this case, each data point would then be represented by its projection onto the first principal component.}
Upon performing the final step, we might also interpret the results: are a small number of the eigenvalues $\lambda_k$ \edits{much less (perhaps by an order of magnitude)} than the others? If so, this indicates a reduction in the dimension of the data is possible without losing much information, \edits{while}
if this does not occur then the dimension of the data may not be easily reduced \edits{in this way}.
Suppose that in addition to computing the components, we were to truncate
the \edits{new} basis matrix, $P$, so that we keep only the first $r$ columns with $r < m$. We would thus have a matrix
$\tilde{P} \in \mathbb{R}^{m\times r}$\edits{, and this would give rise to the $r \times n$ matrix $\tilde{Y} = \tilde{P}^T X$ containing
a truncation of the data represented by the first $r$ principal components.
From this we could also create the $m \times n$ matrix $\tilde{X} = \tilde{P}\tilde{P}^T X$, which represents the projection of $X$ onto the first $r$ principal directions. This reduced representation of the data would then possess less information than $X$, but retain the most information when compared to any other matrix of the same rank.}
In fact, an error estimate is obtained from the Spectral Theorem - namely, the amount of information retained is given
by the {\em spectral ratio} \edits{of the associated covariance matrix}
\begin{equation}
\label{sigma}
\sigma^2 \newedits{:=} \frac{ \sum_{k=1}^r \lambda_k}{ \sum_{k=1}^n \lambda_k}.
\end{equation}
Thus, in our first example, we can keep only the first component of each data point (a $1 \times 30$ matrix)
rather than the full data set ($2 \times 30$ matrix) and still retain $99\% $ of the information contained
within because
$$ \sigma^2 = \frac{191.46}{191.46 + 0.76} > 0.99.$$
In situations where the dimension of the input vector is large, but the components of the vectors are highly correlated, it is beneficial to reduce the dimension of the data matrix using PCA. This has three effects - it orthogonalizes the \edits{basis vectors} (so that they are uncorrelated), orders the resulting orthogonal components so that those with the largest \edits{variance appear} first, and eliminates dimensions that contribute the least to the variation in the data set.
\begin{figure}[t]
\begin{subfigure}[t]{\textwidth}
\centering
\includegraphics[scale=0.3]{Iris_biplot1}
\vspace{-0.1in}
\caption{\footnotesize Biplot of Iris data. }
\label{fig:BP2D}
\end{subfigure}
\begin{subfigure}[t]{\textwidth}
\centering
\includegraphics[scale=0.3]{Iris_biplot2}
\vspace{-0.1in}
\caption{\footnotesize Enlarged portion of (a). Notice that Petal Width and Petal Length point in nearly identical directions}
\label{fig:BP2DZoom}
\end{subfigure}
\caption{Biplots of Fisher's Iris data projected onto $r = 2$ principal components with $\sigma^2 = 97.77\%$}
\label{Biplot}
\end{figure}
We now extend our introductory example to larger data sets with many other characteristics.
For our first example, we'll utilize the built-in {\it MATLAB} data set \texttt{fisheriris.mat}.
This famous collection of data arises from Fisher's 1936 paper \cite{Fisher} describing $50$ different samples of $4$ characteristics from each of three species of Iris. Hence, the data set contains $150$ points and $4$ variables: \textbf{Sepal length}, \textbf{Sepal width}, \textbf{Petal length}, and \textbf{Petal width}.
With the $4 \times 150$ data matrix loaded, we perform the steps outlined within Section \ref{sec:steps} and compute the first two \edits{principal} components, i.e. those corresponding to the largest eigenvalues $\lambda_1 = 4.23$ and $\lambda_2 = 0.24$.
The others $\lambda_3 = 0.08$ and $\lambda_4 = 0.02$ are omitted.
It may be difficult to visualize even the first two principal components in this example because they are vectors in $\mathbb{R}^4$, but we can list them:
\begin{table}[H]
\centering
\begin{tabular}{l | c c}
Characteristic & PC1 & PC2\\
\hline
Sepal Length & 0.3614 & 0.6566\\
Sepal Width & -0.0845 & 0.7302\\
Petal Length & 0.8567 & -0.1734\\
Petal Width & 0.3583 & -0.0755
\end{tabular}
\label{tab:3}
\end{table}
\vspace{-0.2in}
\noindent Alternatively, we can visualize each data point projected onto the first two principal components as in Fig.~\ref{fig:BP2D}.
This figure is actually a biplot, containing both the projected data points and
the proportion of each characteristic which accounts for the respective principal component. For instance, because the Petal length accounts for
a large proportion of the first principal component, it points in nearly the same direction as the $x$ axis within the biplot. Similarly, Sepal width and Sepal length seem
to account for a large amount of the second principal component.
\begin{figure}[t]
\begin{subfigure}[t]{0.45\textwidth}
\hspace{-0.3in}
\includegraphics[scale=0.33]{BPcities2D}
\vspace{-0.3in}
\caption{\footnotesize $r=2$ components}
\label{fig:BPcities2D}
\end{subfigure}
\hspace{0.1in}
\begin{subfigure}[t]{0.45\textwidth}
\includegraphics[scale=0.33]{BPcities3D}
\vspace{-0.3in}
\caption{\footnotesize $r=3$ components}
\label{fig:BPcities3D}
\end{subfigure}
\caption{Biplots of \texttt{cities} data, both with $\sigma^2 \approx 94.43\%$}
\label{Biplot_cities}
\end{figure}
Notice in Fig.~\ref{fig:BP2D} that most of the data lie along the first component, which is mostly determined by the length of the Iris petals. Additionally, Petal length and Petal width appear to be strongly correlated because they point in nearly identical directions within the new basis. This can be seen in the enlarged portion of the biplot shown in Fig.~\ref{fig:BP2DZoom}. Contrastingly, Sepal width and Sepal length seem only mildly correlated and neither appears to be correlated to the pedal characteristics since \edits{these vectors point in somewhat orthogonal directions}.
Of course, the dimension and complexity of this example can be increased by using a larger set of data, such as another built-in {\it MATLAB} sample called \texttt{cities.mat}. For completeness, we've included biplots (Fig.~\ref{Biplot_cities}) of the first few principal components of the \texttt{cities} set, which contains $m=9$ different attributes (i.e., climate, crime, education, etc..) for $n=329$ cities, again using the code contained in the appendix.
As a final observation, we note that due to the \edits{separation between eigenvalues of the covariance matrix (sometimes called the ``spectral gap'')}, the majority of data points lie along the first principal component in Fig.~\ref{Biplot_cities}(a) and within the plane generated by the first two principal components in Fig.~\ref{Biplot_cities}(b). \edits{This indicates that the majority of the variance within the data exists in these two directions, and hence one might safely eliminate the other dimensions, which contribute the least to the variation in the data set.}
\section{Application - Neuroscience}
\begin{figure}[t]
\centering
\includegraphics[scale=0.4]{Neuro_potentials}
\vspace{-0.2in}
\caption{ \footnotesize \label{fig:ap} Examples of action potentials}
\end{figure}
For another field in which PCA is quite useful, we turn to Neuroscience. In electrophysiological recordings of neural activity, one electrode typically records the action potentials (or spikes) of several neurons.
Before one can use the recorded spikes to study the coding of information in the brain,
they must first be associated with the neuron(s) from which the signal arose.
This is often accomplished by a procedure called \textit{spike sorting}, which can be accomplished because the recorded spikes of each neuron often have characteristic shapes \edits{\cite{spikes}}.
For example, Fig.~\ref{fig:ap} shows three different shapes of action potentials recorded with an electrode.
These potentials are plotted by connecting measurements at $64$ different points in time using linear interpolation.
\newedits{Due to distinctions in their peaks and oscillations}, the spikes in Fig.~\ref{fig:ap} are due to three different neurons, and PCA can be used to identify the principal variations of these spike shapes.
\begin{figure}[t]
\hspace{-0.7in}
\includegraphics[scale=0.38]{Neuro_cluster}
\vspace{-0.4in}
\caption{ \footnotesize \label{fig:cluster} Spike data projected onto principal components}
\end{figure}
Let's consider a data matrix $X$ of $9195$ recorded spikes, sampled at $64$ different points in time as in the previous figure
so that $X \in \mathbb{R}^{64 \times 9195}$.
For this example, we've used real human data that is freely-available online \cite{spikes}\newedits{, but note that this data is not directly connected to the examples of action potentials in Fig.~\ref{fig:ap}}.
Using PCA we compute the eigenvalues of the covariance matrix to find that the first two
($\lambda_1 = 2.9 \times 10^4$ and $\lambda_2 = 4.7\times 10^3$) account for $83\%$ of the total information.
\newedits{Of course, additional components can be included to increase this percentage.}
A plot of the data projected along the first two principal components is given in Fig.~\ref{fig:cluster}.
We notice that two distinct clusters have formed within the data, and thus it appears that the spikes are formed from two
different neurons.
If we denote the first two principal vectors by $\vect{v}_1$ and $\vect{v}_2$, then Cluster \#1 (right) and Cluster \#2 (left) appear to center around
$100\vect{v}_1 + 25\vect{v}_2$ and $-275\vect{v}_1$, respectively. The spike shapes corresponding to these vectors are displayed in
Fig.~\ref{fig:cluster_comp} and represent averaged activity from the two neurons. Hence, we see
that PCA can be used both to determine the degree of correlation amongst certain characteristics and to identify clustering patterns
within data.
Additionally, it provides us with a lower-dimensional picture of high-dimensional data sets, and this is often very useful when attempting
to visualize high-dimensional data.
With the action potentials determined, they can be associated to specific neurons and analyzed within neuroscience studies.
\begin{figure}[t]
\centering
\includegraphics[scale=0.36]{Cluster_comp}
\vspace{-0.2in}
\caption{ \footnotesize \label{fig:cluster_comp} Representative action potentials for clusters in projected data}
\end{figure}
\section{Application - Image Compression}
Another important application of PCA is Image Compression. Because images are stored as large matrices with real entries, one can reduce their storage requirements by keeping only the essential portions of the image \edits{\cite{Lay}}. Of course, information (in this case, fine-grained detail of the image) is naturally lost in this process, but it is done so in an optimal manner, so as to maintain the most essential characteristics.
\begin{figure}[t]
\centering
\includegraphics[scale=0.4]{Durer_1}
\vspace{-0.2in}
\caption{ \footnotesize \label{fig:Durer} Albrecht D\"{u}rer's {\em Melancolia} displayed as a $648 \times 509$ pixelated imaged, taken from {\it MATLAB}'s built-in ``Durer'' file}
\end{figure}
\begin{figure}[t]
\centering
\includegraphics[scale=0.35]{eigen_hist}
\vspace{-0.2in}
\caption{ \label{fig:eigen} \footnotesize The first $35$ eigenvalues of \edits{the covariance matrix $S$ generated from $X$ in the image compression example and} arranged in decreasing order}
\end{figure}
\edits{In this section we detail a specific example for the use of PCA to compress an image.
Since the effects of keeping a lower dimensional projection of the image will be visually clear, this particular example
is a great candidate for an interactive, in-class activity.
More specifically, one can provide students with the code given in the appendix and ask them to determine the number of principal components $r$ that they must preserve in order to visually identify the image. Additionally, since the variance in the projection of the original image onto the reduced basis is computed in the code, students could be asked to identify the value of $r$ that is needed to capture a certain percentage of the total variance. For instance, Fig. \ref{Durer} shows that $r$ must be at least $60$ in order to capture $99.78\%$ of the image detail.}
\edits{Throughout the example} we will work with a built-in test image -
Albrecht D\"{u}rer's {\em Melancolia} displayed in Fig.~\ref{fig:Durer}.
{\it MATLAB} considers greyscale images like this as objects consisting of two portions - a matrix of
pixels and a colormap.
Our image is stored in a $648 \times 509$ pixel matrix, and
thus contains $648 \times 509 = 329,832$ total pixels.
The colormap is a $648 \times 3$ matrix, which we will ignore for the current study.
Each element of the pixel matrix contains a real number representing the intensity of grey
scale for the corresponding pixel.
{\it MATLAB} displays all of the pixels simultaneously
with the correct intensity, and the greyscale image that we see is produced.
The $648 \times 509$ matrix containing the pixel information is our data matrix, $X$.
Because the most important information in the reduced matrix $\tilde{X}$, described in Section \ref{data}, is captured by the first few principal components this suggests a
way to compress the image by \edits{using the lower-rank approximation} $\tilde{X}$.
Computing the distribution of associated eigenvalues as in previous examples, we see the formation of a large spectral gap, as shown in Fig.~\ref{fig:eigen}. Hence, the truncation of the sum of principal components in $\tilde{X}$ should still contain a large amount of the total information of the original image $X$.
In Fig.~\ref{Durer}, we've represented $\tilde{X}$ for four choices of $r$ (i.e., the number of principal components \edits{used}), and the associated
spectral ratio, $\sigma^2$, retained by those reduced descriptions
is also listed.
Notice that the detail of the image improves as $r$ is increased,
and that a fairly suitable representation can be obtained with around $90$ components rather than the full $648$ vector description.
Hence, PCA has again served the useful purpose of reducing the dimension of the original \newedits{data set} while preserving its most essential features.
\begin{figure}[t]
\begin{subfigure}[t]{0.45\textwidth}
\hspace{-0.3in}
\includegraphics[scale=0.3]{Durer_PC_3}
\vspace{-0.3in}
\caption{ \label{figure:PC3} \footnotesize $r = 3$, $\sigma^2 = 88.89\%$}
\end{subfigure}
\hspace{0.1in}
\begin{subfigure}[t]{0.45\textwidth}
\hspace{-0.2in}
\includegraphics[scale=0.3]{Durer_PC_30}
\vspace{-0.3in}
\caption{ \label{figure:PC30} \footnotesize $r = 30$, $\sigma^2 = 99.61\%$}
\end{subfigure}
\\
\begin{subfigure}[t]{0.45\textwidth}
\hspace{-0.3in}
\includegraphics[scale=0.3]{Durer_PC_60}
\vspace{-0.3in}
\caption{ \label{figure:PC60} \footnotesize $r = 60$, $\sigma^2 = 99.78\%$}
\end{subfigure}
\hspace{0.1in}
\begin{subfigure}[t]{0.45\textwidth}
\hspace{-0.2in}
\includegraphics[scale=0.3]{Durer_PC_90}
\vspace{-0.3in}
\caption{ \label{figure:PC90} \footnotesize $r = 90$, $\sigma^2 = 99.92\%$}
\end{subfigure}
\caption{The D\"{u}rer image with varying \edits{numbers of} principal components.}
\label{Durer}
\end{figure}
\section{CONCLUSION}
The aim in writing this article is to generate and present clear, concise resources for the
instruction of Principle Component Analysis (PCA) within \edits{an introductory} Linear Algebra course.
Students should be led to understand that PCA is a powerful, useful tool that is utilized \edits{in data analysis and} throughout
the sciences.
The visual components of the Image Compression examples in particular are designed to display the utility of PCA
and linear algebra, in general.
\edits{Within a more advanced setting (perhaps a second semester course in linear algebra),} new material regarding the Singular Value Decomposition can also be included to \edits{introduce additional details concerning the implementation of} PCA \edits{and provide an elegant structure for performing the method} \cite{Kalman, TB}. That being said, the SVD can often be a technical and
time-consuming topic that one first encounters in a computational\edits{, honors, or graduate} linear algebra course
rather than within an introductory setting.
In general, we believe that these instructional resources should be helpful in seamlessly integrating one of the most essential current
applications of linear algebra, PCA, into a standard undergraduate course.
\section*{ACKNOWLEDGEMENTS}
The authors would like to thank the College of Engineering and Computational Sciences at the Colorado School of Mines for partial support to develop and implement the educational tools included within this article.
Additionally, the first author thanks the National Science Foundation for support under award DMS-1211667.
|
\section{Introduction}
There are many theories about the early universe that predict the existence of the multiverse. The concept of such a system was first proposed in the many-world interpretation of quantum mechanics. Since then, it has been studied within the framework of string theory\cite{Everett}, so the idea of an inflationary multiverse is derived from the idea of eternal inflation \cite{Linde, Garica}. In the standard picture, there exist infinite number of pocket universes (bubbles) such that each universe corresponds to a vacuum. Each pocket universe contains an infinite number of universes; in that case, each pocket universe has a positive cosmological constant \cite{Bousso}. However, the multiverse comprises a larger physical structure which contains our 4-D universe as well. The other universes may lie beyond our observable universe: by that definition, they are unobservable. Therefore, it is imperative that researchers find observable evidence of the existence of the multiverse. There have been various researches conducted on a cosmic microwave background (CMB) that may provide that observable evidence \cite{Salem, Kaleban}. In this manuscript, we examine the effect of the multiverse on the two-point function of quantum electrodynamics (QED) in a two-layer space within a framework of non-commutative geometry (NCG). We chose this framework following Connes' analogue, according to the conjecture that our space-time may have a generalized geometrical structure at a fundamental level.
This manuscript is organized into several sections. In section \ref{ms}, we start with the mathematical set-up which is sufficient for our present job. In the next section, a two-layer space is examined as a multiverse, and we investigate the effect of such a system on a photon propagator of our 4-D universe. The resulting potential can be compared with a CMB two-point angular correlation function, as the observable evidence of the existence of a multiverse. The results showed that the Coulomb potential in each layer of this two-layer system and the CMB two-point angular correlation are comparable. Furthermore, if there exists such a multiverse system, a distance of two layers can be estimated to be within the observable universe's radius. In addition, the corresponding Coulomb potential eventuates a tiny redshift in hydrogen atom levels, so that if the distance between two layers is considered to be within the observable universe's radius, the mentioned redshift will be on the order of $10^{-25} eV$. We will also show that this result is not limited to CMB but can be applied to all monochromatic waves, such as X-rays.
\section{Mathematical setup}
\label{ms}
In NCG, a spectral triple ($A, H, D$) includes all geometrical information of a non-commutative space in which $A$ is an involutive algebra of bounded operators on a Hilbert space $H$, and the generalized Dirac operator $D$ is a self-adjoint operator on $H$ but does not belong to $A$ \cite{Connes}. As an example for ordinary manifolds, the algebra $A$ can be the algebra of smooth functions on manifolds. The Hilbert space is the vector space of Square-integrable functions. This method can be generalized to the other $C^*$ algebras which are not commutative and so there is no corresponding manifold for them.
In this approach, The Dirac operator plays a metric role and determines the distance between two points (states) of the geometrical space, using the Connes' formula of distance \cite{Connes, Landi, Connes 2}:
\begin{equation}
d(1,2)=\sup_{a\in A} \lbrace \vert a_1 - a_2 \vert : \Vert [D,a] \Vert \leq 1\rbrace .
\end{equation}
In the above formula $a_1$ and $a_2$ are elements of the algebra. One can easily obtain and re-derive usual distance in a commutative space by using the above formula. In many cases the term $[D,a]$ denotes by $d a$ means differential of $a$. We remember that the commutator satisfies Leibniz rule. In addition, a Connes' \textit{p-form}, $\omega_p$ can be derived from the following relation \cite{Landi}:
\begin{equation}
\label{omega}
\omega_p=\sum\limits_j a_0^j [D,a_1^j] [D,a_2^j]\;...\;[D,a_p^j]\;\;\; , a_i^j\in A,
\end{equation}
In NCG fiber bundles can be presented as modules over algebra. By using Serre-Swan theorem \cite{Connes, Landi}, one may generalize the Yang-Mills field which is the connection on fiber bundle by introducing a self-adjoint algebraic one-form as the gauge field. Suppose $\mathbb{A}$ exists as a self-adjoint one-form that represents a gauge potential. The corresponding field strength or curvature, $\theta$, is defined by $\theta = \mathbb{A}^2 + d\mathbb{A}$, which is a two-form, and the Yang-Mills action function is of the form:
\begin{equation}
\label{yms}
\mathcal{S}= YM(\mathbb{A})\equiv tr_\omega ((\mathbb{A}^2 + d\mathbb{A})^2),
\end{equation}
where $tr_\omega$ is the Dixmier trace \cite{Landi} and plays the role of ordinary trace and the role of integration for discrete part of space and over the continues structures respectively.
The following equation shows the relation between the two-layer space action functional and corresponding Lagrangian.
\begin{equation}
\mathcal{S}= \int tr ((\mathbb{A}^2 + d\mathbb{A})^2) d^4 x
\end{equation}
Note that the discrete dimension of the two-layer space is zero so we just drop the $\int d^4 x$ to write the Lagrangian \cite{Landi}.
\begin{equation}
\label{lagra}
\mathcal{L}= tr ((\mathbb{A}^2 + d\mathbb{A})^2)
\end{equation}
\section{Two-layer space}
\label{tls}
The underlying assumption is that, within a multiverse, separated universes have only gravitational interactions. Suppose a set of points. A constraint on some subset of these points to have no Yang-Mills interaction with others creates \textit{a partition of the set}. One may perform this by defining an equivalence relation as: point $i\sim$ point$j$, if only there exists a Yang-Mills interaction between them. Let us call each equivalence class a universe (see FIG. 1). These universes have only gravitational interactions with each other. In terms of NCG, they have only geometrical interactions. It is expected after these considerations that the distance between each two universes should be so large as the long-range interactions can be ignored.
\begin{figure}[h]
\centering
\includegraphics[width=5.5cm]{uni}
\caption{We call each subset of points that have Yang-Mills interaction with each other,a universe.}
\end{figure}
We assume that there exists a universe like ours at a specific distance. That universe is studied in the framework of NCG by consideration of a two-layer space, each layer containing a 4-D compact spin manifold denoted by $Y$. To introduce the desired spectral triple for this space, the algebra $A$ is the algebra of block diagonal matrices in which their entries are smooth real functions, $A= C_\mathbb{R}^\infty (Y) \oplus C_\mathbb{R}^\infty (Y)$. The Hilbert space $H$ is the direct sum of two Hilbert spaces on $Y$, $H= H(Y) \oplus H(Y)$.
The entries of the Dirac operators are first-order differential operators that act on the spinors of $Y$. Due to the existence of $\mathbb{Z}_2$ equivalence, the block diagonal entries of $D$ and the off-diagonal elements are equal, respectively. In addition, because $[D, a]$ for $a \in A$ is a multiplication operator, off-diagonal blocks should be a multiplication operator \cite{Chams}, which results in a self-adjoint operator. Therefore, the most general form of the Dirac operator is as follows:
\begin{equation}
\label{dirac}
D= \begin{pmatrix}
i \gamma_\mu (\partial^\mu+ ie\mathbb{A}^\mu+\cdots) & \psi+ \gamma^5 m\\
\psi+ \gamma^5 m & i \gamma_\nu (\partial^\nu+ ie\mathbb{A}^\nu+\cdots)\\
\end{pmatrix},
\end{equation}
where $\psi$ and $m$ are real functions. $\mathbb{A}$ is the gauge potential. Suppose that $\psi$ is equal to unit, and we limit our calculations to QED for simplicity.
By using equation (2), the generalized one-form is as follows:
\begin{equation}
\label{phi}
\omega=\begin{pmatrix}
\gamma^\mu \omega_{1 \mu} & \bar{\gamma} \phi\\
-\bar{\gamma} \phi^{\dagger} & \gamma^\nu \omega_{2 \nu}\\
\end{pmatrix}.
\end{equation}
where $\bar{\gamma}=\psi+\gamma^5 m$. Using the above $\omega$ as a Yang-Mills field, one may write the field strength, $\theta$ as:
\begin{equation}
\label{scale}
\Scale[0.78]{
\theta=\begin{pmatrix}
\gamma^{\mu\nu}(\partial_\mu \omega_{1 \nu}-\partial_\nu \omega_{1 \mu})+2m\gamma^5(\phi-\phi^{\dagger})-\bar{\gamma}^2(\phi^{\dagger}\phi) & (m+\phi) \gamma^\mu \gamma^5 (\omega_{1 \mu} - \omega_{2 \mu})- m \gamma^{5} \gamma^{\mu} D_{\mu} \phi^\dagger \\
-(m+\phi) \gamma^\mu \gamma^5 (\omega_{1 \mu} - \omega_{2 \mu})+ m \gamma^{5} \gamma^{\mu} D_{\mu} \phi &\gamma^{\mu\nu}(\partial_\mu \omega_{2 \nu}-\partial_\nu \omega_{2 \mu})+2 m \gamma^5 (\phi-\phi^{\dagger})-\bar{\gamma}^2(\phi^{\dagger}\phi) \\
\end{pmatrix},}
\end{equation}
where $\gamma^{\mu\nu} =\frac{1}{2}(\gamma^\mu \gamma^\nu - \gamma^\nu \gamma^\mu) $. See Appendix A for more calculations. The one-form, $\omega$, and curvature, $\theta$, are consistent with Chamseiddine et al.'s results for the two-layer space \cite{Chams}. By substituting $e\mathbb{A}_{i\mu}$ as the $\omega_{i \mu}$ and by using equation (\ref{lagra}), one can easily write the Yang-Mills Lagrangian as follows:
\begin{equation}
\label{Lagr}
\begin{array}{c}
\mathcal{L}=-8e(( \partial^\mu \mathbb{A}^\nu_1-\partial^\nu \mathbb{A}_1^\mu)(\partial_\mu \mathbb{A}_{1 \nu}-\partial_\nu \mathbb{A}_{1\mu})+\\
\\
( \partial^\rho \mathbb{A}_2^\sigma-\partial^\sigma \mathbb{A}_2^\rho)(\partial_\rho \mathbb{A}_{2\sigma}-\partial_\sigma \mathbb{A}_{2\rho})-(m+\phi)^2(\mathbb{A}_1^\mu -\mathbb{A}_2^\mu)(\mathbb{A}_{1 \mu}-\mathbb{A}_{2 \mu}))\\
\\
- 4 m^2 D_\mu \phi^\dagger D^\mu \phi + 2(1+m^2)^2 (\phi^\dagger \phi)^2 -8m^2 (\phi^\dagger \phi)\\
\end{array},
\end{equation}
Let us return to equation (\ref{phi}) and shield the Yang-Mills field. Then, having two almost non-Yang-Mills interacting 4-D universes by tuning $\phi$, $\phi$ connects the two layers through Yang-Mills interactions. To retain the gauge invariance, we keep the field $\phi$. However, we take it as tiny as possible to be able to continue shielding the Yang-Mills field. The dominant terms of the Lagrangian function become the following form:
\begin{equation}
\label{Lag}
\begin{array}{c}
\mathcal{L}=-8e(( \partial^\mu \mathbb{A}^\nu_1-\partial^\nu \mathbb{A}_1^\mu)(\partial_\mu \mathbb{A}_{1 \nu}-\partial_\nu \mathbb{A}_{1\mu})+\\
\\
( \partial^\rho \mathbb{A}_2^\sigma-\partial^\sigma \mathbb{A}_2^\rho)(\partial_\rho \mathbb{A}_{2\sigma}-\partial_\sigma \mathbb{A}_{2\rho})-\\
\\
m^2(\mathbb{A}_1^\mu -\mathbb{A}_2^\mu)(\mathbb{A}_{1 \mu}-\mathbb{A}_{2 \mu}))\\
\end{array}.
\end{equation}
By using the above Lagrangian and choosing a Feynman gauge, one may obtain a photon propagator as follows (see Appendix B for more details):
\begin{equation}
\label{prop}
\tilde{D}_F^{\mu\nu}(k) = \frac{i m^2g^{\mu\nu}}{k^2(k^2+2m^2) - i \varepsilon}.
\end{equation}
This propagator has two poles, which suggests a mass-less photon and a tachyon-type photon with a mass order of $m$. Since we do not see evidence of such photons (for example, in the thermodynamic properties), we expect $m$ to be small enough.
We will study two consequences of choosing this propagator in the subsections \ref{scf} and \ref{cp}.
\subsection{The spatial correlation function}
\label{scf}
We are now ready to compare the resultant propagator with the two-point angular correlation function from the Wilkinson Microwave Anisotropy Probe (WMAP) nine-year results \cite{Copi, CMB}. The spatial correlation function can be calculated from the Fourier transform of equation (\ref{prop}) and then integrated on the time because within the CMB, we detect photons from all time ranges in each specific direction.
\begin{equation}
\label{new}
\begin{array}{c}
\tilde{D}_F^{\mu\nu}(r)\equiv \int_0^T \mathrm{d} t \tilde{D}_F^{\mu\nu}(x) = \int_0^T \mathrm{d} t \int \frac{\mathrm{d}^4 k}{(2\pi)^4}\;\frac{i m^2g^{\mu\nu} \mathrm{e}^{-ikx}}{k^2(k^2+2m^2) - i \varepsilon} \\
\\
= \int_0^T \mathrm{d} t \int_{-\infty}^{+\infty} \mathrm{d}k_0 \int \frac{ \mathrm{d}^3 k}{(2\pi)^4}\;\frac{i m^2g^{\mu\nu}}{k^2(k^2+2m^2) - i \varepsilon} \mathrm{e}^{-ik_0 t}\mathrm{e}^{i\vec{k}.\vec{r}}=\\
\\
\int_{-T}^T \mathrm{d} t \int_{0}^{+\infty} \mathrm{d}k_0 \int \frac{ \mathrm{d}^3 k}{(2\pi)^4}\;\frac{i m^2g^{\mu\nu}}{k^2(k^2+2m^2) - i \varepsilon} \mathrm{e}^{-ik_0 t}\mathrm{e}^{i\vec{k}.\vec{r}}= \\
\\
\int_{0}^{+\infty} \mathrm{d}k_0 \int \frac{ \mathrm{d}^3 k}{(2\pi)^4}\;\frac{2 i m^2g^{\mu\nu} \mathrm{e}^{i\vec{k}.\vec{r}}}{(k_0^2 -\vert k \vert^2)(k_0^2 -\vert k \vert^2+2m^2)} \frac{sin(k_0 T)}{k_0}=\\
\\
\int \frac{\mathrm{d}^3 k}{(2\pi)^3}\;\frac{i m^2g^{\mu\nu}\mathrm{e}^{i\vec{k}.\vec{r}}}{\vert k \vert ^2(\vert k \vert^2- 2m^2) - i \varepsilon}+\int \frac{\mathrm{d}^3 k}{(2\pi)^3}\;\frac{i m^2g^{\mu\nu} cos(\vert k\vert T)}{\vert k \vert ^2(2m^2) - i \varepsilon}\\
\end{array}
\end{equation}
where $T$ is the age of the universe. The first term is a multiple of the Coulomb potential, as we will see in the next section. To have a better sense about the other term, consider a sinusoidal wave, which travels in limited-time intervals. Obviously, it is not a monochrome wave because its Fourier transform contains all frequency contributions. However, if it travels in the time from $-\infty$ to $+\infty$, it will be monochrome. Notice that in the case of the CMB correlation function, photons can be estimated to be monochrome (with a frequency of about 160.2 GHz). Now in the limit $T \to \infty$ and using the third line in equation (\ref{new}), one can easily show the following relation:
\begin{equation}
\begin{array}{c}
\tilde{D}_F^{\mu\nu}(r)=\int_{0}^{+\infty} \int \frac{\mathrm{d}k_0 \mathrm{d}^3 k}{(2\pi)^3}\;\frac{i m^2g^{\mu\nu}}{k^2(k^2+2m^2) - i \varepsilon} \mathrm{e}^{i\vec{k}.\vec{r}} \delta(k_0)\\
\\
=\int \frac{\mathrm{d}^3 k}{(2\pi)^3}\;\frac{i m^2g^{\mu\nu}}{\vert k \vert ^2(\vert k \vert^2- 2m^2) - i \varepsilon}\mathrm{e}^{i\vec{k}.\vec{r}}dt\\
\\
= \frac{i g^{\mu\nu}}{4 \pi}\left(\frac{cos(\sqrt{2}m r)}{r} \right)\\
\end{array}
\end{equation}
The $\delta(k_0)$ indicates that only low-frequency photons contribute to the propagator. This condition occurs when we study the correlation function of monochrome waves. Assuming that the radiation energy density at two separated points are almost the same, we expect that the energy of the propagating photon to be low.
\begin{figure}[h]
\centering
\includegraphics[width=7cm]{6p}
\caption{Photon spatial correlation divided to $i\;g^{\mu\nu}$ vs. $\theta$.(for $m=0.03634 (G ly)^{-1}$)}
\end{figure}
\begin{figure}[h]
\centering
\includegraphics[width=7cm]{observed1}
\caption{The two-point angular correlation function from the WMAP 9 year results \cite{Copi}.}
\end{figure}
For better comparison with the CMB two-point correlation function, consider our universe effectively as a 1-dimensional ring with the radius of the observable universe $R$ (about 46 billion light years), where we are standing at the center of the so-called ring. We can substitute $r$ in the equation(\ref{vr}) with $R\theta$, where $\theta$ is a viewing angle. Since $m$ is dimensionally proportional to the inverse of the length, it can be substituted with $\frac{k}{R}$, where $k$ is some real factor. The FIG. 2 is plotted using $m=0.03634 (G ly)^{-1}$. This value is obtained by fitting the zeroes of two curves in FIG. 2 and the "KQ75y9 mask" in FIG .3. by using Least Mean Square method. The effect of increasing $m$ is increasing the oscillation of $D_F$. X-ray is a monochromatic wave too and one may see that the X-ray two-point angular correlation function has a similar behaviour \cite{Xray}. This is another observable effect of $m$ in our universe
Let us consider $C(\theta)$ as the angular two-point correlation function, which is defined as the average product between the temperature of two points' angles $\theta$ apart \cite{Sophie}.
\begin{equation}
C(\theta)=\overline{T(\hat{\Omega}_1),T(\hat{\Omega}_2)}\vert_{\hat{\Omega}_1.\hat{\Omega}_2=cos(\theta)}
\end{equation}
Here $T(\hat{\Omega})$ is the fluctuation around the mean value of the temperature, in direction $\hat{\Omega}$ in the sky. This temperature is microwave radiation, or electromagnetic radiation, which is spatially averaged in all directions. Therefore, we can compare it with a QED spatial propagator.
FIG. 2 is plotted for $m=\frac{3.38}{R}$ in which a row estimation means that by considering $m$ as the inverse of distance between two layers, the distance between these two universes exists in the order of the radius of an observable universe. This is the observable evidence, as the signature of the multiverse within our 4-D universe.
\subsection{The effect on Coulomb potential and Hydrogen energy levels}
\label{cp}
In the case of two distinguishable fermions' scattering, the leading order contribution to the Feynman amplitude is an equation (\ref{lead}), where $p$, $p'$, $k$ and $k'$ are incoming and outgoing momentums respectively:
\begin{equation}
\label{lead}
\begin{array}{c}
i \mathcal{M}
- i e^2 \overline{u}(p') \gamma_\mu u(p) \frac{ g^{\mu\nu} m^2}{q^2\left( q^2 +2m^2\right)-i \varepsilon}\overline{u}(k')\gamma_\nu u(k),\\
\\
q=p'-p=k'-k.\\
\end{array}
\end{equation}
In the non-relativistic limit:
\begin{equation}
i \mathcal{M}= \frac{- i e^2 m^2}{\vert q\vert^2(\vert q\vert^2-2m^2)} (2m \eta '^\dagger \eta) (2m \eta '^\dagger \eta),
\end{equation}
where $\eta$ is a two-component constant spinor. We compare this with the Born approximation for the scattering amplitude within non-relativistic quantum mechanics:
\begin{equation}
\langle p'\vert iT\vert p\rangle = -i\tilde{V}(q) (2\pi)\delta (E_{p'}- E_p).
\end{equation}
For the QED interaction in this kind of multiverse system, the Coulomb potential in the momentum and coordinate space are in the following forms, respectively (See Appendix C for more details.):
\begin{equation}
\label{vr}
\begin{array}{c}
\tilde{V}(q) =\frac{e^2m^2}{\vert q\vert^2(\vert q\vert^2-2m^2)}\\
\\
V(r)= \frac{e^2}{4 \pi}\left(\frac{cos(\sqrt{2}m r)}{r} \right)\\
\end{array}
\end{equation}
The Coulomb potential of the form of equation (\ref{vr}) forces a change in the hydrogen atoms' energy levels. There is a perturbation in the hydrogen atoms' Hamiltonian as follows:
\begin{equation}
\begin{array}{c}
V_0 = \frac{e^2}{4 \pi r},\\
\\
V=V_0+\Delta V= \frac{e^2}{4 \pi}\left(\frac{cos(\sqrt{2}m r)}{r} \right),\\
\\
\Delta H=\Delta V= \frac{e^2}{4 \pi} \frac{\left( cos(\sqrt{2}m r)-1\right)}{r}.\\
\end{array}
\end{equation}
where $V_0$ is the Coulomb potential, and $\Delta V$ is the perturbation term. The first-order perturbation for some energy levels are listed below (for $m= \frac{3.38}{R}, R= 46 (G ly)^{-1}$):
\begin{equation}
\Delta E= \langle\psi\vert \Delta V \vert \psi \rangle
\end{equation}
Where $\psi = R_{nl}(r) Y_{lm}(\theta , \phi)$. For example:
\begin{equation}
\begin{array}{c}
R_{nl}=R_{10}\;\;\Rightarrow\; \Delta E=- O(10^{-25}) eV\\
\\
R_{nl}=R_{20}\;\;\Rightarrow\; \Delta E=- O(10^{-26}) eV\\
\\
R_{nl}=R_{21}\;\;\Rightarrow\; \Delta E=0. eV\\
\end{array}
\end{equation}
One can easily check that all energy levels have a miniscule non-measurable redshift.
\section{Conclusion}
\label{Co}
The goal of this manuscript was to investigate the effects of a multiverse system on the Green function of the Yang-Mills theory within the framework of non-commutative geometry. To research an observable evidence of the multiverse in our 4-D universe, we constructed a two-layer space. Here, each space corresponded to a universe and obtained the photon propagator in every single layer. Based on our calculations, the resultant photon spatial correlation function was comparable with the CMB and the X-ray two-point angular correlation. Our model predicts that all monochromatic wave two-point angular correlation has the same behaviour with the CMB. Based on our calculations and by fitting zeroes of our model and observed correlation curves, if there exists such a multiverse, the distance between the two layers lies within the order of the observable universe. To investigate more effects of the multiverse, the Coulomb potential and its effect on Hydrogen atom energy levels was re-derived by considering new photon propagator. It was observed that the perturbation of Hydrogen atom Hamiltonian and changes in energy levels are in the order of $10^{-25} eV$ and are so tiny that can be observed.
|
\section{introduction}
In 1941 A.G Kurosh formulated a Burnside-type problem for algebras \cite{Ku}. Let $A$ be an associative algebra over a field $F$. An element $a\in A$ is said to be nilpotent if $a^{n(a)}=0$ for some $n(a)\geq1$. An algebra $A$ is said to be nil if every element of $A$ is nilpotent.
\underline{The Kurosh Problem}: Is it true that a finitely generated nil algebra is nilpotent?
Examples by E. S. Golod \cite{G} (see also the far reaching examples from \cite{LS}) showed that this is not always the case. However the Kurosh Problem has positive solution in the class of algebras satisfying a polynomial identity (PI-algebras).
Let $f(x_1,x_2\cdots, x_m)$ be a nonzero element of the free associative $F$-algebra. We say that an algebra $A$ satisfies the polynomial identity $f=0$ if $f(a_1,a_2,\cdots,a_m)=0$ for arbitrary elements $a_1,a_2,\cdots, a_m \in A$.
One of the high points of the theory of PI-algebras was the solution of the Kurosh Problem (I. Kaplansky \cite{Kap}, J. Levitzki \cite{L}, A. I. Shirshov \cite{Sh}) in the following form:
Let $A$ be an associative algebra generated by elements $a_1, \cdots,a_m$. Let $S$ be the multiplicative semigroup generated by the elements \linebreak$a_1,\cdots,a_m$. Suppose that an arbitrary element of $S$ is nilpotent. Then the algebra $A$ is nilpotent.
Now let $L$ be a Lie algebra over a field $F$. As above, for a nonzero element $f(x_1,x_2,\cdots,x_m)$ of the free Lie algebra we say that $L$ satisfies the identity $f=0$ if $f(a_1,a_2,\cdots,a_m)=0$ for arbitrary elements $a_1,a_2,\cdots,a_m \in A$, see \cite{B}.
An element $a\in L$ is said to be \underline{ad-nilpotent} if the linear operator
\[
ad(a):L\rightarrow L,
x\rightarrow[x,a]\]
is nilpotent.
A subset $S\subset L$ is called a \underline{Lie set} if, for arbitrary elements $a,b\in S$, we have $[a,b]\in S$. For a subset $X\subset L$, the Lie set generated by $X$ is the smallest Lie set $S\langle X\rangle$ containing $X$. It consists of $X$ and of all iterated commutators in elements from $X$.
\begin{theorem} \label{Theorem1}
Let $L$ be a Lie algebra satisfying a polynomial identity and generated by elements $a_1, \cdots, a_m$. If an arbitrary element $s\in S\langle a_1,\cdots, a_m\rangle$ is ad-nilpotent then the Lie algebra $L$ is nilpotent.
\end{theorem}
This theorem has implications in group theory:
Let $p$ be a prime number. A group $G$ is said to be \underline{residually-p} if there exists a family of homomorphisms $\phi_i:G\rightarrow G_i$ into finite $p$-groups $G_i$ such that $\bigcap\limits_i Ker(\phi_i)=(1)$.
Let $\mathds{Z}_p$ be the field of order $p$. Consider the group algebra\\ $(\mathds{Z}_p)[G]$ and its fundamental ideal $w$ spanned by all elements $1-g,g\in G$. It is easy to see that the group $G$ is residually-$p$ if and only if $\bigcap\limits_{i\geq1}w^i=(0)$. The \underline{Zassenhaus filtration} is defined as
\[G=G_1>G_2>\cdots\]
where $G_i=\{g\in G|1-g\in w^i\}$. Then $[G_i,G_j]\subseteq G_{i+j}$
and each factor $G_i/G_{i+1}$ is an elementary abelian $p$-group. Hence
\[L_p(G)=\bigoplus\limits_{i\geq 1}G_i/G_{i+1}\]
is a Lie algebra over $\mathds{Z}_p$.
\begin{theorem}\label{Theorem2} Let $G$ be a residually-$p$ finitely generated torsion group such that the Lie algebra $L_p(G)$ satisfies a polynomial identity. Then $G$ is a finite group.
\end{theorem}
Let $g(x_1,x_2,\cdots,x_m)$ be a nonidentical element of the free pro-$p$ group (see \cite{S}, \cite{DSMS}) on the set of free generators $x_1,x_2,\cdots,x_m$. We say that a pro-$p$ group $G$ satisfies the identity $g=1$ if \linebreak$g(a_1, a_2, \cdots,a_m)=1$ for arbitrary elements $a_1,a_2,\cdots,a_m\in G$.
\begin{theorem}\label{Theorem3}
Let $G$ be a residually-$p$ finitely generated torsion group such that its pro-$p$ completion $G_{\hat{p}}$ satisfies a nontrivial identity. Then $G$ is a finite group.
\end{theorem}
Remark: the examples of infinite residually-$p$ groups due to E.S. Golod \cite{G}, R. I. Grigorchuk \cite{Gr}, and N. Gupta-S. Sidki \cite{GS} are finitely generated and torsion.
The results above significantly extend the positive solution of the Restricted Burnside Problem \cite{Z4, Z5} and the work of \cite{Z6} on compact torsion groups. They were announced in \cite{Z7, Z8} but no detailed proof followed. Meanwhile they were used in numerous papers. Therefore I feel compelled to present a detailed proof.
The proof essentially uses the ideas and techniques from \cite{Z4, Z5}.
\begin{center}
\underline{Acknowledgments}
\end{center}
The author is grateful to the referees of this paper and to A. Fernandez Lopez for numerous valuable comments.
\section{The case of zero characteristic}
\label{Section2}
In this section we assume that char$F=0$. This assumption allows us to avoid major difficulties but also miss major applications.
The following lemma is due to A. I. Kostrikin [Kos1; Kos2, Lemma 2.1.1].
\underline{Kostrikin Lemma}. Let $L$ be a Lie algebra, $a\in L$, ad$(a)^n=0.$ If $4\leq n$ $\textless$ char$F$ (here zero characteristic is viewed as $\infty$), then
\[\text{ad}(b\, \text{ad}(a)^{n-1})^{n-1}=0\]
for an arbitrary element $b\in L$.
Choose a nonzero element $s\in S=S\langle a_1,\cdots, a_m\rangle$. The element $s$ is ad-nilpotent. Repeatedly using the Kostrikin lemma we can assume that ad$(s)^3=0$.
Recall that a linear algebra over a field $F$ of characteristic $\neq2$ is called a \underline{Jordan algebra} if it satisfies the identities
\begin{align*}
\text{(J1) } &x\circ y=y\circ x\\
\text{(J2) } & (x^2\circ y)\circ x = x^2\circ (y\circ x).
\end{align*}
If A is an associative algebra then $A^{(+)}=\{A, a\circ b=\displaystyle \frac{1}{2}(ab+ba)\}$ is a Jordan algebra. For more information on Jordan algebras see \cite{J2,ZSSS, M3}.
We will use a construction of a Jordan algebra from \cite{FGG} which is a refined version of the Tits-Kantor-Koecher construction \cite{T1,T2,Kan,Ko}.
Let $L$ be a Lie algebra over a field of characteristic $\neq 2, 3$. Let $s\in L$, ad$(s)^3=0$. Define a new operation $a\circ b=[a,[s,b]]$, $a,b\in L$. Then the vector space $K=\{a\in L|a$ ad$(s)^2=0\}$ is an ideal of the algebra $(L,\circ)$.
\begin{theorem}[\cite{FGG}]
The factor algebra $(L,\circ)/K$ is a Jordan algebra.
\end{theorem}
For a set $X=\{x_1,x_2,\cdots\}$, let $FJ\langle X \rangle$ denote the free Jordan algebra (see \cite{J2, ZSSS, M3}). Consider also the free associative algebra $F\langle X\rangle$. Let $\phi$ be the homomorphism $\phi:FJ\langle X\rangle\rightarrow F\langle X \rangle^{(+)}$, $x\rightarrow x$, $x\in X$. An element lying in the kernal $\ker\phi$, is called an $S$-identity. A Jordan algebra $J$ is said to be $PI$ if there exists an element $f(x_1,\cdots,x_n)\in FJ\langle X\rangle$ that is not an $S$-identity such that $f(a_1,\cdots,a_n)=0$ for all elements $a_1,\cdots,a_n\in J$.
For elements $x, y, z$ of a Jordan algebra $J$, define their triple product $\{x,y,z\}=(xy)z+x(yz)-y(xz)$. An element $a\in J$ is called an \underline{absolute zero divisor} if $a^2=0$ and $\{a,J,a\}=(0)$.
A Jordan algebra that does not contain nonzero absolute zero divisors is called \underline{nondegenerate}. The smallest ideal $Mc(J)$ such that the factor algebra $J/Mc(J)$ is nondegenerate is called the McCrimmon radical of $J$.
\begin{lemma} \label{Lemma1}
Let $J$ be a Jordan algebra with PI such that every element of $J$ is a sum of nilpotent elements. Then $J=Mc(J)$.
\begin{proof}
Let $J\neq Mc(J)$. Then without loss of generality we will assume that the algebra $J$ is nondegenerate. Moreover, since a nondegenerate Jordan algebra is a subdirect product of prime nondegenerate Jordan algebras (see \cite{Z3}), we will assume that the algebra $J$ is prime and nondegenerate.
In \cite{Z2} it was shown that a prime nondegenerate PI-algebra $J$ has nonzero \underline{center}
\[Z(J)=\{z\in J|(za)b=z(ab) \text{ for arbitrary elements } a,b\in J\}\]
and the ring of fractions $\til J=(Z(J)\setminus\{0\})^{-1}J$ is either a simple finite dimensional algebra over the field $\til Z=(Z(J)\setminus\{0\})^{-1}Z(J)$ or else an algebra of a symmetric nondegenerate bilinear form. In both cases the algebra $\til J$ has a nonzero linear trace $t:\til J\rightarrow \til Z$ such that the trace of a nilpotent element is zero. Since every element of $\til J$ is a sum of nilpotent elements it follows that $t(\til J)=(0)$, a contradiction that finishes the proof of the lemma.
\end{proof}
\end{lemma}
\begin{lemma} \label{Lemma2}
The Jordan algebra $J=(L,\circ)/K$ is McCrimmon radical, i.e. $J=Mc(J)$.
\begin{proof}
By our assumption, the Lie algebra $L$ satisfies a nontrivial polynomial identity. Passing to the full linearization of this identity (see \cite{ZSSS}) we can assume that the identity looks like
\[\sum\limits_{\sigma\in S_n}\alpha_\sigma x_0 \text{ ad}(x_{\sigma(1)})\cdots\text{ ad}(x_{\sigma(n)})=0,\]
where not all coefficients $\alpha_\sigma\in F$ are equal to 0. This implies that
\[\sum\limits_{\sigma\in S_n} \alpha_\sigma a_0 R(a_{\sigma(1)})\cdots R(a_{\sigma(n)})=0\]
for arbitrary elements $a_0, a_1.\cdots,a_n\in J$, where $R(a):x\rightarrow xa$ denotes the multiplication operator in $J$.
It is easy to see that the element $\sum\limits_{\sigma\in S_n} \alpha_\sigma a_0 R(a_{\sigma(1)})\cdots R(a_{\sigma(n)})$ is not an $S$-identity. Hence $J$ is a PI-algebra.
The Lie algebra $L$ is spanned by the Lie set $S=S\langle a_1,\cdots a_m\rangle.$ For an arbitrary element $a\in S$ let $\bar{a}=a+K$ be its image in the Jordan algebra $J$. The t$^{th}$ power of $\bar{a}$ in $J$ is $a\text{ ad}([s,a])^{t-1}+K$, which implies that the element $\bar{a}$ is nilpotent. By \Cref{Lemma1} $J=Mc(J)$, which finishes the proof of \Cref{Lemma2}.
\end{proof}
\end{lemma}
Following A. I. Kostrikin\cite{K1, K3}, we call an element $a$ of a Lie algebra $L$ a \underline{sandwich} if (i) ad$(a)^2=0$ and (ii) ad$(a)\text{ ad}(b)\text{ ad}(a)=0$ for an arbitrary element $b\in L$.
If char$F\neq2$ then (i) implies (ii).
If $a$ is a nonzero absolute zero divisor of the Jordan algebra $J$ and char$F\neq2,3$ then for the nonzero element $b=a\text{ ad}(s)^2$ we have ad$(b)^2=\text{ad}(s)^2\text { ad}(a)^2\text{ ad}(s)^2.$ Hence $L\text{ ad}(b)^2\subseteq\{a,J,a\}\text{ ad}(s)^2=(0)$. Hence, $b$ is a sandwich of the Lie algebra $L$.
To summarize, we showed that if $L=\langle a_1,\cdots,a_m\rangle$ is a nonzero Lie algebra over a field $F$ of zero characteristic, every element of the Lie set $S=S\langle a_1,\cdots ,a_m\rangle$ is ad-nilpotent, and if $L$ satisfies a nontrivial polynomial identity, then $L$ contains a nonzero sandwich.
\begin{lemma} \label{Lemma3}
Let $L=\langle a_1,\cdots,a_m\rangle$ be a finitely generated Lie algebra such that an arbitrary element of the Lie set $S\langle a_1,\cdots, a_m\rangle$ is ad-nilpotent. Let $I$ be an ideal of $L$ of finite codimension. Then $I$ is finitely generated as a Lie algebra.
\begin{proof}
The finite dimensional Lie algebra $L/I$ is spanned by a Lie set for which every element in the set is ad-nilpotent. By the Engel-Jacobson theorem \cite{J1} the Lie algebra $L/I$ is nilpotent. In other words, there exists $k\geq1$ such that $L^k\subseteq I$.
Suppose that every commutator $\rho$ in $a_1\cdots,a_m$ of length $<k$ is ad-nilpotent of degree at most $t$, i.e. ad$(\rho)^t=0$. Let $N=ktm^k$. In \cite[Lemma 2.5]{Z8} it is shown that every product ad$(a_{i_1})\cdots \text{ad}(a_{i_N})$, $1\leq i_1,\cdots,i_N\leq m$, can be represented as \[\text{ad}(a_{i_1})\cdots\text{ad}(a_{i_N})=\sum\limits_j v_j\text{ ad}(\rho_j),\] where the $v_j$'s are (possibly empty) products of the $ad(a_i)$'s and the $\rho_j$'s are commutators in $a_1,\cdots,a_m$ of length $\geq$k. Each summand on the right hand side has the same degree in each $a_i$ as the left hand side.
It follows now that the algebra $L^k$ is generated by commutators $\rho$ in $a_1,\cdots,a_m$ such that $k\leq \text{length}(\rho)<2N$.
We have dim$_F(L/L^k)<\infty$. Let $b_1,\cdots,b_r\in I$ be a basis of $I$ modulo $L^k$. Now the algebra $I$ is generated by $b_1,\cdots,b_r$ and by all commutators $\rho$ in $a_1,\cdots,a_m$ such that $k\leq \text{length}(\rho)<2N$, which proves the lemma.
\end{proof}
\end{lemma}
Recall that an algebra $L$ is called \underline{just infinite} if it is infinite dimensional but every nonzero ideal of $L$ is of finite codimension.
\begin{lemma}
\label{Lemma4} Let $L$ be an infinite dimensional Lie algebra generated by elements $a_1,\cdots,a_m$ such that an arbitrary element from $S\langle a_1,\cdots,a_m\rangle$ is ad-nilpotent. Then $L$ has a just infinite homomorphic image.
\begin{proof}
Let $I_1\subseteq I_2\subseteq\cdots$ be an ascending chain of ideals of infinite codimension. We claim that the union $I=\bigcup\limits_i I_i$ also has infinite codimension. Indeed, if dim$_F(L/I)<\infty$ then by \Cref{Lemma3} the ideal $I$ is generated by a finite collection of elements, hence $I$ is equal to one of the terms in the ascending chain, a contradiction.
By Zorn's Lemma the algebra $L$ has a maximal ideal $J$ of infinite codimension. The factor algebra $L/J$ is just infinite, which proves the lemma.
\end{proof}
\end{lemma}
Now we are ready to finish the proof of \Cref{Theorem1} in the case of char$F=0$.
Let $L$ be a Lie algebra satisfying the assumptions of the theorem. In view of \Cref{Lemma4} without loss of generality we will assume the algebra $L$ to be just infinite.
We proved that $L$ contains a nonzero sandwich. Recall that an algebra is called locally nilpotent if every finitely generated subalgebra is nilpotent. A. N. Grishkov \cite{Gri} proved that in a Lie algebra over a field of zero characteristic, an arbitrary sandwich generates a locally nilpotent ideal. Since the Lie algebra $L$ is just infinite it follows that $L$ contains a locally nilpotent ideal $I$ of finite codimension. By \Cref{Lemma1} the algebra $I$ is finitely generated, hence nilpotent and finite dimensional. This contradicts the assumption that the algebra $L$ is infinite dimensional and proves the theorem.
\section{Divided polynomials}\label{Section3}
The main Theorem \ref{Theorem1} is valid for Lie algebras over an arbitrary ground field $F$. The applications to Theorems \ref{Theorem2}, \ref{Theorem3} use only the case when the ground field $F$ is finite.
We will show that without loss of generality, we can assume that the field $F$ is infinite. Indeed, let $F'$ be an infinite field extension of $F$. The Lie algebra $L'=L\otimes_F F'$ is generated by the same elements $a_1, \cdots, a_m$ as $L$ and an arbitrary element $s\in S\langle a_1,\cdots, a_m\rangle$ is ad-nilpotent in $L'$. Since the Lie algebra $L$ satisfies a polynomial identity, it satisfies a nontrivial multilinear identity $f(x_1,\cdots, x_n)=0$ (see \cite{B}). Then the Lie algebra $L'$ also satisfies the identity $f=0$.
From now on we assume that char$F=p>0$ and the field $F$ is infinite. Let $L\langle X\rangle$ be the free Lie $F$-algebra on the set of free generators $X=\{x_1,\cdots,x_m\}$ in the variety of algebras satisfying the identity $f=0$ (see \cite{B}). Let $P$ be the set of all commutators in $X$ and let $n:P\rightarrow N$ be a function. Let $J$ be the ideal of $L\langle X \rangle$ generated by $\bigcup\limits_{\rho\in P} L\langle X \rangle \text{ ad}(\rho)^{n(\rho)}$.
Our aim is to show that the algebra $L'=L\langle X \rangle/J$ is nilpotent. Suppose that this is not true. Letting $\deg(x_i)=1$, $1\leq i\leq m$, we define a gradation of $L'$ by positive integers.
We say that a graded infinite dimensional algebra is graded just infinite if every nonzero graded ideal of it is of finite codimension.
\begin{lemma}
\label{Lemma5}The algebra $L'$ has a graded just infinite homomorphic image $L$.
\end{lemma}
The proof follows the proof of \Cref{Lemma4} (verbatim).
Consider the adjoint embedding $L\rightarrow End_F(L)$, $a\rightarrow \text{ad}(a)$. Let $A'$ be the associative subalgebra of $End_F(L)$ generated by the image of $L$. The algebra $A'$ is graded and we assume that $L\subseteq A'^{(-)}$. Let $I$ be a maximal graded ideal of the algebra $A'$ such that $L\cap I=(0)$, $A=A'/I$, $L\subseteq A^{(-)}$. If $J$ is a nonzero graded ideal of the algebra $A$ then the ideal $J\cap L$ has finite codimension in $L$. From the Poincare-Birkhoff-Witt theorem it follows that the factor algebra $A/J$ is nilpotent and finite dimensional. We have proved that the algebra $A$ is graded just infinite.
To summarize, we assume that
\begin{enumerate}
\item the graded Lie algebra $L$ is generated by elements $s_1,\cdots,s_m$ of degree 1; every element from the Lie set $S=S\langle s_1,\cdots,s_m\rangle$ is ad-nilpotent;
\item $L$ satisfies a polynomial identity;
\item $L$ is graded just infinite.
\end{enumerate}
We fix also a graded just infinite associative enveloping algebra $A$ of $L$. The algebra $A$ is a homomorphic image of the subalgebra $\langle \text{ad}(L)\rangle\subseteq End_F(L)$
For elements $a_1,\cdots,a_k\in L $ let $[a_1,a_2,\cdots,a_k]$ denote their left-normed commutator by $[ \cdots [a_1,a_2],a_3],\cdots,a_k]$ We also denote \linebreak $[a,\underbrace{b,b\cdots,b}_\text{k}]=[ab^k].$
\begin{lemma}
\label{Lemma6} Let $I$ be an ideal of $L$, $s\in S$, $k \geq 2$, $[Is^k]=(0)$. Suppose that the Lie algebra $L$ satisfies an identity of degree $n$. Then the subalgebra $[Is^{k-1}]$ satisfies an identity of degree $<n$.
\begin{proof}
Let $L$ satisfy an identity
\[\sum\limits_{\sigma\in S_{n-1}}\alpha_\sigma[x_0,x_{\sigma(1)},\cdots,x_{\sigma(n-1)}]=0,\]
where $\alpha_\sigma\in F$, $\alpha_1=1$. For the variables $x_0,x_1,\cdots,x_{n-1}$ choose values $x_0=s$, $x_1=a\in I$, $x_i=a_i\in [Is^{k-1}]$, $2\leq i\leq n-1$. Then \[\sum\limits_{\sigma\in H}\alpha_\sigma[[s,a],a_{\sigma(2)},\cdots,a_{\sigma(n-1)}]=0,\]
where $\sigma$ runs over the stabilizer $H$ of 1 in $S_{n-1}$. It follows now that the Lie algebra $[Is^{k-1}]$ satisfies the identity
\[\sum\limits_{\sigma\in H}\alpha_\sigma[x_0,x_{\sigma(2)},\cdots,x_{\sigma(n-1)}]=0\]
of degree $n-1$. This finishes the proof of the lemma.
\end{proof}
\end{lemma}
\begin{lemma}
\label{Lemma7} Let $I$ be an ideal of $L$, $s \in L$, $[Is^k]=(0)$, $k \geq 2$. Then for any integer $t \geq 2$ and any elements $a_1, \cdots, a_N \in I$, $N=kt - 1$, we can write the operator $\text{ad}([a_1s^{k-1}]) \cdots \text{ad}([a_Ns^{k-1}])$ as a linear combination of operators of the type
\[P'\text{ad}(s)^{k-1}\prod_{j=0}^{t-2}(\text{ad}(a_{i+j})\text{ ad}(s)^{k-1})P''\]
where $P',$ $P''$ are products of $\text{ad}(a_1), \cdots, \text{ad}(a_n), \text{ad}(s)$, which may be empty.
\begin{proof}
By the Jacobi identity
\[\text{ad}([a_1s^{k-1}])\cdots\text{ad}([a_Ns^{k-1}]\]
\[=\sum\pm\text{ad}(s)^{j_0}\text{ ad}(a_1)\text{ ad}(s)^{j_1}\cdots\text{ad}(s)^{j_{N-1}}\text{ ad}(a_N)\text{ ad}(s)^{j_N},\]
and in each summand $0\leq j_0, j_1,\cdots, j_N\leq k-1$, $j_0+\cdots+j_N=(k-1)N$. If, in each segment $j_\mu,j_{\mu+1}\cdots,j_{\mu+t-1}$ of length t, at least one term is $\leq k-2$, then $j_\mu+\cdots\jmath_{\mu+t-1}\leq(k-1)t-1$. Summing all $k$ segments we get $j_0+\cdots+\jmath_N\leq k((k-1)t-1)<(k-1)(kt-1)$, a contradiction that proves the lemma.
\end{proof}
\end{lemma}
\begin{lemma}\label{Lemma8}
There exist elements $c_1,\cdots,c_r\in S$ and integers $m\geq1, N\geq1$ such that
\begin{enumerate}
\item $[L^i,c_1,c_2,\cdots,c_r]\neq(0)$ for arbitrary $i\geq1$,
\item $[L^m,c_1, c_2, \cdots, c_r,c_i]=(0)$ for $1\leq i\leq r$,
\item for arbitrary elements $a_1,\cdots,a_N\in [L^m,c_1,\cdots ,c_r]$ we have ad$(a_1)\cdots\text{ad}(a_N)=0.$
\end{enumerate}
\begin{proof}
Choose a nonzero element $s\in S$. For an arbitrary $i\geq1$ choose a minimal integer $k(i)\geq1$ such that $[L^is^{k(i)}]=(0)$. Since the Lie algebra $L$ is graded just infinite it follows that each power of $L$ has zero centralizer. Hence $k(i)\geq2$. We have $k(1)\geq k(2)\geq\cdots$. There exists a sufficiently large integer $m_1$ such that
\[ k_1:=k(m_1)=k(m_1+1)=\cdots.\]
In other words, $[L^{m_1}s^{k_1}]=(0),[L^is^{k_1-1}]\neq(0)$ for any $i\geq1$.
Now suppose that we have found $l$ elements $s_1=s,s_2,\cdots,s_l\in S$ and $2l$ integers $k_1,\cdots,k_l\geq 2;1\leq m_1\leq m_2\leq\cdots\leq m_l$ with the following properties:
\begin{enumerate}
\item $s_i\in [L^{m_{i-1}}s_1^{k_1-1}\cdots s_{i-1}^{k_{i-1}-1}],2\leq i\leq l$,
\item $[L^{m_i}s_1^{k_1-1}\cdots s_{i-1}^{k_{i-1}-1} s_{i}^{k_i}]=(0),1\leq i\leq l$,
\item for an arbitrary $i\geq1$ we have $[L^is_1^{k_1-1}\cdots s_{l}^{k_{l}-1}]\neq(0)$.
\end{enumerate}
\begin{claim}
\label{Claim1}
For arbitrary $1\leq i,j\leq l$ we have $[s_i,s_j]=0$.
\begin{proof}
Indeed, let $i<j$. Then $s_j\in[L^{m_{j-1}}s_1^{k_1-1}\cdots s_{j-1}^{k_{j-1}-1}]$. We will show that
\[[L^{m_{j-1}}s_1^{k_1-1}\cdots s_{j-1}^{k_{j-1}-1}s_i]=(0).\]
By the inductive assumption on $i+j$ the element $s_i$ commutes with $s_{i+1},\cdots,s_{j-1}$. Hence \[[L^{m_{j-1}}s_1^{k_1-1}\cdots s_{j-1}^{k_{j-1}-1}s_i]=[L^{m_{j-1}}s_1^{k_1-1}\cdots s_i^{k_i}\cdots]=0,\] which proves the claim.\renewcommand{\qedsymbol}{$\blacksquare$}
\end{proof}
\end{claim}
\underline{Case 1.} Suppose that there exists an element $s'\in S^{m_l}=[\underbrace{S,S,\cdots,S]}_{m_l}$ such that
\[ [[L^is_1^{k_1-1}\cdots s_{l}^{k_{l}-1}],[s's_1^{k_1-1}\cdots s_{l}^{k_{l}-1}]]\neq(0)\]
for any $i\geq1.$ Denote $s_{l+1}=[s's_1^{k_1-1}\cdots s_{l}^{k_{l}-1}]$. As above we find integers $m_{l+1}\geq m_l$ and $k_{l+1}\geq 2$ such that
\[ [[L^{m_{l+1}}s_1^{k_1-1}\cdots s_{l}^{k_{l}-1}]s_{l+1}^{k_{l+1}}]=(0),\]
\[ [L^is_1^{k_1-1}\cdots s_{l}^{k_{l}-1}s_{l+1}^{k_{l+1}-1}]\neq(0)\]
for any $i\geq 1$. The elements $s_1,\cdots,s_{l+1}$ and the integers $m_1,\cdots,m_{l+1};$ $k_1,\cdots k_{l+1}$ satisfy the conditions 1), 2), and 3) above.
\underline{Case 2} Now suppose that for an arbitrary element $s'\in S^{m_l}$ there exists an integer $i(s')\geq1$ such that
\[ [[L^{i(s')}s_1^{k_1-1}\cdots s_{l}^{k_{l}-1}],[s's_1^{k_1-1}\cdots s_{l}^{k_{l}-1}]]=(0).\]
Since $S^{m_l}$ spans $L^{m_l}$ it follows that for an arbitrary element $a\in [L^{m_l}s_{1}^{k_{1}-1}\cdots s_l^{k_l-1}]$ there exists $i(a)\geq1$ such that
\[ [[L^{i(a)} s_{1}^{k_{1}-1}\cdots s_l^{k_l-1}],a]=(0). \tag{1} \]
Let $t=2k_1\cdots k_{l}-1$. Choose $2t-1$ elements $a_1,\cdots,a_{2t-1}\in$ \break $[L^{m_l}s_{1}^{k_{1}-1}\cdots s_l^{k_l-1}]$. Let $q=\text{max}\{i(a_\mu),1\leq \mu\leq2t-1,m_l\}$.
Our immediate aim will be to show that
\[ [L^q,a_1,\cdots, a_t]=(0).\]
Denote $t_j=2k_{j+1}\cdots k_l-1$, so $t_0=t$. We let $t_l=1$. From \Cref{Claim1} it follows that for any $1\leq i\leq l$, $L_j:=[L^q s_{1}^{k_{1}-1}\cdots s_j^{k_j-1}]$ is a subalgebra of $L$. Let $L_0=L^q$.
\begin{claim}
\label{Claim2}
For $t_j$ arbitrary elements $b_1,\cdots,b_{t_j}\in \{a_1,\cdots, a_t\}$ we have
\[ [L_j,b_1,\cdots,b_{t_j}]=(0).\]
\begin{proof}
To prove the claim, we will use reverse induction on $j=0, \cdots, l$. For $j=l$ we have $t_l=1$ and $[L_l, a_i] = [L^qs_1^{k_1-1}\cdots s_l^{k_l-1}, a_i]=(0)$ by the choice of $q$. Now suppose that the assertion is true for $j$, $1 \leq j \leq l$. We have $t_{j-1}=k_j(t_j+1)-1.$ By Claim \ref{Claim1} an arbitrary element $a \in [L^q s_1^{k_1-1}\cdots s_l^{k_l-1}]$ can be represented as $a=[a's_j^{k_j-1}],$ where $a' \in [L^qs_1^{k_1-1}\cdots s_{j-1}^{k_1-1}] = L_{j-1}.$ Let $b_\mu=[b_\mu ' s_j^{k_j-1}],$ $b_\mu ' \in L_{j-1}.$ We apply Lemma \ref{Lemma7} to the algebra $L_{j-1}+Fs_j$ and its ideal $L_{j-1}$. By Lemma \ref{Lemma7} $\text{ad}(b_1)\cdots \text{ ad}(b_{t_{j-1}})$ is a linear combination of operators $P' \text{ad}(s_j)^{k_j-1}\big( \prod\limits_{\mu=0}^{t_j-1}\text{ad}(b'_{i+\mu}\text{ad}(s_j)^{k_j-1})\big) P''.$ By the induction assumption \break
\[L_{j-1} P' \text{ad}(s_j)^{k_j-1}(\prod\limits_{\mu=0}^{t_j-1}\text{ad}(b'_{i+\mu})\text{ad}(s_j)^{k_j-1})\]
\[\subseteq L_{j-1}\text{ ad}(s_j)^{k_j-1}(\prod\limits_{\mu=0}^{t_j-1} \text{ad}(b'_{i+\mu})\text{ad}(s_j)^{k_j-1}) \]
\[=L_j\prod\limits_{\mu =0}^{t-1}\text{ad}(b_{i+\mu }),\]
which finishes the proof of Claim \ref{Claim2}.
\end{proof}
\end{claim}
In particular, for $j=0$ we have
\[[L^q,a_1,a_2,\cdots,a_t]=(0).\]
Now,
\[ [L^q,[L,a_1,a_2,\cdots,a_{2t-1}]]\subseteq\sum[L^q,a_{i_1},\cdots,a_{i_\mu},L,a_{j_1},\cdots,a_{j_\nu}],\]
where in each summand $\mu+\nu=2t-1$. If $\mu\geq t$ then \[[L^q,a_{i_1},\cdots,a_{i_\mu}]=(0)].\] If $\nu\geq t$ then
\[ [L^q,a_i,\cdots,a_{i_\mu},L,a_{j_1}\cdots,a_{j\nu}]\subseteq[L^q,a_{j_1},\cdots,a_{j_\nu}]=(0).\]
Since the power $L^q$ has zero centralizer it follows that
\[[L,a_1,a_2,\cdots,a_{2t-1}]=(0).\]
We showed that in case 2, the elements \[c_1,\cdots,c_r=\underbrace{s_1,\cdots,s_1}_{k_1-1},\underbrace{s_2,\cdots,s_2}_{k_2-1},\cdots,\underbrace{s_l,\cdots,s_l}_{k_l-1}\]
and the integers $m=m_l,N=4k_1\cdots k_l-3$ satisfy the conditions of the lemma.
Let the algebra $L$ satisfy an identity of degree $n$. We will show that enlarging the system $s_1,\cdots,s_l$; $k_1\cdots,k_l\geq2$; $1\leq m_1\leq\cdots\leq m_l$ we will encounter case 2 in $\leq n-2$ steps.
The subalgebra $I_i=[L^{m_i}s_1^{k_1-1}\cdots,s_{i-1}^{k_{i-1}-1}]$ is an ideal of
\[[L^{m_{i-1}}s_1^{k_1-1}\cdots,s_{i-1}^{k_{i-1}-1}]\] and $[I_is_i^{k_i}]=(0)$. If $[L^{m_{i-1}}s_1^{k_1-1}\cdots s_{i-1}^{k_{i-1}-1}]$ satisfies an identity of degree $n_{i-1}$ then by \Cref{Lemma6} the algebra $[L^{m_i}s_1^{k_1-1}\cdots,s_{i-1}^{k_{i-1}-1}]$ satisfies an identity of degree $<n_{i-1}$. This implies that $l\leq n-2$ and finishes the proof of the lemma.
\end{proof}
\end{lemma}
Let $E$ be the associative commutative $F$-algebra presented by the countable set of generators $e_i$, $i\geq1$, and relations $e_i^2=0$, $i\geq1$. Ordered products $e_\pi=e_{i_1}\cdots e_{i_r}$, $\pi=\{i_1<i_2<\dots <i_r\}$ form a basis of the algebra $E$. Notice that we don't consider empty products and therefore the algebra $E$ does not have 1.
We will start with a short \textbf{overview} of the rest of the proof of Theorm \ref{Theorem1}. The crucial role is played by the ``linearized" Lie algebra $\til{L}=L\otimes_F E$. In section \ref{Section3}, we define divided polynomials: a generalization of usual Lie polynomials that make sense in the context of the Lie algebra $\til{L}$. A divided polynomial is regular if it is not identically zero on any ideal $\til{L^m}=L^m\otimes_F E$, $m\geq 1$. We use Lemma \ref{Lemma8} to establish existence of a regular divided polynomial whose every value is divided ad-nilpotent of degree $k\geq 3$. Then we use Kostrikin-type arguments (\cite{K1}, \cite{K2}, \cite{Z7}) to reduce $k$ to 3.
In section \ref{J alg}, we show how such regular divided polynomials give rise to a family of quadratic Jordan algebras. This result is new only for $p=2$ or $3$. For $p\geq 5$, it follows from \cite{FGG}. Using structure theory of quadratic Jordan algebras \cite{MZ}, we establish existence of a regular Jordan polynomial, every value of which is an absolute zero divisor. These references are an essential (hidden) part of the proof. This Jordan polynomial gives rise to a regular divided polynomial whose every value is divided ad-nilpotent of degree 2, i.e., is a sandwich (see \cite{K2}, \cite{KZ}).
In sections \ref{Section5} and \ref{Section6}, we further push the envelope and construct a regular divided polynomial whose every value generates a nilpotent ideal in an associative enveloping algebra to reduce the problem to the case when the associative enveloping algebra $\til{A}$ satisfies a polynomial identity and finish the proof using structure theory of PI-algebras.
For an arbitrary (not necessarily associative) $F$-algebra $A$ and its Lie algebra of derivations $D=\text{Der}(A)$ denote $\til{A}=A\otimes_FE$, $\til{D}=D\otimes_FE$. Clearly, $\til{D}\subseteq\text{Der}(\til{A})$. Let $i\in N$ and let $\til{D_i}=\sum\limits_\pi D\otimes e_\pi$, where the sum is taken over all ordered subsets of $\pi$ that contain $i$. Clearly, $\til{D_i}\lhd\til{D}$, $\til{D_i}^2=(0)$, $(AD_i)(AD_i)=(0)$, and $\til{D}=\sum\limits_i\til{D_i}$.
Let $\Omega$ be a finite family of elements of $\til{D}$ such that
\begin{enumerate}[(U1)]
\item \label{U1} every element $d\in\Omega$ lies in some ideal $\til{D_i}$,
\item \label{U2} $[d_1,d_2]=0$ for arbitrary elements $d_1, d_2\in\Omega$,.
\end{enumerate}
Consider the following linear operator on $\til{A}$:
\[U_k(\Omega)=\sum d_1\cdots d_k,\]
where the summation runs over all $k$-element subsets of $\Omega$.
We further define $U_0(\Omega)=\text{Id}$. Clearly, $U_1(\Omega)=\sum\limits_{d\in\Omega} d$.
We have $k! U_k(\Omega)=(\sum\limits_{d\in\Omega} d)^k$ and if the characteristic of the field exceeds $k$ then
\[U_k(\Omega)=\frac{1}{k!}(\sum\limits_{d\in\Omega} d)^k.\]
Hence the operators $U_k$ play the role of divided powers.
The following properties of the operators $U_k(\Omega)$ are straightforward (see also \cite{Z5,Z8}).
\begin{lemma}
\label{Lemma9} \hfill{}
\begin{enumerate}
\item $(ab)U_m(\Omega)=\sum\limits_{i=0}^m(aU_i(\Omega))(bU_{m-i}(\Omega))$ for arbitrary elements \linebreak$a,b\in\til{A}$, $m\geq0$;
\item The operator $\til{A}\rightarrow\til{A}$, $a\rightarrow\sum\limits_{i=0}^\infty aU_i(\Omega)$ is an automorphism of the algebra $\til{A}$. We remark that the sum $\sum\limits_{i=0}^\infty a U_i(\Omega)$ is finite;
\item \label{Lemma9.3} For an element $a\in\til A$ let $R(a)$ denote the operator of right multiplication by $a$. Then \[R(aU_m(\Omega))=\sum\limits_{i=0}^m(-1)^iU_i(\Omega)R(a)U_{m-i}(\Omega);\]
\item $U_i(\Omega)U_j(\Omega)={i+j \choose i} U_{i+j}(\Omega)$.
\end{enumerate}
\end{lemma}
\bigskip
\begin{remark*}
This lemma will be primarily applied to Lie algebras where the operator $R(a)$ of right multiplication by an element $a$ is the adjoint operator $\ad(a)$.
\end{remark*}
An arbitrary element $a\in\til{A}$ can be uniquely represented as $a=\sum a_\pi$ where $a_\pi\in A\otimes e_\pi$. We call it the standard decomposition of $a$.
Let $X$ be a countable set and let $I$ be an ideal of a Lie algebra $L$. Consider the set Map($X,\til{I})$ of mappings $X\rightarrow\til{I}=I\otimes_FE$. Consider also $M(I)=\text{Map(Map}(X,\til{I}),\til{I}).$ In other words, if $f\in M(I)$ and we assign values from $\til{I}$ to variables from $X$ then $f$ takes values in $\til{I}$.
Let Lie$\langle X\rangle$ be the free Lie algebra on the set of free generators $X$. Consider the free product $L\ast \Lie\langle X \rangle$. Let $(X)$ be the ideal of the algebra $L\ast Lie\langle X\rangle$ generated by $X$. An arbitrary element from $(X)$ gives rise to an element from $M(I)$.
We will define a subset $U(I)\subseteq M(I)$ that we will call the set of divided polynomials defined on $I$:
\begin{enumerate}[(DP1)]
\item \label{DP1} All elements from $(X)$ lie in $U(I)$;
\vspace{7mm}
\item \label{DP2} suppose that a divided polynomial $w$ does not depend on any variables except $x_1, \cdots, x_r$. We represent this fact as $w=w(x_1, \cdots, x_r).$ If $v_1, \cdots, v_r \in U(I)$, then $w(v_1, \cdots, v_r) \in U(I)$ as well. \\
If $w=w(x_1, \cdots, x_r)$ and $v_i=v_i(y_1, \cdots, y_m)$, $1 \leq i \leq r$, are homogeneous divided polynomials of degrees $deg_{x_i}(w)$, $deg_{y_k}(v_i)$ in each variable, then $w(v_1, \cdots, v_r)$ is a homogeneous divided polynomial of degrees $\sum\limits_{i=1}^rdeg_{x_i}(w)\cdot deg_{y_k}(v_i)$ in $y_k$, $1\leq k\leq m$;
\vspace{7mm}
\item \label{DP3} let $w=w(x_1,\cdots, x_r) \in U(I)$. Suppose that
\begin{enumerate}[i)]
\item \label{DP3i} for arbitrary elements $a, b, a_2, \cdots, a_r \in \til{I}$, we have
\[[w(a, a_2, \cdots, a_r), w(b, a_2, \cdots, a_r)]=0;\]
\item \label{DP3ii} $w$ is linear in $x_1$, which means that $w(\alpha a + \beta b, a_2, \cdots, a_r) = \alpha w(a, a_2, \cdots, a_r) + \beta w(b, a_2, \cdots, a_r)$ for arbitrary $\alpha, \beta \in E$; $a, b, a_2, \cdots, a_r \in \til{I}$ and
\[w(I \otimes e_\pi, a_2, \cdots, a_r) \subseteq I \otimes e_\pi + I \otimes e_\pi E.\]
Then for an arbitary $k \geq 0$ the function $w' = x_0 \text{ ad}_{x_1}^{[k]}(w),$ where $w'$ is defined as
\[w'(a_0, a_1, \cdots, a_r) = a_0U_k(\Omega ),\]
\[\Omega = \{\text{ad}(w(a_{1\pi},a_2, \cdots, a_r)\}_\pi,\]
where $a_1=\sum\limits_\pi a_{1\pi}$ in the standard decomposition of the element $a_1$, is a divided polynomial defined on $I$.\\
\end{enumerate}
\end{enumerate}
If $w$ is a homogeneous divided polynomial of degrees $deg_{x_i}(w)$ in $x_1, \cdots, x_r$, then $w'$ is a homogeneous divided polynomial of degrees $1, \kappa \cdot deg_{x_i}(w)$, $1 \leq i \leq r$, in $x_0, x_1, x_2, \cdots, x_r$.
An element of $M(I)$ lies in $U(I)$ if and only if starting with elements from $(X)$ and using rules DP\ref{DP2}-DP\ref{DP3}, it can be shown to be a divided polynomial.
A divided polynomial from $U(I)$ is a homogeneous divded polynomial if and only if starting with homogeneous elements from $(X)$ and applying rules DP\ref{DP2}-DP\ref{DP3} to homogeneous polynomials, it can be shown to be a homogeneous divided polynomial.
Let's recall the definition of a polynomial map of vector spaces.
Let $V,W$ be vector spaces over an infinite field $F$ and let \\$f:\underbrace{V \times \cdots \times V}_{m} \rightarrow W$, $(v_1, \cdots, v_m) \rightarrow f(v_1, \cdots, v_m) \in W$. If $f$ is multilinear then it is said to be a polynomial of degrees $(1, 1, \cdots, 1)$ in $v_1, \cdots, v_m$. Let $d_i\geq 1$, $i=1, \cdots, m$. We say that $f$ is a homogeneous polynomial map of degrees $(d_1, \cdots, d_m)$ in $v_1, \cdots, v_m$ if
\begin{enumerate}[(1)]
\item for $d_i=1$ $f$ is linear in $v_i$;
\item for $d_i\geq 2$ we have
\[f(v_1,\cdots, v_{i-1}, v_i'+v_i'',v_{i+1},\cdots, v_m) -f(v_1, \cdots, v_{i-1}, v_i',v_{i+1}, \cdots, v_m)\]
\[-f(v_1,\cdots, v_{i-1},v_i'',v_{i+1},\cdots, v_m)\]
\[=\sum\limits_{k=1}^{d_i-1}f_k(v_1,\cdots,v_{i-1},v_i',v_i'',v_{i+1},\cdots,v_m),\]
where $f_k(v_1,\cdots, v_{i-1},v_i',v_i'',v_{i+1},\cdots,v_m)$ is a homogeneous polynomial map of degrees $d_1,\cdots,d_{i-1},k,d_i-k,d_{i+1},\cdots, d_m$ in \\$v_1,\cdots,v_{i-1},v_i',v_i'',v_{i+1},\cdots,v_m$.
\end{enumerate}
Now recall the definition of a full linearization of a homogeneous polynomial map $f$ of degrees $d_1\geq 1, \cdots, d_m\geq 1$ in $v_1,\cdots, v_m$. For every $1 \leq i \leq m$ choose $d_i$ elements $v_{i1}, \cdots, v_{id_i}\in V$. Let $\pi \subseteq \{v_{i1}, \cdots, v_{id_i}\}$ be a nonempty subset. Denote \\$f_\pi =f(v_1, \cdots, v_{i-1}, \sum\limits_{v \in \pi} v, v_{i+1}, \cdots, v_m).$ The mapping
\[\Delta_i(f) = \sum\limits_{\varnothing \neq \pi \subseteq\{v_{i1},\cdots, v_{id_i}\}} (-1)^{(d_i-|\pi|)} f_\pi\]
is called the linearization of $f$ with respect to $v_i$. The mapping \break $\Delta_i(f)(v_1, \cdots, v_{i-1}, v_{i1}, \cdots, v_{id_i}, v_{i+1}, \cdots, v_m)$ is multilinear in $v_{i1}, \cdots, v_{id_i}$.
Consecutively applying linearizations with respect to all variables, we get the full linearization $\til{f}: \underbrace{V \times \cdots \times V}_{\sum\limits_{i=1}^m d_i} \rightarrow W$. Clearly $\til{f}$ is a multilinear map.
\begin{lemma}
\label{Lemma33}
For an arbitrary homogeneous divided polynomial $w \in U(I)$
\begin{enumerate}[1)]
\item the full linearization $\til{w}$ of $w$ lies in $L * \text{Lie}\langle X \rangle$;
\item the span of all values of $w$ on $\til{I}$ is equal to the span of all values of $\til{w}$ on $\til{I}$.
\end{enumerate}
\end{lemma}
\begin{proof}
$1)$ We will use induction on the number of steps DP\ref{DP2}-DP\ref{DP3} needed to construct the divided polynomial $w$.
If $v_1, \cdots, v_r, w$ are homogeneous divided polynomials, then the full linearization of $w(v_1, \cdots, v_r)$ is a linear combination of values $\til{w}(\til{v_1}, \cdots, \til{v_r})$ in appropriate variables.
Let $w=x_0\text{ ad}_{x_1}^{[k]}(v)$, where $v=v(x_1, \cdots, x_r)$ in a homogeneous divided polynomial satisfying the conditions DP3 (i), (ii). Since we can linearize variables in an arbitrary order, let's start with the variable $x_1$. Then
\[\Delta_{x_1}(w)(x_0, y_1, \cdots, y_k, x_2, \cdots, x_r) \]
\[= x_0\text{ ad}(v(y_1, x_2, \cdots, x_r)) \cdots \text{ ad}(v(y_k, x_2, \cdots, x_r)).\]
This completes the proof of assertion 1).
We will prove part 2) of the Lemma in a slightly more general context of polynomial maps of spaces. Consider again vector spaces $V, W$ and a homogeneous polynomial map $f: \underbrace{V \times \cdots \times V}_m \rightarrow W$, $(x_1, \cdots, x_m) \rightarrow f(x_1, \cdots, x_m) \in W$, $x_i \in V$. Let $f$ have degrees $d_1 \geq 1, \cdots, d_m \geq 1$ with respect to $x_1, \cdots, x_m$. Choose $x_i', x_i'' \in V$, $1 \leq i \leq m$. Consider
\[f(x_1, \cdots, x_{i-1}, x_i'+x_i'', x_{i+1}, \cdots, x_m) - f(x_1, \cdots, x_{i-1}, x_i', x_{i+1}, \cdots, x_m) \]
\[- f(x_1, \cdots, x_{i-1}, x_i'', x_{i+1}, \cdots, x_m) \]
\[= \sum\limits_{j=1}^{d_1-1} f_j(x_1, \cdots, x_{i-1}, x_i', x_i'', x_{i+1}, \cdots, x_m),\]
where the summand $f_j$ has degree $j$ in $x_i'$ and degree $d_i-j$ in $x_i''$. The homogeneous polynomial mappings $f_j$ are called partial linearizations of $f$.
Consider the finite system $\mathcal{F}$ of homogeneous polynomial maps from $V$ to $W$ that are obtained from $f$ by repeated partial linearizations.
Let $\Omega \subset V$ be a family of elements with the following property: \\
\[ \text{if }g(x_1, \cdots, x_{r}) \in \mathcal{F} \text{ and } g \text{ has degree} \geq 2 \text{ in } x_i, \text{ then for an }\label{star} \tag{$\ast$}\]
\hspace{.74cm} arbitrary element $v\in \Omega$ we have
\[ g(\underbrace{V, \cdots, V}_{i-1}, v, \underbrace{V, \cdots, V}_{r-i}) = (0).\]
We claim that for an arbitrary element $g(x_1, \cdots, x_r) \in \mathcal{F}$,
\[g(\text{span } \Omega, \cdots, \text{span } \Omega) \subseteq \text{ span}\til{f}(\Omega, \cdots, \Omega). \]
Applying this inclusion to $f=w$, $\Omega=\bigcup\limits_{i\geq1}(I\otimes e_i+I\otimes e_iE)$, we will prove part $2)$ of Lemma \ref{Lemma33}.
If $g$ is multilinear, then $g = \til{f}$. In any case, without loss of generality, we assume that the claim is true for all partial linearizations of $g$. But modulo partial linearizations the mapping $g$ is multilinear. More precisely,
\[g(\text{span } \Omega, \cdots, \text{span } \Omega) \subseteq\]
\[ \text{ span }(g(v_1, \cdots, v_r), v_i \in \Omega) + \sum g'( \text{span } \Omega, \cdots, \text{span }\Omega),\]
where $g'$ are partial linearizations of $g$. Since $g$ has degree $\geq 2$ with respect to at least one variable, we conclude that $g(v_1, \cdots, v_r) = 0.$
In particular,
\[\text{span }f(\text{span }\Omega, \cdots, \text{span }\Omega)= \text{span }(\til{f}(v_1, v_2, \cdots), v_i \in \Omega).\]
If $f$ is a homogeneous divided polynomial and $\Omega =\{a \otimes e_i, a\in L, i\geq 1\}$, then condition (\ref{star}) is clearly satisfied, which completes the proof of assertion 2).
\end{proof}
The following lemma is a linearization version of the celebrated Kostrikin Lemma ([Kos1; Kos2, Lemma 2.1.1]).
\begin{lemma}
\label{Lemma34}
Let $L$ be a Lie algebra. Let $\Omega \subset \text{Der }(L)\otimes E$ be a finite family of elements satisfying the conditions (U\ref{U1}), (U\ref{U2}). Suppose that $m \geq 1$ and for an arbitary $k \geq m$, we have $U_k(\Omega) = 0$.
\begin{enumerate}[1)]
\item Let $m\geq 2$. Then for arbitary elements $a, b \in L$, we have
\[[aU_{m-1}(\Omega), bU_{m-1}(\Omega)] =0.\]
\item Now suppose that $m \geq 4$. Let $a \in \til{L},$ $a = \sum\limits_\pi a_\pi$ be a standard decomposition, and $\Omega' = \{a_\pi U_{m-1}(\Omega)\}_\pi$. Then $U_k(\Omega')=0$ for $k \geq m-1.$
\end{enumerate}
\end{lemma}
\begin{proof}
1) We have $2m-2 \geq m$. Adjoint operators are right multiplications in Lie algebras. Hence Lemma \ref{Lemma9} $(3)$ is applicable. By Lemma \ref{Lemma9} (3),
\[0=\text{ad}(bU_{2m-2}(\Omega)) = \sum\limits_{i+j=2m-2}\pm U_i(\Omega) \text{ ad}(b)U_j(\Omega).\]
It implies
\[U_{m-1}(\Omega)\text{ ad}(b)U_{m-1}(\Omega)= \sum\limits_{\substack{i\geq m \\ \text{or } j \geq m}} \pm U_i(\Omega)\text{ ad}(b)U_j(\Omega)=0.\]
By Lemma \ref{Lemma9} $(3)$, $(4)$, we have
\begin{align*}
[aU_{m-1}(\Omega), bU_{m-1}(\Omega)]&=aU_{m-1}(\Omega)\ad\left(bU_{m-1}(\Omega)\right)\\
&=aU_{m-1}(\Omega)\ad(b)U_{m-1}(\Omega)\\
&=0;
\end{align*}
which completes the proof of the assertion 1).
2) We will show that
\[\text{ad}(a_1U_{m-1}(\Omega))\cdots\text{ad}(a_kU_{m-1}(\Omega))=0\]
for arbitrary elements $a_1, \cdots, a_k \in L$, $k \geq m-1$. Without loss of generality we will assume $k=m-1$.
By Lemma \ref{Lemma9} (3) and (4) the left hand side is a linear combination of generators
\[U_{i_0}(\Omega)\text{ ad}(a_1)U_{i_1}(\Omega) \cdots U_{i_{m-2}}(\Omega)\text{ ad}(a_{m-1})U_{i_{m-1}}(\Omega),\]
where $0 \leq i_0, i_1, \cdots, i_{m-1} \leq m-1$ and $i_0+i_1+\cdots+i_{m-1}=(m-1)^2.$
Suppose that $U_{i_0}(\Omega)\text{ ad}(a_1)\cdots\text{ad}(a_{m-1})U_{i_{m-1}}(\Omega)\neq 0$ and the $m$-tuple $(i_0, i_1, \cdots, i_{m-1})$ is lexicographically maximal with this property.
We claim that none of the indices $i_0, i_1, \cdots, i_{m-1}$ are equal to 0. Indeed, if one of the indices is equal to 0, then all other indices have to be equal to $m-1$. Since $m \geq 4$ it follows that there exists $t$, $0 \leq t \leq m-1$, such that $i_t = i_{t+1}=m-1$. Now from 1) it follows that $U_{i_t}(\Omega) \text{ ad}(a_{t+1})U_{i_{t+1}}(\Omega) = U_{m-1}(\Omega) \text{ ad}(a_{t+1})U_{m-1}(\Omega)=0$, a contradiction.
Since $(m-2)m< (m-1)^2$ it follows that at least one index $i_t$, $0 \leq t \leq m-1$, is equal to $m-1$. All of the indices $i_1, \cdots, i_{m-1}$ are smaller than $m-1$. Indeed, suppose that $i_t=m-1$, $1 \leq t\leq m-1$. We have $i_{t-1} \geq 1$ by the above. Now Lemma \ref{Lemma9} (3) implies
\[0= \text{ad}(a_tU_{i_{t-1}+i_t}(\Omega))=\sum\limits_{i+j=i_{t-1}+i_t} \pm U_i(\Omega) \text{ ad}(a_t)U_j(\Omega)\]
and therefore
\[U_{i_{t-1}}(\Omega)\text{ ad}(a_t)U_{i_t}(\Omega)=\sum\limits_{\substack{i> i_t \\ j < m-1}} \pm U_i(\Omega) \text{ ad}(a_t)U_j(\Omega),\]
which contradicts lexicographical maximality of $(i_0, \cdots, i_{m-1})$.
We have proved that $i_0=m-1,$ $i_1=i_2=\cdots = i_{m-1}=m-2$. Now our aim will be to show that
\[U_{m-1}(\Omega)\text{ ad}(a_1)U_{m-2}(\Omega)=0.\]
Since $(m-1)+(m-3) \geq m$, Lemma \ref{Lemma9} (3) implies that
\[U_{m-1}(\Omega)\text{ ad}(a_1)U_{m-3}(\Omega) - U_{m-2}(\Omega)\text{ ad}(a_1)U_{m-2}(\Omega) \]
\[+ U_{m-3}(\Omega)\text{ ad}(a_1)U_{m-1}(\Omega)=0.\]
Multiplying the left hand side by $U_1(\Omega)$ on the right and taking into account Lemma \ref{Lemma9} (4), we get
\[(m-2)U_{m-1}(\Omega)\text{ ad}(a_1)U_{m-2}(\Omega) -(m-1)U_{m-2}(\Omega)\text{ ad}(a_1)U_{m-1}(\Omega) = 0.\]
On the other hand Lemma \ref{Lemma9} (3) implies that
\[U_{m-1}(\Omega)\text{ ad}(a_1)U_{m-2}(\Omega) - U_{m-2}(\Omega)\text{ ad}(a_1)U_{m-1}(\Omega)=0.\]
The system of equations implies
\[U_{m-1}(\Omega)\text{ ad}(a_1)U_{m-2}(\Omega)=0,\]
which completes the proof of the lemma.
\end{proof}
\begin{definition}
We say that a divided polynomial $w(x_1,\cdots,x_r)$ defined on $L^s,\ s\geq1$, is \underline{regular} if for an arbitrary $i\geq s$ we have $w(\til{L}^i,\cdots,\til{L}^i)\neq(0)$.
\end{definition}
By Lemma \ref{Lemma33} $(2)$, a homogeneous divided polynomial $w$ is regular if and only if its full linearization is regular.
\begin{lemma}
\label{Lemma10}There exist integers $m\geq1,N\geq1$ and a regular homogeneous divided polynomial $w(x_1,\cdots,x_r)$ defined on $L^m$ such that $w$ satisfies the conditions in (DP3) and $x_0\ad_{x_1}^{[t]}(w)=0$ holds identically on $\til L^m$ for all $t \geq N$.
\begin{proof}
Consider the elements $c_1,\cdots,c_r\in S$ and integers $m\geq1,\ N\geq1$ of \Cref{Lemma8}. By property 2), for an $i\geq m$ the subspace $L_i=[L^i,c_1,\cdots,c_r]$ is a subalgebra of $L$. By 3) this subalgebra is nilpotent, say, of degree $d(i),\ d(m)\geq d(m+1)\geq\cdots$. This sequence stabilizes at some step, $d=d(k)=d(k+1)=\cdots$. Thus $L_k^d=(0)$ and $L_i^{d-1}\neq(0)$ for any $i\geq m$. Let
\begin{multline*}w(x_1,\cdots,x_{d-1})=[[x_1,c_1,\cdots,c_r],[x_2,c_1,\cdots,c_r],\cdots\\
\cdots,[x_{d-1},c_1,\cdots,c_r]]\in L\ast\Lie\langle X\rangle.
\end{multline*}
The divided polynomial $w$ is regular and linear in $x_1$. For arbitrary elements $a_2,\cdots,a_{d-1}\in L^k$ we have \[[w(L^k,a_2,\cdots,a_{d-1}),w(L^k,a_2,\cdots,a_{d-1})]=(0)\]
because the left hand side lies in $L_k^d$. Hence the divided polynomial $w$ satisfies the condition (DP3). Therefore the divided polynomial $x_0 \text{ad}_{x_1}^{[t]}(w)$ is defined on $L^k$ for any $t \geq 1.$ For $t \geq N$ the polynomial $x_0\text{ad}_{x_1}^{[t]}(w)$ is identically zero on $\til{L}^k$ by Lemma \ref{Lemma8} (3). This finishes the proof of the lemma.
\end{proof}
\end{lemma}
Let $q\geq1$ be a minimal integer with the following property:
there exists an $m \geq 1$ and a regular homogeneous divided polynomial $w=w(x_1,\cdots,x_r)$ defined on $L^m$, linear in $x_1$, such that
\begin{enumerate}[i)]
\item for arbitrary elements $a,b,a_2,\cdots,a_r\in \til L^m$ we have \[[w(a,a_2,\cdots,a_r),w(b,a_2,\cdots,a_r)]=0;\]
\item $\til L^m\ad_{x_1}^{[t]}(w)=(0)$ holds identically on $\til L^m$ for all $t \geq q.$ Clearly, $q \leq N.$
\end{enumerate}
\begin{lemma}
\label{Lemma11}$q\leq3$.
\begin{proof}
Suppose that $q\geq4$. Consider the divided polynomial \linebreak $v(x_0,x_1,\cdots,x_r)=x_0\ad_{x_1}^{[q-1]}(w)$ defined on $L^m$. In view of the minimality of $q$, the divided polynomial $v$ is regular.
By Lemma \ref{Lemma34} (1) for arbitrary elements $a,b\in\til L^m;\ a_1,\cdots,a_r\in\til L^m$ we have
\[[v(a,a_1,\cdots,a_r),v(b,a_1,\cdots,a_r)]=0.\]
We proved that the divided polynomial $y\ad_{x_0}^{[q-1]}(v(x_0,\cdots,x_r))$ is defined on $\til L^m$. If $q\geq4$, then by Lemma \ref{Lemma34} (2), this divided polynomial is identically zero, which contradicts the minimality of $q$ and finishes the proof of the lemma.
\end{proof}
\end{lemma}
\begin{lemma}
\label{Lemma12}
Let $L$ be a Lie algebra. Let $\Omega \subset \til{L}$ be a finite family of elements such that ad($\Omega$) satisfies the assumptions (U\ref{U1}), (U\ref{U2}). Suppose that $U_2(\text{ad}(\Omega))=0$. Then $a = \sum\limits_{b \in \Omega} b$ is a sandwich of the Lie algebra $\til{L}$.
\begin{proof}
We have $\text{ad}(a)^2=U_1(\text{ad}(\Omega))U_1(\text{ad}(\Omega))=2U_2(\text{ad}(\Omega))=0.$ By Lemma \ref{Lemma9} (\ref{Lemma9.3}) for an arbitrary element $c \in \til{L}$ we have
\begin{multline*}
\text{ad}(cU_2(\text{ad}(\Omega)))=\text{ad}(c)U_2(\text{ad}(\Omega))-U_1(\text{ad}(\Omega))\text{ad}(c)U_1(\text{ad}(\Omega))\\
+ U_2(\text{ad}(\Omega))\text{ad}(c),
\end{multline*}
which implies $\text{ad}(b)\text{ad}(c)\text{ad}(b) = 0$ and completes the proof of the lemma.
\end{proof}
\end{lemma}
In what follows, we will use the subsequent lemma.
\begin{lemma}
\label{Lemma40}
Let $L$ be a Lie algebra. Let $\Omega=\{a_1,\cdots, a_n\}\subset L$ be a finite family of elements. Let $\Omega=\Omega_1\dot{\cup}\cdots\dot{\cup}\Omega_s=\Omega'_1\dot{\cup}\cdots\dot{\cup}\Omega'_t$ be two disjoint decompositions. Denote $b_k=\sum\limits_{a_i\in\Omega_k}a_i$, $c_\ell=\sum\limits_{a_j\in\Omega'_\ell}a_j$. Denote also $\ad[\Omega,\Omega]=\spn(\ad[a_i,a_j],1\leq i,j\leq n)$.
Suppose that if $a_i,a_j$ lie in the same $\Omega_k$ or in the same $\Omega'_\ell$, then $\ad(a_i)\ad(a_j)=0$. Then $\sum\ad(b_{k_1})\ad(b_{k_2})=\sum\ad(c_{\ell_1})\ad(c_{\ell_2})$ mod $\ad[\Omega,\Omega]$, where both sums run over all 2-element subsets $\{k_1,k_2\}\subseteq\{1,\cdots,s\}$ and $\{\ell_1,\ell_2\}\subseteq\{1,2,\cdots,t\}$ respectively.
\end{lemma}
\begin{proof}
It is easy to see that
\begin{align*}
\sum\ad(b_{k_1})\ad(b_{k_2})&=\sum\ad(c_{\ell_1})\ad(c_{\ell_2})\\
&=\sum\limits_{1\leq i<j\leq n}\ad(a_i)\ad(a_j) \text{ \hspace{0.1cm} mod} \ad[\Omega,\Omega].
\end{align*}
\end{proof}
\section{Jordan algebras}
\label{J alg}
Let $J$ be a vector space over a field $F$ (of arbitrary characteristic) with two quadratic mappings $J\rightarrow J,\ x\rightarrow x^2$, and $Q:J\rightarrow End_F(J)$. For elements $x,y,z\in J$ denote
\[x\circ y=(x+y)^2-x^2-y^2,\ \{x,y,z\}=y(Q(x+z)-Q(x)-Q(z)).\]
Following K. McCrimmon (\cite{M1}) we say that $(J,x\rightarrow x^2,Q)$ is a quadratic Jordan algebra if it satisfies the identities
\begin{enumerate}[(M1)]
\item $\{x,x,y\}=x^2\circ y$;
\item $(yQ(x))\circ x=(y\circ x)Q(x)$;
\item $x^2Q(x)=(x^2)^2$;
\item $x^2Q(y)Q(x)=(yQ(x))^2$;
\item $Q(x^2)=Q(x)^2$;
\item $Q(yQ(x))=Q(x)Q(y)Q(x)$
\vspace{-.4 cm}
\end{enumerate}
and all their partial linearizations.
We reiterate the assumption made at the beginning of section \ref{Section3}: all algebras are considered over an infinite field $F$ of characteristic $p>0.$
Let $w'=w'(x_1,\cdots,x_{r-1})$ be a regular homogeneous divided polynomial defined on $L^m$ such that $w'$ is linear in $x_1$ and satisfies all the assumptions of (DP\ref{DP3}). Moreover, assume that $\til{L^m}\text{ ad}_{x_1}^{[k]}(w')=0$ holds identically for $k\geq 3$. If there exists $s \geq m$ such that $x_r\text{ ad}_{x_1}^{[2]}(w')$ holds identically on $\til{L^s}$ then our goal of constructing a sandwich valued regular homogeneous divided polynomial has been achieved. We assume therefore that the divided polynomial $w(x_1,\cdots,x_r)=x_r\ad_{x_1}^{[2]}(w')$ is regular.
The divided polynomial $w$ satisfies both assumptions of (DP3): it is clearly linear in $x_r$ and for arbitrary elements $a,b,a_1,\cdots, a_{r-1}\in\til{L^m}$, we have
\[[a\ad_{x_1}^{[2]}w'(a_1,\cdots,a_{r-1}), b\ad_{x_1}^{[2]}w'(a_1,\cdots, a_{r-1})]=0\]
by Lemma \ref{Lemma34} (1).
Choose $a_1,\cdots, a_r \in \til{L^m}$ and denote $a'=w'(a_1,\cdots, a_{r-1})$, \linebreak$a=w(a_1,\cdots,a_r)$. Denote $\ad^{[k]}(a')=(\ad_{x_1}^{[k]}w')(a_1,\cdots,a_{r-1})$. If \linebreak $a_r=\sum\limits_\pi a_{r\pi}$ is the standard decomposition, then we denote $\ad^{[k]}(a)=(\ad_{x_r}^{[k]}w)(a_1,\cdots,a_r)=\sum\ad(a_{r\pi_1}\ad^{[2]}(a'))\cdots\ad(a_{r\pi_k}\ad^{[2]}(a'))$, where the sum runs over all $k$-element sets $(\pi_1,\cdots,\pi_k)$.
Notice that $\ad^{[k]}(a)=0$ for $k\geq3$. Indeed, by Lemma \ref{Lemma9} (3), the equalities $\ad(a_{r\pi_i}\ad^{[3]}(a'))=0$ and $\ad(a_{r\pi_i}\ad^{[4]}(a'))=0$ imply
\[\label{eqn:ast}\tag{$\ast$} \ad^{[2]}(a')\ad(a_{r\pi_i})\ad(a')=\ad(a')\ad(a_{r\pi_i})\ad^{[2]}(a'),\]
\[\label{eqn:dast}\tag{$\ast\ast$}\ad^{[2]}(a')\ad(a_{r\pi_i})\ad^{[2]}(a')=0\]
\noindent respectively.
We have
\[\ad^{[k]}(a)=\sum\pm\ad^{[i_1]}(a')\ad(a_{r\pi_1})\ad^{[i_2]}(a')\cdots\ad(a_{r\pi_k})\ad^{[i_{k+1}]}(a'),\]
\noindent where $0\leq i_1, \cdots, i_{k+1}\leq 2$, $i_1+\cdots+i_{k+1}=2k$. If at least one $i_\mu$, $1\leq \mu\leq k+1$, is equal to 0, then all other $i_\nu$, $\nu\neq\mu$, are equal to 2. In this case, the product is equal to 0 by (\ref{eqn:dast}). Suppose that all $i_\mu\neq0$. Then all $i_\mu$, except two, are equal to 2. These two are equal to 1. Since $k+1\geq 4$, we have at least two degrees $i_\mu$ that are equal to 2. Using (\ref{eqn:ast}), we can move two operators $\ad^{[2]}(a')$ together and then use (\ref{eqn:dast}).
Consider the subspaces $K'_a=\{x\in\til{L}^m|x\ad^{[2]}(a)=0\}$ and $K_a=\sum\limits_i(L^m\otimes e_i+\til{L}^me_i)\cap K'_a$ and the factor space $J_a=\til{L}^m/K_a$.
Let $x=\sum\limits_{\pi}x_\pi$ be the standard decomposition of an element $x\in \til L^m$. Define $x^2=a\sum\ad(x_{\pi_1})\ad(x_{\pi_2})+K_a$, where the sum runs over all 2-element sets $(\pi_1,\pi_2)$. The order of the factors in $\ad(x_{\pi_1})\ad(x_{\pi_2})$ is irrelevant since $[a,\til L^m]\subseteq K_a$. Define further
\[yQ(x)=y\ad^{[2]}(a)\sum\ad(x_{\pi_1})\ad(x_{\pi_2})+K_a\]
Again, the order of factors in $\ad(x_{\pi_1})\ad(x_{\pi_2})$ is irrelevant since \linebreak $y\ad^{[2]}(a)\ad(\til L^m)\subseteq K_a$.
Linearizing the above operations, we get $x\circ y =[[a,x],y]+K_a$ for $x,y\in J_a$, and $\{x,y,z\}=[y\ad^{[2]}(a),x,z]+K_a$ for $x,y,z\in J$.
\begin{lemma}
\label{Lemma13} \hfill{}
\begin{enumerate}
\item the element $u=y_1\ad^{[i_1]}(a)\ad(y_2)\ad^{[i_2]}(a)\cdots\ad(y_s)\ad^{[i_s]}(a),$\linebreak where $y_1,\cdots,y_s\in\til L^m;\ i_1+\cdots+i_s\geq s+2$, is equal to 0;
\item an operator $ad^{[i_1]}(a)\ad(y_1)\cdots\ad(y_s)\ad^{[i_{s+1}]}(a),$ for $y_1,\cdots,y_s\in\til L^m;\ i_1+\cdots,i_{s+1}\geq s+3,$ is equal to 0 on $\til L^m$;
\item consider an operator
\[v=\ad^{[i_1]}(a)\ad(y_1)\cdots\ad(y_s)\ad^{[i_{s+1}]}(a),\]
where $y_1,\cdots,y_s\in \til L^m,\ i_1+\cdots+i_{s+1}\geq s+2$. Suppose that there exists $1\leq k\leq s-2$ such that $i_{k+1}=i_{k+2}=0$, in other words $v=\sum\cdots\ad(y_k)\ad(y_{k+1})\ad(y_{k+2})\cdots$. Then $v$ is zero on $\til L^m$.
\end{enumerate}
\begin{proof}
To prove (1) we will use induction on $s$. If $s=1$ then $u=y_1\ad^{[i_1]}(a),\ i_1\geq3$. Hence $u=0.$
Let $s\geq2$. If $i_1\geq3$ then again $u=0.$ If $i_1\leq1$ then choosing $y_1'=y_1\ad^{[i_1]}(a)\ad(y_2)$ we can use the induction assumption. Therefore we let $i_1=2$. If $i_2=0$ then choosing $y_1'=i_1\ad^{[2]}(a)\ad(y_2)\ad(y_3)$ we again use the induction assumption. Let $i_2=1$. Then by \linebreak\Cref{Lemma9}(3) we have
\[\ad^{[2]}(a)\ad(y_2)\ad(a)=\ad(a)\ad(y_2)\ad^{[2]}(a),\]
the case that has already been considered. Finally, if $i_2=2$ then $\ad^{[2]}(a)\ad(y_2)\ad^{[2]}(a)=0,$ again by \Cref{Lemma9}(3), which finishes the proof of part (1).
To prove (2) we consider the element
\[y_0\ad^{[i_1]}(a)\ad(y_1)\cdots\ad(y_s)\ad^{[i_{s+1}]}(a)\]
and use part (1).
Consider now an operator $v=\ad^{[i_1]}(a)\ad(y_1)\cdots\ad(y_s)\ad^{[i_{s+1}]}(a)$ and suppose that \[v=v'\ad(y_k)\ad(y_{k+1})\ad(y_{k+2})v'',\] where
\[v'=\ad^{[i_{1}]}(a)\ad(y_1)\cdots\ad(y_{k-1})\ad^{[i_k]}(a),\]
\[v''=\ad^{[i_{k+3}]}(a)\cdots\ad^{[i_{s+1}]}(a).\]
By part (2) if $v\neq0$ on $\til L^m$ then $i_1+\cdots+i_k\leq(k-1)+2=k+1,\ i_{k+1}+\cdots+i_{s+1}\leq(s-k-2)+2=s-k$. However, $i_1+\cdots+i_k+i_{k+3}+\cdots+i_{s+1}\geq s+2$, a contradiction that finishes the proof of the lemma.
\end{proof}
\end{lemma}
\begin{lemma}
\label{Lemma14} Let $\Omega$ be a finite family of commuting elements from $\til{L}$ such that every element from $\Omega$ lies in one of the ideals $L \otimes e_\pi + \til{L} e_\pi$. Denote for brevity $U_k(\ad(\Omega))=\ad^{[k]}(\Omega)$ and suppose that $\ad^{[3]}(\Omega)=\ad^{[4]}(\Omega)=0$. Then for arbitrary elements $y_1, y_2 \in \til{L}$ we have
\[\ad(y_1\adx[2][](\Omega))\ad(y_2\adx[2][](\Omega))=\adx[2][](\Omega)\ad(y_1)\ad(y_2)\adx[2][](\Omega).\]
\begin{proof}
By \Cref{Lemma9}(3) we have
\[\begin{multlined}\ad(y_i\adx[2][](\Omega))=\ad(y_i)\adx[2][](\Omega)-\\\adx[1][](\Omega)\ad(y_i)\adx[1][](\Omega)+\adx[2][](\Omega)\ad(y_i),\end{multlined}\]
$i=1,2$. By \cref{Lemma9}(4) we have also
\[
\adx[1][](\Omega)\adx[1][](\Omega)=2\adx[2][](\Omega),\]
\[ \adx[1][](\Omega)\adx[2][](\Omega)=
\adx[2][](\Omega)\adx[1][](\Omega)=3\adx[3][](\Omega)=0.\]
Again by \Cref{Lemma9}(3) we have
\begin{multline*}
\ad(y_i\adx[3][](\Omega))=\ad(y_i)\adx[3][](\Omega)-\adx[1][](\Omega)\ad(y_i)\adx[2][](\Omega)+\\
\adx[2][](\Omega)\ad(y_i)\adx[1][](\Omega)-\adx[3][](\Omega)\ad(y_i)=0,
\end{multline*}
which implies
\[\adx[1][](\Omega)\ad(y_i)\adx[2][](\Omega)=\adx[2][](\Omega)\ad(y_i)\adx[1][](\Omega).\]
Similarly, $\ad(y_i\adx[4][](\Omega))=0$ implies $\adx[2][](\Omega)\ad(y_1)\adx[2][](\Omega)=0.$ Hence,
\begin{align*}
&\ad(y_1\adx[2][](\Omega))\ad(y_2\adx[2][](\Omega))=
(\ad(y_i)\adx[2][](\Omega)-\\
&\adx[1][](\Omega)\ad(y_1)\adx[1][](\Omega)+ \adx[2][](\Omega)\ad(y_1))(\ad(y_2)\adx[2][](\Omega)-\\
&\adx[1][](\Omega)\ad(y_2)\adx[1][](\Omega)+\adx[2][](\Omega)\ad(y_2))=\\
&-\adx[1][](\Omega)\ad(y_1)\adx[1][](\Omega)\ad(y_2)\adx[2][](\Omega)+\\
& 2\adx[1][](\Omega)\ad(y_1)\adx[2][](\Omega)\ad(y_2)\adx[1][](\Omega)+\\
&\adx[2][](\Omega)\ad(y_1)\ad(y_2)\adx[2][](\Omega)-\\
&\adx[2][](\Omega)\ad(y_1)\adx[1][](\Omega)\ad(y_2)\adx[1][](\Omega)=\\
&\adx[2][](\Omega)\ad(y_1)\ad(y_2)\adx[2][](\Omega),
\end{align*}
which proves the lemma.
\end{proof}
\end{lemma}
\begin{lemma}
\label{Lemma41}
\begin{enumerate}[(1)]
\item The operations $x\rightarrow x^2$ and $Q$ are well defined on $J_a$;
\item let $f:\til{L}^m\times\cdots\times\til{L}^m\rightarrow\til{L}^m$ be a homogeneous polynomial map, and let $\til{f}(x_1,\cdots, x_n)$ be its full linearization. Suppose that $\til{f}(L^m\otimes e_i+\til{L}^me_i,\til{L}^m,\cdots,\til{L}^m)\subseteq L^m\otimes e_i+\til{L}^me_i$ for all $i$.
\end{enumerate}
Then, if an arbitrary value of $f$ lies in $K'_a$, then an arbitrary value of $f$ lies in $K_a$.
\end{lemma}
\begin{proof}
(1) Choose arbitrary elements $x,y\in\til{L}^m$ and $z',z\in K_a$. We need to show that $(y+z')Q(x+z)=yQ(x)$ and $(x+z)^2=x^2$. Let $x=\sum\limits_\pi x_\pi$ be the standard decomposition of the element $x$. We have $z'Q(x)=z'\ad^{[2]}(a)\sum\ad(x_{\pi_1})\ad(x_{\pi_2})+K_a=0$ since $z'\in K_a\subseteq K'_a$. Hence $(y+z')Q(x+z)=yQ(x+z)$. Furthermore, it is easy to see that
\[yQ(x+z)=yQ(x)+y\ad^{[2]}(a)\ad(x)\ad(z)+yQ(z) \text{ \hspace{0.1cm} mod } K_a.\]
By Lemma \ref{Lemma14}, for an arbitrary standard component $x_\pi$ of the element $x$, we have
\[\ad^{[2]}(a)\ad(x_\pi)\ad(z)\ad^{[2]}(a)=\ad(x_\pi\ad^{[2]}(a))\ad(z\ad^{[2]}(a))=0,\]
since $z\in K'_a$. Hence $y\ad^{[2]}(a)\ad(x_\pi)\ad(z)\in K_a$ and \linebreak $y\ad^{[2]}(a)\ad(x)\ad(z)\in K_a$.
Let us show that $yQ(z)=0$. We have $z=z_1+\cdots+z_s$, where $z_i\in(L^m\otimes e_i+\til{L}^me_i)\cap K'_a$. Let $z_i=\sum\limits_\pi z_{i\pi}$ be the standard decomposition of the element $z_i$. Then $z=\sum\limits_\pi z_\pi$, $z_\pi=\sum\limits_i z_{i\pi}$, is the standard decomposition of the element $z$. Consider the family of elements $\Omega=\{z_{i\pi}\}_{i,\pi}$ and two decompositions $\Omega=\bigcup\Omega_i$, $\Omega_i=\{z_{i\pi}\}_\pi$, and $\Omega=\bigcup\limits_\pi\Omega'_\pi$, $\Omega'_\pi=\{z_{i\pi}\}_i$. By Lemma \ref{Lemma40}, we have
\begin{align*}
y\ad^{[2]}(a)&\sum\ad(z_{\pi_1})\ad(z_{\pi_2})\\
&=y\ad^{[2]}(a)\sum\limits_{1\leq i<j\leq s}\ad(z_i)\ad(z_j)\text{ \hspace{0.1cm} mod } y\ad^{[2]}(a)\ad(\til{L}^m).
\end{align*}
Recall that $y\ad^{[2]}(a)\ad(\til{L}^m)\subseteq K_a$. The element $y\ad^{[2]}(a)\ad(z_i)\ad(z_j)$ lies in $L^m\otimes e_i+\til{L}^me_i$ and
\[y\ad^{[2]}(a)\ad(z_i)\ad(z_j)\ad^{[2]}(a)=y\ad(z_i\ad^{[2]}(a))\ad(z_j\ad^{[2]}(a))=0\]
by Lemma \ref{Lemma14}. Hence, $y\ad^{[2]}(a)\ad(z_i)\ad(z_j)\in K_a$. This implies $yQ(z)=0$.
Now let us show that $(x+z)^2=x^2$. We have $(x+z)^2=x^2+a\ad(z)\ad(x)+z^2$ mod $K_a$. For an arbitrary standard component $x_\pi$,
\begin{align*}
a\ad(z)\ad(x_\pi)\ad^{[2]}(a)&=-z\ad(a)\ad(x_\pi)\ad^{[2]}(a)\\
&=-z\ad^{[2]}(a)\ad(x_\pi)\ad(a)\\
&=0
\end{align*}
by Lemma \ref{Lemma9} (3). Hence $a\ad(z)\ad(x_\pi)\in K_a$ and $a\ad(z)\ad(x)\in K_a$.
Let us show that $z^2=0$. We have $z^2=a\sum\ad(z_{\pi_1})\ad(z_{\pi_2})+K_a$. By Lemma \ref{Lemma40},
\[a\sum\ad(z_{\pi_1})\ad(z_{\pi_2})=a\sum\limits_{1\leq i<j\leq s}\ad(z_i)\ad(z_j) \text{ \hspace{0.1cm} mod } a\ad(\til{L}^m)\subseteq K_a.\]
As above,
\begin{align*}
a\ad(z_i)\ad(z_j)\ad^{[2]}(a)&=-z_i\ad(a)\ad(z_j)\ad^{[2]}(a)\\
&=z_i\ad^{[2]}(a)\ad(z_j)\ad(a)\\
&=0
\end{align*}
by Lemma \ref{Lemma9} (3). Hence $a\ad(z_i)\ad(z_j)\in K_a$ and \linebreak $a\sum\ad(z_{\pi_1})\ad(z_{\pi_2})\in K_a$. This completes the proof of part (1).
(2) Now let $f:\til{L}^m\times\cdots\times\til{L}^m\rightarrow\til{L}^m$ be a homogeneous polynomial map with the full linearization $\til{f}$. By Lemma \ref{Lemma33} (2), for polynomial maps, the $F$-linear span of all values of $f$ is equal to the $F$-linear span of all values of $\til{f}$. Hence, we need to show that $\til{f}(\til{L}^m,\cdots,\til{L}^m)\subseteq K_a$. Since $\til{L}^m=\sum\limits_i(L^m\otimes e_i+\til{L}^me_i)$, it follows that $\til{f}(\til{L}^m, \cdots, \til{L}^m)=\sum\limits_i\til{f}(L^m\otimes e_i+\til{L}^me_i, \til{L}^m,\cdots, \til{L}^m)$. By our assumption, $\til{f}(L^m\otimes e_i+\til{L}^me_i, \til{L}^m,\cdots, \til{L}^m)\subseteq K_a'\cap(L^m\otimes e_i+\til{L}^me_i)\subseteq K_a$. This completes the proof of assertion (2).
\end{proof}
The following proposition is a linearized an quadratic version of the construction in \cite{FGG}.
\begin{proposition}\label{Proposition1}
$J_a=(J_a,x\rightarrow x^2, Q)$ is a quadratic Jordan algebra.
\end{proposition}
Since the ground field is infinite partial linearizations of the identities (M1)-(M6) follows from these identities (see \cite{J2},\cite{ZSSS}).
We will translate the identities (M1)-(M6) into the language of Lie algebras. The identities (M1)-(M6) translate as
\begin{enumerate}[(M1)]
\item $x\ad^{[2]}(a)\ad(x)\ad(y)=a\ad(a\ad^{[2]}(x))\ad(y)$ mod $K_a$,
\item $y\ad^{[2]}(a)\ad^{[2]}(x)\ad(a)\ad(x)=-a\ad(x)\ad(y)\ad^{[2]}(a)\ad^{[2]}(x)\linebreak=y\ad([a,x])\ad^{[2]}(a)\ad^{[2]}(x)$ mod $K_a$,
\item $a\ad^{[2]}(x)\ad^{[2]}(a)\ad^{[2]}(x)=a\ad^{[2]}(a\ad^{[2]}(x))$ mod $K_a$,
\item $a\ad^{[2]}(x)\ad^{[2]}(a)\ad^{[2]}(y)\ad^{[2]}(a)\ad^{[2]}(x)\\=a\ad^{[2]}(y\ad^{[2]}(a)\ad^{[2]}(x))$ mod $K_a$,
\item $y\ad^{[2]}(a)\ad^{[2]}(a\ad^{[2]}(x))=y\ad^{[2]}(a)\ad^{[2]}(x)\ad^{[2]}(a)\ad^{[2]}(x)$ \linebreak mod $K_a$,
\item $z\ad^{[2]}(a)\ad^{[2]}(y\ad^{[2]}(a)\ad^{[2]}(x))\\=z\ad^{[2]}(a)\ad^{[2]}(x)\ad^{[2]}(a)\ad^{[2]}(y)\ad^{[2]}(a)\ad^{[2]}(x)$ mod $K_a$.
\end{enumerate}
\begin{remark*} In the formulas above, we have operators $\ad^{[2]}(x)$,\linebreak $\ad^{[2]}(a\ad^{[2]}(x))$, $\ad^{[2]}(y\ad^{[2]}(a)\ad^{[2]}(x))$ acting on elements from the space $Fa+\til{L^m}\ad^{[2]}(a)$. In the definition of Jordan operations on $J_a=\til{L^m}/K_a$ above, we noticed that $(Fa+\til{L^m}\ad^{[2]}(a))\ad(\til{L^m})\subseteq K_a$. Hence for an arbitrary element $u\in \{x,a\ad^{[2]}(x),y\ad^{[2]}(a)\ad^{[2]}(x)\}$, the operator $\ad^{[2]}(u)$ is understood as $\sum\ad(u_i)\ad(u_j)$, where $u=\sum u_j$ is the standard decomposition, the sum runs over all 2-element sets $(i,j)$ and the order of factors in $\ad(u_i)\ad(u_j)$ is irrelevant modulo $K_a$.
\end{remark*}
Let $x,y\in\til{L^m}$; $x=\sum\limits_\pi x_\pi$, $y=\sum\limits_\tau y_\tau$ the standard decompositions. At first, we will prove the identities (M1)-(M6) under the additional assumption that $[x_{\pi_i}, x_{\pi_j}]=[y_{\tau_i},y_{\tau_j}]=0$,
\[\ad(x_{\pi_i})\ad(x_{\pi_j})\ad(x_{\pi_k})=\ad(y_{\tau_1})\ad(y_{\tau_2})\ad(y_{\tau_3})=0\]
for all $i,j,k$.
More precisely, let $L_0'$ be the Lie algebra presented by generators $a_1,\cdots, a_n$, $x_1, \cdots, x_s$, $y_1,\cdots, y_t$ and the following relations:
\[[\Id(a_i),\Id(a_i)]=[\Id(x_j), \Id(x_j)]=[\Id(y_k), \Id(y_k)]=(0),\]
where $\Id(a_i)$, $\Id(x_j)$, $\Id(y_k)$ denote the ideals generated by $a_i$, $x_j$, $y_k$ respectively, $1\leq i\leq n$, $1\leq j\leq s$, $1\leq k\leq t$; $[a_i,a_j]=0$, $1\leq i,j\leq n$; the operators $\ad^{[k]}(a)=\sum\ad(a_{i_1})\cdots\ad(a_{i_k})$, where the sum is taken over all $k$-element subsets of $\{1,2,\cdots, n\}$ is equal to 0 for $k\geq 3$.
Denote $a=\sum\limits_{i=1}^na_i$, $x=\sum\limits_{j=1}^sx_j$.
\begin{remark*}
The generators $a_1,\cdots, a_n$ should not be confused with elements $a_1,\cdots, a_r\in\til{L^m}$ used to define $a'=w'(a_1,\cdots, a_{r-1})$,\linebreak $a=w(a_1,\cdots, a_r)$ above.
\end{remark*}
In the algebra $L_0'$, define linear operators
\[\ad^{[2]}(a)=\sum\limits_{1\leq i<j\leq n}\ad(a_i)\ad(a_j),\]
\[\ad^{[2]}(x)=\sum\limits_{1\leq i<j\leq s}\ad(x_i)\ad(x_j),\]
\[\ad^{[2]}(y)=\sum\limits_{1\leq i<j\leq t}\ad(y_i)\ad(y_j),\]
\[\ad^{[2]}(a\ad^{[2]}(x))=\sum\limits_{1\leq i<j\leq n}\ad(a_i\ad^{[2]}(x))\ad(a_j\ad^{[2]}(x)),\]
\[\ad^{[2]}(y\ad^{[2]}(a)\ad^{[2]}(x))=\sum\limits_{1\leq i<j\leq t}\ad(y_i\ad^{[2]}(a)\ad^{[2]}(x))\ad(y_j\ad^{[2]}(a)\ad^{[2]}(x))\]
and consider the elements
\begin{enumerate}[(M1$'$)]
\item $(x\ad^{[2]}(a)\ad(x)\ad(y)-a\ad(a\ad^{[2]}(x))\ad(y)\ad^{[2]}(a)$,
\item $(y\ad^{[2]}(a)\ad^{[2]}(x)\ad(a)\ad(x)\\+a\ad(x)\ad(y)\ad^{[2]}(a)\ad^{[2]}(x))\ad^{[2]}(a)$,
\item $(a\ad^{[2]}(x)\ad^{[2]}(a)\ad^{[2]}(x)-a\ad^{[2]}(a\ad^{[2]}(x)))\ad^{[2]}(a)$,
\item $(a\ad^{[2]}(x)\ad^{[2]}(a)\ad^{[2]}(y)\ad^{[2]}(a)\ad^{[2]}(x)\\-a\ad^{[2]}(y\ad^{[2]}(a)\ad^{[2]}(x)))\ad^{[2]}(a)$,
\item $(y\ad^{[2]}(a)\ad^{[2]}(a\ad^{[2]}(x))\\-y\ad^{[2]}(a)\ad^{[2]}(x)\ad^{[2]}(a)\ad^{[2]}(x))\ad^{[2]}(a)$,
\item $(z\ad^{[2]}(a)\ad^{[2]}(y\ad^{[2]}(a)\ad^{[2]}(x))\\-z\ad^{[2]}(a)\ad^{[2]}(x)\ad^{[2]}(a)\ad^{[2]}(y)\ad^{[2]}(a)\ad^{[2]}(x)\ad^{[2]}(a)$.
\end{enumerate}
Now, consider the Lie algebra $L_0$ that is obtained from $L_0'$ by imposing additional relations:\\
$[x_i,x_j]=0$, $1\leq i,j\leq s$; $[y_i,y_j]=0$, $1\leq i,j\leq t$; $[L_0,x_{i_1},x_{i_2}, x_{i_3}]=[L_0,y_{j_1},y_{j_2},y_{j_3}]=(0)$, for all $1\leq i_1,i_2,i_3\leq s$, $1\leq j_1,j_2,j_3\leq t$.
We will show that the elements (M1$'$)$-$(M6$'$) are equal to zero in the Lie algebra $L_0$.
\begin{lemma}\label{Lemma15}
$[a\ad^{[2]}(x),a]+[x\ad^{[2]}(a),x]\in [L_0,a,a].$
\begin{proof}
If $p\neq2$ then $\adx[2][](x)=\frac{1}{2}\ad(x)^2,\ \adx[2][](a)=\frac{1}{2}\ad^2(a),$ which makes the assertion of the lemma obvious.
Let $p=2$. Denote $a'=a_{i},\ a''=a_{j},\ x'=x_{k},\ x''=x_{e}.$ We will show that
\[[a',x',x'',a'']+[a'',x',x'',a']=[x',a',a'',x'']+[x'',a',a'',x'].\]
Indeed, $[a',x',x'',a'']+[a'',x',x'',a']=[[a',x'],[x'',a'']]+[a',x',a'',x'']+[[a'',x'],[x'',a']]+[a'',x',a',x'']=[[a',x'],[x'',a'']]+[[a'',x'],[x'',a']]$, since $[a',x',a'']+[a'',x',a']=[[a',a''],x']=0.$\\
Similarly,
\[[x',a',a'',x'']+[x'',a',a'',x']=[[x',a'],[a'',x'']]+[[x'',a'],[a'',x']],\]
which finishes the proof of the lemma.
\end{proof}
\end{lemma}
Now (M1$'$) immediately follows from Lemma \ref{Lemma15} since \linebreak $L_0\ad(a)^2\ad(y)\subseteq K_a$. The latter inclusion follows from the following argument. The equality (see Lemma \ref{Lemma9} (3))
$\begin{array}{r c l}
0&=&\ad(y\ad^{[4]}(a))\\
&=&\ad(y)\ad^{[4]}(a)-\ad(a)\ad(y)\ad^{[3]}(a)+\ad^{[2]}(a)\ad(y)\ad^{[2]}(a)\\
&&-\ad^{[3]}(a)\ad(y)\ad(a)+\ad^{[4]}(a)\ad(y)
\end{array}$
implies $\ad^{[2]}(a)\ad(y)\ad^{[2]}(a)=0$. Hence,
\[L_0\ad(a)^2\ad(y)\ad^{[2]}(a)\subseteq L_0\ad^{[2]}(a)\ad(y)\ad^{[2]}(a)=0.\]
Let us prove (M2$'$). From $\ad^{[2]}(x)\ad(a)\ad(x)=\ad(x)\ad(a)\ad^{[2]}(x)$ and $\ad^{[2]}(a)\ad(x)\ad(a)=\ad(a)\ad(x)\ad^{[2]}(a)$ (see Lemma \ref{Lemma9} (3)), it follows that
\begin{align*}
&y\ad^{[2]}(a)\ad^{[2]}(x)\ad(a)\ad(x)=\\
&y\ad^{[2]}(a)\ad(x)\ad(a)\ad^{[2]}(x)=\\
&y\ad(a)\ad(x)\ad^{[2]}(a)\ad^{[2]}(x)=\\
&y\ad([a,x])\ad^{[2]}(a)\ad^{[2]}(x),
\end{align*}
since $\ad(a)\ad^{[2]}(a)=3\ad^{[3]}(a)=0$.
Now we will prove (M3$'$). We have
\[\ad^{[2]}(a\ad^{[2]}(x))=\sum\ad(a_i\ad^{[2]}(x))\ad(a_j\ad^{[2]}(x)),\]
where the sum is taken over all 2-element subsets $(i,j)$. By applying Lemma \ref{Lemma14} to $\Omega=\{x_1,\cdots,x_m\}$, $y_1=a_i$, $y_2=a_j$, we get
\[\ad(a_i\ad^{[2]}(x))\ad(a_j\ad^{[2]}(x))=\ad^{[2]}(x)\ad(a_i)\ad(a_j)\ad^{[2]}(x).\]
Hence,
\begin{align*}
&\sum\ad(a_i\ad^{[2]}(x))\ad(a_j\ad^{[2]}(x))=\\
&\ad^{[2]}(x)\Big(\sum\ad(a_i)\ad(a_j)\Big)\ad^{[2]}(x)=\\
&\ad^{[2]}(x)\ad^{[2]}(a)\ad^{[2]}(x)
\end{align*}
as claimed.
Let us prove (M4$'$). We have
\begin{align*}
&\ad^{[2]}(y\ad^{[2]}(a)\ad^{[2]}(x))=\\
&\sum\ad(y_i\ad^{[2]}(a)\ad^{[2]}(x))\ad(y_j\ad^{[2]}(a)\ad^{[2]}(x)).
\end{align*}
By Lemma \ref{Lemma14}, with $\Omega=\{x_1,\cdots, x_m\}$, we get
\begin{align*}
&\ad(y_i\ad^{[2]}(a)\ad^{[2]}(x))\ad(y_j\ad^{[2]}(a)\ad^{[2]}(x))=\\
&\ad^{[2]}(x)\ad(y_i\ad^{[2]}(a))\ad(y_j\ad^{[2]}(a))\ad^{[2]}(x).
\end{align*}
Again, by Lemma \ref{Lemma14} with $\Omega=\{a_1, \cdots, a_n\}$
\[\ad(y_i\ad^{[2]}(a))\ad(y_j\ad^{[2]}(a))=\ad^{[2]}(a)\ad(y_i)\ad(y_j)\ad^{[2]}(a).\]
Finally, we get
\[\ad^{[2]}(y\ad^{[2]}(a)\ad^{[2]}(x))=\ad^{[2]}(x)\ad^{[2]}(a)\ad^{[2]}(y)\ad^{[2]}(a)\ad^{[2]}(x),\]
as claimed.
We will now prove (M5$'$). We have already shown above that by Lemma \ref{Lemma14}, we have
\[\ad^{[2]}(a\ad^{[2]}(x))=\ad^{[2]}(x)\ad^{[2]}(a)\ad^{[2]}(x),\]
which implies the claim.
To prove (M6$'$), we need only to recall the equality
\[\ad^{[2]}(y\ad^{[2]}(a)\ad^{[2]}(x))=\ad^{[2]}(x)\ad^{[2]}(a)\ad^{[2]}(y)\ad^{[2]}(a)\ad^{[2]}(x)\]
that was proved above.
Since the elements (M1$'$)$-$(M6$'$) are equal to zero in $L_0$, it follows that in the algebra $L_0'$, the elements of (M1$'$)$-$(M6$'$) are linear combinations of
\begin{enumerate}[(1)]
\item expressions in $x_i$'s, $y_j$'s, $z$, $a_1,\cdots, a_n$ involving at least one commutator $[x_i,x_j]$, $1\leq i,j\leq s$ or $[y_i,y_j]$, $1\leq i,j\leq t$,
\item expressions involving $\ad(x_{i_1})\ad(x_{i_2})\ad(x_{i_3})$ or $\ad(y_{j_1})\ad(y_{j_2})\ad(y_{j_3})$, $1\leq i_1,i_2,i_3\leq s$, $1\leq j_1,j_2,j_3\leq t$.
\end{enumerate}
Moreover, since the relations of the algebra $L_0'$ are homogeneous in $x_i$'s, $y_j$'s, and in the total number of generators $a_1,\cdots, a_n$, it follows that the presentations of (M1$'$)$-$(M6$'$) as linear combinations of (1), (2) preserve the degrees in $x_i$'s, $y_j$'s, and the total degree in $a_1,\cdots, a_n$.
Now we consider arbitrary elements $x,y\in\til{L^m}$ and drop the assumptions on components of standard decompositions of $x,y$. Let $x=x_{\pi_1}+\cdots+x_{\pi_s}$, $y=y_{\tau_1}+\cdots+y_{\tau_s}$, $a_r=a_{r1}+\cdots+a_{rn}$ be the standard decompositions of $x$, $y$, $a_r$ respectively. Then $a=\sum\limits_{i=1}^na_i$, where $a_i=a_{ri}\ad^{[2]}(a')$.
The mapping $a_i\rightarrow a_{ri}\ad^{[2]}(a')$, $x_j\rightarrow x_{\pi_j}$, $y_k\rightarrow y_{\tau_k}$, $1\leq i\leq n$, $1\leq j\leq s$, $1\leq k\leq t$, extends to a homomorphism $L_0'\rightarrow\til{L^m}$. Moreover, the operators $\ad^{[2]}(a)$, $\ad^{[2]}(x)$, $\ad^{[2]}(y)$, $\ad^{[2]}(a\ad^{[2]}(x))$, $\ad^{[2]}(y\ad^{[2]}(a)\ad^{[2]}(x))$ project to the similar operators on $\til{L^m}$, by Lemma \ref{Lemma40}.
Hence, the elements (M1$'$)$-$(M6$'$) of $\til{L^m}$ are linear combinations of
\begin{enumerate}[(1)]
\item expressions in $x_{\pi_i}$, $y_{\tau_j}$, $a_1,\cdots, a_n$ involving at least one commutator $[x_{\pi_i},x_{\pi_j}]$ or $[y_{\tau_i},y_{\tau_j}]$,
\item expressions involving $\ad(x_{\pi_i})\ad(x_{\pi_j})\ad(x_{\pi_k})$ or $\ad(y_{\tau_i})\ad(y_{\tau_j})\ad(y_{\tau_k})$.
\end{enumerate}
These presentations, as linear combinations of (1) and (2), preserve the degrees in $x_{\pi_i}$'s, $y_{\tau_j}$'s and the total degree in $a_1,\cdots, a_n$.
Replacing $\ad(a_i)$ in these expressions by
\[\ad(a_{ri}\ad^{[2]}(a'))=\ad(a_{ri})\ad^{[2]}(a')-\ad(a')\ad(a_{ri})\ad(a')+\ad^{[2]}(a')\ad(a_{ri})\]
we get expressions whose degree in $a'$ exceeds the total degree in the other variables $x_{\pi_i}$, $y_{\tau_j}$, $z$, $a_{ri}$ by 1. In case (1), we merge two elements $x_{\pi_i}$, $x_{\pi_j}$ or $y_{\tau_i}$, $y_{\tau_j}$ together. Hence, the degree in $a'$ exceeds the total degree in the other elements by 2. The only property of the element $a$ that was used in Lemma \ref{Lemma13} was $\ad^{[k]}(a)=0$ for $k\geq 3$. We have $\ad^{[k]}(a')=0$, $k\geq 3$. Hence, we can apply Lemma \ref{Lemma13} to the element $a'$. By Lemma \ref{Lemma13} (1), these expressions are equal to zero. In case (2), we only need to refer to Lemma \ref{Lemma13} (3). We proved that the expressions (M1$'$)$-$(M6$'$) are equal to 0, which means that the expressions (M1)$-$(M6) are equal to 0 modulo $K_a'$. By Lemma \ref{Lemma41} (2), they are equal to 0 modulo $K_a$, which finishes the proof of Proposition \ref{Proposition1}.
Let us consider basic examples of quadratic Jordan algebras.
\underline{Example 1.} Let $A$ be an associative algebra. Let $yQ(x)=xyx;\ x,y\in A.$ Then the vector space $A$ with the operators $x\rightarrow x^2$ and $x\rightarrow Q(x)$ is a quadratic Jordan algebra, which is denoted as $A^{(+)}$.
\underline{Example 2.} Let $A$ be an associative algebra with an involution $\ast:A\rightarrow A$. Then $H(A,\ast)=\{a\in A|a^\ast=a\}$ is a subalgebra of the quadratic Jordan algebra $A^{(+)}.$
\underline{Example 3.} Let $V$ be a vector space and let $q:V\rightarrow F$ be a quadratic form with the associated bilinear form $q(v,w)=q(v+w)-q(v)-q(w)$. Fix an element of $V$ that we will denote as $\mathbbold{1}$ (a base point) such that $q(\mathbbold{1})=1$. For arbitrary elements $v,w\in V$ define
\[v^2=q(v,\mathbbold{1})v-q(v)\mathbbold{1},\ wQ(v)=q(v,\bar{w})v-q(v)\bar{w},\]
where $\bar{w}=q(w,\mathbbold{1})\mathbbold{1}-w$. These equations make $V$ a quadratic Jordan algebra. We will denote it as $J(q,\mathbbold{1}).$
\underline{Example 4.} Albert algebras of a nondegenerate admissible cubic form on a 27-dimensional space (see \cite{J2,J4}).
Powers of elements in a quadratic Jordan algebra $J$ are defined inductively: we define $x^1=x$; for an even $n=2k$ we define $x^n=(x^k)^2;$ and for an odd $n=2k+1$ we define $x^n=xQ(x^k).$ For arbitrary integers $i\geq0,j\geq0,k\geq0$ we have $x^iQ(x^j)=x^{i+2j},\ x^i\circ x^j=2x^{i+j},\ \{x^i,x^j,x^k\}=2x^{i+j+k}.$
A quadratic Jordan algebra $J$ is said to be nil of bounded degree $n$ if $x^n=0$ for an arbitrary element $x\in J$ and if $n$ is a minimal integer with this property.
Just as in $\mathsection2$ we call an element of the free quadratic Jordan algebra $FJ\langle X\rangle$ an $S$-identity if it lies in the kernel of the homomorphism $FJ\langle X\rangle\rightarrow F\langle X\rangle^{(+)},\ x\rightarrow x,$ where $F\langle X\rangle$ is the free associative algebra.
We say that a quadratic Jordan algebra $J$ is PI if there exists an element $f(x_1,\cdots,x_r)\in FJ\langle X\rangle$ that is not an $S$-identity and that is identically zero on $J$.
In this paper, we call an element $a$ of a quadratic Jordan algebra an \underline{absolute zero divisor} if $Q(a)=0$. This terminology is not standard. (In the standard terminology, we should have also assumed $a\neq 0$ and $a^2=0$.) A quadratic Jordan algebra that does not contain nonzero absolute zero divisors is called nondegenerate. The smallest ideal $M(J)$ of a Jordan algebra $J$ such that the factor algebra $J/M(J)$ is nondegenerate is called the McCrimmon radical of the algebra $J$. The McCrimmon radical of an arbitrary quadratic Jordan algebra lies in the nil radical Nil$(J)$ (\cite{Z1,M3}).
A nondegenerate quadratic Jordan algebra is said to be nondegenerate prime if two arbitrary nonzero ideals of $J$ have nonzero intersection.
In \cite{Z3,Th} it is shown that an arbitrary nondegenerate Jordan algebra is a subdirect product of nondegenerate prime Jordan algebras.
Let Sym$_n(x_1,\cdots,x_n)$ be the full linearization of $x_1^n$ in the free Jordan algebra $FJ\langle X\rangle$.
\begin{lemma}
\label{Lemma16} There exists a function $d:\mathbb{N}\rightarrow \mathbb{N}$ such that an arbitrary nondegenerate prime quadratic Jordan algebra over a field of characteristic $p>0$ satisfying a PI of degree $n$ satisfies the identity Sym$_{d(n)}(x_1,\cdots,x_{d(n)})=0.$
\begin{proof}
Let us notice first that if $J$ is a quadratic Jordan algebra of dimension $d$ then $J$ satisfies the identity Sym$_{d(p-1)+1}(x_1,\cdots,x_{d(p-1)+1})=0$. Indeed, if $e_1,\cdots,e_d$ is a basis of $J$ then among any $d(p-1)+1$ elements from $\{e_1,\cdots,e_d\}$ at least $p$ elements are equal. This implies the claim.
In \cite{MZ} it was shown that if $J$ is a nondegenerate prime quadratic Jordan algebra, then one of the following possibilities holds:
\begin{enumerate}[(1)]
\item there exists a prime associative algebra $A$ such that \[A^{(+)}\subseteq J\subseteq \mathds{Q}(A)^{(+)},\]
where $\mathds{Q}(A)$ is the Martindale ring of the quotients of $A$ (see \cite{Ma});
\item there exists a prime associative algebra $A$ with an involution \linebreak$\ast: A\rightarrow A,$ such that
\[H(A_0,\ast)\subseteq J\subseteq H(\mathds{Q}(A),\ast)\]
where $A_0$ is the subalgebra of $A$ generated by elements $a+a^\ast,\ aa^\ast,$ $ a\in A,$ and $\mathds{Q}(A)$ is the Martindale ring of quotients of the algebra $A$ (see \cite{Ma});
\item $J$ is a form of an exceptional 27-dimensional Albert algebra over a field $F$;
\item $J$ is embeddable in a quadratic Jordan algebra $J(q,v_0)$ of a nondegenerate quadratic form $q$ with a basepoint $v_0$ in a vector space over some extension of the base field $F$.
\end{enumerate}
If $A^{(+)}\subseteq J\subseteq\mathds{Q}(A)^{(+)}$, then $A$ is a prime associative algebra satisfying an identity of degree $n$. Hence the center $Z(A)$ of $A$ is nonzero and the algebra $\mathds{Q}(A)=(Z(A)\setminus \{0\})^{-1}A$ is of dimension $\leq [\frac{n}{2}]^2$ over the field $K=(Z(A)\setminus\{0\})^{-1}Z(A)$ (see \cite{R}). Hence the algebra $\mathds{Q}(A)$ satisfies the identity Sym$_{[\frac{n}{2}]^2(p-1)+1}=0$.
Suppose that $H(A_0,\ast)\subseteq J\subseteq H(\mathds{Q}(A),\ast).$ S. Amitsur \cite{A} proved that there exists a function $h(n)$ with the following property:
if an involutive associative algebra satisfies an identity of degree $n$ with an involution then it satisfies an identity of degree $\leq h(n)$. As we have shown above, the algebra $\mathds{Q}(A)$ in this case has dimension $\leq[\frac{h(n)}{2}]^2$ over its center and satisfies the identity Sym$_{[\frac{h(n)}{2}]^2(p-1)+1}=0.$
The same argument applies to case (3): the algebra $J$ satisfies the identity Sym$_{27(p-1)+1}=0.$
Consider now the quadratic Jordan algebra $J$ of a quadratic form $q$ on a vector space $V$ where $v_0\in V$ is a basepoint. The quadratic form $q$ can be extended to the scalar product $V\otimes_F\widehat{E},\ \widehat{E}=E+F\cdot1$. For an arbitrary element $u\in V\otimes_F{E}$ we have $u^2=q(u,v_0)u-q(u)v_0.$ The elements $a=q(u,v_0),\ b=q(u)$ lie in $E$. Hence $a^p=b^p=0.$ For an arbitrary $k\geq 1$ we have
\[u^{2k}=\sum\limits_{i+j=k}a^ib^ju_{ij},\ u_{ij}\in V\otimes_F\widehat{E}.\]
Hence $u^{2(2p-1)}=0.$ This implies that the algebra $J$ satisfies the identity Sym$_{4p-2}$=0 and finishes the proof of the lemma.
\end{proof}
\end{lemma}
\begin{lemma}
\label{Lemma17}
Let $J$ be a quadratic Jordan $F$-algebra that satisfies the identity $x^n=0$, $n\geq 2$. Then,
\begin{enumerate}[(1)]
\item \label{thing1} for an arbitrary element $a\in J$, the elements $a^{n+1}, a^{n+2}, \cdots, a^{2n-1}$ are absolute zero divisiors of $J$;
\item \label{thingg2} if $J$ satisfies the identities $x^n=x^{n+1}=\cdots=x^{2n-1}=0$, then for an arbitrary $a\in J$, the element $a^{n-1}$ is an absolute zero divisor of $J$.
\end{enumerate}
\end{lemma}
\begin{proof}
For $i=n+1,n+2,\cdots, 2n-1$, we have $Q(x^i)=Q(x^{i-n})Q(x^n)=0$, which proves (\ref{thing1}).
Suppose now that the algebra $J$ satisfies the identities $x^{n+1}=x^{n+2}=\cdots=x^{2n-1}=0$. Since the ground field $F$ is infinite, the algebra $J$ satisfies also the following partial linearization of $x^{2n-1}=0$ (see \cite{J2}, \cite{ZSSS}):
\[yQ(x^{n-1})+x^{2(n-1)}\cdot y+\sum\limits_{\substack{i+j=2(n-1)\\ 1\leq i<j\leq 2n-3}}\{x^i,y,x^j\}=0.\]
Hence, $yQ(x^{n-1})=0$, which proves assertion \label{thing2} of the lemma.
\end{proof}
Let $J$ be a quadratic Jordan algebra, $a\in J.$ Define a new structure of a quadratic Jordan algebra on $J$ via:
\[x^{\ast 2}=aQ(x),\ yQ^\ast(x)=yQ(a)Q(x).\]
The new quadratic Jordan algebra is denoted as $J^{(a)}$ and is called a homotope of $J$ (see \cite{J2,J4,M3}).
For the quadratic Jordan algebra $\til{J}=J\otimes_F E$ and an element $a\in\til{J}$, consider the subspaces $K_a'=\{x\in\til{J}|xQ(a)=0\}$ and $K_a=\sum\limits_i(J\otimes e_i+\til{J}e_i)\cap K_a'$. It is easy to see that the subspace $K_a$ is an ideal of the algebra $\til{J}^{(a)}$.
\begin{remark*}
If $p\neq 2$, then $K_a'$ is also an ideal of $\til{J}^{(a)}$.
\end{remark*}
\begin{lemma}
\label{Lemma18}
If $b\in J$ and $b+K_a$ is an absolute zero divisor of the algebra $J^{(a)}/K_a$, then $bQ(a)$ is an absolute zero divisor of the algebra $J$.
\end{lemma}
\begin{proof}
We have $JQ(bQ(a))=JQ^\ast(b)Q(a)\subseteq K_aQ(a)=(0)$, which proves the lemma.
\end{proof}
\begin{lemma}
\label{Lemma42}
Let $a$ be an element of a quadratic Jordan algebra $J$. Let $f:\til{J}\times\cdots\times\til{J}\rightarrow\til{J}$ be a homogeneous polynomial map, let $\til{f}$ be its full linearization. Suppose that $\til{f}(J\otimes e_i+\til{J}e_i, \til{J}, \cdots, \til{J})\subseteq J\otimes e_i+\til{J}e_i$ for all $i$. If an arbitrary value of $f$ lies in $K_a'$, then an arbitrary value of $f$ lies in $K_a$.
\end{lemma}
The proof is similar to the proof of Lemma \ref{Lemma41} (2).
Let $f$ be an element of the free quadratic Jordan algebra $FJ\langle X\rangle,$ which is not an $S$-identity. Let $M=M(f)$ be the variety of quadratic Jordan algebras satisfying the identity $f=0$ (see \cite{J2,J3,ZSSS}).
\underline{Definition.} We say that a finite sequence of homogeneous elements $h_1,h_2,\cdots,h_r\in FJ\langle X\rangle$ is an absolute zero divisor sequence for $M$ if for an arbitrary quadratic Jordan algebra $J\in M$
\begin{enumerate}[(i)]
\item every value of $h_r$ on $\til J=J\otimes_F E$ is an absolute zero divisor of the algebra $\til J$;
\item if $h_k=h_{k+1}=\cdots=h_r=0$ identically hold on $\til J,\ 2\leq k\leq r,$ then an arbitrary value of $h_{k-1}$ on $\til J$ is an absolute zero divisor of $\til J.$
\end{enumerate}
Recall that in this section we always assume that char$F=p>0$.
\begin{proposition}
\label{Proposition2}
For an arbitrary element $f\in FJ\langle X\rangle$ that is not an $S$-identity the variety $M(f)$ has a finite absolute zero divisor sequence $h_1,h_2,\cdots,h_r$ with $h_1=x_1\in X.$
\begin{proof}
Let $F_M\langle X\rangle $ be the free algebra in the variety $M=M(f)$ on the set of free generators $X$. Since the factor algebra of $F_M\langle X\rangle$ modulo the McCrimmon radical can be approximated by prime nondegenerate algebras (\cite{Z3}, \cite{Th}), Lemma \ref{Lemma16} implies that there exists $d\geq 1$ such that $y=\text{Sym}_d(x_1,\cdots, x_d)$ lies in the McCrimmon radical of $F_M\langle X\rangle$. Consider the homotope algebra $F_M\langle X\rangle^{(x_{d+1})}$ Since an absolute zero divisor of a Jordan algebra is an absolute zero divisor of every homotope, it follows that the McCrimmon radical of $F_M\langle X\rangle$ lies in the McCrimmon radical of $F_M\langle X\rangle^{(x_{d+1})}$. In particular, the element $y$ lies in the McCrimmon radical of $F_M\langle X\rangle^{(x_{d+1})}$ and therefore is nilpotent.
Let $a^{(k, x_{d+1})}$ denote the $k^{th}$ power of an element $a$ in the homotope algebra $F_M\langle X\rangle^{(x_{d+1})}$. There exists $m\geq 2$ such that $y^{(m-1,x_{d+1})}=0$. Then $x_{d+1}^{(m,y)}=y^{(m-1,x_{d+1})}Q(x_{d+1})=0$. This implies that $x^{(m,y)}=0$ holds identically on $F_M\langle X\rangle$.
Then by Lemmas \ref{Lemma17} and \ref{Lemma18}, the sequence
\[y, x_{d+1}Q(y), \cdots, x_{d+1}^{(m-1,y)}Q(y), x_{d+1}^{(2m-1,y)}Q(y), \cdots, x_{d+1}^{(m+1,y)}Q(y)\]
is an absolute zero divisor sequence in $M$.
Indeed, since the Jordan algebra $F_M\langle X\rangle ^{(y)}/K_y$ satisfies the identity $x^m=0$, Lemma \ref{Lemma17} (\ref{thing1}) implies that the elements $x_{d+1}^{(2m-1,y)}+K_y,$ $\cdots, x_{d+1}^{(m+1,y)}+K_y$ are absolute zero divisors in $F_M\langle X\rangle ^{(y)}/K_y$. By Lemma \ref{Lemma18}, the elements $x_{d+1}^{(2m-1,y)}Q(y),\cdots, x_{d+1}^{(m+1,y)}Q(y)$ are absolute zero divisors of the algebra $F_M\langle X\rangle$.
If $J\in M$ and $x_{d+1}^{(2m-1,y)}Q(y)=\cdots=x_{d+1}^{(m+1,y)}Q(y)=0$ hold identically on $\til{J}$, then for arbitrary elements $a_1,\cdots, a_d\in\til{J}$, \linebreak $b=\text{Sym}_d(a_1,\cdots, a_d)$, $c\in\til{J}$ the $i$-th power $c^{(i,b)}$, $m\leq i\leq 2m-1$, lies in $K_b'$. By Lemma \ref{Lemma42}, we have $c^{(i,b)}\in K_b$. In other words, the Jordan algebra $\til{J}^{(b)}/K_b$ satisfies the identities $x^m=x^{m+1}=\cdots=x^{2m-1}=0$. By Lemma \ref{Lemma17} (2), for an arbitrary element $c\in\til{J}$, the $(m-1)$-th power $c^{(m-1,b)}$ is an absolute zero divisor in $\til{J}^{(b)}/K_b$. By Lemma \ref{Lemma18}, the element $c^{(m-1,b)}Q(b)$ is an absolute zero divisor of $\til{J}$.
If $J\in M$ and $x_{d+1}^{(m-1,y)}Q(y)=x_{d+1}^{(2m-1,y)}Q(y)=\cdots=x_{d+1}^{(m+1,y)}Q(y)=0$ holds identically on $\til{J}$, then using Lemma \ref{Lemma42} as above, we conclude that the algebra $\til{J}^{(b)}/K_b$ satisfies the identities $x^{m-1}=\cdots=x^{2m-1}=0$.
Again, by Lemma \ref{Lemma17} (2) and Lemma \ref{Lemma18}, every value of $x_{d+1}^{(m-2,y)}Q(y)$ (and so on) is an absolute zero divisor of $\til{J}$.
If an algebra $J$ lies in $M$ and $y=\text{Sym}_d(x_1,\cdots,x_d)=0$ holds identically on $J$ then the algebra $\til J$ is nil of bounded index $\leq d.$ Again by \Cref{Lemma17} we conclude that
\begin{align*}
x_1,x_1^2,\cdots,x_1^{d-1},x_1^{2d-1},\cdots, x_1^{d+1}, y, x_{d+1}Q(y),\cdots,\\
x_{d+1}^{(m-1,y)}Q(y),x_{d+1}^{(2m-1,y)}Q(y),\cdots, x_{d+1}^{(m+1,y)}Q(y)
\end{align*}
is an absolute zero divisor sequence, which finishes the proof of the proposition.
\end{proof}
\end{proposition}
\begin{conjecture}
If $J$ is a quadratic Jordan PI-algebra over a field of characteristic $p>0$ then the algebra $\til J$ is nil of bounded index.
\end{conjecture}
Now let's come back to the Lie algebra $L$ and the Jordan algebra $J_a=\til L^m/K_a.$
\begin{lemma}
\label{Lemma19}
Let $b+K_a$ be a nonzero absolute zero divisor of the Jordan algebra $\til{L}^m/K_a$. Then the element $b\ad^{[2]}(a)$ is a nonzero sandwich of the Lie algebra $\til{L}^m.$
\begin{proof}
Let $b = \sum\limits_{\pi} b_\pi$ be the standard decomposition. For an arbitrary element $c \in \til{L}^m$ we have
\[(c+K_a)Q(b+K_a) = \sum c \ad^{[2]}(a)\ad(b_{\pi_1})\ad(b_{\pi_2})+K_a.\]
Hence by Lemma \ref{Lemma14},
\[\sum c \ad^{[2]}(a)\ad(b_{\pi_1})\ad(b_{\pi_2})\ad^{[2]}(a) \]
\[=\sum c\ad(b_{\pi_1}\ad^{[2]}(a))\ad(b_{\pi_2}\ad^{[2]}(a)) = 0.\]
Let $\Omega =\{b_{\pi_i}\ad^{[2]}(a)\}.$ We showed that $\til{L}^mU_2(\Omega)=(0).$ By Lemma \ref{Lemma12} the element $b\ad^{[2]}(a)$ is a sandwich of the Lie algebra $\til{L}^m.$
\end{proof}
\end{lemma}
Let $j(y_1, \cdots, y_d)$ be an arbitrary Jordan polynomial, i.e., an element of the free Jordan algebra. The polynomial $j$ defines a function $\til{L}^m/K_a \times \cdots \times \til{L}^m/K_a \rightarrow \til{L}^m/K_a$ and, therefore, a function $\til{L}^m \times \cdots \times \til{L}^m \rightarrow \til{L}^m/K_a.$
\begin{lemma}
\label{Lemma35}
Let $j(y_1, \cdots, y_q)$ be a multilinear Jordan polynomial. There exists a homogeneous divided polynomial $j'(y_1, \cdots, y_q, x_1, \cdots, x_r)$ defined on $L^m,$ such that the value $j(b_1, \cdots, b_q)$ in the Jordan algebra $\til{L}^m/K_a$ is equal to $j'(b_1, \cdots, b_q, a_1, \cdots, a_r) + K_a.$ In particular,
\[j(b_1, \cdots, b_q)\text{ ad}^{[2]}w(a_1, \cdots, a_r)\]
\[= j'(b_1, \cdots, b_q, a_1, \cdots, a_r)\text{ ad }^{[2]}w(a_1, \cdots, a_r).\]
\begin{proof}
We will proceed by induction on the construction of the Jordan polynomial $j.$ Let $j=\alpha j_1 + \beta j_2,$ where $\alpha, \beta \in F$ and $j_1, j_2$ are multilinear Jordan polynomials, such that the divided polynomials $j'_1, j_2'$ exist. Then we let $j'=\alpha j_1'+\beta j_2'.$ Suppose that $j=j_1\circ j_2$, where $j_1, j_2$ are multilinear Jordan polynomials on disjoint variables.
We have $j(b_1,\cdots, b_q)=[a,j_1(b_1,\cdots,b_q), j_2(b_1,\cdots,b_q)]+K_a$ and we let
\begin{align*}
&j'(y_1,\cdots,y_q,x_1,\cdots,x_r)=\\
&[w(x_1,\cdots,x_r),j_1'(y_1,\cdots,y_q,x_1,\cdots,x_r),j_2'(y_1,\cdots,y_q,x_1,\cdots,x_r)].
\end{align*}
Finally, let $j=\{j_1,j_2,j_3\},$ where $j_1, j_2, j_3$ are multilinear Jordan polynomials on disjoint variables. Arguing as above, we let
\[j'=[j_2'\ad_{x_1}^{[2]}w(x_1,\cdots,x_r),j_1',j_3'].\]
This completes the proof of the lemma.
\end{proof}
\end{lemma}
\begin{proposition}
\label{Proposition3}
There exist integers $k \geq 1,$ $t\geq 1$ and a homogeneous regular divided polynomial $v$ defined on $L^k$ such that every value of $v$ on $\til{L}^k$ is a sum of $t$ sandwiches of the algebra $\til{L}^k.$
\begin{proof}
Recall that there exists a homogeneous regular divided polynomial $w=w(x_1, \cdots, x_r)$ defined on $L^m,$ $m \geq 1,$ linear in $x_r$ and such that
\begin{enumerate}[(i)]
\item $[w(a_1,\cdots,a_{r-1},a), w(a_1,\cdots, a_{r-1},b)]=0$ for arbitrary elements \linebreak $a, b, a_1, \cdots, a_{r-1} \in \til{L}^m;$
\item $\til{L}^m\text{ ad}_{x_r}^{[t]}(w)=0$ holds identically on $\til{L}^m$ for $t \geq 3.$
\end{enumerate}
For an arbitrary $i\geq m,$ arbitrary elements $a_1,\cdots,a_r\in \til L^i$ consider $a=w(a_1,\cdots,a_r)$ and denote $\adx[2][](a)=\ad_{x_r}^{[2]}(w(a_1,\cdots,a_r)).$
Aruging as in the proof of Lemma \ref{Lemma2}, we conclude that there exists an element $f\in FJ\langle X\rangle$ such that $f$ is not an $S$-identity and all quadratic Jordan algebras $\til L^i/K_a;\ i\geq m;\ a_1,\cdots,a_r\in \til L^i$ satisfy the identity $f=0.$
By \Cref{Proposition2} there exists an absolute zero divisor sequence $h_1=x_1,h_2,\cdots,h_s$ of the variety $M(f).$
If $J$ is an algebra from the variety $M(f)$ such that $J=\sum\limits_i I_i$, $I_i\unlhd J$, $I_i^2=(0)$, then $J$ and $J\otimes_F E$ satisfy the same identities. Hence, every value of $h_s$ on $J$ is an absolute zero divisor of $J$ and if $h_k=\cdots=h_s=0$ identically hold on $J$, then every value of $h_{k-1}$ on $J$ is an absolute zero divisor.
Jordan algebras $\til{L^m}/K_a$ that have been discussed above have this property. Indeed, $\til{L^m}/K_a=\sum\limits_i I_i$, where $I_i=L^m\otimes e_i+\til{L^m}e_i+K_a/K_a$.
For an integer $i\geq m$ and elements $a_1,\cdots,a_r\in\til L^i$ let $s(i,a_1,\cdots,a_r)$ be a maximal integer $j,\ 1\leq j\leq s,$ such that $h_j$ is not identically zero on $\til L^i/K_a.$ If $h_1=x_1$ is identically zero on $\til L^i/K_a,$ that is, $\til L^i=K_a,$ then we let $s(i,a_1,\cdots,a_r)=0.$
Let $s(i)=\max\{s(i,a_1,\cdots,a_r)|a_1,\cdots,a_r\in \til L^i\}.$ Clearly, $s(m)\geq s(m+1)\geq \cdots.$ Let this decreasing sequence stabilize at $t=s(k)=s(k+1)=\cdots.$
If $t=0$ then $\til{L^k}=K_a$, which means that $\til{L^k}\ad_{x_1}^{[2]}w(a_1,\cdots,a_r)=(0)$ for arbitrary elements $a_1,\cdots,a_r\in \til{L^k}$. By Lemma \ref{Lemma12} every value of $w$ on $\til{L^k}$ is a sandwich of the algebra $\til{L^k}$. Therefore assume that $t \geq 1.$
Let us summarize the above. For arbitrary elements $a_1, \cdots, a_r \in \til{L^k}$ let $a=w(a_1, \cdots, a_r)$, $\ad^{[2]}(a)=\ad_{x_r}^{[2]}w(a_1, \cdots, a_r)$, $K_a=\til{L^k}\cap ker\ad^{[2]}(a)$. Every value of the Jordan polynomial $h_t$ on the Jordan algebra $\til{L^k}/K_a$ is an absolute zero divisor. For every $k'\geq k$ there exist elements $a_1, \cdots, a_r \in \til{L^{k'}}$ such that $h_t$ is not identically zero on $\til{L^{k'}}/K_a$. In particular, the Jordan polynomial $h_t$ is regular.
Suppose that $h_t=h_t(y_1,\cdots, y_q)$. Let $\mu$ be the total degree of the homogeneous Jordan polynomial $h_t$. The full linearization $\til{h_t}$ of the polynomial $h_t$ depends on $\mu$ variables. An arbitrary value of the polynomial $\til{h_t}$ is a linear combination of $2^\mu=\ell$ values of the polynomial $h_t$. Let $\til{h_t}'(y_1, \cdots, y_q, x_1, \cdots, x_r)$ be the homogeneous divided polynomial of Lemma \ref{Lemma35} defined on $\til{L^k}$. Let $v(y_1,\cdots, y_q, x_1, \cdots, x_r)=\til{h_t'}(y_1, \cdots, y_q, x_1, \cdots, x_r)\ad_{x_r}^{[2]}w(x_1, \cdots, x_r)$.
For arbitrary elements $b_1, \cdots, b_q, a_1, \cdots, a_r \in \til{L^k}$, we have
\[\til{h_t}(b_1, \cdots, b_q)\ad_{x_r}^{[2]}w(a_1, \cdots, a_r)=v(b_1, \cdots, b_q, a_1, \cdots, a_r).\]
We claim that the divided polynomial $v$ is regular. Indeed, it was shown above that for arbitrary $k'\geq k$, there exist elements $a_1,\cdots, a_r\in\til{L^{k'}}$ such that the Jordan polynomial $h_t$ is not identically zero on $\til{L^{k'}}/K_a$. Lemma \ref{Lemma33} (2) was proved for arbitrary polynomial maps that include Jordan polynomials. Hence by Lemma \ref{Lemma33} (2), the linear spans of the sets of values of the Jordan polynomials $h_t$ and $\til{h_t}$ on the Jordan algebra $\til{L^{k'}}/K_a$ are equal. Hence $\til{h_t}$ is not identically zero on $\til{L^{k'}}/K_a$. By Lemma \ref{Lemma35}, the homogeneous divided polynomial $v=\til{h_t}\ad_{x_r}^{[2]}(w)$ is not identically zero on $\til{L^{k'}}$. This implies regularity of $v$.
By Lemma \ref{Lemma19} every value of $v$ on $\til{L^k}$ is a sum of $\ell=2^\mu$ sandwiches of the Lie algebra $\til{L^k}$. This completes the proof of the proposition.
\end{proof}
\end{proposition}
\section{Sandwiches in $\til L$}
\label{Section5}
Let $x\in \til L,\ x=\sum\limits_\pi x_\pi$ the standard decomposition. Suppose that
\begin{equation}
[x_\pi,x_\tau]=0 \label{Star1}
\end{equation}
for arbitrary $\pi,\tau.$ As above denote $\adx[k][](x)=\sum\ad(x_{\pi_1})\cdots\ad(x_{\pi_k}),$ where the sum runs over all $k$-element subsets $(\pi_1,\cdots,\pi_k).$ As we have already noticed in \Cref{Lemma9}(2), $A(x)=\text{Id}+\sum\limits_{k=1}^\infty \adx[k][](x)$ is an automorphism of the algebra $\til L.$
Let elements $x_1,\cdots,x_d\in\til L$ satisfy condition \ref{Star1}, \linebreak$A=A(x_1)\cdots A(x_d)\in \Aut \til L.$ The following lemma is straightforward.
\begin{lemma}
\label{Lemma20}
For arbitrary elements $a_1,\cdots,a_d\in\til L$ we have
\begin{align*}
& a_1A\otimes\cdots\otimes a_dA-\sum\limits_{i=1}^d a_1A\otimes\cdots a_i\otimes\cdots\otimes a_dA+\\
& \sum\limits_{1\leq i\neq j\leq d}a_1A\otimes\cdots\otimes a_i\cdots\otimes a_j\cdots\otimes a_dA-\cdots\pm a_1\otimes\cdots\otimes a_d=\\
& \sum\limits_{\sigma\in S_d}[a_1,x_{\sigma(1)}]\otimes\cdots\otimes[a_d,x_{\sigma(d)}]\\
& +\text{terms involving at least two elements from one of the sets } \{x_{i_\pi}\}_\pi.
\end{align*}
\end{lemma}
A. N. Grishkov \cite{Gri} showed that in a Lie algebra over a field of zero characteristic a sandwich generates the locally nilpotent ideal. We will prove an analog of this result for the algebra $\til L$. The proof essentially depends on the following result from \cite{KZ}:
There exists a function $KZ:\mathbb{N}\rightarrow \mathbb{N}$ such that in an arbitrary Lie algebra if elements $a_1,\cdots,a_n$ are sandwiches then the subalgebra $\langle a_1\cdots,a_n\rangle$ is nilpotent of degree $\leq KZ(n).$
Let $f(m,n)=KZ((n+1)^m)$.
\begin{lemma}
\label{Lemma21}
Let $I$ be an ideal of a Lie algebra $L,\ a\in\til I$ a sandwich in $\til I.$ Let $S\subset\til L$ be a finite set of $\leq n$ elements. Then the subalgebra of $\til L$ generated by commutators $[a,b_1\cdots,b_t],$ where $b_i\in S,\ t\leq m,$ is nilpotent of degree $\leq f(m,n).$
\begin{proof}
Consider a commutator \[c=[[a,b_{11},\cdots,b_{1t_1}],[a,b_{21},\cdots,b_{2t_2}],\cdots,[a,b_{q1},\cdots,b_{qt_q}]],\]
where $b_{ij}\in S,\ t_i\leq m,\ 1\leq i\leq q,\ q=f(m,n).$
Our aim is to show that $c=0.$
Let an element $b\in S$ occur in the commutator $c$ $|b|$ times. Clearly $\sum\limits_{b\in S} |b|=t_1+\cdots+t_q.$ Choose $|b|$ new elements $x_{b,1},\cdots,x_{b,|b|}$ in $\til L$ and replace all $|b|$ occurrences of $b$ in $c$ by the symmetrized sum in \linebreak$x_{b,1},\cdots,x_{b,|b|}:$
\[\cdots\underbrace{b\cdots b}_{|b|}\cdots\rightarrow \sum\limits_{\sigma\in S_{|b|}}\cdots x_{b,\sigma(1)}\cdots x_{b,\sigma(|b|)}\cdots.\]
We will get a new expression $c'$ in $a,x_{b,j}$'s$,\ b\in S,\ 1\leq j\leq |b|.$
Denote it $c'=c'(a,x_{b,1},\cdots,x_{b,|b|})$. To show that $c=0$ it is sufficient to show that $c'=0.$ Indeed, let $b=b_1+\cdots+b_k$ be the standard decomposition of $b$. If $k<|b|$, then $c$ is a sum of expressions, each containing one of the elements $b_1,\cdots, b_k$ at least twice. If $k\geq|b|$, then $c=\sum c'(a, b_{i_1},\cdots, b_{i_{|b|}})$, where the sum runs over all $|b|$-element subsets of $\{b_1,\cdots, b_k\}$.
Let $x_{bj}=\sum\limits_\pi x_{bj\pi},\ a=\sum\limits_\pi a_\pi$ be the standard decompositions, \linebreak $x_{bj\pi}=x_{bj\pi}'\otimes e_\pi,\ a_\pi=a_\pi'\otimes e_\pi,\ x_{bj\pi}'\in L, a_\pi'\in I.$
Let $I(b,j)$ be the ideal of the Lie algebra $L$ generated by the subset $\{x_{bj\pi}\}_\pi.$ Suppose at first that for arbitrary $b\in S,\ i\leq j \leq |b|$ we have
\begin{equation}\label{Star2}
[I(b,j),I(b,j)]=(0).
\end{equation}
Then we can consider the automorphism
\[A(x_{b,j})=\text{Id}+\sum\limits_{k\geq 1}\adx[k][](x_{b,j}),\ 1\leq j\leq|b|\] and the automorphism $A(b)=A(x_{b,1})\cdots A(x_{b,|b|}).$ By \Cref{Lemma20} for arbitrary elements $a_1,\cdots,a_{|b|}\in\til L$ we have
\begin{align*}
&a_1A(b)\otimes\cdots\otimes a_{|b|}A(b)-\sum a_1A(b)\otimes\cdots\otimes a_i\otimes\cdots\otimes a_{|b|}A(b)+\\
&\sum a_1A(b)\otimes\cdots a_i\otimes\cdots\otimes a_j\otimes\cdots a_{|b|}A(b)-\cdots=\\
&\sum[a_1,x_{b,\sigma(1)}]\otimes\cdots\otimes[a_{|b|},x_{b,\sigma(|b|)}].
\end{align*}
Replacing each symmetric set $x_{b,1},\cdots,x_{b,|b|}$ in the element $c'$ by expressions of the left hand side types we can represent $c'$ as a linear combination of commutators
\[[a\phi_{11}\cdots\phi_{1m},\cdots,a\phi_{q1}\cdots\phi_{qm}],\]
where each $\phi_{ij}$ is one of the automorphisms $A(b_1),\cdots,A(b_n),Id.$ There are $\leq (n+1)^m$ elements $a\phi_{i1},\cdots\phi_{im}$ and all of them are sandwiches in the algebra $\til I.$ By the choice of $q=KZ((n+1)^m)$ we conclude that $[a\phi_{11},\cdots,\phi_{1m},\cdots,a\phi_{q1}\cdots\phi_{qm}]=0.$
Now we will drop the assumption that
\[[I(b,j),I(b,j)]=(0).\]
Let $\Lie\langle X\rangle$ be the free Lie algebra on the set of free generators $X=\{ \{x'_{b,j,\pi}\}_\pi,\ \{a_\pi\}_\pi\}.$ Let $I(b,j)$ be the ideal of $\Lie\langle X\rangle$ generated by the set $\{x'_{b,j,\pi}\}_\pi$. Let $I=\sum\limits_{b,j}[I(b,j),I(b,j)].$ Let $J$ be the ideal of $\Lie\langle X\rangle$ generated by all relations needed to make $a=\sum\limits_\pi a'_\pi e_\pi$ a sandwich in the ideal generated by $a$. So, $J$ is generated by
\[[a'_\pi,\rho,a'_\tau]+[a'_\tau,\rho,a'_\pi],[a'_\pi,\rho_1,\rho_2,a'_\tau]+[a'_\tau,\rho_1,\rho_2,a'_\pi],\]
where $\rho,\rho_1,\rho_2$ are arbitrary commutators in $X$ involving at least one element $a'_\mu.$
Consider the Lie algebra $L=\Lie\langle X\rangle/I+J.$ Since this algebra satisfies condition \ref{Star2} the element $c'$ computed in the algebra $\til L$ lies in $(I+J)\otimes E.$ The ideals $I$ and $J$ are graded with respect to each generator. The element $c'$ has total degree one with respect to variables $\{x'_{b,j,\pi}\}_\pi$ for each $b,j.$ Since the ideal $I$ does not contain homogeneous elements having degree one with respect to all $\{x'_{b,j,\pi}\}_\pi$ it follows that $c'\in J\otimes E.$ This finishes the proof of the lemma.
\end{proof}
\end{lemma}
Now, let $A$ be an associative enveloping algebra of the algebra $L,\ L\subseteq A^{(-)},\ \til L=L\otimes_FE,\ \til A=A\otimes_FE.$
\begin{lemma}
\label{Lemma22}
Let $a\in\til L$ be a sandwich. Then for an arbitrary element $b\in \til L$ we have $[a,b]^p=0.$
\begin{proof}
N. Jacobson \cite{J1} noticed that
\[\{x_1,\cdots,x_p\}=\sum\limits_{\sigma\in S_p}x_{\sigma(1)}\cdots x_{\sigma(p)}=\sum\limits_{\sigma\in S_{p-1}}[x_p,x_{\sigma(1)},\cdots,x_{\sigma(p-1)}].\]
Let $b=\sum\limits_\pi b_\pi$ be the standard decomposition of the element $b.$ Then $[a,b]=\sum\limits_\pi [a,b_\pi]$ and $[a,b]^p=\sum\{[a,b_{\pi_1}],\cdots,[a,b_{\pi_p}]\}.$ Each summand on the right hand side is equal to zero since $[[a,b_{\pi_i}],[a,b_{\pi_j}]]=0,$ which proves the lemma.
\end{proof}
\end{lemma}
\begin{lemma}
\label{Lemma23}
Let $I$ be an ideal of the Lie algebra $L.$ Let $a\in \til I$ be a sandwich in $\til I$ such that $a^p=0$ in the algebra $\til A$. Let $S\subset \til L$ be a finite set of $\leq n$ elements. Then the associative subalgebra of $\til A$ generated by commutators $[a,b_1,\cdots,b_t]$, where $b_i\in S,\ t\leq m,$ is nilpotent of degree $\leq p^{(n+1)^{mf(m,n)}}.$
\begin{proof}
Denote $q=p^{(n+1)^{mf(m,n)}}.$ We need to show that an arbitrary product
\[[a,b_{11},\cdots,b_{1t_1}]\cdots[a,b_{q1},\cdots,b_{qt_q}],\]
where $b_{ij}\in B,\ t_i\leq m,\ 1\leq i\leq q,$ is equal to 0.
Arguing as in the proof of \Cref{Lemma21} we can reduce the problem to showing that an arbitrary product $(a\phi_{11}\cdots\phi_{1m})\cdots(a\phi_{q1}\cdots\phi_{qm})=0,$ where $\phi_{ij}\in \Aut\til A,\ \phi_{ij}(\til L)=\til L,\ \phi_{ij}(\til I)=\til I,\ \#\{\phi_{ij}|1\leq i\leq q, 1\leq j\leq m\}\leq n+1,$.
Let $Y=\{a\phi_{i1}\cdots\phi_{im},1\leq i\leq q\},\ |Y|\leq (n+1)^m.$ An arbitrary element $y$ from $Y$ is a sandwich in $\til I$ and $y^p=0$ in $\til A.$
Let $L_1$ be the Lie algebra generated by $Y.$ By \Cref{Lemma21} $L_1^{f(m,n)}=(0).$ Let $\rho_1,\cdots,\rho_r$ be left normed commutators in $Y$ that form a basis of $L_1,\ r\leq |Y|^{f(m,n)}\leq(n+1)^{mf(m,n)}.$
By \Cref{Lemma22} for each commutator $\rho_i$ we have $\rho_i^p=0.$ Now the Poincare-Birkhoff-Witt theorem implies the assertion of the lemma.
\end{proof}
\end{lemma}
\section{Proof of \Cref{Theorem1}}
\label{Section6}
Let a Lie algebra $L$ over a field $F$ of characteristic $p>0$ and its associative enveloping algebra $A$, $L\subseteq A^{(-)},\ A=\langle L\rangle,$ satisfy the conditions outlined at the beginning of $\mathsection$3:
\begin{enumerate}[1)]
\item $L$ is a graded Lie algebra generated by elements $x_1,\cdots,x_m$ of degree 1; every element from the Lie set $S=S\langle x_1,\cdots,x_m\rangle$ is ad-nilpotent;
\item $L$ satisfies a polynomial identity;
\item the grading of $L$ extends to $A$; both algebras $L$ and $A$ are graded just infinite.
\end{enumerate}
Recall that an element $g(x_1,\cdots,x_r)$ of the free associative algebra is called a weak identity of the pair $(L,A)$ if $g(a_1,\cdots,a_r)=0$ for arbitrary elements $a_1,\cdots,a_r\in L.$ In particular, every Lie identity of the algebra $L$ can be viewed as a weak identity of the pair $(L,A).$
Let $k$ be a minimal degree of a nonzero weak identity satisfied by $(L,A).$ Without loss of generality we can assume that $(L,A)$ satisfies a weak identity
\[h(x_1,\cdots,x_k)=x_1\cdots x_k+\sum\limits_{1\neq\sigma\in S_k}\alpha_\sigma x_{\sigma(1)}\cdots x_{\sigma(k)}.\]
We remark that the pair $(\til{L}, \til{A})$ satisfies this weak identity as well.
Let $h(x_1,\cdots,x_k)=\sum\limits_{i=1}^k h_i(x_1,\cdots,\hat{x_i},\cdots,x_k)x_i.$ The ideal $M$ of the algebra $A$ generated by all values of $h_k(a_1,\cdots,a_{k-1}),\ a_i\in L$ is graded nonzero and therefore has finite codimension in $A$. Hence there exists $d\geq1$ such that $A^d\subseteq M.$ Denote $\widehat{A}=A+F 1,$
\begin{lemma}
\label{Lemma24}
For an arbitrary element $a\in \til{L}$ we have
\[A^da\subseteq\sum x_{i_1}\cdots x_{i_t}a\widehat{A},\ t\leq d-1.\]
\begin{proof}
For an arbitrary product of length $d$ we have
\[x_{i_1}\cdots x_{i_d}=\sum\limits_j \alpha_j v'_j h_{k}(\rho_{j1},\cdots,\rho_{j,k-1})v''_j,\]
where $\alpha_j\in F;\ v'_j,v''_j,$ and $\rho_{j1},\cdots,\rho_{j,k-1}$ are monomials and commutators in generators $x_1,\cdots,x_m$ of total length $d$.
Let $v''_j=x_{\mu_1}\cdots x_{\mu_r}.$ Then
\[v''_ja=a'+\sum\limits_t \pm w'_{jt}aw''_{jt},\]
where $a'=[x_{\mu_1},[x_{\mu_2},[\cdots,[x_{\mu_r},a]\cdots];\ w'_{jt},w''_{jt}$ are products in generators of total degree equal to the degree of $v''_j$ and the products $w''_{jt}$ are not empty. Hence,
\[\begin{multlined}
x_{i_1}\cdots x_{i_d}a=\sum\limits_j\alpha_jv'_jh_{k}(\rho_{j,1},\cdots,\rho_{j,k-1})a'+\\
\sum\limits_{j,t}\alpha_jv_j'h_{k}(\rho_{j,1},\cdots,\rho_{j,k-1})w_{jt}'aw_{jt}''.
\end{multlined}\]
Furthermore,
\[\begin{multlined}h_{k}(\rho_{j1},\cdots,\rho_{j,k-1})a'=h(\rho_{j1},\cdots,\rho_{j,k-1},a')-\\
\sum\limits_{i=1}^{k-1}h_i(\rho_{j1},\cdots,a',\cdots,\rho_{j,k-1})\rho_{ji}=-\sum\limits_{i=1}^{k-1}h_{i}(\rho_{j1},\cdots,a',\cdots\rho_{j,k-1})\rho_{ji}.
\end{multlined}\]
We proved that $x_{i_1}\cdots x_{i_d}a$ is a linear combination of elements $w'aw'',$ where $w',w''$ are products in $x_1,\cdots,x_m,$ with the length of $w'$ less than $d.$
\end{proof}
\end{lemma}
Consider the function $g(m,n)=p^{(n+1)^{mf(m,n)}}$.
\begin{lemma}
\label{Lemma25}
Let $I$ be an ideal of the algebra $L$. Let $a$ be a sandwich in $\til I$ and $a^p=0$ in $\til A.$ Let $a'=[a_1,\cdots,a_d],$ where $a_i=[a,u_{i1},\cdots,u_{it_i}],\ u_{ij}\in\til L,\ t_i\geq0,\ i=1,\cdots,d.$ Let $G=g(\max\limits_i\{ t_i+d-1\},t_1+\cdots+t_d+d^{d+1}\}).$ Then $(Aa')^G=(0).$ In particular, an arbitary element from $\text{Id}_{\til{L}}(a')^d$ generates a nilpotent ideal in $\til{A}.$
\begin{proof}
Suppose that $a'v_1a'\cdots v_{G-1}a'\neq0,$ where $v_1,\cdots,v_{G-1}$ are products in generators $x_1,\cdots,x_m$ of lengths $l(v_1),\cdots,l(v_{G-1})$ respectively. Without loss of generality we will assume that the vector of lengths $(l(v_1),\cdots,l(v_{G-1}))$ is lexicographically minimal. By \Cref{Lemma24} this implies that $l(v_i)\leq d-1,\ 1\leq i\leq G-1.$
If $v=x_{j_1}\cdots x_{j_r}$ then we denote
\[[va']=[x_{j_1},[x_{j_2},[\cdots[x_{j_r},a']\cdots]=(-1)^r[a',x_{j_r},x_{j_{r-1}},\cdots,x_{j_1}].\]
Again by lexicographical minimality we have
\[a'v_1a'\cdots v_{G-1}a'=a'[v_1a']\cdots[v_{G-1}a'].\]
Lemma \ref{Lemma23} is not applicable to the sandwich $a'$ and elements $x_1,\cdots, x_m$ because $x_1,\cdots, x_m$ do not lie in $\til{L}$. However, for an arbitrary word $v=x_{j_1}\cdots x_{j_r}$, $r<d$, we have
\[[va']=\sum\limits_i\left[[v_{i1}a_1],\cdots,[v_{id}a_d]\right],\]
where $v_{i1},\cdots, v_{id}$ are words in $x_1,\cdots, x_m$ of total length $r<d$. Hence, at least one of these words is empty. Now we can apply Lemma \ref{Lemma23} to the sandwich $a$ and the set $S=\{[a,u_{i1},\cdots, u_{it_i},x_{j1},\cdots, x_{jr}]|1\leq i\leq d, 1\leq j_1,\cdots, j_r\leq m, 0\leq r<d\}\subset\til{L}$. By Lemma \ref{Lemma23} and the choice of the number $G$, we have $a'[v_1a']\cdots[v_{G-1}a']=0$, which proves the lemma.
\end{proof}
\end{lemma}
Now our aim is the following:
\begin{proposition}
\label{Proposition4}
There exist integers $N\geq1,\ s\geq 1$ and a regular divided polynomial $v$ defined on $L^s$ such that every value of $v$ on $\til L^s$ generates a nilpotent ideal in $\til A$ of degree $\leq N.$
\end{proposition}
Suppose that the algebra $L$ satisfies an identity $f(x_0,x_1,\cdots,x_{n-1})=[x_0,x_1,\cdots,x_{n-1}]+\sum\limits_{1\neq\sigma\in S_{n-1}}\alpha_\sigma[x_0,x_{\sigma(1)},\cdots,x_{\sigma(n-1)}],$ where $\alpha_\sigma\in F$ and $n$ is the minimal degree of an identity satisfied by $L.$
Consider the following element of degree $n-1$:
\begin{align*}
&f_1(x_0,x_2,\cdots,x_{n-1})=[x_0,x_2,\cdots,x_{n-1}]+\\
&\sum\limits_{\substack{1\neq\sigma\in S_{n-1}\\ \sigma(1)=1}} \alpha_\sigma[x_0,x_{\sigma(2)},\cdots,x_{\sigma(n-1)}]=x_0H(\ad(x_2),\cdots,\ad(x_{n-1})),
\end{align*}
where $H(y_2,\cdots,y_{n-1})=y_2\cdots y_{n-1}+\sum\limits_{\substack{1\neq\sigma\in S_{n-1}\\ \sigma(1)=1}}\alpha_\sigma y_{\sigma(2)}\cdots y_{\sigma(n-1)}.$
\begin{lemma}
\label{Lemma26}
Let $w(x_1,\cdots,x_r)$ be a regular divided polynomial defined on $L^s.$ Then the divided polynomial
\[w'(x_1,\cdots,x_r,y_2,\cdots,y_{n-1})=f_1(w(x_1,\cdots,x_r),y_2,\cdots,y_{n-1})\]
is also regular.
\begin{proof}
Choose $t\geq s$ and elements $a_1,\cdots,a_r\in\til L^t$ such that $a'=w(a_1,\cdots,a_r)\neq 0.$ Suppose that for arbitrary elements $b_2,\cdots,b_{n-1}\in\til L^t$ we have $f_1(a',b_2,\cdots,b_{n-1})=0.$ Let $a'=\sum\limits_\pi a'_\pi$ be the standard decomposition, $a'_\pi=\bar{a'_\pi}\otimes e_\pi,\ \bar{a'_\pi}\in L^t.$ Then the assumption above means that for an arbitrary $\pi$ we have $f_1(\bar{a'_\pi},L^t,\cdots,L^t)=(0).$ Choose $\pi$ such that $\bar{a'_\pi}\neq 0.$ Let $R=\langle \text{Id},\ad(x),x\in L\rangle\subseteq\End_F(L)$ be the multiplication algebra of the algebra $L.$ Consider the ideal $\text{id}_L(\bar{a'_\pi})=\bar{a'_\pi}R$ generated by the element $\bar{a'_\pi}$ in $L.$
For an arbitrary element $x\in L$ we have
\[[\ad(x),H(ad(L^t),\cdots,\ad(L^t))]\subseteq H(\ad(L^t),\cdots,ad(L^t)).\]
Hence,
\[RH(ad(L^t),\cdots,\ad(L^t))\subseteq H(\ad(L^t),\cdots,ad(L^t))R.\]
Now for an arbitrary operator $P\in R$ we have
\[\begin{multlined}f_1(\bar{a'_\pi}P,L^t,\cdots,L^t)=\bar{a'_\pi}PH(L^t,\cdots,L^t)\\
\subseteq\bar{a'_\pi}H(L^t,\cdots,L^t)R=f_1(\bar{a'_\pi},L^t,\cdots,L^t)R=(0).\end{multlined}\]
Since the algebra $L$ is graded just infinite it follows that $\text{id}_L(\bar{a'_\pi})\supseteq L^k$ for sufficiently large $k\geq t.$ We proved that $f_1(L^k,\cdots,L^k)=(0).$
The algebra $L^k$ is finitely generated by \Cref{Lemma3}. By the induction assumption on the degree of the identity $f$ we conclude that the Lie algebra $L^k$ is finite dimensional. Therefore the algebra $L$ is finite dimensional as well which contradicts our assumption that the algebra $L$ is graded just infinite, proving the lemma.
\end{proof}
\end{lemma}
\begin{corollary}\label{Corollary1}
Let $q\geq 1.$ Choose $r+q(n-2)$ distinct variables $x_1,\cdots,x_r,\ y_{ij},\ 1\leq i\leq q,\ 2\leq j\leq n-1.$ Then the divided polynomial
\[\begin{multlined}w_q=w(x_1,\cdots,x_r)H(\ad(y_{11}),\cdots,\ad(y_{1,n-1}))\cdots\\ H(\ad(y_{q1},\cdots,\ad(y_{q,n-1}))\end{multlined}\]
is regular.
\end{corollary}
\begin{lemma}
\label{Lemma27}
For arbitrary elements $a,b_2,\cdots,b_{n-1},c\in\til L$ we have
\[[f_1(a,b_2,\cdots,b_{n-1}),c]\in\sum F[a,b_{i_2},\cdots,[b_{i_k},c],\cdots,b_{i_{n-1}}],\]
where $i_2,i_3,\cdots,i_{n-1}$ is a permutation of $2,\cdots,n-1;\ 2\leq k\leq n-1.$
\begin{proof}
We have
\[\begin{multlined}aH(\ad(b_2),\cdots,\ad(b_{n-1})\ad(c)=a\ad(c)H(\ad(b_2),\cdots,\ad(b_{n-1}))+\\
\sum aH(\ad(b_2),\cdots,\ad([b_k,c]),\cdots,\ad(b_{n-1})).\end{multlined}\]
Let us represent the polynomial $f$ of minimal degree as
\[f(x_0, x_1, \cdots, x_{n-1})=\sum\limits_{i=1}^{n-1}x_0\ad(x_i)H_i(\ad(x_1), \cdots, \widehat{\ad(x_i)}, \cdots, \ad(x_{n-1})),\]
where $H_1=H$. Then
\begin{align*}
&a\ad(c)H(\ad(b_2), \cdots, \ad(b_{n-1}))=-c\ad(a)H(\ad(b_2), \cdots, \ad(b_{n-1}))\\
&=\sum\limits_{i=2}^{n-1}[c,b_i]H_i(\ad(a), \ad(b_2), \cdots, \widehat{\ad(b_i)}, \cdots, \ad(b_{n-1}))\\
& \in \sum F[a,b_{i_2}, \cdots, [b_{i_k},c], \cdots, b_{i_{n-1}}].
\end{align*}
\end{proof}
\end{lemma}
\begin{lemma}
\label{Lemma28}
Let $\nu\geq 1.$ Suppose that a divided polynomial $w(x_1,\cdots,x_r)$ is defined on $L^s$ and for all $t\leq q(n-2)+\nu$ the divided polynomial $[w(x_1,\cdots,x_r),y_1,\cdots,y_t,w(x_1,\cdots,x_r)]$ is identically zero on $\til L^s.$ Then for arbitrary elements $a_k,b_{ij}\in\til L^s$ we have
\[\begin{multlined}
[ w _q(a_k,b_{ij},1\leq k\leq r,\ 1\leq i\leq q,\ 2\leq j\leq n-1),\\
\underbrace{L,L,\cdots,L}_{\mu},\underbrace{L^s,\cdots,L^s}_{\nu},w(a_1,\cdots,a_r)]=(0)\end{multlined}\]
for $\mu\leq q.$
\begin{proof}
Applying \Cref{Lemma27} $q$ times we get
\[[w_q(a_k,b_{ij}),\underbrace{L,\cdots,L}_\mu]\subseteq[w(a_1,\cdots,a_r),\underbrace{\til L^s,\cdots,\til L^s}_{q(n-2)}],\]
which implies the assertion of the lemma.
\end{proof}
\end{lemma}
\begin{lemma}
\label{Lemma29}
Let $a\in \til L$ and $[a,\underbrace{\til L,\cdots,\til L}_\mu,a]=(0)$ for $\mu\leq2d.$ Then for an arbitrary element $b\in \til L$ the commutator $[a,b]$ generates a nilpotent ideal in $\til A$ of degree $\leq m^d(p-1)+1.$
\begin{proof}
Recall that the algebra $L$ is generated by $m$ elements $x_1,\cdots,x_m.$ Suppose that $[a,b]v_1[a,b]\cdots v_{N-1}[a,b]\neq0,$ where $v_i$ are products of the generators and the vector of lengths $(l(v_1),\cdots,l(v_{N-1})$ is lexicographically minimal among all vectors with this property. Then by \Cref{Lemma24} $l(v_i)<d$ for $i=1,\cdots,N-1.$
As above, for a product $v=x_{i_1},\cdots,x_{i_k}$ we denote
\[[v[a,b]]=[x_{i_1}[x_{i_2},[\cdots[x_{i_k},[a,b]]\cdots].\]
We have
\[[a,b]v_1\cdots v_{N-1}[a,b]=[a,b][v_1,[a,b]]\cdots[v_{N-1}[a,b]].\]
By our assumption the commutators $[a,b],\ [v_i[a,b]],\ 1\leq i\leq N-1,$ commute. There are $<m^d$ such commutators. Hence at least one commutator $[v_i[a,b]]$ occurs $\geq p$ times. If $b=\sum\limits_\pi b_\pi$ is the standard decomposition then $[v_i [a,b]]^p$ is a sum of expressions
\begin{align*}
&\{[v_i[a,b_{\pi_0}]],\cdots,[v_i[a,b_{\pi_{p-1}}]]\}=\\
&\sum\limits_{\sigma\in S_{p-1}}[[v_i,[a,b_{\pi_0}]],[v_i[a,b_{\pi_{\sigma(1)}}]],\cdots,[v_i[a,b_{\pi_{\sigma(p-1)}}]]]=0.
\end{align*}
Hence $[v_i[a,b]]^p=0,$ which finishes the proof of the lemma.
\end{proof}
\end{lemma}
\begin{lemma}
\label{Lemma30}
For an arbitrary sandwich of the algebra $\til L^s$ we have $a^p=0$ in $\til A.$
\begin{proof}
Recall that the algebra $A$ is a homomorphic image of the subalgebra $\langle \ad(x),x\in L\rangle\subseteq End_F(L).$
Hence it is sufficient to show that $\ad(a)^p=0$ in $\til L.$ If $p\geq 3$ then $\til L\ad(a)^p\subseteq[\til L^s,a,a]=(0).$ Let $p=2.$ We have $[\til L^s,a,a]=(0).$ Since the mapping $\til L\rightarrow\til L,\ x\rightarrow [x,a,a]$ is a derivation of $\til L$ it follows that $[\til L,a,a]$ lies in the centralizer of $\til L^s.$ In a graded just infinite algebra $L$ the centralizer of $L^s$ is zero. Hence $[\til L,a,a]=(0)$ and again $\ad(a)^2=0$, which finishes the proof of the lemma.
\end{proof}
\end{lemma}
\begin{proof}[Proof of \Cref{Proposition4}]
We will start with the regular divided polynomial $v(x_1,\cdots,x_r)$ of \Cref{Proposition3} defined on $L^s.$ Every value of $v$ on $\til L^s$ is a sum of $t$ sandwiches of the algebra $\til{L}^s.$
We will construct a sequence of finite sets $M_i$ of divided polynomials defined on $L^s,\ i\geq0.$
Let $M_0=\{v\},\ M_{i+1}=\{[w,y_1,\cdots,y_\mu,w]|w\in M_i,\ \mu\leq4d(n-2);\ y_1,\cdots,y_\mu \text{ are variables not involved in } w\}.$
Let $2^i\geq (d-1)t+1,$ $w \in M_i.$ Let $b$ be a value of the divided polynomial $v$ on $\til{L}^s.$ By Proposition \ref{Proposition3}, $b=b_1 + \cdots + b_t,$ where for $1 \leq j \leq t,$ each element $b_j$ is a sandwich of the algebra $\til{L}^s$. Since $2^i \geq (d-1)t +1,$ it follows that the value $c$ of the divided polynomial $w$ that is obtained by iterating the value $b$ of $v$ lies in $\sum\limits_{j=1}^{t}\text{id}_{\til{L}}(b_j)^d.$ By Lemma \ref{Lemma25} there exists an integer $G \geq 1$ such that every value of the divided polynomial $w$ on $\til{L}^s$ generates a nilpotent ideal in $\til{A}$ of degree $\leq G.$
If at least one divided polynomial in $M_i$ is regular, then we are done.
If none of the divided polynomials in $M_i$ is regular and $i$ is the minimal integer with this property then there exists a regular divided
polynomial $w(x_1,\cdots,x_r)$ defined on $\til L ^s$ and an integer $t\geq s$ such that all the divided polynomials
\[[w(x_1,\cdots,x_r),y_1,\cdots,y_\mu,w(x_1,\cdots,x_r)],\ 1\leq\mu\leq 4d(n-2),\]
are identically zero on $\til L^t.$
Consider the regular divided polynomial $w_{2d}(x_1,\cdots,x_r,y_{ij},1\leq i\leq2d,\ 2\leq j\leq n-1).$ By \Cref{Lemma28} we have
\[[w_{2d}(a_1,\cdots,a_r,b_{ij}),\underbrace{L,L,\cdots,L}_\mu,\underbrace{L^t,\cdots,L^t}_\nu,w(a_1,\cdots,a_r)]=(0),\]
$ \mu\leq2d,\ \nu\leq 2d(n-2)$ for arbitrary elements $a_1,\cdots,a_r,b_{ij}\in\til L^t$. We have $w_{2d}(a_1, \cdots, a_r, b_{ij})\in \sum\limits_{\nu=1}^{2d(n-2)}[w(a_1, \cdots, a_r), \underbrace{L^t, \cdots, L^t}_\nu].$
Therefore
\[[w_{2d}(a_1,\cdots,a_r,b_{ij}),\underbrace{L,L,\cdots,L}_\mu,w_{2d}(a_1,\cdots,a_r,b_{ij})]=(0)\]
for $\mu\leq 2d$.
The divided polynomial \[w'_{2d}(x_0,x_1,\cdots,x_r,y_{ij})=[w_{2d}(x_1,\cdots,x_r,y_{ij}),x_0]\]
is regular. Indeed, regularity of $w_{2d}$ has been established in Corollary \ref{Corollary1}. If the divided polynomial $w_{2d}'$ vanishes on some power of $L$, then some power of $L$ has a nonzero centralizer. Since the algebra $L$ is graded just infinite, it follows that this centralizer is of finite codimension. Hence the algebra $L$ is solvable and therefore finite dimensional, a contradiction. By \Cref{Lemma29} an arbitrary value of $w'_{2d}$ on $\til L^t$ generates a nilpotent ideal in $\til A$ of degree $\leq m^d(p-1)+1.$ This finishes the proof of \Cref{Proposition4}.
\end{proof}
By \Cref{Proposition4} there exist integers $s\geq 1,\ N_1\geq1$ and a regular divided polynomial $w$ defined on $L^s$ such that every value of $w$ on $\til L^s$ generates a nilpotent ideal in $\til A$ of degree $\leq N_1.$ Let $f(x_1,x_2,\cdots,x_r)\in\til L\ast\Lie\langle X\rangle$ be the linearization of the divided polynomial $w$. If $l$ is the degree of $w$ then every value of $f$ in $\til L^s$ is a linear combination of $2^l$ values of $w$. Hence for arbitrary $a_1,a_2,\cdots a_r \in\til L^s$ the element $f(a_1,\cdots,a_r)$ generates a nilpotent ideal in $\til A$ of degree $\leq N_2=2^l(N_1-1)+1.$
Choose variables $x_{ij} \in X$, $1\leq i\leq r$, $1 \leq j \leq N_2$. The pair $(L,A)$ satisfies the system of weak identities
\begin{align*}
&F_{N_2}=\{F_{N_2}(x_{ij},y_k)=\sum\limits_{\sigma_1,\cdots, \sigma_r\in S_{N_2}}f(x_{1\sigma_1(1)}, x_{2\sigma_2(1)},\cdots, x_{r\sigma_r(1)})y_1\\
&f(x_{1\sigma_1(2)}, x_{2\sigma_2(2)},\cdots, x_{r\sigma_r(2)})y_2\cdots y_{N_2-1}f(x_{1\sigma_1(N_2)}, x_{2\sigma_2(N_2)},\cdots, x_{r\sigma_r(N_2)})\\
&=0\},
\end{align*}
where $x_{ij}$ take values in $L^s$ and $y_k$'s are arbitrary products of independent variables taking values in $L$. Thus values of $y_k$'s lie in $A$.
Indeed, these weak identities are satisfied by the pair $(\til{L}, \til{A})$. It remains to notice that the pair $(L,A)$ and $(\til{L},\til{A})$ satisfy the same multilinear weak identities.
Let $N$ be the minimal integer such that $(L,A)$ satisfies the weak identities $F_N=0$.
Let $a=F_{N-1}(a_{ij},b_k)\neq 0$, $a_{ij}\in L^s$, $1\leq i \leq r$, $1\leq j\leq N-1$; $b_k\in A$. Choose $t > \max\limits_{i,j}\deg({a_{ij}})$. By regularity of the polynomial $f$, there exist homogeneous elements $a_1, \cdots, a_r \in L^t$ such that $f(a_1, \cdots, a_r) \neq 0$. The identities $F_N=0$ immediately imply the following lemma.
\begin{lemma}
\label{Lemma31}
Let $b_\mu,c_\mu\in A+F1.$ Then $(\sum\limits_\mu b_\mu f(a_1,\cdots,a_r)c_\mu)a$ is a linear combination of elements $(\sum\limits_\mu b_\mu f(a_1',\cdots,a_r')c_\mu)a',$ where $a'\in A,\ a_1'\in\{a_1,a_{1k},\ 1\leq k\leq N-1\},\ a_2'\in \{a_2,a_{2k},\ 1\leq k\leq N-1\},\cdots,$ and at least one $a_i'$ lies in $\{a_{ik},\ 1\leq k\leq N-1\}.$
\end{lemma}
The ideal $I$ generated by $f(a_1,\cdots,a_r)$ in $A$ has finite codimension. Let $A^l\subseteq I.$
\begin{corollary}\label{CorollaryL31}
Let $u$ be a homogeneous element of degree $\geq l.$ Then for arbitrary $b_\mu,c_\mu\in A+F1$ the element $(\sum\limits_\mu b_\mu u c_\mu)a$ is a linear combination of elements $(\sum\limits_\mu b_\mu u'c_\mu)a',$ where $u'\in A$ are homogeneous elements, $\deg u'<\deg u.$
\end{corollary}
Indeed, from $u\in A^\ell \subseteq I$ it follows that $u=\sum\limits_\nu b_\nu' f(a_1, \cdots, a_r)c_\nu'$, where $b_\nu', c_\nu'$ are homogeneous elements, $\deg b_\nu'+\deg c_\nu'+\sum\limits_{i=1}^r\deg a_i=\deg u$. Lemma \ref{Lemma31} implies that $(\sum\limits_{\mu,\nu}b_\mu b_\nu' f(a_1, \cdots, a_r)c_\nu' c_\mu)a$ is a linear combination of elements $(\sum\limits_{\mu,\nu} b_\mu b_\nu' f(a_1', \cdots, a_r')c_\nu' c_\mu )a',$ where\linebreak $\deg a_i' \leq \deg a_i$ for all $i$ and at least for one $i$, we have $\deg a_i' < \deg a_i$. Hence for $u'=\sum\limits_\nu b_\nu' f(a_1', \cdots, a_r')c_\nu '$ we have $\deg u' < \deg u.$
\begin{lemma}
\label{Lemma32}
Let $h(x_1,\cdots,x_q)$ be a multilinear element of the free associative algebra such that for arbitrary homogeneous elements \linebreak$u_1,\cdots,u_q\in A$ of degrees $\deg u_1<l,\cdots,\deg u_q<l$ we have \linebreak$h(u_1,\cdots,u_q)=0.$ Then $h=0$ holds identically on $A.$
\begin{proof}
Let $v_1,\cdots,v_q\in A$ be homogeneous elements of $A$ such that $h(v_1,\cdots,v_q)\neq0.$ Let the total degree $\sum\limits_{i=1}^q\deg(v_i)$ be minimal among all $q$-tuples with this property. At least one element $v_i$ has degree $\geq l.$
Let us show that the graded just infinite algebra $A$ is graded prime. Indeed, if $I_1,I_2$ are nonzero graded ideals of $A$ then $A^{t_1}\subseteq I_1,A^{t_2}\subseteq I_2$ for some integers $t_1,t_2\geq 1.$ If $I_1I_2=(0)$ then $A^{t_1+t_2}=(0),$ a contradiction.
Hence there exists an element $b\in A$ such that $h(v_1,\cdots,v_q)ba\neq0.$
By \Cref{CorollaryL31} the element $h(v_1,\cdots,v_q)ba$ is a linear combination of elements $h(v_1 ,\cdots,v_{i-1},v',v_{i+1},\cdots,v_q)ba',$ where $\deg v'<\deg v_i.$ This contradicts the minimality of $\sum\limits_{i=1}^q\deg(v_i)$ and finishes the proof of the lemma.
\end{proof}
\end{lemma}
\begin{remark*}
A nonzero element $h(x_1,\cdots, x_q)$ satisfying the hypothesis of Lemma \ref{Lemma32} exists for an arbitrary finitely generated algebra. Moreover, for an arbitrary associative algebra $A$ and a finite dimensional subspace $V\subset A$, there exists a multilinear element $h(x_1,\cdots, x_q)$ of the free associative algebra such that $h(u_1,\cdots, u_q)=0$ for all elements $u_1,\cdots, u_q\in V$. Indeed, it is sufficient to choose an element that is skew-symmetric in $x_1,\cdots, x_q$, where $q=\dim_FV+1$ , for example the element
\[h(x_1,\cdots, x_q)=\sum\limits_{\sigma\in S_q}(-1)^{|\sigma|}x_{\sigma(1)}\cdots x_{\sigma(q)}.\]
\end{remark*}
\begin{proof}[Proof of \Cref{Theorem1}]
It is known (see \cite{NO}) that a graded prime algebra is prime. By \Cref{Lemma32}, $A$ is a PI-algebra. The prime PI-algebra $A$ has a nonzero center $Z$ and the ring of fractions $(Z\setminus\{0\})^{-1}A$ is a finite dimensional associative algebra over the field $(Z\setminus\{0\})^{-1}Z$ (see \cite{R}). Now the Engel-Jacobson theorem \cite{J1} implies that the algebra $A$ is nilpotent, a contradiction. Thus \Cref{Theorem1} is proved.
\end{proof}
\begin{proof}[Proof of \Cref{Theorem2}]
Let $G$ be a residually-$p$ finitely generated torsion group. Let $G=G_1\geq G_2\geq\cdots$ be the Zassenhaus filtration. Consider the Lie algebra $L_p(G)=\bigoplus\limits_{i\geq 1}G_i/G_{i+1}.$ Because of the torsion property of elements of $G$, an arbitrary homogeneous element $a\in G_i/G_{i+1}$ of the Lie algebra $L_p(G)$ is ad-nilpotent (see \cite{K3,VL}).
Consider the subalgebra $L$ of $L_p(G)$ generated by $G_1/G_2.$ If the Lie algebra $L_p(G)$ satisfies a polynomial identity then by \Cref{Theorem1} the finitely generated Lie algebra $L$ is nilpotent. This implies that the pro-$p$ completion $G_{\hat{p}}$ of the group $G$ is $p$-adic analytic and therefore linear (see \cite{DSMS}). Now finiteness of $G$ follows from theorems of Burnside and Schur \cite{J3}.
\end{proof}
\begin{proof}[Proof of \Cref{Theorem3}]
Let $Fr$ be the free pro-$p$ group. Let $Fr=Fr{_1}>Fr_{2}>\cdots$ be the Zassenhaus filtration of $Fr$. Suppose that the pro-$p$ completion $G_{\hat{p}}$ satisfies the pro-$p$ identity $w=1,\ w\in Fr{_n}\setminus Fr_{n+1},$ hence $w=\rho_1^{p^{s_1}}\cdots\rho_r^{p^{s_r}}w',$ where each $\rho_i$ is a left normed group commutator of length $l_i,\ p^{s_i}\cdot l_i=n,\ w'\in Fr_{n+1}.$
Considering, if necessary, $[w,x_0]$ instead of $w$, we can assume that $n$ is not a multiple of $p$, and $w=\rho\cdots\rho_rw',$ where all commutators $\rho_1,\cdots,\rho_r$ are of length $n.$
Let $\bar{\rho_i}$ be the commutator from the free Lie algebra that mimics the group commutator $\rho_i$. Then the Lie algebra $L_p(G)$ satisfies the polynomial identity $\sum\limits_i\bar{\rho_i}=0.$ By \Cref{Theorem2} we conclude that $|G|<\infty.$
\end{proof}
\bibliographystyle{alphanum}
|
\section{Introduction.}
Denote $\mathfrak {B}({\mathcal H})$, $\mathfrak {T}({\mathcal H})$ and $\mathfrak {S}({\mathcal H})$ the algebra of all bounded operators, the Banach space of all trace class operators and the convex set of
positive unit-trace operators (quantum states) in a Hilbert space $\mathcal H$, respectively.
A completely positive trace-preserving linear map $\Phi :\mathfrak {T}({\mathcal H})\to \mathfrak {T}({\mathcal H})$ is said to be a quantum channel.
Given a quantum channel $\Phi $
one can pick up its Kraus decomposition of the form
\begin{equation}\label{Kraus}
\Phi (\rho)=\sum \limits _{n}V_n\rho V_n^*,
\end{equation}
where $V_n\in \mathfrak {B}({\mathcal H}),\ \sum \limits _nV_n^*V_n=I$, $I$ is the identity operator in $\mathcal H$, $\rho \in \mathfrak {S}({\mathcal H})$ \cite{hol}. Throughout all this paper the Hilbert space $\mathcal H$ is supposed to be finite-dimensional.
In \cite{graph} the noncommutative graph $\mathcal{G}(\Phi)$ of a quantum channel $\Phi $ was introduced. Let us consider
the Kraus decomposition (\ref {Kraus}), then $\mathcal {G}(\Phi)$ is the operator subspace
\begin{equation}\label{graph}
\mathcal {G}(\Phi)=\overline {Lin(V_j^*V_k)}.
\end{equation}
In \cite{graph2, graph3} it was shown that the operator subspace $\mathcal S$ is associated with some channel in the sense of (\ref {graph}) iff $I\in \mathcal S$
and $\mathcal S^*=\mathcal S$. It seems to be interesting to study the algebraic structure of (\ref {graph}). For example, the question arises whether it is possible to
show that $\mathcal {G}(\Phi )$ is an image of the representation of the algebra ${\mathbb C}G$ associated with some noncommutative group $G$? Here we shall consider
this question for an important particular case.
Consider the operator subspace ${\cal L}_{\theta} \subset Mat_4({\mathbb C})$:
\begin{equation}\label{L}
\begin{pmatrix}
a & b & c\theta & d\\
b & a & d & c/\theta\\
c/\theta & d & a & b\\
d & c\theta & b & a
\end{pmatrix}
\end{equation}
for $\theta \in {\mathbb C}^*$.
The operator graph (\ref {L}) was introduced in \cite {maxim} to construct channels with positive
quantum zero-error capacity having vanishing n-shot capacity.
A finite-dimensional channel $\Phi :\mathfrak {S}({\mathcal H})\to \mathfrak {S}({\mathcal H})$ is called pseudo-diagonal \cite{ruskai} if
\begin{equation}\label{pseudo}
\Phi (\rho )=\sum \limits _{i,j}c_{ij}<\psi _i|\rho |\psi _j>|i><j|
\end{equation}
where $\{c_{ij}\}$ is a Gram matrix of a collection of unit vectors, $\{|\psi_i>\}$ is a collection of vectors in $\mathcal H$ such that $\sum \limits _i|\psi _i><\psi _i|=I$
and $\{|i>\}$ is an orthonormal basis in $\mathcal H$. Pseudo-diagonal channels are complementary to entanglement-breaking channels and vice versa.
In \cite{maxim} it was shown that the noncommutative graph ${\cal L}_{\theta }$ can be associated with a family of pseudo-diagonal channels (\ref {pseudo})
depending on the parameter $\theta $.
In the present paper we shall show that ${\cal L}_{\theta }$ can be considered as a image of representation $\pi _{\theta }$ of the ring generated by the
group $G$ with three generators $x,y,z$ satisfying the relations
\begin{equation}\label{relations}
x^2=y^2=z^2=1,\ xz=zx,\ yz=zy.
\end{equation}
Notice that adding to (\ref {relations}) the relation
\begin{equation}\label{klein}
xy=yx=z
\end{equation}
we obtain the Klein group $K_4$.
The Klein group $K_4=\{1,x,y,z\}$ with the generators satisfying (\ref {relations})-(\ref {klein}) is abelian. Thus, all its irreducible representations are one-dimensional.
It implies that the minimal dimension of any faithful representation is equal to four. Pick up the orthonormal basis $\{|j>,\ 1\le j\le 4\}$ in the Hilbert space ${\mathcal H}_4,\ dim{\mathcal H}_4=4$.
Then, we can define the standard faithful representation of $K_4$ in ${\mathcal H}_4$ by the formula
$$
x|1>=y|1>=z|1>=|1>,
$$
\begin{equation}\label{kanal}
x|2>=y|2>=-|2>,\ z|2>=|2>,
\end{equation}
$$
x|3>=|3>,\ y|3>=z|3>=-|3>,
$$
$$
x|4>=-|4>,\ y|4>=|4>,\ z|4>=-|4>.
$$
The quantum channel corresponding to the graph generated by the elements $\{1,x,y,z\}$ satisfying (\ref {kanal}) is given by the formula
\begin{equation}\label{prost}
\Phi (\rho )=(1-\alpha -\beta )\rho +\alpha x\rho x+\beta y\rho y,
\end{equation}
$\rho \in \mathfrak {S}(H_4)$, $\alpha ,\beta \ge 0,\ \alpha +\beta \le 1$. The map defined by (\ref {prost}) is a dephazing channel which is a partial case
of pseudo-diagonal channel (\ref {pseudo}) such that
$$
\Phi (|j><j|)=|j><j|,\ 1\le j\le 4,
$$
$$
\Phi (|1><2|)=(1-2\alpha -2\beta)|1><2|,\ \Phi (|1><3|)=(1-2\beta )|1><3|,
$$
$$
\Phi (|1>4|)=(1-2\alpha )|1><4|,\ \Phi (|2><3|)=(1-2\alpha )|2><3|,\
$$
$$
\Phi (|2><4|)=(1-2\beta )|2><4|,\ \Phi (|3><4|)=(1-2\alpha -2\beta )|3><4|.
$$
A transition from the graph determined by (\ref {relations})-(\ref {klein}) corresponding to the channel
(\ref {prost}) to the graph ${\mathcal L}_{\theta }$ corresponding to a general pseudo-diagonal channel (\ref {pseudo}) can be considered as a noncommutative deformation of
the Klein group $K_4$ in the spirit of \cite {Fad}.
Our goal is a explanation of subalgebras ${\cal M}_{\theta}$ of $Mat_4({\mathbb C})$ generated by subspaces ${\cal L}_{\theta}, \theta \in {\mathbb C}^*$ in terms of representation theory. It follows from (\ref {L}) that the generators of ${\cal M}_{\theta}$ can be pick up as follows:
\begin{equation}
\label{xyz}
X =
\begin{pmatrix}
0 & 1 & 0 & 0\\
1 & 0 & 0 & 0\\
0 & 0 & 0 & 1\\
0 & 0 & 1 &0
\end{pmatrix},
Y =
\begin{pmatrix}
0 & 0 & \theta & 0\\
0 & 0 & 0 & 1/\theta\\
1/\theta & 0 & 0 & 0\\
0 & \theta & 0 & 0
\end{pmatrix},
Z =
\begin{pmatrix}
0 & 0 & 0 & 1\\
0 & 0 & 1 & 0\\
0 & 1 & 0 & 0\\
1 & 0 & 0 & 0
\end{pmatrix}
\end{equation}
Alternatively it is possible to pick up the following matrices as generators of ${\cal M}_{\theta}$ for $\theta \in {\mathbb C}^*$:
\begin{equation}
X =
\begin{pmatrix}
0 & 1 & 0 & 0\\
1 & 0 & 0 & 0\\
0 & 0 & 0 & 1\\
0 & 0 & 1 &0
\end{pmatrix},
XYX =
\begin{pmatrix}
0 & 0 & 1/\theta & 0\\
0 & 0 & 0 & \theta\\
\theta & 0 & 0 & 0\\
0 & 1/\theta & 0 & 0
\end{pmatrix},
Z =
\begin{pmatrix}
0 & 0 & 0 & 1\\
0 & 0 & 1 & 0\\
0 & 1 & 0 & 0\\
1 & 0 & 0 & 0
\end{pmatrix}
\end{equation}
It results in ${\cal M}_{\theta} = {\cal M}_{1/\theta}$. Also, we have the following symmetry ${\cal M}_{\theta} = {\cal M}_{-\theta}$.
Note that ${\rm dim}_{\mathbb C}{\cal M}_{\theta} = 8$ for $\theta \ne \pm 1$ and ${\rm dim}_{\mathbb C}{\cal M}_{\theta} = 4$ for $\theta = \pm 1$.
For explanation of this effect we will construct family of algebras ${\cal A}_{\theta}, \theta \in {\mathbb C}^*$ as a quotient of ${\mathbb C}G$ by relation:
\begin{equation}\label{sootn}
(xy + yx)z = (\theta+\theta^{-1})\cdot 1
\end{equation}
One can see that we have canonical isomorphism: ${\cal A}_{\theta} \cong {\cal A}_{1/\theta}$.
For construction of this family we will use a semidirect product of ${\mathbb Z}_2$ and ${\mathbb Z} \oplus {\mathbb Z}_2$ and its representations. Matrices $X,Y,Z$ defines representation $\phi$ of algebras ${\cal A}_{\theta}$ and ${\cal M}_{\theta} = \phi({\cal A}_{\theta})$.
Family ${\cal A}_{\theta}$ has the following symmetry ${\cal A}_{\theta} \cong {\cal A}_{-\theta}, \theta \in {\mathbb C}^*$.
Any algebra ${\cal A}_{\theta}$ has dimension 8. Our main result tells us that algebra ${\cal A}_{\theta}$ is isomorphic to $Mat_2({\mathbb C}) \oplus Mat_2({\mathbb C})$ for $\theta \ne \pm 1$. For $\theta = \pm 1$ algebras ${\cal A}_{\theta}$ have 4-dimensional radical $J$, and, quotient ${\cal A}_{\theta}/J$ is a direct sum of four copies of ${\mathbb C}$'s. Algebra ${\cal A}_{\theta}$ is "universal" for representation $\phi$, i.e.
\begin{itemize}
\item{we have factorization: for any $\theta \in {\mathbb C}^*$ representation $\phi: {\mathbb C}G \to Mat_4({\mathbb C})$ is a composition ${\mathbb C}G \to {\cal A}_{\theta} \to Mat_4({\mathbb C})$. }
\item{Also, for $\theta \ne \pm 1$ map $\phi: {\cal A}_{\theta} \to {\cal M}_{\theta}$ is an isomorphism. }
\end{itemize}
Our article is organized as follows.
In section 2 we discuss matrices $X,Y,Z$ and Klein group. In this section we remind the notion of Klein group and some property of representations of it. In section 3, we give the definition of group $G$. This group $G$ is natural object for studying of ${\cal M}_{\theta}, \theta \in {\mathbb C}^*$.
Also, we give preliminary definitions and results in group theory. In particular, we prove that group $G$ is a semidirect product of ${\mathbb Z}_2$ and ${\mathbb Z} \oplus {\mathbb Z}_2$. One can find the exploration of center of group algebra ${\mathbb C}G$ in section 4. This exploration is important for studying of representations of algebra ${\mathbb C}G$. We give a natural description of irreducible ${\mathbb C}G$-modules in terms of maximal commutative subalgebra ${\mathbb C}P \subset {\mathbb C}G$, where $P$ is a maximal abelian subgroup of $G$.
One can describe the connection between ${\cal M}_{\theta}$ and ${\mathbb C}G$ in the following manner: matrices $X,Y,Z$ defines representation of the group $G$. In section 6 we prove that ${\mathbb C}G$ - representation $\phi$ defined by matrices $X,Y,Z$ is semisimple, i.e. direct sum of irreducible ${\mathbb C}G$ - modules.
Also, we introduce the family of algebras ${\cal A}_{\theta}$. This family is a quotient of ${\mathbb C}G$ by relations (\ref{sootn}). Family ${\cal A}_{\theta}$ plays an important role for studying of representation $\phi$. Actually, morphism $\phi: {\mathbb C}G \to Mat_4({\mathbb C})$ factorizes into composition: ${\mathbb C}G \to {\cal A}_{\theta} \to Mat_4({\mathbb C})$. Thus, $\phi({\cal A}_{\theta}) = {\cal M}_{\theta}$.
We prove that if $\theta \ne \pm 1$ algebra ${\cal A}_{\theta}$ is isomorphic to direct sum of two copies of matrix algebras $Mat_2({\mathbb C})$. In the case $\theta = \pm 1$, algebra ${\cal A}_{\theta}$ has 4-dimensional radical. This means that relation (\ref{sootn}) is universal, i.e. for general $\theta \in {\mathbb C}^*$ representation $\phi$ provides isomorphism. In the case $\theta = \pm 1$, representation $\phi$ is not an isomorphism, because algebras ${\cal A}_{\theta}$ has radical. Since $\phi$ is semisimple, $\phi$ annihilate radical and we get 4-dimensional algebra ${\cal M}_{\theta}$.
Article has two appendices. In the beginning of appendix A, we give some classical definitions in homological algebra. In this section we study homological properties of irreducible ${\mathbb C}G$-modules. In particular, we calculate extension group for irreducible ${\mathbb C}G$-modules.
In Appendix B, we recall some definitions and notions of noncommutative algebraic geometry. We introduce two kinds of noncommutative varieties for arbitrary finite generated algebra $A$: representation space ${\bf Rep}_nA = {\rm Hom}_{alg}(A,Mat_n({\mathbb C}))$ and moduli variety ${\cal M}_nA$ which is the quotient of ${\bf Rep}_nA$ by natural action of ${\rm GL}_n({\mathbb C})$. In this section we study connection between varieties ${\bf Rep}_2{\mathbb C}P$ and ${\bf Rep}_2{\mathbb C}G$ as well as ${\cal M}_2{\mathbb C}P$ and ${\cal M}_2{\mathbb C}G$.
\section{Matrices $X,Y,Z$ and Klein's group.}
\label{kleingr}
In this section we will introduce matrices $X,Y,Z$ depending on $\theta$ and consider partial cases $\theta = \pm 1$. In this case we will show that these matrices define representation of Klein's group.
Consider matrices $X$, $Y$ and $Z$ from the formula (\ref{xyz}).
Denote by $I$ the identity matrix.
It follows that ${\cal L}_{\theta} = a I + b X + c Y + d Z, a,b,c,d \in {\mathbb C}$ for any $\theta \in {\mathbb C}^*$. Moreover, $X,Y,Z$ satisfy (\ref {relations}).
These relations motivate us to interpret subspace ${\cal L}_{\theta}$ as an image of admissible $4$-dimensional representations of the group $G$.
One can see that if $\theta = 1$, then $X,Y,Z$ have the following view:
\begin{equation}
\begin{pmatrix}
0 & 1 & 0 & 0\\
1 & 0 & 0 & 0\\
0 & 0 & 0 & 1\\
0 & 0 & 1 &0
\end{pmatrix},
\begin{pmatrix}
0 & 0 & 1 & 0\\
0 & 0 & 0 & 1\\
1 & 0 & 0 & 0\\
0 & 1 & 0 & 0
\end{pmatrix},
\begin{pmatrix}
0 & 0 & 0 & 1\\
0 & 0 & 1 & 0\\
0 & 1 & 0 & 0\\
1 & 0 & 0 & 0
\end{pmatrix}
\end{equation}
respectively.
In this case our matrices are commuting. And hence, we have the following relations:
\begin{equation}
\label{commuti}
XY = YX, XZ = ZX, YZ = ZY, X^2 = Y^2 = Z^2 = 1.
\end{equation}
Also, one can check that
\begin{equation}
\label{xyz}
Z = XY.
\end{equation}
If we consider group with generators $x,y$ satisfying to relations (\ref{commuti}) and (\ref{xyz}), we get the well-known Klein's group $K_4$ of order 4 isomorphic to ${\mathbb Z}_2 \oplus {\mathbb Z}_2$, where first ${\mathbb Z}_2$ is generated by $x$, second one is generated by $y$.
Thus, in the case of $\theta = 1$ matrices $X,Y$ define representation $\phi$ of $K_4$ by rule: $\phi: x \mapsto X, y \mapsto Y$.
Recall that representation $\phi$ is a direct sum of irreducible ones. As for any abelian group, all irreducible representation of $K_4$ is 1-dimensional.
These one-dimensional representations (or characters) are elements of group ${\rm Hom}(K_4, {\mathbb C}^*)$, where ${\mathbb C}^*$ is an algebraic torus by the definition.
By Pontryagin's duality, group ${\rm Hom}(K_4, {\mathbb C}^*) \cong K_4$. Thus, we can describe characters in the following manner:
$$
\chi_1: x \mapsto 1, y \mapsto 1
$$
$$
\chi_x: x \mapsto -1, y \mapsto 1
$$
$$
\chi_y: x \mapsto 1, y \mapsto -1
$$
$$
\chi_{xy}: x \mapsto -1, y \mapsto -1
$$
One can check that representation $\phi$ is isomorphic to direct sum $\chi_1 \oplus \chi_x \oplus \chi_y \oplus \chi_{xy}$.
It means that there is a basis in which matrix $X$ and $Y$ are diagonal and matrices $X$ and $Y$ have eigenvalues $\chi_1(x),\chi_x(x),\chi_y(x),\chi_{xy}(x)$ and $\chi_1(y),\chi_x(y),\chi_y(y),\chi_{xy}(y)$ respectively.
Also, consider the case of $\theta = -1$.
One can check that if $\theta = -1$ matrices $X,Y,Z$ are commuting and $Z = -XY$. Of course, matrices $X, -Y$ as images of generators $x,y$ of $K_4$ define representation $\rho: x \mapsto X, y \mapsto -Y$ which is similar to the case $\theta =1$.
In the next sections we will generalize description of ${\cal L}_{\pm 1}$ to the case of arbitrary $\theta$ by means of representation theory methods.
\section{Some facts from group theory and description of the group $G$.}
In this section we will study group $G$ with generators $x,y,z$ and relations (\ref{relations}).
Firstly, recall the notion of a free group $F(S)$ with a set of
generators
$S$. Suppose that $S = \{s_1,...,s_k\}$.
Denote $J$ the set $S \cup S^{-1}$. Define {\it word} as a product of
elements of $J$. Word can be simplified by
omitting consequent symbols $s$ and $s^{-1}$. Word which cannot be
simplified is called {\it reduced}.
The set of reduced words equipped by the operation of concatenation of
words
is said to be a free group $F(S)$ of {\it rank $k$}. Finite generated group $G$ is a quotient of free group with arbitrary set of generators. We will say that group $H$ has {\it presentation} $H = \langle S | R \rangle$ where $S$ is a set of generators, $R$ is a set of relations. One can use the following description of $R$. Any relation we will rewrite in the view: $r = 1$, where $r \in F(S)$.
Group $H$ is a quotient $F(S)/N(R)$, where $N(R)$ is a {\it normal closure} in free group $F(S)$ of the set of relations $R$, i.e. minimal normal subgroup of $F(S)$ containing $R$. Of course, presentation of fixed group $H$ is not unique.
Recall the construction of free product of groups. Assume that we have two groups $H_1$, $H_2$ which have the following presentations: $H_1 = \langle S_1 | R_1 \rangle$ and $H_2 = \langle S_2 | R_2 \rangle$ with different sets of generators $S_1$ and $S_2$. Define free product $H_1 * H_2$ as group with presentation $\langle S_1 \cup S_2 | R_1 \cup R_2 \rangle$. One can show that notion of free product is well-defined. Analogously, one can define free product $H_1 * ... * H_k$ of the groups $H_1,...,H_k$.
Assume that $S = \{x,y,z\}$. One can consider group $G$ as quotient of $F(S)$. There are relations $x^2 = y^2 = z^2 = 1, xz=zx, yz=zy$. Rewrite these relations in the following manner: $x^2 = y^2 = z^2 = 1, xzx^{-1}z^{-1} = yzy^{-1}z^{-1} = 1$. Thus, $R = \{ x^2, y^2, z^2, xzx^{-1}z^{-1}, yzy^{-1}z^{-1} \}$.
Consider set of generators $S = \{x,y,z\}$, set of relations: $R_1 = \{ x^2,y^2,z^2 \} \subset R$, normal subgroup $N(R_1)$ and quotient $P = F(S)/N(R_1)$. The group $P$ has the following presentation: $P = \langle S | R_1 \rangle$. It is clear that
\begin{equation}
P = \langle x,y,z | x^2,y^2,z^2 \rangle = \langle x| x^2\rangle * \langle y| y^2\rangle * \langle z| z^2\rangle \cong {\mathbb Z}_2 * {\mathbb Z}_2 * {\mathbb Z}_2
\end{equation}
where ${\mathbb Z}_2$ is a cyclic group of order 2. In this way we get that group $G$ is a quotient of $P$ by the relations $xzx^{-1}z^{-1} = 1, yzy^{-1}z^{-1} = 1$.
Consider natural morphism: $\phi: {\mathbb Z}_2 * {\mathbb Z}_2 * {\mathbb Z}_2 \to {\mathbb Z}_2 \oplus {\mathbb Z}_2 \oplus {\mathbb Z}_2$.
Using results on subgroup of free product (independently Kurosh \cite{kurosh}, Baer and Levi \cite{baerlevi}, Takahasi \cite{takahasi}), we get that kernel of $\phi$ is a free group $F_5$ of rank 5. It will be convenient to choose generators of the ${\rm Ker}\phi = F_5$ as follows: $xyx^{-1}y^{-1}, xzx^{-1}z^{-1}, yzy^{-1}z^{-1}, xyzy^{-1}z^{-1}x^{-1}, yxzx^{-1}z^{-1}y^{-1}$. Of course, using relations $x^2 = y^2 = z^2 = 1$, we obtain that $xyx^{-1}y^{-1} = xyxy, xzx^{-1}z^{-1} = xzxz, yzy^{-1}z^{-1} = yzyz, xyzy^{-1}z^{-1}x^{-1} = xyzyzx, yxzx^{-1}z^{-1}y^{-1} = yxzxzy$.
One can show that group $G$ is a quotient of $P$ by the relations $R_2 = \{xzx^{-1}z^{-1} = xzxz = 1, yzy^{-1}z^{-1} = yzyz = 1\}$. Consider normal closure $N(R_2)$ in the group $P$ of the set of the elements $R_2$.
Consider quotient of ${\mathbb Z}_2 * {\mathbb Z}_2 * {\mathbb Z}_2$ by normal subgroup $N(R_2)$.
Let us prove the following fact:
\begin{Proposition}
We have the following exact sequence for non-abelian group $G$:
\begin{equation}
\label{longdiag}
\xymatrix{
0\ar[r] & {\mathbb Z}\ar[r] & G\ar[r] & {\mathbb Z}_2 \oplus {\mathbb Z}_2 \oplus {\mathbb Z}_2 \ar[r] & 1,
}
\end{equation}
where normal subgroup ${\mathbb Z}$ of the group $G$ is generated by element $xyxy$.
\end{Proposition}
\begin{proof}
We have the following exact sequence for free product ${\mathbb Z}_2 * {\mathbb Z}_2 * {\mathbb Z}_2$:
\begin{equation}
\xymatrix{
1 \ar[r] & F_5 \ar[r] & {\mathbb Z}_2 * {\mathbb Z}_2 * {\mathbb Z}_2 \ar[r] & {\mathbb Z}_2 \oplus {\mathbb Z}_2 \oplus {\mathbb Z}_2 \ar[r] & 1,
}
\end{equation}
As we know, free group $F_5$ is generated by $xyxy, xzxz, yzyz, xyzyzx, yxzxzy$. Group $N(R_2)$ is a normal closure of $xzxz, yzyz$. If $xzxz = 1$ and $yzyz = 1$ then $xyzyzx = 1$ and $yxzxzy = 1$. Denote by $a_1,...,a_5$ the generators $xyxy, xzxz, yzyz, xyzyzx, yxzxzy$ of $F_5$. Denote by $F'_5 = [F_5,F_5]$ commutant of $F_5$. Consider natural morphism $f: F_5 \to F_5/F'_5 = {\mathbb Z}^{\oplus 5}$. Denote by $a_i, i = 1,...,5$ the generators of ${\mathbb Z}^{\oplus 5}$ which are images of $xyxy, xzxz, yzyz, xyzyzx, yxzxzy$ under $f$ respectively. Also, we have projection ${\mathbb Z}^{\oplus 5} \to {\mathbb Z}$ defined by rule: $\sum k_i a_i \mapsto k_1 a_1$. Consider composition $F_5 \to {\mathbb Z}$. One can check that $N(R_2)$ is a kernel of this composition.
Moreover, we get the following commutative diagram:
\begin{equation}
\label{comdiagf}
\xymatrix{
0 \ar[r] & {\mathbb Z}\ar[r] & G\ar[r] & {\mathbb Z}_2 \oplus {\mathbb Z}_2 \oplus {\mathbb Z}_2 \ar[r] & 1\\
1 \ar[r] & F_5 \ar[r]\ar[u] & {\mathbb Z}_2 * {\mathbb Z}_2 * {\mathbb Z}_2 \ar[r]\ar[u] & {\mathbb Z}_2 \oplus {\mathbb Z}_2 \oplus {\mathbb Z}_2 \ar[r]\ar[u]^{\cong} & 1\\
1 \ar[r] & N(R_2)\ar[r]\ar[u] & N(R_2)\ar[r]\ar[u] & 1\ar[u]
}
\end{equation}
\end{proof}
Exact sequence (\ref{longdiag}) tells us that group $G$ is the extension of ${\mathbb Z}_2 \oplus {\mathbb Z}_2 \oplus {\mathbb Z}_2$ by ${\mathbb Z}$. Automorphism group ${\rm Aut}({\mathbb Z}) \cong {\mathbb Z}_2$, i.e. there are only two automorphisms of ${\mathbb Z}$: trivial and morphism defined by correspondence: $n \mapsto -n, n \in {\mathbb Z}$. It is clear that we have a well-defined action of ${\mathbb Z}_2 \oplus {\mathbb Z}_2 \oplus {\mathbb Z}_2$ on ${\mathbb Z}$ by conjugation. This action defines homomorphism of groups: ${\mathbb Z}_2 \oplus {\mathbb Z}_2 \oplus {\mathbb Z}_2 \to {\rm Aut}({\mathbb Z}) = {\mathbb Z}_2$. One can calculate that kernel of this morphism is a subgroup ${\mathbb Z}_2 \oplus {\mathbb Z}_2$ generated by images of $xy$ and $z$ under natural morphism $G \to {\mathbb Z}_2 \oplus {\mathbb Z}_2 \oplus {\mathbb Z}_2$. Denote by $P$ subgroup of $G$ generated by $xy$ and $z$.
We have the following commutative diagram:
\begin{equation}
\xymatrix{
&& {\mathbb Z}_2 \ar[r]^{=} & {\mathbb Z}_2\ar[r] & 1\\
0 \ar[r] & {\mathbb Z}\ar[r] & G \ar[r]\ar[u] & {\mathbb Z}_2 \oplus {\mathbb Z}_2 \oplus {\mathbb Z}_2 \ar[r]\ar[u] & 1\\
0 \ar[r] & {\mathbb Z}\ar[r]\ar[u]^{=} & P \ar[r]\ar[u] & {\mathbb Z}_2 \oplus {\mathbb Z}_2 \ar[r]\ar[u] & 1
}
\end{equation}
It follows that group $P$ is abelian. Also, one can show that $P \cong {\mathbb Z} \oplus {\mathbb Z}_2$.
Recall the notion of {\it semidirect} product. Consider group $H$. Assume that there are normal subgroup $N_1$ and subgroup $H_1$ of $H$. Also, assume that composition of embedding $H_1 \hookrightarrow H$ and projection $H \to H/N_1$ is an isomorphism $H_1 \cong H/N_1$. In this case, we will say that $H$ is a semidirect product of $N_1$ and $H_1$. We will denote by $N_1 \rtimes H_1$ the semidirect product of $N_1$ and $H_1$. Equivalently, assume that there is an exact sequence:
\begin{equation}
\label{semi}
\xymatrix{
1 \ar[r] & N_1 \ar[r] & H \ar[r] & H/N_1 \ar[r] & 1.
}
\end{equation}
$H$ is a semidirect product of $N_1$ and $H_1$ iff sequence (\ref{semi}) is split, i.e. there is a section $H/N_1 \to H$ of the natural morphism
$H \to H/N_1$. Also, one can say that there is a subgroup $H_1$ such that $H_1 \cong H/N_1$ and $H_1 \cap N_1 = \{1\}$.
\begin{Proposition}
Group $G$ is a semidirect product $({\mathbb Z} \oplus {\mathbb Z}_2) \rtimes {\mathbb Z}_2$.
\end{Proposition}
\begin{proof}
We have the following exact sequence:
\begin{equation}
\xymatrix{
0 \ar[r] & P = {\mathbb Z} \oplus {\mathbb Z}_2\ar[r] & G\ar[r] & {\mathbb Z}_2 \ar[r] & 1
}
\end{equation}
Recall that subgroup $P = {\mathbb Z} \oplus {\mathbb Z}_2$ is generated by $xy$ and $z$.
This sequence has section ${\mathbb Z}_2 \to G$ defined by element $x$. Therefore, $G$ is a semidirect product $({\mathbb Z} \oplus {\mathbb Z}_2) \rtimes {\mathbb Z}_2$.
\end{proof}
\section{Center of group algebra ${\mathbb C}G$.}
\label{cent}
Let us pick up generators of group $G = ({\mathbb Z} \oplus {\mathbb Z}_2) \rtimes {\mathbb Z}_2$ as follows: $g = xy$, $x$ and $z$. Elements $g,x,z$ are generators because we have the identity: $y = xg$. Element $g$ has infinite order. In this case group $P = {\mathbb Z} \oplus {\mathbb Z}_2$ is generated by $g$ and $z$. We will use multiplicative description of $\mathbb Z$. Thus, we have the following relations: $x^2 = z^2 = 1, xz = zx, zg = gz, xgx = g^{-1}$.
In this section we will study representation theory of group $G$.
Since group $P$ is a subgroup of index 2 in the group $G$, we can formulate the following useful fact:
\begin{Proposition}
Any element $w \in G$ can be uniquely written as follows: $w = g'$ or $w = g'x$ for arbitrary element $g' \in P$.
\end{Proposition}
Recall the notion of free $A$-module for arbitrary algebra $A$. $A$-module $M$ is a free $A$-module of rank $n$ iff $M$ is isomorphic to direct sum of $n$ copies of $A$: $M \cong \oplus^n_{i=1}A$.
\begin{Corollary}
Group algebra ${\mathbb C}G$ is a free ${\mathbb C}P$ - module of rank 2.
\end{Corollary}
\begin{proof}
Using decomposition $G = P \cup Px$, we get the decomposition of ${\mathbb C}P$-module ${\mathbb C}G$ into direct sum ${\mathbb C}P \oplus {\mathbb C}P$. Also, we can choose element $1,x \in G$ as generators of these free ${\mathbb C}P$-modules.
\end{proof}
Group algebra ${\mathbb C}P$ is an extended algebra of Laurent's polynomials ${\mathbb C}[g,g^{-1},z; z^2 = 1]$.
Consider center $\cal C$ of group algebra ${\mathbb C}G$. Center ${\cal C}$ is a subalgebra of ${\mathbb C}P$ containing elements commuting with $x$.
Equivalently, element $c \in {\cal C}$ iff $xcx^{-1} = xcx = c$.
As we know, we have well-defined action of $G$ on $P$ by conjugation. Therefore, we have involution $c_x$ defined by rule:
\begin{equation}
\label{invcx}
c_x: (g,z) \mapsto (xgx^{-1},xzx^{-1}) = (xgx, xzx) = (g^{-1},z).
\end{equation}
Using this involution, we get that ${\cal C}$ is a subalgebra of ${\mathbb C}G$ consisting of $c_x$ - invariant elements.
It can be shown that $\cal C$ is a subalgebra of ${\mathbb C}P$ generated by $g + g^{-1}$ and $z$. Thus,
\begin{equation}\label{dop}
{\cal C} \cong {\mathbb C}[u = g+g^{-1}] \otimes {\mathbb C}[z, z^2 = 1].
\end{equation}
Consider ${\mathbb C}P$ as ${\cal C}$ - module. Prove the following useful fact.
\begin{Proposition}
\label{freemod}
${\mathbb C}P$ is a free ${\cal C}$ - module of rank 2.
\end{Proposition}
\begin{proof}
It is sufficient to prove that ${\mathbb C}[g,g^{-1}]$ is a free ${\cal C}$-module of rank 2.
For this purpose, consider fixed polynomial $f(g) \in {\mathbb C}[g,g^{-1}]$. Prove that there are uniquely determined elements $z_1, z_2 \in {\cal C}$ such that
\begin{equation}
f(g) = z_1 + gz_2.
\end{equation}
Multiply this identity by $x \in G$ from both sides.
We get the following identity:
\begin{equation}
xf(g)x = f(g^{-1}) = z_1 + g^{-1}z_2
\end{equation}
Thus, we get that
\begin{equation}
f(g) - f(g^{-1}) = (g-g^{-1})z_2.
\end{equation}
It follows that $z_2 = \frac{f(g) - f(g^{-1})}{g - g^{-1}} \in {\cal C}$ is a Laurent's polynomial over $g$.
Also, $z_1 = f(g) - gz_2$. Therefore, elements $z_1$ and $z_2$ are uniquely determined by $f(g)$ and, hence, ${\mathbb C}P$ is a free $\cal C$ - module of rank 2.
\end{proof}
\begin{Corollary}
\label{dimalg}
Algebra ${\mathbb C}G$ is a free ${\cal C}$ - module of rank 4.
\end{Corollary}
Remind the following useful notion of tensor product of modules over algebra. Let $V_1$ and $V_2$ be right and left $A$-module respectively for some algebra $A$. Denote by $V_1 \otimes_A V_2$ the quotient of $V_1 \otimes V_2$ by relations $v_1 a \otimes v_2 - v_1 \otimes a v_2$ for any $v_1 \in V_1, v_2 \in V_2, a \in A$. If $V_1$ has structure of left $A$ - module, then $V_1 \otimes_A V_2$ is $A$-module.
For fixed algebra and its representation, the space of representation is a module. If representation is irreducible, then we will say that corresponding module is irreducible. Further, let us study irreducible ${\mathbb C}G$ - modules.
Since $\cal C$ is a commutative algebra, we can consider ${\mathbb C}G$ as algebra over ${\cal C}$. Fix character $\chi \in {\rm Spec}{\cal C}$. Denote ${\cal C}$-module corresponding to $\chi$ by ${\mathbb C}^{\chi}$. It can be shown that ${\mathbb C}G \otimes_{\cal C} {\mathbb C}^{\chi}$ is an algebra over $\mathbb C$. One can check that algebra ${\mathbb C}G \otimes_{\cal C} {\mathbb C}^{\chi}$ is a quotient of ${\mathbb C}G$ by relations $z - \chi(z)\cdot 1$.
By Schur's lemma, for any central element $c \in {\cal C}$ and any irreducible representation $\rho$ of algebra ${\mathbb C}G$ matrix
$\rho(c)$ is scalar, i.e. $\rho(c) = \chi(c)1$ for some character $\chi$ of ${\cal C}$.
Thus, we get that any irreducible ${\mathbb C}G$ - module correspond to some character of ${\cal C}$. Set of characters of ${\cal C}$ is a variety ${\rm Spec} {\cal C} = {\rm Hom}_{alg}({\cal C}, {\mathbb C})$. This variety is called {\it variety of characters} of the algebra ${\cal C}$.
Let us give some description of characters of ${\cal C}$.
Any $f \in {\rm Hom}_{alg}({\cal C}, {\mathbb C})$ is defined by pair of values $f(u) = f(g+g^{-1})$ and $f(z)$. One can show that $f(u) \in {\mathbb C}$ and because of $z^2 = 1$ we get that $f(z) = \pm 1$.
Thus, ${\rm Spec} {\cal C}$ has two components. Each of them is an affine line ${\mathbb C}^1$. Denote these components by ${\mathbb C}^1_{-}$ and ${\mathbb C}^1_{+}$ corresponding to values $f(z) = -1$ and $f(z) = 1$ respectively.
All irreducible ${\mathbb C}G$-modules correspond to fixed character $\chi$ are representations of ${\mathbb C}G \otimes_{\cal C} {\mathbb C}^{\chi}$. Thus, we have to study algebra ${\mathbb C}G \otimes_{\cal C} {\mathbb C}^{\chi}$ for description of irreducible ${\mathbb C}G$ - modules.
For studying of algebra ${\mathbb C}G \otimes_{\cal C} {\mathbb C}^{\chi}$, let us remind that Jacobson radical (or radical) of the algebra $A$ is an intersection of maximal right ideals of $A$. Equivalent formulation: Jacobson radical consists of all elements annihilated by all simple left $A$-modules. Also, note that for finite-dimensional algebras we have the following description: Jacobson radical is a maximal nilpotent ideal.
\begin{Proposition}
\label{algirr}
If $\chi(u) = \chi(g+g^{-1}) \ne \pm 2$, then algebra ${\mathbb C}G \otimes_{\cal C} {\mathbb C}^{\chi}$ is isomorphic to ${\rm Mat}_2({\mathbb C})$. If $\chi(u) = \chi(g+g^{-1}) = \pm 2$, then algebra ${\mathbb C}G \otimes_{\cal C} {\mathbb C}^{\chi}$ has 2-dimensional radical.
\end{Proposition}
\begin{proof}
Using corollary \ref{dimalg}, we get that ${\rm dim}_{\mathbb C}{\mathbb C}G \otimes_{\cal C} {\mathbb C}^{\chi} = 4$. It can be shown that this algebra has the following basis: $1,x,g,xg$. There are relations: $x^2 = 1, g+g^{-1} = \chi(u)1, xgx = g^{-1}, \chi(u) \in {\mathbb C}$. Denote by $t$ the root of equation: $t+t^{-1} = \chi(u)$. We have the following morphism: $F: {\mathbb C}G \otimes_{\cal C} {\mathbb C}^{\chi} \to {\rm Mat}_2({\mathbb C})$ defined by rule:
\begin{equation}
F: x \mapsto
\begin{pmatrix}
0 & 1\\
1 & 0
\end{pmatrix}
,
g \mapsto
\begin{pmatrix}
t & 0\\
0 & t^{-1}
\end{pmatrix}
\end{equation}
One can check that if $\chi(u) \ne \pm 2$, then $F$ is an isomorphism. If $\chi(u) = 2$, then $g+g^{-1} = 2$ and, hence, $(g-1)^2 = 0$. Consider two-sided ideal $J$ of ${\mathbb C}G \otimes_{\cal C} {\mathbb C}^{\chi}$ generated by $g-1$. It can be shown that $J$ has a basis $x(g-1), g-1$ over ${\mathbb C}$. Also, consider $J^2 = \langle j_1 \cdot j_2| j_1, j_2 \in J \rangle$. One can check that $J^2 = 0$. Thus, ${\rm dim}_{\mathbb C}J = 2$. Note that element $x$ and $1$ are not in Jacobson radical, because these element are not nilpotent. Thus, $J$ is a maximal nilpotent ideal of ${\mathbb C}G \otimes_{\cal C} {\mathbb C}^{\chi}$. Therefore, $J$ is a Jacobson radical.
\end{proof}
\begin{Corollary}
\label{irr}
Dimension of irreducible representation of group $G$ is less or equal to 2.
\end{Corollary}
\begin{proof}
Irreducible representations of ${\mathbb C}G$ are irreducible representations of ${\mathbb C}G \otimes_{\cal C} {\mathbb C}^{\chi}$ for some $\chi \in {\rm Spec}{\cal C}$. Using proposition \ref{algirr}, we get that irreducible representations of ${\mathbb C}G \otimes_{\cal C} {\mathbb C}^{\chi}$ is two-dimensional if $\chi(u) \ne \pm 2$. If $\chi(u) = \pm 2$, then irreducible representations of ${\mathbb C}G$ are one-dimensional.
\end{proof}
\section{Description and properties of irreducible ${\mathbb C}G$ - modules.}
In this section we will describe irreducible ${\mathbb C}G$ - modules in terms of ${\mathbb C}P$ - modules.
Assume that $V$ is an irreducible ${\mathbb C}G$ - module. It follows from Corrolary \ref{irr} that ${\rm dim}_{\mathbb C}V \le 2$. Also, recall that algebra
${\mathbb C}P$ is an extended algebra of Laurent polynomials: ${\mathbb C}[g^{\pm 1}] \otimes {\mathbb C}[z, z^2 = 1]$.
Consider variety ${\rm Spec} {\mathbb C}P = {\rm Hom}_{alg}({\mathbb C}[g^{\pm 1}] \otimes {\mathbb C}[z, z^2 = 1],{\mathbb C})$. Then, $\chi(z) = \pm 1$ for any $\chi \in {\rm Spec} {\mathbb C}P$.
Thus, variety ${\rm Spec} {\mathbb C}P$ has two components, each of them is an one-dimensional algebraic torus ${\mathbb C}^*$. Components correspond to $\chi(z) = \pm 1$. We will denote these components by ${\mathbb C}^*_{-}$ and ${\mathbb C}^*_{+}$.
We have the following description of $\chi \in {\rm Spec} {\mathbb C}P$: $\chi(g,z) = (\chi(g) = a, \chi(z) = \pm 1) \in {\mathbb C}^* \times \{{\pm 1}\}$. Remind that ${\cal C}$ is an algebra of invariants of ${\mathbb C}P$ under action of involution $c_x$ defined by rule (\ref{invcx}). Also, with action of $c_x$ on ${\mathbb C}P$, we have induced action of $c_x$ on ${\rm Spec}{\mathbb C}P$. For character $\chi \in {\rm Spec}{\mathbb C}P$, we have the following identity: $c_x(\chi)(g) = \chi(xgx) = \chi(g^{-1}) = \chi^{-1}(g)$, i.e. $c_x(\chi) = \chi^{-1}$.
We have the following surjective morphism of varieties:
\begin{equation}
pr:{\rm Spec}{\mathbb C}P \to {\rm Spec}{\cal C}
\end{equation}
defined by rule:
$pr:(a, 1) \mapsto (a+a^{-1}, 1)$ and $pr:(a, -1) \mapsto (a+a^{-1}, -1)$. One can check that involution $c_x$ acts on the fibers of the morphism $pr$.
Also, one can say that variety ${\rm Spec}{\cal C}$ is a quotient of ${\rm Spec}{\mathbb C}P$ by involution $c_x$. Recall that ${\rm Spec}{\mathbb C}P$ and ${\rm Spec}{\cal C}$ are disjoint unions ${\mathbb C}^*_{-} \cup {\mathbb C}^*_{+}$ and ${\mathbb C}^1_{-} \cup {\mathbb C}^1_{+}$ respectively. Components ${\mathbb C}^*_{\pm}$ and ${\mathbb C}^1_{\pm}$ correspond to different values of $\chi(z) = \pm 1$. Morphism $pr$ decomposes into $pr: {\mathbb C}^*_{-} \to {\mathbb C}^1_{-}$ and $pr: {\mathbb C}^*_{+} \to {\mathbb C}^1_{+}$.
Consider ideal $I$ of ${\mathbb C}P$ generated by elements $(g - \chi(g) \cdot 1)^k$ and $z - \chi(z) \cdot 1$.
Denote by ${\mathbb C}^{\chi}(k)$ the quotient of ${\mathbb C}P$-module ${\mathbb C}P/I$. It follows that ${\mathbb C}^{\chi} = {\mathbb C}^{\chi}(1)$.
Consider finite-dimensional ${\mathbb C}G$ - module $V$. Denote by $V_{\chi}(k)$ the following subspace of $V$:
\begin{equation}
V_{\chi}(k) = \{v \in V| (g - \chi(g)\cdot 1)^k v = 0, (z - \chi(z)\cdot 1) v = 0\}
\end{equation}
It follows that $V_{\chi}(k) \subseteq V_{\chi}(k+1)$ for any integer k. Also, note that if $V_{\chi}(1) = 0$ then $V_{\chi}(k) = 0$ for any $k$.
Actually, if we consider restriction of $g$ on $V_{\chi}(k)$, then this restriction has eigenvector. Thus, if $V_{\chi}(k) \ne 0$ then $V_{\chi}(1) \ne 0$.
Since $V$ is finite-dimensional, we get that there is a minimal $k_0$ such that $V_{\chi}(k_0) = V_{\chi}(m)$ for $m \ge k_0$. Denote by ${\rm Char}(V)$ the set of characters $\chi \in {\rm Spec}{\mathbb C}P$ such that $V_{\chi}(1) \ne 0$.
We have the following famous fact:
\begin{Proposition}
\begin{itemize}
\item{
Consider ${\mathbb C}P$-module $V$ such that ${\rm Char}(V) = \{\chi\}$. Then there is a decomposition
\begin{equation}
V = {\mathbb C}^{\chi}(k_1) \oplus ... \oplus {\mathbb C}^{\chi}(k_{q}).
\end{equation}
for arbitrary integers $k_1,...,k_q$.
}
\item{
Consider finite-dimensional ${\mathbb C}P$ - module $W$. There are ${\mathbb C}P$-modules $V_1,...,V_s$ and characters $\chi_1,...,\chi_s$ such that
\begin{equation}
W \cong V_1 \oplus ... \oplus V_s
\end{equation}
and ${\rm Char}V_i = \{\chi_i\}, i = 1,...,s$.
}
\end{itemize}
\end{Proposition}
\begin{Proposition}
\label{symmiv}
Consider finite-dimensional ${\mathbb C}G$ - module $V$. We have the following identity:
$$
{\rm dim}_{\mathbb C}V_{\chi}(k) = {\rm dim}_{\mathbb C}V_{c_x(\chi)}(k)
$$
for any $k$. In particular, $\chi \in {\rm Char}(V)$ iff $x(\chi) = \chi^{-1} \in {\rm Char}(V)$ and ${\rm Char}({\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi}) = (\chi, \chi^{-1})$
\end{Proposition}
\begin{proof}
Assume that $v \in V_{\chi}(k)$. Consider vector $xv$. We have the following identities:
\begin{equation}
x(g - \chi(g)\cdot 1)^k v = (g^{-1} - \chi(g) \cdot 1)^k xv = (-1)^kg^{-k}(g - \chi^{-1}(g)\cdot 1)^k xv = 0
\end{equation}
Thus, $x (V_{\chi}(k)) = V_{c_x(\chi)}(k)$.
One can check that ${\rm Char}({\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi}) = (\chi, \chi^{-1})$. In fact, assume that $v \in {\mathbb C}^{\chi}$ such that $g v = \chi(g) v$. Thus, we can choose the following basis of ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi}$: $1 \otimes v$ and $x \otimes v$. And one can check that $V_{\chi}$ and $V_{c_x(\chi)}$ are one-dimensional spaces ${\mathbb C}(1 \otimes v)$ and ${\mathbb C}(x \otimes v)$ respectively.
\end{proof}
\begin{Corollary}
\label{isomor}
We have the following isomorphism: ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{x(\chi)} \cong {\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi}$. Also, ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi}$ as ${\mathbb C}P$-module is isomorphic to direct sum ${\mathbb C}^{\chi} \oplus {\mathbb C}^{c_x(\chi)}$.
\end{Corollary}
Thus, we can deduce the following
\begin{Corollary}
Consider irreducible ${\mathbb C}G$ - module $V$. Assume that $\chi \in {\rm Char}(V)$ and $\chi(g) \ne \pm 1$. Then ${\mathbb C}G$ - module $V$ is isomorphic to ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi}$.
\end{Corollary}
\begin{proof}
Firstly, consider $V = {\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi}$.
Assume that $W \subseteq V$ is a ${\mathbb C}G$ - submodule.
Consider ${\rm Char}(W)$. Clearly, ${\rm Char}(W) \subseteq {\rm Char}(V)$. Since $\chi(g) \ne \pm 1$, then $c_x(\chi)(g) \ne \chi(g)$, i.e. $c_x(\chi) = \chi^{-1} \ne \chi$.
Using proposition \ref{symmiv}, we get that ${\rm Char}(W) = {\rm Char}(V)$ and, hence, ${\rm dim}_{\mathbb C}W = 2$. Thus, $W = V$.
Conversely, let $V$ be irreducible ${\mathbb C}G$ - module. As we know from corollary \ref{irr}, ${\rm dim}_{\mathbb C}V \le 2$. If $\chi(g) \ne \pm 1$, then $\chi^{-1} \ne \chi$ and ${\rm Char}(V) = (\chi, \chi^{-1})$. Thus, ${\rm dim}_{\mathbb C}V = 2$. Let $v$ be a vector such that $g v = \chi(g) v$. One can show that $v$ and $xv$ generate ${\mathbb C}G$ - submodule isomorphic to ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi}$.
Using irreducibility of $V$, we get the required.
\end{proof}
Consider the case $\chi(g) = \pm 1$. We can prove the following corollary:
\begin{Corollary}
\label{cpmf}
Assume that $\chi(g) = \pm 1$. In this case ${\mathbb C}G$ - module $V = {\mathbb C}G \otimes_{{\mathbb C}P}{\mathbb C}^{\chi}$ is a direct sum of one dimensional
modules: ${\mathbb C}^{\chi}_{1} \oplus {\mathbb C}^{\chi}_{-1}$, where ${\mathbb C}^{\chi}_{1}$ and ${\mathbb C}^{\chi}_{-1}$ are subspaces generated by eigenvector of $x$ corresponding to eigenvalues $1$ and $-1$ respectively.
\end{Corollary}
\begin{proof}
In the case $\chi(g) = \pm 1$, group $P$ acts on $V$ by scalar matrices, and hence, any subspace is invariant under action of $P$. Space $V$ has the following basis $1 \otimes v$, $x \otimes v$, where $v$ is a basis of one-dimensional ${\mathbb C}P$ - module ${\mathbb C}^{\chi}$. One can show that ${\mathbb C}^{\chi}_1$ and ${\mathbb C}^{\chi}_{-1}$ are one-dimensional subspaces generated by $1 \otimes v + x \otimes v$ and $1 \otimes v - x \otimes v$ respectively.
Actually, $x(1 \otimes v + x \otimes v) = x(1+x) \otimes v = (x+x^2) \otimes v = (1+x) \otimes v$ and $x(1 \otimes v - x \otimes v) = x(1-x) \otimes v = -(1-x)\otimes v$.
\end{proof}
\section{Space ${\cal L}_{\theta}$, representations of $P$ and deformations of Klein group.}
Let us come back to subspace ${\cal L}_{\theta} \subset M_4({\mathbb C})$ generated by matrices $X,Y,Z$.
\begin{Proposition}
\label{theor}
\begin{itemize}
\item{
For fixed $\theta \in {\mathbb C}^*, \theta \ne \pm 1$ representation $\phi$ of group $G = ({\mathbb Z} \oplus {\mathbb Z}_2) \rtimes {\mathbb Z}_2 = P \rtimes {\mathbb Z}_2$ defined by matrices $X,Y,Z$ is isomorphic to ${\mathbb C}G \otimes_{{\mathbb C}P}{\mathbb C}^{\chi_1} \oplus {\mathbb C}G \otimes_{{\mathbb C}P}{\mathbb C}^{\chi_2}$, where $\chi_1 = (\chi_1(g) = \theta, \chi(z) = 1)$ and $\chi_2 = (\chi_2(g) = -\theta, \chi_2(z) = -1)$.
}
\item{
In the case $\theta = \pm 1$ matrices $X,Y,Z$ define representation of $G$: ${\mathbb C}^{\chi_1}_{1} \oplus {\mathbb C}^{\chi_1}_{-1} \oplus {\mathbb C}^{\chi_2}_{1} \oplus {\mathbb C}^{\chi_2}_{-1}$, where $\chi_1 = (\chi_1(g) = \theta, \chi(z) = 1)$ and $\chi_2 = (\chi_2(g) = -\theta, \chi_2(z) = -1)$.
}
\end{itemize}
\end{Proposition}
\begin{proof}
Using described early technics, representation of ${\mathbb C}G$ is given by representation of ${\mathbb C}P$. Consider matrices $XY$ and $Z$.
\begin{equation}
XY =
\begin{pmatrix}
0 & 0 & 0 & 1/\theta\\
0 & 0 & \theta & 0\\
0 & \theta & 0 & 0\\
1/\theta & 0 & 0 & 0
\end{pmatrix},
Z =
\begin{pmatrix}
0 & 0 & 0 & 1\\
0 & 0 & 1 & 0\\
0 & 1 & 0 & 0\\
1 & 0 & 0 & 0
\end{pmatrix}
\end{equation}
One can show that there is a basis in which matrix $XY$ and $Z$ have the following view:
\begin{equation}
XY =
\begin{pmatrix}
1/\theta & 0 & 0 & 0\\
0 & \theta & 0 & 0\\
0 & 0 & -1/\theta & 0\\
0 & 0 & 0 & -\theta
\end{pmatrix},
Z =
\begin{pmatrix}
1 & 0 & 0 & 0\\
0 & 1 & 0 & 0\\
0 & 0 & -1 & 0\\
0 & 0 & 0 & -1
\end{pmatrix}
\end{equation}
Let $V$ be a 4-dimensional ${\mathbb C}G$ - module given by matrices $X,Y,Z$.
If $\theta \ne \pm 1$, then we have two irreducible submodules ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi_1}$ and ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi_2}$ of $M$, where $\chi_1 = (\chi_1(g) = \theta, \chi_1(z) = 1)$ and $\chi_2 = (\chi_2(g) = -\theta, \chi_2(z) = -1)$.
Therefore, we have the following commutative diagram:
\begin{equation}
\xymatrix{
0 \ar[r] & {\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi_1} \ar[r] & V \ar[r] & W \ar[r] & 0\\
& & {\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi_2}\ar[u]
}
\end{equation}
Since ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi_1}$ and ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi_2}$ are not isomorphic and irreducible, then composition ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi_2} \to V \to W$ is an immersion. Also, note that ${\rm dim}_{\mathbb C}W = {\rm dim}_{\mathbb C}{\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi_2} = 2$. Thus, ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi_2} \cong W$. Thus, ${\mathbb C}G$-module $V$ is a direct sum ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi_1} \oplus {\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi_2}$.
As we know from section \ref{kleingr} if $\theta = \pm 1$, then representation $\phi$ defines regular representation of Klein group.
\end{proof}
For further studying of representations of $G$ from proposition, consider ${\mathbb C}G$ - module $V$ corresponding to representation of $G$ given by matrices $X,Y,Z$. Using theorem, we get that ${\rm Char}(V) = \{ (\chi(g) = \theta, \chi(z) = 1), (\chi(g) = 1/\theta, \chi(z) = 1), (\chi(g) = -\theta, \chi(z) = -1), (\chi(g) = -1/\theta, \chi(z) = -1)\}$. One can define the automorphism $s$ of group algebra (not group!) ${\mathbb C}P$ defined by formula:
\begin{equation}
g \mapsto -g, z \mapsto -z.
\end{equation}
Also, we have the involution $c_x: (g,z) \mapsto (g^{-1},z)$ defined early.
One can check that automorphisms $s$ and $c_x$ commute. Thus, we have an action of ${\mathbb Z}_2 \times {\mathbb Z}_2$ on group algebra ${\mathbb C}P$.
Consider algebra of invariants ${\mathbb C}P^{{\mathbb Z}_2 \times {\mathbb Z}_2} = \{ a \in {\mathbb C}P| c_x(a) = a, s(a) = a\}$.
\begin{Proposition}
Algebra of invariants ${\mathbb C}P^{{\mathbb Z}_2 \times {\mathbb Z}_2}$ is generated by elements $v = (g+g^{-1})z$. Also, ${\mathbb C}P$ is a free ${\mathbb C}P^{{\mathbb Z}_2 \times {\mathbb Z}_2}$ - module of rank 4.
\end{Proposition}
\begin{proof}
It can be shown that ${\mathbb C}P^{{\mathbb Z}_2 \times {\mathbb Z}_2} = {\cal C}^{s} = \{p \in {\cal C}| s(p) = p\}$. Recall that ${\cal C}$ is a quotient of ${\mathbb C}[u,z]$ by relation $z^2 = 1$.
It is easy that relation $z^2 = 1$ is $s$-invariant. Thus, ${\cal C}^{s}$ is a quotient of ${\mathbb C}[u,z]^{s} = \{p(u,z) = p(-u,-z)\}$ by relation $z^2 = 1$. It can be calculated that ${\mathbb C}[u,z]^{s} = {\mathbb C}[v_1 = u^2,v = uz,v_3 = z^2, v_1v_3 = v^2_2]$. Using relation $z^2 = 1$, we get that ${\cal C}^{s} = {\mathbb C}[v_1, v, v_1 = v^2]$.
Analogous to proposition \ref{freemod}, one can prove that ${\mathbb C}P$ is a free ${\mathbb C}P^{{\mathbb Z}_2 \times {\mathbb Z}_2}$ - module of rank 4.
\end{proof}
\begin{Corollary}
\label{freeeight}
${\mathbb C}G$ is a free ${\mathbb C}[v]$ - module of rank 8.
\end{Corollary}
Fix character $\chi$ of ${\cal C}^s$. Denote by $b$ the value $\chi(v)$. Denote by ${\mathbb C}^{\chi}$ the ${\mathbb C}[v]$ - module corresponding to $\chi$. Also, we can consider the following algebra
${\cal A}_{\theta} = {\mathbb C}G \otimes_{{\cal C}^s} {\mathbb C}^{\chi}$. For fixed $b \in {\mathbb C}$ algebra ${\cal A}_{\theta}$ is a quotient of ${\mathbb C}G$ by relation:
\begin{equation}
\label{relab}
(g+g^{-1})z = b\cdot 1,
\end{equation}
here $b = \chi(z(g+g^{-1})) = \theta+\theta^{-1}$.
Consider representation $\phi$ of $G$. We have the following commutative diagram:
\begin{equation}
\xymatrix{{\mathbb C}G \ar[rr]^{\phi}\ar[rd] && Mat_4({\mathbb C})\\
& {\cal A}_{\theta} \ar[ru]
}
\end{equation}
It means that for any $\theta \in {\mathbb C}^*$ matrix $\phi(g+g^{-1})z = (XY + YX)Z$ is $(\theta + \theta^{-1})I$, where $I$ is an identity matrix.
Let us prove the following
\begin{Theorem}\label{theorem}
For fixed $\theta \in {\mathbb C}^*$ ${\rm dim}_{\mathbb C}{\cal A}_{\theta} = 8$.
\begin{itemize}
\item{
If $b=\theta + \theta^{-1} \ne 0$ then algebra ${\cal A}_{\theta}$ has the following basis $1,g,g^2,g^3,x,xg,xg^2,xg^3$ and the relations:
\begin{equation}
x^2 = 1, g^4 + (2-b^2)g^2 + 1 = 0, xgx = g^{-1} = (b^2 - 2)g - g^3, b = \theta+\theta^{-1}.
\end{equation}
Also, we have canonical isomorphism: ${\cal A}_{\theta} \cong {\cal A}_{-\theta}$ for any $\theta \in {\mathbb C}, \theta \ne \pm {\rm i}$.
}
\item{
If $b=\theta+\theta^{-1} = 0$, then ${\cal A}_{\pm {\rm i}}$ has the following basis $1,g,x,z,xg,xz,gz,xgz$ and the relations:
\begin{equation}
x^2 = z^2 = 1, g^2 = -1, xgx = g^{-1}, xz = zx, gz = zg
\end{equation}
}
\end{itemize}
Also, we have the following description of algebra ${\cal A}_{\theta}$ for various ${\theta} \in {\mathbb C}^*$:
\begin{itemize}
\item{
If $\theta \ne \pm 1$, then ${\cal A}_{\theta} \cong {\rm Mat}_2({\mathbb C}) \oplus {\rm Mat}_2({\mathbb C})$.
}
\item{
If $\theta = \pm 1$, then algebra ${\cal A}_{\pm 1}$ has 4-dimensional Jacobson radical $J$ and ${\cal A}_{\pm 1}/J = \bigoplus^{4}_{i=1}{\mathbb C}$.
}
\end{itemize}
\end{Theorem}
\begin{proof}
Using corollary \ref{freeeight}, we get that for fixed $\theta \in {\mathbb C}$ algebra ${\cal A}_{\theta}$ has dimension 8. Using relation $(g+g^{-1})z = b \cdot 1$, we get that $g+g^{-1} = b \cdot z$. If $b =\ne 0$, then $z = \frac{1}{b}(g + g^{-1})$. Also, $b^2 \cdot z^2 = b^2 \cdot 1 = (g + g^{-1})^2$. Thus, we can express $z$ in terms of $g$ and since ${\rm dim}_{\mathbb C}{\cal A}_{\theta} = 8$, we obtain that ${\cal A}_{\theta }$ has the required basis and the relations.
If $b= 0$, then $(g+g^{-1})z = 0$. Since $z^2 = 1$, we get that $g + g^{-1} = 0$. Also, we get that algebra ${\cal A}_{\pm {\rm i}}$ has the required basis and the relations.
Existence of canonical isomorphism is trivial.
For studying algebra ${\cal A}_{\theta}$, we have to study center of algebra ${\cal A}_{\theta}$. If $b \ne 0$ then this center has basis $1, g+g^{-1}$ with relation $(g+g^{-1})^2 = b^2 \cdot 1$. Further, center has two characters $g+g^{-1} \mapsto b = \theta+\theta^{-1}$ and $g+g^{-1} \mapsto -b = -(\theta+\theta^{-1})$.
If $\theta = \pm {\rm i}$, then center has a basis $1,z$ and relation $z^2 = 1$. Thus, there are two characters of center. Analogous to proposition \ref{algirr}, one can show that if $\theta \ne \pm 1$ algebra ${\cal A}_{\theta}$ is a direct sum of matrix algebras.
Using canonical isomorphism ${\cal A}_{\theta}$ and ${\cal A}_{-\theta}$, we get that it is sufficient to consider the case of algebra ${\cal A}_1$.
Using proposition \ref{algirr}, we get that if $\theta = 1$, algebras ${\cal A}_{1}$ has 4-dimensional Jacobson radical. Actually, in this case $(g^2 - 1)^2 = 0$. Consider ideal $J$ of ${\cal A}_{1}$ generated by element $g^2 - 1$. Thus, ideal $J$ has a basis $(g^2-1),x(g^2-1),g(g^2-1),xg(g^2-1)$. One can check that $J^2 = 0$. Therefore, algebras ${\cal A}_{\pm 1}$ has 4-dimensional Jacobson radical.
\end{proof}
Further, let us consider image of algebras ${\cal A}_{\theta}$ under representation $\phi$ defined by matrices $X,Y,Z$. Remind the following notion: representation of algebra is called {\it semisimple} iff this representation is a direct sum of irreducible ones.
Recall the following property of Jacobson radical: image of radical under any semisimple representation is zero.
Subalgebra ${\cal L}_{\theta} \subset Mat_4({\mathbb C})$ is an image of algebra ${\cal A}_{\theta}$ for arbitrary $\theta$. Using canonical isomorphism ${\cal A}_{\theta} \cong {\cal A}_{-\theta}$, we get that $b$ is defined up to sign. One can find that we can choose $b = \chi(z(g+g^{-1})) = \pm (\theta + \theta^{-1})$.
Therefore, we have the following
\begin{Corollary}\label{main}
Consider subalgebra ${\cal M}_{\theta} \subset Mat_4({\mathbb C})$ generated by ${\cal L}_{\theta} \subset Mat_4({\mathbb C})$. We have the following possibilities:
\begin{itemize}
\item{
If $\theta \ne \pm 1$, then this ${\cal M}_{\theta}$ is a direct sum $Mat_2({\mathbb C}) \oplus Mat_2({\mathbb C})$.
}
\item{
Assume that $\theta = \pm 1$. In this case subalgebra ${\cal M}_{\theta}$ is an image of Klein group or direct sum of four ${\mathbb C}$'s.
}
\end{itemize}
\end{Corollary}
\section*{Appendix A. Homological properties of irreducible ${\mathbb C}G$-modules.}
In this section we will introduce some notions of homological algebra and prove some technical facts on some ${\mathbb C}G$-modules.
One can find classical definitions and results in homological algebra in many books, for example \cite{Maclane}, \cite{GelfMan}, \cite{Eil}
Recall the notion of extension group. Fix some associative algebra $A$. Suppose that we have two $A$-modules $W_1$ and $W_2$. We would like to classify $A$-modules $W$ satisfying the following conditions: $W_1$ is a submodule of $W$ and quotient $W/W_1$ is isomorphic to $W_2$. For this purpose we will introduce the following equivalence relation: we will say that $W$ is equivalent to $W'$ iff there is a following commutative diagram of $A$-modules:
\begin{equation}
\xymatrix{
0\ar[r] & W_1\ar[r] \ar[d] & W \ar[r]\ar[d] & W_2\ar[r]\ar[d] & 0\\
0\ar[r] & W_1\ar[r] & W'\ar[r] & W_2 \ar[r] & 0
}
\end{equation}
where all morphisms are isomorphisms. Standard arguments from homological algebra tell us that set of equivalence classes is an abelian group. This group is called extension group ${\rm Ext}^1_{A}(W_2,W_1)$. Neutral element of this group is a direct sum $W_1 \oplus W_2$.
Extension group has the following description in the case of commutative algebras. Assume that $A$ is a finite generated commutative algebra. Consider algebraic variety ${\rm Spec}A = {\rm Hom}_{alg}(A,{\mathbb C})$. Let $\chi$ be a point of ${\rm Spec}A$. ${\mathbb C}^{\chi}$ is a corresponding $A$-module. Then ${\rm Ext}^1_{A}({\mathbb C}^{\chi}, {\mathbb C}^{\chi})$ is a tangent space of ${\rm Spec}A$ at the point $\chi$. Recall the following way of calculation of extension group ${\rm Ext}^1_A(V_1,V_2)$ of $A$-modules $V_1$ and $V_2$ for arbitrary algebra $A$. Assume that we have a projective resolution of $A$-module $V_1$:
\begin{equation}
\xymatrix{
0 \ar[r] & P_s\ar[r] & ... \ar[r] & P_1\ar[r] & V_1\ar[r] & 0,
}
\end{equation}
where $P_i, i = 1,...,s$ are projective $A$-modules. Applying to this resolution functor ${\rm Hom}_A(-,V_2)$, we get the following complex (not exact sequence!):
\begin{equation}
\label{compl}
\xymatrix{
0 \ar[r] & {\rm Hom}_A(P_1,V_2) \ar[r] & ... \ar[r] & {\rm Hom}_A(P_s,V_2) \ar[r] & 0.
}
\end{equation}
Zeroth cohomology group of this complex is a group ${\rm Hom}_A(V_1,V_2)$, first cohomology group is a group ${\rm Ext}^1_A(V_1,V_2)$. Note that there is a notion of extension group ${\rm Ext}^i_A(V_1,V_2)$ of $A$-modules $V_1$ and $V_2$. In this case ${\rm Ext}^i_A(V_1,V_2)$ is a ith cohomology group of the complex (\ref{compl}).
Consider one-dimensional ${\mathbb C}P$-module ${\mathbb C}^{\chi}$, where $\chi$ is a character of ${\mathbb C}[g^{\pm 1}] \otimes {\mathbb C}[z, z^2 = 1]$.
Restrict ${\mathbb C}P$ - module ${\mathbb C}^{\chi}$ to algebra of Laurent polynomials ${\mathbb C}[g^{\pm 1}]$.
It can be shown in usual way that there is a free resolution (and, hence, projective resolution) of ${\mathbb C}^{\chi}$ as ${\mathbb C}[g^{\pm 1}]$ - module:
\begin{equation}
\label{res}
\xymatrix{
0\ar[r] & {\mathbb C}[g^{\pm 1}]\ar[r]^{j} & {\mathbb C}[g^{\pm 1}]\ar[r]^{p} & {\mathbb C}^{\chi}\ar[r] & 0.
}
\end{equation}
Actually, ${\mathbb C}^{\chi}$ is a quotient of ${\mathbb C}[g^{\pm 1}]$ by ideal generated by $g - \chi(g)1$. Morphism $p$ is a natural projection:
$p: {\mathbb C}[g^{\pm 1}] \to {\mathbb C}[g^{\pm 1}]/<g - \chi(g)1>$. Morphism $j$ is a morphism ${\mathbb C}[g^{\pm 1}] \to {\mathbb C}[g^{\pm 1}]$ is generated by rule $j(1) = (g-\chi(g)\cdot 1)$ and, hence, $j(g) = g(g - \chi(g)\cdot 1)$. One can prove that this morphism is injective. Also, image $j({\mathbb C}[g^{\pm 1}])$ coincides with ${\rm Ker}p$.
Further, come back to ${\mathbb C}P$-module ${\mathbb C}^{\chi}$. In this case ${\mathbb C}^{\chi}$ is a quotient of ${\mathbb C}P$ by ideal generated by elements $g - \chi(g)1, z - \chi(z)1$. It follows that $(z+1)^2 = 2(z+1)$ and $(1-z)^2 = 2(1-z)$. We have the following decomposition ${\mathbb C}P$ into direct sum of projective ${\mathbb C}P$-modules: ${\mathbb C}P = {\mathbb C}P(z+1) \oplus {\mathbb C}P(z-1)$. It can be shown that there is a projective resolution of ${\mathbb C}^{\chi}$ as ${\mathbb C}P$-module:
\begin{equation}
\label{resgf}
\xymatrix{
0\ar[r] & {\mathbb C}P(z\pm 1)\ar[r]^{j} & {\mathbb C}P(z\pm 1)\ar[r]^{p} & {\mathbb C}^{\chi}\ar[r] & 0,
}
\end{equation}
where we take plus or minus simultaneously in both modules as follows: if $\chi(z) = 1$ then we take plus, else we take minus.
Using standard arguments and ${\mathbb C}P$ - resolution of ${\mathbb C}^{\chi}$, one can formulate the following proposition:
\begin{Proposition}
Consider two points $\chi, \psi \in {\rm Spec}{\mathbb C}P$. Then we have the following statements:
\begin{itemize}
\item{
If $\chi \ne \psi$, then ${\rm Ext}^1_{{\mathbb C}P}({\mathbb C}^{\chi},{\mathbb C}^{\psi}) = 0$
}
\item{
${\rm Ext}^1_{{\mathbb C}P}({\mathbb C}^{\chi}, {\mathbb C}^{\chi}) = {\mathbb C}$.
}
\end{itemize}
\end{Proposition}
\begin{proof}
Applying to resolution (\ref{resgf}) functor ${\rm Hom}_{{\mathbb C}[g,g^{-1}]}(-,{\mathbb C}^{\psi})$, we get the following complex:
$$
{\rm Hom}_{{\mathbb C}P}({\mathbb C}P(z \pm 1),{\mathbb C}^{\psi}) \to {\rm Hom}_{{\mathbb C}P}({\mathbb C}P(z \pm 1),{\mathbb C}^{\psi}).
$$
One can show that if $\chi \ne \psi$ then this map is isomorphism, and hence, zeroth and first cohomology groups are trivial. In the case $\chi = \psi$ we obtain that ${\rm Hom}_{{\mathbb C}P}({\mathbb C}^{\chi}, {\mathbb C}^{\chi}) = {\rm Ext}^1_{{\mathbb C}P}({\mathbb C}^{\chi}, {\mathbb C}^{\chi}) = {\mathbb C}$.
\end{proof}
Also, we can make some remarks on homological properties of so-called induced ${\mathbb C}G$-modules.
{\bf Remark.}
Using resolution (\ref{resgf}), we can get resolution of some ${\mathbb C}G$-modules.
Tensoring sequence (\ref{resgf}) by ${\mathbb C}G$ over ${\mathbb C}P$, we get the following sequence:
\begin{equation}
\label{rescg}
\xymatrix{
0\ar[r] & {\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}P(z \pm 1) \ar[r] & {\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}P(z \pm 1) \ar[r] & {\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi} \ar[r] & 0.
}
\end{equation}
Module ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi}$ is called module {\it induced} by character $\chi$ of subgroup $P$.
Sequence (\ref{rescg}) is a projective resolution of ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi}$, i.e. ${\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}P(z \pm 1)$ is a projective ${\mathbb C}G$ - module.
Applying standard arguments to ${\mathbb C}G$-modules $W_{\chi} = {\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\chi}$, $W_{\psi} = {\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}^{\psi}$ and resolution (\ref{rescg}). We get the following proposition:
\begin{Proposition}
We have the following isomorphisms for $W_{\chi}$ and $W_{\psi}$:
\begin{itemize}
\item{
if $\chi \ne \psi, \psi^{-1}$, then
\begin{equation}
{\rm Ext}^1_{{\mathbb C}G}(W_{\chi},W_{\psi}) = 0.
\end{equation}
}
\item{
if $\chi = \psi, \psi^{-1} \ne \pm 1$
\begin{equation}
{\rm Ext}^1_{{\mathbb C}G}(W_{\chi}, W_{\psi}) = {\mathbb C},
\end{equation}
}
\item{
if $\chi = \psi = \pm 1$, then
\begin{equation}
{\rm Ext}^1_{{\mathbb C}G}(W_{\chi}, W_{\psi}) = {\mathbb C}^2,
\end{equation}
}
\end{itemize}
\end{Proposition}
\begin{proof}
we have the following complex:
\begin{equation}
\xymatrix{
{\rm Hom}_{{\mathbb C}G}({\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}P(z \pm 1), W_{\psi}) \ar[r] &
{\rm Hom}_{{\mathbb C}G}({\mathbb C}G \otimes_{{\mathbb C}P} {\mathbb C}P(z \pm 1), W_{\psi}).
}
\end{equation}
Zeroth and first cohomology group of this complex are isomorphic, i.e. ${\rm Hom}_{{\mathbb C}G}(W_{\chi}, W_{\psi}) \cong {\rm Ext}^1_{{\mathbb C}G}(W_{\chi},W_{\psi})$.
Using adjacency of functors and corollary \ref{isomor}, we get that
$$
{\rm Hom}_{{\mathbb C}G}(W_{\chi},W_{\psi}) \cong {\rm Hom}_{{\mathbb C}P}({\mathbb C}^{\chi}, {\mathbb C}^{\psi} \oplus {\mathbb C}^{c_x(\psi)}).
$$
Using this isomorphism, we obtain the statement of the proposition.
\end{proof}
\section*{Appendix B. Some aspects of noncommutative geometry in representation theory of $G$.}
We can describe the connection between ${\mathbb C}G$ - modules and ${\mathbb C}P$ - modules from point of view of noncommutative algebraic geometry also. One can find many aspects of noncommutative algebraic geometry in many papers, for example, \cite{Kraft}, \cite{KonRos}, \cite{Proc}.
Consider a finite-generated associative algebra $A$. Recall that {\it a variety of representations} of algebra $A$ is called the variety ${\bf Rep}_n(A) = {\rm Hom}_{alg}(A, Mat_n({\mathbb C}))$. Also, there is a natural action of ${\rm GL}_n({\mathbb C})$ on $Mat_n({\mathbb C})$ by conjugation. Equivalently, if we fix basis in n-dimensional space ${\mathbb C}^n$, then we have an isomorphism: $Mat_n({\mathbb C}) \cong {\rm End}_{\mathbb C}({\mathbb C}^n)$. In this case, the group ${\rm GL}_n({\mathbb C})$ acts on $Mat_n({\mathbb C})$ by substitutions of bases in ${\mathbb C}^n$. Using this action, we have well-defined action of ${\rm GL}_n({\mathbb C})$ on ${\bf Rep}_n(A)$. Thus, we can consider the quotient of ${\bf Rep}_n(A)$ by action of ${\rm GL}_n({\mathbb C})$. This quotient is called by {\it a moduli variety} of algebra $A$. We will denote this variety by ${\cal M}_n(A)$ for an arbitrary algebra $A$.
We can consider any element $a \in A$ as a matrix-valued function on ${\bf Rep}_n(A)$. Namely, $a(\rho) = \rho(a), \rho \in {\bf Rep}_n(A)$. Also, we can define ${\rm GL}_n({\mathbb C})$ - invariant functions on ${\bf Rep}_n(A)$ in the following manner: ${\rm Tr}(a) (\rho) = {\rm Tr}\rho(a), \rho \in {\bf Rep}_n(A)$. Using ${\rm GL}_n({\mathbb C})$ - invariance, we can consider these functions as functions on ${\cal M}_n(A)$.
Recall the following well-known result.
\begin{Proposition}{\cite{Kraft}}
\label{genmod}
For a finite-generated algebra $A$, the ring of regular polynomial functions on ${\cal M}_n(A)$ is generated by functions ${\rm Tr}a, a \in A$.
\end{Proposition}
We will say that $A$-module $V$ has {\it Jordan-Holder composite factors} (briefly, composite factors) $W_1$,...,$W_s$ if there is a sequence of $A$-submodules of the following type:
\begin{equation}
0 = M_0 \subset M_1 \subset M_2 ... \subset M_{s-1} \subset M_s = V
\end{equation}
and the quotients $W_i = M_i/M_{i-1}, i = 1,...,s$ are irreducible $A$-modules. It is known that the set of composite factors for any $A$-module is unique up to permutation.
Let us denote ${\bf gr}(V)$ the direct sum $W_1 \oplus ... \oplus W_s$ for $A$-module $V$ with composite factors $W_1$,...,$W_s$.
Two $n$-dimensional $A$-modules $V_1$ and $V_2$ correspond to the same point of ${\cal M}_n(A)$ iff ${\bf gr}(V_1) \cong {\bf gr}(V_2)$. Equivalently, $V_1$ and $V_2$ correspond to the same point of ${\cal M}_n(A)$ iff traces of any elements $a \in A$ on $V_1$ and $V_2$ are the same, i.e. ${\rm Tr}a |_{V_1} = {\rm Tr}a |_{V_2}$ for any element $a \in A$.
Let us come back to our situation.
We have an immersion of algebras: ${\mathbb C}P \to {\mathbb C}G$. Thus, we have induced maps:
\begin{equation}
p_1: {\bf Rep}_2({\mathbb C}G) \to {\bf Rep}_2 ({\mathbb C}P)
\end{equation}
and
\begin{equation}
p_2: {\cal M}_2({\mathbb C}G) \to {\cal M}_2 ({\mathbb C}P).
\end{equation}
Let us describe variety ${\bf Rep}_2{\mathbb C}P$ as follows. Up to ${\rm GL}_2({\mathbb C})$ - conjugacy, we have three possibilities for picking up matrix corresponding to element $g$:
\begin{equation}
1.
\begin{pmatrix}
\alpha & 0\\
0 & \beta
\end{pmatrix},
2.
\begin{pmatrix}
\alpha & 1\\
0 & \alpha
\end{pmatrix},
3.
\begin{pmatrix}
\alpha & 0\\
0 & \alpha
\end{pmatrix},
\alpha, \beta \in {\mathbb C}^*.
\end{equation}
Recall that $z$ commutes with $g$. Thus, we have the following possibilities for $z$ in the first and third cases:
\begin{equation}
\begin{pmatrix}
1 & 0\\
0 & 1
\end{pmatrix},
\begin{pmatrix}
-1 & 0\\
0 & -1
\end{pmatrix},
\begin{pmatrix}
1 & 0\\
0 & -1
\end{pmatrix}.
\end{equation}
In the second case, we have the following situation for element $z$:
\begin{equation}
\begin{pmatrix}
1 & 0\\
0 & 1
\end{pmatrix},
\begin{pmatrix}
-1 & 0\\
0 & -1
\end{pmatrix}.
\end{equation}
Further, consider ${\cal M}_2({\mathbb C}P)$. It can be shown that the ring of regular polynomial functions on ${\cal M}_2({\mathbb C}P)$ is generated by ${\rm Tr}(g), {\rm Tr}(g^2), {\rm Tr}(z)$. Also, function ${\rm Tr}(z)$ can have only three possible values $\{-2, 0, 2\}$. It means that every point of ${\cal M}_2({\mathbb C}P)$ is defined by two continuous parameters ${\rm Tr}(g), {\rm Tr}(g^2)$ and discrete parameter ${\rm Tr}(z)$.
We have the following proposition:
\begin{Proposition}
Variety ${\cal M}_2({\mathbb C}P)$ has three irreducible components: $U_{-}$, $U_{0}$ and $U_{+}$. Every component is Zarisski - open subset of affine plane ${\mathbb C}^2$ given by relation: $({\rm Tr}g)^2 - {\rm Tr}g^2 \ne 0$. These components are indexed by values ${\rm Tr}(z) = -2, 0, 2$ respectively.
\end{Proposition}
\begin{proof}
Recall that we have the following relation for $2 \times 2$ matrices:
\begin{equation}
det(g) = \frac12 (({\rm Tr}g)^2 - {\rm Tr}g^2).
\end{equation}
Since $g$ is invertible, $det(g) \ne 0$. Thus, we get the required statement.
\end{proof}
Consider variety ${\bf Rep}_2{\mathbb C}G$. We have the following cases for matrices corresponding to $x, y, z$:
\begin{itemize}
\item{
$x,y,z$ are reflections,}
\item{
$z$ is scalar,
}
\end{itemize}
Consider first case. In this case $x$, $y$ and $z$ are reflections. Recall that $z$ commutes with $x$ and $y$.
Note the following proposition:
\begin{Proposition}
If two reflections $x$ and $z$ commute, then there is a basis in which $x$ and $z$ are diagonal matrices.
\end{Proposition}
\begin{proof}
Pick up eigenvectors $v_1,v_2$ of $z$ such that $zv_1 = v_1, zv_2 = -v_2$. We have the following relation:
$x z v_1 = x v_1$ and $zx v_1 = x v_1$. Hence, $x v_1$ is eigenvector corresponding to eigenvalue $1$. Therefore, $x v_1 = \alpha v_1$ for some $\alpha \in {\mathbb C}^*$. Since $x$ is a reflection, then $\alpha = \pm 1$. The rest is analogous.
\end{proof}
Thus, if $x,y,z$ are reflections, then $x,y,z$ commuting operators. Thus, $x,y,z$ have the following view:
\begin{equation}
\label{iden}
\begin{pmatrix}
\pm 1 & 0\\
0 & \pm 1
\end{pmatrix}
\end{equation}
Consider second case. If $x$ and $y$ correspond to commuting matrices, then this case is quite similar to first case. If $x$ and $y$ are not commuting then matrix of $z$ is scalar.
\begin{Proposition}
We have the following decomposition:
\begin{equation}
{\cal M}_2 ({\mathbb C}G) = {\mathbb C}^1_+ \cup {\mathbb C}^1_{-} \cup S,
\end{equation}
where ${\mathbb C}^1_+$, ${\mathbb C}^1_{-}$ are 1-dimensional families of ${\mathbb C}G$ - modules corresponding to ${\rm Tr}z = \pm 2 {\rm Tr}x = {\rm Tr}y = 0$ respectively, $S$ is a set of isolated points, $|S| = 27$.
\end{Proposition}
\begin{proof}
Using proposition \ref{genmod}, we get that the ring of regular polynomial functions on ${\cal M}_2 ({\mathbb C}G)$ has the following generators: ${\rm Tr}(x), {\rm Tr}(y), {\rm Tr}(z), {\rm Tr}(xy), {\rm Tr}(xz), {\rm Tr}(yz)$.
We have the following cases:
\begin{itemize}
\item{$x,y,z$ are reflections and correspond to matrices of type (\ref{iden}). In this case we have ${\rm Tr}z = {\rm Tr}x = {\rm Tr}y = 0$ and $({\rm Tr}xy, {\rm Tr}xz, {\rm Tr}yz) = (2,-2,-2), (-2,2,-2), (-2,-2,2)$. In this case there are 3 points in $S$.}
\item{$y,z$ are reflections, $x$ is a scalar matrix. In this case $y$ and $z$ are matrices of type (\ref{iden}). Thus, ${\rm Tr}z = {\rm Tr}y = 0$, ${\rm Tr}x = \pm 2$, ${\rm Tr}xy = {\rm Tr}xz = 0$ and ${\rm Tr}yz = \pm 2$. In this case there are 2 points in $S$.}
\item{$x,z$ are reflections, $y$ is a scalar matrix. This case is analogous to second one. Thus, ${\rm Tr}z = {\rm Tr}x = 0$, ${\rm Tr}y = \pm 2$, ${\rm Tr}xy = {\rm Tr}yz = 0$ and ${\rm Tr}xz = \pm 2$. In this case there are 2 points in $S$.}
\item{$x$ is a reflection, $y,z$ are scalar matrices. In this case, ${\rm Tr}x = 0, {\rm Tr}y = \pm 2, {\rm Tr}z = \pm 2$ and $({\rm Tr}xy, {\rm Tr}xz, {\rm Tr}yz) = (0,0,2), (0,0,-2)$. In this case there are 4 points in $S$.}
\item{$y$ is a reflection, $x,z$ are scalar matrices. In this case, ${\rm Tr}y = 0, {\rm Tr}x = \pm 2, {\rm Tr}z = \pm 2$ and $({\rm Tr}xy, {\rm Tr}xz, {\rm Tr}yz) = (0,2,0), (0,-2,0)$. In this case there are 4 points in $S$.}
\item{$x,y,z$ are scalar matrices. In this case ${\rm Tr}x = \pm 2, {\rm Tr}y = \pm 2, {\rm Tr}z = \pm 2$, $({\rm Tr}xy, {\rm Tr}xz, {\rm Tr}yz) = (2,2,2), (2,-2,-2), (-2,2,-2), (-2,-2,2)$. In this case there are 8 points in $S$.}
\item{$z$ is reflection, $x,y$ are scalar matrices. In this case ${\rm Tr}z = 0, {\rm Tr}x = \pm 2, {\rm Tr}y = \pm 2$ and ${\rm Tr}xy = \pm 2, {\rm Tr}xz = 0, {\rm Tr}yz = 0$ In this case there are 4 points in $S$.}
\item{$z$ is scalar and $x,y$ are reflections. In this case ${\rm Tr}z = \pm 2$ and ${\rm Tr}x = {\rm Tr}y = 0$. Also, ${\rm Tr}xz = {\rm Tr}yz = 0$. In this case ${\mathbb C}G$ - modules are parameterized by ${\rm Tr}xy$. In this case we have two 1-dimensional families ${\mathbb C}G$-modules. We will denote two components corresponding to ${\rm Tr}z = 2, {\rm Tr}x = {\rm Tr}y = 0$ and ${\rm Tr}z = -2, {\rm Tr}x = {\rm Tr}y = 0$ by ${\mathbb C}^1_{+}$ and ${\mathbb C}^1_{-}$ respectively.}
\end{itemize}
\end{proof}
Let us come back to map $p_2$.
\begin{Proposition}
Varieties $p_2({\mathbb C}^1_{-})$ and $p_2({\mathbb C}^1_{+})$ are curves given by equations:
\begin{equation}
{{\rm Tr}^2 (g) - {\rm Tr}(g^2)} = 2.
\end{equation}
in $U_{-}$ and $U_{+}$ respectively.
\end{Proposition}
\begin{proof}
One can check that $p_2({\mathbb C}^1_{-}) \subset U_{-}$ and $p_2({\mathbb C}^1_{+}) \subset U_{+}$. Also, remind that $g = xy$. Thus, in the 1-dimensional components, we have the following identity: ${\rm det}g^2 = {\rm det}xyxy = {\rm det}^2 x \cdot {\rm det}^2 y$. Since $x$ and $y$ are reflections< we get that ${\rm det}g^2 = 1$. Using Gamilton - Cayley theorem, we have the following relation for $g$:
\begin{equation}
g^2 - {\rm Tr}(g) \cdot g + {\rm det}g \cdot 1 = 0.
\end{equation}
Since ${\rm det}g = 1$, we get that $g + g^{-1} = {\rm Tr}(g) \cdot 1$ and ${\rm Tr}(g) = {\rm Tr}(g^{-1})$. Also, we have the relation:
\begin{equation}
\label{cur}
\frac{{\rm Tr}^2 (g) - {\rm Tr}(g^2)}{2} = {\rm det}g = 1.
\end{equation}
We get that $p_2({\mathbb C}^1_{-})$ and $p_2({\mathbb C}^1_{+})$ are curves given by (\ref{cur}) in $U_{-}$ and $U_{+}$ respectively.
\end{proof}
\section*{Acknowledgments} The authors are grateful to A.S. Holevo for kind attention to the work and many useful remarks. The first part of the work (Sections 1, 2, 3 and 4) was fulfilled by G.G. Amosov. The second part of the work (Sections 5, 6, Appendix A and Appendix B) was
fulfilled by I.Yu. Zdanovsky. The work of G.G. Amosov is
supported by Russian Science Foundation under grant No 14-21-00162 and performed in Steklov Mathematical Institute of Russian Academy of Sciences.
The work of I.Yu. Zhanovskiy is supported by RFBR, research projects 13-01-00234 and 14-01-00416, and was prepared within the framework of
a subsidy granted to the HSE by the Government of the Russian Federation for the implementation of the Global Competitiveness Program.
|
\section{Introduction}
The model of an elastic interface in a disordered medium has been put forward as a relevant description for a large number of systems \cite{DSFisher1998,BlatterFeigelmanGeshkenbeinLarkinVinokur1994,NattermannScheidl2000,GiamarchiLeDoussalBookYoung}. Examples include domain walls in soft magnets \cite{ZapperiCizeauDurinStanley1998,DurinZapperi2000}, fluid contact lines on a rough surface \cite{MoulinetGuthmannRolley2002,LeDoussalWieseMoulinetRolley2009}, strike-slip faults in geophysics \cite{BenZionRice1993,FisherDahmenRamanathanBenZion1997}, fracture in brittle materials \cite{Ponson2008,SantucciGrobToussaint2010,BonamySantucciPonson2008} or imbibition fronts \cite{PlanetRamonSantucci2009}. An important common property of these systems is that their response to an applied field is not smooth but rather proceeds via jumps extending over a broad range of space and time scales. As a consequence, understanding the properties and the universality of avalanche processes has received a lot of attention in the past years \cite{SethnaDahmenMyers2001,AragonKoltonDoussalWieseJagla2016,DurinBohnCorreaSommerDoussalWiese2016}.
A problem of outstanding interest is to quantify the correlations between successive avalanches. In the context of earthquakes those are linked to the notion of {\it aftershocks}, whose statistics is characterized through phenomenological laws such as the Omori law \cite{Omori1894}.\ Several mechanisms
have been advanced to explain these strong correlations, all involving an additional dynamical variable \cite{BurridgeKnopoff1967,JaglaKolton2009}. For elastic interfaces, correlations between avalanches were yet only studied as a result of such additional degrees of freedom in the interface dynamics, as relaxation processes \cite{JaglaLandesRosso2014,Jagla2014} or memory effects \cite{DobrinevskiLeDoussalWiese2013}. In this work, we show that even in the absence of such mechanisms, {\em\ avalanches in elastic interfaces are generically correlated below their upper critical dimension}. These correlations are universal.
Let us emphasize that the goal of this paper is {\it not} to understand or explain the aftershock statistics observed in earthquakes, for which additional mechanisms such as those discussed above are necessary. Rather, it is to emphasize that for disordered elastic systems, {\em except for mean-field models, correlations between avalanches always exist}.
A precise quantitative understanding of these correlations is necessary to correctly quantify correlations induced by additional mechanisms. In systems where the description by the standard elastic-interface model is accurate (without additional mechanisms) our results quantify the correlations between avalanches. To our knowledge, these correlations have up to now been ignored in theoretical or experimental work. It would thus be interesting to quantify them better, in order to access universality, or lack thereof, in various avalanche processes.
In this article we study the correlations between the sizes and locations of shocks in the ground state (also called ``static avalanches'') of elastic interfaces in disordered media. These static avalanches are close cousins of the (dynamic)\ avalanches observed in the interface dynamics at depinning. As we discuss below, we expect most of our results to hold for both classes. Our study is conducted using the Functional Renormalization Group (FRG). Originally introduced as a powerful tool to study the universal properties of the statics and dynamics (at the depinning transition) of elastic interfaces in disordered media \cite{DSFisher1986,NattermannStepanowTangLeschhorn1992,NarayanDSFisher1992b,NarayanDSFisher1993a,ChauveLeDoussalWiese2000a,LeDoussalWieseChauve2002,LeDoussalWieseChauve2003}, the FRG has been recently adapted to the study of avalanches \cite{LeDoussalWiese2008c,LeDoussalWiese2011b,LeDoussalWiese2012a,DelormeLeDoussalWiese2016,ThieryLeDoussalWiese2015,DobrinevskiLeDoussalWiese2014a}. It has notably led to a rigorous identification of the relevant mean-field theory for the statistics of single avalanches: the Brownian-Force Model (BFM), a multidimensional generalization of the celebrated {Alessandro-Beatrice-Bertotti-Montorsi (ABBM) model \cite{AlessandroBeatriceBertottiMontorsi1990,AlessandroBeatriceBertottiMontorsi1990b}. Interestingly, the FRG allows to go beyond mean-field theory and to compute in a controlled way avalanche observables in an expansion in $\epsilon= d_{\rm uc}-d$ where $d$ is the interface dimension, and $d_{\rm uc}$ the upper critical dimension of the problem. The latter depends on the range of the elastic interactions, with $d_{\rm uc}=4$ for short-ranged (SR) elasticity and $d_{\rm uc}=2$ for the usual long-ranged (LR) elasticity.
\medskip
The outline of this article is as follows: In section \ref{s:main-results} we summarize our results, preceded by a definition of the relevant observables.
In Section \ref{Sec:Model} we introduce the model and the observables we are interested in. Section \ref{Sec:Global} contains the derivation of the main results presented above. Section \ref{Sec:Local} gives an analysis of the correlations between the local shock sizes. Section \ref{Sec:Numerics} presents the results of our numerical analysis of these correlations for a toy model with a single degree of freedom, i.e.\ $d=0$. Finally, a series of appendices contains technical derivations.
\section{Main results}\label{s:main-results}
Let us now state our main results for interfaces with a short-ranged elastic kernel (a more general case will be treated in the manuscript, with little changes to the formulas). To this aim, we parameterize the position of
the interface by the (real, one-component) displacement field $u(x)$, where
$x \in \mathbb{R}^d$ is the internal coordinate of the interface. For notational
convenience we denote $u(x) \equiv u_x$. The interface is submitted
to a quenched random potential $V(u_x,x)$, and to an external parabolic confining field $\frac {m^2}2 (u_x-w)^2$ centered at $w$.
In a given disorder realization $V$, upon variation of the external fiel $w$, the ground state (i.e.\ lowest-energy) configuration
of the interface,
denoted $u_x(w)$, changes discontinuously at a set of discrete locations $w_i$, according to \begin{equation} u_x(w_i^-) \to u_x(w_i^+) = u_x(w_i^-)+S^{(i)}_{x}\ .\end{equation} The event $(w_i , S^{(i)}_{x})$ is the $i^{th}$ shock of the interface, $w_i$ is the location of the shock, $S^{(i)}_{x}$ is its local size at $x$ and $S^{(i)} =
\int d^d x \, S^{(i)}_{x}$ its total size. The statistical properties associated to one shock were thoroughly analyzed using FRG in \cite{LeDoussalWiese2008c,LeDoussalWiese2011b}. Such properties are encoded in the {\it shock density} $\rho_0$, defined as
\begin{equation}
\rho_0 := \overline{\sum_i \delta(w-w_i)} \ ,
\end{equation}
and in the {\it avalanche-size density}
\begin{equation} \label{defrhointro}
\rho(S) := \overline{ \sum_{i} \delta(w-w_i) \delta(S-S^{(i)}) } \ .
~~~~\end{equation}
The {\it shock-size density} $\rho(S)$ is linked to $\rho_0$ through $\rho_0 = \int dS \,\rho(S)$.
Note that these quantities do not depend on $w$ due to the statistical translational invariance (STS) of the disorder. Considering two points $w < w'$ and sizes $S_1 < S_2$, $ \int_{w}^{w'}d\tilde w \int_{S_1}^{S_2} d S \rho(S)$ is the mean number of shocks occurring between $w$ and $w'$ with size $ S \in [S_1,S_2]$, while $(w'-w)\rho_0$ is the mean number of shocks (irrespective of their size). Note that throughout the rest of this section we will discuss our results in terms of densities but they can be translated into results for normalized probabilities as we discuss in Sec.~\ref{subsec:Probabilities}.
These observables alone do not determine the statistical properties of the sequence $\{(w_i , S^{(i)})\}_{i \in \mathbb{Z}}$ of shocks experienced by the interface in a given environment. In particular, they do not contain any information about the correlations between the shocks. For a given distance $W>0$, let us therefore introduce the {\it two-shock density at distance $W, $}
\begin{equation}
\rho_2(W):= \overline{ \sum_{i\neq j } \delta(w-w_i) \delta(w+W-w_j) } \ .
\end{equation}
This observable scales as {\it the square of a density}. Thus $\int_{w_1}^{w_1'} dw \int_{w_2}^{w_2'} dw' \rho_{2}(w'-w)$ counts {\it the mean number of pairs of shocks} such that the first shock occurs between $w_1$ and $w_1'$, and the second one between $w_2$ and $ w_2'$. Equivalently, $\tilde{\rho}_2(W) := \frac{\rho_2(W)}{\rho_0}$ is the density of shocks at a distance $W$ from a given shock. These observables contain information about the correlations between shocks. Indeed an uncorrelated sequence of shocks implies $\rho_2(W) = \rho_0^2$ (and thus $\tilde{\rho}_2(W) = \rho_0$). A central question addressed in this work is whether the presence of a shock at a given point decreases ($\rho_2(W) < \rho_0^2$) or increases ($\rho_2(W) > \rho_0^2$) the density of shocks at a distance $W$.
To measure the correlations between the size of the shocks (and not only their positions)
we introduce the {\it two-shock size density} at distance $W$,
\begin{eqnarray}
&&\!\!\!\!\!\!\! \rho_W(S_1,S_2):= \label{6} \\
&& \overline{ \sum_{i\neq j } \delta(w-w_i) \delta(S_1-S^{(i)}) \delta(w+W-w_j) \delta(S_2-S^{(j)}) } \nonumber \ .
\end{eqnarray}
It is linked to $\rho_2(W)$ via
\begin{equation}
\rho_2(W) = \int dS_1 \,dS_2 \,\rho_W(S_1,S_2)\ .\end{equation}
Here $\int_{w_1}^{w_1'} dw \int_{w_2}^{w_2'} dw' \int_{S_1}^{S_1'} dS \int_{S_2}^{S_2'} dS' \rho_{w'-w}(S,S')$ counts the mean number of pairs of shocks such that the first shock occurred between $w_1$ and $w_1'$, and the second between $w_2$ and $w_2'$, with sizes between $S_1$ and $S_1'$, resp. $S_2$ and $S_2'$. For this observable, an absence of correlations in the sequence of shocks implies $\rho_W(S_1 , S_2) = \rho(S_1) \rho(S_2)$. To investigate the presence of correlations we thus study the {\it connected two-shock size density} $\rho_W^c(S_1,S_2)$, defined as
\begin{equation} \label{7}
\rho_W^c(S_1,S_2) := \rho_W(S_1,S_2) - \rho(S_1) \rho(S_2)\ .
\end{equation}
At the level of mean-field theory, i.e.\ in the BFM model, it is known \cite{LeDoussalWiese2011b,ThieryLeDoussalWiese2015} that the shocks are independent and the process $w \to u_x (w)$ is a Levy jump process. As a consequence, $\rho_W^c(S_1,S_2) =0$. On the other hand, for realistic interface models below their upper critical dimension, the shocks are correlated, demanding to go beyond the BFM. This can be seen from the second moment for which we show below the {\it exact} relation
\begin{equation}\label{S1S2exactIntro}
\frac{\langle S_1 S_2 \rangle_{\rho_W^c} }{[\langle
S \rangle_\rho]^2} = - \frac{\Delta''(W)}{L^d m^4}\ .
\end{equation}
On the left-hand-side, $\langle
... \rangle_{\rho_W^c}$ denotes the average with respect to
$\rho_W^c$ as defined in Eq.\ (\ref7).
On the right-hand-side, $L$ is the lateral extension of the system, and $m^2$ the curvature of the confining potential, which sets the correlation length $ L_m := 1/m$ for avalanches in the lateral direction. Finally, $\Delta(W)$ is the renormalized disorder-force correlator, the central object in the FRG treatment of disordered elastic systems: Denoting $u(w)$ the center-of-mass position of the interface, given well-position $w$, the correlator $\Delta(W)$ is defined as the connected correlation function of the center-of-mass fluctuations of the interface position \cite{LeDoussal2006b},
\begin{equation}
\Delta(W):= L^d m^4 \overline{ \left[ u(w) -w\right] \left[ u({w+W})-(w+W)\right] }^c\ .
\end{equation} Up to a universal scaling factor and a single non-universal scale, the function $\Delta(W)$ only depends on the universality class of the problem. It was computed up to two-loop accuracy in Ref.~\cite{LeDoussalWieseChauve2003} and measured numerically in Ref.~\cite{MiddletonLeDoussalWiese2006}. For our purpose it is important that the function $\Delta(W)$ is uniformly of order $\epsilon$, and that its second derivative is non-zero.
Thus the correlations (\ref{S1S2exactIntro}) increase when
going away from the upper critical dimension, where mean-field theory, or equivalently the BFM is relevant. Indeed, for the BFM $\Delta''(W) = 0$, and the effective disorder force is distributed as a Brownian motion. Beyond mean-field theory, the sequence of shocks is correlated, thus the effective disorder force at large scales has a different statistics than Brownian motion. The sign of these correlations depends on the sign of $\Delta''(W)$, which, in turn, depends on the universality class of the problem. As detailed in Sec.~\ref{SubSec:Delta}, {\it our results predict qualitatively different correlations depending on the universality class.} The most important static universality classes of non-periodic, short-ranged disorder are the random-bond (RB) universality class, which at the microscopic level has short-ranged potential-potential correlations, and the random-field (RF) universality class, for which the force-force correlations, but not the potential-potential correlations, are short-ranged at the microscopic level. As is summarized in Fig.~\ref{fig:Cartoon}, for RF-disorder $\Delta''(W)>0$, and thus avalanches are always anti-correlated. On the other hand, for RB-disorder, avalanches are anti-correlated at short distances $W$, but positively correlated at larger ones.
\begin{figure}
\centerline{\includegraphics[width=4.5cm]{TypicalRF} \includegraphics[width=4.5cm]{TypicalRB}}
\caption{Cartoons of the typical shape of the renormalized disorder correlator $\Delta(W)$ (black-dashed line) and of its second order derivative $\Delta''(W)$ (red line) for the Random-Field (left) and Random-Bond (right) universality classes (not to scale). Our results predict that the shock sizes are always negatively correlated in the Random-Field universality class, whereas the Random-Bond universality class exhibits a richer structure with negatively (resp. positively) correlated shock sizes at small (resp. large) distances.}
\label{fig:Cartoon}
\end{figure}
To obtain results for higher avalanche-size moments, we use the FRG and the $\epsilon=(d_{\rm uc}-d)$ expansion to show that, to lowest non-trivial order in the expansion,
\begin{equation} \label{MainResult}
\rho^c_W(S_1,S_2)= - \frac{\Delta''(W)}{L^d m^4} \frac{S_1 S_2}{4S_m^2} \rho(S_1)\rho(S_2) + O(\epsilon^2)\ .
\end{equation}
Here \begin{equation}
S_m:= \frac{\langle S^2 \rangle_{\rho}}{2 \langle S \rangle_{\rho}} \ ,
\end{equation}
where $\langle
... \rangle_{\rho}$ denotes the average with respect to $\rho$ as defined in Eq.~(\ref{defrhointro}), is the characteristic size of avalanches, which acts as a large-scale cutoff for the avalanche-size density $\rho(S),$ and $\Delta''(W)$ introduced above is $O(\epsilon)$.
Integrating Eq.~(\ref{MainResult}) times $S_1 S_2$ over $S_1$ and $S_2$, we recover Eq.~(\ref{S1S2exactIntro}). Contrary to the latter equation which is exact, relation (\ref{MainResult}) is correct only to order $\epsilon$.
As a consequence of Eq.~(\ref{MainResult}), and its generalizations to higher order, the correlations between avalanches
are universal. To make this more transparent, we rewrite Eq.\ (\ref{MainResult}) as
\begin{equation}
\rho_W^c(S_1,S_2) = \frac{1}{(L m)^d} \frac{L^{2d}}{S_m^4}
{\cal F}_d\Big(\frac{W}{W_m}, \frac{S_1}{S_m} , \frac{S_2}{S_m}\Big) \label{eps} \ .
\end{equation}
The function ${\cal F}_d$ is universal and apart from its three arguments depends only on the spatial dimension.
To first order in $d=d_{\rm uc} -\epsilon$, and in the limit of large $L$ and small $m$, it is given by
\begin{equation}
{\cal F}(w, s_1 , s_2) \simeq \frac{A_d \tilde \Delta^{* \prime \prime}(w)}{16 \pi \sqrt{s_1 s_2} } e^{-(s_1+s_2)/4}
+ O(\epsilon^2)\ .
\end{equation}
Here $A_d$ is an explicit constant,
with $A_{d=4}=8 \pi^2$ for SR elasticity; the scale $W_m \sim m^{-\zeta}$, with $\zeta $ the roughness exponent contains a non-universal amplitude. The range of validity of this result is discussed in the main text. The presence of the factor of $1/(Lm)^d$ highlights the fact that the correlations between shocks are local (indeed $N:=(Lm)^d$ counts the number of elastically independent regions of the interface). We will analyze this local structure by studying the correlations between the local sizes of the shocks.
To summarize, let us emphasize again our main message namely that for realistic models (beyond mean-field) the sequence of shocks is always correlated.
\section{Model, shock observables and method} \label{Sec:Model}
\subsection{Model}
Consider the Hamiltonian for a $d-$dimensional elastic interface with position $u(x) \equiv u_x \in \mathbb{R}$ ($ x \in \mathbb{R}^d$), elastic kernel $g_{xx'}^{-1}$, subjected to a harmonic well centered at $w, $ and to a disorder potential $V(u,x)$:
\begin{equation} \label{Hamiltonian1}
{\cal H} [u;w] = \frac{1}{2} \int_{xx'} g_{xx'}^{-1}(u_x - w)(u_{x'}-w) + \int_x V(u_x,x) \ .
\end{equation}
Here $\int_x = \int d^dx$ and we assume everywhere that the system is confined in a box of length $L$ with e.g.\ periodic boundary conditions (the boundary conditions will not play a role in the following). We also assume the existence of a short-scale length cutoff $a$. The elastic kernel is
translationally invariant ($g_{xx'}^{-1} = g_{x-x'}^{-1}$) and defines a convex elastic-energy functional (i.e.\ $g_{xx'}^{-1}>0$ for $x \neq x'$). We denote $g_{q}^{-1} = 1/g_q$ its Fourier transform defined as $g_q^{-1} = \int_q e^{iq x} g_{x}^{-1}$, where $\int_q = \int \frac{d^d q}{(2\pi)^d}$. A possible choice is the standard short-ranged elasticity defined by \begin{equation} \label{short-rangedKernel}
g_{xx'}^{-1} = \delta_{xx'} (-\nabla_{x'}^2 + m^2) \quad , \quad g_{q}^{-1} = q^2+m^2
\ .\end{equation}
Here $\delta_{xx'}$ is the Dirac $\delta$ distribution, and the elastic coefficient has been set to one using an appropriate choice of units. Another kernel we consider is
\begin{equation} \label{long-rangedKernel}
g_q^{-1} = (q^2+\mu^2)^{\frac{\gamma}{2}}\ ,
\end{equation}
where $\gamma =2 $ corresponds to the previous case, and $\gamma=1$ is relevant for long-ranged elasticity, as encountered in fracture and contact-line experiments. For a kernel of the form (\ref{long-rangedKernel}) we define the mass term as
\begin{equation} \label{defmass}
m^2 := g^{-1}_{q=0} = \mu^{\gamma} .
\end{equation}
It is the strength of the harmonic well. For short-ranged elasticity we have
\begin{eqnarray}
{\cal H}_{\rm el} [u;w] & :=& \frac{1}{2}\int_{xx'} g_{xx'}^{-1}(u_x - w)(u_x'-w) \nonumber \\
&=& \frac{1}{2}\int_{x} (\nabla_x u_x)^2 + m^2(u_x - w)^2 .
\end{eqnarray}
Thus $L_m:=m^{-1}$ defines a length scale beyond which different parts of the interface are elastically independent. It
also provides a large-scale cutoff in loop integrals encountered in the field theory. For more general kernels (\ref{long-rangedKernel}) this length scale is $L_{\mu}:= \mu^{-1}$, and we suppose $L_\mu \ll L$, ensuring that boundary conditions do not play a role. The number of elastically independent parts of the interface is $N = (L/L_{\mu})^d$. The disordered potential $V(u,x)$ is assumed to be short-ranged in internal space $x$, and statistically translationally invariant, with a second cumulant
\begin{equation}
\overline{ V(u,x) V(u',x')}^c = \delta_{xx'} R_0(u-u') \ .
\end{equation}
The overline $\overline{(...)}$ denotes the average over the disorder, and superscript $c$ stands for connected averages. The detailed form of $R_0$ is, apart from global features that determine the universality class of the problem (see Sec.~\ref{SubSec:Delta}), unimportant. We also consider the force-force cumulant $\Delta_0(u) = - R_0''(u)$ such that $\overline{ \partial_u V(u,x) \partial_{u'} V(u',x')}^c = \delta_{xx'} \Delta_0(u-u') $. Introducing a (finite) temperature $T$, disorder and thermal averages in this model can efficiently be computed using a replicated field theory. Introducing $n$ replicated fields $u_{ax}$, $a=1 , \dots , n $, the replicated action reads
\begin{eqnarray} \label{Action1}
S[u] &=& \frac{1}{2 T} \sum_{a} \int_{xx'} g_{xx'}^{-1}(u_{ax} - w)(u_{ax'}-w) \nonumber \\
&& - \frac{1}{2T^2} \sum_{a,b} \int_x R_{0}(u_{ax} - u_{bx}) + \cdots
\end{eqnarray}
where $\cdots$ indicates eventual higher cumulants of the disorder.
\subsection{The ground state and the scaling limit}
As discussed in the introduction,
we are interested in the minimal energy configuration of the interface for a given parabolic well position $w$ and disorder realization $V$(i.e.\ the $T=0$ problem). It is defined as the configuration $u_x(w)$, which minimises the energy,
\begin{equation}
u_x(w) := \underset{u_x}{{\rm argmin}} ~ {\cal H} [u;w] \ .
\end{equation}
We denote
\begin{equation}
u(w) := \frac{1}{L^d}\int_x u_x(w),
\end{equation}
the center of mass of the ground-state of the interface. The statistical properties of $u_x(w)$ have been extensively studied in the literature. In particular it is known that the interface is self-affine with a (static) roughness exponent $\zeta$, defined by $\overline{[u_x(w) - u_{x'}(w)]^2} \sim |x-x'|^{2 \zeta}$. This scaling form generally holds in the scaling regime $L_c \ll |x-x'| \ll L_{\mu}$ where $L_c$ is the Larkin length. The scaling limit is thus obtained for $L_{\mu} \to \infty$ or equivalently for $\mu \to 0$, also equivalent to $m \to 0$ (see (\ref{defmass})), a regime which is
implicit throughout this work. In the FRG treatment of this problem, the ground state statistics is studied using the replicated field theory (\ref{Action1}). The mass term $m$ (or $\mu = m^{2/\gamma}$) can be conveniently used as a control parameter to study the flow of the effective action. As $m\to 0$ and through a proper rescaling, the effective action
approaches
a RG fixed point. This fixed point is perturbative in $\epsilon = d_{{\rm uc}}-d >0$ where $d_{{\rm uc}}$ is the upper critical dimension of the model (for kernels of the form (\ref{long-rangedKernel}) it is given by $d_{{\rm uc}}=2 \gamma$, thus $d_{{\rm uc}}=4$ for short-ranged elasticity and $d_{{\rm uc}}=2$ for long-ranged elasticity). The central object of the theory is the effective disorder correlator $R(u)$, a renormalized version of $R_0(u)$. It appears in the effective action of the theory $\Gamma[u],$ as $R_0(u)$ appears in the bare action $S[u]$ of Eq.~(\ref{Action1}) (see the action (\ref{Action3}) below). Remarkably, as shown in Ref.\ \cite{LeDoussal2008}, it is related to a physical observable, the renormalized disorder force-force correlator $\Delta(u)$ defined as
\begin{equation} \label{DeltaDef}
\Delta(w-w'):= L^d m^4\overline{[u(w) -w][u(w') -w']}^c \ ,
\end{equation}
through the relation $\Delta''(u) = -R(u)$. This is the function that appears in the results (\ref{S1S2exactIntro}) and (\ref{MainResult}) of the introduction. The RG flow can be equivalently studied on $R$ or $\Delta$. For $m \to \infty$, the correlator $\Delta(w)$ is equal to the bare force-force correlator: $\Delta(w ) \to_{m\to \infty} \Delta_0(w)$. In the limit $m \to 0$ it admits a scaling form
\begin{equation} \label{DeltaRescaled}
\Delta(w) = A_d \mu^{\epsilon - 2 \zeta} \tilde \Delta (\mu^{\zeta} w)
\end{equation}
where $A_d$ is a dimensionless constant, and we recall $\mu = m^{2/\gamma}$. For kernels of the form (\ref{long-rangedKernel}), a convenient choice is to take $A_d$ as $A_d = \frac{1}{\epsilon \tilde{I}_2}$ with the dimensionless loop integral $\tilde{I}_2 := \int_q \frac{1}{(1+q^2)^{\gamma}}$. Note that the combination $\epsilon \tilde{I}_2$ stays finite as $\epsilon \to 0$. In general
\begin{equation} \label{1loopIntegral}
A_d^{-1}= \epsilon \tilde{I}_2 = \frac{2}{(2 \sqrt{\pi})^d} \frac{\Gamma(\gamma+1-d/2)}{\Gamma(\gamma)}
\ ,\end{equation} and for example $\epsilon \tilde{I}_2 =_{\gamma=2; d= 4} 1/(8 \pi^2) $ and $ \epsilon \tilde{I}_2=_{\gamma=1; d = 2} 1/(2 \pi)$. As $m \to 0$, the rescaled disorder correlator $\tilde \Delta$ converges to the fixed point of the FRG flow equation $\tilde{\Delta}^*(u)$, which depends only on the universality class.
Let us now recall some important properties of these fixed-point functions.
\subsection{Properties of $\tilde{\Delta}^*(u)$ and static universality classes} \label{SubSec:Delta}
Depending on the properties of the bare disorder correlator $R_0(u)$, the FRG predicts that $\tilde \Delta(u)$ converges as $m \to 0$ to one of the fixed point of the FRG equation. A property of the (zero-temperature)
FRG equation is that, for non-periodic disorder, if $\tilde{\Delta}^*(u)$ is a fixed point, $\kappa^2 \tilde{\Delta}^*(u/\kappa)$ also is a fixed point. Hence the fixed point towards which the system flows contains one non-universal scale whose value depends on microscopic properties of the disorder. The known fixed points can be regrouped into four main classes\footnote{There are other classes with different long-range correlations, but we will not
study them.}. Analytic properties of these fixed-point functions are known up to two-loop order, i.e.\ $O(\epsilon^2)$, see Ref.\ \cite{LeDoussalWieseChauve2003} to which we refer the reader for quantitative results.
An important property is that all fixed points exhibit a cusp around $0$, $\Delta(u) \simeq \Delta(0) + \Delta'(0^+) |u| + O(u^2)$,
related to the presence of avalanches \cite{LeDoussalWiese2008c,LeDoussalWiese2012a}. For our analys the sign of $(\Delta^*)''(u)$ is crucial as it determines the sign of the correlations. From the exact result (\ref{S1S2exactIntro}) (shown below) we see that for $(\tilde{\Delta}^*)''(W)>0$ shock sizes at distance $W$ are anti-correlated, whereas for $(\tilde{\Delta}^*)''(W)<0$) they are positively correlated.
\paragraph*{Random-bond:} This class has a bare disorder potential $V(x,u)$ distributed with short-ranged correlations in the $u$ direction: The bare disorder correlator $R_0(u)$ decays quickly to $0$ as $u \to \infty$. The most important property for our analysis of the fixed-point function $\tilde{\Delta}^*_{{\rm RB}}(u)$ (its typical form is plotted on the right of Fig.~\ref{fig:Cartoon}) is that
$(\tilde{\Delta}^*_{{\rm RB}})''(u)>0$ at small $u$ and $(\tilde{\Delta}^*_{{\rm RB}})''(u)<0$ at large $u$.
\paragraph*{Random field:} This class has the bare disorder force $F(x,u)=-\partial_u V(x,u)$ distributed with short-ranged correlations. Then the bare force-force correlator $\Delta_0(u)$ is short-ranged and $R_0(u) \simeq_{u \gg 1} - \sigma |u|$ where $\sigma$ is called the amplitude of the random field. The most important property for our analysis of the fixed point function $\tilde{\Delta}^*_{{\rm RF}}(u)$ (its typical form is plotted on the left of Fig.~\ref{fig:Cartoon}) is that
$(\tilde{\Delta}^*_{{\rm RF}})''(u)>0$ for all $ x$.
\paragraph*{Random periodic:} This class corresponds to periodic disorder $V(u+1) = V(u)$. As a consequence, $\tilde{\Delta}^*(u)$ is also periodic and $(\tilde{\Delta}^*)''(u)=(\tilde{\Delta}^*)''(0)>0$ is constant. Though our analysis still applies to this universality class and our results are correct to $O(\epsilon)$, we will not discuss it here. As the
shock process is periodic in any dimension, correlations naturally arise from this periodicity (in particular in
$d=0$ in the $m \to 0$ limit only one shock survives per interval).
\paragraph*{The Brownian-Force-Model universality class:} Finally, the Brownian-Force-Model defined as $\Delta_0(u) = - \sigma |u|$ is also a fixed point of the FRG flow equation and attracts all bare disorder such that $\Delta_0(u) \simeq - \sigma' |u|$ at large $u$. It models avalanches at the mean-field level. (It resums tree diagrams).
In this model shocks are uncorrelated.
Hence, from the perspective of practical applications, the {\it qualitative} behavior of the correlations between shocks as a function of the distance strongly depends on the universality class of the model (see Fig.~\ref{fig:Cartoon}).
\subsection{Shocks observables: Densities}
As recalled in the introduction, it is well known that in the limit of small $m$ the (rescaled) ground state $u_x(w)$ is piecewise constant as a function of $w$. In terms of the sequence of shocks $\{(w_i , S^{(i)}_{x})\}_{i\in \mathbb{Z}}$ one can write $u_x(w)$ and $u(w)$ as
\begin{eqnarray} \label{ShockDecomp}
u_x(w) &=& \sum_{i} \theta(w-w_i) S^{(i)}_{x} \ , \nonumber \\
u(w) &=& \frac{1}{L^d} \sum_{i} \theta(w-w_i) S^{(i)} \ ,
\end{eqnarray}
where $\theta(x)$ is the Heaviside theta function. We recall the definition of the one and two-shock size-density:
\begin{align}
& \rho(S) = \overline{ \sum_{i} \delta(w-w_i) \delta(S-S^{(i)}) } \ , \\
& \rho_W(S_1,S_2) = \nonumber \\
& \overline{ \sum_{i\neq j } \delta(w-w_i) \delta(S_1-S^{(i)}) \delta(w+W-w_j) \delta(S_2-S^{(j))}) } \ . \nonumber \\
\end{align}
These distributions possess a large-scale cutoff which we denote $S_m$; the latter diverges for $m$ to $0$ as $S_m \sim m^{ - d - \zeta}$. Additionally, we suppose that they have a small-scale cutoff $S_0$. In the scaling regime, $\rho(S)$ behaves as a power law with a characteristic exponent $\tau$: $\rho(S) \sim S^{-\tau}$ for $S_0 \ll S \ll S_m$. We us also define the connected density
\begin{equation}
\rho_W^c(S_1,S_2) = \rho_W(S_1,S_2) - \rho(S_1) \rho(S_2) \ .
\end{equation}
In the first part of this work our goal is to compute $\rho_W^c(S_1,S_2)$ up to first order in $\epsilon$ using the FRG.
\subsection{Shocks observables: Probabilities} \label{subsec:Probabilities}
One can normalize the above densities to define proper probability distributions as follows:
\begin{eqnarray}
\rho_0 &:=& \int \rho(S)\, dS\ , \\
\rho_2(W) &:=& \int \rho_W(S_1,S_2)\, dS_1 \,dS_2 \ , \\
P(S) &:=& \frac{\rho(S)}{\rho_0}\ , \\
P_W(S_1,S_2) &:=& \frac{\rho_W (S_1,S_2)}{\rho_2(W)} \label{defproba} \ .
\end{eqnarray}
With this definition, $\rho_0 dw$ is the mean number of avalanches occurring in an interval $dw$ and $\int_{w_1}^{w_2}dw\int_{w_3}^{w_4}dw' \rho_2(w'-w)$ counts the number of pairs of shocks where the first one occurs between $w_1$ and $w_2$ and the second between $w_3$ and $w_4$, irrespective of their sizes. Given these definitions, $P(S)$ and $P_W(S)$ are normalized probability distribution functions (PDF). $ \int_{S}^{S'} d\tilde S\, P(\tilde S)$ is the probability, given that a shock has occurred, that its size is between $S$ and $S'$. $ \int_{S_1}^{S_1'} dS \int_{S_2}^{S_2'} dS' P_W(S,S')$ is the probability, given that two shocks occurred at a distance $W$, that their sizes are between $S_1$ and $S_1'$, and $S_2$ and $S_2'$. Note that a priori the marginal distribution$\int dS_1 P_W(S_1,S_2)$ is different from $P(S_2)$ since it contains the additional information that a shock occurred at a distance $W$. At the level of these PDFs, the absence of correlations would imply $P_W(S_1,S_2) = P(S_1,S_2)$ and, though in the remaining of the text we will favor the use of densities, our results can be translated to probabilities using Eq.~(\ref{defproba}). As discussed in Ref.~\cite{LeDoussalWiese2008c}, for an avalanche-size distribution $\rho(S)$ with exponent $\tau>1$ (which is relevant here), the value of $\rho_0$ is dominated by the small-scale cutoff $S_0$ for avalanche sizes, and diverges as $S_0 \to 0$,
\begin{equation}
\rho_0 = \int_{S_0}^{\infty} \rho(S) dS \sim_{S_0 \to 0} S_0^{1-\tau} \ .
\end{equation}
Hence, $\rho_0$ is non-universal. In the same way $\rho_2(W)$ is non-universal, even though its relation with $\rho_0$ has some universal features as we will show below. We denote by $\langle... \rangle_{\rho}$, $\langle... \rangle_{\rho_W}$, $\langle... \rangle_{\rho_W^c}$, $\langle... \rangle_{P}$ and $\langle... \rangle_{P_W}$ the averages with respect to $\rho$, $\rho_W$, $\rho_W^c$, $P$ and $P_W$.
\subsection{Relation between avalanche-size moments and renormalized force cumulants: First moment} \label{Subsec:FirstMom}
The $n^{\rm th}$ cumulant of the renormalized pinning force is defined as\begin{eqnarray} \label{forceCumul}
&&\!\!\!\!m^{2 n } \overline{ [u(w_1)-w_1] \dots [u(w_n)-w_n] }^c = \nonumber \\
&&\qquad (-1)^n L^{-(n-1)d} \hat C^{(n)}(w_1,\dots,w_n)
\ .\end{eqnarray}
By definition $ \hat C^{(2)}(w_1,w_2) = \Delta(w_1-w_2)$ as introduced above. By parity invariance of the disorder $m^2\overline{[u(w)-w]} = 0,$ and thus $ \hat C^{(1)}(w)=0$.
\paragraph*{First cumulant:} One immediately gets by inserting Eq.~(\ref{ShockDecomp}) into $m^2\overline{[u(w)-w]} = 0$ the exact relation
\begin{equation}
\langle S \rangle_{\rho} = \rho_0 \langle S \rangle_{P} = L^d \ .
\end{equation}
\paragraph*{Second cumulant:} Differentiating with respect to $w_1$ and $w_2$ the definition $L^{-d} \Delta(w_1 - w_2) = m^4 \overline{[u(w_1)-w_1][u(w_2)-w_2]}$ with Eq.~(\ref{ShockDecomp}) inserted, one obtains the relation (33) of \cite{LeDoussalWiese2008c} (with a corrected misprint $1 \to -1$). It can be written in the form
\begin{align} \label{S1S2exact0}
- \frac{\Delta''(w_1-w_2)}{L^d m^4} = &\, L^{-2d} \langle S^2 \rangle_{\rho} \delta(w_1-w_2) \nonumber \\
& + L^{-2d} \langle S_1 S_2 \rangle_{\rho_{w_2-w_1}} - 1 \ .
\end{align}
Hence, as pointed out in Ref.~\cite{LeDoussalWiese2008c}, the singular part of the second derivative of $\Delta''(w_1-w_2)$ around $w_2 = w_1$ gives an exact relation between the cusp in the renormalized disorder correlator
\begin{equation} \label{defsigma}
\sigma := -\Delta'(0^+) = R'''(0^+)\ ,
\end{equation}
and the second avalanche-size moment,
\begin{equation}
S_m := \frac{ \langle S^2 \rangle_{\rho} }{2 \langle S \rangle_{\rho}} = \frac{ \langle S^2 \rangle_{P} }{2 \langle S \rangle_{P}} = \frac{ \sigma}{m^4} .
\end{equation}
The avalanche size $S_m$ plays the role of a large-scale cutoff for $\rho(S)$. On the other hand, the regular part of Eq.~(\ref{S1S2exact0}) gives the exact relation
\begin{equation} \label{S1S2exact}
L^{-2d} \langle S_1 S_2 \rangle_{\rho_W} = 1 - \frac{\Delta''(W)}{L^d m^4} .
\end{equation}
For uncorrelated shocks we would have obtained $L^{-2d} \langle S_1 S_2 \rangle_{\rho_W} = 1$. The correlations thus come from the non-zero value of $\Delta''(W) \neq 0$, a property which is generally expected from the FRG. It is a simple signature of the fact that the effective disordered force felt by the interface at large scale is not Brownian. Note that in terms of the moments of the connected density, the exact relation (\ref{S1S2exact}) reads
\begin{equation} \label{S1S2exact2}
L^{-2d} \langle S_1 S_2 \rangle_{\rho_W^c} = - \frac{\Delta''(W)}{L^d m^4} .
\end{equation}
Let us also write the exact relation (\ref{S1S2exact}) in terms of the probabilities defined in Sec.~\ref{subsec:Probabilities}:
\begin{eqnarray}
\frac{\rho_2(W)}{\rho_0^2} \frac{\langle S_1 S_2 \rangle_{P_W} }{(\langle S \rangle_P)^2} = 1 - \frac{\Delta''(W)}{L^d m^4} .
\end{eqnarray}
\subsection{Generating functions}
We now introduce the generating functions which encode all the moments of the density $\rho_W(S_1,S_2)$. Let us first recall the generating functions used in the one-shock case:
\begin{eqnarray} \label{Z1shock1}
&& Z(\lambda ) = L^{-d} \langle e^{\lambda S} -1\rangle_{\rho} \ , \nonumber \\
&& \hat Z(\lambda) = L^{-d} \langle e^{\lambda S} -\lambda S - 1\rangle_{\rho} = Z(\lambda)- \lambda .
\end{eqnarray}
They are related to observables associated with the position as
\begin{eqnarray} \label{Z1shock2}
&& Z(\lambda ) = L^{-d} \lim_{\delta \to 0^+} \partial_{\delta} \overline{ e^{ L^d[u(w+\delta) - u(w) ]}} \ , \nonumber \\
&& \hat Z(\lambda) = L^{-d} \lim_{\delta \to 0^+} \partial_{\delta} \overline{ e^{ L^d[\hat{u}(w+\delta) - \hat{u}(w) ]}} \ ,
\end{eqnarray}
where $\hat{u}(w) := u(w) - w$ is the translated position field. Note that due to STS they
are independent of $w$.
These relations were proven in Ref.~\cite{LeDoussalWiese2011b}. For two shocks we introduce
\begin{equation} \label{Z2shocks1}
Z_{W}(\lambda_1,\lambda_2 ) := L^{-2d}\langle (e^{\lambda_1 S_1} -1)(e^{\lambda_2 S_2} -1) \rangle_{\rho_W} \ .
\end{equation}
We show in Appendix \ref{app:Gene} that it can be computed as
\begin{eqnarray} \label{Z3}
\lefteqn{ Z _W(\lambda_1, \lambda_2 )} \nonumber \\
&=& \hat{Z} _W (\lambda_1 , \lambda_2 ) + \lambda_2 \hat{Z}(\lambda_1) + \lambda_1 \hat{Z}(\lambda_2) + \lambda_1 \lambda_2 \nonumber \\
&=& \hat{Z} _W (\lambda_1 , \lambda_2 ) +\lambda_2 Z(\lambda_1) + \lambda_1 Z(\lambda_2) - \lambda_1 \lambda_2 \ .~~~~~~~~
\end{eqnarray}
We used the definition
\begin{eqnarray} \label{Z2shocks2}
&& \!\!\!\!\!\!\!\!\!\!\! \hat Z_{w_2-w_1}(\lambda_1,\lambda_2 ) := L^{-2d} \times \\
&& \!\!\!\!\!\!\!\!\!\!\! \lim_{\delta_1, \delta_2 \to 0^+} \partial_{\delta_1 , \delta_2} \overline{ e^{ L^d \lambda_1[\hat u(w_1+\delta_1) - \hat u(w_1) ]} e^{ L^d \lambda_2[\hat u(w_2+\delta_2) - \hat u(w_2) ]}} \nonumber
\end{eqnarray}
In the following we compute $\hat Z_W(\lambda_1 , \lambda_2)$ using the FRG through formula (\ref{Z2shocks2}). Let us also define the connected generating functions
\begin{eqnarray}
Z_W^c(\lambda_1 , \lambda_2) & :=& L^{-2d} \langle (e^{\lambda_1 S_1} -1)(e^{\lambda_2 S_2} -1) \rangle_{\rho_W^c} \nonumber \\
& =& Z_W(\lambda_1 , \lambda_2)- Z(\lambda_1)Z(\lambda_2) \nonumber \\
\hat Z_W^c(\lambda_1 , \lambda_2) & :=& \hat Z_W(\lambda_1 , \lambda_2)- \hat Z(\lambda_1) \hat Z(\lambda_2) \label{defhatZc}
\end{eqnarray}
These functions are actually equal: $Z_W^c(\lambda_1 , \lambda_2)=\hat Z_W^c(\lambda_1 , \lambda_2)$ as is easily seen using~(\ref{Z3}).
\subsection{Relation between avalanche-size moments and renormalized force cumulants: Kolmogorov cumulants and chain rule}
Using Eq.\ (\ref{Z2shocks2}) and the fact that $\overline{\hat u(w)}=0$, the generating function $\hat Z_W(\lambda_1 , \lambda_2)$ can be written
as\begin{eqnarray} \label{expand}
\lefteqn{\hat Z_W(\lambda_1 , \lambda_2) = \sum_{n,m=1}^{\infty} \frac{\lambda_1^n \lambda_2^m }{n! m!} \lim_{\delta_1, \delta_2 \to 0^+} } \\
&& \frac{L^{(n+m-2 )d }}{\delta_1 \delta_2} \overline{[\hat u(\delta_1) - \hat u(0) ]^n [\hat u( W +\delta_2) - \hat u(W) ]^m} \ .\nonumber
\end{eqnarray}
In the limit of $\delta_i \to 0$ we encounter for each $(n,m)$ two types of terms:
\begin{eqnarray} \label{connVsdisc}
\lefteqn{ \overline{[\hat u(\delta_1) - \hat u(0) ]^n [\hat u( W +\delta_2) - \hat u(W) ]^m} = } \nonumber \\
&& \overline{[\hat u(\delta_1) - \hat u(0) ]^n}^c \times \overline{[\hat u(W+\delta_2) - \hat u(W) ]^m}^c \\
&& + \overline{[\hat u(\delta_1) - \hat u(0) ]^n [\hat u( W +\delta_2) - \hat u(W) ]^m}^c + O(\delta_i^3) \ .\nonumber
\end{eqnarray}
The term in the second line of Eq.~(\ref{connVsdisc}) produces the disconnected part of the avalanche moment $\langle S_1^{n} \rangle \langle S_2^{m} \rangle$ and thus the disconnected part of the generating function $\hat Z_W(\lambda_1 , \lambda_2)$, that is $\hat Z(\lambda_1) \hat Z(\lambda_2)$. The last term on the other hand contributes to $\langle S_1^{n} S_2^{m} \rangle_{\rho_W^c}$ and to the connected part of the generating function, $\hat Z_W^c(\lambda_1 , \lambda_2)=Z_W^c(\lambda_1 , \lambda_2)$ which is the true unknown. Introducing the Kolmogorov cumulants
\begin{eqnarray} \label{KolmoCum}
\lefteqn{ K_W^{(n,m)}(\delta_1 , \delta_2) := } \\
&& L^{(n+m-2 )d} \overline{[\hat u(\delta_1) - \hat u(0) ]^n [\hat u( W +\delta_2) - \hat u(0)] ^m}^c \ ,\nonumber
\end{eqnarray}
we can write
\begin{equation}
Z_W^c(\lambda_1, \lambda_2) = \sum_{n,m=1}^{\infty} \frac{\lambda_1^n \lambda_2^m}{n! m!} \lim_{\delta_1, \delta_2 \to 0^+} \frac{1}{\delta_1 \delta_2} K_W^{(n,m)}(\delta_1 , \delta_2) \ ,
\end{equation}
or, equivalently,
\begin{equation} \label{chainRule}
\langle S_1^{n} S_2^m \rangle_{\rho_W^c} = \lim_{\delta_1, \delta_2 \to 0^+} \frac{1}{\delta_1 \delta_2} K_W^{(n,m)}(\delta_1 , \delta_2) \ .
\end{equation}
The Kolmogorov cumulants (\ref{KolmoCum}) can be generally extracted from the renormalized force cumulants (\ref{forceCumul}), as we now explain. Let us introduce\footnote{Note that those differ from ${\cal C}$ introduced in \cite{LeDoussalWiese2008c} by an additional factor of $L^{-d}$.}
\begin{eqnarray} \label{mom1}
&&\!\!\!\! C^{(n,m)}(w_1 , \dots ,w_n , w_{n+1}, \dots ,w_{n+m}) = \\
&& \quad L^{(n+m-2 )d} \overline{\hat{u}(w_1) \dots \hat{u}(w_n) \hat{u}(w_{n+1}) \dots \hat{u}(w_{n+m}) }^c \ . \nonumber
\end{eqnarray}
They are trivially linked to the renormalized force cumulants (\ref{forceCumul}): $C^{(n,m)}(w_1 , \dots ,w_n , w_{n+1}, \dots ,w_{n+m}) = \frac{1}{L^d} (-1/m^2)^{n+m} \hat C^{(n+m)}(w_1 , \dots w_{n+m})$.
Explicit expressions for the lowest cumulants with $n+m \leq 4$ are displayed in Ref.\ \cite{LeDoussalWiese2008c},
see e.g.\ Eq.\ (61) there.
In the notation for $C^{(n,m)}$, though the expression is symmetric in $w_{i}$, we have highlighted the facts that in the end the $n$ first $w_i$ will be taken around $w=0$, whereas the last $m$ will be around $W$. Indeed, to obtain $K^{(n,m)}_{W} (\delta_1 , \delta_2)$ from the moments $C^{(n,m)}$, we must successively evaluate $C^{(n,m)}$ with $w_i \to \delta_1$ minus $C^{(n,m)}$ with $w_i \to 0$ for each $i = 1 , \dots ,n$, then set $w_i \to W+\delta_2$ minus $C^{(n,m)}$ with $w_i \to W$ for each $i = n+1 , \dots ,n+m$. Ambiguities associated with the possible presence of terms such as $\Delta'(0^{\pm})$, are lifted by taking the limit of coinciding points with a given specific ordering of the $w_i$. Consistency requires that the end result does not depend on the chosen ordering, a property linked to the assumption that all singularities of
the field $\hat u(w)$ can be modeled by a finite density of dilute shocks (which
guarantees e.g.\ the continuity of $\hat C$).
This iterative procedure was called the ${\cal K}$ operation in \cite{LeDoussalWiese2008c}.
\subsection{Strategy of the calculation and validity of the results} \label{subsec:Strategy}
In order to compute $\hat Z_W(\lambda_1 , \lambda_2)$, we must be able to perform disorder averages of moments of the position field at various positions $w_i$ for $i=1 , \dots , r$. For example $r=4$ is sufficient in the formulation (\ref{Z2shocks2}) and used in Appendix \ref{app:Algebraic}. In the main part of this work we report a calculation of $\hat Z_W(\lambda_1 , \lambda_2)$ from the study of the moments (\ref{mom1}) and we thus need to keep $r$ arbitrary. We therefore consider the theory for $r$ position fields $u_{x}^i$ coupled to different parabolic wells centered at positions $w_i$ in the same disordered environment. The Hamiltonian of the problem is
\begin{equation}
{\cal H}[\{u\}, \{w \}] = \sum_{i=1}^{r} {\cal H}_{\rm el}[u^i, w^i] + \sum_{i=1}^r \int_x V(u_x^i , x) \ .
\end{equation}
This leads to a replicated action of the form
\begin{eqnarray} \label{Action2}
S[u] &=& \frac{1}{2 T} \sum_{a,i} \int_{xx'} g_{xx'}^{-1}(u_{ax}^i - w_i)(u_{ax'}^i-w_i) \nonumber \\
&& - \frac{1}{2T^2} \sum_{a,i; b ,j} \int_x R_{0}(u_{ax}^i - u_{bx}^j) + \cdots
\end{eqnarray}
The effective action of the theory is \cite{LeDoussalWiese2008c,LeDoussalWiese2011b,LeDoussal2008}
\begin{eqnarray} \label{Action3}
\Gamma[u] &=& \frac{1}{2 T} \sum_{a,i} \int_{xx'} g_{xx'}^{-1}(u_{ax}^i - w_i)(u_{ax'}^i-w_i) \nonumber \\
&& - \frac{1}{2T^2} \sum_{a,i; b ,j} \int_x R(u_{ax}^i - u_{bx}^j) + O(\epsilon^2)
\ .~~~~~\end{eqnarray}
Here $R(u) = O(\epsilon)$ is the renormalized disorder correlator already introduced in the previous section, while the neglected terms are higher-order terms in $\epsilon$ that can be expressed as loop integrals with higher powers of $R$. The calculation of observables using the effective action (\ref{Action3}) has been called the {\em\ improved tree approximation} \cite{LeDoussalWiese2008c,LeDoussalWiese2011b}. Here we did not specify the number of replicas $a=1 , \dots , n_r$. As is usual in replica calculations, the $n_r \to 0 $ limit will be implicit in the following. Since (\ref{Action3}) is the effective action, observables will be computed using a saddle-point calculation, or equivalently in a diagrammatic language, by resuming all tree diagrams generated by the action (\ref{Action3}). This calculation allows to get the lowest order in $\epsilon$ for any observable. Let us recall the known results at the improved tree level for $\rho(S)$ and $Z(\lambda)$ as obtained in Refs.\ \cite{LeDoussalWiese2008c,LeDoussalWiese2011b}:
\begin{eqnarray} \label{1shockResult}
\rho(S) &=& \frac{L^d}{2 \sqrt{\pi} S^{\frac{3}{2}} (S_m)^{\frac{1}{2}}} e^{-\frac{S}{4S_m}} \ , \\
Z(\lambda)&=& \lambda + S_m Z(\lambda)^2 = \frac{1}{2 S_m} (1 - \sqrt{1 - 4 \lambda S_m}) \ . ~~~~~~~
\end{eqnarray}
\subsection{Connected versus non-connected averages and the $\epsilon$-expansion}
Before going further, let us now mention a subtle point. As will become clear in the following, the improved tree calculation leads to a result of order $O(\epsilon)$ for $\rho_W^c$, in contrast to $\rho(S)$ for which it leads to a result of order $O(1)$ \footnote{To be rigorous, this is only true of the dimensionless density $\tilde \rho(\tilde S) = S_m^2 \rho(S_m \tilde S)$ since $S_m = O(\epsilon)$, we neglect this subtlety in the following.}. Hence if one computes $\rho_W(S_1,S_2) =\rho(S_1) \rho(S_2) + \rho_W^c(S_1,S_2) $ to $O(\epsilon)$ one must pay attention to the fact that $\rho_W^c(S_1,S_2)$ can be computed using the improved-tree theory, but $\rho(S)$ has then to be computed to one-loop accuracy. In the same way, the connected generating function
\begin{equation}
Z_W^c(\lambda_1 , \lambda_2) = Z_W(\lambda_1 , \lambda_2) - Z(\lambda_1) Z(\lambda_2)
\end{equation}
can be computed exactly up to order $O(\epsilon)$ using the improved tree theory, but to compute $Z_W(\lambda_1 , \lambda_2) $ up to order $\epsilon$ one must add one-loop corrections to $Z(\lambda)$. The same remark holds for the moments $\langle S_1^{n_1} S_2^{n_2} \rangle_{\rho_W^c} = \langle S_1^{n_1} S_2^{n_2} \rangle_{\rho_W}-\langle S_1^{n_1} \rangle_{\rho}\langle S_2^{n_2} \rangle_{\rho}$.
\section{Correlations between total shock sizes}\label{Sec:Global}
\subsection{Reminder of the diagrammatic rules and extraction of shock moments}
Let us now explain how the moments
\begin{eqnarray} \label{mom1bis}
\lefteqn{C^{(n,m)}(w_1 , \dots ,w_n , w_{n+1}, \dots ,w_{n+m}) } \\
&=& L^{(n+m-2 )d} \overline{\hat{u}(w_1) \dots \hat{u}(w_n) \hat{u}(w_{n+1}) \dots \hat{u}(w_{n+m}) } \nonumber \\
&=& L^{-2d} \int_{y_1 \dots y_{n+m}} \overline{\hat{u}_{y_1}(w_1) \dots \hat{u}_{y_{n+m}}(w_{n+m}) } \nonumber
\end{eqnarray}
are obtained using the diagrammatic rules developed in Ref.~\cite{LeDoussalWiese2008c} which can also be read off from the action (\ref{Action3}). In the calculation of the correlator (\ref{mom1}), the terms of the form $L^d \hat{u}(w_i) = \int_{y_i} \hat u_{y_i}(w_i)$ are diagrammatically represented as external legs at the top of the diagrams. Fields at different position $w_i$ and $w_j$ can be contracted through an interaction vertex $\int_z \frac{1}{T^2} R(\hat u_z(w_i) - \hat u_z(w_j) + w_i - w_j)$, represented as a dashed-line (each contraction bringing an additional derivative to $R$ with the appropriate sign). The propagators are represented as plain lines. When forming tree diagrams, one produces $n+m -1$ interaction vertices $\frac{1}{T^2} R,$ and $2(n+m-1)$ propagators, which each carries a factor of $T$. For trees, all factors of $T$ cancel, and the diagrams survive in the $0$ temperature limit. The factors of $T$ can thus be omitted in the diagrammatic rules. As for the integrals over the positions of the external legs $y_i$, $i=1 , \dots , n+m$ and the disorder vertices $z_k$, $k=1 , \dots , n+m-1$, since the interaction is local in space and $\int_{x}g_x = \frac{1}{m^2}$, all $2(n+m-1)$ propagators can be taken as static propagators and thus this integration produces an additional factor of $L^d$.
This procedure results in expressions for the $C^{(n,m)}(w_1 , \dots ,w_n , w_{n+1}, \dots ,w_{n+m})$ as sums of products of terms involving derivatives $\Delta^{(p)}(w_i-w_j)$ \footnote{Each $R$ vertex must be contracted at least twice or there would be one free-replica sum left in the replicated theory, leading to $0$ in the limit of a vanishing number of replicas.}.
In calculating the Kolmogorov cumulants $K^{(n,m)}(\delta_1,\delta_2)$ to order $O(\delta_1 \delta_2)$
one must use the even but non-analytic form of $\Delta(u)$ around the origin,
\begin{equation}
\Delta(u) = \Delta(0) + \Delta'(0^+) |u| + \frac{\Delta''(0)}{2} u^2 + O(u^3)\ .
\end{equation}
We checked that if one takes all limits of coinciding points with a fixed order of the $w_i$ in the calculation, one obtains a non-ambiguous result, independent
of the ordering.
\subsection{Lowest moments}
\paragraph*{First moment:} We fist consider the computation of $\langle S_1 S_2 \rangle_{\rho_W^c}$. To this aim we compute $C^{(1,1)}(w_1 ,w_2)$, which is given by a single diagram:
\vspace{0.1cm}
\begin{eqnarray} \label{SecondMomDiagram}
C^{(1,1)}(w_1 ,w_2) &=& \hspace{1cm} \begin{gathered}
\begin{fmffile}{secondMom}
\begin{fmfgraph*}(30,20)
\fmfleft{i1,i2}
\fmfright{o1,o2}
\fmf{plain, label=$ \frac{1}{m^2} $ }{i2,i1}
\fmf{dbl_dashes, label=$ \Delta(w_1-w_2)$ }{i1,o1}
\fmf{plain, label=$ \frac{1}{m^2} $}{o1,o2}
\fmflabel{$w_1 \approx 0 $}{i2}
\fmflabel{$w_2 \approx W$}{o2}
\end{fmfgraph*}
\end{fmffile}
\end{gathered} \nonumber \\
&& \nonumber \\
&& \nonumber \\
&=& \frac{1}{L^d m^4} \Delta(w_1-w_2) \ .
\end{eqnarray}
We have introduced a new diagrammatic notation: A double-dashed line represents an interaction vertex between position fields at a finite distance $ \approx W$; we reserve the single dashed line for interaction vertices between nearby position fields. Hence,
\begin{eqnarray} \label{K11}
K_W^{(1,1)}(\delta_1 , \delta_2) & =& \frac{1}{L^d m^4} \Big[ \Delta(-\delta_1 + W + \delta_2) - \Delta( W + \delta_2) \nonumber \\
&& ~~~~~~~~ ~- \Delta(-\delta_1+ W) + \Delta(W) \Big] \nonumber \\
& =& - \frac{\Delta''(W)}{L^d m^4} \delta_1 \delta_2 + O(\delta_i^2) \ .
\end{eqnarray}
Using (\ref{chainRule}) we conclude that
\begin{equation} \label{S1S2epsilon}
L^{-2d} \langle S_1 S_2 \rangle_{\rho_W^c} = - \frac{\Delta''(W)}{L^d m^4} \ .
\end{equation}
This is the exact result (\ref{S1S2exact}), here retrieved diagrammatically within the improved tree approximation.
A priori there could be higher-order corrections $O(\epsilon^2)$ on the r.h.s.\ of (\ref{S1S2epsilon}), coming from
loop diagrams. However, the definition (\ref{DeltaDef}) of $\Delta(u)$ as a physical observable effectively resums an infinite number of loop diagrams. The same diagrams then arise on both sides of Eq.\ (\ref{S1S2epsilon}), and the result (\ref{S1S2exact}) is exact.
\medskip
\paragraph*{Second moment:} Let us now consider the computation of $\langle S_1^2 S_2\rangle_{\rho_W^c}$. We first need to compute $C^{(2,1)}(w_1,w_2,w_3)$. Diagramamtically it is given by
\begin{widetext}
\begin{eqnarray} \label{thirdMomDiagram}
&& C^{(2,1)}(w_1,w_2,w_3) \nonumber \\ \nonumber \\
&& = 2\, {\rm Sym}_{w_1 \leftrightarrow w_2} \left( \hspace{0.25cm} \begin{gathered}
\begin{fmffile}{thirdMom}
\begin{fmfgraph*}(50,30)
\fmfleft{i1,i2}
\fmfforce{0w,1h}{i2}
\fmfforce{0w,0h}{i1}
\fmfforce{0.5w,1h}{o2}
\fmfforce{0.5w,0h}{o1}
\fmfforce{1w,0.5h}{o3}
\fmfforce{0.5w,0.5h}{v1}
\fmfforce{1w,1h}{o4}
\fmf{plain }{i2,i1}
\fmf{dashes}{i1,o1}
\fmf{plain}{o1,v1,o2}
\fmf{dbl_dashes}{v1,o3}
\fmf{plain}{o3,o4}
\fmflabel{$w_2 \approx 0 $}{i2}
\fmflabel{$w_1 \approx 0$}{o2}
\fmflabel{$w_3 \approx W$}{o4}
\end{fmfgraph*}
\end{fmffile}
\end{gathered}
\hspace{1.5cm} + \hspace{1.5cm} \begin{gathered}
\begin{fmffile}{thirdMom2}
\begin{fmfgraph*}(50,30)
\fmfleft{i1,i2}
\fmfforce{0w,1h}{i2}
\fmfforce{0w,0h}{i1}
\fmfforce{0.5w,1h}{o2}
\fmfforce{0.5w,0h}{o1}
\fmfforce{1w,0.5h}{o3}
\fmfforce{0.5w,0.5h}{v1}
\fmfforce{1w,1h}{o4}
\fmf{plain }{i2,i1}
\fmf{dbl_dashes}{i1,o1}
\fmf{plain}{o1,v1,o2}
\fmf{dashes}{v1,o3}
\fmf{plain}{o3,o4}
\fmflabel{$w_3 \approx W$}{i2}
\fmflabel{$w_1 \approx 0$}{o2}
\fmflabel{$w_2 \approx 0$}{o4}
\end{fmfgraph*}
\end{fmffile}
\end{gathered} \hspace{1.5cm} + \hspace{1.5cm} \begin{gathered}
\begin{fmffile}{thirdMom3}
\begin{fmfgraph*}(50,30)
\fmfleft{i1,i2}
\fmfforce{0w,1h}{i2}
\fmfforce{0w,0h}{i1}
\fmfforce{0.5w,1h}{o2}
\fmfforce{0.5w,0h}{o1}
\fmfforce{1w,0.5h}{o3}
\fmfforce{0.5w,0.5h}{v1}
\fmfforce{1w,1h}{o4}
\fmf{plain }{i2,i1}
\fmf{dbl_dashes}{i1,o1}
\fmf{plain}{o1,v1,o2}
\fmf{dbl_dashes}{v1,o3}
\fmf{plain}{o3,o4}
\fmflabel{$w_2 \approx 0$}{i2}
\fmflabel{$w_3 \approx W $}{o2}
\fmflabel{$w_1 \approx 0$}{o4}
\end{fmfgraph*}
\end{fmffile}
\end{gathered} \hspace{1cm} \right) \nonumber \\
&& \nonumber \\
&& = \frac{2 }{L^d m^8} {\rm Sym}_{w_1 \leftrightarrow w_2}\Big[ \Delta(w_1-w_2)\Delta'(w_1-w_3) + \Delta(w_1-w_3)\Delta'(w_1-w_2) + \Delta(w_3-w_2)\Delta'(w_3-w_1) \Big]
\end{eqnarray}
\end{widetext}
In doing the ${\cal K}$ operation to go from $C^{(2,1)}$ to $K^{(2,1)}_W$, these diagrams are not equivalent. At order $\delta_1 \delta_2$ that we are interested in, the first term leads to $4 \frac{\Delta'(0^+)}{m^4}\frac{\Delta''(W)}{L^d m^4} \delta_1\delta_2$, the second to $2 \frac{\Delta'(0^+)}{m^4}\frac{\Delta''(W)}{L^d m^4} \delta_1\delta_2$, whereas the third one is of order $O(\delta_1^2 \delta_2)$ and does not contribute. Using Eq.~(\ref{chainRule}) we conclude that
\begin{equation} \label{resS12S2}
L^{-2d} \langle S_1^2 S_2 \rangle_{\rho_W^c} = 6 \frac{\Delta'(0^+)}{m^4} \frac{ \Delta''(W)}{L^d m^4} + O(\epsilon^2) \ .
\end{equation}
\paragraph*{General rules for diagrams:} The last example is rather instructive for the three general rules:
(i) the only diagrams that contribute to the Kolmogorov cumulant $K_W^{(n,m)}(\delta_1 , \delta_2)$ at order $\delta_1 \delta_2$ contain a single double-dashed vertex (that is a single disorder interaction vertex connecting the two disjoint sets of points at $w \approx 0$ and $w \approx W$);
(ii) this vertex becomes a $\Delta''(W)$ at order $\delta_1 \delta_2$;
(iii) the other interaction vertices are between (almost) coinciding points, and produce a factor of $\Delta'(0^+)$ at order $\delta_1 \delta_2$. These rules are discussed in Appendix~\ref{app:DiagramRule}. As a result, diagrams contributing to the two-shock moments consist of diagrams reminiscent of the one-shock case (i.e.\ they contain only $\Delta'(0^+)$ vertices) linked together by an interaction vertex $- \frac{\Delta''(W)}{L^d m^4}$.
\subsection{Generating function for all moments}
Let us now use the above rules and give a diagrammatic computation of $Z_W^c(\lambda_1,\lambda_2)=\hat Z_W^c(\lambda_1 , \lambda_2) $ defined in Eq.~(\ref{defhatZc}).
To this aim, let us first introduce a diagrammatic notation for $Z(\lambda)$ defined in Eq.~(\ref{Z1shock1}):
\begin{equation} \label{Zdiagram}
Z(\lambda) = \begin{gathered}
\begin{fmffile}{Z1}
\begin{fmfgraph*}(50,30)
\fmfforce{0.25w,1h}{i2}
\fmfforce{0.25w,0.3h}{i1}
\fmfforce{0.75w,1h}{i3}
\fmfforce{0.75w,0.3h}{i4}
\fmfforce{0.650w,0.9h}{e1}
\fmfforce{0.35w,0.9h}{e2}
\fmfforce{0.5w,0.3h}{o1}
\fmf{plain }{i2,i1}
\fmf{plain }{i3,i4}
\fmf{dots}{e1,e2}
\fmfblob{0.5w}{o1}
\end{fmfgraph*}
\end{fmffile}
\end{gathered} \ .
\end{equation}
We have emphasized using dots that there is an arbitrary number of external legs at the top of the diagrams summed in Eq.~(\ref{Zdiagram}). Using the expansion (\ref{expand})
and following the rules explained in the previous section, the diagrams entering in $\hat Z_W^c(\lambda_1 , \lambda_2) $ are made of two trees linked by a single doubled dashed line. It is the sum of all tree diagrams for avalanches at $w=0$, times all tree diagrams for avalanches at $w=W$, linked together by a single $- \frac{\Delta''(W)}{L^d m^4}$ inserted between any pair of
points belonging to each tree. This can be represented as
\vspace{0.1cm}
\begin{eqnarray} \label{ZWdiagram}
Z_W^c(\lambda_1,\lambda_2)&=&\hat Z_W^c(\lambda_1 , \lambda_2) \nonumber \\\nonumber \\ \nonumber \\
& =& \begin{gathered}
\begin{fmffile}{ZW}
\begin{fmfgraph*}(50,30)
\fmfforce{0.25w,1h}{i12}
\fmfforce{0.25w,0.3h}{i11}
\fmfforce{0.75w,1h}{i13}
\fmfforce{0.75w,0.3h}{i14}
\fmfforce{0.650w,0.9h}{e11}
\fmfforce{0.35w,0.9h}{e12}
\fmfforce{0.5w,0.3h}{o11}
\fmf{plain }{i12,i11}
\fmf{plain }{i13,i14}
\fmf{dots}{e11,e12}
\fmfblob{0.5w}{o11}
\fmfforce{1.25w,1h}{i22}
\fmfforce{1.25w,0.3h}{i21}
\fmfforce{1.75w,1h}{i23}
\fmfforce{1.75w,0.3h}{i24}
\fmfforce{1.650w,0.9h}{e21}
\fmfforce{1.35w,0.9h}{e22}
\fmfforce{1.5w,0.3h}{o21}
\fmf{plain }{i22,i21}
\fmf{plain }{i23,i24}
\fmf{dots}{e21,e22}
\fmfblob{0.5w}{o21}
\fmfforce{0w,-0.9h}{i32}
\fmfforce{0w,-1.6h}{i31}
\fmfforce{0.5w,-0.9h}{i33}
\fmfforce{0.5w,-1.6h}{i34}
\fmfforce{0.4w,-1h}{e31}
\fmfforce{0.1w,-1h}{e32}
\fmfforce{0.25w,-1.6h}{o31}
\fmf{plain }{i32,i31}
\fmf{plain }{i33,i34}
\fmf{dots}{e31,e32}
\fmfblob{0.5w}{o31}
\fmfforce{0w,-0.9h}{i32}
\fmfforce{0w,-1.6h}{i31}
\fmfforce{0.5w,-0.9h}{i33}
\fmfforce{0.5w,-1.6h}{i34}
\fmfforce{0.4w,-1h}{e31}
\fmfforce{0.1w,-1h}{e32}
\fmfforce{0.25w,-1.6h}{o31}
\fmf{plain }{i32,i31}
\fmf{plain }{i33,i34}
\fmf{dots}{e31,e32}
\fmfblob{0.5w}{o31}
\fmfforce{1.5w,-0.9h}{i42}
\fmfforce{1.5w,-1.6h}{i41}
\fmfforce{2w,-0.9h}{i43}
\fmfforce{2w,-1.6h}{i44}
\fmfforce{1.9w,-1h}{e41}
\fmfforce{1.6w,-1h}{e42}
\fmfforce{1.75w,-1.6h}{o41}
\fmf{plain }{i42,i41}
\fmf{plain }{i43,i44}
\fmf{dots}{e41,e42}
\fmfblob{0.5w}{o41}
\fmfforce{0.5w, -0.2}{x1}
\fmfforce{1.5w, -0.2}{x2}
\fmf{dbl_dashes}{i42,i33}
\fmf{plain}{x1,i33}
\fmf{plain}{x2,i42}
\fmfv{decor.shape=circle,decor.filled=full,
decor.size=0.05w}{i33}
\fmfv{decor.shape=circle,decor.filled=full,
decor.size=0.05w}{i42}
\fmfforce{0.5w , 1h}{lab1}
\fmfforce{1.15w , 1.1h}{lab2}
\fmfforce{0.27w , -0.39h}{lab3}
\fmfforce{1.57w , -0.39h}{lab4}
\fmflabel{$w \approx 0$}{lab1}
\fmflabel{$w \approx W$}{lab2}
\fmflabel{$w \approx 0$}{lab3}
\fmflabel{$w \approx W$}{lab4}
\end{fmfgraph*}
\end{fmffile}
\end{gathered}\hspace{2.5cm} \ . ~~~~~~~
\end{eqnarray}
\vspace{2cm}
\noindent
The diagrams above the point of insertion of $\Delta''(W)$ on the left are given by $Z(\lambda_1)$. The terms below are all the diagrams in $Z(\lambda_1)$ with an arbitrary external leg selected, that is $\frac{d Z(\lambda_1)}{d \lambda_1}$. A similar contribution arises on the right-hand side. Hence we arrive at the result
\begin{eqnarray} \label{Zcres}
Z_W^c(\lambda_1 , \lambda_2) &=& - \frac{\Delta''(W)}{L^d m^4} Z(\lambda_1) \frac{d Z(\lambda_1)}{d \lambda_1} Z(\lambda_2) \frac{d Z(\lambda_2)}{d \lambda_2} \nonumber \\
&& + O(\epsilon^2)
\end{eqnarray}
In terms of $Z_W(\lambda_1 , \lambda_2)$ this result reads
\begin{eqnarray} \label{Zres}
Z_W(\lambda_1 , \lambda_2)& =& Z(\lambda_1) Z(\lambda_2) \\
&& - \frac{\Delta''(W)}{L^d m^4} Z(\lambda_1) \frac{d Z(\lambda_1)}{d \lambda_1} Z(\lambda_2) \frac{d Z(\lambda_2)}{d \lambda_2} \ . \nonumber
\end{eqnarray}
It is correct to $O(\epsilon)$ if one takes into account the $O(\epsilon)$ corrections to $Z(\lambda)$. Expanding the result (\ref{Zcres}) one obtains the moments $\langle S_1^nS_2^m\rangle_{\rho_W^c}$:
\begin{eqnarray} \label{momentRes}
\lefteqn{ \langle S_1^n S_2^m\rangle_{\rho_W^c } = -\frac{\Delta''(W)}{L^{3d} m^4} n! m! } \\
&& \times\sum_{p = 0}^{n-1} \sum_{q = 0}^{m-1}\frac{ \langle S^{n-p} \rangle_{\rho} \langle S^{p+1} \rangle_{\rho}\langle S^{m-q} \rangle_{\rho} \langle S^{q+1} \rangle_{\rho} }{(n-p)!p!(m-q)!q!} + O(\epsilon^2) \ . \nonumber
\end{eqnarray}
The diagrammatic interpretation of this result is straightforward: to construct an arbitrary diagram contributing to $\langle S_1^n S_2^m\rangle_{\rho_W^c }$, one must first choose $p \leq n-1$ external legs on the left that will be below the point of insertion of $- \frac{\Delta''(W)}{L^d m^4}$ (there must be at least one leg above this point of insertion). In the ${\cal K}$ operation, all those points lead to a term that contributes to $\langle S^p \rangle_{\rho}$. The combinatorial term accounts for the $C^{n}_p$ possible choices. Note that this result was derived using the heuristic diagrammatic rules developed in the preceding section. We observe that:
(i) It correctly reproduces the results for the small-order moments (\ref{S1S2epsilon}) and (\ref{resS12S2}). We checked that it leads to $\langle S_1^3 S_2 \rangle_{\rho_W^c}= - 60 \frac{\Delta''(W)}{L^d m^4} S_m^2$ and $\langle S_1^2 S_2^2 \rangle_{\rho_W^c}= - 27 \frac{\Delta''(W)}{L^d m^4} S_m^2$, which can also be derived from the expression for $\hat C^{(4)}(w_1,w_2,w_3,w_4)$ given e.g.\ in formula (61) of Ref.~\cite{LeDoussalWiese2008c}.
(ii) We give in Appendix \ref{app:C-D} an alternative derivation of Eq.~(\ref{Zres}) that uses the Carraro-Duchon formalism \cite{CarraroDuchon1998,LeDoussalWiese2011b}.
(iii) We give in Appendix \ref{app:Algebraic} a derivation using a saddle-point calculation within the effective action (\ref{Action3}). This also yields the local structure of correlations studied in Section~\ref{Sec:Local}.
\subsection{Results for the densities}
To infer $\rho_W$ from Eq.~(\ref{Zres}), we first note the identity $Z(\lambda) \frac{d Z(\lambda)}{d \lambda} = \frac{1}{2S_m} \frac{d}{d\lambda}\left( Z(\lambda) - \lambda \right)$, derived from the self-consistent equation (\ref{1shockResult}) for $Z(\lambda)$. Differentiating $L^{-d} \int dS (e^{\lambda S} -1 ) \rho(S) = Z(\lambda)$ with respect to $\lambda$ and using $\langle S \rangle_{\rho} =L^d$ yields
\begin{equation}
L^{-d} \int dS (e^{\lambda S} -1 ) S \rho(S) =\frac{d}{d\lambda}\left[ Z(\lambda) - \lambda \right] \ .
\end{equation}
Finally, using Eqs.\ (\ref{Z2shocks1}) and (\ref{Zres}),
we obtain
\begin{equation} \label{resRho}
\rho_W(S_1,S_2) = \rho(S_1)\rho(S_2) \left( 1 - \frac{\Delta''(W)}{L^d m^4} \frac{S_1S_2}{4S_m^2}\right) \ .
\end{equation}
This is our main result for the two-schock density, already announced in Eq.~(\ref{MainResult}) of the introduction. It can be used to extract a variety of physical observables.
\paragraph*{Mean number of pairs of shocks:}
Integrating over $S_1$ and $S_2$, we obtain two equivalent formulas for $\rho_2(W)$:
\begin{eqnarray} \label{resRho2}
\rho_2(W) & =& \rho_0^2 - \frac{\Delta''(W)}{L^d m^4} \frac{L^{2d}}{4S_m^2} \\
& = &\rho_0^2\left[1- \frac{\Delta''(W)}{L^d m^4} \left(\frac{\langle S \rangle_P}{2S_m} \right)^{\!2} \right] \nonumber \ .
\end{eqnarray}
Hence, although both $\rho_0$ and $\rho_2(W)$ are non-universal and dominated by the non-universal small avalanche size cutoff $S_0$ discussed in Sec.~\ref{subsec:Probabilities}, the connected density $\rho_2(W)- \rho_0^2$ does not depend on $S_0$ and is universal.
\paragraph*{Normalized probability distribution:}
The above results allow us to express the probability distribution $P_W(S_1,S_2) = \frac{\rho_W(S_1,S_2)}{\rho_2(W)} $
to $O(\epsilon)$ accuracy as
\begin{eqnarray}
\lefteqn{ P_W(S_1,S_2) =} \nonumber \\
&& P(S_1) P(S_2) \left[ 1 - \frac{\Delta''(W)}{4 S_m^2 L^d m^4} \Big(S_1S_2 - \langle S \rangle_P^2\Big) \right]\ . ~~~~~
\end{eqnarray}
\paragraph*{Conditional probability distribution:}
Another PDF of interest is the conditional probability to have a shock with amplitude $S_2$, given that there was a shock of amplitude $S_1$ at a distance $W$ before. To $O(\epsilon)$ accuracy
\begin{eqnarray}
P_W(S_2|S_1) &=& \frac{P_W(S_1,S_2)}{ \int dS_2 P_W(S_1,S_2) } \\
& =& P(S_2) \left[1 - \frac{\Delta''(W) S_1}{4 S_m^2 L^d m^4} \Big(S_2 - \langle S \rangle_P \Big) \right] \ .\nonumber
\end{eqnarray}
Its mean value, normalized by $\left< S\right>_P$, is
\begin{equation}
\frac{\langle S_2 | S_1 \rangle}{\langle S \rangle_P} = 1 - \frac{\Delta''(W) S_1}{4 S_m^2 L^d m^4} \Big(2 S_m - \langle S \rangle_P\Big) \ .
\end{equation}
\paragraph*{Second shock marginal:}
The probability for the size $S_2$ of a
second shock at $W$, given that there was a shock at $0$, is
\begin{eqnarray}
P_W(S_2) &=& \int dS_1 P_W(S_1,S_2) \nonumber \\
& =& P(S_2) \left[1 - \frac{\Delta''(W) \langle S \rangle_P }{4 S_m^2 L^d m^4}
\Big( S_2 - \langle S \rangle_P\Big) \right] \ . \nonumber \\
\end{eqnarray}
The normalized mean value of the second shock is
\begin{equation} \label{S2}
\frac{\langle S_2 \rangle_W}{\langle S \rangle_P} = 1 - \frac{\Delta''(W) \langle S \rangle_P}{4 S_m^2 L^d m^4} \Big(2 S_m - \langle S \rangle_P\Big) \ .
\end{equation}
\subsection{Analysis of the results} \label{subsec:Analysis}
\paragraph*{Sign of the correlations:} As discussed in Sec.~\ref{SubSec:Delta}, the sign of the correlations (positively or negatively correlated shock sizes) solely depends on the sign of $\Delta''(W)$, which depends on the distance $W$ and on the universality class of the problem. The above results thus unveil a rich phenomenology for the correlations as pictured in Fig.~\ref{fig:Cartoon}.
\paragraph*{Range of validity:} The result (\ref{Zcres}) was obtained in the framework of the $\epsilon$ expansion. The results for the connected part of the correlations are by definition the first non-zero terms in this expansion, since they were obtained within the improved tree approximation, and they appear at $O(\epsilon)$. As a perturbative result, it is by definition controlled for $\epsilon \to 0$. For finite $\epsilon$, the predictions should be accurate as long as the corrections to the mean-field behavior are small. This is worth emphasizing, since the moments $\langle S_1^nS_2^m\rangle_{\rho_W}$ predicted by the formula (\ref{momentRes}) become negative for large $(n,m)$, signaling a breakdown of the improved tree approximation. This is also the case of the two-shock density computed at the improved tree level in Eq.~(\ref{resRho}) which becomes negative at large $S_i$. There the approximation is not controlled anymore since $O(\epsilon)$ corrections are larger than the mean-field result. Let us see when this occurs: Using the simple estimate $\Delta''(W)\approx |\Delta'(0^+)|/W_{\mu}$, where $W_\mu$ is the length of order $\mu^{-\zeta}$ on which $\Delta(W)$ decays, see below, and $|\Delta'(0^+)|=m^4 S_m$, the bound $\rho(S_1,S_2)>0$ is violated if
\begin{equation}
1 \lesssim \frac{S_m} {W_\mu \mu^{-d}}\times \frac1{(\mu L)^d} \times \frac{S_1 S_2}{4S_m^2} \ .
\end{equation}
The first factor is a dimensionless number of order $O(\epsilon)$ near $d=d_{{\rm uc}}$. The second vanishes in the thermodynamic limit of $L\to \infty$. Thus the bound can only be violated if $S_1 S_2/S_m^2$ compensates this factor. This can only be achieved if at least one of the avalanches is either system-spanning, or far out in the tail of the distribution, i.e. the bound is only violated for very unlikely events.
Note however that the exact result (\ref{S1S2exact}) is protected from being negative since
\begin{equation}
L^{-2d}\langle S_1 S_2 \rangle_{\rho_W} = 1 - \frac{\Delta''(W)}{L^d m^4} = \overline{\partial_w u(w) \partial_w u(W+w)}\ ,
\end{equation}
and $\partial_w u(w)$ is always positive since $u(w)$ is monotonically increasing as a function of $w$. The latter can be shown rigorously using a stability argument: Writing that $u_x(w)$ is a stable minimum of the Hamiltonian (\ref{Hamiltonian1}) implies for all $x$ two equations, namely $\frac{\delta {\cal H}[u,w]}{\delta u(x)}=0$, and
$\frac{\delta^2 {\cal H}[u,w]}{\delta u(x) \delta u(y)}\ge 0$. Specifying the second equation to $x=y$, we obtain
\begin{eqnarray} \label{80}
&& m^2[u_x(w) - w] + \partial_u V(u_x(w) , x) = 0 \ , \\
&& m^2 + \partial_u^2 V(u_x(w) , x) \geq 0 . \label{81}
\end{eqnarray}
Taking a derivative of Eq.~(\ref{80}) w.r.t.\ $w$, solving for $\partial_w u_x(w)$, and using Eq.~(\ref{81}) implies
\begin{equation}
\partial_w u_x(w) =\frac1{1 +m^{-2} \partial_u^2 V(u_x(w) , x)} \geq 0\ .
\end{equation}
\paragraph*{Comparison with experiments and numerics:} Though our predictions rely on the analysis of the model (\ref{Hamiltonian1}), they were obtained using FRG and thus we expect Eqs.\ (\ref{Zcres}) and (\ref{momentRes}) to be valid for all models in the same universality class. All our results, namely
Eq. (\ref{momentRes}) and Eqs. (\ref{resRho})-(\ref{S2}), contain the combination
$\frac{\Delta''(W)}{L^d m^4}$. On one hand it can be used to give a result to order $O(\epsilon)$ in
the form of a universal function (see below). On the other hand all quantities entering the r.h.s of these
equations can be measured directly in an experiment or in a numerical simulation. Indeed we recall that
\begin{equation} S_m:=\frac{ \langle S^2 \rangle_P}{ 2 \langle S \rangle_P} \equiv \frac{ \langle S^2 \rangle_{\rho}}{ 2 \langle S \rangle_{\rho}}
\end{equation}
and the combination
\begin{equation} \label{85}
\frac{\Delta''(W)}{L^dm^4} = \partial_W^2 \overline{[u(w) -w][u(w+W) -w -W]}^c
\end{equation}
can both be measured and do not require to know the mass $m$ which might be hard to identify. The computation of this second derivative then gives a precise characterization of the amplitude of the correlations through the exact formula (\ref{S1S2exact2}). The accuracy of the $\epsilon$ expansion and universality can then be tested against
the formulas given in the previous section.
\paragraph*{Universal function:} Using rescaled quantities we can
rewrite our main result as (see Eq.~(\ref{DeltaRescaled}) and Sec.~\ref{SubSec:Delta})
\begin{equation}
\rho_W^c(S_1,S_2) = \frac{1}{(L \mu)^d} \frac{L^{2d}}{S_m^4}
{\cal F}_d\Big(\frac{W}{W_\mu}, \frac{S_1}{S_m} , \frac{S_2}{S_m}\Big) \label{eps2}
\end{equation}
where the function ${\cal F}_d$ is universal and depends only on the space dimension.
To first order in $d=d_{\rm uc} -\epsilon$, it is given by
\begin{equation}
{\cal F}(w, s_1 , s_2) \simeq \frac{A_d \Delta^{* \prime \prime}(w)}{16 \pi \sqrt{s_1 s_2} } e^{-(s_1+s_2)/4}
+ O(\epsilon^2)
\end{equation}
in the limit of large $L$ and small $\mu$ and $A_d$ was given in Eq.~(\ref{1loopIntegral}). Here $ \Delta^{* \prime \prime}(w)$ is the universal fixed point of the FRG equation, normalized to
$\Delta^*(0)=\epsilon$. Indeed, for small $m$ the rescaled renormalized disorder correlator of the system $\tilde{\Delta}(w)$, appearing in Eq.~(\ref{DeltaRescaled}), is close to one of the fixed points of the FRG equation: $\tilde{\Delta}(w) \simeq \tilde{\Delta}^{*}(w)$. For non-periodic disorder, the latter can be expressed using one constant $\kappa$ as $\tilde \Delta^*(w)= \kappa^2 \Delta^*(w/\kappa)$ (see Sec.~\ref{SubSec:Delta}). The parameter $\kappa$ is thus the
single non-universal constant in our formula. The scales
in Eq. (\ref{eps2}) are then given by
\begin{equation} \label{scalingWm}
W_{\mu} \simeq \kappa \mu^{-\zeta} \ ,\qquad S_m \simeq A_d \kappa \Delta^{* \prime}(0^+) \mu^{-(d + \zeta)}
\end{equation}
for small $\mu$. We remind that $m = \mu^{\gamma/2}$. We have defined all quantities such that their expressions are the most simple ones, independent of $\gamma$. With the above normalization, to order $\epsilon$,
$ \Delta^{* \prime}(0^+) = \sqrt{\epsilon(\epsilon-2 \zeta)}$ and
$ \Delta^{* \prime \prime}(0) = \frac{2 \epsilon}{9}$.
\paragraph*{Locality:} Note that in the result (\ref{eps2}) the amplitude
of the correlation is inversely proportional to $N = (L\mu)^d$, the number of elastically independent degrees of freedom of the interface. This is a signature of the local nature of the correlations. For two shocks a distance $W$ apart, there is a probability of order $1/N$ that they occur in the same region of space. To go further
into this locality property and to remove this bias
we investigate in the next section the correlations between the local shock sizes.
\section{Local structure of correlations} \label{Sec:Local}
In this section we analyze the correlations between the local shock sizes. We start by deriving a general formula for the correlations between the local shock sizes measured on an arbitrary subset of the internal space of the interface. To this aim we define
\begin{equation}
S_1^{\phi_1} = \int_x S_{1x} \phi_{1x} \ , \qquad S_2^{\phi_2} = \int_x S_{2x} \phi_{2x}\ ,
\end{equation}
where $\phi_1$ and $\phi_2$ are two arbitrary test functions. Two extreme cases are $\phi_{1x} =1$: in this case $S_1^{\phi_1} = S_1$, and the observable is the total size studied in the precedent section. The other extreme is $\phi_{1x} = \delta^d(x-x_1)$, for which $S_{1}^{\phi_1} = S_{1x_1}$ is the local size at $x=x_1$.
\subsection{Reminder: one-shock case}
Here we briefly recall the essential definitions and results given in Refs.\ \cite{LeDoussalWiese2008c,LeDoussalWiese2011b} on the density and generating function associated to the local one-shock size statistics. For a general test function $\phi$ we introduce
\begin{eqnarray}
\rho^{\phi}(S^{\phi}) &:=& \overline{ \sum_i \delta ( S^{(i),\phi} - S^{\phi}) \delta(w_i-w) } \ , \nonumber \\
Z^{\phi}(\lambda) &:=& \frac{1}{\int_x \phi_x}\langle e^{\lambda S^{\phi}} -1 \rangle_{\rho^{\phi}} \ , \nonumber \\
\hat Z^{\phi}(\lambda) &:=& Z^{\phi}(\lambda) - \lambda \ ,
\end{eqnarray}
where $\langle ... \rangle_{\rho^{\phi}}$ denotes the average with respect to $\rho^{\phi}$. Note that $\hat Z^{\phi}$ has no linear term, since the first moment of $\rho^{\phi}$ is due to STS
\begin{equation}
\langle S^{\phi} \rangle_{\rho^{\phi}} = \int_{x} \phi_x \ .
\end{equation}
The generating function $\hat Z^{\phi}(\lambda)$ is obtained from the replica field theory using the exact relation
\begin{equation}
\hat Z^{\phi}(\lambda) = \frac{1}{\int_x \phi_x} \partial_{\delta} \overline{e^{\int_x \phi_x [u_x(w+\delta) -u_x(w) - \delta ] }}|_{\delta=0^+} \ .
\end{equation}
It was shown in Refs.~\cite{LeDoussalWiese2008c,LeDoussalWiese2011b} that $Z^{\phi}(\lambda)$ can be written as
\begin{equation}
Z^{\phi}(\lambda)= \frac{\int_x Z_x^{\phi} (\lambda)}{\int_x \phi_x} \ ,
\end{equation}
where, at the improved-tree-theory level, $Z^{\phi}_x(\lambda)$ satisfies the following self-consistent equation
\begin{equation} \label{local:selfcons}
Z^{\phi}_x(\lambda) = \lambda \phi_x + \sigma \int_{yy'} g_{x-y} g_{x-y'} Z^{\phi}_y(\lambda) Z^{\phi}_{y'}(\lambda) \ .
\end{equation}
The quantity $\sigma = -\Delta'(0^+)$ was defined in Eq.~(\ref{defsigma}).
\subsection{Two-shock case: Notation and diagrammatic result}
\paragraph*{Densities and generating functions:} Consider
\begin{widetext}
\begin{equation}
\rho_{W}^{\phi^1 \phi^2}(S_1^{\phi^1} , S_2^{\phi^2} ) := \overline{\sum_{i\neq j} \delta(w-w_i) \delta(S_1^{\phi^1}-S^{(i),\phi^1}) \delta(w+W-w_j) \delta(S_2^{\phi^2}-S^{(j),\phi^2}) } \ . \nonumber
\end{equation}
The generating functions are
\begin{align} \label{local:hatZ}
& Z_W^{\phi^1\phi^2} := \frac{1}{\int_x \phi^1_x\int_x \phi^2_x}\left< \left(e^{\lambda_1 S_1^{\phi^1}} -1\right)\left(e^{\lambda_2 S_2^{\phi^2}} -1\right) \right>_{\!\rho^{\phi^1\phi^2}_W} \\
& \hat Z^{\phi^1\phi^2}_{w_2-w_1}(\lambda_1,\lambda_2 ) := \frac{1}{\int_x \phi^1_x\int_x \phi^2_x} \lim_{\delta_1, \delta_2 \to 0^+} \partial_{\delta_1 , \delta_2} \overline{ e^{\int_x \phi^1_x \lambda_1[\hat u_x(w_1+\delta_1) - \hat u_x(w_1) ]} e^{ \int_x \phi^2_x \lambda_2[\hat u_x(w_2+\delta_2) - \hat u_x(w_2) ]}} \ ,
\end{align}
\end{widetext}
where $\langle ... \rangle_{\rho^{\phi^1\phi^2}_W}$ denotes the average with respect to $\rho_{W}^{\phi^1 \phi^2}$. The following relation holds
\begin{eqnarray} \label{local:hatZandZ}
Z_W^{\phi^1\phi^2}(\lambda_1, \lambda_2 )& =& \hat{Z}_W^{\phi^1\phi^2} (\lambda_1 , \lambda_2 ) + Z^{\phi^1}(\lambda_1) \lambda_2 \nonumber \\
&& + \lambda_1 Z^{\phi^2}(\lambda_2) - \lambda_1 \lambda_2 \ .
\end{eqnarray}
(These relations are a consequence of Appendix \ref{app:Gene}). The connected equivalents of the previous definitions are constructed as in the previous section for the correlations between the total sizes; for example
\begin{equation}
\rho^{c; \phi^1 \phi^2}_W (S_1^{\phi^1} , S_2^{\phi^2} ) = \rho^{ \phi^1 \phi^2}_W (S_1^{\phi^1} , S_2^{\phi^2} ) - \rho^{\phi^1 } (S_1^{\phi^1} )\rho^{\phi^2 }( S_2^{\phi^2} ),
\end{equation}
and we note $\langle ... \rangle_{\rho^{c;\phi^1\phi^2}_W}$ the average w.r.t.\ $\rho_{W}^{c;\phi^1 \phi^2}$.
\paragraph*{Simplified notation for averages:} In order that these somewhat complicated notations
do not obscure our results,
we introduce simplified notations for averages. We first note that
\begin{equation}
\rho_{W}^{\phi^1 \phi^2}(S_1^{\phi^1} , S_2^{\phi^2} ) = \rho_2(W) {\cal P}(S_1^{\phi^1} , S_2^{\phi^2} ),
\end{equation}
where $\rho_2(W)$ is as before the density of a pair of shocks and ${\cal P}(S_1^{\phi^1} , S_2^{\phi^2} )$ denotes the probability, given that two shocks occured at a distance $W$, that their local sizes measured with respect to $\phi^1$ and $\phi^2$ are $S_1^{\phi^1}$ and $S_2^{\phi^2}$. We have
dropped the dependence of ${\cal P}$ on $\phi^1$ and $\phi^2$ to alleviate our notations.
We also note arbitrary moments as
\begin{eqnarray}
\langle \langle (S_1^{\phi1})^n (S_2^{\phi^2})^m \rangle \rangle_{\rho_W} &:=& \langle (S_1^{\phi1})^n (S_2^{\phi^2})^m \rangle_{\rho_{W}^{\phi^1 \phi^2}} \\
\langle \langle (S_1^{\phi1})^n (S_2^{\phi^2})^m \rangle \rangle_{\rho_W^c} &:=& \langle (S_1^{\phi1})^n (S_2^{\phi^2})^m \rangle_{\rho_{W}^{c;\phi^1 \phi^2}} . ~~~~~~~
\end{eqnarray}
We indicate the dependence on the choice of $\phi^1$ and $\phi^2$ only inside the average, and not in the measure. A moment of the form $\langle \langle (S_1^{\phi1})^n (S_2^{\phi^2})^m \rangle \rangle_{\rho_W}$ is thus equal to the product of $\rho_2(W)$ and of the mean value of $(S_1^{\phi1})^n (S_2^{\phi^2})^m$ for shocks at a distance $W$, given that two such shocks occurred.
\paragraph*{Diagrammatic result:} In Appendix \ref{app:Algebraic} we compute these generating functions by a direct evaluation of Eq.~(\ref{local:hatZ}) using a saddle-point calculation on the effective action (\ref{Action3}). Alternatively, from a diagrammatic point of view, the result can be adapted from the reasoning that led to $ Z_{W}(\lambda_1,\lambda_2 )$ by {\it keeping track of the space dependence in the different vertices, propagators and sources in the diagram} (\ref{ZWdiagram}). Following Eq.~(\ref{Zdiagram}), we represent
$Z_x^{\phi}(\lambda)$ as
\vspace{0.2cm}
\begin{equation} \label{ZLocdiagram}
Z_x^{\phi}(\lambda) = \begin{gathered}
\begin{fmffile}{Z1loc}
\begin{fmfgraph*}(50,30)
\fmfforce{0.25w,1h}{i2}
\fmfforce{0.25w,0.3h}{i1}
\fmfforce{0.75w,1h}{i3}
\fmfforce{0.75w,0.3h}{i4}
\fmfforce{0.650w,0.9h}{e1}
\fmfforce{0.35w,0.9h}{e2}
\fmfforce{0.5w,0.3h}{o1}
\fmf{plain }{i2,i1}
\fmf{plain }{i3,i4}
\fmf{dots}{e1,e2}
\fmfblob{0.5w}{o1}
\fmfforce{0.5w , 1h}{lab1}
\fmfforce{0.5w , -0.12h}{lab2}
\fmfv{decor.shape=circle,decor.filled=full,
decor.size=0.07w}{lab2}
\fmflabel{$\phi$}{lab1}
\fmflabel{$x$}{lab2}
\end{fmfgraph*}
\end{fmffile}
\end{gathered} \ .
\end{equation}
\vspace{0.3cm}
\noindent
The same diagram without the marked point $x$ is also used to represent $\int_x Z_x^{\phi}(\lambda)$, itself equal to $\int_x \phi_x \times Z^{\phi}(\lambda)$. Then, as before, $\hat Z^{\phi^1 \phi^2}_{W}(\lambda_1,\lambda_2 )$ is the sum of a connected and a disconnected part:
\begin{equation}\label{localDisc}
\hat Z^{\phi^1 \phi^2}_{W}(\lambda_1,\lambda_2 ) = \hat Z^{\phi^1}(\lambda_1) \hat Z^{\phi^2}(\lambda_2) + \hat Z^{c,\phi^1 \phi^2}_{W}(\lambda_1,\lambda_2 ) \ .
\end{equation}
The connected part $\hat Z^{c;\phi^1 \phi^2}_{W}(\lambda_1,\lambda_2 )$ is
\vspace{0.5cm}
\begin{eqnarray} \label{ZWlocaldiagram}
\lefteqn{ \hat Z^{c;\phi^1 \phi^2}_{W}(\lambda_1,\lambda_2 )} \nonumber \\
&& = \frac{1}{\int_x \phi^1_x \int_x \phi^2_x } \times \rule[-25mm]{0mm}{25mm}{\begin{gathered}
\begin{fmffile}{ZWlocal}
\begin{fmfgraph*}(50,30)
\fmfforce{0.25w,1h}{i12}
\fmfforce{0.25w,0.3h}{i11}
\fmfforce{0.75w,1h}{i13}
\fmfforce{0.75w,0.3h}{i14}
\fmfforce{0.650w,0.9h}{e11}
\fmfforce{0.35w,0.9h}{e12}
\fmfforce{0.5w,0.3h}{o11}
\fmf{plain }{i12,i11}
\fmf{plain }{i13,i14}
\fmf{dots}{e11,e12}
\fmfblob{0.5w}{o11}
\fmfforce{1.25w,1h}{i22}
\fmfforce{1.25w,0.3h}{i21}
\fmfforce{1.75w,1h}{i23}
\fmfforce{1.75w,0.3h}{i24}
\fmfforce{1.650w,0.9h}{e21}
\fmfforce{1.35w,0.9h}{e22}
\fmfforce{1.5w,0.3h}{o21}
\fmf{plain }{i22,i21}
\fmf{plain }{i23,i24}
\fmf{dots}{e21,e22}
\fmfblob{0.5w}{o21}
\fmfforce{0w,-0.9h}{i32}
\fmfforce{0w,-1.6h}{i31}
\fmfforce{0.5w,-0.9h}{i33}
\fmfforce{0.5w,-1.6h}{i34}
\fmfforce{0.4w,-1h}{e31}
\fmfforce{0.1w,-1h}{e32}
\fmfforce{0.25w,-1.6h}{o31}
\fmf{plain }{i32,i31}
\fmf{plain }{i33,i34}
\fmf{dots}{e31,e32}
\fmfblob{0.5w}{o31}
\fmfforce{0w,-0.9h}{i32}
\fmfforce{0w,-1.6h}{i31}
\fmfforce{0.5w,-0.9h}{i33}
\fmfforce{0.5w,-1.6h}{i34}
\fmfforce{0.4w,-1h}{e31}
\fmfforce{0.1w,-1h}{e32}
\fmfforce{0.25w,-1.6h}{o31}
\fmf{plain }{i32,i31}
\fmf{plain }{i33,i34}
\fmf{dots}{e31,e32}
\fmfblob{0.5w}{o31}
\fmfforce{1.5w,-0.9h}{i42}
\fmfforce{1.5w,-1.6h}{i41}
\fmfforce{2w,-0.9h}{i43}
\fmfforce{2w,-1.6h}{i44}
\fmfforce{1.9w,-1h}{e41}
\fmfforce{1.6w,-1h}{e42}
\fmfforce{1.75w,-1.6h}{o41}
\fmf{plain }{i42,i41}
\fmf{plain }{i43,i44}
\fmf{dots}{e41,e42}
\fmfblob{0.5w}{o41}
\fmfforce{0.5w, -0.2}{x1}
\fmfforce{1.5w, -0.2}{x2}
\fmf{dbl_dashes}{i42,i33}
\fmf{plain}{x1,i33}
\fmf{plain}{x2,i42}
\fmfv{decor.shape=circle,decor.filled=full,
decor.size=0.07w}{i33}
\fmfv{decor.shape=circle,decor.filled=full,
decor.size=0.07w}{i42}
\fmfforce{0.5w , 1h}{lab1}
\fmfforce{1.15w , 1.1h}{lab2}
\fmfforce{0.27w , -0.39h}{lab3}
\fmfforce{1.57w , -0.39h}{lab4}
\fmflabel{$\phi_1; w \approx 0$}{lab1}
\fmflabel{$\phi_2;w \approx W$}{lab2}
\fmflabel{$\phi_1;w \approx 0$}{lab3}
\fmflabel{$\phi_2;w \approx W$}{lab4}
\fmfforce{0.5w , -0.12h}{r1}
\fmfv{decor.shape=circle,decor.filled=full,
decor.size=0.07w}{r1}
\fmfforce{1.5w , -0.12h}{r2}
\fmfv{decor.shape=circle,decor.filled=full,
decor.size=0.07w}{r2}
\fmfforce{0.6w , -0.1h}{r1bis}
\fmfforce{1.12w , -0.1h}{r2bis}
\fmflabel{$x_1$}{r1bis}
\fmflabel{$x_2$}{r2bis}
\fmfforce{0.57w,-0.9h}{i33bis}
\fmfforce{1.27w,-0.9h}{i42bis}
\fmflabel{$z$}{i33bis}
\fmflabel{$z$}{i42bis}
\end{fmfgraph*}
\end{fmffile}
\end{gathered} \hspace{3.9cm}}
\end{eqnarray}
It can be written as
\begin{eqnarray} \label{localZc} \nonumber
&& \hat Z^{c,\phi^1 \phi^2}_{W}(\lambda_1,\lambda_2 ) = - \frac{\Delta''(W)}{\int_x \phi^1_x \int_x \phi^2_x } \\
&& \int_{z x_1 x_2 y_1 y_2} g_{zx_1} Z_{x_1}^{\phi^1}(\lambda_1) \frac{ \delta Z^{\phi^1}_{y_1}(\lambda_1)}{\lambda_1 \delta \phi^1_z} g_{zx_2} Z_{x_2}^{\phi^2}(\lambda_2) \frac{ \delta Z^{\phi^2}_{y_2}(\lambda_2)}{\lambda_2 \delta \phi^2_z} \nonumber \\
&& + O(\epsilon^2) \ .
\end{eqnarray}
We note that it is possible to obtain a more explicit formula for avalanches measured on parallel hyperplanes, see Appendix \ref{app:ZlocHyperplane}. In the next section we focus on the first moments which already contain valuable information.
\subsection{First moments: arbitrary sources and kernels}
The first moments of $\rho^{c;\phi^1 \phi^2}_W$ are obtained from the combination of Eqs.~(\ref{local:hatZ}), (\ref{local:hatZandZ}), (\ref{localDisc}) and (\ref{localZc}). One first needs the series expansion for $ Z^{\phi}_x(\lambda)$. It is obtained from Eq.~(\ref{local:selfcons}) at arbitrary order in $\lambda$; here we give it up to order $3$:
\begin{eqnarray}
\lefteqn{Z^{\phi}_x(\lambda) = \lambda \phi_x + \lambda^2 \sigma \int_{yy'} g_{x-y} g_{x-y'} \phi_y \phi_{y'}} \\
&& +2\lambda^3 \sigma^2 \int_{yy'zz'} g_{x-y}g_{x-y'} g_{y-z}g_{y-z'} \phi_z \phi_{z'} \phi_{y'} + O(\lambda^4) \nonumber
\end{eqnarray}
Hence
\begin{eqnarray}
\lefteqn{ \frac{\delta Z_x^{\phi}}{\lambda \delta \phi_u} = \delta(x-u) + 2 \lambda \sigma \int_{y}g_{x-y} g_{x-u} \phi_y }\nonumber \\
&& + 2 \lambda^2 \sigma^2 \left(2 \int_{yy'z} g_{x-y}g_{x-y'} g_{y-z}g_{y-u} \phi_z \phi_{y'} \right. \nonumber \\
&& \left . + \int_{yzz'} g_{x-y}g_{x-u} g_{y-z}g_{y-z'} \phi_z \phi_{z'} \right) + O(\lambda^3)\ .~~~~~~~~~~~
\end{eqnarray}
We then obtain from Eq.~(\ref{localZc}) the local version of the exact result (\ref{S1S2exactIntro}), namely \footnote{The result (\ref{S1S2loc}) can simply be turned into an exact one if one introduces the bi-local part of the renormalized disorder correlator $\Delta_{x_2-x_1}(w_1-w_2) = m^4 \overline{[u_{x_1}(w_1) -w_1][u_{x_2}(w_2) -w_2]}$ (see also \cite{LeDoussal2008}) and proceeds as in Sec.~\ref{Subsec:FirstMom}. The result (\ref{S1S2loc}) can then be understood as the lowest-order approximation of $\Delta_{x_2-x_1}(w)$ in terms of $\Delta(w)$.}
\begin{eqnarray} \label{S1S2loc}
\frac{\langle \langle S_1^{\phi^1} S_2^{\phi^2} \rangle \rangle_{\rho^{c}_W}}{\int_{x} \phi^1_x\int_{x} \phi^2_x } &=& - \frac{\Delta''(W) }{\int_{x} \phi^1_x\int_{x} \phi^2_x } \int_{z x_1 x_2} g_{z-x_1} g_{z-x_2}\phi^1_{x_1} \phi^2_{x_2} \nonumber \\
&&+ O(\epsilon^2)\ .
\end{eqnarray}
Let us also give the result for the third-order moment,
\begin{eqnarray} \nonumber
\lefteqn{\frac{\langle \langle (S_1^{\phi^1})^2 S_2^{\phi^2} \rangle \rangle^c_{\rho^{c}_W}}{\int_{x} \phi^1_x\int_{x} \phi^2_x } = -\frac{\Delta''(W) }{\int_{x} \phi^1_x\int_{x} \phi^2_x }\sigma \times } \\
&& \bigg( 4 \int_{z x_1 x_2 y_1 t_1} g_{z-x_1} g_{z-x_2} g_{y_1-t_1} g_{y_1-z} \phi^1_{x_1} \phi^1_{t_1} \phi^2_{x_2} \nonumber \\
&& \left. +2 \int_{z x_1 x_2 t_1 t_1'} g_{z-x_1} g_{z-x_2} g_{x_1 -t_1} g_{x_1- t_1'} \phi^1_{t_1} \phi^1_{t_1'} \phi^2_{x_2} \right) \nonumber \\
&& + O(\epsilon^2) \ .
\end{eqnarray}
\subsection{First moment: correlations between the local shock sizes for short-ranged elasticity.}
Let us now give the precise form of the first connected moment for an interface with the short-ranged elasticity (\ref{short-rangedKernel}) and for correlations between the local avalanche sizes at two points $x_1$ and $x_2$. We choose $\phi^1_x = \delta^d(x-x_1)$ and $\phi^2_x = \delta^d(x-x_2)$ and note $x = |x_1-x_2|$ the distance between the two points. Thus $S_1^{\phi^1} = S_{1x_1}$ and $S_2^{\phi^2} = S_{2x_2}$. We obtain
\begin{eqnarray} \label{S1S2locSR}
\lefteqn{\langle \langle S_{1x_1} S_{2x_2} \rangle \rangle_{\rho^{c}_W} = - \Delta''(W) \int_{q} e^{iq(x_1-x_2)} g_q g_{-q} } \nonumber \\
&&= - \Delta''(W) m^{d-4} 2^{-\frac{d}{2}-1} \pi ^{-\frac{d}{2}} (m x)^{2-\frac{d}{2}} K_{2-\frac{d}{2}}(m x) \nonumber \\
&& =_{x=0} - \Delta''(W) 2^{-d} \pi ^{-\frac{d}{2}} m^{d-4} \Gamma \left(2-\frac{d}{2}\right) \nonumber \\
&& \simeq_{x \gg 1/m} -\Delta''(W) 2^{-\frac{d}{2}-\frac{3}{2}} \pi ^{\frac{1}{2}-\frac{d}{2}} m^{\frac{d-5}{2}} x^{\frac{3}{2}-\frac{d}{2}} e^{-m x} \ , ~~~~~~~\label{110}
\end{eqnarray}
where $K_n(x)$ denotes a modified Bessel function of the second kind. Note that integrating this formula yields an exact result,
\begin{equation}
\int_{x_1 , x_2} \langle \langle S_{1x_1} S_{2x_2} \rangle \rangle_{\rho^{c}_W} = \langle S_1 S_2 \rangle_{\rho^{c}_W} = - L^d\frac{\Delta''(W)}{m^4} \ .
\end{equation}
This is equivalent to Eq.\ (\ref{S1S2exact2}), which is {\em exact}. We thus expect Eq.\ (\ref{110}) to be quite accurate even for large values of $\epsilon$.
As expected, we observe that the amplitude of the correlations decays exponentially beyond the length $L_m=1/m$. For smaller distances they decay algebraically with an exponent that depends on the dimension:
\begin{eqnarray}
\lefteqn{ \langle \langle S_{1x_1} S_{2 x_1+x}\rangle \rangle_{\rho^{c}_W} -\langle \langle S_{1x_1} S_{2x_1} \rangle \rangle_{\rho^{c}_W} } \nonumber \\
&& \simeq_{d=1} \frac{\Delta''(W)}{8 m} x^2 + O(x^3) \nonumber \\
&& \simeq_{d=2} - \frac{\Delta''(W)}{16 \pi} \Big[2 \gamma_{\rm E} -1 + 2 \log(mx/2)\Big]x^2 \nonumber \\
&& \simeq_{d=3} \frac{\Delta''(W)}{8 \pi} x + O(x^2) \ .
\end{eqnarray}
Finally, to emphasize the universal nature of Eq.~(\ref{S1S2locSR}), we note that it can be rewritten, using the notations of Sec.~\ref{subsec:Analysis} and introducing a new universal scaling function ${\cal F}^{11}_d(w , x)$, as
\begin{eqnarray}
\langle \langle S_{1x_1} S_{2x_2} \rangle \rangle_{\rho^{c}_W} &=& {\cal F}^{11}_d( \frac{W}{W_{\mu}}, m|x_1-x_2| ) \\
{\cal F}^{11}_d(w , x) &=& - 2^{-\frac{d}{2}-1} \pi ^{-\frac{d}{2}} A_d \Delta^{* \prime \prime} (w) x^{2-\frac{d}{2}} K_{2-\frac{d}{2}}(x) \nonumber \\
&& + O(\epsilon^2) \ .
\end{eqnarray}
\subsection{First moment: correlations between the local shock sizes for long-ranged elasticity.}
Let us now study the correlations between local avalanche sizes (we choose again $\phi^1_x = \delta^d(x-x_1)$ and $\phi^2_x = \delta^d(x-x_2)$ with $|x_1-x_2|=x$) for the case of long-ranged elasticity using the kernel (\ref{long-rangedKernel}) with $\gamma = 1$. Then the result for the first connected moment is
\begin{eqnarray}
\langle \langle S_{1x_1} S_{2x_2} \rangle \rangle_{\rho^{c}_W} & =& - \Delta''(W) \frac{\mu ^{d-2}}{(2 \pi )^{\frac{d}{2}} } (\mu x)^{1-\frac{d}{2}} K_{1-\frac{d}{2}}(x \mu ) \nonumber \\
&& =_{d=1} \frac{e^{-\mu x}}{2 \mu} \ .
\end{eqnarray}
As the previous formula for short-ranged elasticity, this formula should be rather accurate for the experimentally relevant case of $d=1$ (in this case $\epsilon=1$). We again observe an exponential decay of the correlations beyond the length $L_\mu=1/\mu$. However, here the correlations are constant at small distances, a signature of the long-range nature of the elasticity. As before, the universal nature of this result can be emphasized by introducing a universal scaling function ${\cal F}^{11}_{d,{\rm LR}}(w , y)$:
\begin{align}
&\langle \langle S_{1x_1} S_{2x_2} \rangle \rangle_{\rho^{c}_W} ={\cal F}^{11}_{d,{\rm LR}} \left(\frac{W}{W_{\mu}} , \mu |x_1-x_2| \right) \\
& {\cal F}^{11}_d(w , x) = - (2 \pi )^{-\frac{d}{2}} A_d \Delta^{* \prime \prime} (w) x^{1-\frac{d}{2}} K_{1-\frac{d}{2}}(x) + O(\epsilon^2) \nonumber \ ,
\end{align}
where we used the same notations as in Sec.~\ref{subsec:Analysis}.
\section{Measurement of correlations in simulations of $d=0$ toy models.} \label{Sec:Numerics}
\subsection{Models and goals}
In this section we compare our results with numerical simulations of toy models of a particle in a discrete random potential. The position of the particle can only take integer values $u \in \mathbb{N}$ and its Hamiltonian is
\begin{equation}
{\cal H}_V[u;w]=V(u) + \frac{1}{2} m^2(u-w)^2 \ ,
\end{equation}
where $V$ is a random potential. We consider two distributions for the random potential mimicking the two non-periodic static universality classes of interfaces models:
\paragraph*{RB model:} The first model is a toy model for the Random-Bond universality class with short-ranged correlated disorder where the random potentials $V(i)$ at each site $i \in \mathbb{N}$, are chosen as independent, centered and normalized Gaussian random variables.
\paragraph*{RF model:} The second model is a toy model for the Random-Field universality class where $V(0)=0$ and for $i \geq 1$, $V(i) = -\sum_{j=1}^{i} F(j)$; the random forces $F(i)$ at each site $i \in \mathbb{N}$ are chosen as independent, centered and normalized random variables. Thus $V(i)$ is a random walk with Gaussian increments.
In the RB model we choose the mass as $m_{\rm RB} = 0.01$ and in the RF model as $m_{\rm RF} = 0.02$. With these parameters, the probability $\rho_0$ to trigger a shock when moving $w \to w+1$ is $\rho_0^{\rm RF} = (6.959 \pm 0.001)\times 10^{-3} $ and $\rho_0^{\rm RB} = (9.471 \pm 0.001) \times 10^{-3} $. These small
values of the masses ensure that the models efficiently approximate our continuum model in $d=0$, and that the particle optimizes its energy over a large number of random variables. We perform averages over $10$ simulations of environments of size $N = 5 \times 10^8$ sites. We obtain excellent statistics for various observables studied in this work, including $\rho_2(W)$, $\Delta(W)$ measured using Eq.~(\ref{DeltaDef}), $\langle S_1 S_2 \rangle_{\rho_W}$ and $\langle S_1^2 S_2 \rangle_{\rho_W}$.
Let us emphasize that these simulations are more a proof of principle to motivate simulations on higher dimensional models and measurements in experiments, than a full test of the results obtained in this article.
This said, our simulations allow us to verify the exact result (\ref{S1S2exact}) to a very high accuracy.
Second, although $d=0$ is at a large value of $\epsilon$ in the $d=4-\epsilon$ expansion, the FRG equation and the associated fixed-point functions for random-field disorder are known to behave quite similarly \cite{LeDoussalWiese2008a,LeDoussalWieseChauve2003}. For random-bond disorder we expect less universality since $\Delta(u)$ is non-universal in $d=0$;
nevertherless the relations between the correlation and $\Delta(u)$ are
interesting to investigate, in particular the sign of the correlations.
\subsection{Numerical Results: RB model}
Using the definition (\ref{DeltaDef}) we measure the renormalized disorder correlator. The result is shown in Fig.~\ref{fig:RBDelta}. Using an interpolation of the result with a polynomial of degree $10$, we obtain a smooth version that is later used to compute its second derivative $\Delta''(u)$ which appears in our analysis as the central object controlling the amplitude of the correlations. Some measured properties are: $\Delta(0) \approx 3.34 \times 10^{-5}$, $\Delta''(0) \approx 6.78 \times 10^{-9}$; $\Delta(76.2) \approx 0$, $\Delta''(215) \approx 0 $; the position of the minimum and the value at the minimum: $\Delta(148 .2) \approx -7.3 \times 10^{-6}$, $\Delta''(274,4) \approx -5.1 \times 10^{-10}$. This is compared with the measurement of $\langle S_1 S_2 \rangle_{\rho_W}$ using the exact result (\ref{S1S2exact}), see Fig.~\ref{fig:RBexact}. We obtain a perfect agreement.
From a qualitative perspective, we note the following:
(i) We observe the predicted crossover from anti-correlated shocks at small distances $(W <215)$ to positively correlated shocks at large distances.
(ii) The correlations are far from being negligible: by definition $\frac{ \langle S_1S_2 \rangle_{\rho_W^c} }{\langle S \rangle_{\rho^2}}>-1$, while we observe $\frac{ \langle S_1S_2 \rangle_{\rho_{W \approx 0}^c} }{\langle S \rangle_{\rho}^2} \approx -0.6$, an indication that the shocks in this toy model are strongly correlated.
\begin{figure}
\centerline{\includegraphics[width=8.5cm]{RBDelta}}
\caption{Renormalized disorder $\Delta(u)$ measured in the $d=0$ RB toy model. Inset: its second derivative $\Delta''(u)$, computed using a numerical fit of the measured $\Delta(u)$.}
\label{fig:RBDelta}
\end{figure}
\begin{figure}
\centerline{\includegraphics[width=8.5cm]{RBexact}}
\caption{Comparison between the measurement of the normalized moment $\frac{ \langle S_1S_2 \rangle_{\rho_W^c} }{\langle S \rangle_{\rho}^2}$ (blue dots) and the prediction from the exact result (\ref{S1S2exact}) using the measurement of $\Delta(u)$ (red curve) in the RB toy model. The agreement is perfect as expected.}
\label{fig:RBexact}
\end{figure}
We now check the predictions obtained using the $\epsilon$ expansion. We first measure $\rho_2(W)$ and compare it with the result (\ref{resRho2}), see Fig.~\ref{fig:RBrho}. We obtain a surprisingly good agreement between the two curves, considering that $\epsilon=4$. We also measure $\langle S_1^2 S_2 \rangle_{\rho_W}$ and compare it with the result (\ref{resS12S2}), see Fig.~\ref{fig:RB21}. Here the discrepancy is large for smaller
values of $W$,
a fact that can be anticipated since our result predicts $\frac{ \langle S_1^2S_2 \rangle_{\rho_W^c} }{\langle S^2 \rangle_{\rho} \langle S \rangle_{\rho}}<-1$ at small $W$, which is unphysical. This discrepancy keeps increasing with higher-order moments. However the sign of the correlation, and its
value for large $W$ is quite well predicted.
\begin{figure}
\centerline{\includegraphics[width=8.5cm]{RBrho}}
\caption{Comparison between the measurement of $\rho_2(W)$ (blue dots) and the prediction from the $O(\epsilon)$ result (\ref{resRho2}) using the measurement of $\Delta(u)$ (red curve) in the RB toy model. We obtain a surprisingly good agreement.}
\label{fig:RBrho}
\end{figure}
\begin{figure}
\centerline{\includegraphics[width=8.5cm]{RB21}}
\caption{Comparison between the measurement of the normalized moment $\frac{ \langle S_1^2S_2 \rangle_{\rho_W^c} }{\langle S^2 \rangle_{\rho} \langle S \rangle_{\rho}}$ (blue dots) and the prediction from the exact result (\ref{S1S2exact}) using the measurement of $\Delta(u)$ (red curve) in the RB toy model.}
\label{fig:RB21}
\end{figure}
\subsection{Numerical Results: RF model}
In Figs.~\ref{fig:RFDelta} to \ref{fig:RF21} we show the corresponding results for the RF toy model. They are similar except that as predicted in this type of model the shocks are {\em always anti-correlated}.
The value at the origin of the renormalized disorder correlator and of its second derivative are measured as $\Delta(0) \approx 3.4 \times 10^{-3}$, $\Delta''(0) \approx 9.4 \times 10^{-8}$. Once again we observe that these correlations are large, $\frac{ \langle S_1S_2 \rangle_{\rho_{W\approx 0}^c} }{\langle S \rangle_{\rho}^2} \approx -0.6$. We obtain a perfect agreement for the exact result $\langle S_1S_2 \rangle_{\rho_{W}}$, see Fig.~\ref{fig:RFexact}.
The agreement for
the $O(\epsilon)$ result for $\rho_2(W)$ (\ref{resRho2}) is surprisingly good (see Fig.~\ref{fig:RFrho}), whereas the $O(\epsilon)$ approximation breaks down for higher moments at small $W$ such as $\langle S_1^2S_2 \rangle_{\rho_W^c}$, see Fig.~\ref{fig:RF21}.
\begin{figure}
\centerline{\includegraphics[width=8.5cm]{RFDelta}}
\caption{Renormalized disorder $\Delta(u)$ measured in the $d=0$ RF toy model. Inset: its second derivative $\Delta''(u)$, computed using a numerical fit of the measured $\Delta(u)$.}
\label{fig:RFDelta}
\end{figure}
\begin{figure}
\centerline{\includegraphics[width=8.5cm]{RFexact}}
\caption{Comparison between the measurement of the normalized moment $\frac{ \langle S_1S_2 \rangle_{\rho_W^c} }{\langle S \rangle_{\rho}^2}$ (blue dots) and the prediction from the exact result (\ref{S1S2exact}) using the measurement of $\Delta(u)$ (red curve) in the RF toy model. The agreement is perfect as expected.}
\label{fig:RFexact}
\end{figure}
\begin{figure}
\centerline{\includegraphics[width=8.5cm]{RFrho}}
\caption{Comparison between the measurement of $\rho_2(W)$ (blue dots) and the prediction from the $O(\epsilon)$ result (\ref{resRho2}) using the measurement of $\Delta(u)$ (red curve) in the RF toy model. The agreement is surprisingly good.}
\label{fig:RFrho}
\end{figure}
\begin{figure}
\centerline{\includegraphics[width=8.5cm]{RF21}}
\caption{Comparison between the measurement of the normalized moment $\frac{ \langle S_1^2S_2 \rangle_{\rho_W^c} }{\langle S^2 \rangle_{\rho} \langle S \rangle_{\rho}}$ (blue dots) and the prediction from the $O(\epsilon)$ result (\ref{S1S2exact}) using the measurement of $\Delta(u)$ (red curve) in the RF toy model.}
\label{fig:RF21}
\end{figure}
\section{Conclusion}
In this paper we shed light on the fact that, for realistic models of elastic interfaces in a random medium below their upper critical dimension, correlations between (static) avalanches should always be expected. To do so we have studied the correlations between the size and location of shocks in the ground state of elastic interfaces in a random potential. We found the exact relation (\ref{S1S2exactIntro}) for the first connected moment that characterizes these correlations in terms of the renormalized disorder correlator, a universal quantity at the center of the FRG treatment of disordered elastic systems. Beyond the first cumulant, higher-order moments (\ref{Zcres}), (\ref{momentRes}) and the full joint density of shocks (\ref{resRho}) were computed using the FRG at first non-trivial order in the $\epsilon$ expansion. The local structure of these correlations was made precise through a study of local shock sizes. The qualitative phenomenology associated with these correlations clearly distinguishes between the Random-Bond and Random-Field universality classes. This was highlighted through a numerical simulation of $d=0$ toy models.
We expect our results to broadly apply to models in the universality class of the statics of disordered elastic systems. Concerning the dynamics, and avalanches at the depinning transition of elastic interfaces, we expect our results to be equivalently {\em applicable and accurate}. The derivation of the exact relation (\ref{S1S2exactIntro}) can easily be adapted to the dynamics by considering the quasi-static steady-state process of the position field of the interface instead of the position of its ground-state as was done in Ref.~\cite{LeDoussalWiese2012a}. For the results at the improved tree level, it is expected that both theories are equivalent for those observables \cite{LeDoussalWiese2012a}. The most important difference is that in the dynamics the Random-Bond universality class is unstable, and thus the observed correlations should always be of the Random-Field type (at least as long as the microscopic disorder is short-ranged).
For physical systems where the usual model of elastic interfaces is accurate, our results give a precise description of the correlations. Even if additional mechanisms generating correlations are present, such as in earthquake problems, correlations due to the short-ranged nature of the disorder as described in this work should be included in order to gain a quantitative understanding of the correlations due to these additional mechanisms.
\begin{acknowledgments}
We warmly thank Alexander Dobrinevski for numerous discussions. We acknowledge hospitality from the KITP in Santa Barbara where part of this work was conducted. This research was supported in part by the National Science Foundation under Grant No. NSF PHY11-25915. We acknowledge support from
PSL grant ANR-10-IDEX-0001-02-PSL.
\end{acknowledgments}
|
\section{Introduction}}
\IEEEPARstart{W}{ith} the growing feasibility of building large multi-locus data sets of genetic sequences, questions of how to best infer ancestral relationships between taxa have increasingly been viewed in the light of the multispecies coalescent model. This model describes the formation of \emph{gene trees} (or genealogies) relating orthologous loci within a \emph{species tree} composed of populations. It thus brings into phylogenetics an important model of population genetics, in order to capture the phenomenon of incomplete lineage sorting. While the coalescent framework still omits the possibility of non-tree-like relationships due to hybridization or lateral gene transfer, it allows incongruence across gene trees to be used to more accurately infer species trees in situations where incomplete lineage sorting is the dominant cause.
In principle it is straightforward to combine standard models of sequence evolution with the multispecies coalescent for inference of species trees under either a maximum likelihood or Bayesian framework. In practice, though, this is both computationally intensive and requires some additional assumptions --- most importantly, a means of relating the coalescent and mutation time scales --- that may or may not be reasonable. Such assumptions are not always highlighted in data analysis, even though they may include 1) a molecular clock operating for each gene tree, 2) constant population sizes over each branch of the species tree, and 3) a common mutation rate across gene trees, or
variants of these. It is also not clear to what extent existing software implementations have been applied to simulated data violating such assumptions, in order to understand their robustness. Finally, even accepting these assumptions, analyzing a many-gene many-taxon data set can be computationally infeasible using a standard approach.
Some inference approaches simplify the problem by first inferring individual gene trees by established phylogenetic methods, and then using these to infer a species tree. From the gene trees, one might use metric information, or only topologies, with or without a root. If one views the gene tree topologies as more robustly inferable than metric edge lengths, then two methods, STAR \cite{Liu2009}, and $\text{NJ}_{st}$ \cite{Liu2011}, are especially attractive. By not using any metric information from the gene trees, they elegantly circumvent issues of how one should relate the coalescent and mutational time scales.
They both encode gene tree topologies through special distance matrices, in what one might call a remetrization step, with STAR requiring rooted trees, and $\text{NJ}_{st}$ unrooted ones. The average of these matrices is then used as input to a standard metric tree-building algorithm to recover the species tree topology. (Though one obtains edges lengths as well as part of the process, their relationship to the true lengths on the species tree is not currently known.) All computations are both simple and fast, and accuracy on large datasets is competitive with the best current methods, as shown by the recent implementation and extension of $\text{NJ}_{st}$ in the software ASTRID \cite{ASTRIDWarnow}.
In \cite{Liu2009} and \cite{Liu2011} arguments were given establishing the statistical consistency of STAR and $\text{NJ}_{st}$ for 4-taxon trees. In \cite{adr2013} a rigorous proof of consistency was given for STAR and variants of it on arbitrarily large trees, along with a theoretical exploration of how the algorithm actually only required the distribution of clades on the gene trees. This recasts STAR as a clade consensus method attuned specifically to the multispecies coalescent model.
Here we obtain similar theoretical results for $\text{NJ}_{st}$. We first prove its statistical consistency under the multispecies coalescent model on arbitrary trees in Theorem \ref{thm:main}. Our proof is built on relating $\text{NJ}_{st}$ to a generalized STAR method as introduced in \cite{adr2013}, and deducing our results from those on STAR.
In Theorem \ref{thm:splitUSTAR} we show the method uses only information in the distribution of splits on gene trees, and not the more detailed information of the gene trees themselves. Thus we view it as a split consensus method designed specifically for inference of species trees under the multispecies coalescent model.
In Section \ref{sec:multi} we then discuss how one might apply the method to data that involves multiple samples from each taxon. We show the approach suggested by \cite{Liu2011} for such data can be problematic even in a simple case, but then give an alternative which is statistically consistent under certain sampling schemes.
Finally, we suggest a rechristening of $\text{NJ}_{st}$ as USTAR/NJ, for ``Unrooted STAR with Neighbor Joining.'' This both emphasizes the close relationship of the two methods, and emphasizes that one might perform the method with tree selection algorithms other than Neighbor Joining. Any statistically consistent method for selecting a metric tree from possibly non-ultrametric distance tables could be used in its place. For instance, USTAR/BIONJ \cite{BIONJ} uses a different purely algorithmic tree building method, while USTAR/FastME \cite{FastME} performs a hueristic search to optimize the balanced minimum evolution criterion to select a tree.
Indeed, the ASTRID software already allows one to apply such methods and \cite{ASTRIDWarnow} compares their performance.
\section{Notation and Terminology}
Let $\mathcal X$ be a finite set of $n$ taxa, which we denote by lower case letters $a,b,c,\dots$. For any specific gene, we denote a single sample from each taxon by the corresponding upper case letter $A,B,C,\dots$, with $\mathcal X_g$ the full set of such gene samples. If $\mathcal A\subseteq \mathcal X$ is a subset of taxa, the corresponding subset of genes is $\mathcal A_g\subseteq \mathcal X_g$. For example $\{a,b,c\}_g=\{A,B,C\}$.
By a species tree $\sigma=(\psi,\lambda)$ on $\mathcal X$ we mean a rooted topological tree with leaves bijectively labelled by $\mathcal X$, together with an assignment of edge weights $\lambda$ to its internal edges. These edge weights are specified in coalescent units, so that the multispecies coalescent model on $\sigma$ leads to a probability distribution on gene trees with leaves labelled by $\mathcal X_g$. (For a more precise definition of the multispecies coalescent as we use it, we direct the reader to \cite{adr2011a}.) The gene trees here are metric rooted
trees, though this probability distribution, by marginalization, also leads to ones on metric or topological, rooted or unrooted, gene trees. We denote rooted topological gene trees by $T^r$ and unrooted topological gene trees by $T$. The probability of an unrooted topological gene tree $T$ under the multipspecies coalescent on $\sigma$ is denoted $\mathbb P_\sigma(T)$.
A metric tree is called \emph{binary} if the underlying topological tree is binary and all internal edge lengths are positive.
\smallskip
A \emph{split} of a set of taxa $\mathcal X$ is a bipartition $\mathcal A |\mathcal B$ of $\mathcal X$ in which neither $\mathcal A$ nor $\mathcal B$ is empty. Note $\mathcal A |\mathcal B$ is the same split as $\mathcal B |\mathcal A$.
If $\sigma=(\psi,\lambda)$ is a species tree on $\mathcal X$ then
a \emph{split on $\sigma$} is a split of $\mathcal X$
formed by deleting a single edge of $\psi$ and grouping taxa according to the connected components of the resulting graph.
We similarly define splits of $\mathcal X_g$, and splits of $\mathcal X_g$ on a specific gene tree.
\section{USTAR methods}
Given an unrooted topological gene tree $T$ on $\mathcal X_g$, we may metrize it by giving all edges length 1. The distance $D_T(A,B)$ between any two gene samples $A,B$ on $T$ is then the number of edges in the path connecting them, \emph{i.e.}, the graph-theoretic distance. Fixing an ordering of the taxa, it is convenient to think of $D_T$ as an $n\times n$ matrix. In essence, we have simply encoded the topology of $T$ by the numerical matrix $D_T$.
In \cite{Liu2011}, the internodal distance, i.e., the number of nodes on the path in the tree between two taxa, is used to define a similar distance table. The graph-theoretic distance between taxa is always one more than the internodal distance, and it is straightforward to check that this difference between them has no essential impact on anything we do in this paper. We use the graph-theoretic distance here for its simple interpretation in terms of assigning edge lengths of 1, and its more direct connection to the notion of splits on the tree.
For a probability distribution $\mu$ on unrooted gene trees on $\mathcal X_g$, the expected value
$$D:=\mathbb E_\mu(D_T)=\sum_T \mu(T) D_T$$
defines a dissimilarity function on $\mathcal X_g$. Identifying $\mathcal X$ with $\mathcal X_g$, we call this the \emph{USTAR
dissimilarity on $\mathcal X$} with respect to $\mu$. For an empirically-obtained collection of gene trees, this dissimilarity is just the mean of the matrices $D_T$ for trees in the sample.
In this paper, we focus on the particular choice $\mu=\mathbb P_\sigma$, i.e., we use the probability of unrooted gene trees arising from the multispecies coalescent on a specific species tree $\sigma$, or an empirical distribution describing a sample from this theoretical one.
From the USTAR dissimilarity $D$ obtained from a gene tree distribution, one can construct or choose a tree on $\mathcal X$, using any of a variety of well-known methods --- \emph{e.g.}, UPGMA, Neighbor Joining, BIONJ, Balanced Minimum Evolution, etc. Discarding any edge lengths that might have been produced in the course of applying the tree selection method, yields a topological tree on $\mathcal X$. Thus we have a family of methods whose input is a theoretical or empirical distribution of unrooted topological gene trees, and output is a single unrooted topological tree on the taxa.
In particular, USTAR/NJ is the method obtained when Neighbor Joining is used, and coincides with $\text{NJ}_{st}$. The output of such a method can be viewed as an inferred species tree, but the validity of this view hinges on the question of whether the method is statistically consistent.
\medskip
USTAR methods can be helpfully viewed as related to generalized STAR methods developed in \cite{adr2013}, building on \cite{Liu2009}. STAR methods of inferring a species tree from \emph{rooted} gene trees similarly involve metrizing the gene trees and averaging the resulting pairwise distance matrices over a gene tree distribution. However the metrization is done as follows: For $n$ taxa, first choose a non-increasing sequence of node numbers $a_0\ge a_1\ge a_2\ge \dots\ge a_{n-2}\ge 0$, with at least one of these inequalities strict. Assign $a_0$ to the root, $a_1$ to its non-leaf children, $a_2$ to their non-leaf children, etc. Then interpret the assigned numbers as distances from the leaves in an ultrametric tree.
For the particular case of node numbers $n-3/2,n-2,n-3,n-4,\dots$, the generalized STAR metrization has the effect of giving length 1 to all internal edges of the rooted gene tree, except those incident to the root. However, if suppressing the root leads to a new internal edge in the unrooted version, the total length of that edge is 1. Thus after suppressing the root, all internal edges of the gene tree are given the same length as they would be by USTAR. However, lengths of pendant edges are different, as they are all 1 under USTAR and they vary to achieve ultrametricity under STAR.
\begin{ex}
\begin{figure}
\includegraphics[width=9cm]{fg_gt_ustar_numbering.eps}
\caption{ A gene tree ((A,B),((C,D),E)) (left) and its metrizations for the generalized STAR method discussed in the text (center), and USTAR (right).}\label{fig:example}
\end{figure}
Consider the 5-taxon gene tree $T^r=((A,B),((C,D),E))$ shown in Figure \ref{fig:example}. Viewing $T$ as an unrooted tree, with taxa ordered alphabetically, USTAR leads to the distance matrix
$$D_T=\begin{pmatrix}
0&2&4&4&3\\2&0&4&4&3\\4&4&0&2&3\\4&4&2&0&3\\3&3&3&3&0\end{pmatrix}.$$
Separating the contributions from internal and pendant edges, we can write
\begin{align*}
D_T&=D_T^{ui} +D^{up}_T\\
& =
\begin{pmatrix}
0&0&2&2&1\\0&0&2&2&1\\2&2&0&0&1\\2&2&0&0&1\\1&1&1&1&0
\end{pmatrix}+\begin{pmatrix}
0&2&2&2&2\\2&0&2&2&2\\2&2&0&2&2\\2&2&2&0&2\\2&2&2&2&0
\end{pmatrix}.
\end{align*}
Here `$ui$' and `$up$' refer to the `unrooted internal' end `unrooted pendant' edge contributions.
Viewing $T$ as a rooted tree, $T^r$, STAR with the node numbering given above, leads to the distance matrix
$$D^r_{T^r}=\begin{pmatrix}
0&6&7&7&7\\6&0&7&7&7\\7&7&0&4&6\\7&7&4&0&6\\7&7&6&6&0
\end{pmatrix}.$$
Again separating the contributions from internal and pendant edges of the unrooted tree, we have
\begin{align*}
D^r_{T^r}&=D_T^{ui} +D^{rp}_{T^r}\\
&= \begin{pmatrix}
0&0&2&2&1\\0&0&2&2&1\\2&2&0&0&1\\2&2&0&0&1\\1&1&1&1&0
\end{pmatrix}+\begin{pmatrix}
0&6&5&5&6\\6&0&5&5&6\\5&5&0&4&5\\5&5&4&0&5\\6&6&5&5&0
\end{pmatrix},
\end{align*}
where `$rp$' refers to the `rooted pendant' edge contributions.
For a general tree, the rooted pendant edge contributions may include some that arise from an internal edge incident to the root that becomes part of a pendant edge when the root is suppressed (such as when there is a single outgroup on the tree).
Note that the same contributions appears from the internal edges of the unrooted tree in both the USTAR and STAR distance matrices.
Our analysis of USTAR in the proof of Theorem \ref{thm:Udist} below will be based in the fact that, for the particular STAR numbering scheme where branches incident to the root have length 1/2 and all other internal branches have length 1, the distance matrices differ only in contributions from pendant edges.
\end{ex}
\section{Statistical consistency}
Our goal in this section is to prove the following:
\begin{thm} \label{thm:main}Let M denote any method of obtaining an unrooted topological tree from a dissimilarity function satisfying
\begin{enumerate}
\item $M$ applied to a tree metric returns the unique tree fitting it, and\label{cond:fit}
\item $M$ is continuous at tree metrics arising from binary trees. \label{cond:cont}
\end{enumerate}
Let
$\sigma=(\psi,\lambda)$ be a binary species tree on $\mathcal X$. Then USTAR/M is a statistically consistent method of inference of the unrooted topology of $\psi$ from gene trees under the multispecies coalescent model on $\sigma$. \end{thm}
Informally, the continuity required of the method $M$ in condition \eqref{cond:cont} means that when $M$ is applied to a sufficiently small perturbation of a binary tree metric, it returns the correct tree topology, and edge lengths close to those underlying the tree metric. As NJ is known to satisfy conditions \eqref{cond:fit} and \eqref{cond:cont}, we see that in particular USTAR/NJ is consistent. Since UPGMA does not, in general, satisfy condition \eqref{cond:fit} for non-ultrametric trees, the theorem does not apply to USTAR/UPGMA.
Theorem \ref{thm:main} is a consequence of the following.
\begin{thm} \label{thm:Udist}
The USTAR dissimilarity on $\mathcal X$ with respect to the probability distribution on unrooted topological gene trees arising from multispecies coalescent model on $\sigma=(\psi,\lambda)$, $D=\mathbb E_\sigma(D_T)$, exactly fits the unrooted species tree topology of $\psi$.
\end{thm}
\begin{proof}
Let $T^r$ denote a rooted gene tree topology. Consider the generalized STAR number scheme for rooted gene trees with node numbering sequence $n-3/2,n-2,n-3,n-4,\dots$. As discussed previously, when the root is suppressed on the STAR remetrized rooted gene tree $T^r$, all internal edges on the resulting unrooted tree have length 1. Using this node numbering scheme, let $D^r_{T^r}$ denote the STAR distance matrix for a remetrized rooted tree $T^r$, and $\mathbb E_\sigma(D^r_{T^r})$ its expected value under the distribution on rooted topological gene trees arising from the coalescent.
We now relate the STAR dissimilarities $D^r=\mathbb E_\sigma(D^r_{T^r})$ to those of USTAR, $D=\mathbb E_\sigma(D_T)$. Since both the rooted and unrooted schemes give each internal edge length 1 in the unrooted gene tree topology we can write
\begin{equation}
D_T=D^{ui}_T+D^{up}_T, \ \ \ D^r_{T^r}=D^{ui}_T+D^{rp}_{T^r}\label{eq:Dint}
\end{equation}
where $D^{ui}_T$ contains the contributions to distances from internal edges of the unrooted tree, $D^{up}_T$ contains contributions from pendant edges of the unrooted scheme, and $D^{rp}_{T^r}$ contains contributions from (unrooted tree) pendant edges in the rooted scheme.
Equations \eqref{eq:Dint} thus imply
\begin{equation}D_T= D^r_{T^r} +D^{up}_T- D^{rp}_{T^r}.\label{eq:Ddiff}
\end{equation}
Now the matrix $D^{up}_T$ is independent of $T$ and has a simple structure; all diagonal entries are 0, and all off-diagonal entries are $1+1=2$.
The matrix
$D^{rp}_T$, however, does depend on $T^r$. While it also has 0 in every diagonal entry, the off-diagonal entry in row $x$, column $y$ is $w_x+w_y$, where $w_x, w_y$ are the lengths assigned to the pendant edges to taxa $x,y$ after the root is suppressed on the remetrized ultrametric $T^r$.
Passing to expected values, we have from equation \eqref{eq:Ddiff} that
\begin{equation}
D= D^r +\mathbb E_\sigma(D^{up}_T) - \mathbb E_\sigma( D^{rp}_{T^r}).\label{eq:ED}
\end{equation}
By Theorem 3.2 of \cite{adr2013}, $D^r$ exactly fits the topology of the rooted species tree (ultrametrically), and hence for each choice of 4 taxa, with some permutation of their labels the 4-point condition
\begin{align}D^r(a,c)+D^r(b,d)&=D^r(a,d)+D^r(b,c)\notag\\
&\ge D^r(a,b)+D^r(c,d)\label{eq:Dr4}\end{align}
holds.
Now in the case that $a,b,c,d$ are all distinct, this implies
\begin{align}D(a,c)+D(b,d)&=D(a,d)+D(b,c)\notag\\
&\ge D(a,b)+D(c,d)\label{eq:Dr4b},\end{align}
since
by equation \eqref{eq:ED}, we have only added $2-\mathbb E(w_a+w_b+w_c+w_d)$ to the three sums in \eqref{eq:Dr4} to obtain \eqref{eq:Dr4b}.
If at most 3 of the taxa in the 4-point condition are distinct this last argument is not valid. However, if, say, $c=d$, the 4-point condition we need to establish degenerates to
$$D(a,c)+D(b,c)\ge D(a,b).$$
That this holds follows from the fact the corresponding inequality
holds for every tree metric, and in particular for each USTAR remetrization $D_T$, and hence for the expected value as well.
Thus the four point condition holds for $D$ for every set of 4 taxa, and it yields the same unrooted quartet topology as does $D^r$. Thus by standard results in \cite{SempleSteel} $D$ exactly fits the same unrooted tree topology as $D^r$, which is that of the species tree.
\end{proof}
\begin{proof}[Proof of Theorem \ref{thm:main}]
As the size of a sample of gene trees from the multispecies coalescent model on $\sigma$ increases, the empirical distribution of unrooted gene tree topologies approaches the exact one with probability 1, and thus the empirical USTAR dissimilarity approaches the theoretical one, $D$.
Since Theorem \ref{thm:Udist} and condition \eqref{cond:cont} ensures the method $M$ returns the correct tree when applied to $D$, condition \eqref{cond:fit} then implies with probability 1 USTAR/$M$ returns the correct unrooted species tree topology as the sample size increases to infinity. \end{proof}
\section{USTAR and splits}
Here we establish a relationship between the USTAR expected distance matrix and split probabilities, analogous to that given in \cite{adr2013} for STAR expected distances and clade probabilities.
As a consequence of this relationship, it is natural to view USTAR methods as a type of \emph{split consenus method}. Specifically, USTAR methods use only information on probabilities of splits on gene trees, and not the finer information of the gene tree topologies themselves.
The fact that USTAR uses only split frequencies, yet can produce statistically consistent inference for the coalescent model is notable, as other split methods lack this feature. For instance
greedy consensus \cite{bryant2003classification} accepts splits in order of decreasing frequency, if they are compatible with previously accepted splits.
Greedy consensus on clades has been proven inconsistent \cite{DegnanEtAl09}, though STAR can be viewed as a consistent clade consensus method \cite{adr2013}. The arguments in \cite{DegnanEtAl09} can be modified to give a similar result for greedy consensus on splits, with signs of inconsistent behavior also observed in simulations \cite{mirarab2014evaluating}. For consistency, a consensus method must be attuned to the model of tree variation, with USTAR and STAR being appropriate for the coalescent.
\medskip
Given any two leaves $A,B$ of a gene tree $T$, let $S_T^{A,B}$ denote the set of
splits of $T$ in which $A$ and $B$ are separated (\emph{i.e.}, in different bipartition sets).
Elements of $S_T^{A,B}$ correspond to the
edges of $T$ lying on the path from the $A$ to $B$,
so
\begin{equation} D_T(A,B) =|S_T^{A,B}|.
\label{eq:cd}
\end{equation}
This means on an individual gene tree the distances used
in USTAR are simply counts of `separating' splits, with gene samples being judged
further apart when there are more splits on $T$ which separate them.
Thus graph-theoretic distance might also be called `split separation distance.'
\medskip
Now for any distribution $\mu$ of
gene trees, if $\mathcal A|\mathcal B$ is a
split of $\mathcal X$, and $\mathbb P_\mu(\mathcal A|\mathcal B)$ denotes the
probability of the event that an observed gene tree displays split $\mathcal A_g|\mathcal B_g$, then
$$\mathbb P_\mu(\mathcal A|\mathcal B)=
\sum_{T \text{ displaying } \mathcal A_g|\mathcal B_g} \mathbb P_\mu (T).$$
\begin{thm}\label{thm:splitUSTAR}
For any distribution $\mu$ of gene trees, the collection of split probabilities $\{\mathbb P_\mu( \mathcal A|\mathcal B)\}$
determines $\mathbb E_\mu(D_T)$.
\end{thm}
\begin{proof} Define indicator functions
$$
I_{ \mathcal A|\mathcal B }(T) = \begin{cases} 1 &\text{if $T$ displays $ \mathcal A_g|\mathcal B_g$,}\\ 0 &\text{otherwise,} \end{cases}
$$
and
$$
J_{A,B} ( \mathcal A|\mathcal B) = \begin{cases} 1 &\text{if $A,B$ separated in $\mathcal A_g|\mathcal B_g$, }\\ 0 &\text{otherwise.} \end{cases}
$$
\medskip
Then using equation \eqref{eq:cd},
\begin{align}
\mathbb E_\mu(D_T(A,B)) &= \sum_{T} \mathbb P_\mu (T) \, D_T(A,B)\notag\\
&= \sum_{T} \mathbb P_\mu (T) \,\left |S_T^{A,B}\right |\notag\\
&= \sum_{T} \mathbb P_\mu (T) \left(\sum_{\text{splits} \atop \mathcal A|\mathcal B } I_{\mathcal A|\mathcal B }(T) J_{A,B} (\mathcal A|\mathcal B ) \right)\notag\\
&= \sum_{\text{splits} \atop \mathcal A|\mathcal B } \left( \sum_{T} \mathbb P_\mu (T) \, I_{\mathcal A|\mathcal B}(T) \right) J_{A,B} (\mathcal A|\mathcal B) \notag\\
&= \sum_{\text{splits} \atop \mathcal A|\mathcal B } \mathbb P_\mu (\mathcal A|\mathcal B ) J_{A,B} (\mathcal A|\mathcal B ),\label{eq:cprob}
\end{align}
so the USTAR dissimilarity is computable from split probabilities.
\end{proof}
Of course the distribution $\mu$ we have in mind here is either the one arising from the multispecies coalsecent model, or an empirical one from a sample from that model.
From Theorems \ref{thm:splitUSTAR} and \ref{thm:Udist} we immediately obtain the following:
\begin{cor}\label{cor:SplitID}
The unrooted species tree topology is identifiable from split
probabilities under the multispecies coalescent.
\end{cor}
It is known \cite{adr2011a} that the \emph{rooted} species tree topology is identifiable from the distribution of \emph{unrooted} gene tree topologies. It is also known that the rooted species tree topology is identifiable from clade probabilities. Thus a natural question is whether the split probabilities, the unrooted analogues of clade probabilities, can further identify the root on the species tree. Though our investigation here does not seem to shed light on this, we plan to address it in another work.
\section{USTAR with multiple samples per taxon}\label{sec:multi}
When $\text{NJ}_{st}$ was introduced in \cite{Liu2011}, a suggestion was given for how one might deal with gene trees relating multiple lineages sampled from each taxon.
For a collection $\mathcal T$ of gene trees, if $T\in \mathcal T$ relates $m_{a}(T)$ lineages sampled from taxon $a$ and $m_{b}(T)$ lineages from taxon $b$, then intertaxon distances were defined (up to an additive constant) as an average
\begin{equation}
D(a,b)=\frac{\displaystyle \sum_{T\in \mathcal T}\sum_{1\le i\le m_{a}(T)\atop 1\le j \le m_{b}(T)} D_T(A_{i},B_{j})}{\displaystyle \sum_{T\in \mathcal T}m_{a}(T)m_{b}(T) },\label{eq:Liumulti}
\end{equation}
where $D_T(A_{i},B_{j})$ denotes the graph theoretic distance on tree $T$ between the $i$th sample of gene $A$ and the $j$th of gene $B$.
Unfortunately, this approach is not statistically consistent. In fact, as the size of the sample of gene trees is increased, the probability of inferring the correct species tree can approach 0. After demonstrating this, we propose a different method of handling multiple samples per taxon, one that is statistically consistent.
\medskip
To investigate the behavior of formula \eqref{eq:Liumulti}, consider the species tree
$$((a,b),(c,d)),$$
with all branch lengths long enough that incomplete
lineage sorting between different taxa is vanishingly rare. Sample lineages for a large number of genes as follows: For 50\% of the genes, sample 3 lineages in each of taxa $a,b$ and 1 lineage in each of taxa $c,d$. In the other 50\% of genes, sample 1 lineage in taxa $a,b$ and 3 lineages in taxa $c,d$. For sufficiently long branch lengths on the species tree, the coalescent model gives that the sampled genes trees will be approximately equally of topologies $$( ( ((A,A),A), ((B,B),B) ),(C,D))$$ and $$((A,B),( ((C,C),C), ((D,D),D) ) ),$$
with an arbitrarily small fraction of gene trees of other topologies.
For the first of these gene tree topologies, after unrooting and assigning all edges the length 1, the different interlineage USTAR distances are
\begin{align*}
D_T(A_i,B_j)&= 6,6,6,6,5,5,5,5,4;\\
D_T(x,y)&=5,5,4, \text{for $x=A_i,B_j$, $y=C,D$};\\
D_T(C,D)&=2.
\end{align*} For the second tree, the same distances arise, but with the roles of $A,B$ interchanged with $C,D$.
Then formula \eqref{eq:Liumulti} gives intertaxon distances arbitrarily close to
\begin{align*}
D&(a,b)=D(c,d)\\
&= \frac{(.5)(6+6+6+6+5+5+5+5+4)+.5(2)}{.5(9)+.5(1)}=5\\
D&(x,y)=\frac{ .5(5+5+4)+.5(5+5+4)}{.5(3)+.5(3)}=\frac {14}3\\
&\hskip 5cm\text{ for $x=a,b$, $y=c,d$}.
\end{align*}
These intertaxon distances do not fit any unrooted topological tree, as they do not satisfy the four-point condition \cite{SempleSteel}. In fact, selection of a tree topology by applying (part of) the four-point condition requires computing
\begin{align*}
D(a,b)+D(c,d)&=5+5=10,\\
D(a,c)+D(b,d)&=\frac {14}3+\frac {14}3 =\frac{28}3 \\
D(a,d)+D(b,c)&=\frac {14}3+\frac {14}3 =\frac{28}3
\end{align*} and choosing the smallest to determine the cherries of the tree. Here the smallest is a tie, yielding the two incorrect topologies, $((a,c),(b,d))$ and $((a,d),(b,c))$. Neighbor Joining, which is built upon this selection criterion, would choose either of the incorrect topologies with equal probability, and then go onto compute positive lengths for the edges, obtaining either of the unrooted metric trees $((a\tc 2.333,c\tc 2.333)\tc 0.167,b\tc 2.333, d\tc 2.333)$ or $((a\tc 2.333,d\tc 2.333)\tc 0.167,b\tc 2.333, c\tc 2.333).$
Finite length edges on the species tree will only produce intertaxon distances arbitrarily close to those in the calculations above, with probability approaching 1 as the number of gene trees increases. However, continuity of the Neighbor Joining algorithm at these distances implies that the output of Neighbor Joining will be the wrong topology with probability approaching 1.
\medskip
A different approach to averaging than the one used in formula \eqref{eq:Liumulti} can however lead to statistically consistent inference of the species tree.
First, suppose multiple samples are drawn from taxa in exactly the same number for each gene. That is, there are integers $m_x\ge1$ so that each gene tree has $m_x$ leaves $X_1, X_2,\dots ,X_{m_x}$ for each $x\in \mathcal X$, for a total of
$\sum_{x\in \mathcal X} m_x$ leaves. We will refer to a specific choice of the numbers $(m_x)_{x\in \mathcal X}$ as a \emph{multisample scheme}.
For a single fixed multisample scheme, the results of previous sections apply if we replace the species tree by one where $m_x$ edges are attached to the leaf formerly labeled $x$ with the new leaves labeled $x_1, x_2,\dots, x_{m_x}$. (This is called the \emph{extended species tree} in \cite{adr2011b}.) While this tree is not binary, one can consider binary perturbations of it, and use continuity to conclude that
the expected USTAR dissimilarity on $\sum_x m_x$ taxa will exactly fit this tree. If one then defines $D(a,b)$ as the expectation of $D_T(A_1,B_1)$ for each $a,b\in \mathcal X$, or as the expectation of the average of $D_T(A_i,B_j)$ over $1\le i\le m_a$ and $1\le j\le m_b$, the expected dissimilarity on $\mathcal X$ is the same, as the $A_i$ lineages for various $i$ are exchangeable under the coalescent model. Since this expected dissimilarity must exactly fit the unrooted topology relating only the $X_1$ for $x\in \mathcal X$, it thus fits the unrooted topology relating the taxa in $\mathcal X$. Thus either retaining only one sample per taxon, or averaging over the lineages sampled from each taxon will lead to consistent inference. Since data sets have only a finite number of gene trees, by averaging the empirical $D_T(A_i,B_j)$ one would hope to improve one's estimate of the expected value, so we choose to do so. Moreover, one could obtain the same dissimilarity by averaging over samples for each gene tree $T$ individually, creating a USTAR dissimilarity matrix for $\mathcal X$ from one tree at a time, and then averaging over these.
Now suppose we specify a finite number of multisample schemes, as well as probabilities of using each one for any gene. Given a data set of gene trees obtained from such an approach, as described in the last paragraph one could apply a USTAR method averaged over multiple lineage samples to each subcollection of trees with the same multisample scheme.
But since the dissimilarity for each such subcollection in expectation approaches one fitting the species tree as the number of gene trees increases, then any weighted average of them over the multisample schemes does as well. This is a consequence of the dissimilarity arising from each subcollection satisfying the same four-point condition equality and inequalities, so a convex linear combination
of them does also. Thus with multisample schemes $(m_{x,s})_{x\in \mathcal X}$ for $1\le s \le S$, and any non-negative weighting constants $\alpha_s$, if we define an empirical dissimilarity as
\begin{equation}\hat D(a,b)=\sum_{1\le s\le S}\alpha_s \sum_ {T \text{ displaying }\atop(m_{x,s})} \frac 1{m_{a,s}m_{b,s}} \sum_{1\le i\le m_{a,s}\atop {1\le j\le n_{b,s}}} D_{T}(A_i,B_j)\label{eq:multi1}\end{equation}
then we will have consistent inference provided the number of gene trees for each scheme in the sum all go to infinity.
Choosing $\alpha_s=1/|\mathcal T|$ where $\mathcal T$ is the collection of gene trees yields our suggested formula
\begin{equation}\hat D(a,b)=\frac 1{|\mathcal T|} \sum_ {T\in \mathcal T } \frac 1{m_a(T)m_b(T)} \sum_{1\le i\le m_a(T)\atop {1\le j\le m_b(T)}} D_{T}(A_i,B_j).\label{eq:multi2}\end{equation}
Note that the formula \eqref{eq:multi1} can not be specialized to give formula \eqref{eq:Liumulti}. Taking $\alpha_s=m_{a,s}m_{b.s}/\sum_s m_{a,s}m_{b,s}$ does make them agree for the single comparison of $a$ and $b$, but will not for other pairs of taxa (unless $m_{x,s}$ is independent of $x$).
The essential difference between the formulas \eqref{eq:multi2} and \eqref{eq:Liumulti} is how the product ${m_a(T) m_b(T)}$ appears in them. In formula
\eqref{eq:Liumulti} all $D_T(A_i,B_j)$ are treated on an equal basis, whether they come from the same locus and are therefore correlated, or from different loci and thus independent trials of the coalescent process. Formula
\eqref{eq:multi2} can be viewed as first constructing an intertaxon distance matrix for each locus by averaging pairwise distances over choices of alleles, and then
averaging these over loci, to create a final intertaxon distance matrix.
We emphasize that using the consistency of formulas \eqref{eq:multi1} and \eqref{eq:multi2} to justify their use in applying USTAR to finite data sets hinges on an assumption that every multisample scheme that appears in a data set appears many times. Particularly for data sets assembled from several earlier studies, there may be little commonality in the sampling scheme from one gene to the next. Simulations are needed to explore whether our formulas behave well under such circumstances.
\medskip
Simulations in \cite{ASTRIDWarnow} testing the performance of USTAR methods did not explore multisample schemes at all. However, in that work a new variant of a USTAR method that allows for gene trees missing some taxa was studied --- in the notation above the $m_x(T)$ could be 1 or 0.
Although such USTAR methods were reported to perform well on simulated data under these circumstances, theoretical justification for the particular approach taken has yet to be developed. Moreover, one should be cautious that if the test simulations involve random deletion of taxa from gene trees, they may not be relevant to empirical data sets in which taxa are missing in more patterned ways.
\section*{Acknowledgements}
This work was begun while EA and JR were Short-term Visitors and JD was a Sabbatical Fellow at the National Institute for
Mathematical and Biological Synthesis, an institute sponsored by the National Science Foundation, the
U.S. Department of Homeland Security, and the U.S. Department of Agriculture through NSF Award
\#EF-0832858, with additional support from the University of Tennessee, Knoxville.
It was further supported by the National Institutes of Health grant R01 GM117590, awarded under the Joint DMS/NIGMS Initiative to Support Research at the Interface of the Biological and Mathematical Sciences.
\bibliographystyle{IEEEtran}
|
\section{Introduction} Ultracold spinor atoms provide simple and
experimentally well-controlled many-body systems with internal degrees of
freedom. The simplest case is that of a spin-1 gas. The atomic spin-1 species
${}^{23}\text{Na}$ and ${}^{87}\text{Rb}$ have been the subject of numerous
experiments (see for example the reviews in
\cite{Stamper-Kurn2013,Kawaguchi2012} and references therein), prompting
detailed theoretical investigation of the exact spectra for tightly confined
spin-1 atoms
\cite{Law1998,Ho2000,Koashi2000,Mueller2006,Barnett2010,Barnett2011,
Lamacraft2010} as well as their mean-field properties in the thermodynamic
limit \cite{Ho1998,Ohmi1998}. The higher spin-2 hyperfine multiplet of
${}^{87}\text{Rb}$ was found to be stable and amenable to experimental
manipulation \cite{Chang2004,Kuwamoto2004,Schmaljohann2004,Burke1997},
prompting the development of a number of spin-2 exact and mean-field
theoretical results \cite{Ciobanu2000,Koashi2000,Ueda2002,Song2007,Turner2007}.
In particular, Gross-Pitaevskii mean field theory has been used to describe
spin-2 condensates under linear and quadratic Zeeman fields
\cite{Saito2005,Uchino2010}. Exact quantum results have also been found for
spin-2 systems under tight spatial confinement under no external fields, which
can be simply extended to results with a linear Zeeman field by a gauge
transformation \cite{Ueda2002,Koashi2000}. The case of the quantum states of
tightly confined bosons under the presence of a quadratic Zeeman field,
however, has remained less well understood.
Spinor condensates also provide a convenient platform with which to study the
phenomenon of order-by-disorder \cite{Villain1980,Henley1987,Henley1989}, or
the selection of a particular mean-field ground state from a set of
accidentally degenerate ones due to fluctuations. This subject has
traditionally been of importance in elucidating the ground-state structure of
frustrated magnetic systems but has also been investigated as a relevant mechanism
in several cold-atom systems
\cite{Wessel2005,Song2007,Turner2007,Wu2008,Zhao2008,Barnett2012,You2012,Zheng2013,Sun2014,Payrits2014}.
These offer the possibility of experimentally realizing a phenomenon whose
observation is still contentious in magnetic systems \cite{Ross2014,Petit2014}.
In spin-2 systems, order by disorder has been predicted to determine the ground
state in the absence of a quadratic Zeeman field for species with scattering
lengths within a certain range, termed the nematic region. Furthermore, the
mechanism has been predicted to introduce a first-order phase transition
between two parts of the nematic region in which fluctuations select different
members of the accidentally degenerate family \cite{Song2007,Turner2007}.
One of the goals of the present article is to present analytical results
for tightly confined spin-2 atoms in the presence of a quadratic Zeeman field.
The results are obtained by utilizing an exact mapping of the interacting
many-body system Hamiltonian to a 5-dimensional quantum rotor Hamiltonian,
i.e., that of a single particle moving on the 4-sphere. Similar mappings have
previously been employed to study the double-well problem \cite{Anglin2001},
dipolar condensates \cite{Armaitis2013} and particularly the analogous tightly
bound spin-1 problem \cite{Barnett2010,Barnett2011,Jing2011,Buchmann2013}.
One of the main perceived advantages of the rotor methodology is that it allows
one to treat excitations about fragmented states
\cite{Penrose1956,Nozieres1982}. Applying the Penrose-Onsager criterion for
Bose-Einstein condensation, fragmented condensates are defined as those whose
reduced single-particle density matrix has more than one extensive eigenvalue.
When there are exactly two such eigenvalues, one may envision the state as a
condensate of particle pairs. One encounters such a case in the spin-2 problem
in the presence of a large negative quadratic Zeeman field. Such a state cannot
be approximated by a coherent state, invalidating the use of Bogoliubov theory,
typically the first line of attack in calculating excitation spectra about
non-fragmented condensates. The rotor mapping, on the other hand, suffers no
pathologies in the fragmented case and provides simple analytical expressions
for the excitation spectra.
Previous results by Koashi and Ueda \cite{Koashi2000,Ueda2002} indicate that
the exact quantum results in the absence of a quadratic Zeeman field do not
mirror the continuous accidental degeneracy of the mean-field analysis. Rather,
the ground state is non-degenerate and the same across the entire nematic
region and no traces of the order-by-disorder induced phase transition are
manifest. One may hope that the signature of the transition could nevertheless
be observed in the magnetic response to the quadratic Zeeman field, which
serves to classically orient the nematic order parameter. In the present
article we find through an evaluation of the wave function overlaps obtained
through the rotor mapping, that such a signature is nevertheless not present.
Motivated by this, we have applied the rotor mapping to the analysis of an
alternative potential that \emph{does not} fully break the mean-field
degeneracy, noting that a large class of quadratic potentials can be
experimentally obtained with external microwave fields. Using the rotor
framework we show that including quantum corrections select a unique ground
state. Furthermore, this selection is explicitly demonstrated through
an exact diagonalization numerical approach involving a modest number of atoms.
Importantly, we find that the overlap of the obtained ground states
with any mean-field state tends to zero with increasing particle number, a
stark departure from the standard mean-field states obtained in the
continuum. On the other hand, the ordering is apparent in the spin-component
occupation numbers, which can be readily experimentally probed.
This article is organized as follows. In Sec.~\ref{sec:background} we first
describe the continuum Hamiltonian for a spin-2 cold Bose gas. Mean field
results and a phase diagram dependening on the Zeeman field and the differences
in distinct total-spin scattering lengths, considered tunable, are presented.
From thereon we focus on the \emph{nematic} region of the phase diagram. In
Sec.~\ref{sec:sma-and-exact-diag} we next consider the single mode
approximation, relevant to a tight trap in which spatial degrees of freedom are
taken to be completely frozen out, yielding an effectively zero-dimensional
Hamiltonian. Exact results on this Hamiltonian in the absence of a quadratic
Zeeman field are summarized in Subsec.~\ref{sec:known-quantum-pd-aspects}. In
the following subsection we briefly outline the exact-diagonalization method
used to obtain numerical results in the present work. In
Sec.~\ref{sec:rotor-mapping} the spin-2 rotor mapping is introduced. Though
having a real spectrum, the Hamiltonian thus obtained is in general
non-Hermitian. The Hermitianizing transform is generally difficult to find, but
feasible in special cases. Subsec.~\ref{sec:special-case-hermitianizing}
considers such a case when one of the Hamiltonian parameters is zero.
Section~\ref{sec:large-q-limits} considers general parameter configurations in
the presence of a large quadratic Zeeman field. Large positive and negative
values are considered in separate subsections. In both cases a simple
approximate Hermitianizing transform may be found, leading to effective
harmonic oscillator Hamiltonians. In subsection~\ref{sec:q-overlaps} we further
present analytical expressions for overlaps with the relevant mean-field states
for both cases and compare them to numerics.
Finally, in Sec.~\ref{sec:obd} we discuss the disparity in qualitative
nematic-region behaviour arising from the mean-field and full quantum
treatments in the presence of a quadratic Zeeman term. The latter contains no
visible traces of order-by-disorder that is manifest in the former. Motivated
by this, we introduce an alternative external potential which does not break
the mean-field degeneracy. We show that beyond-mean-field corrections in this
system select unique ground states, and therefore interpret the phenomenon as
order by disorder. We derive analytical expressions for certain aspects of
this state and numerically assess them.
\section{Background}
\label{sec:background}
\subsection{Spinor Hamiltonian}
We begin by describing the Hamiltonian governing the underlying physical
system, a collection of cold interacting spin-2 bosons in a scalar trapping
potential \footnote{By a scalar potential we mean one that couples to all
magnetic sublevels approximately equally, such as the potential of an optical
trap and unlike that of a magnetic trap.} and a magnetic field, manifesting
itself through a linear and a quadratic Zeeman term. The full first-quantized
Hamiltonian is
\begin{eqnarray}
\hat{H}_\text{1st} &=& \sum_{i}^N \hat{H}_i^{(1)} + \sum_{i < j}
\hat{V}^{(2)}_{i,j} \qquad \text{with}\nonumber\\
\hat{H}_i^{(1)} &=& \frac{1}{2m} \hat{p}_i^2 + V(\hat{\vec{r}}_i)
+ p \hat{F}^z_i + q (\hat{F}^z_i)^2.
\label{eq:first-quant-hamiltonian}
\end{eqnarray}
Here $N$ is the total particle number, $m$ the atomic mass, $V$ the external
potential and $\hat{p}_i$, $\hat{\vec{r}}_i$ and $\hat{F}_i^z$ the $i$-th
particle's momentum, position and $z$-component of spin operators,
respectively. $p$ and $q$ are the linear and quadratic Zeeman coefficients,
respectively.
As detailed in many standard resources, such as \cite{Pethick2008}, the
interparticle potential $\hat{V}^{(2)}_{i,j}$ between the $i$-th and $j$-th
particles is short-range and dominated by the s-wave component, i.e., it
depends predominantly on the distance between the atoms. It is well
approximated by a delta function with a prefactor proportional to the
scattering length. There are three different scattering lengths $a_S$ for the
three distinct values of the total spin of a pair of particles $S$ allowed by
interchange symmetry, that is, 0, 2 and 4. The potential of a pair of
particles can thus be written as \cite{Stamper-Kurn2013,Kawaguchi2012}
\begin{equation}
\hat{V}^{(2)}_{i,j} = \frac{1}{2} \delta\left( \hat{\vec{r}}_i -
\hat{\vec{r}}_j \right) \left( c_0 \hat{\mathbb{1}}_i \otimes
\hat{\mathbb{1}}_j + c_1 \hat{\vec{F}}_i \cdot \hat{\vec{F}}_j + 5 c_2
\hat{P}^{(0)}_{i,j} \right)
\label{eq:pair-interaction}
\end{equation}
where $\hat{P}^{(0)}_{i,j}$ is the projection operator onto the spin singlet
state of the pair, $\hat{\vec{r}}_i$ and $\hat{\vec{F}}_i$ are the $i$-th
particle's position and spin operator, respectively. Employing units with
$\hbar = 1$, used hereafter, the $c$ constants may be expressed in terms of
scattering lengths as
\begin{align}
c_0 &= \frac{4 \pi}{7m} \left( 4 a_2
+ 3 a_4 \right) \notag \\
c_1 &= \frac{4 \pi}{7m} \left( a_4 - a_2 \right) \label{eq:c-constants} \\
c_2 &= \frac{4 \pi}{5m} \left(
a_0 - a_4 \right) + \frac{8 \pi}{7m}\left( a_4 - a_2 \right) \notag
\end{align}
Second-quantizing Hamiltonian~(\ref{eq:first-quant-hamiltonian}) above yields:
\begin{subequations}
\label{eq:full-second-quantized-hamilt}
\begin{eqnarray}
\hat{H}_\text{2nd} &=& \int \text{d}^3 \vec{r}\, \left( \hat{\mathcal{H}}_0(\vec{r})
+ \hat{\mathcal{H}}_q(\vec{r}) +
\hat{\mathcal{H}}_I(\vec{r})\right)\label{eq:3d-hamiltonian}\\
\hat{\mathcal{H}}_0 &=& \hat{\psi}^\dagger_\alpha \left( -\frac{1}{2m}
\nabla^2 + V(\vec{r}) \right) \hat{\psi}_\alpha\label{eq:second-quant-hamilt-zero}\\
\hat{\mathcal{H}}_q &=& p \hat{\mathcal{F}}^z + q \hat{\mathcal{Z}} \quad
\text{with}\nonumber\\
\hat{\mathcal{F}}^i &=& \hat{\psi}^\dagger_\alpha F^i_{\alpha \beta} \hat{\psi}_\beta
\quad \text{and} \quad \hat{\mathcal{Z}} = \hat{\psi}^\dagger_\alpha
(F^z)^2_{\alpha \beta} \hat{\psi}_\beta\label{eq:second-quant-hamilt-q}\\
\hat{\mathcal{H}}_I &=& : \frac{c_0}{2} \hat{n}^2 + \frac{c_1}{2} \hat{\vec{\mathcal{F}}}^2 :
+ \,\frac{c_2}{2} \hat{\mathcal{A}}^\dagger \hat{\mathcal{A}} \quad
\text{with}\nonumber\\
\hat{n} &=& \hat{\psi}^\dagger_\alpha \hat{\psi}_\alpha \quad
\text{and} \quad \hat{\mathcal{A}} = \sum_{\alpha = -2}^2 (-1)^\alpha
\hat{\psi}_\alpha \hat{\psi}_{-\alpha}\label{eq:second-quant-hamilt-interaction}
\end{eqnarray}
\end{subequations}
where $\hat{\psi}_\alpha (\vec{r})$ are the annihilation operators for bosons
in the $m = \alpha$ magnetic sublevel at $\vec{r}$. $\hat{\mathcal{F}}^i
(\vec{r})$ stands for the $i$-th component of the total spin density operator
whereas $F^i$ is the $i$-th spin-2 matrix. The positional dependence of
creation/annihilation operators and densities has been suppressed above for
brevity. Except for the definition of $\hat{\mathcal{A}}$, repeating indices
imply the Einstein summation convention. The colon delimiters represent normal
ordering. Note that $\hat{\mathcal{H}}_0$ and $\hat{\mathcal{H}}_q$ are the
second-quantized forms of the kinetic/potential and linear/quadratic Zeeman
terms of the single particle part in
Hamiltonian~(\ref{eq:first-quant-hamiltonian}) whereas $\hat{\mathcal{H}}_I$ is
the second-quantized form of the two-particle interaction in
Eq.~(\ref{eq:pair-interaction}). It is also worth noting that the operator
$\hat{\mathcal{A}}$ may be loosely interpreted as an annihilation operator for
a spin-singlet pair of bosons \cite{Koashi2000,Ueda2002}.
\subsection{Mean-field phase diagram at $q = 0$}
In determining ground states in the thermodynamic limit we may invoke
Gross-Pitaevskii mean field theory which consists of replacing field operators
with their expectation values, $\hat{\psi}_\alpha(\vec{r}) \rightarrow
\psi_\alpha (\vec{r}) \equiv \langle \hat{\psi}_\alpha (\vec{r}) \rangle$. In
the continuum, i.e., zero external potential, we may Fourier transform the
operators to $\hat{\psi}_{\vec{p}, \alpha}$ and for the ground states further
consider only the zero momentum, $\vec{p} = \vec{0}$ components. This reduces
classifying the various phases to describing the five-component order parameter
$\chi_\alpha \equiv \langle \hat{\psi}_{\vec{0},\alpha} \rangle/\sqrt{N}$ where
$N$ is the total particle number, up to rotational and $\text{U}(1)$ phase
symmetries. These order parameters are shown in Fig.~\ref{fig:mf-phase-diagram} with
respect to $c_{1,2}$. Also shown are the Majorana representations of the order
parameters, which show the rotational symmetries of the states
\cite{Barnett2006a,Stamper-Kurn2013}.
\begin{figure}
\includegraphics[width=\columnwidth]{phaseDiagramThird}
\caption{Mean field phase diagram at $q=0$.}
\label{fig:mf-phase-diagram}
\end{figure}
In the nematic region, where $g_2 < \min(0, 4 g_1)$, there is an additional
continuous accidental degeneracy of states with rectangular Majorana
representations. A general nematic state's order parameter can be written,
up to the aforementioned symmetries, as
\begin{equation}
\vec{\chi}_\text{n}(\eta) = \left( \frac{\text{sin}\,\eta}{\sqrt{2}},
0, \text{cos}\, \eta, 0, \frac{\text{sin}\,\eta}{\sqrt{2}} \right)
\label{eq:degenerate-nematic-states}
\end{equation}
where $\eta$ parametrizes the degeneracy. The two states shown in
Fig.~\ref{fig:mf-phase-diagram} are representatives of higher symmetry,
obtained by setting $\eta = 0\: (\eta = \pi/2)$, which are referred to as
uni(bi)-axial states. While all $\eta$ states are degenerate at the mean-field
level, fluctuations lift the degeneracy through the phenomenon of
order-by-disorder, selecting the uni(bi)-axial state for $c_1 > 0\; (c_1 < 0)$
\cite{Song2007,Turner2007}. This leads to the dotted phase boundary in
Fig.~\ref{fig:mf-phase-diagram}.
Mean-field behavior in the thermodynamic limit has also been extensively
investigated at non-zero $q$ in \cite{Uchino2010} leading to a number of new
phases, where some of the phase boundaries with respect to $c_{1,2}$ and $q$
had to be numerically determined. While the $q=0$ ground states were invariant
to changes in $c_{1,2}$ that remained within the same phase \footnote{The
term \emph{inert} is sometimes used to describe such states
\cite{Stamper-Kurn2013}.}, ground states in some of the new $q \neq 0$ phases
vary continuously with the parameters. Lastly and perhaps most importantly, the
nematic accidental degeneracy in $\eta$ is lifted for any $q \neq 0$.
\section{Single mode approximation and exact diagonalization}
\label{sec:sma-and-exact-diag}
\subsection{Single mode Hamiltonian}
\label{sec:sma-hamiltonian}
In the remainder of the text we consider a tightly bound many-body system with
a fixed number of particles $N$. This implies we can write
$\hat{\psi}_\alpha(\vec{r})$ from Eq.~(\ref{eq:full-second-quantized-hamilt})
as $\hat{\psi}_\alpha(\vec{r}) = \phi_0(\vec{r}) \hat{a}_\alpha$ where
$\phi_0(\vec{r})$ is the unit-normalized lowest spatial mode of the system and
$\hat{a}_\alpha$ is the annihilation operator for a boson in this lowest
spatial mode with magnetic number $m = \alpha$, since the tightness of the
confining potential energetically prohibits spatially excited states. This is
traditionally called the single mode approximation or SMA \cite{Law1998}. For
convenience we also define the vector of operators $\hat{\vec{a}} = \left(
\hat{a}_2, \hat{a}_1, \hat{a}_0, \hat{a}_{-1}, \hat{a}_{-2} \right)^T$.
Substituting the $\hat{\psi}_\alpha$ as above and integrating out the spatial
components of the Hamiltonian Eq.~(\ref{eq:full-second-quantized-hamilt})
yields
\begin{equation}
\label{eq:many-body-hamiltonian}
\hat{H}_\text{SMA} = \frac{g_1}{2 N}\hat{\vec{F}}^2 + \frac{g_2}{2
N}\hat{A}^\dagger\hat{A} + q \hat{Z}.
\end{equation}
plus constants. Here $g_i = n_0 c_i$ where $n_0 = N \int \text{d}\vec{r}\,
\left|\phi(\vec{r})\right|^4$ and $c_i$ are
defined in Eq.~(\ref{eq:c-constants}). The uppercase operators are obtained
from their calligraphic density counterparts in
Eq.~(\ref{eq:full-second-quantized-hamilt}) by letting $\hat{\psi}_\alpha
\rightarrow \hat{a}_\alpha$, e.g., $\hat{F}^i = \hat{a}^\dagger_\alpha
F^i_{\alpha \beta} \hat{a}_\beta = \hat{\vec{a}}^\dagger F^i \hat{\vec{a}}$
where $F^i$ still represents the $i$-th spin matrix.
The Hamiltonians~(\ref{eq:full-second-quantized-hamilt})
and~(\ref{eq:many-body-hamiltonian}) evidently conserve total particle number
$\hat{N}$ and, as noted above, we consider it fixed at $N$. This allows us to
drop terms arising from the spatial integrals of $\hat{\mathcal{H}}_0$ and
$:\hat{n}^2:$ of Eq.~(\ref{eq:full-second-quantized-hamilt}) and to simplify
the contribution of $:\mathrel{\hat{\vec{\mathcal{F}}}^2}:\: = \hat{\vec{\mathcal{F}}}^2 -
C \hat{n}$ to $\hat{\vec{F}}^2$. Hamiltonian~(\ref{eq:many-body-hamiltonian})
further commutes with $\hat{F}^z$ and can thus be simultaneously diagonalized.
In the remainder of this text we consider fixed $\hat{F}^z$ eigenspaces, most
often the nullspace, allowing us to drop the linear Zeeman term as in
Eq.~(\ref{eq:many-body-hamiltonian}).
\subsection{Known aspects of the quantum phase diagram}
\label{sec:known-quantum-pd-aspects}
At zero quadratic Zeeman field $q$, the exact spectrum of the tightly confined
system is known \cite{Ueda2002}. Potentially degenerate eigenlevels can be
labelled by the set $\left\{ N_0, N_S, F, F_z \right\}$ where $F_z$ is the
eigenvalue of $\hat{F}_z$ and $F$ is such that the eigenvalue of
$\hat{\vec{F}}^2$ equals $F(F+1)$. $N_S$ can be interpreted as the number of
spin-singlet pairs and $N_0 \equiv N - 2 N_S$ as the number of bosons not in
the singlet state. As mentioned above, this analogy is only a loose one, as
$\hat{A}$ and $\hat{A}^\dagger$ do not obey Bosonic commutation relations.
However, the commutation relations of these and a third operator, which the
authors of \cite{Ueda2002} denote by $\hat{\mathcal{S}}_z \equiv
\frac{1}{4}(2 \hat{N} + 5)$, can be seen to be those of the Lie algebra
$\mathfrak{su}(1,1)$, closely related to that of $\mathfrak{su}(2)$, the spin
algebra. This allows for an elegant derivation of the joint $\hat{A}^\dagger
\hat{A}$ and $\hat{\mathcal{S}}_z$ eigenstates in analogy with the raising and
lowering operator approach to the spin algebra. Technically, $N_S$ and $N_0$
are defined such that the eigenvalue of $\hat{A}^\dagger \hat{A}$ equals
$\left( N_0 + \frac{1}{2} \right) \left( N_0 + \frac{5}{2} \right)$ and $N_0 +
2 N_S = N$. In terms of the above quantum numbers, the energies are given by
\begin{equation}
E = \frac{g_1}{2} \left[ \frac{F}{N}\left( F + 1 \right) - 6 \right] +
g_2 \frac{N_S}{N} \left( N + N_0 + 3 \right)
\label{eq:zero-q-exact-energies}
\end{equation}
The easily obtained ground states show interesting parallels with the
mean-field phase diagram. In the ferromagnetic region, the ground state $N_S$
is zero and $F = 2 N$ is maximized, while in the tetrahedral
region the ground state $N_S$ and $F$ are both zero.
The nematic-region ground state is, however, less easily reconciled with
its mean-field counterparts, as the ground state is non-degenerate and unique
across the entire nematic region. It consists only of singlet pairs and
potentially a singlet trio, maximizing $N_S$ and minimizing $F$.
On the other hand, the case where $q \neq 0$ is much less well-understood
analytically as $N_S$ or $N_0$ are no longer good quantum numbers. We shall
focus on this regime in the following. Analytical results are obtained via the
rotor mapping and contrasted with the numerical results obtained through exact
diagonalization, which we briefly describe next.
\subsection{Exact diagonalization}
Due to the effective spatial 0-dimensionality of our tightly bound system our
problem is that of diagonalizing a five-mode many-body Hamiltonian. Further
fixing $N$ and $F_z$, the relevant Fock bases may be enumerated by three
independent occupation numbers. The sizes of the bases hence scale as $N^3$
with particle number $N$ making it quite feasible to diagonalize
Hamiltonian~(\ref{eq:many-body-hamiltonian}), or at least find the ground state
and its energy, at fixed values of $g_{1,2}$, $q$, $F_z$ and $N$ with regular
desktop hardware in timescales on the order of hours for up to about 300
particles.
Denoting Fock states by
\begin{equation}
\ket{n_2, n_1, n_0, n_{-1}, n_{-2}} \equiv \prod_{m = -2}^2
\frac{\hat{a}_m^{\dagger\,n_m}}{\sqrt{n_m !}} \ket{0},
\label{eq:fock-state}
\end{equation}
one way of enumerating the entire Fock basis for fixed $N$ and $F_z$ is by
considering $n_2, n_1$ and $n_{-2}$ as independent variables and letting $n_0 =
N + F_z - 3 n_2 - 2 n_1 + n_{-2}$ and $n_{-1} = 2 n_2 + n_1 - 2 n_{-2} - F_z$.
The ranges of the independent $n$ variables are cumbersome to state but can
easily be found programmatically. What remains is expressing the terms of
Hamiltonian~(\ref{eq:many-body-hamiltonian}) with respect to this basis and
diagonalizing the resulting sparse matrices, which can be accomplished with
standard numerical packages.
\section{The rotor mapping}
\label{sec:rotor-mapping}
Here we present the primary calculational tool allowing the derivation of
analytical results of the present text, the rotor mapping. This has been
introduced for spin-1 in \cite{Barnett2010} and expanded upon in
\cite{Barnett2011}. The latter reference also includes a brief discussion of
the mapping for spin-2 systems in the absence of external fields. In this
section we review the key points of the mapping in general and extend it to
include an external potential for the spin-2 case. In
subsection~\ref{sec:cartesian-basis} we first comment on the natural basis of
the spin-2 representation for use with the mapping and state the form of the
spin matrices in it. In subsection~\ref{sec:rotor-hamiltonian} we briefly
review the main steps of the mapping and derive the rotor Hamiltonian for our
system. We comment on its properties in different regions of the parameter
space, particularly Hermiticity.
Subsection~\ref{sec:special-case-hermitianizing} outlines the process of
exactly Hermitianizing the Hamiltonian in the special case when $g_1 = 0$,
demonstrating the equivalence of two Hermitian Hamiltonians, the many-body
Hamiltonian~(\ref{eq:many-body-hamiltonian}) and that of a single particle on
the 4-sphere in a specific potential. This subsection also introduces some of
the methods employed in later sections to make approximate low-energy
Hamiltonians Hermitian.
\subsection{Cartesian basis}
\label{sec:cartesian-basis}
While the canonical spin-2 matrices are complex and Hermitian, there exists a
basis in which they are completely imaginary and antisymmetric. This allows one
to map the original spin operators onto linear combinations of generalized
angular momentum operators, significantly simplifying the analysis. The
underlying reason for this is that bosonic representations of the spin group
$\text{SU}(2)$ can also be thought of as representations of the real group of
rotations $\text{SO}(3)$.
There is a simple heuristic method of finding such a basis, based on
transforming from standard complex spherical harmonics to real ones. We state
results in terms of annihilation operators rather than the underlying
single-particle basis. Using the phase convention $Y_l^{-m}(\theta,\varphi) =
(-1)^m Y_l^m (\theta, \varphi)^* \propto \text{e}^{- \text{i} m \varphi}$, one arrives at
the Cartesian annihilation operators:
\begin{eqnarray}
\hat{b}_1 &=& \hat{a}_0\nonumber\\
\begin{split}
\hat{b}_2 &= \frac{\text{i}}{\sqrt{2}} \left( \hat{a}_1 + \hat{a}_{-1}
\right)\\
\hat{b}_3 &= \frac{1}{\sqrt{2}}\left( \hat{a}_{-1} - \hat{a}_1
\right)
\end{split} \;&&\;
\begin{split}
\hat{b}_4 &= \frac{\text{i}}{\sqrt{2}} \left( \hat{a}_{-2} -
\hat{a}_2 \right)\\
\hat{b}_5 &= \frac{1}{\sqrt{2}}\left( \hat{a}_2 + \hat{a}_{-2}
\right)
\end{split}
\label{eq:b-operators}
\end{eqnarray}
Gathering these into $\hat{\vec{b}} = \left( \hat{b}_1, ..., \hat{b}_5
\right)^T$ we may neatly express parts of
Hamiltonian~(\ref{eq:many-body-hamiltonian}) in terms of the
$\hat{b}$-operators. The singlet operator becomes simply $\hat{\mathcal{A}} =
\hat{\vec{b}}\cdot\hat{\vec{b}}$. The spin and quadratic Zeeman operators
become $\hat{F}^i = \hat{\vec{b}}^\dagger M^i \hat{\vec{b}}$ and $\hat{Z} =
\hat{\vec{b}}^\dagger (M^z)^2 \hat{\vec{b}}$, where the $M^i$ are the pure
imaginary antisymmetric spin matrices expressed in the new single-particle
basis.
To state their forms concisely, let us introduce a family of simple
antisymmetric matrices. Let $S^{(-)}_{i j}$ be the 5-by-5 matrix with $1$ in the
$i$-th row and $j$-th column, $-1$ in the $j$-th row and $i$-th column, and $0$
elsewhere. That is, $\left( S^{(-)}_{i j} \right)_{\alpha \beta} = \delta_{i
\alpha} \delta_{j \beta} - \delta_{i \beta} \delta_{j \alpha}$. The $M^i$ are
then:
\begin{eqnarray}
M^x &=& -\text{i} \left( \sqrt{3} \, S^{(-)}_{1 2} - S^{(-)}_{2 5} + S^{(-)}_{3 4} \right)\nonumber\\
M^y &=& -\text{i} \left( \sqrt{3} \, S^{(-)}_{1 3} + S^{(-)}_{2 4} + S^{(-)}_{3 5} \right)\nonumber\\
M^z &=& -\text{i} \left( S^{(-)}_{2 3} + 2 \, S^{(-)}_{4 5} \right)
\label{eq:spin-matrices-transf}
\end{eqnarray}
For convenience also denote $Q \equiv (M^z)^2 = \text{diag}\,(0, 1, 1, 4, 4)$.
\subsection{The rotor Hamiltonian}
\label{sec:rotor-hamiltonian}
Next we construct the overcomplete basis \footnote{It is evident that the basis
is not orthogonal. Showing completeness is relatively straightforward but
tedious.}
\begin{equation}
\ket{\vec{\Omega}}=\frac{1}{\sqrt{N !}} \left( \vec{\Omega}\cdot
\vec{\hat{b}}^\dagger \right)^N \ket{0}
\label{eq:rotor-basis-definition}
\end{equation}
where $\vec{\Omega}$ is a norm-1 5-component \emph{real} vector, i.e.,
belonging to the 4-sphere $\mathcal{S}^4$.
It turns out that the elements of basis~(\ref{eq:rotor-basis-definition}) are
exactly the spatial rotations of nematic mean-field states, characterized by
the order parameter in Eq.~(\ref{eq:degenerate-nematic-states}). More
precisely, each distinct mean-field state with an order parameter of the form
$R(g) \chi_\text{n}(\eta)$ (where $g \in \text{SO}(3)$ ranges over all
rotations, $R(g)$ is the matrix corresponding to $g$ in the 5-dimensional
representation, and $\chi_\text{n}(\eta)$ are the 5-component order parameters
of Eq.~(\ref{eq:degenerate-nematic-states})), can be expressed in the form of
Eq.~(\ref{eq:rotor-basis-definition}) with $\vec{\Omega}$ belonging to exactly
one pair of diametrically opposite points on the 4-sphere.
Due to the overcompleteness of the basis, any state $\ket{\Psi}$ can be
expressed as $\ket{\Psi} = \int_{\mathcal{S}^4} \text{d}^4\Omega\,\psi(\vec{\Omega})
\ket{\vec{\Omega}}$. For any particle-conserving Hamiltonian $\hat{H}$ it
is also possible to find an operator $\mathcal{H}$, interpreted as a new
Hamiltonian acting on $\psi(\vec{\Omega})$, such that $\hat{H} \ket{\Psi} =
\int_{\mathcal{S}^4} \text{d}^4\Omega\, \left( \mathcal{H} \psi
\right)(\vec{\Omega})\ket{\vec{\Omega}}$ is exact. The mapping consists of
letting
\begin{equation}
\hat{b}_i^\dagger \hat{b}_j \rightarrow \left( N + 5
\right)\Omega_i \Omega_j - \Omega_j \nabla_i - \delta_{i j}
\label{eq:rotor-transformation-rule}
\end{equation}
as has been derived in \cite{Barnett2010}. The operator
$\vec{\nabla}$ acts as the gradient on functions defined on the 4-sphere and
yields a vector field, lying in the tangent space to the sphere at each point.
If we think of a function $f$ on $\mathcal{S}^4$ as a restriction of a function
on a broader subset of $\mathbb{R}^5$, the action can be expressed as
$\vec{\nabla}f = \frac{\partial f}{\partial \vec{\Omega}} - \left( \vec{\Omega}
\cdot \frac{\partial f}{\partial \vec{\Omega}} \right) \vec{\Omega}$.
Using the rule in Eq.~(\ref{eq:rotor-transformation-rule}), the norm property
$\vec{\Omega}\cdot \vec{\Omega} = 1$ and the intuitive identity
$\vec{\Omega}\cdot\vec{\nabla} = 0$, we find that $\vec{\hat{b}}^\dagger S_{i
j}^{(-)} \vec{\hat{b}} \rightarrow \vec{\Omega}^T S_{i j}^{(-)} \vec{\nabla} =
-\text{i} L_{i j}$ where $L_{i j} = -\text{i} \left( \Omega_i \nabla_j - \Omega_j
\nabla_i \right)$ is the 5-dimensional generalization of angular momentum. This
in turn implies $\vec{\hat{b}}^\dagger M^i \vec{\hat{b}} \rightarrow
\vec{\Omega}^T M^i \vec{\nabla}$. We also find $\hat{A}^\dagger \hat{A}
\rightarrow \nabla^2 + (N^2 + 3 N)$. Putting this all together and dropping
constant terms yields
\begin{eqnarray}
\mathcal{H} &=& \frac{g_2}{2 N}\nabla^2 + \frac{g_1}{2 N}
\Omega_\alpha M^i_{\alpha \beta} \nabla_\beta\,
\Omega_\gamma M^i_{\gamma \delta} \nabla_\delta\nonumber\\
{}&+&q\left( N+5 \right) \vec{\Omega}^T Q\, \vec{\Omega} -
q\, \vec{\Omega}^T Q \vec{\nabla}
\label{eq:rotor-nonHermitian-hamiltonian}
\end{eqnarray}
Recall that $Q \equiv (M^z)^2$. To discuss individual parts of the Hamiltonian
we will also refer to the operator multiplying $\frac{g_1}{2 N}$ as
$\vec{M}^2$.
When $q=0$, the resulting Hamiltonian is Hermitian, with the ground state
uniformly delocalized about the 4-sphere, which corresponds, loosely speaking,
to a condensate of singlet pairs in accord with previous results
\cite{Koashi2000,Ueda2002}. It is interesting to comment on this result in
light of the recent publication by Jen and Yip \cite{Jen2015} who pointed out
that even though na\"ive averaging of nematic states over rotations in all of
SO$(3)$ produces the correct groundstates for confined antiferromagnetic spin-1
bosons, extending this to spin-2 does not work, as the singlet is no longer
unique in this case. The rotor mapping demonstrates that the correct state can
in fact be obtained by averaging over the associated 4-sphere.
In the general case, the obtained Hamiltonian is not Hermitian. When $g_1 = 0$
or when $ N |q| \gg |g_{1,2}|$ a similarity transform may be enacted which
renders the transformed Hamiltonian Hermitian and which depends only on the
position operators $\Omega_i$. This is the topic of the next sections. A
Hermitianizing similarity transform has also been identified for the general
case, but it is rather different from the one considered in this article, as it
is a complicated function of the Laplacian operator. It is not at present clear
whether that approach leads to similar calculational simplifications as
obtained in this article and its investigation is deferred to a future
publication.
For completeness, and since we shall not be using the result further, we derive
in the following brief subsection the form of the Hermitianized Hamiltonian for
the special case $g_1 = 0$.
\subsection{Hermitianizing transform at $g_1 = 0$}
\label{sec:special-case-hermitianizing}
In this special case the Hamiltonian $\mathcal{H}$ of
Eq.~(\ref{eq:rotor-nonHermitian-hamiltonian}) simplifies considerably as
$\vec{M}^2$, arguably the most complicated term, is not present. We assume the
correct similarity transform is of the form $\text{e}^{S}$ where $S =
S(\vec{\Omega})$ is a function of only the position operators. We seek $S$ such
that $\mathcal{H}^H_0 \equiv \text{e}^{-S} \mathcal{H} \text{e}^S$ is Hermitian. The
$\vec{\Omega}^T Q \vec{\Omega}$ term
Eq.~(\ref{eq:rotor-nonHermitian-hamiltonian}) is invariant under this
transformation. The Laplacian transforms as $\text{e}^{-S} \nabla^2 \text{e}^S = \nabla^2
+ (\nabla^2 S) + \left| \vec{\nabla} S \right|^2 + 2(\vec{\nabla} S)^T
\vec{\nabla}$ and the final non-Hermitian term of
Eq.~(\ref{eq:rotor-nonHermitian-hamiltonian}) picks up a Hermitian $-q
\vec{\Omega}^T Q (\vec{\nabla} S)$ term. Gathering the evidently non-Hermitian
terms and demanding that their sum be zero yields the condition
\begin{equation}
\left( \frac{g_2}{N}\left( \vec{\nabla} S \right)^T - q \vec{\Omega}^T
Q \right) \vec{\nabla} = 0.
\label{eq:hermitian-condition}
\end{equation}
While one could make progress by formally solving a differential equation for
$S$ on the 4-sphere derived from the above, we avoid the tedious aspects of
doing so by positing that $S = \vec{\Omega}^T X \vec{\Omega}$ for some matrix
$X$. Inserting the ansatz into condition~(\ref{eq:hermitian-condition}) and
recalling that $\vec{\Omega}\cdot \vec{\nabla} = 0$, we see that $X = \frac{q
N}{2 g_2} Q$ indeed satisfies the condition. By defining $\rho_a \equiv
\sqrt{\Omega_2^2 + \Omega_3^2}$ and $\rho_b \equiv \sqrt{\Omega_4^2 +
\Omega_5^2}$ this may be put into simple terms as $S = \frac{q N}{2
g_2}(\rho_a^2 + 4 \rho_b^2)$. After expanding out $S$ in the remaining terms
added by the transformation, the final Hamiltonian is found to be
\begin{eqnarray}
&&\mathcal{H}^H_0 = \frac{g_2}{2 N} \nabla^2 + q \left( N + \frac{5}{2}
- \frac{q N}{2 g_2} \right) \rho_a^2\nonumber\\
&&{} + 4 q \left( N + \frac{5}{2} -
\frac{2 q N}{g_2} \right) \rho_b^2 + \frac{q^2 N}{2 g_2} \left(
\rho_a^2 + 4 \rho_b^2 \right)^2
\label{eq:g1-zero-hermitian-hamiltonian}
\end{eqnarray}
\section{Large \large$ N |q|$\small\ limits}
\label{sec:large-q-limits}
\subsection{Large positive $ N q$ regime}
\label{sec:large-positive-q}
For large positive $N q$ the dominant $q \hat{Z} = q \hat{a}_\alpha^\dagger
(F^z)^2_{\alpha \beta} \hat{a}_\beta$ term in Hamiltonian
(\ref{eq:many-body-hamiltonian}) is minimized for the state $a_0^{\dagger N}
\ket{0} = b_1^{\dagger N} \ket{0} = \frac{1}{2}
\int_{\mathcal{S}^4}\text{d}^4\Omega\,\prod_{i=2}^{5} \delta(\Omega_i) \ket{\vec{\Omega}}$, suggesting
\footnote{This state minimizes the $q \hat{Z}$ term among all states with $N$ particles, without regard to fixing
$F_z$. The state obviously has $F_z = 0$, as does the limiting
state~(\ref{eq:large-negative-q-mean-field-state}) in the negative $q$ regime,
suggesting the $\hat{F}_z$ nullspace as a particularly natural choice.
We consider $F_z$ to be fixed at 0 for the remainder of
Sec.~\ref{sec:large-q-limits}.}
that the low-lying exact eigenstates are
tightly localized about the $\Omega_1 = \pm 1$ poles. As shown in
\cite{Barnett2011} the wave function has to have parity $\left( -1 \right)^N$,
so we may restrict our attention to the region about one of the poles and infer
the wave function's behaviour about the other by symmetry. We choose to expand
about the $\Omega_1 = +1$ pole, motivating the reparameterization
\begin{equation}
\vec{\Omega} = ( \sqrt{1 - \vec{x}^2}, \vec{x})^T.
\label{eq:large-positive-q-coords}
\end{equation}
We take the indices of $\vec{x}$ to run from $2$ to $5$ to avoid excessive
arithmetic in subscripts. Next assume that low-lying states are of the form
\begin{equation}
\psi_n(\vec{x}) = h_n(\vec{x}) \text{e}^{-\frac{N}{2}
\vec{x}^T \Gamma \vec{x} }
\label{eq:large-positive-q-wavefunction-form}
\end{equation}
where $n$ is a generic (multi)index label, $\Gamma = \text{diag}\left(
\gamma_2, ..., \gamma_5 \right)$ is some diagonal matrix and $h_n$ are some
residual functions of sub-exponential growth such as Hermite polynomials. The
overall factor of $N$ was extracted for later convenience. The diagonal
elements of $N \Gamma$ can be interpreted as inverse squared oscillator lengths
$\xi_{i 0}$ for the $i$-th direction, i.e.~$N \gamma_i = \xi_{i 0}^{-2}$. Our
assumption of tight localization amounts to the condition $\xi_{i 0} \ll 1$,
which has to be checked for consistency at the end of the calculation. Since
$\left\langle x_i^n \partial_j^m \right\rangle \lesssim \xi_{i 0}^n /
\xi_{j 0}^m$ \footnote{Due to wave function parity such expectation values may be
much less or even vanish, but the stated quantity is the upper limit on their order of
magnitude.}, this allows us to simplify the
Hamiltonian~(\ref{eq:rotor-nonHermitian-hamiltonian}) by keeping only the
lowest $\xi_{i 0}$ terms multiplied by each of $\frac{g_{1,2}}{N}$, $q$, and
$N q$.
The goal now is to express
Hamiltonian~(\ref{eq:rotor-nonHermitian-hamiltonian}) in terms of $x_i$
and $\partial_i \equiv \frac{\partial}{\partial x_i}$. The former follows
from the coordinate definitions in Eq.~(\ref{eq:large-positive-q-coords}) while
the latter follows from computing $\nabla_\alpha=\hat{{\bf x}}_\alpha \cdot \nabla$
where $\hat{{\bf x}}_\alpha$ is a unit vector and $\nabla$ is the gradient operator expressed
in terms of the new coordinate system.
This leads to
\begin{eqnarray}
\nabla_1 &=& -\sqrt{1-\vec{x}^2}\;\vec{x}\cdot
\vec{\partial}\nonumber\\
\nabla_i &=& \partial_i-x_i\, \vec{x}\cdot
\vec{\partial}\qquad\text{for}\;i>1
\label{eq:large-positive-q-derivatives}
\end{eqnarray}
Carrying out the necessary index algebra and truncating at the lowest
order $\xi_{i 0}$ terms yields the simple expressions
\begin{align}
\nabla^2 &\simeq \vec{\partial} \cdot \vec{\partial} & \vec{\Omega}^T
Q\, \vec{\Omega} &\simeq \vec{x}^T Q' \vec{x}\nonumber\\
\vec{M}^2 &\simeq -3 \left( \partial_2^2 + \partial_3^2 \right) & \vec{\Omega}^T Q
\vec{\nabla} &\simeq \vec{x}^T Q' \vec{\partial}
\label{eq:simple-large-q-building-blocks}
\end{align}
where $Q' \equiv \text{diag}\,(1,1,4,4)$ is $Q$ with the first row and column
omitted. Putting this all together and letting $p_i = -\text{i}\, \partial_i$, we
obtain an approximate Hamiltonian $\mathcal{H}_+ = \sum_{i=2}^5 \mathcal{H}_i$
where
\begin{equation}
\mathcal{H}_i = \frac{A_i}{2 N}p_i^2 + \frac{N B_i}{2} x_i^2 -
\text{i} C_i x_i p_i
\label{eq:large-q-single-direction-hamiltonian-form}
\end{equation}
where we do not sum over any repeated indices. The various constants in this
Hamiltonian are as follows
\begin{alignat}{2}
A_{2,3} &= 3 g_1 + |g_2| \quad & A_{4, 5} &= |g_2|\nonumber\\
C_{2,3} &= q & C_{4,5} &= 4 q\nonumber\\
B_i &= t_N C_i & \nu_i &\equiv C_i/A_i\nonumber\\
t_N &\equiv 2 + 5/N
\label{eq:large-positive-q-pretransf-constants}
\end{alignat}
where $t_N$ and $\nu_i$ are introduced for the purpose of later notation. This
allows us to treat each direction individually. Following reasoning analogous
to that of Sec.~\ref{sec:special-case-hermitianizing} and applying the
similarity transform $\mathcal{H}^H_+ = \text{e}^{-S} \mathcal{H}_+ \text{e}^S$ with $S =
- N \sum_i \nu_i x_i^2/2$ we obtain a Hermitian sum of four independent
harmonic oscillator Hamiltonians, i.e., a Hamiltonian of the same form as
Eq.~(\ref{eq:large-q-single-direction-hamiltonian-form}) but with new constants
$A_i'=A_i$, $B_i'=B_i+C_i^2/A_i$ and $C_i'=0$.
This allows us to simply read off mode energies and oscillator lengths. They
are
\begin{eqnarray}
\Delta E_i &=& C_i \sqrt{1 + t_N/\nu_i}\nonumber\\
\xi_i^{-2} &=& N \nu_i \sqrt{1 + t_N / \nu_i}\nonumber\\
N \gamma_i = \xi_{i 0}^{-2} &=& N \nu_i \left( 1+ \sqrt{1 + t_N/\nu_i} \right)
\label{eq:large-q-energy-osc-lengths}
\end{eqnarray}
where $\xi_i$ are the oscillator lengths of the Hermitianized Hamiltonian
whereas $\xi_{i 0}$ are those of the original non-Hermitian Hamiltonian. The
solutions are indeed of the form assumed in
Eq.~(\ref{eq:large-positive-q-wavefunction-form}). Referring to
Eq.~(\ref{eq:large-positive-q-pretransf-constants}) allows us to verify that
$\xi_{i 0} \ll 1$ and the consistency of our approach when $N q \gg \left|
g_{1,2} \right|$.
The obtained mode energies agree very well with the numerically obtained
spectrum. As an illustration, the largest relative discrepancy among the $100$
lowest analytically and numerically obtained energies at $N=100,g_1 = |g_2|, q
= 100 |g_2|$ is $1.1$ percent. The accuracy of the oscillator lengths, and the
wave function in general, is discussed in Sec.~\ref{sec:q-overlaps}.
It is interesting to note that the four modes agree exactly with the continuum
Bogoliubov mode energies at zero momentum, minus the density
mode.~\cite{Stamper-Kurn2013} We believe this to be a nontrivial result as the
number of particles $N$ does not neccessarily have to be large. Nevertheless,
the limiting state about which we are expanding is of the mean-field form.
The rotor framework is also capable of describing excitations about fragmented
states. This will be demonstrated in the following subsection. As stated
previously, such excitations are outside the reach of conventional Bogoliubov
analysis.
\subsection{Large negative $N q$ regime}
\label{sec:large-negative-q}
For large negative values of $N q$, i.e., when $-N q \gg \left| g_{1,2} \right|$,
the dominant $q \hat{Z}$ term in Hamiltonian~(\ref{eq:many-body-hamiltonian})
is minimized for the state
\begin{eqnarray}
\left( a_2^\dagger a_{-2}^\dagger \right)^{N/2} \ket{0}
&\propto& \int\text{d}\varphi\,\left( \text{e}^{\text{i} \varphi}a_2^\dagger +
\text{e}^{-\text{i} \varphi} a_{-2}^\dagger \right)^N \ket{0}
\label{eq:large-negative-q-mean-field-state}
\\
&\propto& \int \text{d}\varphi\,\left( \cos\varphi\,b_4^\dagger +
\sin\varphi\,b_5^\dagger \right)^N \ket{0}\nonumber\\
&\propto& \int \text{d}^4 \Omega \,\delta\left( \Omega_1
\right) \delta\left( \Omega_2 \right) \delta\left( \Omega_3
\right) \ket{\vec{\Omega}}
\nonumber
\end{eqnarray}
Note that line one of the above equation clearly demonstrates that we are
working with a fragmented state, with two macroscopically occupied
single-particle states for large $N$. As mentioned before, the rotor
mapping is of particular utility here.
An appropriate reparameterization in this case is
\begin{eqnarray}
\Omega_i &=& x_i\quad\qquad\;\text{for }i = 1, 2, 3\nonumber\\
\left( \Omega_4, \Omega_5 \right) &=& \sqrt{1 - \vec{x}^2} \left(
\cos \varphi, \sin \varphi \right)\quad
\label{eq:large-negative-q-coordinates-with-r}
\end{eqnarray}
where we have reused the label $x$ from the $N q \gg \left| g_{1,2} \right|$
case for three of the coordinates and introduced the angular variable $\varphi$
as the fourth. Further reusing notation from the previous subsection, we
assume low-energy states can be written as
\begin{equation}
\psi_n(\vec{x},\varphi) = h_n(\vec{x},\varphi)
\text{e}^{-\frac{N}{2} \vec{x}^T \Gamma \vec{x} }
\label{eq:large-negative-q-wavefunction-form}
\end{equation}
in analogy with Eq.~(\ref{eq:large-positive-q-wavefunction-form}) for large
positive $N q$. Here $h_n$ is of subexponential growth in $|\vec{x}|$ and
periodic in $\varphi$ and $\Gamma = \text{diag}\,(\gamma_1, \gamma_2,
\gamma_3)$. We again assume the $\xi_{i 0} \equiv (N \gamma_i)^{-1/2}$ are
small, allowing us to keep only the lowest $\xi_{i 0}$ terms multiplied by each
of $\frac{g_{1,2}}{N}$, $q$ and $N q$. Additionally, we assume that the wave
function is not localized in the $\varphi$ direction, so that
$\partial_\varphi \equiv \frac{\partial}{\partial \varphi}$ is of order 1,
in the sense that its matrix elements with low-lying states are at most of
order 1.
Again let $\partial_i \equiv \frac{\partial}{\partial x_i}$ and define
$\vec{\partial} \equiv \left( \partial_1, \partial_2, \partial_3 \right)$,
where we note that $\vec{\partial}$ does not contain $\partial_\varphi$. The
gradient components are found to be
\begin{eqnarray}
\nabla_i &=& \partial_i - x_i \, \vec{x} \cdot \vec{\partial}
\quad \text{for }i = 1, 2, 3\nonumber\\
\nabla_4 &=& -\sqrt{1 - \vec{x}^2} \cos\varphi \, \vec{x}
\cdot \vec{\partial} - \frac{\sin\varphi}{\sqrt{1 - \vec{x}^2}}
\partial_\varphi\nonumber\\
\nabla_5 &=& -\sqrt{1 - \vec{x}^2} \sin\varphi \, \vec{x}
\cdot \vec{\partial} + \frac{\cos\varphi}{\sqrt{1 - \vec{x}^2}}
\partial_\varphi
\label{eq:large-negative-q-derivatives}
\end{eqnarray}
Expressing components of Hamiltonian~(\ref{eq:rotor-nonHermitian-hamiltonian})
in terms of $\vec{x}, \varphi$ and their partial derivatives and
truncating higher order $\xi_{i 0}$ terms yields
\begin{align}
\nabla^2 &\simeq \vec{\partial} \cdot \vec{\partial} &
\vec{\Omega}^T Q\, \vec{\Omega} &\simeq - \vec{x}^T Q'' \vec{x}\nonumber\\
\vec{M}^2 &\simeq -\partial_2^2 - \partial_3^2 &
\vec{\Omega}^T Q \vec{\nabla} &\simeq - \vec{x}^T Q'' \vec{\partial}
\label{eq:simple-negative-q-building-blocks}
\end{align}
where $Q'' =\text{diag}\, (4, 3, 3)$ is $(4\,\mathbb{1} - Q)$ with the last two
columns and rows omitted. This leads to $\mathcal{H}_- = \sum_{i=1}^3
\mathcal{H}_i$ with $\mathcal{H}_i$ of the same form as in
Eq.~(\ref{eq:large-q-single-direction-hamiltonian-form}) and the relevant
constants defined as:
\begin{alignat}{2}
A_1 &= |g_2| & A_{2, 3} &= (g_1 + |g_2|)\nonumber\\
C_1 &= 4 |q| & C_{2, 3} &= 3 |q|\nonumber\\
B_i &= t_N C_i \quad & \nu_i &\equiv C_i/A_i
\label{eq:large-negative-q-pretransf-constants}
\end{alignat}
with $t_N$ as in Eq.~(\ref{eq:large-positive-q-pretransf-constants}). The rest
of the calculation proceeds as in the previous section, again leading to
Eq.~(\ref{eq:large-q-energy-osc-lengths}) for $i = 1,2,3$, evaluated with the
above constants, and a validation of our assumptions of localized states.
Again, the mode energies are in excellent agreement with the numerics, with the
largest relative discrepancy among the first $100$ lowest energies at $N = 100,
g_1 = |g_2|, q = -100 |g_2|$ equal to $0.16$ percent.
\subsection{Wave function overlaps}
\label{sec:q-overlaps}
Besides facilitating the analytical derivation of excitation energies, the
rotor mapping also yields insightful information on the wave functions
themselves. The associated 4-sphere often provides a more intuitive picture of
the wave function than the original second-quantized operator picture.
In this section we investigate the overlap of the ground state wave functions
with arbitrary values of $q$ with wave functions in the limit of large
$N|q|$. The ground state wave functions will be computed in two ways.
In the first approach, we use the rotor mapping while with the second approach
we use exact diagonalization for modest numbers of total particles. We label
the wave functions with the limiting large-$N|q|$ values as
\begin{align*}
\ket{\psi^\infty_+} &= \frac{1}{\sqrt{N!}} (\hat{a}_0^\dagger)^N \ket{0} \\
\ket{\psi^\infty_-} &= \frac{1}{(N/2)!} (\hat{a}_2^\dagger \hat{a}_{-2}^\dagger)^N \ket{0}
\end{align*}
which are appropriate for large positive and large negative $Nq$, respectively.
The first state has a clear correspondence to the mean-field uniaxial nematic
state oriented along the $z$-axis (c.f.\ Fig.\ \ref{fig:mf-phase-diagram}).
The second fragmented state can be viewed as an equal-weight superposition of
all square biaxial nematic states lying in the $xy$ plane, as is evident from
Eq.~(\ref{eq:large-negative-q-mean-field-state}). One may also view
$\ket{\psi^\infty_-}$ as the $F_z = 0$ component of any of these mean-field
ground states. For large positive or negative $Nq$, one expects a large
overlap of the ground state with $\ket{\psi_+^\infty}$ or
$\ket{\psi_-^\infty}$, respectively. On the other hand, for moderate $Nq$, one
may ask if any relic of the order-by-disorder phenomenon present in the
continuum case, as shown in Fig.~\ref{fig:mf-phase-diagram}, remains.
The simplest expressions for the overlaps may be obtained in the regime where
$N \gg 1$ and $|q|$ is not much smaller than either $|g_1|$ or $|g_2|$. We
restrict our attention to this case in the following. This is slightly more
restrictive than the condition of the previous section, namely $N q \gg
|g_{1,2}|$. For the case when $N q \gg |g_{1,2}|$, but $N$ is not large
compared to unity, the analysis is complicated by the interplay between
asymptotic series convergence and the applicability of extending Gaussian
integration limits to infinity.
We define the overlap of two possibly unnormalized states $\ket{a}$ and $\ket{b}$
as $\left( a \middle| b \right) \equiv \left| \braket{a}{b}
\right|/\sqrt{\braket{a}{a}\braket{b}{b}}$. States are completely determined by
their wave function in the overcomplete basis and we follow the convention of
labelling states of the original Hamiltonian by the same label as their rotor
wave functions. That is \begin{equation} \ket{\psi} \equiv \int_{\mathcal{S}^4}
\text{d}\vec{\Omega}\, \psi(\vec{\Omega}) \ket{\vec{\Omega}}.
\label{eq:rotor-to-original-labelling-convention} \end{equation} We label the
ground states as obtained through the rotor mapping by
$\ket{\psi_\pm^\text{R}}$. The sign in the subscript indicates whether we
expanded Hamiltonian~(\ref{eq:rotor-nonHermitian-hamiltonian}) about the
large positive- or large negative-$N q$ limiting state. We label the numerically
obtained ground states by $\ket{\psi^\text{N}}$.
While the overcompleteness of the basis did not manifest itself significantly
in calculating the spectrum, it does affect calculations involving the
eigenfunctions. As is simple to verify from the definition of
$\ket{\vec{\Omega}}$ states, $\braket{\vec{\Omega}_1}{\vec{\Omega}_2} = \left(
\vec{\Omega_1} \cdot \vec{\Omega_2} \right)^N$. In the thermodynamic limit,
one can express this inner product in terms of delta functions on the
four-sphere. However, for finite $N$, overlaps must be computed by means of
double integrals over the 4-sphere:
\begin{equation}
\braket{\psi_a}{\psi_b} = \int_{\mathcal{S}^4}
\text{d}\vec{\Omega}_1\,\int_{\mathcal{S}^4}\text{d}\vec{\Omega}_2\,
\psi_a^*(\vec{\Omega}_1)\psi_b(\vec{\Omega}_2) \left( \vec{\Omega}_1
\cdot \vec{\Omega}_2 \right)^N
\label{eq:double-integral}
\end{equation}
\begin{figure}
\includegraphics[width=\columnwidth]{zeemOrlpsSecond-eps-converted-to}
\caption
{a)
Comparison of numerically and analytically obtained overlaps,
$\left( \psi_\pm^\infty \middle| \psi^{\text{N}} \right)$ and
$\left( \psi_\pm^\infty \middle| \psi_\pm^{\text{R}} \right)$,
represented by solid and dashed lines in the plot, respectively, where
$\psi^{\infty}_{\pm}$ denote the limiting states.
For large $|q|/|g_2|$ both
tend to one or zero. Inset b) demonstrates that $|q|\Delta_\pm$, where
$\Delta_\pm$ is defined under Eq.~(\ref{eq:positive-q-overlaps-final}),
tends to zero with increasing $|q|$, implying that our analytical and
numerical expressions agree to at least first order in asymptotic
expansion.}
\label{fig:mean-field-rotor-quad-Zeeman-overlaps}
\end{figure}
\subsubsection{The case of positive $q$}
Here we reuse the $\vec{x}$ coordinates of Sec.~\ref{sec:large-positive-q} as
defined in Eq.~(\ref{eq:large-positive-q-coords}). We integrate over only half
of the 4-sphere, as this is less cluttered by trivial (anti)symmetrizations.
The relevant wave functions in the rotor picture
(\ref{eq:rotor-to-original-labelling-convention}) are $\psi_+^\infty(\vec{x}) =
\delta^{(4)}(\vec{x})$ and $\psi_+^\text{R}(\vec{x})$. The latter is of the
form of Eq.~(\ref{eq:large-positive-q-wavefunction-form}) with $h_n$ equal to
1, i.e., $\psi_+^\text{R}(\vec{x}) = \exp \left( -\frac{N}{2} \vec{x}^T \Gamma
\vec{x} \right)$, with $\Gamma = \text{diag}\, (\gamma_2, \gamma_3, \gamma_4,
\gamma_5)$ and $\gamma_i$ as expressed in
Eq.~(\ref{eq:large-q-energy-osc-lengths}), evaluated with the values given by
Eq.~(\ref{eq:large-positive-q-pretransf-constants}).
In the new coordinates we have $\text{d}\vec{\Omega} = \text{d}\vec{x}/\sqrt{1 -
\vec{x}^2}$ and the dot product between vectors on the four sphere is expressed
as $\vec{\Omega}_1 \cdot \vec{\Omega}_2 = \sqrt{\left( 1 - \vec{x}_1^2 \right)
\left( 1 - \vec{x}_2^2 \right) + \vec{x}_1 \cdot \vec{x}_2}$. Assuming tight
localization about $\vec{x} = 0$, the main contribution to the integral will
come from that region and we may extend the boundary of integration from
$|\vec{x}| = 1$ to $|\vec{x}| \rightarrow \infty$. The denominator of the new
integration measure varies relatively slowly, so we may set it to its
value at $\vec{x} = 0$.
Due to the simplicity of $\psi_+^\infty$, a straightforward calculation gives
\begin{eqnarray}
\braket{\psi_+^\infty}{\psi_+^\infty} &=& 1\\
\braket{\psi_+^\infty}{\psi_+^\text{R}} &=& \int_{\mathbb{R}^4}
\text{d}\vec{x}\, \left( 1 - \vec{x}^2 \right)^{\frac{N}{2}}
\text{e}^{-\frac{N}{2}\vec{x}^T \Gamma \vec{x}}\nonumber\\
&\simeq& \int_{\mathbb{R}^4} \text{d} \vec{x}\, \text{e}^{-\frac{N}{2}
\vec{x}^T\left( \Gamma + \mathbb{1} \right) \vec{x}}\nonumber\\
&=& \prod_{i=2}^5 \sqrt{\frac{2 \pi}{N \left( \gamma_i + 1 \right)}}.
\label{eq:overlap-with-mean-field-simple-positive-q}
\end{eqnarray}
On the third line we approximated $1 - \vec{x}^2 \simeq \text{e}^{-\vec{x}^2}$,
permissible on account of tight localization.
Evaluation of $\braket{\psi_+^\text{R}}{\psi_+^\text{R}}$ involves the
approximation (valid due to the localized wave functions) ${\bf \Omega}_1 \cdot
{\bf \Omega_2} = \sqrt{\left( 1 - \vec{x}_1^2 \right) \left( 1 - \vec{x}_2^2
\right)} + \vec{x}_1 \cdot \vec{x}_2 \simeq 1 - \frac{\vec{x}_1^2}{2} -
\frac{\vec{x}_2^2}{2} + \vec{x}_1 \cdot \vec{x}_2 = 1 - \frac{1}{2}\left(
\vec{x}_1 - \vec{x}_2 \right)^2 = 1 - \vec{y}_2^2 \simeq \text{e}^{-\vec{y}_2^2}$
where we introduced new integration variables $\vec{y}_{1,2} \equiv \left(
\vec{x}_1 \pm \vec{x}_2 \right)/\sqrt{2}$. With these variables and the above
approximation, the integrand becomes $\exp \left[ -\frac{N}{2} \left(
\vec{y}_1^T \Gamma \vec{y}_1 + \vec{y}_2^T \left( \Gamma + 2 \mathbb{1} \right)
\vec{y}_2 \right) \right]$, leading to
$\braket{\psi_+^\text{R}}{\psi_+^\text{R}} = \prod_{i = 2}^5 \frac{2 \pi}{N}
\left[ \gamma_i \left( \gamma_i + 2 \right) \right]^{-1/2}.$
Combining the results of the previous paragraph and
Eq.~(\ref{eq:overlap-with-mean-field-simple-positive-q}), we find that the
total overlap $\left( \psi_+^\infty \middle| \psi_+^\text{R} \right)$ can be
expressed as a product of contributions from individual $x_i$-directions and
that the $i$-th direction contributes a factor of $\left[ \frac{\gamma_i\left(
\gamma_i + 2 \right)}{\left( \gamma_i + 1 \right)^2} \right]^{1/4}$. This
prompts us to define
\begin{equation}
u_i^2 \equiv \frac{\left( \gamma_i + 1 \right)^2}{\gamma_i \left(
\gamma_i + 2 \right)} = \frac{1}{2} \left( 1 + \frac{\nu_i +
1}{\sqrt{\nu_i \left( \nu_i + 2 \right)}} \right)
\label{eq:overlap-u-definition}
\end{equation}
where the rightmost expression was derived by expanding $\gamma_i$ in terms of
$\nu_i$ as in Eq.~(\ref{eq:large-q-energy-osc-lengths}) and letting $t_N \equiv
2 + 5/N \simeq 2$. The $\nu_i$ are defined in
Eq.~(\ref{eq:large-positive-q-pretransf-constants}) and are summarized here for
convenience:
\begin{equation}
\nu_a \equiv \nu_{2, 3} = \frac{q}{3 g_1 + |g_2|} \qquad \nu_b \equiv
\nu_{4, 5} = \frac{4 q}{|g_2|}.
\label{eq:overlaps-positive-q-nus}
\end{equation}
Since each direction contributes a factor of $u_i^{-1/2}$, the total overlap is
\begin{equation}
\left( \psi_+^\infty \middle| \psi_+^\text{R} \right) = u_a^{-1}
u_b^{-1}.
\label{eq:positive-q-overlaps-final}
\end{equation}
The overlap $\left( \psi_+^\infty\middle| \psi_+^\text{R} \right)$ is plotted
in the main panel of Fig.~\ref{fig:mean-field-rotor-quad-Zeeman-overlaps} for
$N=200$ particles and $g_1 = |g_2|$. For comparison, we have used exact
diagonalization to determine the the wave function $\ket{\psi^N}$ and the
overlaps $(\psi^\infty_{\pm} | \psi^N)$ for the same parameter ranges. As is
expected, for large positive $q$ both the analytical and numerical overlap
expressions approach unity for large $|q|$. To show that the two agree in more
than just this obvious large-$q$ limit, we consider their asymptotic
expansions. Let $f_\pm =(\psi^\infty_{\pm} | \psi^R_{\pm}) = 1 +
\sum_{n=1}^{\infty}a_n q^{-n}$ and $g_\pm =(\psi^\infty_{\pm} | \psi^N) = 1
+ \sum_{n=1}^{\infty}b_n q^{-n}$. Define $\Delta_\pm \equiv \left| f_\pm -
g_\pm \right| = \left|\sum_{n=1}^\infty \left( a_n - b_n \right)
q^{-n}\right|$. In the inset of
Fig.~\ref{fig:mean-field-rotor-quad-Zeeman-overlaps} we show that $q \Delta_+$
tends to zero with increasing $q$, implying that our analytical expressions
agree with the numerics to at least the first order in the asymptotic
expansion.
\subsubsection{The case of negative $q$}
For this subsection, we reuse the $\vec{x}$ and $\varphi$ coordinates of
Sec.~(\ref{sec:large-negative-q}) defined in
Eq.~(\ref{eq:large-negative-q-coordinates-with-r}). The limiting large and
negative $q$ rotor wave function is $\psi_-^\infty(\vec{x}, \varphi) =
\delta^{(3)}(\vec{x})$. The finite-$q$ ground-state as obtained in
section~\ref{sec:large-negative-q} is $\psi_-^\text{R}(\vec{x}, \varphi) = \exp
\left( - \frac{N}{2} \vec{x}^T \Gamma \vec{x} \right)$, with the matrix $\Gamma
= \text{diag}\,(\gamma_1, \gamma_2, \gamma_3)$ as defined underneath
Eq.~(\ref{eq:large-negative-q-wavefunction-form}) and the $\gamma$ variables as
defined in Eq.~(\ref{eq:large-q-energy-osc-lengths}), evaluated at values from
Eq.~(\ref{eq:large-negative-q-pretransf-constants}).
In the new coordinates, one has $\text{d}\vec{\Omega} = \text{d} \varphi\, \text{d} \vec{x} /
\sqrt{1 - \vec{x}^2} \simeq \text{d} \varphi\, \text{d} \vec{x}$, with the last
approximation being permissible on account of localization, as in the positive
$q$ case. As before we may extend the $\vec{x}$ integration boundaries to
infinity. The range of integration in $\varphi$ is from $0$ to $2 \pi$. The
dot product between vectors on the four sphere is $\vec{\Omega}_1 \cdot
\vec{\Omega}_2 = \cos (\varphi_1 - \varphi_2) \sqrt{\left( 1 - \vec{x}_1^2
\right) \left( 1 - \vec{x}_2^2 \right)} + \vec{x}_1 \cdot \vec{x}_2$. Since the
considered wave functions do not depend on the $\varphi$ coordinate, we may
simplify integration over $\varphi_{1,2}$ by a change of variables. Defining
$\varphi \equiv \varphi_1 - \varphi_2$ and, say, $\varphi_2' \equiv \varphi_2$
allows us to immediately perform the now trivial $\varphi_2'$ integral to
obtain
\begin{eqnarray}
&&\braket{\psi_a}{\psi_b} = 2 \pi \int_0^{2 \pi} \text{d} \varphi\,
\iint_{\mathbb{R}^3} \text{d} \vec{x}_1 \, \text{d} \vec{x}_2 \, \psi_a^*
(\vec{x}_1) \psi_b (\vec{x}_2) \times \nonumber\\
&&\qquad \qquad\left( \cos \varphi \sqrt{\left( 1 - \vec{x}_1^2 \right)
\left( 1 - \vec{x}_2^2 \right)} + \vec{x}_1 \cdot
\vec{x}_2 \right)^N
\label{eq:overlap-negative-q-general}
\end{eqnarray}
where $\psi_{a,b}$ are any wave functions that do not depend on the $\varphi$
variable, such as $\psi_-^\infty$ or $\psi_-^\text{R}$. Using this
expression and approximations analogous to those of
Eq.~(\ref{eq:overlap-with-mean-field-simple-positive-q}) the simpler integrals
are found to be:
\begin{eqnarray}
\braket{\psi_-^\infty}{\psi_-^\infty} &=& 2 \pi \int_0^{2 \pi}
\text{d} \varphi\, \cos^N \varphi \equiv \mathcal{N}_-\\
\braket{\psi_-^\infty}{\psi_-^\text{R}} &\simeq& \mathcal{N}_-
\int_{\mathbb{R}^4} \text{d} \vec{x}\, \text{e}^{-\frac{N}{2} \vec{x}^T\left(
\Gamma + \mathbb{1} \right) \vec{x}}\nonumber\\
&=& \mathcal{N}_- \prod_{i=1}^3 \sqrt{\frac{2 \pi}{N \left( \gamma_i +
1 \right)}}.
\label{eq:overlap-with-mean-field-simple-negative-q}
\end{eqnarray}
To calculate $\braket{\psi_-^\text{R}}{\psi_-^\text{R}}$, consider again the
factor $f \equiv \left( \cos \varphi \sqrt{\left( 1 - \vec{x}_1^2 \right)
\left( 1 - \vec{x}_2^2 \right)} + \vec{x}_1 \cdot \vec{x}_2 \right)^N$ of
Eq.~(\ref{eq:overlap-negative-q-general}). Due to the large exponent $N$, the
significant contributions to the integral will come from regions of maximum
$|\cos \varphi|$, that is for $\varphi \sim 0$ or $\pi$. In both regions, we
may expand $\cos \varphi$ to quadratic order and extend integration boundaries
to infinity, yielding a Gaussian integral in $\delta \varphi \equiv \varphi -
\varphi_0$ where $\varphi_0 = 0$ or $\pi$. Also expanding the square roots and
keeping lowest order terms in $\vec{x}_{1, 2}$ and $\varphi$ yields
\begin{equation}
f \simeq \exp \left[ -\frac{N}{2} \left( \delta\varphi^2 + 2
\vec{y}_r^2 + \sum_{i=1}^2 \vec{y}_i^T \Gamma \vec{y}_i^T \right)
\right]
\label{eq:overlaps-negative-q-third-integral-intermediate}
\end{equation}
where $\vec{y}_{1, 2} \equiv \left( \vec{x}_1 \pm \vec{x}_2 \right)/\sqrt{2}$
as in the positive-$q$ case. The label $r$ equals 1 for the $\varphi_0 = \pi$
region and 2 for the $\varphi_0 = 0$ region. The integrals over $\vec{y}_{1,
2}$ are equal in both cases, and twice the $\delta\varphi$ integral is in fact
approximately equal to $\mathcal{N}_-$ of
Eq.~(\ref{eq:overlap-with-mean-field-simple-negative-q}), as can be verified by
applying the same approximate treatment of integration over $\varphi$ to
$\braket{\psi_-^\infty}{\psi_-^\infty}$. This leads to
$\braket{\psi_-^\text{R}}{\psi_-^\text{R}} = \mathcal{N}_- \prod_{i = 1}^3
\frac{2 \pi}{N} \left[ \gamma_i \left( \gamma_i + 2 \right) \right]^{-1/2}$.
Combining the above results and expressing everything in terms of $u_i$,
defined in Eq.~(\ref{eq:overlap-u-definition}) and evaluated at
\begin{equation}
\nu_c \equiv \nu_1 = 4 \left|\frac{q}{g_2}\right| \qquad \nu_d \equiv
\nu_{2, 3} = \frac{3 |q|}{g_1 + |g_2|},
\label{eq:overlaps-negative-q-nus}
\end{equation}
summarized after Eq.~(\ref{eq:large-negative-q-pretransf-constants}),
ultimately yields
\begin{equation}
\left( \psi_-^\infty \middle| \psi_-^\text{R} \right) =
u_c^{-\frac{1}{2}} u_d^{-1}
\label{eq:negative-q-overlaps-final}
\end{equation}
The main panel of Fig.~\ref{fig:mean-field-rotor-quad-Zeeman-overlaps} again
demonstrates that both numerical and analytical overlaps tend to 1 with
increasing $|q|$ while the inset shows that the convergence agrees to at least
the first order in the asymptotic expansion.
\section{Order-by-Disorder}
\label{sec:obd}
One of the most salient features seen in Fig.\
\ref{fig:mean-field-rotor-quad-Zeeman-overlaps} is the absence of the
order-by-disorder phenomenon which is present for the continuum case
\cite{Song2007,Turner2007}. We note that while the analytical expressions for
the overlaps $(\psi^\infty_{\pm} | \psi^R_{\pm})$ are valid only for $|q|$
larger than either $|g_1|$ or $|g_2|$, the numerically computed overlaps
$(\psi^\infty_{\pm} | \psi^N)$ for modest particle number are valid for all
$q$. For the case of $g_1>0$, one might expect a tendency towards the uniaxial
nematic state for small $q$, but this is not exhibited in
Fig.~\ref{fig:mean-field-rotor-quad-Zeeman-overlaps}. Instead, for small $q$,
symmetry restoring fluctuations drive the system towards the singlet state
which is the true ground state for $q=0$ and finite particle number. Varying
$g_1/|g_2|$ only affects how quickly the ground state approaches the respective
limiting states. This effect is completely smooth in the whole nematic region:
the smaller $g_1/|g_2|$ is, the faster the ground states approach the limiting
mean-field states with increasing $|q|/|g_2|$, without any qualitative change
in behavior at $g_1 = 0$.
The lack of the order-by-disorder selection at the quantum / single-mode level
can be accounted for by the fact that the quadratic Zeeman potential breaks too
much symmetry. Motivated by this, we consider an alternative external
potential. Specifically, we consider a potential that replaces
\begin{align}
\label{newfield}
q \hat{Z} \rightarrow \lambda ( \hat{a}_1^\dagger \hat{a}_1 +
\hat{a}_{-1}^\dagger \hat{a}_{-1} )
\end{align}
in Hamiltonian~(\ref{eq:many-body-hamiltonian}). Such a potential could be
realized with microwave fields. We note that within mean field theory, all
nematic states of the form (\ref{eq:degenerate-nematic-states}) are degenerate
under this external potential. Considering the rotor mapping rule in
Eq.~(\ref{eq:rotor-transformation-rule}) one can see this propagates through
the mapping by changing the last line of
Hamiltonian~(\ref{eq:rotor-nonHermitian-hamiltonian}) to
\begin{equation}
\mathcal{H}_\lambda = \lambda\left( \left( N + 5 \right)\left(
\Omega_2^2 + \Omega_3^2 \right) - \Omega_2 \nabla_2 - \Omega_3 \nabla_3
\right).
\label{eq:lamba-hamiltonian-contrib}
\end{equation}
In the following we will perform an analysis on this model following the rotor
mapping of the previous Sections. In the Appendix, an analysis of the
analogous continuum problem is discussed.
\subsection{Rotor treatment}
\label{seq:obd-rotor}
The results of this section are similar to the large-$N |q|$ limit in that, for
sufficiently large $\lambda$ and depending on the sign of $g_1$, the rotor
wave function is localized either about the $\Omega_1$ pole or around the 4-5
equator of the 4-sphere. However, the localization width scales differently
with $N$ than in the quadratic Zeeman case, leading to important qualitative
differences. Localization at the pole (equator) also occurs at negative
(positive) $g_1$, which is in fact the opposite of the effect in the
continuum in the absence of an external potential.
For the calculations of this section we introduce a third, more general
coordinate system:
\begin{eqnarray}
\vec{\Omega} = \left(
\begin{matrix}
\cos\eta \sqrt{1 - \vec{x}^2}\\
x_1 \cos\varphi - x_2 \sin\varphi\\
x_1 \sin\varphi + x_2 \cos\varphi\\
\sin\eta \cos 2\varphi \sqrt{1 - \vec{x}^2}\\
\sin\eta \sin 2\varphi \sqrt{1 - \vec{x}^2}
\end{matrix}
\right)
\label{eq:obd-general-coords}
\end{eqnarray}
This can be put into a more compact form by using rotation matrices. In
particular let $R_{\alpha \beta}(\varphi)$ be the matrix which rotates in the
$\alpha \beta$ plane by angle $\varphi$. Then the current coordinate system can
be written as $\vec{\Omega} = R_{2 3}(\varphi) R_{4 5}(2\varphi) R_{1 4}(\eta)
\left( \sqrt{1 - \vec{x}^2}, x_1, x_2, 0, 0 \right)^T$. Note that $R_{2
3}(\varphi) R_{4 5}(2\varphi) = \exp(-\text{i} \varphi M^z)$. Recalling that each
point of the 4-sphere is associated with a spatial rotation of a mean-field
nematic state, the $\eta$ coordinate is seen to correspond exactly to the
$\eta$ parameterizing the accidentally degenerate family of nematic states in
Eq.~(\ref{eq:degenerate-nematic-states}), while $\varphi$ and $\vec{x}$
determine their spatial orientations.
As usual we consider the $\hat{F}_z$-nullspace, meaning that our wave functions
will be independent of $\varphi$. By further observing factors of $N$ in
Hamiltonian~(\ref{eq:rotor-nonHermitian-hamiltonian}) expanded in
coordinates~(\ref{eq:obd-general-coords}) we can infer that low-lying wave
functions are again localized on the scale of order $N^{-1/2}$ in the $x$
variables. Assuming that $\eta$ is localized about some $\eta_0$ and denoting
$\delta\eta \equiv \eta - \eta_0$, we may also infer that low-lying states are
localized in $\delta\eta$ on a scale of order $N^{-1/4}$, subject to some
consistency criteria. This allows us to separate the Hamiltonian into two
parts, $\hat{\mathcal{H}}_0$ of order $1$ and $\hat{\mathcal{H}}_\eta$ of orders between $N^{-1/4}$
to $N^{-3/4}$, and we discard terms of higher order in $1/N$. For compact
notation introduce matrices $A(\eta) \equiv \left( 1 + 2 g_1/|g_2| \right)
\mathbb{1} + B(\eta)$ with $B(\eta) = \frac{g_1}{|g_2|} \text{diag} \left( \cos
2\eta + \sqrt{3} \sin 2\eta, \cos 2\eta - \sqrt{3} \sin 2\eta \right)$. Denote
$\partial_i \equiv \frac{\partial}{\partial x_i}$ and $\partial_\eta \equiv
\frac{\partial}{\partial \eta} = \frac{\partial}{\partial \delta\eta}$. Let
$L_x \equiv -\text{i}\left( x_1 \partial_2 - x_2 \partial_1 \right)$ and $T_1 \equiv
x_1 \partial_1 + x_2^2 \partial_1^2 - (1 \leftrightarrow 2)$. Then we may write
\begin{eqnarray}
\hat{\mathcal{H}}_0 &=& - \frac{|g_2|}{2 N} A_{i j}(\eta_0) \partial_i \partial_j +
\lambda N \vec{x}^2 - \lambda \vec{x} \cdot \vec{\partial}\nonumber\\
\hat{\mathcal{H}}_\eta &=& - \frac{|g_2|}{2 N} \left[ \partial_\eta^2 + \left(
\cot \eta - B'_{i j}(\eta_0) x_i \partial_j \right)
\partial_\eta\right.\nonumber\\
&&{}+ \delta\eta B'_{i j}(\eta_0) \partial_i \partial_j + \frac{1}{2}
\delta\eta^2 B''_{i j}(\eta_0) \partial_i \partial_j\nonumber\\
&&\left.{}-\frac{\csc^2 \eta}{4} L_x^2 \right] + \frac{g_1}{2 N}
\sqrt{3} \csc \eta\, T_1.
\label{eq:zeroth-first-order-obd-hamiltonian}
\end{eqnarray}
The last line is of a non-negligible order only when the distance between
$\eta_0$ and $0$ or $\pi$ is of the order of $N^{-1/4}$ or less.
Noting that $\hat{\mathcal{H}}_0$ does not depend on $\delta\eta$, we may tackle the
above with degenerate perturbation theory. First we note that $\hat{\mathcal{H}}_0$ may
be brought to Hermitian form by applying the similarity transformation
$\text{e}^{-S}\hat{\mathcal{H}}_0 \text{e}^S$ where
\begin{equation}
S = - \frac{N \lambda}{2 |g_2|} \vec{x}^T A(\eta_0)^{-1} \vec{x}.
\label{eq:obd-similarity-transform}
\end{equation}
The transformed Hamiltonian has the ground state energy
\begin{equation}
E_0(\eta_0) = \lambda\left( 1 + \frac{1}{2} \text{Tr}\, \sqrt{\mathbb{1} +
\frac{2|g_2|}{\lambda}A(\eta_0)} \right).
\label{eq:obd-zeroth-order-gs-energy}
\end{equation}
and ground state eigenfunction
\begin{align}
\label{eq:obd-zeroth-order-x-wavefunction}
\psi_0(\vec{x}) =
\left( 2 \pi \right)^{-\frac{1}{2}}
\text{det}^\frac{1}{4}\, C(\eta_0) \exp \left[ -\frac{N \lambda}{2 |g_2|}
\vec{x}^T C(\eta_0) \vec{x} \right]
\end{align}
where $C(\eta_0) \equiv A(\eta_0)^{-1} \sqrt{\mathbb{1} + \frac{2
|g_2|}{\lambda} A(\eta_0)}$. We can then project $\text{e}^{-S}\hat{\mathcal{H}}_\eta \text{e}^S$
into this low-energy subspace to obtain an effective Hamiltonian as
\begin{align*}
\hat{\mathcal{H}}^{\rm eff}_\eta = \int d \vec{x} \; \psi^*_0(\vec{x}) \text{e}^{-S} \hat{\mathcal{H}}_\eta \text{e}^S
\psi_0 (\vec{x}).
\end{align*}
Now observe the following expectation value:
\begin{equation}
M_{i j} \left\langle \partial_i \partial_j \right\rangle =
-N \text{Tr} \left[ M \left( \mathbb{1} + \frac{2
|g_2|}{\lambda} A(\eta_0) \right)^{-\frac{1}{2}} \right]
\label{eq:obd-first-exp-values}
\end{equation}
where $M$ is an arbitrary matrix. Observe that this case covers the
coefficients of both the linear and quadratic $\delta\eta$ terms in
$\hat{\mathcal{H}}_\eta$, Eq.~(\ref{eq:zeroth-first-order-obd-hamiltonian}), by choosing
$M$ to be $-\frac{|g_2|}{2 N} B'(\eta_0)$ and $-\frac{|g_2|}{2 N}B''(\eta_0)$,
respectively. At this point note that should the expectation value of the
linear $\delta\eta$ term be of its natural order, order $1$, completing the
square in $\delta\eta$ would yield another term of order 1, invalidating its
placement into $\hat{\mathcal{H}}_\eta$ which is supposed to be of higher order in $1/N$.
Note also that the coefficient of the linear $\delta\eta$ term is exactly the
derivative of the zeroth-order energy $E_0(\eta_0)$ from
Eq.~(\ref{eq:obd-zeroth-order-gs-energy}) with respect to $\eta_0$. The above
problem is avoided if we expand about a local extremum of $E_0(\eta_0)$,
eliminating the linear term. For $\hat{\mathcal{H}}_\eta^\text{eff}$ to be bounded from
below, the extremum must be a minimum. Note that we do not get any apparent
order inconsistencies if we expand about an $\eta_0$ a distance of order
$N^{-1/4}$ away from the local minimum, but the analysis is vastly simplified
when the linear term is exactly zero, particularly for the last line of
Eq.~(\ref{eq:zeroth-first-order-obd-hamiltonian}) when close to $\eta_0 = 0$,
so we focus on expansions about zeroth-order energy minima from now on.
\begin{figure}
\includegraphics[width=\columnwidth]{obdThird-eps-converted-to}
\caption{
a) Absolute value of overlaps between the limiting states
$\ket{\psi_\pm^\infty}$ and numerically computed ground states with
respect to particle number $N$ at $\lambda = 10 |g_2|$. The solid and
dashed lines show the bigger overlaps, with the biaxial state for $g_1
> 0$ and uniaxial for $g_1 < 0$, and correspond to the linear scale on
the left y-axis. The markers show the smaller overlaps and correspond
to the logarithmic scale on the right y-axis. We see that all
mean-field overlaps decrease with particle number, in agreement with
our analytical findings. b) The numerically computed expectation
value of the fraction of particles in the $\hat{F}_z = 0$
single-particle state with respect to particle number $N$ at $\lambda =
10 |g_2|$. For compactness, the quantity actually plotted is $\left|
\frac{\left\langle \hat{n}_0 \right\rangle}{N} - \left(
\frac{\left\langle \hat{n}_0 \right\rangle}{N} \right)_\infty \right|$
where $\hat{n}_m = \hat{a}_m^\dagger \hat{a}_m$, $\left\langle \cdot
\right\rangle$ denotes the ground-state expectation value and $\left(
\cdot \right)_\infty$ denotes taking the limit of $N \rightarrow
\infty$. $\left( \frac{\left\langle \hat{n}_0 \right\rangle}{N}
\right)_\infty$ is predicted analytically and equals 0 for positive
$g_1$ and 1 for negative $g_1$ (see main text). Note that
$\left\langle \hat{n}_0 \right\rangle = N - \left\langle \hat{n}_2 + \hat{n}_{-2}
\right\rangle$ to a very good approximation, with $\left\langle \hat{n}_1 +
\hat{n}_{-1} \right\rangle$ already being negligible for the values of $N$
shown. The differences decrease with $N$, indicating a good agreement
with analytical computations. These qualitative features are visible in
c) and d) showing relative occupations of individual single-particle
magnetic sublevels, labeled by $m$, at $N = 200$ for both signs of
$g_1$. Results shown in c) and d) are obtained through exact diagonalization.}
\label{fig:obd-figure}
\end{figure}
For large enough $\lambda$, these occur only at $\eta_0 = 0$ and $\pi/2$. In
both of these cases, $A(\eta_0)$ is proportional to $\mathbb{1}$, so both
$\psi_0(\vec{x})$ and $\text{e}^{\pm S}\psi_0(\vec{x})$ are isotropic in $x_1, x_2$.
As is easy to verify, this makes the expectation values of the last line of
Eq.~(\ref{eq:zeroth-first-order-obd-hamiltonian}) zero, eliminating those terms
from $\hat{\mathcal{H}}_\eta^\text{eff}$. Additionally $B'(\eta_0) \propto \text{diag}\,
\left( 1, -1 \right)$ which, combined with isotropy in $\vec{x}$, leads to
$B'_{i j}(\eta_0) \left\langle x_i \partial_j \right\rangle = 0$ as well.
Finally noting $B(0,\frac{\pi}{2}) = \pm \frac{g_1}{|g_2|} \mathbb{1}$ and
$B''(\eta_0) = -4 B(\eta_0)$ and evaluating the coefficient of the quadratic
$\delta\eta$ term via Eq.~(\ref{eq:obd-first-exp-values}), we obtain
\begin{eqnarray}
\hat{\mathcal{H}}_\eta^\text{eff} &=& -\frac{|g_2|}{2 N} \left( \partial_\eta^2 +
\cot \eta\, \partial_\eta \right)\\
&\mp& 4 g_1\left( 1 + 2 \left[ |g_2| + \left( 2 \pm 1 \right)g_1
\right]/\lambda \right)^{-\frac{1}{2}} \delta\eta^2\nonumber
\label{eq:obd-effective-delta-eta-hamiltonian}
\end{eqnarray}
where the upper sign corresponds to the expansion about $\eta_0 = 0$ and the
lower sign about $\eta_0 = \pi/2$. This immediately implies the ground-state is
localized about the pole, $\eta_0 = 0$, for negative $g_1$, and the 4-5
equator, $\eta_0 = \pi/2$, for positive $g_1$. In the latter case, we may
discard the $\cot \eta\,\partial_\eta$ term to obtain a 1-dimensional harmonic
oscillator Hamiltonian. Letting $d_{\frac{\pi}{2}} \equiv 1 + \frac{2}{\lambda}
\left( |g_2| + g_1 \right)$, we may write the effective mode energy and
oscillator length as $\Delta E_{\frac{\pi}{2}} = 2 \sqrt{\frac{2|g_2|g_1}{N}}
d_{\frac{\pi}{2}}^{-1/4}$ and $\xi_{\frac{\pi}{2}} = \left( \frac{|g_2|}{8 N
g_1} \right)^{1/4} d_{\frac{\pi}{2}}^{1/8}$. In the former case, when $g_1 <
0$, we may approximate $\cot \eta \simeq \eta^{-1}$, yielding a two-dimensional
isotropic harmonic oscillator Hamiltonian with the angular momentum term
absent. This may be solved by reintroducing the angular momentum term and then
restricting to isotropic, zero-angular-momentum states. Denoting $d_0 \equiv 1
+ \frac{2}{\lambda} \left( |g_2| + 3 g_1 \right)$, the effective spectrum
equals $E_0^n = (2 n + 1) \Delta E_0$ where $n = 0, 1, 2, \dots$ and $\Delta
E_0 = 2 \sqrt{\frac{2 |g_2| g_1}{N}} d_0^{-1/4}$, and the oscillator length, or
scale of localization in $\eta$, equals $\xi_0 = \left( \frac{|g_2|}{8 N g_1}
\right)^{1/4}d_0^{1/8}$.
In both cases, states are seen to be localized in the $\eta$ direction on the
scale of $\xi_\lambda \sim N^{-1/4}$. It may be verified by integration over
the 4-sphere, akin to the treatment in Sec.~\ref{sec:q-overlaps}, that this
causes the overlaps with \emph{any} mean-field state, i.e. a state of the form
of Eq.~(\ref{eq:rotor-basis-definition}), to tend to zero with increasing $N$.
While computationally accessible particle numbers are hardly in the large-$N$
regime, the numerical results in Fig.~\ref{fig:obd-figure} support our
analytical conclusions or, for the larger datasets, indicate the correct trend
with respect to $N$. Also shown in Fig.~\ref{fig:obd-figure} are numerical
results for the occupation numbers $\langle \hat{a}_n^\dagger \hat{a}_n
\rangle$ which verify the anaytical results of this section.
\section{Conclusion}
In this work, we have developed and employed the spin-2 rotor mapping
formalism to obtain a number of results that have so far proven analytically
inaccessible by other means. We have obtained an exact Hermitian Hamiltonian
for the special case of $g_1 = 0, g_2 < 0$ in the presence of an arbitrary
quadratic Zeeman field, and an approximate Hamiltonian in the $N|q| \gg
|g_{1,2}|$ regime for the entire nematic region. Its spectrum and localization
width, the latter in the related $N \gg 1$ regime, were evaluated analytically
and found to be in good agreement with numerical results. Notably, for large
negative $q$ the ground state tends to a fragmented condensate, the excitations
about which cannot be analyzed by means of conventional Bogoliubov theory, but
do lend themselves to an analysis within the rotor framework.
Additionally, one finds that no traces remain of the order-by-disorder
mechanism, predicted to occur in the related continuum problem. The emergent
first-order phase transition at $g_1=0$ also seems to be gone and the behaviour
is smooth across the entire nematic region. Motivated by this, we considered an
alternative potential which leaves the mean-field degeneracy intact, and again
applied the rotor methodology. The ground state overlaps with \emph{all}
mean-field states are predicted to approach zero with increasing particle
number, indicating we are dealing with a highly non-mean-field state. Its
individual magnetic sublevel occupation values are, however, consistent with
continuum order-by-disorder results.
The present analysis demonstrates that the rotor mapping may be fruitfully
applied to a number of different potentials for the tightly-confined spin-2
problem. Additionally, simple analytical expressions may be obtained in the
relevant limits. This makes it a suitable candidate for application to further
specialized problems within the context of tightly confined spin-2 condensates.
An interesting avenue for further theoretical investigation of the mapping is
also the aforementioned Hermitianizing transform that may be applied in more
general setups. Preliminary analysis suggests that it is indeed applicable to
an arbitrary Hermitian bilinear term in the many-body Hamiltonian of
Eq.~(\ref{eq:many-body-hamiltonian}).
\acknowledgements
We thank Janne Ruostekoski for useful discussions during the early stages of this work. This work was supported in part by the European Union's Seventh Framework Programme for research, technological development, and demonstration under Grant No.\ PCIG-GA-2013-631002.
|
\section{Introduction}
In recent years, gamma-ray observations of Milky Way dwarf spheroidal galaxies (dSphs) have
led to great strides in sensitivity to dark matter annihilation. Here
the goal is to probe particles which interact with the Standard Model with the well-motivated weak-scale annihilation
cross section ${\langle\sigma v\rangle} \simeq 3 \times 10^{-26}\,\mathrm{cm^3 \,s^{-1}}$. Particles having this cross section will exist today with an abundance equal to that observed for dark matter $\Omega_{\rm DM}$, making this so-called relic cross section a natural target for experimental searches for annihilation.
Combined analyses of dSphs using data from
Fermi Large Area Telescope (LAT) first ruled out the relic cross section for dark matter particle masses of a few tens of
GeV~\cite{2011PhRvL.107x1303G,2011PhRvL.107x1302A} and follow-up
analyses incorporating more dSphs and increased observation time
continue to improve
sensitivity~\cite[e.g.][]{2014PhRvD..89d2001A,2015PhRvD..91h3535G,2015PhRvL.115w1301A}. For
higher dark matter masses ($M \gtrsim \mathrm{TeV}$), the three major
Cherenkov telescope collaborations continue to invest significant time
on pointed observations of Milky Way dSphs. The resulting upper limits
are two to three orders of magnitude from the relic cross
section~\cite{2012PhRvD..85f2001A,2014JCAP...02..008A,2014PhRvD..90k2012A,2016JCAP...02..039M,2015arXiv150901105Z},
but the situation bodes well for the future CTA
project~\cite[e.g.][]{2015arXiv150806128C}.
An exciting development in this field is the recent and
ongoing discovery of large numbers of new Milky Way satellites made
possible by wide-area photometric
surveys~\cite[e.g.][]{2015ApJ...805..130K,2015ApJ...807...50B,2015ApJ...802L..18L,2015ApJ...813..109D}. Since
2015 the number of known Milky Way satellites has approximately
doubled thanks to Southern hemisphere data from the Dark Energy Survey
and Pan-STARRS. These new dSphs have the potential to significantly
build on current efforts to uncover evidence of dark matter
annihilation~\cite[e.g.][]{2015PhRvD..91f3515H,2015PhRvL.115h1101G,2015ApJ...809L...4D,2015JCAP...09..016H,2015arXiv151109252L}.
Intriguingly, the first of these new dwarf spheroidal galaxies discovered, Reticulum~II,
shows indications of a gamma-ray signal exceeding background in the
Fermi-LAT data~\cite{2015PhRvL.115h1101G}. Two methods of modeling
the gamma-ray background yield false-alarm probabilities of $p=0.0001$
and $0.01$ for detecting such a signal. Subsequent
analysis~\cite{2015JCAP...09..016H} confirmed the results
of~\cite{2015PhRvL.115h1101G} and argued that the Reticulum~II signal
was consistent with the gamma-ray excess reported from the Galactic
Center and claimed as dark matter. With a reprocessing of the raw
Fermi data~\cite{2015ApJ...809L...4D}, the Fermi-LAT Collaboration
found an increased probability for a background fluctuation explaining
the Reticulum~II signal ($p=0.05$) and concluded the signal is
insignificant. Making sense of the results
of~\cite{2015PhRvL.115h1101G} and~\cite{2015ApJ...809L...4D} is
complicated by the fact that the two datasets are only partially
independent, sharing approximately half the detector events. A
separate analysis is needed to compute joint probabilities of
background fluctuation in the partially correlated datasets.
In this work we follow a different path towards assessing dark matter interpretations of gamma-ray signals.
Rather than analyzing the gamma-ray data, we consider the determination of the dark matter
content of the Milky Way's dSphs, a necessary ingredient for performing optimized combined searches using
dSphs. A critical test of any alleged dark
matter signal from dSphs is that the amplitude of the gamma-ray signal must
scale amongst the dSphs according to their J-factors (see,
e.g.,~\cite{2015ApJ...801...74G,2015MNRAS.453..849B}). The J-factor is
the square of the dark matter density integrated along the line of
sight and over the solid angle of the observation,
\begin{equation}
J = \int\int {\rho_{\rm DM}}^2(\ell, \Omega) d\ell d\Omega.
\label{eq:Jfactor}
\end{equation}
While annihilating dark matter models are theoretically better motivated, there are models in which dark matter decays \citep{Ibarra2013}. In these models, the relevant astrophysical factor is the D-factor, which is the dark matter density integrated along the line of
sight and over the solid angle of the observation.
Robust determinations of the relative J-factors is of prime
importance. For instance, the Fermi-LAT
Collaboration~\cite{2015ApJ...809L...4D}, under the assumption that
each of eight considered dSphs was equally likely to produce a signal,
further diluted the significance of the Reticulum~II gamma-ray excess to $p=1 - (1-0.05)^8 = 0.33$, concluding that it is
insignificant. However, there are reasons to doubt the usefulness of
this argument as Reticulum~II is closer and very highly flattened,
both of which can enhance the amplitude of an annihilation signal compared
to other dSphs. Therefore, we require accurate relative estimates of the J- and D-factors, but unfortunately the
data on the most tempting dSph candidates are often of limited quality. Motivated
by this \cite[][~hereafter Paper I]{EvansSandersGS} provided simple formulae for
the J- and D-factors for a spherical NFW profile and infinite
spherical cusps. The formulae relied on the empirical law that the
mass within the half-light radius is well constrained as \citep{Wa09,Wo10}
\begin{equation}
M_{\rm h}=M(R_{\rm h})\approx \frac{5}{2G}\langle\sigma_{\rm los}^2\rangle R_{\rm h},
\label{eq:wolf}
\end{equation}
where $R_{\rm h}$ is the (projected) half-light radius of the stars and
$\langle\sigma_{\rm los}^2\rangle$ is the luminosity weighted squared line-of-sight velocity dispersion.
However, an entirely characteristic feature of dSphs is in the name --
spheroidal! They are flattened (with a typical ellipticity between $0.3$ and $0.5$), and some of the ultrafaints are very
highly flattened with ellipticities exceeding $0.5$, such as
Hercules~\citep{De12}, Ursa Major I~\citep{Ma08}, Ursa Major
II~\citep{Zu06}, and indeed Reticulum~II~\citep{Ko15}. Therefore, the
underlying physical model of a spherical dark halo containing a round
distribution of stars may fail to capture important aspects of the
physics. Here we extend the scope of spherical analyses, to account
for the effects of flattening in both the stellar and dark matter
profiles. \citet{Bo15d} provided a systematic investigation of J-factors of flattened figures. Here, two mildly triaxial numerical
models of dSphs (created for The {\it Gaia} Challenge) were viewed
along each of the short, medium and long axes. This investigation
revealed that the projection effects can have a significant impact on
the velocity dispersion, and concluded that the J-factors constructed
by Jeans analyses can vary from the true values by $\sim 2.5$. Recently, \cite{Hayashi2016} computed J-factor estimates for the dSphs using axisymmetric Jeans modelling. These authors attributed the differences between their measured J-factors and those from spherical analyses primarily to other modelling assumptions.
It is natural to expect that the dissipationless
dark matter distribution is rounder -- or at least no more flattened
-- than the dissipative baryonic component. So, large classical dSphs
which appear roundish on the sky (such as Leo I and II) may have
almost spherical dark matter halos. However, the dark halos of the ultrafaints are expected to be more
highly flattened than those of the classical dSphs, as it is known
that baryonic feedback effects drive the dark matter distribution
towards sphericity~\citep{Ab10,Ze12}. The ultrafaints have such a puny
baryonic content that pure dissipationless
simulations~\citep{Ji02,Al06}, which find strongly triaxial and nearly
prolate dark halos, may be a much better guide to the true shape. For instance, recent simulations have found that
the baryonic distribution is just $\sim10\text{ per cent}$ flatter than the
dark-matter distribution for dark-matter halos of $10^{10} M_\odot$
~\citep{Tenneti2014}. Throughout this paper, we work under the assumption that the dark matter distribution is flattened in the same way as the stellar
distribution.
The effects of flattening can be understood qualitatively for a few
simple configurations. The simplest is the face-on case when the
dark-matter and stellar distributions are flattened along the
line-of-sight. Observationally, the isophotes still appear circular
and the measured half-light radius remains the same, but we have
increased (decreased) the density of dark matter in the oblate
(prolate) case. Naturally, this effect -- which we refer to as the
\emph{geometric factor} -- gives rise to a larger (smaller) J-factor
than a spherical analysis would infer. But, we must also consider the
effect of flattening on the line-of-sight velocity dispersion, which
we call the \emph{kinematic factor}. For the oblate case, the stellar
distribution is more compressed, so the line-of-sight dispersion is
now smaller than the spherically averaged dispersion. Less contained
mass is inferred and so the spherical J-factor underestimates the
total J-factor. Therefore, for face-on viewing of an oblate figure,
both the geometric and kinematic effects cause the J-factor inferred
from a spherical analysis to be an underestimate of the true value.
For the prolate case, the velocity dispersion is larger than the
spherically-averaged dispersion and so more mass is inferred and the
spherical J-factor is an overestimate.
When the dSph is viewed \emph{edge-on} such that it appears flattened
in the sky, the combined result of the kinematic and geometric effects
is less clear. For oblate figures, the density is increased over the
spherical case, whilst the half-light radius remains the same. These
geometric effects cause the J-factor assuming sphericity to be an
underestimate. However, the kinematic factor works the other way, as
the measured velocity dispersion is greater than the spherical
average. We will see that the combination of these two competing
effects leads to a small decrease in the true J-factor over that
inferred from a spherical analysis. For the prolate case, we have the
converse situation with the geometric factor leading to an
overestimate whilst the kinematic factor leads to an
underestimate. However, now the stretching of the stellar profile in
the sky causes the half-light radius to increase. We will see that the
net result is an increase in the true J-factor over the spherical
J-factor.
This qualitative explanation is tested in Section II where we
construct equilibrium models of the Reticulum~II galaxy via the
made-to-measure method. We explore a range of different flattenings
and provide simple fits for the correction factors. In Section III, we
use these fits to derive J-factors for the known dwarf spheroidals under
the assumption that they are either prolate or oblate. In Section IV,
we build intuition for our numerical results by considering two
families of axisymmetric equilibria for which analytic progress is
possible and present a more rapid general approach for estimating the correction factors using the virial theorem. Section V extends these findings to the triaxial case and
demonstrates how the correction factors vary for a triaxial figure as a
function of the viewing angle. In Section VI, we discuss the
constraints and evidence on the intrinsic shapes and alignments of the
Milky Way dSphs and give estimates of the uncertainties in the J-factors of the dSphs due to unknown triaxiality. In Section VII we summarize our findings and discuss possible implications for the claimed signal from Reticulum~II in light of our work.
\begin{figure}
\includegraphics[width=\columnwidth]{models}
\caption{Reticulum~II M2M equilibria of a flattened Plummer
distribution of stars in a flattened NFW dark halo. The top left
panel shows the logarithm of the projected mass distribution of an
oblate model viewed edge-on with axis ratio $0.4$. The contours are
logarithmically spaced. The top right panel shows the logarithm of
the projected mass distribution of a prolate model viewed edge-on
with axis ratio $0.4$. Note the `X'-shape in the prolate case. The
bottom left panel shows the surface density profiles in elliptical
bins with Plummer profile fits (oblate in blue, prolate in dashed
green). The bottom right panel shows the line-of-sight velocity
distributions (oblate in blue, prolate in dashed green).}
\label{fig:flattened}
\end{figure}
\section{Made-to-measure flattened equilibria}\label{Sect::M2M}
We begin our analysis of the J-factors of flattened dSphs with numerical models
constructed by the made-to-measure (M2M) methods \citep{Sy96} as implemented
by \citet{De09}. The models are two-component: dark and stellar. Each
component has a target density of the form
\begin{equation}
\rho (m)\propto p^{-1}q^{-1}
\Big(\frac{m}{r_{\rm s}}\Big)^{-\gamma}\Big(1+\Big(\frac{m}{r_{\rm s}}\Big)^{\alpha}\Big)^{(\gamma-\beta)/\alpha}\mathrm{sech}\frac{m}{r_{\rm t}},
\label{abgmodel}
\end{equation}
where $m^2=x^2+(y/p)^2+(z/q)^2$. This is the familiar
double power-law with scale radius $r_{\rm s}$, with an exponential taper at
the tidal radius $r_{\rm t}$. For $r \ll r_{\rm s}$, the density falls like
$r^{-\gamma}$, whilst for $r \gg r_{\rm s}$, it falls like $r^{-\beta}$.
The case $\alpha =1, \beta =3, \gamma=1$ is the NFW dark halo.
Plummer models are often used to describe the light profiles of
dSphs~\citep[see e.g.,][]{Ir95, Ag12b}. They correspond to the
parameters $\alpha =2, \beta =5, \gamma=1$ and $r_{\rm t} = \infty$.
We begin by constructing two flattened spheroidal ($p=1$) models of the Reticulum~II
dSph. For both models, the dark halo is a NFW model
($\alpha=1,\beta=3,\gamma=1,r_s=1,r_{\rm t}=10$). The stars follow a Plummer
profile ($\alpha=2,\beta=5,\gamma=0,r_s=0.5,r_t=9$). The chosen ratio of the dark matter scale radius to the stellar scale radius lies within the measured range for the Local Group dSphs ($\sim1.25$ to $\sim30$) \citep{Amorisco2012}. The two models
differ in their shape. The first model is oblate in both the stars and
the dark matter with an axis ratio of $q=0.4$ (chosen to match the observed axis ratio of Reticulum~II of $0.39$ \cite{Ko15}). The second model is
prolate with an axis ratio of $q=2.5$. When viewed along the
$x$-axis both models appear flattened with axis ratio $0.4$. In
addition, we construct a third spherical model as a reference. This
has the same parameters, but without the flattening in either the dark
matter or the stars.
The dark NFW halos source the potential (computed using a bi-orthonormal basis expansion \cite{De09}) in which the weights of the
Plummer models are adjusted until the target densities are reached. No
other constraints on the distribution functions are used. We use a
$10^7$ particle realization of the flattened NFW distribution to
compute the potential. The constraints on the Plummer model are
generated with $100$ realizations of $10^6$ particles and $10^6$
particles are used in the M2M simulation. To check convergence, the
models were run turning off the weight adjustment in the M2M
code. Both flattened models exhibit a slow drift in the density
constraint suggesting they are not perfect equilibrium
models. However, this is almost certainly true for the actual dSphs
which reside in the tidal field of the Milky Way.
Reticulum~II has a half-light major axis length of $5.63\,\mathrm{arcmin}$, is at
a distance of $\sim 30\,{\rm kpc}$ \citep{Ko15} and has a line-of-sight
velocity dispersion of $3.22\,{\rm km\,s^{-1}}$ \citep{Ko15a}. To match the final
models to the observed constraints on Reticulum~II, we compute the
projected half-light major axis length (fitted with a Plummer model)
and the projected line-of-sight velocity dispersion. We then compute
the scale factors $\mathcal{R}$ and $\mathcal{V}$ that scale the
radial distributions and the velocity distributions to the
observations. The corresponding total mass of the dark matter profile
(set to unity in the simulation) is then scaled by a factor
$\mathcal{M}=\mathcal{R}\mathcal{V}^2$. For the spherical model we match the half-light major axis length to an `ellipticity-corrected' radius given by the geometric mean of the half-light major and minor axis lengths. This is related to the observed half-light major axis length $R_\mathrm{h}$ as $R_\mathrm{h}\sqrt{1-\epsilon}$ where $\epsilon$ is the ellipticity.
In Figs. \ref{fig:flattened}, we show the final projected
distributions of the two flattened models. Note that for the prolate
case, the models do not completely reproduce the target density profile
as there is a clear `X' shape in the $(x,y)$ plane. Additionally, we
show the surface density of the two models (using a mass-to-light
ratio of $500$, \cite{Ko15a}) and the line-of-sight velocity
distributions. The prolate velocity distribution is slightly peakier
than the oblate case but such a small difference would not be
detectable observationally.
To explore the effects of adjusting the stellar and dark-matter
profiles, we also build two further models, one with a central cusp in
the stellar profile ($\gamma=1$) and one with a cored dark-matter
profile with parameters $\alpha=1$, $\beta=4$ and $\gamma=0$.
\subsection{J- and D-factors}
For our five models of Reticulum~II, we proceed to calculate the J-
and D-factors. The J-factor for a distant source is given by\footnote{When computing these integrals numerically, we have found it useful to perform the coordinate transformation $\tan\chi = z/r_s$ where $r_s$ is the scale radius of the density profile.}
\begin{equation}
{\rm J}(\theta) = \frac{1}{D^2}\int_{-\infty}^{+\infty}\mathrm{d}z\,\int_0^{D\theta}\mathrm{d}R\,R\int_0^{2\pi}\mathrm{d}\phi\,\rho_\mathrm{DM}^2,
\end{equation}
where $D$ is the distance to the source ($30\,{\rm kpc}$ for Reticulum~II) and $\theta$ is the beam angle. Similarly, the D-factor is given by
\begin{equation}
{\rm D}(\theta) = \frac{1}{D^2}\int_{-\infty}^{+\infty}\mathrm{d}z\,\int_0^{D\theta}\mathrm{d}R\,R\int_0^{2\pi}\mathrm{d}\phi\,\rho_\mathrm{DM}.
\end{equation}
In Table~\ref{TableRet2} we report the J- and D-factors at
$\theta=0.5^\circ$ (the typical observational resolution). We also
show the J- and D-factors for the spherical model computed from the
formulae of Paper I. We see that these formula underestimate the
J-factor by a factor $1.2$ and the D-factor by a factor $1.05$. We also
record the correction factor between the prolate / oblate models and the
spherical models using the notation
\begin{equation}
\begin{split}
\mathcal{F}_{\rm J} &= \log_{10}({\rm J}/{\rm J}_\mathrm{sph}),\\
\mathcal{F}_{\rm D} &= \log_{10}({\rm D}/{\rm D}_\mathrm{sph}).
\end{split}
\label{eq:defcorrfactors}
\end{equation}
The oblate model with NFW dark matter and Plummer light has a J-factor
that is diminished by a factor $1.4$ over the spherical model and a
D-factor that is diminished by a factor $1.3$. On the other hand, the
prolate model has an enhancement in the J-factor by a factor $3.4$ and
a small decrease in the D-factor of $10\text{ per cent}$. The near-prolate
model with a cuspy stellar profile produces a very similar J-factor to
the Plummer prolate model, but here the D-factor is enhanced over the
spherical model by $20\text{ per cent}$. Finally, in a similar fashion to the
prolate NFW profile, the prolate cored dark matter profile also
produces an enhancement in the J-factor of a factor $3$ and a small
diminution in the D-factor of order $10\text{ per cent}$.
\begin{table*}
\caption{J- and D-factors for a beam angle of $0.5^\circ$ for a series
of Reticulum~II models. The J-factors are in units of $\mathrm{GeV^2\,cm}^{-5}$ and the D-factors are in units of $\mathrm{GeV\,cm}^{-2}$. Each model was normalized such that the
line-of-sight velocity dispersion and half-light major axis length matched that
of Reticulum~II. For the spherical model, an `ellipticity-corrected' half-light radius of $R_\mathrm{h}\sqrt{1-\epsilon}$ (where $\epsilon$ is the ellipticity) was used to scale the models. Note the correction factors are with respect to the spherical NFW, spherical Plummer model in the first row \emph{not} with respect to the corresponding spherical model.}
\input{ret2_table.dat}
\label{TableRet2}
\end{table*}
\subsection{A Range of Flattenings}
We have established that a prolate model of Reticulum~II viewed
edge-on produces a significant enhancement in the J-factor over its
spherical counterpart, whilst an oblate model has a slight
diminution. However, the observed dSphs span a whole range of
ellipticities, so we now go on to explore models with a variety of
flattenings. We construct 3 oblate M2M models with the same parameters
as the spherical reference model in Table~\ref{TableRet2} but with
flattenings $q=0.5,0.6,0.7$, and similarly 3 prolate M2M models with
flattenings $q=1.423,1.667,2$. Again the M2M models are normalized to
match the line-of-sight velocity dispersion and half-light major-axis length of
Reticulum~II.
The J- and D-factors for our series of models are plotted in
Fig.~\ref{fig:sim_profiles_edge}. All models are viewed such that they
appear maximally flattened (along the short-axis for the prolate cases
and along the long-axis for the oblate cases). We also show the J- and
D-factors computed using the simple formulae (equations 15 and 19)
from Paper I. We see that this formula disagrees with the spherical
case by $\sim0.2$ due to the use of the empirical relation for the
half-light mass. As shown in Paper I, for most dSphs this is less than the uncertainty in the J-factor due to uncertainties in the line-of-sight velocity dispersion and half-light radius.
The prolate models produce a sequence of more enhanced J-factor at all
angles as we increase the flattening $q$. The oblate models produce a
similar sequence of decreasing J as we decrease the flattening
$q$. These trends are reproduced in the D-factor. Note the asymmetry
with $q$ in both J and D: the equivalent flattening for an prolate
model produces a larger difference from the spherical model than the corresponding oblate model.
With this sequence of models, we also investigate how the J-factor for
an apparently round dSph changes as the dSph is flattened along the
line of sight. In Fig.~\ref{fig:sim_profiles_round}, we show the range
of J- and D-factors for the set of flattened models viewed face-on
such that the isophotes appear round and all models have the same half-light radius. We see that the range of
possible J-factors with flattening along the line of sight varies by a
factor of $10$. The oblate models all have a similar decrease in the
J-factor. The D-factor is unaffected by flattening along the line of
sight.
For the series of flattened M2M models, we compute the correction factors $\mathcal{F}_\mathrm{J}$ and $\mathcal{F}_\mathrm{D}$ by comparing each model with the spherical model with the same line-of-sight velocity dispersion and the `ellipticity-corrected' half-light radius. The trends of $\mathcal{F}_{{\rm J}}$ and $\mathcal{F}_{{\rm D}}$ with respect to $q$ are very smooth so
we opt to fit the corrections from the models with a simple functional
form
\begin{equation}
\mathcal{F}_{\mathrm{fit}} = \eta\log_{10}(q)
\label{eq::simple_fit}
\end{equation}
where we fit $q<1$ and $q>1$ separately. The values of $\eta$ chosen are given in
Table~\ref{table:fits}. Although our fit is an extrapolation for
$q<0.4$ and $q>2.5$, we will see that it agrees well with the more
involved models of Section~\ref{sec:AnalyticModels}. In reality, the correction factors are a function of the beam angle. We have found that the correction factors are very insensitive to the beam angle so this formula is appropriate for all dSphs irrespective of their size compared to the resolution of the instrument.
\begin{figure}
\includegraphics[width=\columnwidth]{J_profiles_sim_edge}
\caption{J- and D-factors as a function of beam angle for a range of
flattened models viewed edge-on with identical line-of-sight
velocity dispersions and half-light major-axis lengths. The models are
coloured by the flattening in the density of both the stars and dark matter,
$q$. The spherical model is shown with the short-dashed line, whilst
the analytic formula for the NFW model (equations (15) and (19) from
Paper I) is shown with the long-dashed line.}
\label{fig:sim_profiles_edge}
\end{figure}
\begin{figure}
\includegraphics[width=\columnwidth]{J_profiles_sim_round}
\caption{J- and D-factors as a function of beam angle for a range of
flattened models viewed face-on with identical line-of-sight
velocity dispersions and half-light major-axis lengths. The models are
coloured by the flattening in the density of both the stars and dark matter,
$q$. The spherical model is shown with the short-dashed line and the
model using the formulae from Paper I is shown with the long-dashed
line.}
\label{fig:sim_profiles_round}
\end{figure}
\begin{table}
\caption{Slopes $\eta$ of the base-10 logarithms of the correction factors with respect to
$\log_{10}q$ fitted to the made-to-measure models of
Section~\ref{Sect::M2M}. The prolate and oblate cases are treated
separately. The multiplicative factor by which a J- or D-factor from
a spherical analysis must be corrected is given by $q^\eta$. Note the spherical models to which we compare use an `ellipticity-corrected' half-light radius of $R_\mathrm{h}\sqrt{1-\epsilon}$ where $\epsilon=1-q$ is the ellipticity in the oblate case and $\epsilon=1-1/q$ in the prolate case.}
\begin{centering}
\input{fit_results.dat}
\end{centering}
\label{table:fits}
\end{table}
\section{J- and D-Factors for the Milky Way dSphs}
We now apply the corrections to the J- and D-factors of the observed
dSphs. They are listed in Table~\ref{table:Jfs} along with their
measured ellipticities $\epsilon=1-b/a$ where $b/a$ is the observed
axis ratio. We take the majority of the ellipticities and $\pm1\sigma$
error-bars from the review of \cite{Mc12}. The ellipticities of the
new dSphs discovered in the Dark Energy Survey are taken from
\cite{Ko15}, the ellipticity of Pisces II is taken from \cite{Be10}
and that of Hydra II from \cite{Ma15}. For both Leo T and Horologium
I, only upper-bounds on the ellipticity are available.
For each dSph, we compute the correction factor assuming the dSph is
either oblate or prolate and observed edge-on. We draw samples from
the error distributions of the ellipticities and compute the median
and $\pm1\sigma$ values of the correction factors for both the J- and
D-factors using equation~\eqref{eq::simple_fit}. The baseline spherical model to which we are comparing uses an effective half-light radius of $R_\mathrm{h}\sqrt{1-\epsilon}$. We combine these estimates with the spherical estimates
computed in Paper I (adding the errors in quadrature). The results of
this procedure are reported in Tables~\ref{table:Jfs} and
\ref{table:Dfs}.
We show this data in Fig.~\ref{fig:KF_corrections}. We plot the
distribution of J- and D-factors for the dSphs assuming they are
spherical, oblate or prolate. Ursa Major I has the largest ellipticity
and hence the largest prolate correction factor (a factor of
$\sim4$). Reticulum~II, Ursa Major II and Hercules all have ellipticities
$\sim0.6$ and so the prolate correction factors are approximately
$\sim2.2-2.7$. For ellipticities less than $\sim0.4$, the correction
factors are less than the errors on the spherical J-factors. For every
dSph the correction to the D-factors is smaller than the errors in
the spherical D-factor. Hence, we conclude that flattening has a
negligible effect on the D-factor estimates.
If the entire population of dSphs is prolate then only Tucana II and
Willman 1 have potentially higher J-factors than Reticulum~II, with
both Ursa Major II and Segue 1 having a very similar J-factor to
Reticulum~II. We remark that Tucana II is consistent with having
circular isophotes \cite{Ko15}, whilst the assumption of dynamical
equilibrium for Willman 1 is dubious \cite{Willman2011}. Similarly, Ursa Major II appears
to be in process of severe tidal disruption \citep{Zu06}. Finally, the
J-factor of Segue 1 has been shown to be extremely sensitive to the presence of foreground
contaminants \citep[e.g.,][]{NO09,Bo15c}. These final three dSphs have been marked in red in Figure~\ref{fig:KF_corrections} to indicate their dubious J-factors. Therefore, it is possible that the Reticulum~II gamma-ray signal may be due to annihilation if the dwarf has a prolate shape. We can robustly conclude from Figure~\ref{fig:KF_corrections} that if Reticulum~II has a prolate shape then an observed annihilation signal from only Reticulum~II is not in tension with the lack of signals from all the other dSphs irrespective of their shapes. If, however, Reticulum~II is oblate and has an observed annihilation signal we begin to have some tension if there is a lack of signal from the other dSphs. The majority of this tension arises from those problematic dSphs already mentioned. However, if both Ursa Minor and Tucana II have prolate shapes it becomes unlikely that they both have smaller J factors than an oblate Reticulum II.
\begin{turnpage}
\begin{table*}
\caption{Annihilation correction factors for dwarf spheroidals due to
their observed ellipticity $\epsilon$ (note Leo T and Horologium I
only have upper-bounds on the ellipticity). We report the spherical
J-factor for a beam angle of $0.5^\circ$ in units of $\mathrm{GeV^2\,cm}^{-5}$ along with the corrections $\mathcal{F}_\mathrm{J}$
assuming the galaxy is observed exactly edge-on and is either oblate
or prolate. We report the resultant J-factors for these cases as
${\rm J}_\mathrm{obl}$ and ${\rm J}_\mathrm{pro}$ in units of
$\mathrm{GeV^2\,cm^{-5}}$. The dSphs are ordered by their
ellipticity.}
\begin{centering}
\input{dwarfs_Jfactors_corr.dat}
\end{centering}
\label{table:Jfs}
\end{table*}
\end{turnpage}
\begin{turnpage}
\begin{table*}
\caption{As Table~\ref{table:Jfs}, but for the decay correction
factors. The D-factors are quoted in units of $\mathrm{GeV\,cm}^{-2}$.}
\begin{centering}
\input{dwarfs_Dfactors_corr.dat}
\end{centering}
\label{table:Dfs}
\end{table*}
\end{turnpage}
\begin{figure*}
$$\includegraphics[width=\textwidth]{flattening_corr.pdf}$$
$$\includegraphics[width=\textwidth]{flattening_corr_D.pdf}$$
\caption{J- (top) and D-factors (bottom) integrated over a beam angle
of $0.5^\circ$ for $27$ dSphs. The diamonds with red error-bars are
computed assuming a spherical model and are taken from Paper
I. The circles with blue error-bars show the spherical J-factors adjusted by the
oblate correction factors marginalized over the uncertainty in the
ellipticity (assuming the galaxy is observed edge-on) and the squares with black
error-bars show the spherical J-factors adjusted by the prolate
correction factors marginalized over the uncertainty in the
ellipticity (assuming the galaxy is observed edge-on). The dSphs
are ordered by their median spherical J-factors. The top set of red
numbers gives the ordering of the upper-limits on the spherical
J-factors, and the bottom set of black numbers gives the ordering of
the upper-limits on the prolate J-factors. The gray dashed lines
show the $1\sigma$ upper-limit for the Reticulum~II assuming it is
prolate or oblate. The three dSphs with red names have unknown additional systematic uncertainties due to the presence of contaminants or the questionable assumption of dynamical equilibrium.}
\label{fig:KF_corrections}
\end{figure*}
\section{Semi-analytic models}
\label{sec:AnalyticModels}
Numerical M2M models provide a robust method for determining the
corrections required when modeling flattened systems as
spherical. However, they are computationally expensive to construct so
cannot be employed in a Markov Chain Monte Carlo analysis that
requires many models. We have provided a simple fitting formula for
our model setup, but there will be some variation in the correction
factors depending on, for instance, the light profile,
the density profile of the dark matter, and the ratio of the scale lengths
of the light to the dark matter.
We now proceed to understand and reproduce the results of the M2M
models using simpler methods. In sub-section A, we describe a general
virial method to compute J-factors for flattened halo models. This
numerical algorithm can be applied to any dark matter density, but in
the two following subsections, we provide analytic shortcuts to
evaluate the J-factors for two specific families -- the infinite
flattened cusps and the flat rotation curve halos. Readers primarily
interested in the results, rather than the details of the methods,
should skip to sub-section D, where we compare our models to the M2M
results. Figures~\ref{fig:corrections} and
\ref{fig:D_corrections} provide summary plots, which show the range of
correction factors as a function of the flattening of the stellar
density.
\subsection{The Virial Method}\label{VirMethod}
We can construct approximate equilibrium models much more cheaply than
with the full M2M apparatus by using the virial theorem. The two constraints
provided by the data are the integrated line-of-sight velocity
dispersion ${\langle\sigma_\mathrm{los}^2\rangle}$ and the half-light major-axis length $R_h$. We describe a method to match these
observations given density models for the light ($\rho_\star$) and dark matter ($\rho_{\mathrm{DM}}$).
\begin{enumerate}
\item For a given viewing angle $(\vartheta,\varphi)$, we find the
measured ellipticity and orientation of the observed minor axis (using, for instance, equations (A1,A2,A6) of \cite{Weijmans2014}) and
compute the elliptical half-light radius $R_h'$. This gives us a
length scaling $\mathcal{R} = R_h/R_h'$, and encodes the geometric factor described in the introduction.
\item In principle, to solve for the kinematics of the stars in the
dark matter potential, we could use the axisymmetric Jeans
equations. However, there are degeneracies in the solution space and
only a few algorithms exist for solution~\citep{Ca08,Ev15}. As we need only
match an integrated quantity, we use the virial theorem to compute $\langle\sigma_\mathrm{los}^2\rangle$ as
\begin{equation}
\langle\sigma_\mathrm{los}'^2\rangle ={W_{\rm los} \over W} \langle\sigma_\mathrm{tot}^2\rangle = {W_{\rm los} \over M},
\end{equation}
where
\begin{equation}
W_{\rm los} = \int\mathrm{d}^3\boldsymbol{x}\,\rho_\star R_{ij} x_j
\frac{\partial\Phi_{\mathrm{DM}}} {\partial x_k} R_{ki}.
\end{equation}
$\Phi_{\mathrm{DM}}$ is the dark matter potential (generically computed using a multipole expansion \cite{BT}), $M$ is the total dark matter mass and $R_{ij}$ is the projection matrix along the line-of-sight from coordinates aligned with the principal axes of the dSph. We have used the Einstein summation convention. For triaxial symmetry, the cross-terms in the integral vanish so we need only project the velocity dispersions along the principal axes. This gives us a
velocity scaling $\mathcal{V} = \langle\sigma_\mathrm{los}^2\rangle/\langle\sigma_\mathrm{los}'^2\rangle$, and encodes the kinematic factor described in the introduction.
\item We compute a mass scaling $\mathcal{M}=\mathcal{V}^2\mathcal{R}$. The initial
model is scaled by $\mathcal{M}$ and $\mathcal{R}$ and the J- and
D-factors are computed. These can be compared to the spherical model
with the same line-of-sight velocity dispersion and half-light
radius.
\end{enumerate}
This algorithm is completely general. For some special choices of
stellar and dark matter density, the integration in the virial theorem
can be performed analytically. We now give two examples -- infinite
flattened cusps and flat rotation curve halos -- for which the virial
integrals can be done. This means that the behavior of the J-factor
at fixed observables (line of sight velocity dispersion and half-light
radii) can be mapped out analytically as a function of flattening or
concentration.
\subsection{Flattened Cusps}\label{AxiCusps}
Let us take the dark matter halo as an axisymmetric cusp
stratified on similar concentric spheroids with an axis ratio $q$. If
the cusps have the same mass $M_{\rm h}$ within the spheroidal half-light
radius $m_{\rm h}$, then the mass enclosed is
\begin{equation}
M(m) = M_{\rm h} \left( {m\over m_{\rm h}} \right)^{3-\gamma_\mathrm{DM}}\quad \mathrm{for } \quad m\leq r_t
\end{equation}
and $M=M_{\rm h}(r_t/m_{\rm h})^{3-\gamma_\mathrm{DM}}$ otherwise. $m^2 = x^2 + y^2 + z^2q^{-2} = R^2 + z^2q^{-2}$ and $r_t$ is a hard truncation ellipsoidal radius. The dark matter
density is
\begin{equation}
{\rho_{\rm DM}}(m) = {M_{\rm h}\over 4 \pi qm_{\rm h}^{3-\gamma_\mathrm{DM}}}{3 -\gamma_\mathrm{DM} \over m^{\gamma_\mathrm{DM}}}\quad \mathrm{for}\quad m\leq r_t,
\label{AxiCusp}
\end{equation}
and zero otherwise.
Note the factor of $q$ in the denominator which comes from the
Jacobian. It means that the oblate models ($q<1$) in the sequence have
an increased density as compared to their spherical progenitor, whilst
the prolate models ($q>1$) have a decreased density. The spherical
member of the family obeys the empirical law (\ref{eq:wolf}). As the
mass $M_{\rm h}$ is preserved along the sequence, we can still use
Eq.
(\ref{eq:wolf}) for the flattened cusps provided we correct the
observables -- the line of sight velocity dispersion and the projected
half-light radius -- to the spherical parent.
For comparison purposes, it is useful to define the J-factor and
D-factor of the infinite spherical cusp ($r_t\rightarrow\infty$, equations (8) and (11) in Paper I) as
\begin{equation}
{\rm J}_{\rm sph} = \frac{1}{D^2R_{\rm h}^3}\Big(\frac{\langle\sigma_{\rm los}^2\rangleR_{\rm h}}{G}\Big)^2\Big({ D\theta\over R_{\rm h}}\Big)^{3-2\gamma_\mathrm{DM}} P(\gamma_\mathrm{DM}),
\end{equation}
\begin{equation}
{\rm D}_{\rm sph} = \frac{1}{D^2}\frac{\langle\sigma_{\rm los}^2\rangleR_{\rm h}}{G}\Big({ D\theta\over R_{\rm h}}\Big)^{3-\gamma_\mathrm{DM}} Q(\gamma_\mathrm{DM}),
\end{equation}
where both $P(\gamma_\mathrm{DM})$ and $Q(\gamma_\mathrm{DM})$ are constants given in Paper
I. In these expressions, the half-light radius $R_{\rm h}$ is the `ellipticity-corrected' half-light radius that includes a factor of $\sqrt{1-\epsilon}$. The J- and D- factors for our axisymmetric models can now be
written in the form
\begin{equation}
\begin{split}
{\rm J} &= {\rm J}_{\rm sph}{\rm J}_{\rm geo}{\rm J}_{\rm kin},\\
{\rm D} &= {\rm D}_{\rm sph}{\rm D}_{\rm geo}{\rm D}_{\rm kin}.
\end{split}
\end{equation}
If an oblate model is viewed along the short axis, or a prolate model
is viewed along the long axis, then it appears round. The line of
sight coincides with the symmetry or $z$ axis. The geometric
corrections are then straightforward to evaluate as
\begin{equation}
{\rm J}_{\rm geo,face} = {1 \over q},\quad{\rm D}_{\rm geo,face} = {1}.
\label{eq:Joblateshort}
\end{equation}
This case is very simple because both the field of view and the
surface density contours are circular. Note that both factors are independent of the slope of the density profile $\gamma_\mathrm{DM}$.
If an infinite ($r_t\rightarrow\infty$) oblate or prolate model is viewed edge-on, it appears flattened
with axis ratio $q$. The line of sight then coincides with, say, the
$y$ direction. Observationally, the effective radius of a flattened model is
always measured along the projected major axis. For an oblate model, the measured effective radius is $R_{\rm h}$ whereas for the prolate model, the effective radius of its spherical progenitor is actually
$R_{\rm h}/q$. Additionally, comparison with the `ellipticity-corrected' spherical model gives rise to an additional factor of $\sqrt{1-\epsilon}$ in the effective radius which equals $\sqrt{q}$ for the oblate case and $\sqrt{1/q}$ for the prolate case.
The geometric corrections (i.e. the ratio of the J- and D-factors to those for a spherical model with the same $M_{\rm h}$) are now
\begin{equation}
{\rm J}_{\rm geo,edge} = {q^{2-\gamma_\mathrm{DM}}\over 2 \pi q^2} \int_0^{2\pi}d\theta (\cos^2\theta +
q^{-2}\sin^2\theta)^{1/2-\gamma_\mathrm{DM}},
\label{eq:Joblatelong2}
\end{equation}
and
\begin{equation}
{\rm D}_{\rm geo,edge} = {q^{1-\gamma_\mathrm{DM}/2}\over 2 \pi q} \int_0^{2\pi}d\theta (\cos^2\theta +
q^{-2}\sin^2\theta)^{1/2-\gamma_\mathrm{DM}/2}.
\end{equation}
The factors can only be reduced to a single quadrature due to the mismatch between the circular beam aperture and the elliptical isophotes. For oblate (prolate) models, the geometric correction leads to
an increase (decrease) in the J-factor as compared to a spherical
model with the same $M_{\rm h}$ if $\gamma_\mathrm{DM}\leq2$. If the dark matter halo is truncated at a finite ellipsoidal radius $r_t<D\theta$, the beam encloses all the dark matter and the edge-on geometric factors reduce to
\begin{equation}
{\rm J}_{\rm geo,edge} = q^{1-\gamma_\mathrm{DM}},\quad{\rm D}_{\rm geo,edge} = q^{1-\gamma_\mathrm{DM}/2}.
\label{eq:Jedgetrunc}
\end{equation}
These equations are preferable as for $\gamma_\mathrm{DM}<3$ they correspond to finite mass models and for $\gamma_\mathrm{DM}<3/2$ they produce finite J-factors. We have found that they give much better representations of the correction factors for more general models.
We have computed the ratio of the J- and D-factors to those of the spherical model with the same $M_{\rm h}$. As $M_{\rm h}$ is estimated from the line-of-sight velocity dispersion, we must now compute the ratio of the true $M_{\rm h}$ to that computed using only the line-of-sight velocity dispersion. This ratio is the kinematic correction, which we compute using the tensor virial
theorem~\citep[e.g.,][]{Bi78,Ag12}. The effect of flattening on the
kinematics of the stars is given by
\begin{equation}
{T_{RR} \over T_{zz} }
= {W_{RR} \over W_{zz} }
= {{\displaystyle}\int\mathrm{d}^3\boldsymbol{x}\,\rho_\star(\sigma^{2}_{RR} + \sigma^2_{\phi\phi})
\over {\displaystyle} \int\mathrm{d}^3\boldsymbol{x}\,{\rho_\star
\sigma^{2}_{zz}}}\ .
\label{eq:virial}
\end{equation}
where $T$ and $W$ are the kinetic energy and potential energy
tensors~\citep{Ch69,BT,Ag12}. The stellar density in dSphs is well
approximated by a Plummer or King profile. Such laws do not lead to
tractable integrals in the virial theorem~(\ref{eq:virial}). Instead,
we approximate the stellar density as a power-law stratified on
similar concentric spheroids with $m_\star^2 = R^2 + z^2 q_\star^{-2}$
and so $q_\star$ is the stellar flattening. This means we can take
advantage of equations (19-24) in \citep{Ag12}, which give the virial
ratios for stellar populations whose density is a pure scale-free
power-law declining like distance$^{-\gamma_\star}$. Note that as the all the considered models have infinite mass we must work with the ratios of the velocity dispersions.
If we assume the equipotentials are spheroidally stratified, the correction is a function of $Q_\star = q_\phi^2/q_\star^2$, where
$q_\phi$ is the flattening of the dark halo equipotentials, which is
related to the flattening $q$ in the dark halo density via
\begin{equation}
q_\phi = {1\over 2}\left( 1 + \left( 1 + 8q^2 \right)^{1/2}
\right)^{1/2}
\label{eq:BowdenFormula}
\end{equation}
This formula is given in refs~\citep{Ev93,Bo15}. As is well known, the
equipotentials are always rounder than the density contours, so that
$q_\phi \approx 1$ even if the dark halo is quite flattened. Then for
$\gamma_\star =3$, we have from \citep{Ag12}
\begin{equation}
{\langle\sigma^2_{xx}\rangle \over \langle\sigma^2_{zz}\rangle}=
\begin{cases}
{\displaystyle \frac{Q_\star \mathcal{Q}-\sqrt{Q_\star}{\rm Arcsinh}{\mathcal{Q}}}
{2[\sqrt{Q_\star}{\rm Arcsinh}{\mathcal{Q}}-\mathcal{Q}]}},
& Q_\star >1\\
\null & \null \cr
{\displaystyle
\frac{Q_\star\mathcal{Q}-\sqrt{Q_\star}{\rm Arcsin}{\mathcal{Q}}}
{2[\sqrt{Q_\star}{\rm Arcsin}{\mathcal{Q}}-\mathcal{Q}]}},
& Q_\star <1,
\end{cases}
\end{equation}
where
\begin{equation}
\mathcal{Q}(Q_\star)=
\begin{cases}
\sqrt{Q_\star-1}& Q_\star>1\\
\sqrt{1-Q_\star}& Q_\star<1\\
\end{cases}
\label{curlyQ}
\end{equation}
Our formulae are appropriate if $r_t\rightarrow\infty$ or the stellar profile is truncated at a smaller radius than the dark-matter profile.
This virial ratio is unity when $Q_\star =1$. This follows because if
the stellar density is constant on the equipotentials, then the
velocity dispersion is isotropic. It is greater than unity when
$Q_\star >1$ (that is, when the model is oblate), as the globally
averaged velocity dispersion component along the long or $x$ axis must
be larger than that along the short or $z$ axis. It is less than unity
when $Q_\star <1$, as the roles of the $x$ and $z$ axes are now
reversed for the prolate figure. Formulae for other values of
$\gamma_\star$, or stellar density fall-off, are given in
Appendix~\ref{CuspAppendix}. We plot the logarithm of the virial ratio in
Fig.~\ref{fig:WR_corrections} along with the ratio calculated from the
M2M models. The line for $\gamma_\star=3$ agrees well with the M2M
data. The green dashed line shows the virial ratio computed using the virial method. For a stellar density stratified on the same concentric ellipsoids as the dark-matter density, the virial ratio is simply a function of the shape of the ellipsoids and is independent of the radial density profile so the plotted line has a very simple functional form \citep{Roberts1962,White1989,BT}.
It can be shown that along the sequence of models the total luminosity-averaged square velocity dispersion $\sigma_\mathrm{tot}$ is constant. Therefore, for a given model the kinematic factor is the ratio of the total velocity dispersion to the line-of-sight velocity dispersion. When viewed down the $x$-axis, the kinematic correction factor is
\begin{equation}
J_{\rm kin, edge} = \Big({\langle\sigma_{\mathrm{tot}}^2 \rangle\over \langle\sigma_{\mathrm{los}}^2\rangle}\Big)^2=\Big({2\over 3} + {\langle\sigma_{zz}^2 \rangle\over 3\langle\sigma_{xx}^2\rangle}\Big)^2
\end{equation}
This is the ratio of the squared velocity dispersion along the line of
sight to the average value. This is smaller (larger) than unity for
oblate (prolate) models. When viewed down the $z$-axis, the kinematic
correction factor is
\begin{equation}
J_{\rm kin,face} = \Big({1\over 3} + {2\langle\sigma_{xx}^2\rangle \over 3\langle\sigma_{zz}^2\rangle}\Big)^2
\end{equation}
This is smaller (larger) than unity for prolate (oblate) models. Note that, as the D-factors are proportional to $\sigma_\mathrm{tot}^2$, the D-factor kinematic factor $D_\mathrm{kin}=\sqrt{J_\mathrm{kin}}$.
\begin{figure}
$$\includegraphics[width=\columnwidth]{both_WR_ellcor}$$
\caption{Kinematic ratio for oblate and prolate figures. Each line
shows the prediction from a stellar axisymmetric cusp with density
slope $\gamma_\star$ flattened with axis ratio $q$ embedded in a
halo also with flattening $q$. The black points show the numerical
results from the M2M models.}
\label{fig:WR_corrections}
\end{figure}
\subsection{Flat Rotation Curve Models}\label{CoredModels}
A simple but widely-used model of a dark halo has potential-density pair \citep{BT,Ev93}
\begin{eqnarray}
{\rho_{\rm DM}}(R,z) &=& {v_0^2 \over 4 \pi G q_\phi^2}{ (2q_\phi^2 +1){R_{\rm d}}^2 +
R^2 + z^2(2-q_\phi^{-2}) \over ({R_{\rm d}}^2 + R^2 + z^2 q_\phi^2)^2},\nonumber\\
\Phi_\mathrm{DM}(R,z) &=& {v_0^2 \over 2} \ln ({R_{\rm d}}^2 + R^2 + z^2 q_\phi^{-2})
\end{eqnarray}
Here, $v_0$ is a velocity scale that is the asymptotic value of the
flat rotation curve, whilst ${R_{\rm d}}$ is the dark matter length-scale
while $q_\phi$ is the axis ratio of the equipotentials. The dark
matter density is everywhere positive provided $q_\phi > 1/\sqrt{2}$,
so the model can be oblate, spherical or prolate. Unless $q_\phi=1$, the flattening of the dark matter density changes with radius such that the oblate models become more oblate in the outskirts whilst the prolate models become more prolate. At large radii $q_\phi$ is related to the isodensity flattening $q$ via equation~\eqref{eq:BowdenFormula}. The dark halo is
cusped if ${R_{\rm d}}=0$, but the cusp is isothermal and so much more severe
than in the NFW model.
The J-factor for the model viewed along the $z$-axis or symmetry axis is
\begin{eqnarray}
{\rm J} = {v_0^4\over 96 {R_{\rm d}} D^2 G^2 q_\phi^3}&\Bigl[& 3(1-y)
-4q_\phi^2(y^3-1)\nonumber \\ &+&
q_\phi^4(8-3y-2y^3-3y^5)\Bigr],
\end{eqnarray}
with $y = R_d/\sqrt{R_d^2+D^2\theta^2}$. At large angles,
$y\rightarrow 0$ and so the asymptotic value is
\begin{equation}
{\rm J} \rightarrow {v_0^4\over 96 {R_{\rm d}} D^2 G^2 q_\phi^3}[ 3
+4q_\phi^2 +
8q_\phi^4].
\end{equation}
Similarly, the D-factor for a model viewed along the $z$-axis is given by
\begin{equation}
{\rm D} = \frac{v_0^2 R_d}{GD^2}\frac{ q_\phi(D\theta/R_d)^2}{\sqrt{1+(D\theta/R_d)^2}}.
\end{equation}
Note that the total mass of the model is not finite so the D-factor does not tend to a finite value as $\theta\rightarrow\infty$.
Viewed edge-on, two of the integrations for the J-factor are
analytic, leaving a final integral over the spherical aperture to be
performed numerically
\begin{equation}
\begin{split}
J(\theta&\rightarrow\infty) = {v_0^4 \over 1536 \pi {R_{\rm d}} D^2 G^2 q_\phi^8} \\&\times\int_0^{2\pi}d\phi{
G_1(q_\phi)+G_2(q_\phi)\cos(2\phi)+G_3(q_\phi)\cos(4\phi)
\over
(\cos^2\phi + q_\phi^{-2} \sin^2\phi)^3},
\end{split}
\end{equation}
\begin{equation}
\begin{split}
G_1(q_\phi)&=120 + 280 \mathcal{Q}^2 + 221 \mathcal{Q}^4 + 64 \mathcal{Q}^6 + 9 \mathcal{Q}^8,\\
G_2(q_\phi)&=4 \mathcal{Q}^2 (14 + 3 \mathcal{Q}^2 (3 + \mathcal{Q}^2)^2),\\
G_3(q_\phi)&=\mathcal{Q}^4 (7 + 8 \mathcal{Q}^2 + 3 \mathcal{Q}^4),
\end{split}
\end{equation}
and $\mathcal{Q}^2=q_\phi^2-1$.
The D-factor can also be expressed as a single quadrature but the expression is too bulky to present here.
Into this dark halo, we embed a population of stars to model the dSph, namely
\[
\rho(R,z) = {\rho_0 {R_{\rm c}}^{\beta_\star} \over ({R_{\rm c}}^2 + R^2 + z^2q_\star^{-2})^{\beta_\star/2}}.
\]
Here, $\rho_0$ is a normalization constant, while $q$ is the axis
ratio of the spheroidal isodensity contours. If $\beta_\star=5$, this is the
familiar Plummer model. If the scale-length of the stars ${R_{\rm c}}$ is equal
to the scale-length of the dark matter ${R_{\rm d}}$, and the flattening of the
stellar density $q_\star$ is equal to the flattening of the dark matter
equipotentials $q_\phi$, then the phase space distribution function
is an isothermal~\citep{Ev93}. We derive more general formulae below,
but note that this simple limit enables an easy check of the
correctness of our results.
As both the density and the potential are simple, we can calculate the
velocity dispersions seen on viewing the stellar distribution along
the short or long axis. We give the results for $\beta_\star =5$ here,
and delegate other formulae to the Appendix B. We begin by defining
\begin{equation}
\Delta_1^2 = q_\phi^2 -q_\star^2,\quad \Delta_2^2 = {R_{\rm d}}^2-{R_{\rm c}}^2,\quad
\mathcal{D}^2 = q_\phi^2{R_{\rm d}}^2 - q_\star^2{R_{\rm c}}^2.
\end{equation}
Then the velocity dispersions are
\begin{eqnarray}
\langle\sigma^2_{RR}\rangle &=& {v_0^2 q_\phi {R_{\rm c}}^2 \over
\Delta_1^4\Delta_2^4\mathcal{D}^2} \Bigl[
2 \Delta_1^4 {R_{\rm d}}^3 \mathcal{D}{\rm Arccosh} \left({q_\phi{R_{\rm d}}\over
q_\star{R_{\rm c}}}\right) \nonumber \\
&-&\Delta_1 \mathcal{D}^2(2q_\phi^2{R_{\rm d}}^2 + q_\star^2({R_{\rm c}}^2\!-\!3{R_{\rm d}}^2))
{\rm Arccosh}
\left({q_\phi\over q_\star}\right) \nonumber\\
&-& q_\phi \Delta_1^2\Delta_2^2\mathcal{D}^2\Bigr],\nonumber\\
\langle\sigma^2_{zz}\rangle &=&
{v_0^2 q_\star^2 {R_{\rm c}}^2 \over \Delta_1^4 \Delta_2^2 \mathcal{D}^2} \Bigl[
q_\star^2\Delta_1^2 \Delta_2^2 \mathcal{D}^2 - q_\phi\Delta_1 \mathcal{D}^4
{\rm Arccosh}
\left({q_\phi\over q_\star}\right) \nonumber \\
&+& q_\phi\Delta_1^4 \mathcal{D} {R_{\rm d}}^3 {\rm Arccosh} \left({q_\phi{R_{\rm d}}\over q_\star{R_{\rm c}}}\right)\Bigr].
\end{eqnarray}
The formulae hold generally on using the identity (for $S<1$)
\[
{\rm Arccosh} S \equiv -i \arccos S
\]
These formulae give the line of sight velocity dispersion of an
axisymmetric Plummer model viewed along the short and long axes in a
dark halo of arbitrary flattening and length-scale.
If ${R_{\rm c}} = {R_{\rm d}}$, then
\begin{eqnarray}
\langle\sigma^2_{RR}\rangle &=& {v_0^2q_\phi \over 4(q_\phi^2-q_\star^2)^3}\Bigl[ 5q_\star^4q_\phi -7q_\star^2q_\phi^3
+ 2q_\phi^5 \nonumber\\
&+& 3q_\star^4(q_\phi^2-q_\star^2)^{1/2}{\rm Arccosh}\left({q_\phi\over q}\right)\Bigr],
\nonumber \\
\langle\sigma^2_{zz}\rangle &=& {v_0^2q_\star^2 \over
2(q_\phi^2-q_\star^2)^3}\Bigl[q_\phi^4 + q_\phi^2q_\star^2 - 2q_\star^4 \nonumber\\
&-& 3 q_\star^2q_\phi(q_\phi^2-q_\star^2)^{1/2}{\rm Arccosh}\left({q_\phi\over q}\right)\Bigr].
\end{eqnarray}
If additionally $q_\star = q_\phi$, then
\begin{equation}
\langle\sigma^2_{RR}\rangle = {2v_0^2 \over 5},\qquad\qquad
\langle\sigma^2_{zz}\rangle = {v_0^2\over 5}.
\end{equation}
With the line of sight velocity dispersion in hand, we can simply
rescale the model so that the J-factors are computed for models with
the same observables (line of sight velocity dispersion and half-light
radius) as the flattenings and the ratio of dark to luminous
scalelength ${R_{\rm c}}/{R_{\rm d}}$ varies.
\subsection{Comparisons}
\begin{figure}!
$$\includegraphics[width=0.5\textwidth]{both_round_ellcor.pdf}$$
$$\includegraphics[width=0.5\textwidth]{both_edge_ellcor.pdf}$$
\caption{J-factor correction factors for oblate and prolate figures
viewed face-on (top) and edge-on (bottom). The \textbf{black points}
show the numerical results from the M2M models of stellar Plummer
models flattened with axis ratio $q$ embedded in NFW dark-matter
halos also of axis ratio $q$. The \textbf{dashed green line} shows the results
of the virial method of Section~\ref{VirMethod}. The \textbf{blue band} shows a range of axisymmetric cusp models from Section~\ref{AxiCusps}. The central line corresponds to a model with $\gamma_\mathrm{DM}=1,\,\gamma_\star=3$. In the top panel, we have varied the slope of the light profile (note the face-on correction factor is independent of $\gamma_\mathrm{DM}$ in this case). In the bottom panel, we have varied the slope of the dark matter. In both panels, the \textbf{red band} shows a series of cored flat rotation curve models from Section~\ref{CoredModels}. The central line has outer stellar density profile of $\beta_\star=5$ and ratio of dark-matter to stellar scale radii of $R_\mathrm{d}/R_\mathrm{c}=20$. The band corresponds to varying this scale radii ratio by a factor of ten.}
\label{fig:corrections}
\end{figure}
\begin{figure}!
$$\includegraphics[width=0.5\textwidth]{both_round_D_ellcor.pdf}$$
$$\includegraphics[width=0.5\textwidth]{both_edge_D_ellcor.pdf}$$
\caption{D-factor correction factors for oblate and prolate figures
viewed face-on (top) and edge-on (bottom). See the caption of Figure~\ref{fig:corrections} for details on each line.}
\label{fig:D_corrections}
\end{figure}
The models in Sections~\ref{AxiCusps} and \ref{CoredModels} are
complementary. The infinite cusps allow us to vary the central slope of
the dark matter. The cored models allow us to vary the ratio of the
luminous to the dark matter length-scale. Taken together, a gamut of
possibilities of dark halo cusps, density profiles and length-scales
can be swept out.
The base-10 logarithms of the correction factors~(\ref{eq:defcorrfactors}) are plotted as a
function of dark halo flattening $q$ in
Fig.~\ref{fig:corrections}. The flattening of the stellar population
$q_\star$ is the same as that of the dark halo $q$. For all plots we use the observed parameters of Reticulum~II with a beam angle of $0.5^\circ$. The correction factors are a function of the beam angle but we have found that this dependence is very weak and that the correction factors are essentially independent of the size of the dSph with respect to the beam size. Therefore, the reported correction factors are appropriate for all beam angles.
We show the
correction factors for models viewed face-on (top panels) and edge-on
(bottom panels). Any correction factor between these extremes should
be possible as the inclination angle can be varied between these
extremes. The correction factors computed from the M2M Plummer models
in NFW halos with axis ratio $q$ are shown as black points. They are
in good agreement with the results of the virial method of
Section~\ref{VirMethod} applied to the self-same model, which are
shown as a green curve. Note that the exception to this is the $q=2.5$ prolate model. As noted in Section~\ref{Sect::M2M}, the Made-to-Measure method in this case produces an equilibrium figure that significantly deviates from a spheroidally stratified Plummer model. We also show as blue bands the range of
results for the axisymmetric cusps of Section~\ref{AxiCusps}, in which
both the slopes of the dark matter and stellar cusps are allowed to
vary. Finally, the red band shows a series of cored flat rotation
curve models from Section~\ref{CoredModels}. The central line has
outer stellar density slope of $\beta_\star=5$ and ratio of
dark-matter to stellar scale radii of
$R_\mathrm{d}/R_\mathrm{c}=20$. The band corresponds to varying this
scale radii ratio by a factor of ten. As we move along the curves, the
models have the same line-of-sight velocity dispersion and the same
half-light radius. As the models make different assumptions as to the
dark matter density and potential, we do not expect these curves to
match up exactly with the M2M models, but it is encouraging that they
all show similar trends.
When an oblate model is viewed along the short axis or face-on, it
appears circular, but there is always a boost to the J-factor. For
flattenings of $q = q_\star = 0.5$, this can be a factor of $3$ boost over the spherical J-factor. When the model is viewed
edge-on, or along the long axis, then it appears flattened with
isophotes of ellipticity $1-q_\star$. However, the geometric and
kinematic corrections work in different directions, the former to
boost, the latter to reduce, the J-factor. The net effect is less significant than in the face-on case and is $\sim0.1-0.2\,{\rm dex}$ for $0.4<q<0.7$.
When a prolate model is viewed along the long or $z$-axis, it appears
round. Here, the geometric and the kinematic corrections both diminish
the J-factor. Although the model looks round on the sky, its J-factor
can be substantially less than computed by a spherical analysis. For
example, if the true flattening is $q = q_\star = 2.5$, then the
J-factor is decreased by a factor $\lesssim 0.3$. When the model is
viewed edge-on, the isophotes have ellipticity $1-q_\star^{-1}$, and the kinematic and geometric factors act in opposite directions with the net result being a small boost. If the flattening is $q = q_\star = 2.5$ the J-factor is increased by $\sim 0.3\,{\rm dex}$ over the spherical estimate.
The blue bands give an indication of how the correction factors vary as the dark-matter density slope is adjusted. We find steeper cusps give smaller corrections for models viewed edge-on, but has no effect on the corrections for models viewed face-on as the geometric factor is independent of $\gamma_\mathrm{DM}$. For the face-on case we see that making the slope of the stellar density profile steeper produces larger corrections to the J-factor.
From the red bands we observe that making the dark matter halo more extended (increasing $R_{\rm d}/{R_{\rm c}}$) produces larger corrections for the face-on case but smaller corrections for the edge-on case. The width of the red bands when the length-scales ${R_{\rm c}}/{R_{\rm d}}$ is varied
is at most 0.5 dex, even at the most extreme flattenings. Most of the
Milky Way dSphs are rounder than $q_\star = 0.5$. In this regime, the
red band is thinner, and gives rise to an uncertainty of at most $\sim
0.25$ dex. This suggests that varying the concentration of the dark
matter halo will not have a significant effect on the flattened
J-factors. This is corroborated by experiments with the Plummer profile embedded in the NFW profile. Additionally, making the stellar density in these models fall off more rapidly increases the magnitude of the J-factor correction factors when viewing face-on but decreases the magnitude of the correction when viewing edge-on.
The equivalent results for the D-factors are shown in
Fig.~\ref{fig:D_corrections}. The correction factors for the M2M models
models are all $\lesssim0.2\,{\rm dex}$, and suggest that for most applications, the spherical
approximation suffices for the D-factors. Note that in the face-on case, the cored models give a similar approximation of the correction factors as the cuspy models whilst for the edge-on case the cored models more faithfully represent the true correction factors than the cuspy models. Increasing the outer stellar density slope for the flat rotation curve models increases the magnitude of D-factor correction factors when viewing face-on but has little effect for the edge-on case.
Finally, we note that for an $(\alpha,\beta,\gamma)$ stellar model of equation~\eqref{abgmodel} embedded in another $(\alpha,\beta,\gamma)$ dark-matter model the J-factor correction factors are very insensitive to the choice of the density slopes of the stellar and dark-matter distributions and the ratio of the stellar to dark-matter scale-lengths. The same is broadly true for the D-factor correction factors except that the edge-on correction factor has a weak dependence with the outer slope of the dark matter profile. This is slightly at odds with the flat rotation curve model results but this may be due to the flat rotation curve models having a density flattening that varies with radius whilst the $(\alpha,\beta,\gamma)$ models have a constant density flattening.
\section{The Effects of Triaxiality}
Generically, we might expect the light and dark-matter distributions in dwarf spheroidals to be triaxial \cite{SanchezJanssen2016}. Triaxiality can introduce additional flattening (stretching) along the line-of-sight and so naturally increases (decreases) the J-factor and gives rise to larger (smaller) correction factors. Here we extend the formulae given in the previous section to account for intrinsic triaxial shapes. We begin by focusing on the infinite cusp models where some analytic progress can be made before moving on to consider more general density profiles.
We extend the models of equation~\eqref{AxiCusp} and introduce an intermediate-to-major axis ratio $p$ in addition to the minor-to-major axis ratio $q$. Here we restrict $q<p<1$ such that a prolate model has $p=q\neq1$. It is conventional to use a triaxiality parameter $T$ to describe the figures defined by
\begin{equation}
T = \frac{1-p^2}{1-q^2}.
\end{equation}
Note that figures with $T=0$ are oblate whilst those with $T=1$ are prolate. The density for the triaxial cusp models is
\begin{equation}
{\rho_{\rm DM}}(m) = {M_{\rm h}\over 4 \pi pqm_{\rm h}^{3-\gamma_\mathrm{DM}}}{3 -\gamma_\mathrm{DM} \over m^{\gamma_\mathrm{DM}}}\quad \mathrm{for}\quad m\leq r_t,
\label{TriaxCusp}
\end{equation}
and zero otherwise. $m^2 = x^2 + y^2p^{-2} + z^2q^{-2}$ and $r_t$ is a truncation ellipsoidal radius.
When an infinite ($r_t\rightarrow\infty$) model is viewed along the $z$ axis, the observed flattening is $p$ and the geometric factor is a combination of equation~\eqref{eq:Joblateshort} and~\eqref{eq:Joblatelong2} such that
\begin{equation}
{\rm J}_{\rm geo,z} = {p^{2-\gamma_\mathrm{DM}}\over 2 \pi p^2 q} \int_0^{2\pi}d\theta (\cos^2\theta +
p^{-2}\sin^2\theta)^{1/2-\gamma_\mathrm{DM}}.
\end{equation}
In this case, the observed major-axis length corresponds to the intrinsic model scale radius. For $\gamma_\mathrm{DM}\leq2$, the integral is a monotonic function of $q$ that is greater than unity for $q<1$ and less than unity for $q>1$. If viewed along the $y$-axis the observed flattening is $q$ and the J-factor is given by
\begin{equation}
{\rm J}_{\rm geo,y} = {q^{2-\gamma_\mathrm{DM}}\over 2 \pi q^2 p} \int_0^{2\pi}d\theta (\cos^2\theta +
q^{-2}\sin^2\theta)^{1/2-\gamma_\mathrm{DM}},
\end{equation}
and again the observed major-axis length coincides with the intrinsic model scale radius. When viewed along the major-axis, the observed flattening is $q/p$ and the observed major-axis length coincides with the intermediate axis so the resultant measured scale-length must be scaled by a factor $1/p$. This gives rise to a geometric factor of
\begin{equation}
{\rm J}_{\rm geo,x} = {(q/p)^{2-\gamma_\mathrm{DM}}\over 2 \pi (q/p)^2 p} \int_0^{2\pi}d\theta (\cos^2\theta +
(q/p)^{-2}\sin^2\theta)^{1/2-\gamma_\mathrm{DM}}.
\end{equation}
As with the axisymmetric case, the infinite cusps have limited use and it is more practical to use models with finite truncation ellipsoidal radii $r_t<D\theta$. In this case, the geometric factors are given by
\begin{equation}
\begin{split}
{\rm J}_{\rm geo,x}&=(qp)^{1-\gamma_\mathrm{DM}},\\
{\rm J}_{\rm geo,y}&=q^{1-\gamma_\mathrm{DM}}/p, \\
{\rm J}_{\rm geo,z}&=p^{1-\gamma_\mathrm{DM}}/q.
\end{split}
\end{equation}
For the models that produce a finite J-factor ($\gamma_\mathrm{DM}<3/2$), we find ${\rm J}_{\rm geo,x}<{\rm J}_{\rm geo,y}<{\rm J}_{\rm geo,z}$. For the astrophysically-motivated case of $\gamma_\mathrm{DM}=1$ the geometric factors are simply ${\rm J}_{\rm geo,x}=1$, ${\rm J}_{\rm geo,y}=1/p$ and ${\rm J}_{\rm geo,z}=1/q$.
If the infinite model is observed along a line of sight oriented with spherical polar angles $(\varphi,\vartheta)$ with respect to the intrinsic Cartesian coordinates of the model, the geometric factor must be computed with the full three-dimensional integrals as
\begin{equation}
{\rm J}_{\mathrm{geo}} = \frac{1}{{\rm J}_\mathrm{sph} D^2}\int_{-\infty}^{\infty}\mathrm{d}z'\,\int_{0}^{2\pi}\mathrm{d}\theta\,\int_{0}^{D\alpha}\mathrm{d}R\,R{\rho_{\rm DM}}^2(\boldsymbol{x}),
\end{equation}
where
$
\boldsymbol{x} = R\cos\theta \hat{\boldsymbol{\varphi}}+R\sin\theta\hat{\boldsymbol{\vartheta}}+z'\hat{\boldsymbol{r}}
$
with $(\hat{\boldsymbol{r}},\hat{\boldsymbol{\varphi}},\hat{\boldsymbol{\vartheta}})$ the set of spherical polar unit vectors. Making the model finite with $r_t<D\theta$ produces ${\rm J}/{\rm J}_{\rm sph}=1/(pq)$. However, for this general viewing angle calculation of the observed scale radius seems intractable. The kinematic factors ${\rm J}_\mathrm{kin} = (\langle\sigma_\mathrm{tot}^2\rangle/\langle\sigma_{\rm los}^2\rangle)^2$ can be derived for these more general viewing angles as
\begin{equation}
{\rm J}_\mathrm{kin} = \Big[\frac{1}{3}\frac{1+f_1+f_2}{\cos^2\vartheta+f_1\sin^2\vartheta\cos^2\varphi +f_2\sin^2\vartheta\sin^2\varphi }\Big]^2,
\end{equation}
where
\begin{equation}
\begin{split}
f_1&=\frac{\langle\sigma_{xx}^2\rangle}{\langle\sigma_{zz}^2\rangle} =\frac{\int_0^\pi\mathrm{d}\theta\,\int_0^{2\pi}\mathrm{d}\phi\,F(\theta,\phi)\sin^3\theta\cos^2\phi }{\int_0^\pi\mathrm{d}\theta\,\int_0^{2\pi}\mathrm{d}\phi\,F(\theta,\phi)\sin\theta\cos^2\theta }>f_2\\
f_2&=\frac{\langle\sigma_{yy}^2\rangle}{\langle\sigma_{zz}^2\rangle} =\frac{\int_0^\pi\mathrm{d}\theta\,\int_0^{2\pi}\mathrm{d}\phi\,F(\theta,\phi) \sin^3\theta\sin^2\phi}{\int_0^\pi\mathrm{d}\theta\,\int_0^{2\pi}\mathrm{d}\phi\,F(\theta,\phi) \sin\theta\cos^2\theta}>1,
\end{split}
\end{equation}
and \begin{equation}
F(\theta,\phi) = (\sin^2\theta\cos^2\phi+P_\star^2\sin^2\theta\sin^2\phi+Q_\star^2\cos^2\theta)^{-\gamma_\mathrm{DM}/2}.
\end{equation}
Here $P_\star=p_\phi/p$ and $Q_\star=q_\phi/q$ with $p_\phi$ and $q_\phi$ being the axis ratios of the dark matter potential. We see that when viewing down the major axis ($\vartheta=\pi/2,\varphi=0$) the kinematic correction factor is less than unity whilst viewing down the minor axis ($\vartheta=0,\varphi=0$) produces a kinematic correction factor greater than unity. Generally, we find that ${\rm J}_{\rm kin,x}<{\rm J}_{\rm kin,y}<{\rm J}_{\rm kin,z}$ such that the total correction factors for $\gamma_\mathrm{DM}<3/2$ obey the hierarchy $\mathcal{F}_\mathrm{J,x}<\mathcal{F}_\mathrm{J,y}<\mathcal{F}_\mathrm{J,z}$. We have found that the effects of triaxiality seem to be in accordance with our expectation from the axisymmetric case. When there is additional flattening along the line-of-sight the geometric and kinematic correction factors combine to increase the correction factor, whilst additional stretching decreases the correction factor.
We now compute general triaxial correction factors using the method of Section~\ref{VirMethod}. We show an example of the J-factor correction factors for the Reticulum~II model presented in Section~\ref{Sect::M2M} but with stellar minor-to-major axis ratio $q=0.4$ and stellar intermediate-to-major axis ratio $p=0.73$. We assume the dark-matter distribution is flattened in the same way as the stellar distribution. This model has triaxiality parameter $T=0.55$, (which was deemed the best-fit to the Local Group dSphs by \cite{SanchezJanssen2016}). The base-10 logarithm of the correction factor for all viewing angles is given in Fig.~\ref{Triax}. We see that, in agreement with the simple predictions from the infinite cusp models, the largest correction factor occurs when the model is viewed down the short axis (the $z$ axis) whilst the smallest is when viewing down the long axis (the $x$ axis). The black contours on the sphere show lines of constant observed ellipticity. We see that for this figure an observed ellipticity of $0.3$ gives rise to a variation in the correction factor of $0.6\,{\rm dex}$.
\begin{figure}
$$\includegraphics[width=\columnwidth]{triax_figure_gf.png}$$
\caption{J-factor correction factors for a triaxial model of Reticulum~II: each point on the sphere is colored by the correction factor when viewing the model along the radial vector that passes through that point. The black contours show the observed ellipticity when viewed from that direction. The small ellipsoid shows an isodensity contour for the considered model which has axis ratios $p=0.73$ and $q=0.4$ in both the stellar and dark-matter distributions. The largest correction factor is achieved when viewing the model down the short axis ($z$) whilst the smallest correction factor is achieved when viewing the model down the long axis ($x$). When viewing down the intermediate axis ($y$) the observed ellipticity matches that of Reticulum~II.}
\label{Triax}
\end{figure}
In conclusion, additional flattening along the line-of-sight can lead to an increase in the correction factors. For a general triaxial figure the largest correction factor is obtained when viewing the model down the short axis whilst the smallest correction factor is yielded when viewing the model down the long axis.
\section{Intrinsic shapes and axis alignments of dwarf spheroidal galaxies}
We have presented corrections to the J- and D-factors based on the assumption that the dSphs are prolate or oblate figures with axes aligned with the line-of-sight. Such configurations are quite unlikely as we anticipate that generically the dSph principal axes are misaligned with the line-of-sight. In this section we will discuss what is known regarding the intrinsic shapes of the dSphs and how this translates into observed properties via their axes alignment with respect to the line-of-sight.
For a given individual galaxy, we have a couple of probes of its intrinsic shape \citep{Franx1991,Statler1994,vdB2009}. The first of these is the presence of isophotal twisting, that is the change in the orientation of the major axis of the isodensity contours with on-sky distance from the galaxy center. Isophotal twisting is a clear signature of a triaxial figure with varying axis ratios with radius, although isophotal twisting may also be caused by tidal effects \citep{Kormendy1982}. Another indicator of triaxiality is evidence of \emph{kinematic misalignment} between the axis of rotation and the minor axis of the projected density.
For entire populations of galaxies, progress can be made by analyzing statistics of the population \citep[e.g.][]{Weijmans2014}. Recently, \cite{SanchezJanssen2016} demonstrated that under the assumption that the intrinsic axes of the dSphs are randomly oriented, the Local Group dSph population is best reproduced by triaxial models with mean triaxiality $\bar T=0.55^{+0.21}_{-0.22}$ and a mean intrinsic ellipticity ($E=1-(c/a)$) of $\bar E = 0.51^{+0.07}_{-0.06}$. The assumption of random orientation is perhaps to be questioned, particularly for the Milky Way dSphs. Dark-matter only simulations \citep{Kuhlen2007,Barber2015} have demonstrated that the major axes of subhalos tend to be aligned with the radial direction to the center of their host halo and this picture has been corroborated when baryons have been included \citep{Knebe2010}. The main exception to this is near the subhalo's pericentric passage where the major axis is briefly aligned perpendicular to the radial direction.
Most of the dSphs are distant enough for the radial direction and our line-of-sight to approximately coincide, which suggests that for many dSphs the observed flattening corresponds to the intermediate-to-minor axis ratio and that there is significant stretching of the dSphs along the line-of-sight. As demonstrated in this paper, this gives rise to overestimates of the J-factors from spherical analyses for the prolate face-on models and for the triaxial model viewed down the major axis.
Based on this discussion, we now compute the expected J correction factors with their associated uncertainties under a number of assumptions regarding the intrinsic shape and alignment of the dSphs. We use the \emph{emcee} package from \cite{ForemanMackey2012} to draw $500$ samples of $(T,E,\vartheta,\varphi)$ i.e. the triaxiality, the intrinsic ellipticity and the two viewing angles. Our likelihood is the distribution of the observed ellipticity for each dSph given by, for instance, equation (A1,A2) of \cite{Weijmans2014}. For those dSphs with upper-bounds on their ellipticity we use a normal distribution with mean zero and standard deviation of half the upper-bound. We consider three different prior distributions on the parameters $(T,E,\vartheta,\varphi)$:
\begin{enumerate}
\item Uniform (U): $T\sim\mathcal{U}(0,1)$, $E\sim\mathcal{U}(0,0.95)$, $\cos\vartheta\sim\mathcal{U}(0,1)$, $\varphi\sim\mathcal{U}(0,\pi/2)$,
\item Viewing down the major-axis (R): $T\sim\mathcal{U}(0,1)$, $E\sim\mathcal{U}(0,0.95)$, $\vartheta\sim\mathcal{N}(\pi/2,0.1\,\mathrm{rad})$, $\varphi\sim\mathcal{N}(0,0.1\,\mathrm{rad})$,
\item \citet{SanchezJanssen2016} priors (T): $T\sim\mathcal{N}(0.55,0.04)$, $E\sim\mathcal{N}(0.51,0.12)$, $\cos\vartheta\sim\mathcal{U}(0,1)$, $\varphi\sim\mathcal{U}(0,\pi/2)$,
\end{enumerate}
where $\mathcal{U}(a,b)$ is a uniform distribution from $a$ to $b$ and $\mathcal{N}(\mu,\sigma)$ is a normal distribution with mean $\mu$ and standard deviation $\sigma$. For each sample we compute the base-10 logarithm of the correction factor $\mathcal{F}_\mathrm{J}$ to construct a distribution of correction factors.
In Figure~\ref{RetII_hr}, we show the full 1D distributions of the correction factors for Reticulum~II. All three prior assumptions produce a correction factor distribution that peaks near zero. The broadest distribution corresponds to the case where uniform priors have been adopted in all parameters. In this case, the largest correction factors correspond to models with high intrinsic ellipticity $E$ viewed down the short axis. These models have triaxiality $T$ close to unity so are near prolate models. The smallest correction factors correspond to models with low intrinsic ellipticity viewed down the long-axis.
For the prior assumption that we are viewing along the major axis, we find the median correction factor peaks at $\sim-0.2\mathrm{dex}$. For this prior assumption, there is an approximate one-to-one relationship between $T$ and $E$ as well as $T$ and $\mathcal{F}_\mathrm{J}$. Models with smaller $T$ correspond to smaller $E$ and hence smaller amplitude correction factors as these models are approximately edge-on oblate, whilst larger $T$ and larger $E$ produce larger amplitude negative correction factors as these models are nearer prolate stretched along the line-of-sight. For the prior assumption that the models have some fixed triaxiality and intrinsic ellipticity, the largest correction factors correspond to viewing angles nearer the short axis and the smallest correction factors correspond to viewing angles closer to the long axis.
The medians and $\pm1\sigma$ error-bars of the correction factors for all the dSphs computed for the three prior assumptions are given in Table~\ref{TableTriax}. This information is also displayed in Figure~\ref{corr_triax}. If we assume the dSphs are preferentially viewed along the major axis, the median correction factor is less than unity and is weakly decreasing with increasing ellipticity. As the dSphs become more flattened on the sky, they are forced to become more extended along the line-of-sight and so the J-factor decreases. The medians of the correction factors for dSphs with small ellipticity under the uniform prior assumption is around $0.05\,{\rm dex}$ and the upper error-bars are in general larger than the lower error-bars but the spread encompasses zero. The median shift is due to the asymmetry in the correction factors between oblate and prolate models seen in Fig.~\ref{fig:corrections}. This suggests that all J-factors are underestimated by $\sim10$ percent but naturally this conclusion is very sensitive to the exact prior assumptions. For small ellipticity, the spread in the correction factors for the uniform and fixed shape priors are approximately equal with the spread weakly increasing with increasing ellipticity for the uniform case. For the fixed shape prior the spread decreases at large ellipticity as models viewed down the minor axis become inconsistent with the observed ellipticity. We have fitted a simple relation to the uncertainty in the correction factors from the uniform priors $\Delta \mathcal{F}_\mathrm{J}$ (the average of the $\pm1\sigma$ uncertainties) as a function of ellipticity as
\begin{equation}
\Delta\mathcal{F}_\mathrm{J} \approx 0.4\sqrt{\epsilon},
\end{equation}
which gives a fractional uncertainty in the J-factor of
\begin{equation}
\frac{\Delta {\rm J}}{{\rm J}} \approx 10^{0.4\sqrt{\epsilon}}-1.
\end{equation}
This expression gives $50\text{ per cent}$ uncertainty for $\epsilon\approx0.2$, a factor $1.8$ uncertainty for $\epsilon\approx0.4$ and a factor $2.3$ uncertainty for $\epsilon\approx0.6$. For small $\epsilon$, $\Delta {\rm J}/{\rm J}\approx 0.9\epsilon$. We conclude for a typical dSph ellipticity of $0.4$ there is approximately a factor of two uncertainty in the J-factors due to the unknown triaxiality and alignment of the dSph.
\begin{table*}
\caption{Median and $\pm1\sigma$ J correction factors for the known dSphs for three different assumptions about the intrinsic shapes and alignments. The first correction factor (marked `U') uses flat uniform priors on the triaxiality, minor-to-major axis ratio and viewing angles. The second (marked `R') uses a normal prior on the viewing angles centered on $(\theta=\pi/2,\phi=0)$ with width $5^\circ$. The third (marked `T') uses a normal prior on the triaxiality and minor-to-major axis ratios with means $(0.55,0.49)$ and widths $(0.04,0.12)$ (based on the fits to the Local Group dSphs of \citet{SanchezJanssen2016}.}
\input{corr_triax_table.dat}
\label{TableTriax}
\end{table*}
\begin{figure}
$$\includegraphics[width=\columnwidth]{RetII_hr}$$
\caption{Distribution of the base-10 logarithm of the J-factor correction factors for triaxial models of Reticulum~II under three different assumptions on the prior distributions of the intrinsic triaxiality, ellipticity and viewing angles as described in the text.}
\label{RetII_hr}
\end{figure}
\begin{figure*}
$$\includegraphics[width=\textwidth]{corr_triax_all}$$
\caption{Medians and $\pm1\sigma$ error-bars for the base-10 logarithms of the J-factor correction factors for all the dSphs ranked by their ellipticity. The three different error-bars correspond to three different prior assumptions regarding the intrinsic shapes and alignments of the dSphs as described in the text.}
\label{corr_triax}
\end{figure*}
\section{Discussion and Conclusions}
Flattening is a crucial attribute of a dwarf spheroidal galaxy. Both
the dark halo and the stellar distribution can be flattened. The ultrafaint dSphs have many fewer baryons than the classical dwarfs so it is anticipated that feedback effects have a weaker effect on the shape of the dark matter distribution in the ultrafaints. Therefore, for the ultrafaints, a flattened stellar distribution probably corresponds to a flattened dark matter distribution. Of these ultrafaints, Reticulum~II is an interesting object as it is particularly nearby and also one of
the most highly flattened of all the ultrafaints, at least as judged
by the stellar light. On these grounds, we might well expect that
flattening may provide an explanation as to why a gamma-ray signal may have been seen towards Reticulum~II as opposed to other ultrafaints.
We have explored the impact of flattening on the J- and D-factors, which control the expected dark matter annihilation and decay signals from the dSphs. The effects of flattening on these factors can be decomposed into two separate corrections: the geometric and the kinematic factors. The first of these corresponds to the increase (decrease) in dark-matter density produced by squeezing (stretching) the models. The latter corresponds to how the observed velocity dispersion relates to the total velocity dispersion or the enclosed dark matter mass. When viewing oblate (prolate) models face-on, these two factors act together to increase (decrease) the J-factor over a spherical analysis, whereas, when viewing these models edge-on, the two factors compete and result in a decrease (increase) in the J-factor over a spherical analysis.
We have used Made-to-Measure techniques ~\citep{Sy96,De09} to
build numerical equilibrium models of Reticulum~II. These reproduce the flattened
shape, the major-axis length and the line of sight velocity dispersion of Reticulum~II. For the models with a prolate dark matter halo with ellipticity $\sim
0.6$ viewed edge-on, flattening could cause an additional
amplification of $\sim 2-2.5$ for Reticulum~II over that expected
for spherical dark halos. This factor could be still larger if the
stellar profile falls off more slowly than a Plummer law (which could
increase the kinematic factor). It could also be larger if the dark halo of Reticulum~II is triaxial (as anticipated from dark-matter-only simulations) and hence more flattened along the line-of-sight. However, this scenario is disfavored by dark-matter simulations with and without baryons that produce subhalos which preferentially point towards the center of their host halo and so we might anticipate dSphs to be elongated along the line-of-sight.
We corroborated the results of the Made-to-Measure simulations with a simpler virial method that allows for more rapid calculation of the correction factors for general geometries. A simple fitting relation has been provided for rapid estimation of the correction factors for the oblate and prolate cases. Additionally, we have inspected two cases where some analytic progress can be made in the computation of the J-factors. This has allowed us to characterize how the correction factors change as a function of the stellar and dark-matter distributions. We found that the correction factors for the Made-to-Measure models agree well with the trends seen in the analytic models.
We used our models to estimate the J-factors for the dSphs under the assumption that the figures are aligned with the line-of-sight and are either oblate or prolate. The ranking of the J-factors of the dSphs is slightly altered when accounting for flattening under the assumption that all the dSphs are either prolate or oblate. Typical correction factors for a dSph with ellipticity $0.4$ are $0.75$ in the oblate case and $1.6$ in the prolate case. We also demonstrated that the corrections to the D-factors are much smaller than the scatter in the spherical D-factor from the other observables. For instance, a dSph with ellipticity $0.4$ has a D-factor correction factor of $0.97$ in the oblate case and $1.1$ in the prolate case. Therefore, we concluded that flattening is unimportant for D-factor computation.
We concluded our discussion of the effects of flattening by computing correction factors for triaxial figures. The findings from the axisymmetric cases were found to simply extend when considering triaxiality. The largest J-factor correction factor corresponds to viewing the figure along the minor axis, whilst the smallest corresponds to viewing the figure along the major axis. We found that for a Reticulum~II-like model the J-factor correction factor varies by a factor of $\sim 6-10$ as one changes the viewing angle. For a fixed observed ellipticity, the correction factor can vary by a factor of $\sim4$. We demonstrated that for the known dSphs the uncertainty in the correction factors due to unknown triaxiality increases with the observed ellipticity of the dSph and is typically a factor of two for $\epsilon\sim0.4$. If all dSphs have their major axes aligned with the line-of-sight (as suggested by some simulations), the correction factors decrease as a function of observed ellipticity and are typically a factor $1/2$ for $0.4\lesssim\epsilon\lesssim0.6$.
Deviations from sphericity in both the light profile and the dark
matter are important. This suggests fundamental limitations to the
spherical Jeans modeling which is common in the field (although see \citep{Hayashi2016} for J-factors computed using axisymmetric Jeans modeling). In
particular, increasingly sophisticated statistical
techniques~\citep{Mar15,Co15} will fail to include an inherent uncertainty if the assumption of a
spherical stellar density profiles in a spherical dark halo breaks
down. The uncertainties, which are different for different dSphs, must be accounted for joint analyses of multiple dSphs.
Spherical Jeans modeling is probably most useful for large
classical dwarf spheroidal galaxies that look nearly round (such as
Leo I or Fornax). It ignores important uncertainties for the ultrafaints, which is
unfortunate as these are the most promising targets of all for
indirect dark matter detection. We hope that the work presented here
-- a systematic foray into the domain of flattening -- is the
beginning of a systematic exploration of more general flattened and
triaxial dark halo shapes.
Finally, this study was partly inspired by the gamma-ray detection~\citep{2015PhRvL.115h1101G} toward the very flattened ultrafaint, Reticulum~II. Our work demonstrates that Reticulum~II could have a J-factor that is higher than spherical analyses suggest if it is a prolate figure. However, the correction for the prolate shape does not make Reticulum~II stand out as the dSph with the highest J-factor nor does a lack of signal from the other dSphs create any tension, irrespective of the shapes of the other dSphs. If, however, Reticulum~II is an oblate figure the J-factor is lower than that found through spherical analyses and lack of signal from the other dSphs may give rise to some tension if the other dSphs (such as Ursa Minor) are prolate. More generically we have demonstrated that unknown triaxiality produces uncertainty in the J-factor for Reticulum~II of a factor of $\sim2$.
In general, we have shown that the effect of flattening on expected dark matter annihilation fluxes cannot be ignored. Indeed, flattening can shift expected signals by amounts larger than error bars due to current velocity dispersion measurements. These currently unknown shifts change the ranking of dSph targets for gamma-ray experiments. However, if the orientations of the Milky Way dSphs can be determined, the results presented here can help pin down relative J-factors and allow tests of dark matter explanations of gamma-ray detections.
\begin{acknowledgments}
JLS acknowledges financial support from the Science and Technology Facilities Council (STFC) of the United Kingdom. Figure~\ref{fig:flattened} was produced using the Pynbody package \citep{Pynbody}.
\end{acknowledgments}
|
\section{Introduction}
Hot subdwarf stars (sdO/Bs) are evolved core helium-burning stars with very thin hydrogen envelopes, which can be formed by common envelope ejection. Close sdB binaries with massive C/O-WD companions are candidates for supernova type Ia (SN~Ia) progenitors, because mass-transfer can lead to the thermonuclear explosion of the WD. The project Massive Unseen Companions to Hot Faint Underluminous Stars from SDSS (MUCHFUSS) aims at finding the sdB binaries with the most massive compact companions like massive white dwarfs, neutron stars or black holes.
We selected and classified about $\sim1400$ hot subdwarf stars from the Sloan Digital Sky Survey (SDSS DR7). Stars with high velocity variations have been reobserved and analysed. In total $177$ radial velocity variable subdwarfs have been dis\-covered and $1914$ individual radial velocities measured. We constrain the fraction of close massive companions of H-rich hot subdwarfs to be smaller than $\sim1.3\%$ \cite{geier15b}. Orbital parameters as well as minimum companion masses have been derived from the radial velocity curves of 30 sdB binaries \cite{kupfer15}.
\section{Discovery of an SN\,Ia progenitor and an ejected companion}
We detected high RV-variability of the bright sdB CD$-$30$^\circ$11223. Photometric follow-up revealed both shallow transits and eclipses, allowing us to determine its component masses and fundamental parameters. The binary system, which is composed of a C/O-WD ($\sim0.76\,M_{\rm \odot}$) and an sdB ($\sim0.51\,M_{\rm \odot}$) has a very short orbital period of $\sim0.049\,{\rm d}$. In the future mass will be transfered from the helium star to the white dwarf. After a critical amount of helium is deposited on the surface of the white dwarf, the helium is ignited. Modelling this process shows that the detonation in the accreted helium layer should be sufficiently strong to trigger the explosion of the core. Thermonuclear supernovae have been proposed to originate from this so-called double-detonation of a WD \cite{fink10,geier13}. The surviving companion star will then be ejected with its orbital velocity. The properties of such a remnant match the hypervelocity star US\,708, a helium-rich sdO star moving with $\sim1200\,{\rm km\,s^{-1}}$, exceeding the escape velocity of our Galaxy by far and making it the fastest unbound star known in our Galaxy \cite{geier15a}.
\section{Finding more progenitor and ejected companion candidates}
Since the properties of the ejected companions, especially the ejection velocity, allow us to constrain the properties of the binary progenitors such as the orbital period and the companion mass right at the moment of the explosion, we will gain an unprecedented insight into the formation of SN\,Ia and learn about other acceleration mechanisms for hypervelocity stars, if more such objects can be found and studied. The distribution of orbital periods and WD companion masses of progenitor binaries will help us to constrain SN\,Ia progenitor models. While binaries with periods longer than about 2\,hr will merge as double degenerates, closer binaries might be progenitors for the helium double-detonation channel.
To search for ejected companions we compiled a catalogue of all known sdO/B stars from the literature and our own database ($\sim4500$ stars) and crossmatch it with proper motion catalogues. Candidates with high velocities are followed-up with spectroscopy (Keck/ESI, VLT/XSHOOTER, SOAR/Goodman, CAHA/TWIN, WHT/ISIS) to measure spectroscopic distances and derive kinematics. Several good candidates for unbound hypervelocity sdO/Bs have already been found.
We found that hot subdwarf binaries with massive WDs in close orbits are quite rare. To find more of those objects, we crossmatch the hot subdwarf catalogue with light curve catalogues (e.g. CRTS, PTF, SWASP, GALEX gPhoton, Kepler K2) and search for the characteristic sinusoidal variations caused by the ellipsoidal deformation of the sdB. Several candidates have been found and will be followed-up spectroscopically and photometrically.
Eventually, the Gaia mission will provide accurate astrometry and light curves of all the stars in our hot subdwarf sample and will allow us to compile a much larger all-sky catalogue of those stars. In this way we expect to find hundreds of progenitor binaries and ejected companions.\\\\
|
\section{Introduction}
Clustering -- the task of grouping data points by their similarity -- is one of the most commonly used techniques for exploring data, for identifying structure in uncategorized data, and for performing a variety of machine learning and optimization tasks.
We present a new differentially private algorithm for a clustering-related task:
Given a collection $S$ of $n$ points in the $d$-dimensional Euclidean space $\R^d$ and a parameter $t$ reflecting a target number of points, our goal is to find a smallest ball containing at least $t$ of the input points, while preserving differential privacy.
\subsection{Problem and motivation}
We recall the definition of differential privacy. We think of a dataset as consisting of $n$ rows from a data universe $U$, where each row corresponds to one individual. Differential privacy requires that no individual's data has a significant effect on the distribution of what we output.
\begin{definition}
A randomized algorithm $M : U^n\rightarrow Y$ is $(\eps,\delta)$ {\em differentially private} if for every two datasets $S,S'\in U^n$ that differ on one row, and every set $T\subseteq Y$, we have
$$\Pr[M(S)\in T]\leq e^{\eps}\cdot \Pr[M(S')\in T]+\delta.$$
\end{definition}
The common setting of parameters is to take $\eps$ to be a small constant and $\delta$ to be negligible in $n$, e.g., $\delta=1/n^{\log n}$. For the introduction, we will assume that that $\delta<1/(nd)$.
In this work we study the following problem under differential privacy:
\begin{definition}
A {\em 1-cluster problem} $\mathscr{C}=(X^d,n,t)$ consists of a $d$-dimensional domain $X^d$ (where $X\subseteq\R$ is finite and totally ordered), and parameters $n\geq t$.
We say that an algorithm $\cal M$ solves $(X^d,n,t)$ with parameters $(\Delta,w)$ if for every input database $S\in (X^d)^n$, algorithm ${\cal M}(S)$ outputs a center $c$ and a radius $r$ s.t.\ the following holds with high probability:
\begin{enumerate}
\item The ball of radius $r$ around $c$ contains at least $t-\Delta$ input points (from $S$).
\item Let $r_{opt}$ be the radius of the smallest ball in $X^d$ containing at least $t$ input points. Then $r\leq w\cdot r_{opt}$.
\end{enumerate}
\end{definition}
The 1-cluster problem is very natural on its own, and furthermore, an algorithm for solving the 1-cluster problem can be used as a building block in other applications:\\
\noindent{\bf Data exploration.}\; The 1-cluster problem has direct implications to performing data exploration privately, and, specifically to clustering. For example, one can think of an application involving map searches where one is interested in privately locating areas of certain ``types'' or ``classes'' of a given population to gain some insight of their concentration over different geographical areas.\\
\noindent{\bf Outlier detection.}\; Consider using a solution to the 1-cluster problem to locate a small ball containing, say, 90\% of the input points. This can be used as a basic private identification of outliers: The outcome of the algorithm can be viewed as defining a predicate $h$ that evaluates to one inside the found ball and to zero otherwise. $h$ can hence be useful for screening the inputs to a private analysis of the set of outlier points in the data.
Outliers can skew and mislead the training of classification and regression algorithms, and hence, excluding them from further (privacy preserving) analysis can increase accuracy.
Furthermore, outlier detection can help in reducing the noise level required for the differentially private analysis itself, which in many cases would result in a dramatic improvement in accuracy. To see how this would happen, recall that the most basic construction of differentially private algorithms is via the framework of {\em global sensitivity}~\cite{DMNS06} (see also Section~\ref{sec:prelim} below). Noise is added to the outcome of a computation, and the noise magnitude is scaled to the {\em sensitivity} of the computation, i.e., the worst-case difference that a change of a single entry of the database may incur. Restricting the input space to a ball of (hopefully) a small diameter typically results in a smaller global sensitivity, and hence also significantly less noise.\\
\noindent{\bf Sample and aggregate.}\;
Maybe most importantly, an algorithm for the 1-cluster problem can be used in the Sample and Aggregate technique~\cite{NRS07}. This generic technique allows using ``off the shelf'', {\em non-privacy preserving}, analyses and transforms their outcome so as to preserve differential privacy.
Consider a (non-private) analysis $f$ mapping databases to (a finite subset of) $\R^d$, and assume that $f$ can be well approximated by evaluating $f$ on a random subsample taken from the database. In the sample and aggregate framework, instead of applying the analysis $f$ on the entire dataset, it is applied on several (say $k$) random sub-samples of the input dataset, obtaining $k$ outputs $S=\{x_1,x_2,\dots,x_k\}$ in $\R^d$. The outputs are then {\em aggregated} to give a privacy-preserving result $z$ that is ``close'' to some of the points in $S$. If $f$ has the property that results that are in the vicinity of ``good'' results are also ``good'', then $z$ will also be a ``good'' result. Furthermore, it suffices that (only) the aggregation procedure would be differentially private to guarantee that the entire construction satisfies differential privacy.
Using their aggregation function (discussed below), Nissim et al.\ constructed differentially private algorithms for $k$-means clustering and for learning mixtures of Gaussians~\cite{NRS07}. Smith used the paradigm in dimension $d=1$ to construct private statistical estimators~\cite{Smith11}. One of the most appealing features of the paradigm is it that allows transforming programs that were not built with privacy in mind into differentially private analyses. For example, GUPT~\cite{MTSSC12} is an implementation of differential privacy that uses differentially private averaging for aggregation. The development of better aggregators enables making the sample and aggregate paradigm more effective.
\subsection{Existing techniques}
As we will show (by reduction to a lower bound of Bun et al.~\cite{BNSV15}), solving the 1-cluster problem on infinite domains is impossible under differential privacy (for reasonable choices of parameters), so any private solution must assume a finite universe $X^d\subseteq \R^d$. We will consider the case that $X^d$ is a discrete grid, identified with the real $d$ dimensional unit cube quantized with grid step $1/(|X|-1)$.
\begin{table*}[ht!]
\begin{small}
\begin{center}
\begin{tabular}{|c"c|c|c|}
\hline
& \specialcell{Needed cluster size -- $t$\\ Additive loss in cluster size -- $\Delta$} & \specialcell{Approximation factor\\ in radius -- $w$} & Running time\\[2ex]
\thickhline
\specialcell{Private\\aggregation~\cite{NRS07}} & \specialcell{\vspace{-7px}\\$t \geq \max\left\{0.51n,O(\frac{d^2}{\epsilon^2}\log^2|X|)\right\}$ \\ $\Delta=0$\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;} & $w=O(\sqrt{d}/\epsilon)$ & $\poly(n,d,\log|X|)$ \\[3ex]
\hline
\specialcell{\vspace{-7px}\\Exponential\\ mechanism~\cite{MT07}} & $t\geq\Delta= \tilde{O}(d)\cdot\log^2(|X|)/\epsilon$ & $w=1$ & $\poly(n,|X^d|)$\\[2ex]
\hline
\specialcell{\vspace{-7px}\\Query release\\ for threshold\\ functions~\cite{BNS13b,BNSV15}\\ {\bf ({\boldmath$d=1$} only)}} &
\specialcell{$t\geq\Delta=\frac{1}{\epsilon}\cdot2^{(1+o(1))\log^*|X|}\cdot \log(\frac{1}{\delta})$\\[1ex] (ignoring $\polylog(n)$ factors)} & $w=1$ & $\poly(n,\log|X|)$\\[4ex]
\hline
This work &
\specialcell{\vspace{-7px}\\
$t\geq \frac{\sqrt{d}}{\epsilon}\log^{1.5}\left(\frac{1}{\delta}\right)\cdot 2^{O(\log^*(|X|d))}$\\[1ex]
$\Delta=\frac{1}{\epsilon}\log\left(\frac{1}{\delta}\right)\cdot2^{O(\log^*(|X|d))}$\;\;\;\;\;\;
}
& $w=O(\sqrt{\log n})$ & $\poly(n,d,\log|X|)$ \\[4ex]
\hline
\end{tabular}
\caption{\small \label{fig:compare} Comparing different solutions from past work and our result.}
\end{center}
\end{small}
\end{table*}
We now list a few existing techniques that can be used to solve the 1-cluster problem $(X^d,n,t)$:\\
\noindent{\bf Private aggregation.}
Nissim, Raskhodnikova, and Smith~\cite{NRS07} introduced an efficient algorithm capable of identifying a ball of radius $O(r_{opt}\cdot\sqrt{d}/\epsilon)$ containing at least $t$ points, provided that $t\geq 0.51n\geq O(\frac{d^2}{\epsilon^2}\log^2|X|)$.\footnote{
The results of~\cite{NRS07} do not assume a finite discrete grid universe. Instead, they allow both a multiplicative and an additive error in the radius of the found ball. The additive error in the radius is eliminated whenever $n\geq O(\frac{d^2}{\epsilon^2}\log^2|X|)$. More specifically, let $z_0$ denote the center of the smallest ball containing $t>0.51n$ input points. The algorithm of~\cite{NRS07} computes a center $z$ s.t.\ that the error vector $(z_0-z)$ has magnitude $O(\frac{r_{opt}}{\epsilon})+\frac{1}{\epsilon}\cdot e^{-\Omega(\epsilon\sqrt{n}/d)}$ in each coordinate.} There are three downsides here: (1)~The error in the radius of the found ball grows with $\sqrt{d}$, which might be unacceptable in high dimensions. (2)~The database size $n$ needs to be as big as $d^2\log^2|X|$. (3)~The algorithm can only identify a majority size cluster. If, e.g., the input points are split between several small balls such that none of them contains a majority of the points, then the algorithm results in an uninformative center $z$ chosen almost at random.\\
\noindent{\bf Exponential mechanism.} One of the first ideas for solving the 1-cluster problem is to use the exponential mechanism of McSherry and Talwar~\cite{MT07} to choose among all balls: Given a radius $r$ s.t.\ there exists a ball of radius $r$ in $X^d$ containing $t$ points, the exponential mechanism is capable of identifying a ball of radius $r$ containing $t-O(\log(|X|^d)/\epsilon)$ points. Privately finding the radius $r$ could be done using a binary search, which would increase the loss in the size of the cluster by a factor of $O(\log(\sqrt{d}|X|))$.
Overall, this strategy results in a ball of radius $r_{opt}$ containing $t-\tilde{O}(d)\cdot\log^2(|X|)/\epsilon$ input points.
Thus, the exponential mechanism can identify clusters even when they do not contain a majority of the points.
However, we are seeking for an algorithm with running time $\poly(n,d,\log|X|)$, while the exponential mechanism runs in time $\poly(n,|X^d|)$.\\
\noindent{\bf Query release for threshold functions.}
For the special case where $d=1$, the 1-cluster problem can be solved using algorithms for ``query release for threshold functions'': On input a database $S\in X^n$, a query release mechanism for threshold functions privately computes a database $S'\in X$ such that for every interval $I\subseteq X$ it holds that the number of points in $S'$ differs from the number of points in $S$ that lie in $I$ by at most $\Delta$. Searching for a smallest interval in $S'$ containing $\gtrsim t$ points results in an interval of length $2r_{opt}$ (that is, of radius $r_{opt}$) containing at least $t-O(\Delta)$ input points.
Known algorithms for query release for threshold functions~\cite{BNS13b,BNSV15} achieve $\Delta=\max\left\{2^{(1+o(1))\log^*|X|}\cdot \log(\frac{1}{\delta}),\polylog(n)\right\}/\epsilon$. Note that the dependency on $|X|$ has improved substantially from the $\polylog|X|$ of the above methods. Bun et al.\cite{BNSV15} also showed that $\Delta$ must be at least $\Omega(\log^*|X|)$ and hence this problem is impossible to solve for infinite $X$ (we show a similar lower bound for the 1-cluster problem).
\subsection{Our contributions}
We present an algorithm for the 1-cluster problem that achieves (almost) the best of all the above. Namely, it (a)~handles a minority size cluster, of size only sublinear in $d$ (better than all the above) and sublogarithmic in $|X|$ (as with query release), and loses even less than that in the size of the cluster; and (b)~avoids paying $d^{\Omega(1)}$ factors in the error of the radius (instead paying $O(\sqrt{\log n})$). See Table~\ref{fig:compare} for a comparison with past work.\\
{
\renewcommand{\thetheorem}{\ref{thm:main}}
\begin{theorem}[Informal]
There exists an efficient $(\epsilon,\delta)$-differentially private algorithm that, given a set $S$ of $n$ points in a discretized $d$-dimensional cube $X^d$, and a parameter $t$, outputs a ball of radius $O\left( \sqrt{\log n} \cdot r_{opt} \right)$ of size at least $t-\frac{1}{\epsilon}\log\left(\frac{1}{\delta}\right)\cdot2^{O(\log^*(|X|d))}$,
provided that
$$t\geq \frac{\sqrt{d}}{\epsilon}\log^{1.5}\left(\frac{1}{\delta}\right)\cdot 2^{O(\log^*(|X|d))}.$$
\end{theorem}
\addtocounter{theorem}{-1}
}
We note that the algorithm of~\cite{NRS07} works in general metric output spaces, whereas ours is restricted to $\R^d$. We leave open the question of extending our construction to more general settings.
\section{Preliminaries}\label{sec:prelim}
\vspace{5px}
\noindent{\bf Notations.}\; Throughout the paper, we use $X$ to denote a finite totally ordered data universe, and use $X^d$ for the corresponding $d$-dimensional domain. We will identify $X^d$ with the real $d$-dimensional unit cube, quantized with grid step $1/(|X|-1)$.
Datasets are (ordered) collections of elements from some data universe $U$ (e.g., $U=X$ or $U=X^d$).
Two datasets $S,S'\in U^n$ are called {\em neighboring} if they differ on at most one entry, i.e., $S'=(S_{-i},x'_i)$ for some $1\leq i \leq |S|$ and $x'_i\in U$.\\
We will construct algorithms that use several differentially private mechanisms as subroutines, and analyze the overall privacy using the following composition theorem:
\begin{theorem}[\cite{DKMMN06, DworkLei}]\label{thm:composition1}
A mechanism that permits $k$ adaptive interactions with $(\epsilon,\delta)$-differentially private mechanisms (and does not access the database otherwise) is $(k\epsilon, k\delta)$-differentially private.
\end{theorem}
\subsection{The framework of global sensitivity~\cite{DMNS06}}
\begin{definition}[$L_p$-Sensitivity]
A function $f$ mapping databases to $\R^d$ has {\em $L_p$-sensitivity $k$} if $\|f(S)-f(S')\|_p\leq k$ for all neighboring $S,S'$.
\end{definition}
The most basic constructions of differentially private algorithms are obtained by adding noise calibrated to the global sensitivity of the computation. We will use the Laplace mechanism of~\cite{DMNS06} to obtain noisy estimations to counting queries (e.g., how many points in $S$ have 0 on their first coordinate? Such a query has sensitivity 1 since changing one database element can change the count by at most 1).
\begin{theorem}[Laplace mechanism~\cite{DMNS06}]\label{thm:lap}
A random variable is distributed as $\Lap(\lambda)$ if its probability density function is $f(y)=\frac{1}{2\lambda}\exp(-\frac{|y|}{\lambda})$.
Let $\epsilon>0$, and let $f:U^* \rightarrow \R^d$ be a function of $L_1$-sensitivity $k$.
The mechanism $\AAA$ that on input $D\in U^*$
adds independently generated noise with distribution $\Lap(\frac{k}{\epsilon})$ to each of the $d$ output terms of $f(D)$ preserves $(\epsilon,0)$-differential privacy.
\end{theorem}
We will also use the Gaussian mechanism to obtain (noisy) averages of vectors in $\R^d$. See Appendix~\ref{sec:NoisyAVG} for details.
\begin{theorem}[Gaussian Mechanism \cite{DKMMN06}]\label{thm:gauss}
Let $\epsilon,\delta\in(0,1)$, and let $f:U^* \rightarrow \R^d$ be a function of $L_2$-sensitivity $k$. Denote $\sigma\geq\frac{k}{\epsilon}\sqrt{2\ln(1.25/\delta)}$.
The mechanism $\AAA$ that on input $D\in U^*$
adds independently generated noise with distribution $\NNN(0,\sigma^2)$ to each of the $d$ output terms of $f(D)$ preserves $(\epsilon,\delta)$-differential privacy.
\end{theorem}
\subsection{Stability based techniques~\cite{DworkLei, Adist, BNS13b}}
Given a database $S\in U^*$, consider the task of choosing a ``good'' solution out of a possible set of solutions $F$, and assume that this ``goodness'' is quantified using a {\em quality function} $q:U^*\times F\rightarrow\N$ assigning ``scores'' to solutions from $F$ (w.r.t.\ the given database $S$).
One of the most useful constructions in differential privacy -- the exponential mechanism~\cite{MT07} -- shows that such scenarios are compatible with differential privacy, and that an approximately optimal solution $f\in F$ can be privately identified provided that $q$ has low-sensitivity and that $|S|\gtrsim\log|F|$.
By limiting our attention to cases where the number of possible solutions with ``high'' scores is limited, it is possible to relax the requirement that $|S|\gtrsim\log|F|$, using what has come to be known as {\em stability based techniques}. In this work we use stability based techniques for the following task: Given a dataset $S\in U^n$ and a partition $P$ of $U$, find a set $p\in P$ containing (approximately) maximum number of elements of $S$. This task can be privately solved using algorithms for query release for point functions.
\begin{theorem}[\cite{BNS13b, Vadhan2016}]\label{thm:sanPoints}
Fix $\epsilon,\delta$.
Let $U$ be a data universe, let $P$ be a partition of $U$, and let $S\in U^n$ be an input database.
There exists an $(\epsilon,\delta)$-differentially private algorithm s.t.\ the following holds.
Let $T$ denote the maximum number of input elements (from $S$) that are contained in a set in $P$.
If $T\geq\frac{2}{\epsilon}\log(\frac{4n}{\beta\delta})$, then with probability at least $(1-\beta)$ the algorithm returns a set $q\in P$ containing at least $T-\frac{4}{\epsilon}\log(\frac{2n}{\beta})$ elements from $S$.
\end{theorem}
\section{Our algorithms}
In this paper we explore the following problem under differential privacy:
\begin{definition}[The Problem of a Minimal Ball Enclosing $t$ Points]
Given a set of $n$ points in the Euclidean space $\R^d$ and an integer $t\leq n$,
the goal is to find a ball of minimal radius $r_{opt}$ enclosing at least $t$ input points.
\end{definition}
To enhance readability, we are using this section as an informal presentation of our results, giving most of the ideas behind our construction. We will also briefly discuss some intuitive ideas which fail to solve the task at hand, but are useful for the presentation. Any informalities made hereafter will be removed in the sections that follow.
We start by recalling known facts (without concern for privacy) about the problem of a minimal ball enclosing $t$ points:
\begin{enumerate}
\item It is NP-hard to solve exactly~\cite{Shenmaier13}.
\item Agarwal et al.~\cite{Agarwal05} presented an approximation scheme (PTAS) which computes a ball of radius $(1 + \alpha)r_{opt}$ containing $t$ points in time $O(n^{1/\alpha}d)$.
\item There is a trivial algorithm for computing a ball of radius $2 r_{opt}$ containing $t$ points: Consider only balls centered around input points, and return the smallest ball containing $t$ points.
Indeed, let $B$ denote a ball of radius $r_{opt}$ enclosing at least $t$ input points, and observe that a ball of radius $2 r_{opt}$ around any point in $B$ contains all of $B$. Hence, there exists a ball of radius $2 r_{opt}$ around an input point containing at least $t$ points.
\end{enumerate}
We present a (roughly) $\sqrt{\log n}$-approximation algorithm satisfying differential privacy:
\begin{theorem}\label{thm:main}
Let $n,t,\beta,\epsilon,\delta$ be s.t.
$$t\geq O\left(\frac{\sqrt{d}}{\epsilon}\log\left(\frac{1}{\beta}\right)\log\left(\frac{nd}{\beta\delta}\right)\sqrt{\log\left(\frac{1}{\beta\delta}\right)}\cdot 9^{\log^*(2|X|\sqrt{d})}\right).$$
There exists a $\poly(n,d,1/\beta,\log|X|)$-time $(\epsilon,\delta)$-differentially private algorithm
that solves the 1-cluster problem $(X^d,n,t)$ with parameters $(\Delta,w)$ and error probability $\beta$, where
$w=O\left( \sqrt{\log n} \right)$
and
$$\Delta=O\left(\frac{1}{\epsilon}\log\left(\frac{n}{\delta}\right)\log\left(\frac{1}{\beta}\right)\cdot9^{\log^*(2|X|\sqrt{d})}\right).$$
\end{theorem}
In words, there exists an efficient $(\epsilon,\delta)$-differentially private algorithm that (ignoring logarithmic factors) is capable of identifying a ball of radius $\tilde{O}(r_{opt})$ containing $t-\tilde{O}(\frac{1}{\epsilon})$ points, provided that $t\geq\tilde{O}(\sqrt{d}/\epsilon)$.
\begin{remark}
For simplicity, in the above theorem we identified $X^d$ with the real $d$-dimensional unit cube, quantized with grid step $1/(|X|-1)$. Our results trivially extend to domains with grid step $\ell$ and axis length $L=\max{X}-\min{X}$ by replacing $|X|$ with $L/\ell$.
\end{remark}
\begin{remark}
Observe that the parameters $t,\Delta$ in Theorem~\ref{thm:main} have some dependency on the domain size $|X|$. Although this dependency is very weak, it implies that our construction cannot be applied to instances with infinite domains. In Section~\ref{sec:lower} we show that this is a barrier one cannot cross with differential privacy, and that privately solving the 1-cluster problem on infinite domains is impossible (for reasonable choices of parameters).
\end{remark}
\begin{observation}
Our construction could be used as a heuristic for solving a $k$-clustering-type problem: Letting $t=n/k$, we can iterate our algorithm $k$ times and find a collection of (at most) $k$ balls that cover most of the data points. Using composition to argue the overall privacy guarantees, we can have (roughly) $k\lesssim \frac{(\epsilon n)^{2/3}}{d^{1/3}}$.
\end{observation}
Towards proving Theorem~\ref{thm:main} we design two algorithms. The first, \texttt{GoodRadius}, is given as input a collection $S$ of $n$ points and a parameter $t$, and returns a radius $r$ such that there exists a ball of radius $r$ containing $\gtrsim t$ of the points in $S$ and, furthermore, $r$ is within a constant factor of the smallest such ball.
The second algorithm, \texttt{GoodCenter}, is given as input the set $S$ of input points, a parameter $t$, and a radius $r$ computed by \texttt{GoodRadius}. The algorithm outputs a center $z$ of a ball of radius $\tilde O(r)$ containing $\gtrsim t$ of the points in $S$.
So, a simplified overview of our construction is:
\begin{enumerate}[leftmargin=5pt, itemsep=1pt]
\item[] Input: A set $S$ of $n$ points in $X^d$, and an integer $t\leq n$.
\item[] {\em Step 1:} Identify a radius $r=O(r_{opt})$ s.t.\ there is a ball of radius $r$ containing $\gtrsim t$ input points.
\item[] {\em Step 2:} Given $r$, locate a ball of radius $O\left(\sqrt{\log n}\cdot r\right)$ containing $\gtrsim t$ input points.
\end{enumerate}
\subsection{Finding the cluster radius: algorithm GoodRadius}\label{sec:GoodRadiusWarmup}
Let $S=(x_1,\ldots,x_n)$ be a database containing $n$ points in $X^d$.
Given $S$ and $t\leq n$, our current task is to approximate the minimal radius $r_{opt}$ for which there is a ball of that radius containing at least $t$ points from $S$.
We start with the following notations:
For a radius $r\geq0$ and a point $p\in \R^d$, let $\BBB_r(p)$ denote the number of input points contained in a ball of radius $r$ around $p$. That is,
$\BBB_r(p) = |\{i : \|x_i-p\|_2\leq r\}|$.
Recall that we are looking for (a radius of) a ball containing $\gtrsim t$ points from $S$, and that a ball containing $t$ points is just as good as a ball of the same radius containing $100t$ points. Hence, we modify our notation of $\BBB_r(p)$ to cap counts at $t$:
$$
\bar{\BBB}_r(p) = \min\Big\{ \; \BBB_r(p) \; , \; t \; \Big\}.
$$
Using that notation, our goal is to approximate
$r_{opt} = \min\left\{ r\geq0 \; : \; \exists p\in\R^d \text{ s.t.\ } \bar{\BBB}_r(p)\geq t \right\}$. Recall that a direct computation of $r_{opt}$ is NP-hard,
and let us turn to the simple 2-approximation algorithm that considers only balls centered at input points. To that end, for every $r\geq0$ define $L(r)$ as the maximum number of input points contained in a ball of radius $r$ around some input point (capped at $t$). That is,
$$
L(r)=\max_{x_i\in S}\left\{ \bar{\BBB}_r(x_i) \right\}.
$$
As we next explain, using that notation, it suffices to compute a radius $r$ s.t.
$$(i)\;\; L(r) \gtrsim t \qquad\text{ and }\qquad (ii)\;\;L(r/2) < t.$$
We now argue that such an $r$ satisfies the requirements of \texttt{GoodRadius}. By (i) there exists a ball of radius $r$ containing $\gtrsim t$ input points, so we just need to argue that $r\leq O(r_{opt})$. Assume towards contradiction that $r_{opt}<r/4$, and hence there exists a subset $D\subseteq S$ of $t$ input points which are contained in a ball of radius $r/4$. Observe that a ball radius $r/2$ around any point in $D$ contains all of $D$, and therefore $L(r/2)\geq t$, contradicting (ii).
So we only need to compute a radius $r$ satisfying properties (i) and (ii) above. However, the function $L$ has high sensitivity, and hence it is not clear how to privately estimate $L(r)$ for a given radius $r$.
To see why $L$ has high sensitivity, consider a set $S$ consisting of the unit vector $\vec{e_1}$ along with $t/2$ copies of the zero vector and $t/2$ copies of the vector $2\cdot \vec{e_1}$. So, a ball of radius $1$ around $\vec{e_1}$ contains all of the points, and $L(1)=t$. However, if we were to switch the vector $\vec{e_1}$ to $2\cdot\vec{e_1}$, then the ball around $\vec{e_1}$ is no longer valid (since we only consider balls centered around input points), and every existing ball of radius $1$ contains at most $t/2$ point. So the sensitivity of the function $L$ is $\Omega(t)$.
In order to reduce the sensitivity of $L$ we now redefine it using averaging (a related idea was also used in~\cite{NRS07}). For $r\geq0$ redefine $L$ as
$$L(r)=\frac{1}{t} \max\limits_{\text{distinct}~i_1,\ldots,i_t\in [n]}\left\{ \bar{\BBB}_r(x_{i_1})+\ldots+\bar{\BBB}_r(x_{i_t})\right\}.$$
That is, to compute $L(r)$ we construct a ball of radius $r$ around every input point, count the number of points contained in every such ball (counts are capped at $t$), and compute the average of the $t$ biggest counts.
To see that the redefined function $L(r)$ has low sensitivity, consider a set of $n$ input points and a ball of radius $r$ around every input point. Adding a new input point can increase by at most 1 the number of points contained within every existing ball. In addition, we now have a new ball centered around the new input point, and as we cap counts at $t$, we count at most $t$ points in this ball. Overall, adding the new input point can increase $L(r)$ by at most $t\cdot \frac{1}{t}+\frac{t}{t}=2$. The function $L(r)$ has therefore sensitivity $O(1)$.
Utility wise, we are still searching for an $r$ s.t.
$$(i)\;\; L(r) \gtrsim t \qquad\text{ and }\qquad (ii)\;\;L(r/2) < t.$$
Again, such an $r$ is useful since, by (i), there exists a ball of radius $r$ containing $\gtrsim t$ input points, and by (ii) we have that $r\leq4 r_{opt}$: Otherwise (if $r_{opt}<r/4$) there exists a subset $D\subseteq S$ of $t$ points which are contained in a ball of radius $r/4$. A ball of radius $r/2$ around {\em every} point in $D$ contains all of $D$ and therefore there are $t$ balls of radius $r/2$ containing $t$ points. Hence, $L(r/2)\geq t$, contradicting (ii).
So, the function $L$ has low sensitivity, and we are searching for an $r$ s.t.\ $L(r)\gtrsim t$ and $L(r/2)<t$. This can easily be done privately using binary search with noisy estimates of $L$ for the comparisons, but as there are (roughly) $\log(\sqrt{d}|X|)$ comparisons such a binary search would only yield a radius $r$ s.t. $L(r)\gtrsim t-\log(\sqrt{d}|X|)$.\footnote{Alternatively, an $r$ s.t.\ $L(r)\gtrsim t$ and $L(r/2)<t$ could be privately computed using the sparse vector technique, which also yields a radius $r$ s.t. $L(r)\gtrsim t-\log(\sqrt{d}|X|)$.} In Section~\ref{sec:GoodRadiusAnalysis} we will use a tool from~\cite{BNS13b} (recursion on binary search) to improve the guarantee to $L(r)\gtrsim t-9^{\log^*(\sqrt{d}|X|)}$.
\begin{lemma}[Algorithm \texttt{GoodRadius}]
Let $S\in(X^d)^n$ be a database containing $n$ points from $X^d$ and let $t,\beta,\epsilon,\delta$ be parameters.
There exists a $\poly(n,d,\log|X|)$-time $(\epsilon,\delta)$-differentially private algorithm that on input $S$ outputs a radius $r\in\R$ s.t.\ with probability at least $(1-\beta)$:
\begin{enumerate}
\item There is a ball in $X^d$ of radius $r$ containing at least $t-O\left( \frac{1}{\epsilon} \log(\frac{1}{\beta\delta}) \cdot 9^{\log^*(|X|\cdot d)} \right)$ input points.
\item Let $r_{\mbox{opt}}$ denote the radius of the smallest ball in $X^d$ containing at least $t$ points from $S$. Then $r\leq 4\cdot r_{\mbox{opt}}$.
\end{enumerate}
\end{lemma}
\subsection{Locating a cluster: algorithm GoodCenter}
Let $r$ be the outcome of Algorithm \texttt{GoodRadius} (so $r=O(r_{opt})$ and there exists a ball of radius $r$ containing $\gtrsim t$ input points).
Given the radius $r$, our next task is to locate, with differential privacy, a small ball in $\R^d$ containing $\gtrsim t$ input points.
We begin by examining two intuitive (but unsuccessful) suggestions for achieving this goal.
\paragraph{First Attempt.} One of the first ideas for using the given radius $r$ in order to locate a small ball is the following: Divide each axis into intervals of length $\approx r$, identify (for every axis) a ``heavy'' interval containing lots of input points, and return the resulting axis-aligned box. Such a ``heavy'' interval could be privately identified (on every axis) using known stability-based techniques~\cite{DworkLei, Adist, BNS13b}.
The main problem with our first attempt is that the resulting box might be empty. This is illustrated in Figure~\ref{fig:attempt1}, where a ``heavy'' interval is identified on each axis s.t.\ their intersection is empty.
\begin{figure*}[t]
\begin{center}
\begin{tikzpicture}[xscale=1,yscale=1,show background rectangle,inner frame sep=10pt]
\draw [<->] (0,2.8) -- (0,0) -- (10,0);
\draw [|-|] (0,0) -- (0,0.75);
\draw [-|] (0,0.75) -- (0,1.5);
\draw [-|] (0,1.5) -- (0,2.25);
\draw [-,dashed] (0,1.5) -- (9.5,1.5);
\draw [-,dashed] (0,2.25) -- (9.5,2.25);
\draw [-,line width=0.5mm] (0,1.5) -- (0,2.25);
\draw [|-|] (0,0) -- (0.75,0);
\draw [-|] (0.75,0) -- (1.5,0);
\draw [-|] (1.5,0) -- (2.25,0);
\draw [-|] (2.25,0) -- (3,0);
\draw [-|] (3,0) -- (3.75,0);
\draw [-|] (3.75,0) -- (4.5,0);
\draw [-|] (4.5,0) -- (5.25,0);
\draw [-|] (5.25,0) -- (6,0);
\draw [-|] (6,0) -- (6.75,0);
\draw [-|] (6.75,0) -- (7.5,0);
\draw [-|] (7.5,0) -- (8.25,0);
\draw [-|] (8.25,0) -- (9,0);
\draw [-,dashed] (8.25,0) -- (8.25,2.5);
\draw [-,dashed] (9,0) -- (9,2.5);
\draw [-,line width=0.5mm] (8.25,0) -- (9,0);
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (0.7,1.9) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (1,1.9) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (1.2,1.9) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (1.6,1.9) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (1.8,1.9) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (2,1.9) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (8.6,0.2) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (8.6,0.4) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (8.6,0.6) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (8.6,0.9) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (8.6,1.1) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (8.6,1.3) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (3.2,0.15) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (3.3,0.3) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (3.15,0.4) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (3.5,0.36) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (3.6,0.6) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (3.4,0.72) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (3.35,0.5) {};
\end{tikzpicture}
\end{center}
\vspace{-15px}\caption{\small An illustration of ``heavy'' intervals s.t.\ their intersection is empty. \label{fig:attempt1}}
\end{figure*}
\paragraph{Second Attempt.} The failure point of our first strategy was the attempt to locate the cluster in an axis by axis manner. Trying to avoid that pitfall, consider the following idea for identifying a ``heavy'' {\em box} in $\R^d$:
Let us denote by $P\subseteq S$ the guaranteed set of $\gtrsim t$ input points which are contained in a ball of radius $r$ in $\R^d$.
Observe that the set $P$ is of diameter $2r$, and divide each axis into {\em randomly shifted} intervals of length $\approx 4 d r$. For every axis we have that the projection of $P$ onto that axis is contained within one interval w.p.\ $\gtrsim 1-1/(2d)$, and using the union bound, this is the case for all axes simultaneously w.p.\ $\gtrsim 1/2$. That is, without looking at the data, we have partitioned $\R^d$ into disjoint boxes of side length $\approx 4dr$ s.t.\ at least one of them contains $\gtrsim t$ input points, and such a ``heavy'' box can be privately identified using known stability-based techniques. While the resulting box is indeed ``heavy'', it is of side-length $\approx dr$ (i.e., of diameter $\approx d^{1.5} r$), which is not what we are looking for.
\paragraph{Towards a Solution.} Assume (for now) that we have privately identified a (concisely described) subset $X'$ of $X$ such that $S'=S\cap X'$ has $\gtrsim t$ points and is contained in a ball of radius $r$. Our current goal is, therefore, to identify a small ball enclosing all of $S'$. One option (which still does not preserve privacy, but has potential) it the following: Compute the average $c$ of the points in $S'$ and return a ball of radius $r$ around $c$. This option has merit since computing the average of input points can be made private by adding random noise to every coordinate, with magnitude proportional to the diameter of our subset $S'$ divided by its size $|S'|\gtrsim t$ (the intuition is that random noise of that magnitude masks any possible change limited to one input element, see Theorem~\ref{thm:gauss}). In our case, we would like to use $r$ (the diameter of $S'$) as such a bound, and hence obtain a ball of radius (roughly) $2r$. However, all of our discussion above only holds with high probability, say with probability $1-\beta$. In particular, the diameter of $S'$ is only bounded with probability $1-\beta$. In order for the privacy analysis to go through, we need this bound to hold with probability at least $1-\delta$, i.e., set $\beta=\delta$. Since $\delta$ is typically a negligible function of $n$, and since our running time depends on $1/\beta$, this is unacceptable.
As we next explain, our first (failed) attempt comes in handy for bounding the necessary noise magnitude. For the intuition, recall that our first attempt failed because we were misled by points outside the small cluster. By limiting our attention only to points in $S'$ (which are clustered), this is no longer an issue.
Assume that the set $S'$ contains $\gtrsim t$ points and that its diameter is $r$, and consider the following procedure: Partition every axis of $\R^d$ into intervals of length $r$. On every axis, at least one such interval contains (the projection of) $\gtrsim t/2$ points, and we can find such a ``heavy'' interval $I$ using known stability-based techniques. Afterwards, we can extend its length by $r$ to the left and to the right to obtain an interval $\hat{I}$ of length $3r$ containing all of $S'$. See Figure~\ref{fig:containing-int} for an illustration. So, on every axis we identified an interval of length $3r$ containing {\em all} of the points in $S'$. Hence, the intersection of all those intervals is a box $B$ of diameter $\approx \sqrt{d}r$ containing all of $S'$.
\begin{figure*}[t]
\begin{center}
\begin{tikzpicture}[xscale=1,yscale=1,show background rectangle,inner frame sep=10pt]
\draw [<->] (0,2) -- (0,0) -- (10,0);
\draw [|-|] (0,0) -- (0.75,0);
\draw [-|] (0.75,0) -- (1.5,0);
\draw [-|] (1.5,0) -- (2.25,0);
\draw [-|] (2.25,0) -- (3,0);
\draw [-|] (3,0) -- (3.75,0);
\draw [-|] (3.75,0) -- (4.5,0);
\draw [-|] (4.5,0) -- (5.25,0);
\draw [-|] (5.25,0) -- (6,0);
\draw [-|] (6,0) -- (6.75,0);
\draw [-|] (6.75,0) -- (7.5,0);
\draw [-|] (7.5,0) -- (8.25,0);
\draw [-|] (8.25,0) -- (9,0);
\draw [-,line width=0.5mm] (3.75,0) -- (4.5,0);
\node at (4.1,0.3) {$I$};
\node[xscale=7,yscale=1.25,rotate=90] at (4.115,-0.4) {$\{$};
\node at (4.1,-0.85) {$\hat{I}$};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (3.5,0.85) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (3.6,1) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (3.45,1.1) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (3.8,1.06) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (3.9,1.3) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (3.7,1.42) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (3.65,1.2) {};
\node[fill,circle,inner sep=0pt,minimum size=3pt] (a1) at (4.05,1.1) {};
\end{tikzpicture}
\end{center}
\vspace{-15px}
\caption{\small An illustration of an interval $I$ of containing some of the points of $S'$, and the corresponding interval $\hat{I}$ of length $3|I|$ containing all of $S'$ (since $S'$ is of diameter $r=|I|$). \label{fig:containing-int}}
\end{figure*}
The thing that works in our favor here is that the above procedure {\em always} returns a box $B$ of diameter $\approx \sqrt{d}r$, even if our assumptions on the set $S'$ are invalid (in which case the box $B$ might be empty, but its diameter is the same). Now consider the set $\tilde{S}$ where we truncate all points in $S'$ to lie in $B$. Observe that (w.h.p.) we have that $S'\subseteq B$ and $\tilde{S}=S'$, and that, in any case, the diameter of $\tilde{S}$ is at most $\approx \sqrt{d}r$. We can therefore privately release the noisy average of the points in $\tilde{S}$.
Assuming that $|S'|$ is big enough, the incurred noise is of magnitude $\lesssim r$, which results in a ball of radius $O(r)$ containing all of $S'$.
To summarize, it suffices to privately ``ignore'' all input points but $\gtrsim t$ points falling in some ball of radius $\approx r$.
\paragraph{Final Step.} Our final task is to identify a subset $S'\subseteq S$ of $\approx t$ input elements that are contained in a ball of radius roughly $r$.
Using the Johnson-Lindenstrauss transform we project our input points onto $\R^k$, where $k\approx\log(n)$ (w.h.p.\ point distances are preserved up to a constant factor). We denote the projection of a point $x\in \R^d$ as $f(x)\in \R^k$.
By the properties of the JL-transform, it suffices to identify a part of the input $S'\subseteq S$ s.t.\ its projection
$f(S'):=\{f(x) : x\in S' \}$ is contained within a ball of radius $\approx r$ in $\R^k$.
As we next explain, our second (unsuccessful) attempt could be used to identify such a subset $S'\subseteq S$. The intuition is that our second attempt incurred an unacceptable error factor of $\poly(d)$ in the cluster radius when locating the ball in $\R^d$, and this error factor is mitigated by locating the ball in the lower-dimensional space $\R^k$ (where $k=O(\log n)$).
As above, let $P\subseteq S$ be the guaranteed set of $\gtrsim t$ input points contained within a ball of radius $r$ in $\R^d$.
Note that (w.h.p.) the set $f(P):=\{f(x) : x\in P \}$ is contained within a ball of radius $\lesssim r$ in $\R^k$, and assume that this is the case. Partition every axis $i$ of $\R^k$ into randomly shifted intervals ${\cal I}_i=\{I^i_j\}_{j\in\Z}$ of length $\approx 4r$.
On every axis $i$, with probability $\gtrsim 1/2$ the projection of $f(P)$ on the $i^\text{th}$ axis is completely contained within one interval in ${\cal I}_i$. With probability $\gtrsim 0.5^k=1/\poly(n)$, this is the case for all of the $k$ axes simultaneously, and $f(P)$ is completely contained within an axis aligned box whose projection onto every axis $i$ of $\R^k$ is in ${\cal I}_i$. In other words, we have partitioned $\R^k$ into disjoint $k$-dimensional axis aligned boxes of side-length $\approx 4r$ s.t.\ with noticeable probability (we will later use repetitions to amplify this probability, and use the sparse vector technique to privately choose one of the repetitions) at least one of them contains $\gtrsim t$ (projected) input points. Such a ``heavy'' rectangle $B$ could be privately identified using stability based techniques (its diameter is $\approx r\sqrt{k}\approx r\sqrt{\log n}$). Finally, we define the set $S'=\{x\in S : f(x)\in B\}$ as the set of points that are mapped (by the JL transform) into the rectangle $B$. We now have that $S'$ contains $\gtrsim t$ input elements, since the box $B$ is ``heavy'' in $\R^k$, and the diameter $S'$ is $\lesssim r\sqrt{\log n}$, since that is the diameter of $B=f(S')$.
The complete construction appears in Algorithm \texttt{GoodCenter} (algorithm~\ref{alg:GoodCenter}).
\begin{lemma}[Algorithm \texttt{GoodCenter}]
Let $S\in(\R^d)^n$ be a database containing $n$ points in $\R^d$, and let $r,t,\beta,\epsilon,\delta$ be parameters s.t.\
$t\geq O\left(\frac{\sqrt{d}}{\epsilon}\log(\frac{1}{\beta})\log(\frac{nd}{\beta\epsilon\delta})\sqrt{\log(\frac{1}{\beta\delta})}\right)$.
There exists a $\poly(n,d,1/\beta)$-time $(\epsilon,\delta)$-differentially private algorithm that on input $S,r,t$ outputs a point $z\in \R^d$ s.t.\ the following holds.
If there exists a ball of radius $r$ in $\R^d$ containing at least $t$ points from $S$,
then with probability at least $1-\beta$, the ball of radius $O\left( r \sqrt{\log n}\right)$ around $z$ contains at least $t-O\left(\frac{1}{\epsilon}\log(\frac{1}{\beta})\log(\frac{n}{\beta\epsilon\delta})\right)$ of the points in $S$.
\end{lemma}
\section{Details of analysis}\label{sec:details}
\subsection{Algorithm GoodRadius}\label{sec:GoodRadiusAnalysis}
As we explained in Section~\ref{sec:GoodRadiusWarmup}, it is possible to compute an approximation for the optimal radius using a binary search on a carefully chosen low sensitivity function.
We use the following tool from~\cite{BNS13b} in order to reduce the sample cost of that binary search.
\begin{definition}
A function $Q(\cdot)$ over a totally ordered domain is {\em quasi-concave} if for every $i\leq \ell \leq j$ we have $Q(\ell)\geq \min\{Q(i),Q(j)\}$.
\end{definition}
\begin{definition}[\cite{BNS13b}]
A {\em Quasi-Concave Promise Problem} consists of an ordered set $F$ of possible solutions, a database $S\in U^n$, a sensitivity-1 quality function $Q:U^n\times F \rightarrow\R$, an approximation parameter $\alpha$, and another parameter $p$ (called a {\em quality promise}).
If $Q(S,\cdot)$ is quasi-concave and if there exists a solution $f\in F$ for which $Q(S,f)\geq p$ then a good output for the problem is a solution $g\in F$ satisfying $Q(S,g)\geq(1-\alpha)p$. The outcome is not restricted otherwise.
\end{definition}
We will use Algorithm \texttt{RecConcave} from~\cite{BNS13b} to solve quasi-concave promise problems while preserving differential privacy:
\begin{theorem}[Algorithm \texttt{RecConcave}~\cite{BNS13b}]\label{thm:rec}
Let $U$ be a domain, let $F$ be a totally ordered (finite) set of solutions, and let $Q:U^n\times F \rightarrow\R$ be a sensitivity-1 quality function.
Let $\alpha,\beta,\epsilon,\delta$ be parameters. There exists an $(\epsilon,\delta)$-differentially private algorithm s.t.\ the following holds. On input a database $S$ and a quality promise $p$ for which $Q(S,\cdot)$ is quasi-concave and
$$\max_{f\in F}\{Q(S,f)\}\geq p \geq 8^{\log^*|F|} \cdot \frac{36 \log^*|F|}{\alpha\epsilon} \log\Big(\frac{12\log^*|F|}{\beta\delta}\Big),$$
the algorithm outputs a solution $f\in F$ s.t.\ $Q(S,f)\geq(1-\alpha)p$ with probability at least $(1-\beta)$.
\end{theorem}
\begin{remark}
The computational efficiency of algorithm \texttt{RecConcave} depends on the quality function $Q$. It can be made efficient in cases where for every database $S\in U^n$, the totally ordered set of solutions $F$ can be partitions into $k=\poly(n)$ intervals of sequential solutions $F_1,F_2,\dots,F_k$ s.t.\ for every $i$ and for every $f,f'\in F_i$ we have $Q(S,f)=Q(S,f')$. In such cases, the algorithm runs in time $\poly(n,\log|F|)$, assuming that the partition of $F$, and that evaluating $Q$, can be done in time $\poly(n,\log|F|)$.
\end{remark}
\begin{algorithm*}[t]
\caption{\texttt{GoodRadius}}\label{alg:GoodRadius}
\begin{enumerate}[rightmargin=10pt,itemsep=1pt]
\item[] {\bf Input:} Database $S \in (X^d)^n$, desired ball volume $t$, failure probability bound $\beta$, and privacy parameters $\epsilon,\delta$.
\item[] {\bf Algorithm used:} Algorithm \texttt{RecConcave} for privately solving quasi-concave problems. We denote the minimal quality promise needed for algorithm \texttt{RecConcave} (for our choice of parameters) as $\Gamma=8^{\log^*(2|X|\sqrt{d})} \cdot \frac{144 \log^*(2|X|\sqrt{d})}{\epsilon} \log\Big(\frac{24\log^*(2|X|\sqrt{d})}{\beta\delta}\Big)$.
\item[] {\bf Notation:} For $x\in X^d$ and $0\leq r\in\R$ let $\BBB_r(x,S)$ denote the number of input points contained in a ball of radius $r$ around $x$. For $r<0$, let $\BBB_r(x,S)=0$. Let $\bar{\BBB}_r(x,S)=\min\{\BBB_r(x,S),t\}$.
\item For $r\in\R$ define $L(r,S)=\frac{1}{t} \max\limits_{\text{distinct}~i_1,\ldots,i_t\in [n]}\left( \bar{\BBB}_r(x_{i_1},S)+\ldots+\bar{\BBB}_r(x_{i_t},S)\right).$
\begin{enumerate}[label=\gray{\%},topsep=-10pt]
\item \gray{
That is, for every input point $x\in S$ we count the number of input points contained in a ball of radius $r$ around $x$, capped at $t$. We define $L(r,S)$ as the average of the $t$ largest counts.}
\item \gray{
Note that $L(\cdot,S)$ is a non-decreasing function.}
\end{enumerate}
\item\label{step:zerocluster} Let $\tilde{L}(0,S)=L(0,S)+\Lap(4/\epsilon)$. If $\tilde{L}(0,S)>t-2\Gamma-\frac{4}{\epsilon}\ln(2/\beta)$, then halt and return $z=0$.
\begin{enumerate}[label=\gray{\%},topsep=-10pt]
\item \gray{
Step~\ref{step:zerocluster} handles the case where there exists a cluster of radius zero containing $\gtrsim t$ of the input points.}
\end{enumerate}
\item Define the quality function $Q(r,S)=\frac{1}{2}\min\left\{ t-L\left(r/2,S\right), \; L(r,S)-t+4\Gamma \right\}.$
\item\label{step:applyconcave} Apply algorithm \texttt{RecConcave} with privacy parameters $(\frac{\epsilon}{2},\delta)$, utility parameters $(\alpha{=}\frac{1}{2},\frac{\beta}{2})$, quality function $Q$, and quality promise $\Gamma$ to choose and return $z\in\left\{0,\frac{1}{2|X|},\frac{2}{2|X|},\frac{3}{2|X|},\ldots,\left\lceil \sqrt{d} \right\rceil\right\}$.
\begin{enumerate} [label=\gray{\%},topsep=-10pt]
\item \gray{
For simplicity, we identify $X^d$ with the real $d$-dimensional unit cube, quantized with grid step $1/(|X|-1)$. Our results trivially extend to domains with grids steps $\ell$ by choosing the output out of $\left\{0,\frac{\ell}{2},\frac{2\ell}{2},\frac{3\ell}{2},\ldots,\left\lceil |X|\ell\sqrt{d} \right\rceil\right\}$.}
\end{enumerate}
\end{enumerate}
\end{algorithm*}
We now proceed with the privacy analysis of algorithm \texttt{GoodRadius}.
\begin{lemma}\label{lem:GoodRadiusPrivacy}
Algorithm \texttt{GoodRadius} preserves $(\epsilon,\delta)$-differential privacy.
\end{lemma}
\begin{proof}
Algorithm \texttt{GoodRadius} interacts with its input database in step~\ref{step:zerocluster} using the Laplace mechanism and in step~\ref{step:applyconcave} using algorithm \texttt{RecConcave}.
In order to show that those two interactions preserve privacy, we will now argue that $L(r,\cdot)$ is of sensitivity 2 (for every fixed $r$). To see why this is intuitively correct, consider a set of $n$ input points and a ball of radius $r$ around every input point. Adding a new input point can increase by at most 1 the number of points contained within every such ball. In addition, we now have a new ball centered around the new input point, and as we cap counts at $t$, we count at most $t$ points in this ball. Overall, adding the new input point can increase $L(r,\cdot)$ by at most $t\cdot \frac{1}{t}+\frac{t}{t}=2$.
More formally, let $S,S'$ be two neighboring databases and assume that $S'=S\setminus\{y\}\cup\{y'\}$ and that $S=S'\setminus\{y'\}\cup\{y\}$.
We have that
\begin{eqnarray*}
L(r,S) &=& \max\limits_{\substack{\text{distinct}\\x_1,\ldots,x_t\in S}}\frac{1}{t}\sum_{i=1}^t \bar{\BBB}_r(x_i,S)\\
&\leq&\hspace{-20px} \max\limits_{\substack{\text{distinct}\\ x_1,\ldots,x_{t-1}\in S\setminus\{y\} }}\frac{1}{t}\left(t+\sum_{i=1}^{t-1} \bar{\BBB}_r(x_i,S)\right)\\
&=&\hspace{-20px} \max\limits_{\substack{\text{distinct}\\ x_1,\ldots,x_{t-1}\in S'\setminus\{y'\} }}\frac{1}{t}\left(t+\sum_{i=1}^{t-1} \bar{\BBB}_r(x_i,S)\right)\\
&\leq&\hspace{-20px} \max\limits_{\substack{\text{distinct}\\ x_1,\ldots,x_{t-1}\in S'\setminus\{y'\} }}\frac{1}{t}\left(t+\sum_{i=1}^{t-1} [\bar{\BBB}_r(x_i,S')+1]\right)\\
&\leq&\hspace{-10px} \max\limits_{\substack{\text{distinct}\\ x_1,\ldots,x_{t-1}\in S' }}\frac{1}{t}\left(t+\sum_{i=1}^{t-1} [\bar{\BBB}_r(x_i,S')+1]\right)\\
&\leq& L(r,S')+2.
\end{eqnarray*}
Similarly, $L(S,r)\geq L(S',r)-2$, and $L(r,\cdot)$ is of sensitivity 2. Hence, the use of the laplace mechanism on step~\ref{step:zerocluster} preserves $(\frac{\epsilon}{2},0)$-differential privacy. Moreover, $\frac{1}{2}L(r,\cdot)$ is of sensitivity 1, and, therefore, $Q(r,\cdot)$ is of sensitivity 1 (defined as the minimum of two sensitivity 1 expressions). The application of algorithm \texttt{RecConcave} preserves $(\frac{\epsilon}{2},\delta)$-differential privacy. Overall, algorithm \texttt{GoodRadius} is $(\epsilon,\delta)$-differentially private by Composition Theorem~\ref{thm:composition1}.
\end{proof}
We now turn to proving the correctness of algorithm \texttt{GoodRadius}.
\begin{lemma}\label{lem:GoodRadiusUtility}
Let \texttt{GoodRadius} be executed on a database $S$ containing $n$ points in $X^d$ and on parameters $t,\beta,\epsilon,\delta$, and let $\Gamma$ be as defined in algorithm \texttt{GoodRadius}.
With probability at least $(1-\beta)$, the output $z$ satisfies: (1)~There exists a ball in $X^d$ of radius $z$ containing at least $(t-4\Gamma-\frac{4}{\epsilon}\ln(1/\beta))$ input points from $S$.
(2)~Let $r_{\mbox{opt}}$ denote the radius of the smallest ball in $X^d$ containing at least $t$ input points from $S$. Then $z\leq 4 r_{\mbox{opt}}$.
\end{lemma}
\begin{proof}
Note that if $L(0,S)\geq t-2\Gamma$, then \texttt{GoodRadius} fails to output $z=0$ in step~\ref{step:zerocluster} with probability at most $\beta/2$. We continue the proof assuming that $L(0,S)< t-2\Gamma$.
We now argue that algorithm \texttt{RecConcave} returns (w.h.p.) a value $z$ s.t. $Q(z,S)$ is significant. We need to show that $Q(\cdot,S)$ is quasi-concave, and that there exists an $r$ s.t.\ $Q(r,S)\geq\Gamma$. To see that $Q(\cdot,S)$ is quasi-concave, note that $L(\cdot,S)$ is non-decreasing (as a function of $r$), and that, hence, for every $r_1<r_2<r_3$
\begin{eqnarray*}
Q(r_2,S)&=&\min\left\{ \frac{t-L(r_2/2,S)}{2}, \frac{L(r_2,S)-t+4\Gamma}{2} \right\}\\
&\geq&\min\left\{ \frac{t-L(r_3/2,S)}{2}, \frac{L(r_1,S)-t+4\Gamma}{2}\right\}\\
&\geq& \min\left\{ Q(r_3,S), Q(r_1,S) \right\}.
\end{eqnarray*}
To see that there exists an $r$ s.t. $Q(r,S)\geq\Gamma$,
recall that $L(0,S)=L\left(\frac{1}{2|X|},S\right)<t-2\Gamma$, and note that $L(\sqrt{d},S)=n\geq t$. Now consider the smallest
$r\in\left\{0,\frac{1}{2|X|},\frac{2}{2|X|},\frac{3}{2|X|},\ldots,\left\lceil \sqrt{d} \right\rceil\right\}$
s.t.\ $L(r,S)\geq t-2\Gamma$. For that $r$ it holds that $$Q(r,S)=\frac{1}{2}\min\{ t-L(r/2,S), \; L(r,S)-t+4\Gamma \}\geq \frac{1}{2}\min\{ 2\Gamma, \; 2\Gamma \}=\Gamma.$$
By the properties of algorithm \texttt{RecConcave}, with probability at least $(1-\beta/2)$ the output $z$ is s.t.\ $Q(z,S)\geq\frac{\Gamma}{2}$. Hence, by the definition of $Q$ we have that
$$\text{(a)}~L(z,S)\geq t-4\Gamma\quad\text{and}\quad\text{(b)}~L(z/2,S)\leq t-\frac{\Gamma}{2}.$$
Recall that $L(z,S)$ averages $\bar B_z(x,S)$ over $t$ points $x\in S$. Hence, by (a), there exists a ball of radius $z$ in $X^d$ that contains at least $t-4\Gamma$ input points from $S$.
Let $P\subseteq S$ be a set of $t$ input points, and assume towards contradiction that there is a ball of radius $z/4$ in $X^d$ that contains all of the points in $P$. Now note that a ball of radius $z/2$ around every point in $P$ contains all of the points in $P$. Hence, $L(z/2,S)\geq t$. This contradicts (b).
We conclude that Algorithm \texttt{GoodRadius} returns a good radius with probability at least $1-\beta$.
\end{proof}
\subsection{Additional preliminaries}
Before formally presenting algorithm \texttt{GoodCenter}, we introduce several additional tools.
\subsubsection{Composition theorems}
Recall that the privacy guaranties in composition theorem~\ref{thm:composition1}
deteriorates linearly with the number of interactions. By bounding the \emph{expected} privacy loss in each interaction (as opposed to worst-case), Dwork et al.~\cite{DRV10} showed the following stronger composition theorem, where privacy deteriorates (roughly) as $\sqrt{k}\epsilon+k\epsilon^2$ (rather than $k\epsilon$).
\begin{theorem}[\cite{DRV10}]\label{thm:composition2}
Let $\eps,\delta,\delta'>0$. A mechanism that permits $k$ adaptive interactions with $(\epsilon,\delta)$-differentially private mechanisms (and does not access the database otherwise) is $(\epsilon', k\delta+\delta')$-differentially private, for $\epsilon'=2k\epsilon^2+\epsilon\sqrt{2k\ln(1/\delta')}$.
\end{theorem}
\subsubsection{The sparse vector technique~\cite{DNRRV09}}\label{sec:sparseVector}
Consider a large number of low sensitivity functions $f_1,$ $f_2,\ldots, f_k$, which are given (one by one) to a data curator (holding a database $S$). Given a dataset $S$, Algorithm \texttt{AboveThreshold} by Dwork et al.~\cite{DNRRV09} identifies the queries $f_i$ whose value $f_i(S)$ is greater than some threshold $t$:
\begin{theorem}[Algorithm \texttt{AboveThreshold}]\label{thm:AboveThreshold}
There exists an $(\epsilon,0)$-differentially private algorithm $\cal A$ such that for $k$ rounds, after receiving a sensitivity-1 query $f_i:U^*\rightarrow\R$, algorithm $\cal A$ either outputs $\top$ and halts, or outputs $\bot$ and waits for the next round.
If $\cal A$ was executed with a database $S\in U^*$ and a threshold parameter $t$, then the following holds with probability $(1-\beta)$:
(i) If a query $f_i$ was answered by $\top$ then $f_i(S)\geq t-\frac{8}{\epsilon}\log(2k/\beta)$;
(ii) If a query $f_i$ was answered by $\bot$ then $f_i(S)\leq t+\frac{8}{\epsilon}\log(2k/\beta)$.
\end{theorem}
\subsubsection{Geometric tools}
We will use the following technical lemma to argue that if a set of points $P$ is contained within a ball of radius $r$ in $\R^d$, then by randomly rotating the Euclidean space we get that (w.h.p.) $P$ is contained within an axis-aligned rectangle with side-length $\approx r/\sqrt{d}$.
\begin{lemma}[e.g.,~\cite{VaziraniRao}]\label{lem:RandomRotation}
Let $P \in (\R^d)^m$ be a set of $m$ points in the $d$ dimensional Euclidean space, and let $Z=(z_1,\ldots,z_d)$ be a random orthonormal basis for $\R^d$. Then,
$$\Pr_Z \left[\forall x,y \in P:\; \forall 1\leq i\leq d: \; \left| \langle x-y, z_i\rangle\right| \leq 2\sqrt{\ln(dm/\beta)/d}\cdot \|x-y\|_2\right]\geq1-\beta.$$
\end{lemma}
We will use the Johnson Lindenstrauss transform to embed a set of points $S\in \R^d$ in $\R^k, k\ll d$ while preserving point distances.
\begin{lemma}[JL transform~\cite{JL84}]\label{thm:JL}
Let $S\subseteq\R^d$ be a set of $n$ points, and let $\eta\in(0,1/2)$. Let $A$ be a $k\times d$ matrix whose entries are iid samples from $\mathcal{N}(0,1)$, and define $f:\R^d\rightarrow\R^k$ as $f(x)=\frac{1}{\sqrt{k}}Ax$. Then,
$$
\Pr_A \left[
\begin{array}{l}
\forall x,y \in S \text{ it holds that: }\\
(1-\eta)\|x-y\|_2^2 \leq \|f(x)-f(y)\|_2^2 \leq (1+\eta)\|x-y\|_2^2
\end{array}
\right]\geq 1 - 2n^2\exp\left(-\frac{\eta^2 k}{8}\right).
$$
\end{lemma}
\subsection{Algorithm GoodCenter}\label{sec:GoodCenterAnalysis}
Given the outcome of Algorithm \texttt{GoodRadius}, we now show that algorithm \texttt{GoodCenter} privately locates a small ball containing $\gtrsim t$ points. We start with its privacy analysis.
\begin{lemma}\label{lem:GoodCenterPrivacy}
Algorithm \texttt{GoodCenter} preserves $(\epsilon,\delta)$-differential privacy.
\end{lemma}
\begin{proof}
Algorithm \texttt{GoodCenter} interacts with its input database on steps~\ref{step:abovethreshold},~\ref{step:abovethreshold_1},~\ref{step:choosing},~\ref{step:choosing_1},~\ref{step:output_z}.
Steps~\ref{step:abovethreshold},~\ref{step:abovethreshold_1} initialize and use Algorithm \texttt{AboveThreshold}, which is $(\frac{\epsilon}{4},0)$-differentially private.
Step~\ref{step:choosing} invokes the algorithm from Theorem~\ref{thm:sanPoints} (to choose a ``heavy'' box $B$), which is $(\frac{\epsilon}{4},\frac{\delta}{4})$-private.
Step~\ref{step:choosing_1} makes $d$ applications of the algorithm from Theorem~\ref{thm:sanPoints}. By theorem~\ref{thm:composition2} (composition), this preserves $(\frac{\epsilon}{4},\frac{\delta}{4})$-differential privacy.
Step~\ref{step:output_z} invokes the Gaussian mechanism, which is $(\frac{\epsilon}{4},\frac{\delta}{4})$-private.
Overall, \texttt{GoodCenter} is $(\epsilon,\delta)$-differentially private by composition.
\end{proof}
We now proceed with the utility analysis of algorithm \texttt{GoodCenter}.
\begin{lemma}\label{lem:GoodCenterUtility}
Let \texttt{GoodCenter} be executed on a database $S$ containing $n$ points in $\R^d$ with $r,t,\beta,\epsilon,\delta$ s.t.
$$t\geq O\left(\frac{\sqrt{d}}{\epsilon}\log\left(\frac{nd}{\beta\delta}\right)\sqrt{\log(\frac{1}{\delta})}\right).$$
If there exists a ball of radius $r$ in $\R^d$ containing at least $t$ points from $S$,
then with probability at least $1-\beta$, the output $\hat{y}$ in Step~\ref{step:output_z} is s.t.\ at least $t-O\left(\frac{1}{\epsilon}\log(\frac{n}{\beta})\right)$ of the input points are contained in a ball of radius $O\left( r \sqrt{\log(\frac{n}{\beta})}\right)$ around $\hat{y}$.
\end{lemma}
\begin{remark}
The dependency in $1/\beta$ can easily be removed from the radius of the resulting ball by applying \texttt{GoodCenter} with a constant $\beta$ and amplifying the success probability using repetitions.
\end{remark}
\begin{proof}
First note that by Theorem~\ref{thm:JL} (the JL transform), with probability at least $1-\beta$, for every $x,y\in S$ it holds that $\|x-y\|$ and $\|f(x)-f(y)\|$ are similar up to a multiplicative factor of $(1\pm\frac{1}{2})$. We continue the proof assuming that this is the case. Hence, there exists a ball of radius $3r$ in $\R^k$ containing at least $t$ points from $\{f(x) : x\in S\}$. Denote this set of (at least $t$) projected points as $W$.
Clearly, the projection of the set $W$ onto any axis of $\R^k$ lies in an interval of length $3r$. Recall that on Step~3a we partition every axis into randomly shifted intervals $\{A_j^i\}$ of length $300r$. Hence, for every axis $i$ with probability $0.99$ it holds that the projection of $W$ onto the $i^\text{th}$ axis is contained within one of the $\{A_j^i\}$'s.
The probability that this holds simultaneously for all of the $k$ axes is $0.99^k\geq\frac{\beta}{2n}$.
Note that in such a case there exists a rectangle in $\{B_{\vec{j}}\}$ containing all of the points in $W$, and hence, the corresponding query $q$ (defined on step~5) satisfies $q(S)\geq t$. So, every (randomly constructed) query $q$ satisfies $q(S)\geq t$ with probability $\beta/(2n)$.
Although the iteration of steps~\ref{step:itr_begin}--\ref{step:itr_end} might be repeated less than $2n\log(1/\beta)/\beta$ times, imagine that all of the (potential) $2n\log(1/\beta)/\beta$ queries were prepared ahead of time (and some may have never issued to \texttt{AboveThreshold}). With probability at least $(1-\beta)$ at least one such query $q$ satisfies $q(S)\geq t$. We continue with the proof assuming that this is the case. Thus, by the properties of algorithm \texttt{AboveThreshold}, with probability at least $(1-\beta)$, the loop on Step~\ref{step:itr_end} ended with \texttt{AboveThreshold} returning $\top$. Moreover, in that iteration we have that $q(S)\geq t-\frac{200}{\epsilon}\log(2n/\beta)$. Thus, by the definition of $q$, after Step~\ref{step:itr_end} there exists a rectangle in $\{B_{\vec{j}}\}$ containing at least $t-\frac{200}{\epsilon}\log(2n/\beta)$ projected input elements.
By Theorem~\ref{thm:sanPoints}, with probability at least $(1-\beta)$, the box $B$ chosen on step~\ref{step:choosing} contains at least $t-\frac{216}{\epsilon}\log(\frac{2n}{\beta})$ projected input elements.
We continue the proof assuming that this is the case, and denote the set of input points from $S$ that are mapped into $B$ as $D$.
Note that $B$ is a box of diameter $300 r \sqrt{k}$. Hence, by our assumption on the projection $f$, for any $x,y\in D$ it holds that $\|x-y\|\leq 450 r \sqrt{k}$.
On Step~\ref{step:rotation} we generate a random basis $Z$ of $\R^d$. By Lemma~\ref{lem:RandomRotation}, with probability at least $1-\beta$, for every $x,y\in S$ and for every $z\in Z$ it holds that the projection of $(x-y)$ onto $z$ is of length at most $2\sqrt{\ln(\frac{d n}{\beta})/d}\cdot\|x-y\|$. Assuming that this is the case, the projection of $D$ onto any axis $z\in Z$ lies in an interval of length $p=900 r \sqrt{k \ln(\frac{d n}{\beta}) / d}$.
Therefore, when partitioning every axis $z_i\in Z$ into intervals $\III_i$ of length $p$ (on step~\ref{step:partitionP}), at least one interval $I\in\III_i$ contains at least half of the points in $D$.
Assuming that $|D|\geq\frac{40\sqrt{d}}{\epsilon}\log(\frac{6nd}{\beta\delta})\sqrt{\ln(\frac{8}{\delta})}$,
for every axis $i$ Theorem~\ref{thm:sanPoints} ensures that with probability at least $(1-\beta/d)$ the chosen interval $I_i\in\III_i$ (on step~\ref{step:choosing_1}) contains at least one input elements from $D$. Recall that the projection of $D$ onto any axis $z_i$ lies in an interval of length $p$. Hence, letting $\hat{I}_i$ be $I_i$ after extending it by $p$ on each side, we ensure that $\hat{I}_i$ contains {\em all} of the points in $D$. So, the box in $\R^d$ whose projection onto every axis $z_i$ is $\hat{I}_i$ contains all of the points in $D$. Recall that (on step~\ref{step:center_c}) we defined $C$ to be the bounding sphere of that box, and hence, $C$ contains all of $D$, and $D'=D\cap C=D$.
Let $y$ denote the average of the point in $D'=D$, and observe that a ball of radius $450r\sqrt{k}$ around $y$ contains all of the points in $D$.
The output on step~\ref{step:output_z} is computed using the Gaussian mechanism as the noisy average of the points in $D'=D$, where the noise magnitude in every coordinate is proportional to the diameter of $C$ (which is $5400r\sqrt{k\cdot\ln(\frac{dn}{\beta})}$). By the properties of the Gaussian mechanism (see appendix~\ref{sec:NoisyAVG}), with probability at least $(1-\beta)$ the output $\hat{y}$ satisfies $\hat{y}=y+\eta$, where $\eta$ is a random noise vector whose every coordinate is distributed as $\NNN(0,\sigma^2)$ for some $\sigma\leq\frac{345600r}{\epsilon|D'|}\sqrt{2k\ln(\frac{dn}{\beta})\ln(\frac{8}{\delta})}$.
Observe that $\|\eta\|_2^2$ is the sum of the squares of $d$ independent normal random variables $\eta_1,\dots,\eta_d$.
Using tail bounds for the normal distribution,
provided that $|D|\geq\frac{691200\sqrt{d}}{\epsilon}\ln(\frac{2nd}{\beta})\sqrt{\ln(\frac{8}{\delta})}$, with probability at least $(1-\beta)$ we have that every $|\eta_i|$ is at most $r\sqrt{k/d}$.
Assuming that this is the case, we get that $\|\eta\|_2\leq r\sqrt{k}$, and hence $\|\hat{y}-y\|_2\leq r\sqrt{k}$. Using the triangle inequality, we get that a ball of radius $451r\sqrt{k}$ around the output $\hat{y}$ contains all of the points in $D$, where $|D|\geq t-\frac{216}{\epsilon}\log(\frac{2n}{\beta})$.
Overall, assuming that $t\geq\frac{691416\sqrt{d}}{\epsilon}\log(\frac{6nd}{\beta\delta})\sqrt{\log(\frac{8}{\delta})}$, with probability at least $(1-8\beta)$, the output $\hat{y}$ is s.t.\ at least $t-\frac{216}{\epsilon}\log(\frac{2n}{\beta})$ of the input points are contained inside a ball of radius $451r\sqrt{k}$ around $\hat{y}$.
\end{proof}
Theorem~\ref{thm:main} now follows by combining lemmas~\ref{lem:GoodRadiusUtility}, \ref{lem:GoodRadiusPrivacy}, \ref{lem:GoodCenterPrivacy}, and~\ref{lem:GoodCenterUtility}.
\begin{algorithm*}[!htp]
\caption{\texttt{GoodCenter}}\label{alg:GoodCenter}
{\bf Input:} Database $S\in \R^d$ containing $n$ points, radius $r$, desired number of points $t$, failure probability $\beta$, and privacy parameters $\epsilon,\delta$.
\vspace{-5px}
\begin{enumerate}[leftmargin=15pt,rightmargin=10pt,itemsep=1pt]
\item Let $k=46\log(2n/\beta)$ and let $f:\R^d\rightarrow\R^k$ be a mapping as in Theorem~\ref{thm:JL} (the JL transform).
\item\label{step:abovethreshold} Instantiate algorithm \texttt{AboveThreshold} (Theorem~\ref{thm:AboveThreshold}) with database $S$, privacy parameter $\epsilon/4$, and threshold $t-\frac{100}{\epsilon}\log(2n/\beta)$.
\item\label{step:itr_begin} For every axis $1\leq i\leq k$ of $\R^k$:
\vspace{-5px}
\begin{enumerate}
\item Choose a random $a_i\in[0,300r]$.
For $j\in\Z$, let $A^i_j$ be the interval $[a_i+j\cdot 300r, \;a_i+(j+1)\cdot 300r )$.
\item[\gray{\%}] \gray{
$\{A^i_j\}_{j\in\Z}$ is a partition of the $i^\text{th}$ axis into (randomly shifted) intervals of length $300r$.
}
\end{enumerate}
\item For every $\vec{j}=(j_1,\ldots,j_k)\in\Z^k$ let $B_{\vec{j}}\subseteq\R^k$ be the box whose projection on every axis $i$ is $A^i_{j_i}$.
\item\label{step:abovethreshold_1} Issue query $q(S)=\max_{\vec{j}}|f(S)\cap B_{\vec{j}}|$ to \texttt{AboveThreshold}. Denote the received answer as $a$.
\begin{enumerate}[label=\gray{\%},topsep=-10pt]
\item \gray{
That is, $q(S)$ is the maximal number of (projected) input points that are contained within one box.
}
\end{enumerate}
\item\label{step:itr_end} If this step was reached more than $2n\log(1/\beta)/\beta$ times, then halt and fail. Otherwise, if $a=\bot$ then goto Step~\ref{step:itr_begin}.
\begin{enumerate}[label=\gray{\%},topsep=-10pt]
\item \gray{
That is, for at most $2n\log(1/\beta)/\beta$ rounds, we define a partition of $\R^k$ into disjoint rectangles $\{B_{\vec{j}}\}$, and query algorithm \texttt{AboveThreshold} to identify an iteration in which there is a rectangle in $\{B_{\vec{j}}\}$ containing $\gtrsim t$ points.
}
\end{enumerate}
\item\label{step:choosing} Use Theorem~\ref{thm:sanPoints} (stability based techniques) with privacy parameters $(\frac{\epsilon}{4},\frac{\delta}{4})$ to choose a box $B\in\{B_{\vec{j}}\}$ approximately maximizing $|f(S)\cap B|$. Denote $D=\{ x\in S \;:\; f(x)\in B \}$.
\begin{enumerate}[label=\gray{\%},topsep=-10pt]
\item \gray{
That is, $D$ is the set of input points from $S$ that are mapped into $B$ by the mapping $f$.
}
\end{enumerate}
\item\label{step:rotation} Let $Z=(z_1,\dots,z_d)$ be a random orthonormal basis of $\R^d$, and denote $p=900r\sqrt{k\ln(\frac{dn}{\beta})/d}$.
\item For each basis vector $z_i\in Z$:
\vspace{-5px}
\begin{enumerate}
\item\label{step:partitionP} Partition the axis in direction $z_i$ into intervals $\III_i=\{ [j\cdot p\;,\;(j+1)\cdot p ) \; : \; j\in\Z \}$.
\item Define the quality $q(I)$ of every $I\in\III_i$ as the number of points $x\in D$ s.t.\ their projection onto $z_i$ falls in $I$.
\vspace{-5px}
\item\label{step:choosing_1} Use Theorem~\ref{thm:sanPoints} (stability based techniques) with privacy parameters $\left(\frac{\epsilon}{10\sqrt{d \ln(8/\delta)}},\frac{\delta}{8d}\right)$ to choose an interval $I_i\in\III_i$ with large $q(\cdot)$, and let $\hat{I}_i$ denote that chosen interval after extending it by $p$ on each side (that is $\hat{I}_i$ is of length $3p$).
\end{enumerate}
\item\label{step:center_c} Let $c$ be the center of the box in $\R^{d}$ whose projection on every axis $z_i\in Z$ is $\hat{I}_i$, and let $C$ be the ball of radius $2700 r \sqrt{k\ln(\frac{dn}{\beta})}$ around $c$. Define $D'=D\cap C$.
\begin{enumerate}[label=\gray{\%},topsep=-10pt]
\item \gray{
Observe that we defined $D'=D\cap C$, even though we expect that $D\subseteq C$. This will be useful in the privacy analysis, as we now have a deterministic bound on the diameter of $D'$.
}
\end{enumerate}
\item\label{step:output_z} Use the Gaussian mechanism with privacy parameters $(\frac{\epsilon}{4},\frac{\delta}{4})$ to compute and return the noisy average of the points in $D'$ (see Appendix~\ref{sec:NoisyAVG} for details).
\end{enumerate}
\end{algorithm*}
\section{On the impossibility of solving the 1-Cluster problem on infinite domains}\label{sec:lower}
In this section we will show that solving the 1-cluster problem on infinite domains (with reasonable parameters) is impossible under differential privacy. Our lower bound is obtained through a reduction from the simple \emph{interior point problem} defined below.
\begin{definition}
An algorithm $A:X^n \to X$ solves the \emph{interior point problem} on $X$ with error probability $\beta$ if for every $D \in X^n$,
\[\Pr[\min D \le A(D) \le \max D] \ge 1 - \beta,\]
where the probability is taken over the coins of $A$. The sample complexity of the algorithm $A$ is the database size $n$.
\end{definition}
We call a solution $x$ with $\min D \le x \le \max D$ an \emph{interior point} of $D$. Note that $x$ need not be a member of the database $D$.
As was shown in~\cite{BNSV15}, privately solving the interior point problem on a domain $X$ requires sample complexity that grows with $|X|$. In particular, privately solving this problem over an {\em infinite} domain is impossible.
\begin{theorem}[\cite{BNSV15}]\label{thm:range-lb}
Fix any constant $0 < \eps < 1/4$. Let $\delta(n) \le 1/(50 n^2)$. Then for every positive integer $n$, solving the interior point problem on $X$ with probability at least $3/4$ and with $(\eps, \delta(n))$-differential privacy requires sample complexity $n \ge \Omega(\log^*|X|)$.
\end{theorem}
As we will now see, solving the 1-Cluster problem over a domain $X$ (or over $X^d$ for any $d\geq1$) implies solving the interior point problem on $X$.
\begin{theorem}\label{thm:lower}
Let $\beta,\epsilon,\delta,n,t,\Delta,w$ be such that
$\Delta<t\leq n$. If there exists an $(\epsilon,\delta)$-private algorithm that solves the 1-cluster problem $(X,n,t)$ with parameters $(\Delta,w)$ and error probability $\beta$, then there exist a $(2\epsilon,2\delta)$-private algorithm that solves the interior point problem on $X$ with error probability $2\beta$ using sample complexity
$$m= n + 8^{\log^*(4w)} \cdot \frac{144 \log^*(4w)}{\epsilon} \log\Big(\frac{12\log^*(4w)}{\beta\delta}\Big).$$
\end{theorem}
Roughly speaking, Theorem~\ref{thm:lower} states that any solution for the 1-cluster problem (with a reasonable parameter $w$) implies a solution for the interior point problem.
Let us introduce the following notation for iterated exponentials:
$$\tower(0)=1 \quad\text{ and }\quad \tower(j)=2^{\tower(j-1)}.$$
\begin{corollary}\label{cor:1clusterLower}
Fix any constants $0 < \epsilon,\beta < 1/8$, and let $\delta(n) \le 1/(200 n^2)$.
Also let $\Delta,t,w$ be s.t.\ $\Delta<t\leq n$ and $w\leq \frac{1}{4}\tower(\log(n^{1/5}/40))$.
For every $(\epsilon,\delta)$-differentially private algorithm that solves the 1-cluster problem $(X,n,t)$ with parameters $(\Delta,w)$ and error probability $\beta$, it holds that $n\geq\Omega(\log^*|X|)$.
\end{corollary}
Hence, in any solution to the 1-cluster problem where $w$ is smaller than an exponential tower in $n$, the sample size $n$ must grow with $|X|$. In particular, privately solving such 1-cluster problems over infinite domains is impossible.
\begin{algorithm*}[t]
\caption{\texttt{IntPoint}}\label{alg:IntPoint}
\begin{enumerate}[rightmargin=10pt,itemsep=1pt]
\item[] {\bf Input:} Database $S \in X^m$ containing $m$ points from $X$.
\item[] {\bf Algorithm used:} Algorithm $\AAA$ for privately solving the 1-cluster problem $(X,n,t)$ with parameters $(\Delta,w)$ and error probability $\beta$.
\item Sort the entries of $S$ and let $D$ be a multiset containing the middle $n$ entries of $S$.
\item Apply $\AAA$ on $D$ to obtain a center $c\in X$ and a radius $r\in\R$. Let $I\subseteq X$ denote the interval of length $2r$ centered at $c$. If $r=0$ (i.e., $I$ contains only the point $c$), then halt and return $c$.
\begin{enumerate}[label=\gray{\%},topsep=-10pt]
\item \gray{
If $\AAA$ succeeded, then the interval $I$ contains at least $1$ input points from $D$. }
\end{enumerate}
\item Partition $I$ into intervals of length $r/w$, and let $\JJJ$ be the set of all edge points of the resulting intervals.
\begin{enumerate}[label=\gray{\%},topsep=-10pt]
\item \gray{
As $I$ contains points from $D$, at least one of the above intervals contains points from $D$. We will show that this interval cannot contain all of $D$, and hence, one of its two edge points is an interior point of $D$ (and of $S$).}
\end{enumerate}
\item Define $q:X^*\times X\rightarrow\N$ as $q\big((x_1,\dots,x_n),a\big)=\min\big\{ \;|\{i : x_i\leq a\}| \;,\; |\{i : x_i\geq a\}| \; \big\}$. Apply algorithm \texttt{RecConcave} on the database $S$ with privacy parameters $(\epsilon,\delta)$, utility parameters $(\alpha{=}\frac{1}{2},\beta)$, quality function $q$, and quality promise $\frac{m-n}{2}$ to choose and return $j\in\JJJ$.
\begin{enumerate}[label=\gray{\%},topsep=-10pt]
\item \gray{
If a point $j^*\in\JJJ$ is an interior point of $D$, then it is also an interior point of $S$ with quality $q(S,j^*)\geq \frac{m-n}{2}$ (since $D$ contains the middle $n$ elements of $S$). Hence, w.h.p., algorithm \texttt{RecConcave} identifies an interior point of $S$.}
\end{enumerate}
\end{enumerate}
\end{algorithm*}
\begin{proof}[Proof of Corollary~\ref{cor:1clusterLower}]
Denote $\delta(n) = 1/(200 n^2)$, and let $\AAA$ be a $(\epsilon{=}\frac{1}{10},\delta(n))$-differentially private algorithm that solves the 1-cluster problem $(X,n,t)$ with parameters $(\Delta,w)$ and error probability $\beta{=}\frac{1}{10}$, where $\Delta<t\leq n$ and $w\leq \frac{1}{4}\tower(\log(n^{1/5}/40))$. By Theorem~\ref{thm:lower}, there exist a $(2\epsilon{=}\frac{1}{5},2\delta(n))$-differentially private algorithm that solves the interior point problem on $X$ with error probability $2\beta{=}\frac{1}{5}$ using sample complexity
$$m= n + 8^{\log^*(4w)} \cdot 1440 \log^*(4w) \log\Big(24000 n^2 \log^*(4w)\Big).$$
Using the assumption that $w\leq \frac{1}{4}\tower(\log(n^{1/5}/40))$, we get that $m\leq2n$, and therefore $2\delta(n)=\frac{1}{100 n^2}\leq\frac{1}{50 m^2}$. Theorem~\ref{thm:range-lb} now states that $m \ge \Omega(\log^*|X|)$, and hence, $n \ge \Omega(\log^*|X|)$.
\end{proof}
\begin{proof}[Proof of Theorem~\ref{thm:lower}]
The proof is via the construction of algorithm \texttt{IntPoint}. For the privacy analysis, observe that on step~1 the algorithm constructs a database $D$ containing the $n$ middle elements of the input database $S$. Fix two neighboring databases $S_1,S_2$ of size $m$, and consider the databases $D_1,D_2$ containing the middle $n$ elements of $S_1,S_2$ respectively. As $S_1,S_2$ differ in at most one element, so does $D_1,D_2$ (our algorithms ignore the order of their input database). Hence, applying a private computation onto $D$ preserves privacy. Algorithm \texttt{IntPoint} interacts with $D$ using algorithm $\AAA$ (on step~1), and interacts with $S$ using algorithm \texttt{RecConcave} (on step~4). Hence, by composition (see Theorem~\ref{thm:composition1}), Algorithm \texttt{IntPoint} is $(2\epsilon,2\delta)$-differentially private.
As for the utility analysis, let $S\in X^m$ be an instance to the interior point problem, and consider the execution of algorithm \texttt{IntPoint} on $S$. Let $D$ be the multiset defined on step~1 of the execution, and let $c,r,I$ be the center, the radius, and the interval obtained on step~2. By the properties of algorithm $\AAA$, with probability $1-\beta$, the interval $I$ (of length $2r$ centered at $c$) contains at least $t-\Delta\geq1$ input points from $D$, and moreover, $2r\leq2w\cdot r_{opt}$ where $2r_{opt}$ is the length of the smallest interval containing $t$ points from $D$. That is, {\em every} interval containing $t$ points from $D$ is of length at least $2r/w$. We continue with the analysis assuming that this is the case.
If $r=0$, then the interval $I$ contains only the point $c$, and $c$ is therefore an interior point of $D$ (and of $S$). We hence proceed with the analysis assuming that $r>0$.
On step~3 we partition the interval $I$ (of length $2r$) into intervals of length $r/w$. Let us denote them as $\III=\{I_i\}$. Since $I$ contains at least 1 point from $D$, there exists an interval $I_\ell\in\III$ that contains a point from $D$. In addition,
$I_\ell$ is of length $r/w$, and can hence contain at most $t-1$ points from $D$. So, there exists an interval $I_\ell\in\III$ containing some of the points in $D$, but not all of them. One of its edge points must be, therefore, an interior point of $D$. Thus, the set $\JJJ$ of all end points of the intervals in $\III$ (defined on step~3) contains an interior point of $D$.
Recall that the input database $S$ contains at least $\frac{m-n}{2}$ elements which are bigger than the elements in $D$ and $\frac{m-n}{2}$ elements which are smaller. Hence, there exists a point $j^*\in\JJJ$ s.t. $q(S,j^*)\geq \frac{m-n}{2}$, and the quality promise given to algorithm \texttt{RecConcave} is valid. Observe that $|\JJJ|\leq4w$ (this is the size of the solution set given to algorithm \texttt{RecConcave}). Hence, assuming that
$$
m\geq n + 8^{\log^*(4w)} \cdot \frac{144 \log^*(4w)}{\epsilon} \log\Big(\frac{12\log^*(4w)}{\beta\delta}\Big),
$$
with probability at least $1-\beta$, the output $j\in\JJJ$ is s.t.\ $q(S,j)\geq \frac{m-n}{4}$, and $j$ is an interior point of $S$ as required.
\end{proof}
\section{Sample and aggregate}\label{sec:sa}
Consider $f:U^*\rightarrow X^d$ mapping databases to $X^d$. Fix a database $S\in U^*$, and assume that evaluating $f$ on a random sub-sample $S'$ (containing iid samples from $S$) results in a good approximation to $f(S)$. Our goal is to design a private analogue to $f$.
\begin{definition}
Fix a function $f:U^*\rightarrow X^d$ and a database $S\in U^*$. A point $c\in X^d$ is an {\em $(m,r,\alpha)$-stable point} of $f$ on $S$ if for a database $S'$ containing $m$ iid samples from $S$ we have $\Pr[\|f(S')-c\|_2\leq r]\geq\alpha$.
If such a point $c$ exists,we say that $f$ is $(m,r,\alpha)$-stable on $S$. We will call $r$ the {\em radius} of the stable point $c$.
\end{definition}
In the sample and aggregate framework~\cite{NRS07}, the goal is to privately identify an $(m,r,\alpha)$-stable point of a function $f$ on the given input database $S$.
Intuitively, if $r$ is small and $\alpha$ is large, then such a point would be a good (private) substitute for (the non-private value) $f(S)$. Note that a stable point with small $r$ and with large $\alpha$ might not exist.
\begin{theorem}[\cite{NRS07} restated, informal]\label{thm:NRS07}
Fix a desired stability parameter $m$, and let $n\geq 4d^2 m$.
There exists an efficient differentially private algorithm that given a database $S\in U^n$ and a function $f:U^*\rightarrow X^d$, identifies an $\Big(m,O(\sqrt{d}\cdot r_{opt})+\sqrt{d}\cdot e^{-\Omega\left(\sqrt{\frac{n}{m}}\frac{1}{d}\right)},0.51\Big)$-stable point of $f$ on $S$, where $r_{opt}$ is the smallest $r$ s.t. $f$ is $(m,r,0.51)$-stable on $S$.
\end{theorem}
Note the following caveats in Theorem~\ref{thm:NRS07}:
(1)~The function $f$ might only be $\left(m,r,0.51\right)$-stable on $S$ for very large values of $r$, in which case the similarity to (the non-private) $f(S)$ is lost. (2)~The error in the radius of the stable point grows with $\sqrt{d}$, which might be unacceptable in high dimensions.\footnote{
Let $c$ be an $(m,r,0.51)$-stable point of $f$ on $S$. In~\cite{NRS07}, the returned point $c'$ is s.t.\ that the error vector $(c-c')$ has magnitude $O(r_{opt})+e^{-\Omega\left(\sqrt{\frac{n}{m}}\frac{1}{d}\right)}$ in each coordinate.}
Using Theorem~\ref{thm:main} it is possible to avoid those two caveats.
\begin{theorem}\label{thm:SA}
Fix privacy parameters $\epsilon,\delta$, failure parameter $\beta$, and desired stability parameters $m,\alpha$. Let\\
$$\frac{n}{m}\geq O\left(\frac{\sqrt{d}\cdot \log\left(\frac{1}{\beta}\right)}{\alpha\cdot\min\{\alpha,\epsilon\}}\log\left(\frac{nd}{\alpha\beta\epsilon\delta}\right)\sqrt{\log\left(\frac{1}{\alpha\beta\epsilon\delta}\right)}\cdot 9^{\log^*(2|X|\sqrt{d})}\right).$$
There exists an efficient $(\epsilon,\delta)$-differentially private algorithm that given a database $S\in U^n$ and a function $f:U^*\rightarrow X^d$, with probability at least $(1-\beta)$, identifies an $(m,O(r_{opt}\cdot\sqrt{\log n}),\frac{\alpha}{8})$-stable point of $f$ on $S$, where $r_{opt}$ is the smallest $r$ s.t. $f$ is $(m,r,\alpha)$-stable on $S$.
\end{theorem}
Theorem~\ref{thm:SA} is proved using algorithm \texttt{SA}.
Similarly to~\cite{NRS07}, the idea is to apply $f$ onto $k$ random subsamples of the input database $S$ (obtaining outputs $Y=\{y_1,y_2,\dots,y_k\}$ in $X^d$), and then to privately identify a point $z\in X^d$ which is close to points in $Y$. We will use the following lemma to argue that the random subsampling step maintains privacy:
\begin{lemma}[\cite{KLNRS08,BNSV15}]\label{lem:iidSampling}
Fix $\epsilon\leq1$ and let $\cal A$ be an $(\eps, \delta)$-differentially private algorithm operating on databases of size $m$.
For $n\geq2m$, construct an algorithm $\tilde{\cal A}$ that on input a database $D$ of size $n$ subsamples (with replacement) $m$ rows from $D$ and runs $\cal A$ on the result. Then $\tilde{\cal A}$ is $( \tilde{\eps} , \tilde{\delta} )$-differentially private for
$\tilde{\eps}=6\eps m /n$ and $\tilde{\delta}= \exp(6\eps m/n)\frac{4m}{n}\cdot\delta.$
\end{lemma}
\begin{lemma}\label{lem:SAPrivacy}
Algorithm \texttt{SA} is $(\epsilon,\delta)$-differentially private.
\end{lemma}
\begin{proof}
Let $\cal A$ denote an algorithm identical to \texttt{SA}, except without the iid sampling on step~\ref{step:SA_sample} (the input to $\cal A$ is the database $D$), and observe that $\cal A$ preserve $(\epsilon,\delta)$-differential privacy. To see this, let $D,D'$ be two neighboring databases, and consider the execution of $\cal A$ on $D$ and $D'$.
Next, note that there is at most one index $i$ s.t.\ $D_i$ differs from $D'_i$. Hence, $Y$ and $Y'$ are neighboring databases, and privacy is preserved by the properties of algorithm $\cal M$.
Algorithm \texttt{SA} (including the iid sampling) is $(\epsilon,\delta)$-differentially private by Lemma~\ref{lem:iidSampling} (iid sampling).
\end{proof}
\begin{algorithm*}[t]
\caption{\texttt{SA}}
\begin{enumerate}[rightmargin=10pt,itemsep=1pt]
\item[] {\bf Input:} Database $S$ containing $n$ elements from $U$, function $f:U^*\rightarrow X^d$, privacy parameters $\epsilon,\delta$, failure parameter $\beta$, and desired stability parameters $m,\alpha$. We denote $k\triangleq\frac{n}{9m}$.
\item[] {\bf Algorithm used:} An $(\epsilon\leq\frac{\alpha}{72},\delta\leq\frac{\beta\epsilon}{3})$-private algorithm $\cal M$ for solving the 1-cluster problem $(X^d,k,t)$ for every $t\geq t_{\rm min}$, with parameters $(\Delta{\leq}t/2,w)$ and error probability $\frac{\beta}{3}$.
\item\label{step:SA_sample} Let $D$ be the outcome of $n/9$ iid samples from $S$. Partition $D$ into $k$ databases $D_1,D_2,...,D_k$ of size $m$ each.
\item\label{step:SA_Y} Let $Y=\{y_1=f(D_1),y_2=f(D_2),\dots,y_k=f(D_k)\}$.
\item Apply $\cal M$ on the database $Y$ with parameter $t=\frac{\alpha k}{2}$ to get a point $z$. Output $z$.
\end{enumerate}
\end{algorithm*}
In the utility analysis of algorithm \texttt{SA} we first show that a ball around the returned point $z\in X^d$ contains $\gtrsim \alpha$ fraction of points in $Y=\{y_1=f(D_1),y_2=f(D_2),\dots,y_k=f(D_k)\}$. Afterwards, we will argue that this ball also contains $\gtrsim \alpha$ mass of the underlying distribution (i.e., the distribution defined by applying $f$ on a random subsample of $S$). The straightforward approach for such an argument would be to use VC bounds stating that for any ball (in particular, the ball around $z$) it holds that the fraction of points from $Y$ in it is close to the weight of the ball w.r.t.\ the underlying distribution. However, for this argument to go through we would need $|Y|$ to be as big as the VC dimension of the class of $d$-dimensional balls, which is $d+1$. This seems wasteful since our private algorithm for locating the ball only requires the generation of a small cluster of size $\approx\sqrt{d}$. Instead, will make use of the inherent generalization properties of differential privacy, first proven by Dwork et al.~\cite{DFHPRR14}. Specifically, we will use the following theorem of Bassily et al.~\cite{BNSSSU15} stating that any predicate computed with differential privacy automatically provides generalization:
\begin{theorem}[\cite{BNSSSU15}] \label{thm:DPgeneralization}
Let $\epsilon \in (0,1/3)$, $\delta \in (0,\epsilon/4)$, and $n\geq\frac{1}{\epsilon^2}\log(\frac{4\epsilon}{\delta})$.
Let $\AAA:U^n\rightarrow2^U$ be an $(\epsilon,\delta)$-differentially private algorithm that operates on a database of size $n$ and outputs a predicate $h:U\rightarrow\{0,1\}$.
Let $\DDD$ be a distribution over $U$, let $S$ be a database containing $n$ i.i.d.\ elements from $\DDD$, and let $h\leftarrow \AAA(S)$.
Then,
$$
\Pr_{S,\AAA}\left[|h(S)-h(\DDD)| > 18\epsilon\right]\leq \frac{\delta}{\eps},
$$
where $h(S)$ is the empirical average of $h$ on $S$, and $h(\DDD)$ is the expectation of $h$ over $\DDD$.
\end{theorem}
\begin{lemma}\label{lem:SAutility}
Let \texttt{SA} be executed on a function $f$ and on a database $S$ of size $n$ such that $f$ is $(m,r,\alpha)$-stable on $S$. Assume \texttt{SA} has access to an $(\epsilon\leq\frac{\alpha}{72},\delta\leq\frac{\beta\epsilon}{3})$-private algorithm $\cal M$ for solving the 1-cluster problem $(X^d,k,t)$ for every $t\geq t_{\rm min}$ with parameters $(\Delta{\leq}t/2,w)$ and error probability $\frac{\beta}{3}$.
With probability at least $(1-\beta)$, the output $z$ is an $(m,wr,\frac{\alpha}{8})$-stable point of $f$ on $S$, provided that
$$n\geq m\cdot O\left(\frac{t_{\rm min}}{\alpha}+\frac{1}{\alpha^2}\log\left(\frac{12}{\beta}\right)\right).$$
\end{lemma}
\begin{proof}
Let algorithm \texttt{SA} be executed on a function $f$ and on a database $S$ such that $f$ is $(m,r,\alpha)$-stable on $S$. Let $c\in X^d$ be a stable point of $f$ on $S$, and let $\BBB_r(c,Y)$ denote the number of points in $Y$ within distance $r$ from $c$.
By the definition of the stable point $c$, for every $y_i$ (defined on step~\ref{step:SA_Y}) we have that $\Pr[\|y_i-c\|_2\leq r]\geq\alpha$. Hence, by the Chernoff bound, $\Pr[\BBB_r(c,Y)<\frac{\alpha k}{2}]\leq\exp(-\frac{\alpha k}{8})\leq\beta/3$.
Assume that $\BBB_r(c,Y)\geq\frac{\alpha k}{2}$, i.e., there are at least $\frac{\alpha k}{2}=t$ points in $Y$ within distance $r$ from $c$. Hence, by the properties of algorithm $\cal M$, with probability at least $(1-\beta/3)$ the output $z$ is s.t.\ $\BBB_{wr}(z,Y)\geq \frac{t}{2}=\frac{\alpha k}{4}$.
We now argue that the ball of radius $wr$ around $z$ not only contains a lot of points from $Y$, but is also ``heavy'' w.r.t.\ the underlying distribution (i.e., the distribution defined by applying $f$ on a random subsample of $S$). To that end, consider the predicate $h:X^d\rightarrow\{0,1\}$ defined as $h(x)=1$ iff $\|x-z\|_2\leq wr$. That is, $h$ evaluates to 1 exactly on points inside the ball of radius $wr$ around $z$. So $h(Y)\geq\frac{\alpha}{4}$. By Theorem~\ref{thm:DPgeneralization}, assuming that $k\geq\frac{5184}{\alpha^2}\log(\frac{12}{\beta})$, with probability at least $1-\delta/\epsilon\geq1-\beta/3$ we have that for a random subsample $S'$ containing $m$ i.i.d.\ samples from $S$, it holds that $\Pr[h(f(S'))=1]=\Pr[\|f(S')-z\|_2\leq wr]\geq\frac{\alpha}{4}-18\epsilon\geq\frac{\alpha}{8}$.
All in all, provided that $n=9mk\geq\frac{18m}{\alpha} t_{\rm min}+\frac{46646m}{\alpha^2}\log(\frac{12}{\beta})$, with probability at least $(1-\beta)$, the output $z$ is an $(m,wr,\frac{\alpha}{8})$-stable point of $f$ on $S$.
\end{proof}
Theorem~\ref{thm:SA} now follows from combining lemmas~\ref{lem:SAPrivacy}, and~\ref{lem:SAutility} with Theorem~\ref{thm:main}.
\bibliographystyle{abbrv}
|
\section{Introduction} \label{sec-1}
For $k\in \mathbb{Z}$, two types of poly-Bernoulli numbers $\{B_n^{(k)}\}$ and $\{C_n^{(k)}\}$ are defined by Kaneko as follows:
\begin{align}
&\frac{\mathrm{Li}_{k}(1-e^{-t})}{1-e^{-t}}=\sum_{n=0}^\infty B_n^{(k)}\frac{t^n}{n!}, \label{1-1}\\
&\frac{\mathrm{Li}_{k}(1-e^{-t})}{e^t-1}=\sum_{n=0}^\infty C_n^{(k)}\frac{t^n}{n!}, \label{1-2}
\end{align}
where $\mathrm{Li}_{k}(z)$ is the polylogarithm defined by
\begin{equation}
\mathrm{Li}_{k}(z)=\sum_{m=1}^\infty \frac{z^m}{m^k}\quad (|z|<1) \label{1-3}
\end{equation}
(see Kaneko \cite{Kaneko1997} and Arakawa--Kaneko \cite{AK1999}, also Arakawa--Ibukiyama--Kaneko \cite{AIK2014}). Since $\mathrm{Li}_1(x)=-\log(1-x)$, we see that $B_n^{(1)}$ coincides with the ordinary Bernoulli number.
In this decade, these numbers have been actively investigated (see, for example, Kaneko \cite{Kaneko-Mem}). The most remarkable formulas for them are the following `duality relations':
\begin{align}
& B_m^{(-k)}=B_{k}^{(-m)},\label{1-5}\\
& C_m^{(-k-1)}=C_{k}^{(-m-1)} \label{1-5-2}
\end{align}
for $k,m\in \mathbb{Z}_{\geq 0}$ (see \cite[Theorem 2]{Kaneko1997} and \cite[\S\,2]{Kaneko-Mem}). Recently Kaneko and the second-named author \cite{Kaneko-Tsumura2015} showed \eqref{1-5}, \eqref{1-5-2} and their generalization by investigating the zeta-function of Arakawa--Kaneko type (defined below).
Also it is known that
\begin{equation}
B_m^{(k)}=C_{m}^{(k)}+C_{m-1}^{(k-1)} \label{1-5-3}
\end{equation}
for $k\in \mathbb{Z}$ and $m\in \mathbb{Z}_{\geq 1}$ (see \cite[Equation (9)]{AK1999}).
Corresponding to these numbers, Arakawa and Kaneko defined the zeta-function
\begin{equation}
\xi(k;s)=\frac{1}{\Gamma(s)}\int_0^\infty {t^{s-1}}\frac{\mathrm{Li}_{k}(1-e^{-t})}{e^t-1}dt \quad (\Re s>0) \label{1-9}
\end{equation}
for $k \in {\mathbb{Z}}_{\geq 1}$,
which can be continued to $\mathbb{C}$ as an entire function (see \cite[Section 3]{AK1999}). Further they considered multiple versions of \eqref{1-9}. Note that $\xi(k;s)$ can be regarded as generalizations of the Riemann zeta-function because $\xi(1;s)=s\zeta(s+1)$. They also showed that
\begin{equation}
\xi(k;-m)=(-1)^m C_m^{(k)} \quad (m\in \mathbb{Z}_{\geq 0}). \label{1-10}
\end{equation}
From the observation of $\xi(k;s)$ and its multiple versions, they gave several relation formulas among the multiple zeta values defined by
\begin{equation}
\zeta(l_1,\ldots,l_r)=\sum_{1<m_1<\cdots<m_r}\frac{1}{m_1^{l_1}\cdots m_r^{l_r}
\label{MZV}
\end{equation}
for $l_1,\ldots,l_r\in \mathbb{Z}_{\geq 1}$ with $l_r\geq 2$
(see \cite[Corollary 11]{AK1999}).
As a generalization of $\xi(k;s)$, Coppo and Candelpergher \cite{CC2010} defined
\begin{equation}
\xi(k;s;w)=\frac{1}{\Gamma(s)}\int_0^\infty {t^{s-1}}e^{-wt}\frac{\mathrm{Li}_{k}(1-e^{-t})}{1-e^{-t}}dt \label{CC}
\end{equation}
for $k\in \mathbb{Z}_{\geq 1}$ and $w>0$, and studied its property. Note that $\xi(k;s;1)=\xi(k;s)$.
As a twin sibling of \eqref{1-9}, Kaneko and the second-named author \cite{Kaneko-Tsumura2015} recently defined
\begin{equation}
\eta(k;s)=\frac{1}{\Gamma(s)}\int_{0}^\infty t^{s-1}\frac{\mathrm{Li}_{k}(1-e^t)}{1-e^t}dt \label{1-11}
\end{equation}
for $s\in \mathbb{C}$ and for `any' $k\in \mathbb{Z}$,
which interpolates the
poly-Bernoulli numbers of $B$-type, that is,
\begin{equation}
\eta(k;-m)=B_m^{(k)}\qquad (k\in \mathbb{Z},\ m\in \mathbb{Z}_{\geq 0}). \label{B-interpolate}
\end{equation}
More generally, they defined the multi-variable version of
\eqref{1-11} denoted by $\eta((-k_j);(s_j))$ for each $k_j\in \mathbb{Z}_{\geq 0}$,
and showed certain duality relations for multi-indexed poly-Bernoulli numbers
(see \cite[Theorem 5.7 and 5.10]{Kaneko-Tsumura2015}).
More recently, Yamamoto \cite{Yamamoto}
considered $\eta(u;s)$ (where $u$ and $s$ are variables) and its multi-variable versions $\eta((u_j);(s_j))$
\if0
\eqref{1-5-9}, namely, $\eta (u_1,\ldots,u_r;s_1,\ldots,s_r)$
which is defined by replacing $(-k_1,\ldots,-k_r)$ by $(u_1,\ldots,u_r)\in \mathbb{C}^r$ in \eqref{1-5-9}. He showed a functional duality relation
\begin{equation}
\eta (u_1,\ldots,u_r;s_1,\ldots,s_r)=\eta (s_1,\ldots,s_r;u_1,\ldots,u_r) \label{F-dual}
\end{equation}
for $(s_j),\,(u_j)\in \mathbb{C}^r$, which interpolates \eqref{1-5}.
\fi
and proved functional duality relations for them. In particular, for the case of single zeta-function, he proved
\begin{equation}
\eta(u;s)=\eta(s;u) \quad (u,s\in \mathbb{C}),\label{Yamamoto-F}
\end{equation}
which interpolates \eqref{1-5} at non-positive integer points by \eqref{B-interpolate}.
In this paper, we consider, as generalizations of $\xi(k;s)$, $\eta(k;s)$ and $\xi(k;s;w)$, the Arakawa--Kaneko zeta-functions associated with $\mathrm{GL}_2(\mathbb{C})$ defined as follows.
For $g=\begin{pmatrix}a & b\\ c& d \end{pmatrix}\in\mathrm{GL}_2(\mathbb{C})$, we let
\begin{equation*}
gz=\frac{az+b}{cz+d},\ \ j_D(g,z)=cz+d, \ \ j_N(g,z)=az+b.
\end{equation*}
Note that $j_D(g,z)$ coincides with the factor of automorphy for $g\in\mathrm{SL}_2(\mathbb{Z})$ (see \cite[\S\,1.2]{Diamond2005}).
Let
\begin{equation}
\Phi(z,u,y)= \sum_{m=0}^\infty\frac{z^m}{(m+y)^u} \label{Lerch-T}
\end{equation}
be the Lerch Transcendent for $z,u,y\in\mathbb{C}$ with $|z|<1$ or ($z=1$ and $\Re u>1$), and $\Re y>0$ (see \cite[\S, 1.11]{Bateman}). For $y,w \in \mathbb{C}$, we define
\begin{equation}
\xi_D(u,s;y,w;g)=\frac{1}{\Gamma(s)}\int_{0}^\infty t^{s-1}e^{-wt}\frac{\Phi(ge^t,u,y)}{j_D(g,e^t)}dt, \label{Def-main-1}
\end{equation}
which is the main object in this paper. We construct interpolation formulas of the well-known relations among poly-Bernoulli numbers by use of $\xi_D(u,s;y,w;g)$.
In Section \ref{sec-2}, we define the Lerch Transcendent and study its properties and related results.
In Section \ref{sec-3}, we define \eqref{Def-main-1} (see Definition \ref{Def-3-1}) and determine its domain (see Theorem \ref{thm:domain1}).
We confirm
that $\xi(k;s)$, $\eta(k;s)$ and $\xi(k;s;w)$ can be regarded as special cases of \eqref{Def-main-1} (see Example \ref{Exam-3-1}).
In Section \ref{sec-4}, we give two types of functional relations among \eqref{Def-main-1} which include \eqref{Yamamoto-F} as a special case
(see Theorems \ref{thm:trans1} and \ref{thm:trans2}). Combining these formulas, we give interpolation formulas
of the well-known relations
including \eqref{1-5}--\eqref{1-5-3} (see Example \ref{Exam-4-6}).
In Section \ref{sec-5}, we consider the analytic continuation for \eqref{Def-main-1} (see Theorems \ref{thm:domain2}, \ref{thm:domain3} and \ref{AC-uyw}), and introduce several examples of duality relations (see Examples \ref{Exam-5-6} and \ref{Exam-5-6-3}).
In Section \ref{sec-6}, we define the poly-Bernoulli polynomials associated with $\mathrm{GL}_2(\mathbb{C})$ (see Definition \ref{g-Bernoulli}). From the results in Sections \ref{sec-4} and \ref{sec-5}, we give general forms of difference relations and duality relations for them (see Theorems \ref{thm:DR} and \ref{Th-D-F}).
These include \eqref{1-5}--\eqref{1-5-3} and also the duality relations for poly-Bernoulli polynomials (see Example \ref{Exam-6-6}) given by Kaneko, Sakurai and the second-named author (see \cite{KST2016}). Furthermore, we give new duality relations for certain sums of $C_m^{(-k)}$ (see Example \ref{Exam-C-dual}).
\section{Preliminaries}\label{sec-2}
For $z,u,y\in\mathbb{C}$ with $|z|<1$ or ($z=1$ and $\Re u>1$), and $\Re y>0$,
the Lerch transcendent is defined by
\begin{equation}
\Phi(z,u,y)=\sum_{n=0}^\infty\frac{z^n}{(y+n)^u},
\end{equation}
which is a generalization of the polylogarithm defined by
\begin{equation}
\mathrm{Li}_u(z)= \sum_{n=1}^\infty\frac{z^n}{n^u},
\end{equation}
and is related as
\begin{equation}
z\Phi(z,u,1)=\mathrm{Li}_u(z). \label{Phi-Li}
\end{equation}
For $k\in\mathbb{Z}_{\geq0}$,
the Lerch transcendent satisfies the following.
\begin{align}
\label{eq:FELT1}
\Phi(z,u,y)
&=
z^k\Phi(z,u,y+k) +\sum_{n=0}^{k-1}\frac{z^n}{(y+n)^{u}}\\
\label{eq:FELT2}
&=
z^{-k}\Phi(z,u,y-k) -\sum_{n=1}^{k}\frac{z^{-n}}{(y-n)^{u}}.
\end{align}
\begin{lemma}
\label{lm:IRLT}
For ($\Re u>0$ and $|z|<1$) or ($\Re u>1$ and $z=1$), and $\Re y>0$,
$\Phi(z,u,y)$ has the integral representation
\begin{equation}
\Phi(z,u,y)
=
\frac{1}{\Gamma(u)}
\int_0^{\infty} x^{u-1}e^{-yx}\frac{1}{1-z e^{-x}}dx.
\end{equation}
This expression gives
the analytic continuation of
$\Phi(z,u,y)$ for
$z\in\mathbb{C}\setminus [1,+\infty)$, $\Re u>0$ and $\Re y>0$.
\end{lemma}
\begin{proof}
First we assume $|z|<1$ or $z=1$.
By an integral representation of the gamma function
$\Gamma(u)$ for $\Re u>0$, we have
\begin{equation}
\frac{1}{a^u}=\frac{1}{\Gamma(u)}\int_0^\infty e^{-ax}x^{u-1}dx
\end{equation}
for $\Re a>0$.
For ($\Re u>0$ and $|z|<1$) or ($\Re u>1$ and $z=1$),
by substituting this into the series expression, we obtain
\begin{equation}
\begin{split}
\Phi(z,u,y)&=\frac{1}{\Gamma(u)}\sum_{n=0}^\infty
\int_0^\infty z^n e^{-nx}e^{-yx}x^{u-1}dx
\\
&=\frac{1}{\Gamma(u)}
\int_0^\infty x^{u-1}e^{-yx}\frac{1}{1-z e^{-x}}dx.
\end{split}
\end{equation}
By this integral representation, $\Phi(z,u,y)$ is analytically continued
for $z\in\mathbb{C}\setminus [1,+\infty)$, $\Re u>0$ and $\Re y>0$.
\end{proof}
For a variable $u$, we define a difference operator $D_u$ by
\begin{equation}
D_uf(u)=f(u+1).
\end{equation}
We also define the Euler operator
\begin{equation}
\vartheta_z=z\dfrac{\partial}{\partial z}.
\end{equation}
\begin{lemma}
\label{lm:Dd}
\begin{equation}
(D_u^{-1}-y)\Phi(z,u,y)=\vartheta_z\Phi(z,u,y).
\end{equation}
\end{lemma}
\begin{proof}
By the series expression, we have
\begin{equation}
\Phi(z,u-1,y)
=\Bigl(y+z\frac{\partial}{\partial z}\Bigr)\Phi(z,u,y),
\end{equation}
which is rewritten in terms of the difference operator $D_u$.
\end{proof}
\begin{lemma}
\label{lm:rd}
For $n\in \mathbb{Z}_{\geq 0}$,
\begin{align}
\Bigl(\prod_{k=1}^n \Bigl(1+\frac{1}{k}\vartheta_z\Bigr)\Bigr)
\frac{1}{1-ze^{-x}}
&=\frac{1}{(1-ze^{-x})^{n+1}},
\\
\Bigl(\prod_{k=1}^n \Bigl(-1+\frac{1}{k}\vartheta_z\Bigr)\Bigr)
\frac{ze^{-x}}{1-ze^{-x}}
&=\Bigl(\frac{ze^{-x}}{1-ze^{-x}}\Bigr)^{n+1}.
\end{align}
\end{lemma}
\begin{proof}
Since
\begin{equation}
\begin{split}
\vartheta_z\frac{1}{(1-ze^{-x})^k}
&=
\frac{kze^{-x}}{(1-ze^{-x})^{k+1}}
\\
&=
\frac{k}{(1-ze^{-x})^{k+1}}-
\frac{k}{(1-ze^{-x})^k},
\end{split}
\end{equation}
we have
\begin{equation}
\Bigl(1+\frac{1}{k}\vartheta_z\Bigr)\frac{1}{(1-ze^{-x})^k}=\frac{1}{(1-ze^{-x})^{k+1}},
\end{equation}
which yields the first equation.
Similarly
\begin{equation}
\begin{split}
\vartheta_z\Bigl(\frac{ze^{-x}}{1-ze^{-x}}\Bigr)^k
&=
k\Bigl(\frac{ze^{-x}}{1-ze^{-x}}\Bigr)^{k+1}
+k\Bigl(\frac{ze^{-x}}{1-ze^{-x}}\Bigr)^{k}
\end{split}
\end{equation}
implies
\begin{equation}
\Bigl(-1+\frac{1}{k}\vartheta_z\Bigr)\Bigl(\frac{ze^{-x}}{1-ze^{-x}}\Bigr)^k=\Bigl(\frac{ze^{-x}}{1-ze^{-x}}\Bigr)^{k+1}
\end{equation}
and the second equation.
\end{proof}
\begin{lemma}
\label{lm:DS}
For $n\in \mathbb{Z}_{\geq 0}$,
\begin{gather}
\frac{1}{n!}\Bigl(\prod_{k=1}^n(D_u^{-1}-y+k)\Bigr)
\Phi(z,u,y)
= \frac{1}{\Gamma(u)}
\int_0^{\infty} x^{u-1}e^{-yx}\frac{1}{(1-z e^{-x})^{n+1}}dx,
\\
\frac{1}{n!}\Bigl(\prod_{k=1}^n(D_u^{-1}-y-k)\Bigr)
(\Phi(z,u,y)-y^{-u})
=\frac{1}{\Gamma(u)}
\int_0^{\infty} x^{u-1}e^{-yx}\Bigl(\frac{ze^{-x}}{1-z e^{-x}}\Bigr)^{n+1}dx.
\end{gather}
\end{lemma}
\begin{proof}
The results follow from
Lemmas \ref{lm:Dd} and \ref{lm:rd}.
\end{proof}
Let $\widehat{\mathbb{C}}=\mathbb{C}\cup\{\infty\}$ denote the Riemann sphere.
For
$g=\begin{pmatrix}
a & b \\ c & d
\end{pmatrix}\in\mathrm{GL}_2(\mathbb{C})$,
we define
the M\"obius transformation
\begin{equation}
gz=\dfrac{az+b}{cz+d}
\end{equation}
for $z\in\widehat{\mathbb{C}}$.
Note that it is well known that
M\"obius transformations are conformal and map
circular arcs to circular arcs, where circular arcs include line segments.
Let
\begin{equation}
V(g)=\{g1,g\infty\}\cap\{1,\infty\}
\end{equation}
be the intersection of the extremal points of the two circular arcs $g([1,+\infty])$ and $[1,+\infty]$.
Let
\begin{equation}
j_D(g,z)=cz+d,\qquad
j_N(g,z)=az+b
\end{equation}
for $z\in\mathbb{C}$.
Then for $g,h\in\mathrm{GL}_2(\mathbb{C})$, we have
\begin{align}
j_D(gh,T)&=j_D(g,hT)j_D(h,T),\\
j_N(gh,T)&=j_N(g,hT)j_D(h,T).
\end{align}
If two circular arcs intersect at their extremal points, we call such point a vertex.
Moreover if the vertex angle is zero, then we call the vertex a cusp.
For $Z\in\{1,\infty\}$, we denote $\Tilde{Z}=1/Z\in\{0,1\}$.
Let
\begin{equation}
W_{a,\epsilon,R}=\{z\in\mathbb{C}~|~0<|z-a|<\epsilon\}\cu
\{z\in\mathbb{R}~|~a<z<R\}
\end{equation}
for $a\geq 0$, $\epsilon,R>0$. We abbreviate $W_{a,\epsilon}=W_{a,\epsilon,+\infty}$.
The following lemmas give certain inequalities under the assumption
that the two circular arcs $g([1,+\infty])$ and $[1,+\infty]$
intersect each other possibly only at their extremal points.
See Figure \ref{fig:tc} for typical configurations.
These
estimations play important roles when the domains of the main objects
are determined.
Their proofs will be given in Section \ref{sec:pr}.
\begin{figure}[h]
\centering
\begin{tikzpicture}
\draw (2,2) arc [start angle=60, end angle=180, radius=2] coordinate (A);
\draw (0,0) -- (3,0) ;
\filldraw (2,2) circle [radius=0.1] node [below=1mm] {$g1$};
\filldraw (A) circle [radius=0.1] node [below=1mm] {$g\infty$};
\filldraw (0,0) circle [radius=0.1] node [below=1mm] {$1$};
\filldraw (3,0) circle [radius=0.1] node [below=1mm] {$\infty$};
\end{tikzpicture}
\quad
\begin{tikzpicture}
\draw (0,0) arc [start angle=180, end angle=60, radius=2] coordinate (A);
\draw (0,0) -- (3,0) ;
\node [below=5mm] (0,0) {vertex} ;
\draw (0:0.5) arc [start angle=0, end angle=82, radius=0.5] node [right=2mm] {vertex angle $\neq 0$};
\filldraw (0,0) circle [radius=0.1] node [below=1mm] {$1=g\infty$};
\filldraw (A) circle [radius=0.1] node [below=1mm] {$g1$};
\filldraw (3,0) circle [radius=0.1] node [below=1mm] {$\infty$};
\end{tikzpicture}
\quad
\begin{tikzpicture}
\draw (0,0) arc [start angle=-90, end angle=0, radius=2] coordinate (A);
\draw (0,0) -- (3,0) ;
\node [below=5mm] (0,0) {cusp} ;
\draw (0:0.5) arc [start angle=0, end angle=7, radius=0.5];
\node at (3,0.4) {vertex angle $=0$} ;
\filldraw (0,0) circle [radius=0.1] node [below=1mm] {$1=g\infty$};
\filldraw (A) circle [radius=0.1] node [right=1mm] {$g1$};
\filldraw (3,0) circle [radius=0.1] node [below=1mm] {$\infty$};
\end{tikzpicture}
\caption{typical configurations}
\label{fig:tc}
\end{figure}
\begin{lemma}
\label{lm:boundV}
Let $g=\begin{pmatrix}
a & b \\ c & d
\end{pmatrix}\in\mathrm{GL}_2(\mathbb{C})$ and
$T_0,X_0\in\{1,\infty\}$.
Assume that $gT=X$ for only $(T,X)=(T_0,X_0)$ in its neighborhood in $[1,+\infty]^2$.
\begin{enumerate}
\item For $0\leq q\leq1$,
there exists $M>0$ such that
\begin{multline}
\Bigl|\frac{1}{j_D(g,T)}\frac{1}{(1-(gT)X^{-1})}\Bigr|
\\
\leq
\begin{cases}
\dfrac{M}{T}\Bigl|\dfrac{T}{\Tilde{T_0}T-1}\Bigr|^{1-q}\Bigl|\dfrac{X}{\Tilde{X_0}X-1}\Bigr|^{q}\qquad&\text{if the vertex is not a cusp}, \\
\dfrac{M}{T}\Bigl|\dfrac{T}{\Tilde{T_0}T-1}\Bigr|^{2(1-q)}\Bigl|\dfrac{X}{\Tilde{X_0}X-1}\Bigr|^{2q}
\qquad&\text{if the vertex is a cusp}
\end{cases}
\end{multline}
in a sufficiently small neighborhood of
$(T_0,X_0)$ in $(1,+\infty)^2$.
\item There exists $\epsilon>0$ such that
\begin{equation}
\label{eq:dist0}
\frac{1}{\epsilon}\Bigl|\dfrac{\Tilde{X_0}X-1}{X}\Bigr|
>\Bigl|\dfrac{\Tilde{T_0}T-1}{T}\Bigr|
>\epsilon \Bigl|\dfrac{\Tilde{X_0}X-1}{X}\Bigr|
\end{equation}
for any
pair $(T,X)$ satisfying
$gT=X$ in
a sufficiently small neighborhood
of $(T_0,X_0)$ in $\mathbb{C}^2$.
\end{enumerate}
\end{lemma}
\begin{lemma}
\label{lm:boundNV}
Let $g=\begin{pmatrix}
a & b \\ c & d
\end{pmatrix}\in\mathrm{GL}_2(\mathbb{C})$
be such that
\begin{equation}
g([1,+\infty])\cap[1,+\infty]\subset \{g1,g\infty\}\cap\{1,\infty\}=V(g).
\end{equation}
Let
$N$ be a neighborhood of $\{(T_0,X_0)~|~X_0\in V(g),T_0=g^{-1}X_0\}$ in $\widehat{\mathbb{C}}^2$.
Then
there exist $\epsilon>0$ and $M>0$ such that
\begin{equation}
\Bigl|\frac{1}{j_D(g,T)}\frac{1}{(1-(gT)X^{-1})}\Bigr|
\leq \frac{M}{|T|}
\end{equation}
for all $(T,X)\in W_{1,\epsilon}^2\setminus N$.
\end{lemma}
\section{Arakawa--Kaneko zeta-functions associated with $\mathrm{GL}_2(\mathbb{C})$} \label{sec-3}
Here and hereafter
we only consider $g\in\mathrm{GL}_2(\mathbb{C})$ which satisfies that
\begin{equation}
\label{eq:def_cond}
g([1,+\infty])\cap[1,+\infty]\subset \{g1,g\infty\}\cap\{1,\infty\}=V(g).
\end{equation}
In this section,
we give the definition of generalizations of the Arakawa--Kaneko zeta-function. The domains of the functions will be given later, which depend on the configuration of the three points $\{g0,g1,g\infty\}$ on the Riemann sphere $\widehat{\mathbb{C}}$.
\begin{definition}\label{Def-3-1}
For $g\in\mathrm{GL}_2(\mathbb{C})$ satisfying \eqref{eq:def_cond},
we define the Arakawa--Kaneko zeta-function associated with $g$ by
\begin{equation}
\label{eq:IR1}
\xi_D(u,s;y,w;g)=\frac{1}{\Gamma(s)}\int_0^{\infty} t^{s-1}e^{-wt}\frac{\Phi(ge^t,u,y)}{j_D(g,e^t)}dt.
\end{equation}
We define an auxiliary function
\begin{equation}
\xi_N(u,s;y,w;g)=\xi_D(u,s;y+1,w;g).
\label{xi-D-N}
\end{equation}
\end{definition}
We have the following integral representation of $\xi_{N}(u,s;y,w;g)$, which clarifies the meaning of the subscripts ``$D$'' and ``$N$''.
\begin{lemma}
\label{lm:DN}
\begin{equation}
\label{eq:IR2}
\xi_{N}(u,s;y,w;g)
=\frac{1}{\Gamma(s)}\int_0^{\infty} t^{s-1}e^{-wt}\frac{(\Phi(ge^t,u,y)-y^{-u})}{j_N(g,e^t)}dt.
\end{equation}
\end{lemma}
\begin{proof}
Since
\begin{equation}
z\Phi(z,u,y+1)=\Phi(z,u,y)-y^{-u},
\end{equation}
we have
\begin{equation}
\begin{split}
\xi_{N}(u,s;y,w;g)
&=\frac{1}{\Gamma(s)}\int_0^{\infty} t^{s-1}e^{-wt}\frac{ge^t\Phi(ge^t,u,y+1)}{j_N(g,e^t)}dt
\\
&=\frac{1}{\Gamma(s)}\int_0^{\infty} t^{s-1}e^{-wt}\frac{(\Phi(ge^t,u,y)-y^{-u})}{j_N(g,e^t)}dt.
\end{split}
\end{equation}
\end{proof}
By the integral representation of the Lerch transcendent in Lemma \ref{lm:IRLT},
we have double integral representations of the Arakawa--Kaneko zeta-functions.
\begin{lemma}
\label{lm:DIR}
\begin{align}
\label{eq:IRXD}
\xi_D(u,s;y,w;g)&=\frac{1}{\Gamma(s)\Gamma(u)}
\int_0^{\infty}\int_0^{\infty}
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-yx}}{j_D(g,e^t)}
\frac{1}{1-(ge^t) e^{-x}}
dtdx,
\\
\label{eq:IRXN}
\xi_N(u,s;y,w;g)&=\frac{1}{\Gamma(s)\Gamma(u)}
\int_0^{\infty}\int_0^{\infty}
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-yx}}{j_N(g,e^t)}
\frac{(ge^t) e^{-x}}{1-(ge^t) e^{-x}}
dtdx.
\end{align}
\end{lemma}
To determine the domain of $\xi_D(u,s;y,w;g)$,
we need to study when the integral \eqref{eq:IRXD} is convergent.
Here we give a sufficient condition below. It should be noted that
generally the domain is wider and is dependent on $g$.
To describe the domain, we define the following constants.
\begin{definition}\label{def-nu-mu}
Consider the two circular arcs $g([1,+\infty])$ and $[1,+\infty]$ on the Riemann sphere $\widehat{\mathbb{C}}$.
Then
for $T_0,X_0\in\{1,\infty\}$, we fix $\mu_{T_0},\nu_{X_0}\geq 0$ as follows.
For $gT_0\notin V(g)$ (resp.~$X_0\notin V(g)$), we set $\mu_{T_0}=0$ (resp.~$\nu_{X_0}=0$).
Further for a pair $(T_0,X_0)$ such that $gT_0=X_0\in V(g)$, we set
\begin{equation}
\mu_{T_0}+\nu_{X_0}=
\begin{cases}
1\qquad&\text{if $gT_0=X_0$ is not a cusp},\\
2\qquad&\text{if $gT_0=X_0$ is a cusp}.
\end{cases}
\end{equation}
\end{definition}
\begin{lemma}
\label{lm:est}
\begin{enumerate}
\item There exists $M>0$ such that
for all $(t,x)\in(0,+\infty)^2$,
\begin{equation}
\label{eq:est1}
\Bigl|\frac{1}{j_D(g,e^t)}
\frac{1}{1-(ge^t) e^{-x}}\Bigr|
\leq
M
t^{-\mu_1}x^{-\nu_1}e^{(\mu_\infty-1) t}
e^{\nu_\infty x}(t+1)^{\mu_1}(x+1)^{\nu_1}.
\end{equation}
\item Let $Z$ be a neighborhood of $\{(\log T_0,\log X_0)~|~X_0\in V(g),T_0=g^{-1}X_0\}$ in $\mathbb{C}^2$. Then
there exist $M>0$ and $\epsilon>0$ such that
for all $(t,x)\in W_{0,\epsilon}^2\setminus Z$,
\begin{equation}
\label{eq:est3}
\Bigl|\frac{1}{j_D(g,e^t)}
\frac{1}{1-(ge^t) e^{-x}}\Bigr|
\leq
M e^{-\Re t}.
\end{equation}
\item If $g1\neq1$, then for any sufficiently large $R>0$,
there exist $M>0$ and $\epsilon>0$ such that
for all $(t,x)\in W_{0,\epsilon,R}^2$,
\begin{equation}
\label{eq:est4}
\Bigl|\frac{1}{j_D(g,e^t)}
\frac{1}{1-(ge^t) e^{-x}}\Bigr|
\leq
M.
\end{equation}
\item
If $g1=\infty$, then
there exists $\epsilon>0$ such that
\begin{equation}
\label{eq:dist1}
|t|>\epsilon e^{-x}
\end{equation}
for any
pair $(t,x)$ satisfying
$ge^t=e^x$ in
a sufficiently small neighborhood
of $(0,+\infty)$ in $\mathbb{C}\times\mathbb{R}$.
\item
If $g\infty=1$, then
there exists $\epsilon>0$ such that
\begin{equation}
\label{eq:dist2}
|x|>\epsilon e^{-t}
\end{equation}
for any
pair $(t,x)$ satisfying
$ge^t=e^x$ in
a sufficiently small neighborhood
of $(+\infty,0)$ in $\mathbb{R}\times\mathbb{C}$.
\end{enumerate}
\end{lemma}
\begin{proof}
Let $Z$ be a neighborhood of $\{(\log T_0,\log X_0)~|~X_0\in V(g),T_0=g^{-1}X_0\}$ in $\mathbb{C}^2$.
If $V(g)\neq\emptyset$, then for each $X_0\in V(g)$,
consider a sufficiently small neighborhood $N'(X_0)$ of $(T_0,X_0)$ in $(1,+\infty)^2$ such that $J'(X_0)=\{(\log T,\log X)~|~(T,X)\in N'(X_0)\}\subset Z$.
By Lemma \ref{lm:boundV},
there exists $M>0$ such that
\begin{equation}
\Bigl|\frac{1}{j_D(g,e^t)}\frac{1}{1-(ge^t)e^{-x}}\Bigr|\leq
Me^{-t}
\Bigl|\dfrac{e^t}{\Tilde{T_0}e^t-1}\Bigr|^{\mu_{T_0}}
\Bigl|\dfrac{e^x}{\Tilde{X_0}e^x-1}\Bigr|^{\nu_{X_0}}
\end{equation}
for all $(t,x)\in J'(X_0)$.
Let $N$ be a sufficiently small neighborhood of
$\{(T_0,X_0)~|~X_0\in V(g),T_0=g^{-1}X_0\}$ in $\widehat{\mathbb{C}}^2$
such that $N\cap(1,+\infty)^2$ is contained in
the union of the neighborhoods $N'(X_0)$
taken in the previous paragraph for each $X_0\in V(g)$.
By Lemma \ref{lm:boundNV},
there exist $\epsilon>0$ and $M>0$ such that
\begin{equation}
\label{eq:boundW}
\Bigl|\frac{1}{j_D(g,e^t)}\frac{1}{1-(ge^t)e^{-x}}\Bigr|\leq
Me^{-\Re t}
\end{equation}
for all $(t,x)\in J$,
where
$I=W_{1,\epsilon}^2\setminus N$
and $J=\{(\log T,\log X)~|~(T,X)\in I\}$.
Let $\epsilon'>0$ be sufficiently small such that
$e^z\in W_{1,\epsilon}$ for all $z\in W_{0,\epsilon'}$.
This implies \eqref{eq:est3}.
In particular,
if $g1\neq1$, then $W_{0,\epsilon',R}^2\subset J$ for any sufficiently large $R>0$. Thus
\eqref{eq:boundW} implies \eqref{eq:est4}.
Since
for all $z> 0$,
\begin{equation}
\begin{split}
1\leq \Bigl|\frac{e^z}{\Tilde{Z_0}e^z-1}\Bigr|
&\leq
\begin{cases}
\dfrac{z+1}{z}
\qquad&(Z_0=1),\\
e^z\qquad&(Z_0=\infty),
\end{cases}
\end{split}
\end{equation}
we have
\begin{align}
1,\ \Bigl|\dfrac{e^t}{\Tilde{T_0}e^t-1}\Bigr|^{\mu_{T_0}}&\leq
t^{-\mu_1}e^{\mu_\infty t}(t+1)^{\mu_1},\\
1,\ \Bigl|\dfrac{e^x}{\Tilde{X_0}e^x-1}\Bigr|^{\nu_{X_0}}&\leq
x^{-\nu_1}e^{\nu_\infty x}(x+1)^{\nu_1}
\end{align}
and hence for all $(t,x)\in(0,+\infty)^2$,
\begin{equation}
\begin{split}
\Bigl|\frac{1}{j_D(g,e^t)}
\frac{1}{1-(ge^t) e^{-x}}\Bigr|
&\leq
M'
t^{-\mu_1}x^{-\nu_1}e^{(\mu_\infty-1) t}
e^{\nu_\infty x}(t+1)^{\mu_1}(x+1)^{\nu_1
\end{split}
\end{equation}
for some $M'>0$, which implies \eqref{eq:est1}.
Inequalities
\eqref{eq:dist1} and
\eqref{eq:dist2}
follow from
\eqref{eq:dist0}.
\end{proof}
\begin{theorem}
\label{thm:domain1}
For
$\Re u>\nu_1,
\Re s>\mu_1,
\Re y>\nu_\infty,
\Re w>\mu_\infty-1$,
$\xi_D(u,s;y,w;g)$ is defined and analytic in $u,s,y,w$.
\end{theorem}
\begin{proof}
By Lemma \ref{lm:est},
\begin{equation}
\begin{split}
&\int_0^\infty\int_0^\infty
\Bigl|\frac{t^{s-1}x^{u-1}e^{-wt}e^{-yx}}{j_D(g,e^t)}
\frac{1}{1-(ge^t) e^{-x}}\Bigr|
dt dx
\\
&\qquad
\leq M
\int_0^\infty\int_0^\infty
t^{\Re s-1-\mu_1}x^{\Re u-1-\nu_1}e^{(\mu_\infty-1-\Re w) t}
\\
&\qquad\qquad
\times
e^{(\nu_\infty-\Re y) x}(t+1)^{\mu_1}(x+1)^{\nu_1}
dtdx<\infty.
\end{split}
\end{equation}
The analyticity in $u,s,y,w$ follows from the Morera theorem and the Fubini theorem.
\end{proof}
\begin{example}\label{Exam-3-1}
Let $g_{\eta}:=
\begin{pmatrix} -1 & 1 \\ 0 & 1
\end{pmatrix}$.
We can see that $g_\eta^{-1}=g_\eta$ and ${\rm det}\,g=-1$ which are important properties.
For $g=g_\eta$, we have $gT=1-T$, namely, $g1=0$, $g\infty=\infty$ and
\begin{equation*}
g([1,+\infty])\cap[1,+\infty]=\{\infty\}= V(g).
\end{equation*}
Hence, by Definition \ref{def-nu-mu}, we obtain $\mu_1=0$ and $\nu_1=0$. Since $\infty$ is not a cusp, we have $\mu_\infty,\,\nu_\infty\in [0,1]$ satisfying $\mu_\infty+\nu_\infty=1$. Therefore $\xi_D(u,s;y,w;g_\eta)$ is defined for
$ \Re u>0,
\Re s>0,
\Re y>\nu_\infty,
\Re w>\mu_\infty-1$,
where $\mu_\infty,\,\nu_\infty\in [0,1]$ with $\mu_\infty+\nu_\infty=1$.
We see that
$$\mathrm{Li}_u(g\,e^t)=\mathrm{Li}_u(1-e^t),\quad j_D(g,e^t)=1,\quad j_N(g,e^t)=1-e^t.$$
Hence, noting \eqref{Phi-Li} and \eqref{xi-D-N}, we define
\begin{equation}
\eta(u;s)=\xi_N(u,s;0,0;g_\eta)=\xi_D(u,s;1,0;g_\eta)
\label{eta-xi}
\end{equation}
which was already considered by Yamamoto \cite{Yamamoto}.
\if0
We can also see that
\begin{equation}
\xi_N(k,s;0,-1;g_\eta)=\xi_D(k,s;1,-1;g_\eta)=\widetilde{\xi}(k;s) \label{tildexi-xi}
\end{equation}
for $k\in \mathbb{Z}\setminus \{0\}$ and $s\in \mathbb{C}$,
where $\widetilde{\xi}(k;s)$ was defined in \cite[Section 4]{Kaneko-Tsumura2015}.
\fi
Let $g_{\xi}:=
\begin{pmatrix} 1 & -1 \\ 1 & 0
\end{pmatrix}$. Then ${\rm det}\,g_\xi=1$.
For $g=g_\xi$, we have $gT=1-T^{-1}$, namely, $g1=0$, $g\infty=1$ and
\begin{equation*}
g([1,+\infty])\cap[1,+\infty]=\{1\}= V(g).
\end{equation*}
Hence we obtain $\mu_1=0$ and $\nu_{\infty}=0$. Since $1$ is not a cusp, we have $\mu_\infty,\,\nu_1\in [0,1]$ satisfying $\mu_\infty+\nu_1=1$. Therefore $\xi_D(u,s;y,w;g_\xi)$ is defined for
$ \Re u>\nu_1,
\Re s>0,
\Re y>0,
\Re w>\mu_\infty-1$,
where $\mu_\infty,\,\nu_1\in [0,1]$ with $\mu_\infty+\nu_1=1$.
We have
$$\mathrm{Li}_u(g\,e^t)=\mathrm{Li}_u(1-e^{-t}),\quad j_D(g,e^t)=e^t,\quad j_N(g,e^t)=e^t-1.$$
Hence, noting \eqref{Phi-Li} and \eqref{xi-D-N}, we define
\begin{equation}
\xi(u;s;w)=\xi_N(u,s;0,w-1;g_\xi)=\xi_D(u,s;1,w-1;g_\xi)
\end{equation}
and, in particular,
\begin{equation}
\xi(u;s)=\xi_N(u,s;0,0;g_\xi)=\xi_D(u,s;1,0;g_\xi), \label{xi-def-ND}
\end{equation}
which is a generalization of \eqref{1-9}.
\if0
In Section \ref{sec-5}, we will see that \eqref{eta-xi} can be analytically continued to $(u,s)\in \mathbb{C}^2$ (see Theorem \ref{thm:domain2} and Example \ref{Exam-5-eta-xi}).
For $g=g_\xi^{-1}=
\begin{pmatrix} 0 & 1 \\ -1 & 1
\end{pmatrix}$,
we have $gT=1/(1-T)$, namely, $g1=\infty$, $g\infty=0$ and
\begin{equation*}
g([1,+\infty])\cap[1,+\infty]=\{\infty \}= V(g).
\end{equation*}
Hence we obtain $\mu_\infty=0$ and $\nu_{1}=0$. Since $\infty$ is not a cusp, we have $\mu_1,\,\nu_\infty\in [0,1]$ satisfying $\mu_1+\nu_\infty=1$. Therefore $\xi_D(u,s;y,w;g_\xi^{-1})$ is defined for
$\Re s>\mu_1,
\Re u>0,
\Re w>-1,
\Re y>\nu_\infty$,
where $\mu_1,\,\nu_\infty\in [0,1]$ with $\mu_1+\nu_\infty=1$.
\fi
\end{example}
\section{Relations among Arakawa--Kaneko zeta-functions}\label{sec-4}
In this section, we give two types of functional relation formulas for $\xi_D$ and $\xi_N$ (see Theorems \ref{thm:trans1} and \ref{thm:trans2}).
We will see that
these give functional relations which interpolate the well-known relations among poly-Bernoulli numbers in Section \ref{sec-6}.
For
$g=
\begin{pmatrix}
a & b \\ c & d
\end{pmatrix}$,
we put
$j_N(g,D_u)=aD_u+b$ for the difference operator $D_u$ and so on.
\begin{theorem}[Difference relations]
\label{thm:trans1}
For
$g=
\begin{pmatrix}
a & b \\ c & d
\end{pmatrix}$,
we have
\begin{equation}\label{eq:rem-4-2}
j_N(g,D_w^{-1})\xi_{N}(u,s;y,w;g)=
j_D(g,D_w^{-1})\xi_{D}(u,s;y,w;g)-y^{-u}w^{-s},
\end{equation}
namely,
\begin{equation}
\begin{split}
&a\xi_{N}(u,s;y,w-1;g)+b\xi_{N}(u,s;y,w;g)\\
\bigl(=&a\xi_{D}(u,s;y+1,w-1;g)+b\xi_{D}(u,s;y+1,w;g)\bigr)\\
&\qquad\qquad=c\xi_{D}(u,s;y,w-1;g)+d\xi_{D}(u,s;y,w;g)-y^{-u}w^{-s}.
\end{split}
\end{equation}
\end{theorem}
\begin{proof}
The assertion follows
from the integral representations \eqref{eq:IR1} and \eqref{eq:IR2} with
\begin{equation}
\frac{aT+b}{j_N(g,T)}-\frac{cT+d}{j_D(g,T)}
=1-1=0
\end{equation}
and
\begin{equation}
\frac{1}{\Gamma(s)}\int_0^{\infty} t^{s-1}e^{-wt}y^{-u}dt
=y^{-u}w^{-s}.
\end{equation}
\end{proof}
For $g\in\mathrm{GL}_2(\mathbb{C})$ and
indeterminates $X,T$, we define
\begin{align}
F_D&=\frac{1}{1-(gT)X^{-1}},&
G_D&=\frac{1}{1-(g^{-1}X)T^{-1}},
\\
F_N&=\frac{(gT)X^{-1}}{1-(gT)X^{-1}},&
G_N&=\frac{(g^{-1}X)T^{-1}}{1-(g^{-1}X)T^{-1}}.
\end{align}
From Lemma \ref{lm:DIR}, we see that these come from the integrands of the double integral representations. We have the key relations, which are the core of duality relations.
\begin{lemma}
\label{lm:FG}
\begin{align}
\frac{T}{j_D(g,T)}F_D&=-\frac{1}{\det g}\frac{X}{j_D(g^{-1},X)}G_D,\\
\frac{1}{j_N(g,T)}F_N&=-\frac{1}{\det g}\frac{1}{j_N(g^{-1},X)}G_N,\\
\frac{1}{j_D(g,T)}F_D&=-\frac{1}{\det g}\frac{X}{j_N(g^{-1},X)}G_N.
\end{align}
\end{lemma}
\begin{proof}
The first equation follows from
\begin{equation}
\begin{split}
F_D
&=\frac{1}{1-(gT)X^{-1}}
\\
&=\frac{j_D(g,T) X}{(cX-a)T-(-dX+b)}
\\
&=-\frac{j_D(g,T) T^{-1}}{1-(g^{-1}X)T^{-1}}\frac{X}{-cX+a}
\\
&=-\frac{1}{\det g}\frac{j_D(g,T) T^{-1}}{1-(g^{-1}X)T^{-1}}
\frac{X}{j_D(g^{-1},X)}
\\
&=-\frac{1}{\det g}\frac{j_D(g,T) T^{-1}X}{j_D(g^{-1},X)}G_D,
\end{split}
\end{equation}
and the third, from
\begin{equation}
\begin{split}
F_D&=
-\frac{1}{\det g}\frac{j_D(g,T) T^{-1}X}{j_D(g^{-1},X)}
\frac{j_D(g^{-1},X)}{j_N(g^{-1},X)T^{-1}}G_N
\\
&=
-\frac{1}{\det g}\frac{j_D(g,T) X}{j_N(g^{-1},X)}G_N,
\end{split}
\end{equation}
and finally the second, from
\begin{equation}
\begin{split}
F_N&=\frac{j_N(g,T)X^{-1}}{j_D(g,T)}F_D
\\
&=-\frac{1}{\det g}\frac{j_N(g,T)X^{-1}}{j_D(g,T)}\frac{j_D(g,T) X}{j_N(g^{-1},X)}G_N
\\
&=-\frac{1}{\det g}\frac{j_N(g,T)}{j_N(g^{-1},X)}G_N.
\end{split}
\end{equation}
\end{proof}
There are three types of duality relations, namely,
ascending-ascending, descending-descending, and ascending-descending
types.
\begin{theorem}[Duality relations]
\label{thm:trans2}
For $n\in \mathbb{Z}_{\geq 0}$,
\begin{multline}\label{dual-1}
j_D(g^{-1},D_y^{-1})^{n}D_w^{-n-1}\Bigl(\prod_{k=1}^n(D_u^{-1}-y+k)\Bigr)
\xi_{D}(u,s;y,w;g)\\
\begin{aligned}
&=\Bigl(\frac{-1}{\det g}\Bigr)^{n+1}
j_D(g,D_w^{-1})^{n}D_y^{-n-1}\Bigl(\prod_{k=1}^n(D_s^{-1}-w+k)\Bigr)
\xi_{D}(s,u;w,y;g^{-1}),
\end{aligned}
\end{multline}
\begin{multline}\label{dual-2}
j_N(g^{-1},D_y^{-1})^{n}\Bigl(\prod_{k=1}^n(D_u^{-1}-y-k)\Bigr)
\xi_{N}(u,s;y,w;g)\\
\begin{aligned}
&=\Bigl(\frac{-1}{\det g}\Bigr)^{n+1}
j_N(g,D_w^{-1})^{n}\Bigl(\prod_{k=1}^n(D_s^{-1}-w-k)\Bigr)
\xi_{N}(s,u;w,y;g^{-1})
\end{aligned}
\end{multline}
and
\begin{multline}\label{dual-3}
j_N(g^{-1},D_y^{-1})^{n}\Bigl(\prod_{k=1}^n(D_u^{-1}-y+k)\Bigr)
\xi_{D}(u,s;y,w;g)\\
\begin{aligned}
&=\Bigl(\frac{-1}{\det g}\Bigr)^{n+1}
j_D(g,D_w^{-1})^{n}D_y^{-n-1}\Bigl(\prod_{k=1}^n(D_s^{-1}-w-k)\Bigr)
\xi_{N}(s,u;w,y;g^{-1}).
\end{aligned}
\end{multline}
\end{theorem}
\begin{proof}
From
Lemmas \ref{lm:rd}, \ref{lm:DS} and \ref{lm:DN}, we have
\begin{multline}
\frac{1}{n!}\Bigl(\prod_{k=1}^n(D_u^{-1}-y+k)\Bigr)
\xi_{D}(u,s;y,w;g)
\\
\begin{aligned}
&=
\frac{1}{\Gamma(s)\Gamma(u)}
\int_0^{\infty}\int_0^{\infty}
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-yx}}{j_D(g,e^t)}
\frac{1}{(1-(ge^t) e^{-x})^{n+1}}
dtdx,
\end{aligned}
\end{multline}
and
\begin{multline}
\frac{1}{n!}\Bigl(\prod_{k=1}^n(D_u^{-1}-y-k)\Bigr)
\xi_N(u,s;y,w;g)
\\
\begin{aligned}
&=\frac{1}{\Gamma(s)\Gamma(u)}
\int_0^{\infty}\int_0^{\infty}
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-yx}}{j_N(g,e^t)}
\Bigl(\frac{(ge^t) e^{-x}}{1-(ge^t) e^{-x}}\Bigr)^{n+1}
dtdx.
\end{aligned}
\end{multline}
Lemma \ref{lm:FG} implies
\begin{align}
j_D(g^{-1},X)^{n}\frac{T^{n+1}}{j_D(g,T)}F_D^{n+1}&=
\Bigl(\frac{-1}{\det g}\Bigr)^{n+1}
j_D(g,T)^{n}\frac{X^{n+1}}{j_D(g^{-1},X)}G_D^{n+1},\\
j_N(g^{-1},X)^{n}\frac{1}{j_N(g,T)}F_N^{n+1}&=
\Bigl(\frac{-1}{\det g}\Bigr)^{n+1}
j_N(g,T)^{n}\frac{1}{j_N(g^{-1},X)}G_N^{n+1},\\
j_N(g^{-1},X)^{n} \frac{1}{j_D(g,T)}F_D^{n+1}&=
\Bigl(\frac{-1}{\det g}\Bigr)^{n+1}
j_D(g,T)^{n}\frac{X^{n+1}}{j_N(g^{-1},X)}G_N^{n+1}.
\end{align}
By noting that
\begin{equation}
j_D(g^{-1},D_y^{-1})^{n}D_w^{-n-1}(t^{s-1}x^{u-1}e^{-wt}e^{-yx})
= j_D(g^{-1},e^x)^{n}e^{(n+1)t}(t^{s-1}x^{u-1}e^{-wt}e^{-yx})
\end{equation}
and so on,
we obtain the result.
\end{proof}
The $n=0$ case reduces to the following.
\begin{corollary}
\label{thm:trans3}
\begin{align}
\label{eq:Tr2}
\xi_{D}(u,s;y,w-1;g)&=-\frac{1}{\det g}\xi_{D}(s,u;w,y-1;g^{-1}),\\
\label{eq:Tr1}
\xi_{N}(u,s;y,w;g)&=-\frac{1}{\det g}\xi_{N}(s,u;w,y;g^{-1}),\\
\label{eq:Tr3}
\xi_{D}(u,s;y,w;g)&=-\frac{1}{\det g}\xi_{N}(s,u;w,y-1;g^{-1}),
\end{align}
which are essentially the same formulas.
\end{corollary}
\begin{example}\label{Exam-4-6}\ \
As for $\eta(u;s)=\xi_D(u,s;1,0;g_\eta)$ defined in Example \ref{Exam-3-1}, noting $g_\eta^{-1}=g_\eta$, we see that \eqref{eq:Tr2} with $(y,w)=(1,1)$ implies Yamamoto's result $\eta(u;s)=\eta(s;u)$ in \eqref{Yamamoto-F}, which interpolates \eqref{1-5} (for the values of $\eta(u;s)$ at nonpositive integers, see \eqref{eta-xi-vals}).
We will further introduce several duality relations for $\xi_D(u,s;y,w;g)$ in Section \ref{sec-5} (see Examples \ref{Exam-5-6} and \ref{Exam-5-6-3}).
\end{example}
\if0
Also, let $\widetilde{\xi}(u;s)=\xi_D(u,s;1,-1;g_\eta)$. Then, by \eqref{dual-1} with $(n,y,w,g)=(1,1,1,g_\eta)$, we obtain
\begin{equation}
\widetilde{\xi}(u-1,s)=\widetilde{\xi}(s-1,u) \label{dual-tilde-xi}
\end{equation}
which interpolates \eqref{1-5-2} (see Example \ref{Exam-6-1}).
In addition, it follows from \eqref{eq:Tr3} with $(y,w)=(0,0)$ that
$$\xi_D(u,s;0,0;g_\eta)=\xi_N(s,u;0,-1;g_\eta)=\xi_D(s,u;1,-1;g_\eta).$$
Therefore we have
\begin{equation}
\xi_D(u,s;0,0;g_\eta)=\xi_D(u-1,s+1;1,-1;g_\eta)=\widetilde{\xi}(u-1,s+1). \label{eq:Tr-xi}
\end{equation}
\end{example}
\begin{example}\label{Exam-4-6-2}
Let $g=g_{\xi}$ in Example \ref{Exam-3-1} and $\xi(u;s):=\xi_D(u,s;1,0;g_\xi)$.
Then we have $g_{\xi}^{-1}=
\begin{pmatrix} 0 & 1 \\ -1 & 1
\end{pmatrix}.$
Hence $g_{\xi}^{-1}T=1/(1-T)$ which satisfies \eqref{eq:def_cond}.
Setting $(y,w,g)=(0,0,g_\xi)$ in \eqref{eq:Tr2}, we obtain
\begin{equation*}
\xi_D(u,s;0,-1;g_\xi)=-\xi_D(s,u;0,-1;g_\xi^{-1}).
\end{equation*}
From this observation, we define
\begin{align}
\check{\xi}(u;s):&=\xi_D(u,s;0,-1;g_\xi^{-1}) =-\xi_D(s,u;0,-1;g_\xi).
\label{def-check-xi}
\end{align}
Setting $(n,y,w,g)=(1,1,0,g_\xi)$ in \eqref{dual-3} and noting \eqref{xi-D-N}, we obtain
\begin{align*}
& \xi_{D}(u-1,s;1,0;g_\xi)=\xi_{D}(s-1,u;0,-1;g_\xi^{-1}).
\end{align*}
Therefore we see from \eqref{def-check-xi} that
\begin{align}
& \xi(u-1;s)=\check{\xi}(s-1;u). \label{xi-dual-2}
\end{align}
The symbol $\check{\xi}$ is derived from this fact.
\if0
On the other hand, setting $(y,w,g)=(0,0,g_\xi)$ in Theorem \ref{thm:trans1}, we have
\begin{equation*}
\xi_D(u,s;1,-1;g_\xi)-\xi_D(u,s;1,0;g_\xi)=\xi_D(u,s;0,-1;g_\xi),
\end{equation*}
namely,
\begin{equation}
\xi_D(u,s;1,-1;g_\xi)=\xi(u;s)-\check{\xi}(s,u)=\xi(u,s)-\xi(u-1,s+1). \label{B-C-interpolation}
\end{equation}
We will confirm that this is an interpolation of \eqref{1-5-3} (see Example \ref{Exam-6-4}).
\fi
\end{example}
\begin{example}\label{Exam-4-6-3}
From \eqref{dual-1} with $n=1$, we obtain
\begin{multline*}
j_D(g^{-1},D_y^{-1})D_w^{-2}(D_u^{-1}-y+1)\xi_D(u,s;y,w;g)
\\
=
\Bigl(-\frac{1}{\det g}\Bigr)^2j_D(g,D_w^{-1})D_y^{-2}(D_s^{-1}-w+1)
\xi_D(s,u;w,y;g^{-1}).
\end{multline*}
Substituting \eqref{eq:Tr3} into the right-hand side and noting $j_D(g,D_w^{-1})w=wj_D(g,D_w^{-1})-cD_w^{-1}$, we have
\begin{multline}
\begin{aligned}
& j_D(g^{-1},D_y^{-1})D_w^{-2}(D_u^{-1}-y+1)\xi_D(u,s;y,w;g)
\\
&=
\Bigl(-\frac{1}{\det g}\Bigr)^2
(-\det g)
j_D(g,D_w^{-1})D_y^{-2}(D_s^{-1}-w+1)
\xi_D(u,s;y+1,w-1;g) \\
&=
-\frac{1}{\det g}
D_y^{-2}((D_s^{-1}-w+1)
j_D(g,D_w^{-1})+cD_w^{-1})
\xi_D(u,s;y+1,w-1;g)\\
&=
-\frac{1}{\det g}
D_y^{-2}(D_s^{-1}-w+1)
j_D(g,D_w^{-1})\xi_D(u,s;y+1,w-1;g)
\\
&\qquad
-\frac{1}{\det g}
cD_y^{-2}D_w^{-1}
\xi_D(u,s;y+1,w-1;g).\label{eq:1.7}
\end{aligned}
\end{multline}
Moreover,
substituting \eqref{eq:rem-4-2} into the right-hand side of \eqref{eq:1.7}, we obtain
\begin{multline}\label{eq:B=C+C}
j_D(g^{-1},D_y^{-1})D_w^{-2}(D_u^{-1}-y+1)\xi_D(u,s;y,w;g)
\\
\begin{aligned}
&=
-\frac{1}{\det g}
D_y^{-2}(D_s^{-1}-w+1)
(j_N(g,D_w^{-1})\xi_{D}(u,s;y+2,w-1;g)+(y+1)^{-u}(w-1)^{-s})
\\
&\qquad
-\frac{1}{\det g}
cD_y^{-2}D_w^{-1}
\xi_D(u,s;y+1,w-1;g).
\end{aligned}
\end{multline}
In particular, setting $(y,w,g_\eta)=(1,1,g_\eta)$, we obtain
\begin{equation*}
\xi_D(u-1,s;1,-1;g_\eta)=\xi_D(u,s-1;1,0;g_\eta)-\xi_D(u,s-1;1,-1;g_\eta),
\end{equation*}
namely,
\begin{equation}
\eta(u,s-1)=\widetilde{\xi}(u,s-1)+\widetilde{\xi}(u-1,s). \label{FR-BC}
\end{equation}
This can be regarded as an interpolation formula of \eqref{1-5-3} (see Example \ref{Exam-6-4}).
\end{example}
\fi
\begin{remark}
$\xi(u,s;y,w;g)$ can be slightly generalized with two elements $g,h\in\mathrm{GL}_2(\mathbb{C})$ and two appropriate paths $I,J$ which starts at $0$ and goes to $+\infty$ as
\begin{equation}
\xi(u,s;y,w;h,g;I,J)
=\frac{1}{\Gamma(s)\Gamma(u)}
\int_{J} dt\int_{I} dx
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-yx}}{j_D(g,e^t)j_D(h,e^x)}
\frac{1}{he^x-ge^t}.
\end{equation}
Since variables are treated completely symmetrically,
it is easy to see that the trivial symmetry
\begin{equation}
\xi(u,s;y,w;h,g;I,J)
=-\xi(s,u;w,y;g,h;J,I)
\end{equation}
holds. Moreover we can show that
\begin{equation}
\xi(u,s;y-1,w;h,g;(0,+\infty),(0,+\infty))
=\frac{1}{\det h}\xi_D(u,s;y,w;h^{-1}g),
\end{equation}
which implies \eqref{eq:Tr2}.
From the above we see that the pair $(g,h)$ does not give rise to a generalization,
while two pathes $I,J$ are essential because by this modification, it is possible to avoid cusps and to define $\xi_D$
for any element $g\in\mathrm{GL}_2(\mathbb{C})$
without the restriction
\eqref{eq:def_cond}.
\end{remark}
\section{Analytic continuation}\label{sec-5}
We give integral representations with Hankel contours to enlarge the
domain of $\xi_D(u,s;y,w;g)$. In the following, $H_{\epsilon,R}$ denotes the Hankel
contour, which consists of a path from $R$ to $\epsilon$ on the
real axis, around the origin counter clockwise with radius $\epsilon$,
and back to $R$, where $R\in(0,+\infty]$ and $\epsilon$ is an arbitrarily small
positive number. We abbreviate $H=H_{\epsilon,+\infty}$.
In the following proofs,
since the analyticities follow from the Morera theorem and the Fubini theorem,
we omit them.
\begin{lemma}
Let $k\in\mathbb{Z}_{\geq0}$. Then
$\Phi(z,u,y)$ has the integral representation
\begin{equation}\label{Phi-repre}
\Phi(z,u,y)
=
\frac{1}{\Gamma(u)(e^{2\pi iu}-1)}
\int_H x^{u-1}e^{-(y+k)x}\frac{z^k}{1-z e^{-x}}dx
+\sum_{n=0}^{k-1}\frac{z^n}{(y+n)^{u}}.
\end{equation}
This expression gives
the analytic continuation of
$\Phi(z,u,y)$ and is valid for
$z\in\mathbb{C}\setminus [1,+\infty)$ or $z=1$, $u\in\mathbb{C}$ and
$y\in\mathbb{C}\setminus (-\infty,0]$ with
$\Re y>-k$
except for appropriate branch cuts.
Therefore $\Phi(z,u,y)$ is analytically continued in
$z\in\mathbb{C}\setminus [1,+\infty)$ or $z=1$, $u\in\mathbb{C}$ and
$y\in\mathbb{C}\setminus (-\infty,0]$
except for appropriate branch cuts.
\end{lemma}
\begin{proof}
By \eqref{eq:FELT1} and Lemma \ref{lm:IRLT},
we have
\begin{equation}
\Phi(z,u,y)
=
\frac{1}{\Gamma(u)}
\int_0^{\infty} x^{u-1}e^{-(y+k)x}\frac{z^k}{1-z e^{-x}}dx
+\sum_{n=0}^{k-1}\frac{z^n}{(y+n)^{u}},
\end{equation}
which gives the integral representation with the Hankel contour.
\end{proof}
We study integral representations of $\xi_D(u,s;y,w;g)$
with Hankel contours by considering slightly general forms given in Lemma \ref{lm:DIR}, namely,
for $k\in\mathbb{Z}_{\geq0}$,
\begin{equation}
\label{eq:xiD_k}
\begin{split}
\xi_D(u,s;y,w;g)&=\frac{1}{\Gamma(s)\Gamma(u)}
\int_0^{\infty}\int_0^{\infty}
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-(y+k)x}}{j_D(g,e^t)}
\frac{(ge^t)^k}{1-(ge^t) e^{-x}}
dtdx
\\
&\qquad+
\frac{1}{\Gamma(s)}
\sum_{n=0}^{k-1}\frac{1}{(y+n)^{u}}\int_0^{\infty} t^{s-1}e^{-wt}\frac{(ge^t)^n}{j_D(g,e^t)}dt,
\end{split}
\end{equation}
by \eqref{eq:FELT2} and \eqref{eq:IR1}.
We denote the first term and the second term
by $\xi_{1,k}(u,s;y,w;g)$ and $\xi_{2,k}(u,s;y,w;g)$ respectively so that
\begin{equation}
\xi_D(u,s;y,w;g)=\xi_{1,k}(u,s;y,w;g)+\xi_{2,k}(u,s;y,w;g).
\end{equation}
First we give the explicit form of $\xi_{2,k}(u,s;y,w;g)$,
which gives its analytic continuation.
\begin{lemma}
\label{lm:xi_secondp}
Let $k\in\mathbb{Z}_{\geq0}$.
\begin{equation}
\label{eq:xi_secondp}
\begin{split}
&\xi_{2,k}(u,s;y,w;g)=
\sum_{n=0}^{k-1}
\frac{1}{(y+n)^{u}}
j_N(g,D_w^{-1})^n
\\
&\qquad\times \begin{cases}
\displaystyle
\frac{1}{d^{n+1}}
\frac{1}{w^s}
\qquad&(g\infty=\infty),
\\
\displaystyle
\frac{1}{c^{n+1}}
\frac{1}{(w+n+1)^s}
\qquad&(g0=\infty),
\\
\displaystyle
\frac{1}{c^{n+1}}
\frac{1}{n!}D_w^{n+1}
\Bigl(\prod_{j=1}^n(D_s^{-1}-w+j)\Bigr)
\Phi(-d/c,s,w)\qquad&(\text{otherwise}),
\end{cases}
\end{split}
\end{equation}
which gives the analytic continuation to the whole space in $u,s,y,w$ except for appropriate branch cuts.
\end{lemma}
\begin{proof}
If $g\infty=\infty$, then $c=0$ and
\begin{equation}
\begin{split}
\int_0^{\infty} t^{s-1}e^{-wt}\frac{(ge^t)^n}{j_D(g,e^t)}dt
&= \frac{1}{d^{n+1}}j_N(g,D_w^{-1})^n
\int_0^{\infty} t^{s-1}e^{-wt}dt
\\
&=\frac{\Gamma(s)}{d^{n+1}}j_N(g,D_w^{-1})^n\frac{1}{w^s},
\end{split}
\end{equation}
which implies \eqref{eq:xi_secondp} in this case.
If $g0=\infty$, then $d=0$ and
\begin{equation}
\begin{split}
\int_0^{\infty} t^{s-1}e^{-wt}\frac{(ge^t)^n}{j_D(g,e^t)}dt
&= \frac{1}{c^{n+1}}j_N(g,D_w^{-1})^n
\int_0^{\infty} t^{s-1}e^{-(w+n+1)t}dt
\\
&=\frac{\Gamma(s)}{c^{n+1}}j_N(g,D_w^{-1})^n\frac{1}{(w+n+1)^s},
\end{split}
\end{equation}
which implies \eqref{eq:xi_secondp} in this case.
If $g0,g\infty\neq \infty$, then $c,d\neq 0$ and
\begin{equation}
\begin{split}
\int_0^{\infty} t^{s-1}e^{-wt}\frac{(ge^t)^n}{j_D(g,e^t)}dt
&=\frac{1}{c^{n+1}}j_N(g,D_w^{-1})^nD_w^{n+1}
\int_0^{\infty} t^{s-1}e^{-wt}\frac{1}{(1-(-d/c)e^{-t})^{n+1}}dt
\\
&=
\frac{\Gamma(s)}{c^{n+1}}j_N(g,D_w^{-1})^nD_w^{n+1}
\frac{1}{n!}
\Bigl(\prod_{j=1}^n(D_s^{-1}-w+j)\Bigr)
\Phi(-d/c,s,w),
\end{split}
\end{equation}
by Lemma \ref{lm:DS}.
If $-d/c=T$ with $1<T<\infty$, then $cT+d=0$, which implies $\{\infty\}\in g((1,+\infty))$ and
contradicts to the assumption \eqref{eq:def_cond}
and hence $-d/c\in\mathbb{C}\setminus(1,+\infty)$.
Hence we obtain \eqref{eq:xi_secondp} in this case.
\end{proof}
\begin{theorem}
\label{thm:domain2}
Let $k\in\mathbb{Z}_{\geq0}$.
Assume $g1\neq1$.
Then
we have
\begin{multline}
\label{eq:ext3k}
\xi_D(u,s;y,w;g)\\
\begin{aligned}
&=\frac{1}{\Gamma(s)\Gamma(u)(e^{2\pi is}-1)(e^{2\pi iu}-1)}
\int_{H_{\epsilon,1}} dx \int_{H_{\epsilon,1}} dt
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-(y+k)x}}{j_D(g,e^t)}
\frac{(ge^t)^k}{1-(ge^t) e^{-x}}
\\
&\qquad+
\frac{1}{\Gamma(s)\Gamma(u)(e^{2\pi is}-1)}
\int_1^\infty dx \int_{H_{\epsilon e^{-x},1}} dt
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-(y+k)x}}{j_D(g,e^t)}
\frac{(ge^t)^k}{1-(ge^t) e^{-x}}
\\
&\qquad+
\frac{1}{\Gamma(s)\Gamma(u)(e^{2\pi iu}-1)}
\int_1^\infty dt \int_{H_{\epsilon e^{-t},1}} dx
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-(y+k)x}}{j_D(g,e^t)}
\frac{(ge^t)^k}{1-(ge^t) e^{-x}}
\\
&\qquad+
\frac{1}{\Gamma(s)\Gamma(u)}
\int_1^\infty dt \int_1^\infty dx
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-(y+k)x}}{j_D(g,e^t)}
\frac{(ge^t)^k}{1-(ge^t) e^{-x}}
\\
&\qquad+\xi_{2,k}(u,s;y,w;g),
\end{aligned}
\end{multline}
which except for the branch cuts due to $\xi_{2,k}(u,s;y,w;g)$,
gives the analytic continuation for
$u, s\in\mathbb{C}$, $\Re y>\nu_\infty-k$, $\Re w>\mu_\infty-1+k(\delta_{g\infty,\infty}-\delta_{g\infty,0})$, and
the continuous extension for
$\Re y=\nu_\infty-k$ when $\Re u<0$
and $\Re w=\mu_\infty-1+k(\delta_{g\infty,\infty}-\delta_{g\infty,0})$ when $\Re s<0$.
\end{theorem}
\begin{proof}
There exists $M>0$ such that for all sufficiently large $t>R'$,
\begin{equation}
\begin{split}
|ge^t| &\leq
\begin{cases}
Me^{-t}\qquad&(g\infty=0),\\
Me^t\qquad&(g\infty=\infty),\\
M\qquad&(\text{otherwise})
\end{cases}\\
&=Me^{(\delta_{g\infty,\infty}-\delta_{g\infty,0})t}
\end{split}
\end{equation}
and for all sufficiently small $|t|<\epsilon'$
\begin{equation}
\begin{split}
|ge^t| &\leq
\begin{cases}
M|t|\qquad&(g1=0),\\
M|t|^{-1}\qquad&(g1=\infty),\\
M\qquad&(\text{otherwise})
\end{cases}\\
&=M|t|^{(\delta_{g1,0}-\delta_{g1,\infty})}.
\end{split}
\end{equation}
Assume $g1\neq1$.
By Lemma \ref{lm:est},
\begin{multline}
\Bigl|\frac{t^{s-1}x^{u-1}e^{-wt}e^{-yx}}{j_D(g,e^t)}
\frac{1}{1-(ge^t) e^{-x}}\Bigr|
\\
\leq
M'
\begin{cases}
e^{(\mu_\infty-1-\Re w)t}
e^{(\nu_\infty -\Re y)x}\qquad&((t,x)\in(\epsilon',+\infty)^2),\\
|t|^{\Re s-1}
|x|^{\Re u-1}\qquad&((t,x)\in W_{0,\epsilon',R'}^2).
\end{cases}
\end{multline}
Thus for $\Re u>\nu_1,
\Re s>\mu_1+k(\delta_{g1,\infty}-\delta_{g1,0}),
\Re y>\nu_\infty-k,
\Re w>\mu_\infty-1+k(\delta_{g\infty,\infty}-\delta_{g\infty,0})$,
we see that
\begin{equation}
\int_{\epsilon'}^\infty
\int_{\epsilon'}^\infty
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-(y+k)x}}{j_D(g,e^t)}
\frac{(ge^t)^k}{1-(ge^t) e^{-x}} dtdx
\end{equation}
and
\begin{multline}
\int_0^{R'}
\int_0^{R'}
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-(y+k)x}}{j_D(g,e^t)}
\frac{(ge^t)^k}{1-(ge^t) e^{-x}} dtdx
\\
=\frac{1}{(e^{2\pi is}-1)(e^{2\pi iu}-1)}
\int_{H_{\epsilon,R'}} \int_{H_{\epsilon,R'}}
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-(y+k)x}}{j_D(g,e^t)}
\frac{(ge^t)^k}{1-(ge^t) e^{-x}} dtdx
\end{multline}
are integrable. Let
\begin{equation}
A=\int_{R'}^\infty dx
\int_0^{\epsilon'} dt
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-(y+k)x}}{j_D(g,e^t)}
\frac{(ge^t)^k}{1-(ge^t) e^{-x}}.
\end{equation}
If $g1=\infty$, then by \eqref{eq:dist1}, the denominator does not vanish
for $\epsilon e^{-x}\geq |t|$. Hence
\begin{equation}
\label{eq:HA}
A=\frac{1}{e^{2\pi i s}-1}\int_{R'}^\infty dx
\int_{H_{\epsilon e^{-x},\epsilon'}} dt
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-(y+k)x}}{j_D(g,e^t)}
\frac{(ge^t)^k}{1-(ge^t) e^{-x}}.
\end{equation}
If $g1\neq\infty$, then it is easier to see that the denominator does not vanish in the same region as the above, and \eqref{eq:HA} holds.
In the region $(0,\epsilon')\times (R',\infty)$, the same argument works well and we have the assertion by rearranging the regions.
\end{proof}
\begin{remark}
For $k\in\mathbb{Z}_{<0}$, we have similar results as in Lemma \ref{lm:xi_secondp} and Theorem \ref{thm:domain2} by use of \eqref{eq:FELT2}, though we omit the detail.
\end{remark}
In the case $k=0$, we obtain the following theorem.
\begin{theorem}
\label{thm:domain3}
If $g1\notin\{1,\infty\}$, then we have
\begin{equation}
\label{eq:ext1}
\xi_D(u,s;y,w;g)=\frac{1}{\Gamma(s)\Gamma(u)(e^{2\pi is}-1)}
\int_H dt \int_0^{\infty}dx
\frac{t^{s-1}x^{u-1}e^{-wt}e^{-yx}}{j_D(g,e^t)}
\frac{1}{1-(ge^t) e^{-x}},
\end{equation}
which gives the analytic continuation for
$\Re u>\nu_1$, $s\in\mathbb{C}$, $\Re y>\nu_\infty$, $\Re w>\mu_\infty-1$, and
the continuous extension for
$\Re w=\mu_\infty-1$ when $\Re s<0$.
\end{theorem}
\begin{proof}
If $g1\notin\{1,\infty\}$,
then
in the proof of Theorem \ref{thm:domain2},
the radius of the Hankel contours can be taken uniformly in $t$
while $x\in(0,+\infty)$.
Thus patching contours, we have the assertion.
\end{proof}
When $u$, $s$ or both are nonpositive integers,
further analytic continuation is possible, which leads us to generalizations of the poly-Bernoulli polynomials.
\begin{theorem}\label{AC-uyw}
Assume $g1\neq1$.
For $s=-m\in\mathbb{Z}_{\leq0}$,
$\xi_D(u,s;y,w;g)$ is analytically continued
to
$u,y,w\in\mathbb{C}$ except for appropriate branch cuts
and we have the integral representation
\begin{multline}\label{Eq-xi-2}
\xi_D(u,-m;y,w;g)\\
\begin{aligned}
&=\frac{(-1)^m m!}{2\pi i}\frac{1}{\Gamma(u)(e^{2\pi iu}-1)}
\int_{H} dx
\int_{|t|=\epsilon e^{{}-\Re x}} dt
\frac{t^{-m-1}x^{u-1}e^{-wt}e^{-(y+k)x}}{j_D(g,e^t)}
\frac{(ge^t)^k}{1-(ge^t) e^{-x}}
\\
&\qquad+\xi_{2,k}(u,-m;y,w;g).
\end{aligned}
\end{multline}
For $u=-m\in\mathbb{Z}_{\leq0}$,
$\xi_D(u,s;y,w;g)$ is analytically continued
to
$s,y,w\in\mathbb{C}$ except for appropriate branch cuts.
\end{theorem}
\begin{proof}
If $s=-m\in\mathbb{Z}_{\leq0}$, then by Theorem \ref{thm:domain2}, we see that the Hankel contour in the first and the second terms of \eqref{eq:ext3k} with respect to $t$ reduces to a small circle around the origin
and that the third and the fourth terms vanish.
Thus we obtain the integral representation.
The integral converges for any $w\in\mathbb{C}$. Since the analytic continuation is valid for $\Re y>\nu_\infty-k$ with arbitrary $k\in\mathbb{Z}_{\geq0}$, we have the first assertion.
The second assertion follows from Corollary \ref{thm:trans3}.
\end{proof}
\begin{example}\label{Exam-5-eta-xi}\ \
For $g=g_\eta,g_\xi$ in Example \ref{Exam-3-1}, we see that $g1\neq 1$. Hence, by Theorem \ref{thm:domain2}, we see that $\xi_D(u,s;y,w;g_\eta)$ is analytic for $u,s\in \mathbb{C}$, $\Re y>\nu_\infty$ and $\Re w>\mu_\infty-1$ with $\mu_\infty+\nu_\infty=1$. In the case when $(y,w)=(1,0)$, $\eta(u;s)=\xi_D(u,s;1,0;g_\eta)$ is analytic for $u,s\in \mathbb{C}$.
Furthermore, when $(y,w)=(1,-1)$,
we can define
\begin{equation}
\widetilde{\xi}(u;s)=\xi_N(u,s;0,-1;g_\eta)=\xi_D(u,s;1,-1;g_\eta)\label{tildexi-xi}
\end{equation}
for $u,s\in \mathbb{C}$ with $\Re u<0$ and $\Re s<0$. In particular when $u=-k\in\mathbb{Z}_{\leq0}$, by Theorem \ref{AC-uyw}, we see that $\widetilde{\xi}(-k;s)$ can be analytically continued to $s\in\mathbb{C}$, which was already considered in \cite[Section 4]{Kaneko-Tsumura2015}.
Also $\xi_D(u,s;y,w;g_\xi)$ is analytic for $u,s\in \mathbb{C}$, $\Re y>0$ and $\Re w>-1$.
In particular, $\xi(u;s)=\xi_D(u,s;1,0;g_\xi)$ is analytic for $u,s\in \mathbb{C}$.
\end{example}
\begin{example}\label{Exam-5-6}\ \
Consider $\widetilde{\xi}(u;s)=\xi_D(u,s;1,-1;g_\eta)$. By \eqref{dual-1} with $(n,y,w,g)=(1,1,1,g_\eta)$, we obtain
\begin{equation}
\widetilde{\xi}(u-1,s)=\widetilde{\xi}(s-1,u), \label{dual-tilde-xi}
\end{equation}
which interpolates \eqref{1-5-2} (see Example \ref{Exam-6-1}).
Note that from \eqref{eq:Tr3} with $(y,w)=(0,0)$, we have
$$\xi_D(u,s;0,0;g_\eta)=\xi_N(s,u;0,-1;g_\eta)=\xi_D(s,u;1,-1;g_\eta).$$
Therefore it follows from \eqref{dual-tilde-xi} that
\begin{equation}
\xi_D(u,s;0,0;g_\eta)=\xi_D(u-1,s+1;1,-1;g_\eta)=\widetilde{\xi}(u-1,s+1). \label{eq:Tr-xi}
\end{equation}
Let $g=g_{\xi}$ and $\xi(u;s):=\xi_D(u,s;1,0;g_\xi)$ in Example \ref{Exam-3-1}. Since $g_{\xi}^{-1}=
\begin{pmatrix} 0 & 1 \\ -1 & 1
\end{pmatrix},$
we have $g_{\xi}^{-1}T=1/(1-T)$ which satisfies \eqref{eq:def_cond}.
Let $h=g_\xi^{-1}$. Then
$hT=1/(1-T)$, namely, $h1=\infty$, $h\infty=0$ and
\begin{equation*}
h([1,+\infty])\cap[1,+\infty]=\{\infty \}= V(h).
\end{equation*}
Hence we obtain $\mu_\infty=0$ and $\nu_{1}=0$.
Therefore, noting \eqref{eq:Tr2} with $(y,w,g)=(0,0,g_\xi)$, we can define
\begin{align}
\check{\xi}(u;s):&=\xi_D(u,s;0,-1;g_\xi^{-1}) =-\xi_D(s,u;0,-1;g_\xi)
\label{def-check-xi}
\end{align}
for $\Re u<0$ and $\Re s<0$.
Setting $(n,y,w,g)=(1,1,0,g_\xi)$ in \eqref{dual-3} and noting \eqref{xi-D-N}, we obtain
\begin{align*}
& \xi_{D}(u-1,s;1,0;g_\xi)=\xi_{D}(s-1,u;0,-1;g_\xi^{-1}).
\end{align*}
Therefore we see from \eqref{def-check-xi} that
\begin{align}
& \xi(u-1;s)=\check{\xi}(s-1;u), \label{xi-dual-2}
\end{align}
which also interpolates \eqref{1-5-2} (see Example \ref{Exam-6-gene}).
The symbol $\check{\xi}$ is derived from this fact. From this relation,
$\check{\xi}(s;u)$ is analytic for $u,s\in \mathbb{C}$.
\if0
On the other hand, setting $(y,w,g)=(0,0,g_\xi)$ in Theorem \ref{thm:trans1}, we have
\begin{equation*}
\xi_D(u,s;1,-1;g_\xi)-\xi_D(u,s;1,0;g_\xi)=\xi_D(u,s;0,-1;g_\xi),
\end{equation*}
namely,
\begin{equation}
\xi_D(u,s;1,-1;g_\xi)=\xi(u;s)-\check{\xi}(s,u)=\xi(u,s)-\xi(u-1,s+1). \label{B-C-interpolation}
\end{equation}
We will confirm that this is an interpolation of \eqref{1-5-3} (see Example \ref{Exam-6-4}).
\fi
\end{example}
\begin{example}\label{Exam-5-6-3}
From \eqref{dual-1} with $n=1$, we obtain
\begin{multline*}
j_D(g^{-1},D_y^{-1})D_w^{-2}(D_u^{-1}-y+1)\xi_D(u,s;y,w;g)
\\
=
\Bigl(-\frac{1}{\det g}\Bigr)^2j_D(g,D_w^{-1})D_y^{-2}(D_s^{-1}-w+1)
\xi_D(s,u;w,y;g^{-1}).
\end{multline*}
Substituting \eqref{eq:Tr3} into the right-hand side and noting $j_D(g,D_w^{-1})w=wj_D(g,D_w^{-1})-cD_w^{-1}$, we have
\begin{multline}
\begin{aligned}
& j_D(g^{-1},D_y^{-1})D_w^{-2}(D_u^{-1}-y+1)\xi_D(u,s;y,w;g)
\\
&=
\Bigl(-\frac{1}{\det g}\Bigr)^2
(-\det g)
j_D(g,D_w^{-1})D_y^{-2}(D_s^{-1}-w+1)
\xi_D(u,s;y+1,w-1;g) \\
&=
-\frac{1}{\det g}
D_y^{-2}((D_s^{-1}-w+1)
j_D(g,D_w^{-1})+cD_w^{-1})
\xi_D(u,s;y+1,w-1;g)\\
&=
-\frac{1}{\det g}
D_y^{-2}(D_s^{-1}-w+1)
j_D(g,D_w^{-1})\xi_D(u,s;y+1,w-1;g)
\\
&\qquad
-\frac{1}{\det g}
cD_y^{-2}D_w^{-1}
\xi_D(u,s;y+1,w-1;g).\label{eq:1.7}
\end{aligned}
\end{multline}
Moreover,
substituting \eqref{eq:rem-4-2} into the right-hand side of \eqref{eq:1.7}, we obtain
\begin{multline}\label{eq:B=C+C}
j_D(g^{-1},D_y^{-1})D_w^{-2}(D_u^{-1}-y+1)\xi_D(u,s;y,w;g)
\\
\begin{aligned}
&=
-\frac{1}{\det g}
D_y^{-2}(D_s^{-1}-w+1)
(j_N(g,D_w^{-1})\xi_{D}(u,s;y+2,w-1;g)+(y+1)^{-u}(w-1)^{-s})
\\
&\qquad
-\frac{1}{\det g}
cD_y^{-2}D_w^{-1}
\xi_D(u,s;y+1,w-1;g).
\end{aligned}
\end{multline}
In particular, setting $(y,w,g_\eta)=(1,1,g_\eta)$, we obtain
\begin{equation*}
\xi_D(u-1,s;1,-1;g_\eta)=\xi_D(u,s-1;1,0;g_\eta)-\xi_D(u,s-1;1,-1;g_\eta),
\end{equation*}
namely,
\begin{equation}
\eta(u,s-1)=\widetilde{\xi}(u,s-1)+\widetilde{\xi}(u-1,s). \label{FR-BC}
\end{equation}
This can be regarded as an interpolation formula of \eqref{1-5-3} (see Example \ref{Exam-6-4}).
\end{example}
\begin{remark}
If $g1=1$, then the analytic properties of $\xi_D(u,s;y,w;g)$ in $u,s$ drastically change because the two paths of the integral can not be replaced by the Hankel contours
due to the singularites of the integrand near the origin in $t,x$.
In this case, by use of the technique employed in the case of multiple zeta functions (see \cite{Komori2010}), we see that $\xi_D(u,s;y,w;g)$ has possible singularities on the hyperplanes $s+u\in\mathbb{Z}$.
\end{remark}
\section{Poly-Bernoulli polynomials associated with $\mathrm{GL}_2(\mathbb{C})$}\label{sec-6}
In this section, let $g \in \mathrm{GL}_2(\mathbb{C})$ satisfying \eqref{eq:def_cond} and $g1\neq 1$.
We generalize the poly-Bernoulli polynomials from the result in Theorem \ref{AC-uyw}.
\begin{definition}\label{g-Bernoulli}\ \
For $u,y,w\in \mathbb{C}$ except for appropriate branch cuts, we define the poly-Bernoulli polynomials $\{\mathbb{B}_m^{(u)}(y,w;g)\}$ associated with $g$ by
\begin{equation}
\mathbb{B}_m^{(u)}(y,w;g)=\xi_D(u,-m;y,w;g)\quad (m\in \mathbb{Z}_{\geq 0}). \label{eq:val-xi1}
\end{equation}
\end{definition}
In particular when $g1\neq\infty$,
it follows from Lemma \ref{lm:IRLT} and Theorem \ref{thm:domain3} that
\begin{equation}
\label{eq:xi-rep}
\xi_D(u,s;y,w;g)=\frac{1}{\Gamma(s)(e^{2\pi is}-1)}
\int_H
{t^{s-1}e^{-wt}}\frac{\Phi(ge^t,u,y) }{j_D(g,e^t)}dt
\end{equation}
for $\Re u>\nu_1$, $s\in\mathbb{C}$, $\Re y>\nu_\infty$ and $\Re w>\mu_\infty-1$.
Let $s \to -m\in \mathbb{Z}_{\leq 0}$. Then we obtain the following result.
\begin{theorem}\label{Th-6-2}\
If $g1\neq\infty$, then
\begin{equation}
e^{wt}\frac{\Phi(ge^{-t},u,y)}{j_D(g,e^{-t})}=\sum_{m=0}^\infty \mathbb{B}_m^{(u)}(y,w;g)\frac{t^m}{m!}. \label{P-Ber-g}
\end{equation}
for $u,y,w\in \mathbb{C}$ except for appropriate branch cuts.
$\mathbb{B}_m^{(u)}(y,w;g)$ is a polynomial in $w$.
\end{theorem}
\begin{example}\label{Exam-6-1}\ \ We consider the poly-Bernoulli polynomials defined by
\begin{equation}
e^{-wt}\frac{\mathrm{Li}_{u}(1-e^{-t})}{1-e^{-t}}=\sum_{m=0}^\infty B_m^{(u)}(w)\frac{t^m}{m!}\quad (u\in \mathbb{C}) \label{P-Ber-poly}
\end{equation}
(see Coppo--Candelpergher \cite{CC2010} in the case $u\in \mathbb{Z}$).
We define $B_m^{(u)}:=B_m^{(u)}(0)$ and $C_m^{(u)}:=B_m^{(u)}(1)$ which are generalizations of \eqref{1-1} and \eqref{1-2}. Furthermore, we have $B_m^{(1)}(w)=B_m(1-w)=(-1)^mB_m(w)$, where $B_m(w)$ is the classical Bernoulli polynomial.
From Example \ref{Exam-3-1}, for $g=g_{\eta}=
\begin{pmatrix} -1 & 1 \\ 0 & 1
\end{pmatrix}$,
we see that the left-hand side of \eqref{P-Ber-g} is equal to that of \eqref{P-Ber-poly} with replacing $-w$ by $w$.
Hence we have $\mathbb{B}_m^{(u)}(1,w;g_\eta)=B_m^{(u)}(-w)$. Note that $\mathbb{B}_m^{(k)}(1,w;g_\eta)$ $(k\in \mathbb{Z})$ coincides with the poly-Bernoulli polynomial defined by Bayad and Hamahata in \cite{BH2011-1}.
We emphasize that
\begin{equation}
\begin{split}
\eta(u;-m)&=\xi_D(u,-m;1,0;g_\eta)=\mathbb{B}_m^{(u)}(1,0;g_\eta)=B_m^{(u)},\\
\tilde{\xi}(u;-m)&=\xi_D(u,-m;1,-1;g_\eta)=\mathbb{B}_m^{(u)}(1,-1;g_\eta)=C_m^{(u)}
\end{split}
\label{eta-xi-vals}
\end{equation}
for $m\in\mathbb{Z}_{\geq 0}$. Hence, from \eqref{dual-tilde-xi}, we obtain \eqref{1-5-2}.
Further, from \eqref{eq:Tr-xi}, we obtain
\begin{equation}
\mathbb{B}_m^{(u)}(0,0;g_\eta)=\mathbb{B}_{m-1}^{(u-1)}(1,-1;g_\eta)=C_{m-1}^{(u-1)}\quad (m\in\mathbb{Z}_{\geq 1}). \label{C-vals}
\end{equation}
Therefore it follows from \eqref{P-Ber-g} with $(y,w,g)=(0,0,g_\eta)$ that
\begin{align}
\Phi(1-e^{-t},u,0)&=\mathrm{Li}_{u}(1-e^{-t}) =\sum_{m=1}^\infty C_{m-1}^{(u-1)}\frac{t^{m}}{m!}.\label{gf-C-2}
\end{align}
\end{example}
Combining \eqref{Eq-xi-2} with $k=0$ and \eqref{eq:val-xi1}, we obtain the following.
\begin{theorem}\ \
For $y,w\in \mathbb{C}$,
\begin{equation}
\frac{e^{wt}e^{yx}}{j_D(g,e^{-t})}
\frac{1}{1-(ge^{-t}) e^{x}}=\sum_{k=0}^\infty \sum_{l=0}^\infty \mathbb{B}_k^{(-l)}(y,w;g)\frac{t^k x^l}{k!l!}. \label{gene-Bernoulli}
\end{equation}
$\mathbb{B}_k^{(-l)}(y,w;g)$ is a polynomial in $y$ and $w$.
\end{theorem}
$\xi_D(u,s;y,w;g)$ or $\mathbb{B}_m^{(u)}(y,w;g)$
satisfies simple transformation formulas for $g=hf$ with a general $h\in\mathrm{GL}_2(\mathbb{C})$ and a special $f\in\mathrm{GL}_2(\mathbb{C})$.
\begin{theorem}
\label{thm:simple_trans}
Let $h\in\mathrm{GL}_2(\mathbb{C})$ and $\alpha\in\mathbb{C}\setminus\{0\}$.
\begin{enumerate}
\item For $f=\begin{pmatrix}
\alpha & 0 \\ 0 & \alpha
\end{pmatrix}$,
\begin{equation}
\xi_D(u,s;y,w;hf)=\frac{1}{\alpha}\xi_D(u,s;y,w;h).
\end{equation}
\item For $f=\begin{pmatrix}
0 & 1 \\ 1 & 0
\end{pmatrix}$, which corresponds to the inversion $T\mapsto 1/T$,
\begin{equation}\label{Inverse}
\mathbb{B}_m^{(u)}(y,w;hf)=(-1)^m \mathbb{B}_m^{(u)}(y,-w-1;h).
\end{equation}
\end{enumerate}
\end{theorem}
\begin{proof}
The first statement follows directly from the definition.
We show the second statement.
\begin{multline*}
\mathbb{B}_m^{(u)}(y,w;hf)
\\
\begin{aligned}
&=\xi_D(u,-m;y,w;hf)
\\
&=
\frac{(-1)^m m!}{2\pi i}\frac{1}{\Gamma(u)(e^{2\pi iu}-1)}
\int_{H} dx
\int_{|t|=\epsilon e^{{}-\Re x}} dt
\frac{t^{-m-1}x^{u-1}e^{-wt}e^{-yx}}{j_D(hf,e^t)}
\frac{1}{1-(hfe^t) e^{-x}}
\\
&=
\frac{(-1)^m m!}{2\pi i}\frac{1}{\Gamma(u)(e^{2\pi iu}-1)}
\int_{H} dx
\int_{|t|=\epsilon e^{{}-\Re x}} dt
\frac{t^{-m-1}x^{u-1}e^{-wt}e^{-yx}}{j_D(h,e^{-t})j_D(f,e^t)}
\frac{1}{1-(he^{-t}) e^{-x}}
\\
&=
\frac{(-1)^m m!}{2\pi i}\frac{1}{\Gamma(u)(e^{2\pi iu}-1)}
\int_{H} dx
\int_{|t|=\epsilon e^{{}-\Re x}} dt
\frac{t^{-m-1}x^{u-1}e^{-(w+1)t}e^{-yx}}{j_D(h,e^{-t})}
\frac{1}{1-(he^{-t}) e^{-x}}
\\
&=(-1)^{m+1-1}
\frac{(-1)^m m!}{2\pi i}\frac{1}{\Gamma(u)(e^{2\pi iu}-1)}
\\
&\qquad\times
\int_{H} dx
\int_{|v|=\epsilon e^{{}-\Re x}} dv
\frac{v^{-m-1}x^{u-1}e^{(w+1)v}e^{-yx}}{j_D(h,e^v)}
\frac{1}{1-(he^v) e^{-x}}
\\
&=(-1)^m \mathbb{B}_m^{(u)}(y,-w-1;h),
\end{aligned}
\end{multline*}
where we changed variables as $v=-t$.
\end{proof}
\if0
\begin{example}\label{Exam-6-3}
Let $w=0$ and $y=1$. Then,
by Example \ref{Exam-6-1} and \eqref{eq:val-xi1}, we see that $\eta(k;-m)=B_m^{(k)}$ which was given in \cite[Theorems 2.3 and 4.4]{Kaneko-Tsumura2015}.
\end{example}
\fi
\begin{example}\label{Exam-6-gene} \ Consider $g_\eta$ and $g_\xi$ in Example \ref{Exam-3-1}. Since $g_\xi=g_\eta f$ for $f=\begin{pmatrix}
0 & 1 \\ 1 & 0
\end{pmatrix}$, we have from \eqref{Inverse} that
\begin{equation}\label{Inverse-B}
\mathbb{B}_m^{(u)}(y,w;g_\xi)=(-1)^m \mathbb{B}_m^{(u)}(y,-w-1;g_\eta).
\end{equation}
Therefore, from \eqref{eta-xi-vals}, we obtain
\begin{equation}
\xi(u;-m)=\mathbb{B}_m^{(u)}(1,0;g_\xi)=(-1)^m \mathbb{B}_m^{(u)}(1,-1;g_\eta)=(-1)^m C_m^{(u)} \label{xi-vals}
\end{equation}
for $m\in \mathbb{Z}_{\geq 0}$, which includes \eqref{1-10}. Hence, by \eqref{xi-dual-2} and \eqref{1-5-2}, we obtain
\begin{equation}
\check{\xi}(-l;-m)=\xi(-m-1;-l+1)=(-1)^{l-1}C_{l-1}^{(-m-1)}=(-1)^{l-1}C_m^{(-l)}\label{Ber-relation-2}
\end{equation}
for $l\in \mathbb{Z}_{\geq 1}$ and $m\in \mathbb{Z}_{\geq 0}$. It follows from \eqref{xi-vals} and \eqref{Ber-relation-2} that \eqref{xi-dual-2} is an interpolation formula of \eqref{1-5-3}.
\if0
Moreover, using the duality relation \eqref{Dual-F-4} (which will be proved later), we can compute
\begin{align*}
\mathbb{B}_k^{(-l)}(y,w;g_\eta)& =\mathbb{B}_l^{(-k)}(w+1,y-1;g_\eta) \\
& =(-1)^l \mathbb{B}_l^{(-k)}(w+1,-y;g_\xi)=(-1)^{l+1}\mathbb{B}_k^{(-l)}(-y+1,w;g_\xi^{-1}).
\end{align*}
Combining these results, we obtain
\begin{equation}\label{Ber-relation}
\mathbb{B}_k^{(-l)}(y,w;g_\eta)=(-1)^k \mathbb{B}_k^{(-l)}(y,-w-1;g_\xi)=(-1)^{l+1}\mathbb{B}_k^{(-l)}(-y+1,w;g_\xi^{-1}).
\end{equation}
Hence, by \eqref{def-check-xi}, we have
\begin{equation}
\check{\xi}(-l;-m)=\mathbb{B}_m^{(-l)}(0,-1;g_\xi^{-1})=(-1)^{l+1} \mathbb{B}_m^{(-l)}(1,-1;g_\eta)=(-1)^{l+1}C_m^{(-l)}\quad (l,m\in \mathbb{Z}_{\geq 0}). \label{Ber-relation-2}
\end{equation}
Therefore, using \eqref{xi-dual-2} and \eqref{1-5-2}, we obtain
\begin{equation}
{\xi}(-k-1;-m)=\check{\xi}(-m-1;-k)=(-1)^mC_k^{(-m-1)}=(-1)^mC_{m}^{(-k-1)} \label{Ber-relation-3}
\end{equation}
for $k,m\in \mathbb{Z}_{\geq 0}$,
while Arakawa and Kaneko \cite{AK1999} defined $\xi(k;s)$ only for $k\in \mathbb{Z}_{\geq 1}$ and considered \eqref{xi-vals}.
\fi
\end{example}
\begin{theorem}[Difference relations]
\label{thm:DR}
For $g=
\begin{pmatrix} a & b \\ c & d
\end{pmatrix}$,
\begin{multline}
a\mathbb{B}_m^{(u)}(y+1,w-1;g)+b\mathbb{B}_m^{(u)}(y+1,w;g)\\=
c\mathbb{B}_m^{(u)}(y,w-1;g)+d\mathbb{B}_m^{(u)}(y,w;g)-y^{-u}w^{-s}
\label{eq:B-C}
\end{multline}
holds for $u,y,w\in\mathbb{C}$ except for appropriate branch cuts.
\end{theorem}
\begin{proof}
Letting $s=-m\in \mathbb{Z}_{\leq 0}$ in Theorem \ref{thm:trans1} and using Theorem \ref{Th-6-2}, we obtain the assertion.
\end{proof}
\if0
\begin{example}\label{Exam-6-4}
For $g=g_{\eta}=
\begin{pmatrix} -1 & 1 \\ 0 & 1
\end{pmatrix}$,
we consider \eqref{eq:B-C} with $(y,w)=(0,0)$.
By Example \ref{Exam-6-1}, we see that
\eqref{eq:B-C} gives \eqref{1-5-3}, namely,
$$B_m^{(u)}=C_{m}^{(u)}+C_{m-1}^{(u-1)}$$
(see \cite[Section 3]{AK1999} with $u\in \mathbb{Z}$). In fact, we set $(x,y,g)=(0,0,g_\eta)$ in \eqref{P-Ber-g}, we have
\begin{align}
\Phi(1-e^{-t},u,0)&=\mathrm{Li}_{u}(1-e^{-t}) \notag\\
& =\int_{0}^{t}\frac{\mathrm{Li}_{u-1}(1-e^{-v})}{e^v-1}dv=\sum_{m=0}^\infty C_m^{(u-1)}\frac{t^{m+1}}{(m+1)!}.\label{gf-C-2}
\end{align}
Hence we obtain $\mathbb{B}_m^{(u)}(0,0;g_\eta)=C_{m-1}^{(u-1)}$.
\end{example}
\fi
\begin{example}\label{Exam-6-4} \
It follows from \eqref{eta-xi-vals} and \eqref{C-vals} that \eqref{eq:B-C} with $(y,w,g)=(0,0,g_\eta)$ gives
\begin{equation}
B_m^{(u)}=C_{m}^{(u)}+C_{m-1}^{(u-1)} \label{B-C-relation}
\end{equation}
(see \cite[Section 3]{AK1999} with $u\in \mathbb{Z}$).
It is to be noted that \eqref{FR-BC} with $s=-m+1$ implies \eqref{B-C-relation}.
\if0
It follows from \eqref{eta-xi-vals} and \eqref{C-vals} that \eqref{eq:B-C} with $(y,w,g)=(0,0,g_\eta)$ gives
\begin{equation}
B_m^{(u)}=C_{m}^{(u)}+C_{m-1}^{(u-1)} \label{B-C-relation}
\end{equation}
(see \cite[Section 3]{AK1999} with $u\in \mathbb{Z}$).
In fact, we set $(x,y,g)=(0,0,g_\eta)$ in \eqref{P-Ber-g}, we have
\begin{align}
\Phi(1-e^{-t},u,0)&=\mathrm{Li}_{u}(1-e^{-t}) \notag\\
& =\int_{0}^{t}\frac{\mathrm{Li}_{u-1}(1-e^{-v})}{e^v-1}dv=\sum_{m=0}^\infty C_m^{(u-1)}\frac{t^{m+1}}{(m+1)!}.\label{gf-C-2}
\end{align}
Hence we obtain $\mathbb{B}_m^{(u)}(0,0;g_\eta)=C_{m-1}^{(u-1)}$.
\fi
\end{example}
Next we prove the duality relations for poly-Bernoulli polynomials associated with $g$ which include ordinary duality relations \eqref{1-5} and \eqref{1-5-2}. Let ${n \brack m}$ $(n,m\in \mathbb{Z}_{\geq 0})$ be the Stirling numbers of the first kind defined by
\begin{align*}
& {0 \brack 0}=1,\quad {0 \brack m}=0\ (m\geq 1),\quad
\prod_{j=0}^{n-1}(X+j)=\sum_{m=0}^n {n \brack m}X^m\ (n\geq 1).
\end{align*}
Note that
\begin{align*}
& \prod_{j=0}^{n-1}(X-j)=\sum_{m=0}^n (-1)^{n+m}{n \brack m}X^m\ (n\geq 1).
\end{align*}
\begin{theorem}[Duality relations]\label{Th-D-F}\ \
Let $g=
\begin{pmatrix} a & b \\ c & d
\end{pmatrix}$.
For $k,m,n\in \mathbb{Z}_{\geq 0}$ and $y,w \in \mathbb{C}$,
\begin{align}
& \sum_{\tau=0}^{n}\binom{n}{\tau}(-c)^\tau a^{n-\tau}\sum_{j=0}^n {n \brack j}\sum_{\sigma=0}^{j}\binom{j}{\sigma}(\tau-y+1)^{j-\sigma}\mathbb{B}_m^{(-k-\sigma)}(y-\tau,w-n-1;g) \notag \\
& =\frac{(-1)^{n+1}}{{\rm det}\,g} \sum_{\tau=0}^{n}\binom{n}{\tau}c^\tau d^{n-\tau}\sum_{j=0}^n {n \brack j}\sum_{\sigma=0}^{j}\binom{j}{\sigma}(\tau-w+1)^{j-\sigma}\mathbb{B}_k^{(-m-\sigma)}(w-\tau,y-n-1;g^{-1}). \label{Dual-F-1}\\
& \sum_{\tau=0}^{n}\binom{n}{\tau}d^\tau (-b)^{n-\tau}\sum_{j=0}^n (-1)^{j}{n \brack j}\sum_{\sigma=0}^{j}\binom{j}{\sigma}(\tau-y-1)^{j-\sigma}\mathbb{B}_m^{(-k-\sigma)}(y+1-\tau,w;g) \notag \\
& =\frac{(-1)^{n+1}}{{\rm det}\,g} \sum_{\tau=0}^{n}\binom{n}{\tau}a^\tau b^{n-\tau}\sum_{j=0}^n (-1)^{j}{n \brack j}\sum_{\sigma=0}^{j}\binom{j}{\sigma}{(\tau-w-1)}^{j-\sigma}\notag \\
& \qquad \times \mathbb{B}_k^{(-m-\sigma)}(w+1-\tau,y;g^{-1}), \label{Dual-F-2}\\
& \sum_{\tau=0}^{n}\binom{n}{\tau}d^\tau (-b)^{n-\tau}\sum_{j=0}^n {n \brack j}\sum_{\sigma=0}^{j}\binom{j}{\sigma}(\tau-y+1)^{j-\sigma}\mathbb{B}_m^{(-k-\sigma)}(y-\tau,w;g) \notag \\
& =\frac{(-1)}{{\rm det}\,g} \sum_{\tau=0}^{n}\binom{n}{\tau}c^\tau d^{n-\tau}\sum_{j=0}^n (-1)^{j}{n \brack j}\sum_{\sigma=0}^{j}\binom{j}{\sigma}(\tau-1-w)^{j-\sigma}\notag\\
& \qquad \times \mathbb{B}_k^{(-m-\sigma)}(w+1-\tau,y-n-1;g^{-1}). \label{Dual-F-3}
\end{align}
In particular when $n=0$,
\begin{equation}
\mathbb{B}_k^{(-m)}(y,w-1;g)=-\frac{1}{{\rm det}\,g}\mathbb{B}_m^{(-k)}(w,y-1;g^{-1}). \label{Dual-F-4}
\end{equation}
\end{theorem}
\begin{proof}
First we assume that $\Re w$ and $\Re y$ are sufficiently large. By \eqref{dual-1}, we obtain
\begin{align*}
& \sum_{\tau=0}^{n}\binom{n}{\tau}(-c)^\tau a^{n-\tau}\sum_{j=0}^n {n \brack j}\sum_{\sigma=0}^{j}\binom{j}{\sigma}(1-y+\tau)^{j-\sigma}\xi_D(u-\sigma,s;y-\tau,w-n-1;g) \notag \\
& =\frac{(-1)^{n+1}}{{\rm det}\,g} \sum_{\tau=0}^{n}\binom{n}{\tau}c^\tau d^{n-\tau}\sum_{j=0}^n {n \brack j}\sum_{\sigma=0}^{j}\binom{j}{\sigma}(1-w+\tau)^{j-\sigma}\xi_D(s-\sigma,u;w-\tau,y-n-1;g^{-1}).
\end{align*}
It is noted that, for example, $D_y^{-1}$ and $D_u^{-1}$ are commutative and $D_y^{-\tau}(D_u^{-1}-y+k)=(D_u^{-1}-(y-\tau)+k)D_y^{-\tau}$.
Letting $(u,s)=(-k,-m)$, we obtain from \eqref{eq:val-xi1} that \eqref{Dual-F-1} holds for $y,w\in \mathbb{C}$ if $\Re y$ and $\Re w$ are sufficiently large. Since $\mathbb{B}_m^{(-k)}(y,w;g)$ is a polynomial in $y,w$, we see that \eqref{Dual-F-1} holds for all $y,w\in \mathbb{C}$. Similar argument works well for \eqref{Dual-F-2} and \eqref{Dual-F-3} by considering \eqref{dual-2} and \eqref{dual-3}, respectively. When $n=0$, each equation gives \eqref{Dual-F-4}. This completes the proof.
\end{proof}
\begin{example}\label{Exam-6-6}
Let
$(y,w,g)=(1,1,g_\eta)$ in \eqref{Dual-F-1}.
Then, from Examples \ref{Exam-6-1}, we obtain
\begin{align}
& \sum_{j=0}^n {n \brack j}B_m^{(-k-j)}(n)=\sum_{j=0}^n {n \brack j}B_k^{(-m-j)}(n), \label{Dual-KST}
\end{align}
which was given by Kaneko, Sakurai and the second-named author (see \cite{KST2016}). In particular when $n=0$ and $1$, we obtain \eqref{1-5} and \eqref{1-5-2}.
Hence we can regard \eqref{dual-1}--\eqref{dual-3} in Theorem \ref{thm:trans2} as interpolation formulas of the duality relations \eqref{1-5} and \eqref{1-5-2} and their generalizations. Therefore we can give more general examples. For $\alpha\in \mathbb{C}$, let $g=g_{\alpha}=
\begin{pmatrix} -1 & \alpha \\ 0 & 1
\end{pmatrix}$.
Suppose $\Re \alpha< 2$
and let $(y,w)=(1,1)$ in \eqref{P-Ber-g}. Then $g1=\alpha-1\not\in \{1,\infty\}$ and
\begin{equation}
e^{wt}\frac{\mathrm{Li}_u(\alpha-e^{t})}{\alpha-e^t}=\sum_{m=0}^\infty \mathbb{B}_m^{(u)}(1,w;g_\alpha)\frac{t^m}{m!}. \label{P-Ber-galpha}
\end{equation}
We have ${\rm det}\,g_\alpha=-1$ and $g_\alpha^{-1}=g_\alpha$. By \eqref{Dual-F-1} with $g_\alpha$, we have
\begin{equation}
\sum_{j=0}^n {n \brack j}\mathbb{B}_m^{(-k-j)}(1,-n;g_\alpha)=\sum_{j=0}^n {n \brack j}\mathbb{B}_k^{(-m-j)}(1,-n;g_\alpha). \label{Dual-alpha}
\end{equation}
Note that \eqref{Dual-alpha} holds for $\alpha\in \mathbb{C}\setminus \{2\}$.
In fact, $\mathbb{B}_m^{(-k)}(1,-n;g_\alpha)$ is a rational function in $\alpha$ and continuous for $\alpha \in \mathbb{C}\setminus \{2\}$, because the left-hand side of \eqref{P-Ber-galpha} is analytic around $t=0$ when $\alpha\in \mathbb{C}\setminus \{2\}$.
In particular,
\begin{equation}
\mathbb{B}_m^{(-k)}(1,0;g_\alpha)=\mathbb{B}_k^{(-m)}(1,0;g_\alpha). \label{Dual-alpha-2}
\end{equation}
For example, when $\alpha=3,\,-2$ and $\sqrt{-1}$, then we can check that
\begin{align*}
& \mathbb{B}_2^{(-3)}(1,0;g_{{3}})=\mathbb{B}_3^{(-2)}(1,0;g_{{3}})= 242,\\
& \mathbb{B}_2^{(-3)}(1,0;g_{{-2}})=\mathbb{B}_3^{(-2)}(1,0;g_{{-2}})= -\frac{1}{512},\\
& \mathbb{B}_2^{(-3)}(1,0;g_{\sqrt{-1}})=\mathbb{B}_3^{(-2)}(1,0;g_{\sqrt{-1}})= -\frac{4}{125} - \frac{22}{125}\sqrt{-1}.
\end{align*}
\end{example}
\begin{example}\label{Exam-C-dual}
By \eqref{Dual-F-4} with $(y,w,g)=(-l,-l,g_\eta)$ for $l\in \mathbb{Z}_{\geq 0}$, we have
\begin{equation}
\mathbb{B}_k^{(-m)}(-l,-l-1;g_\eta)=\mathbb{B}_m^{(-k)}(-l,-l-1;g_\eta)\quad (k,m\in \mathbb{Z}_{\geq 0}). \label{Dual-F-4-2}
\end{equation}
Since
\begin{align*}
&\Phi(z;-k,-l)=\sum_{n=0}z^n(n-l)^k=\sum_{i=0}^{l-1}z^i (i-l)^k+z^l \mathrm{Li}_{-k}(z),
\end{align*}
we obtain from \eqref{gf-C-2} that
\begin{align*}
e^{-(l+1)t}\Phi(1-e^{-t};-k,-l)& = \sum_{i=0}^{l-1}(i-l)^k\sum_{j=0}^{i}\binom{i}{j}(-1)^j e^{-(l+j+1)t}\\
& \quad +\sum_{j=0}^{l}(-1)^j e^{-(l+j+1)t}\sum_{n=1}^\infty C_{n-1}^{(-k-1)}\frac{t^n}{n!}.
\end{align*}
Hence, by \eqref{P-Ber-g}, we have
\begin{align*}
\mathbb{B}_m^{(-k)}(-l,-l-1;g_\eta)& = (-1)^m\sum_{i=0}^{l-1}(i-l)^k\sum_{j=0}^{i}\binom{i}{j}(-1)^j(l+j+1)^m \\
& \quad +\sum_{i=0}^{m}\binom{m}{i}\sum_{j=0}^{l}(-1)^j(-l-j-1)^{m-i}C_{i-1}^{(-k-1)}.
\end{align*}
Therefore, for example, \eqref{Dual-F-4-2} in the cases $l=0,1$ give new duality relations
\begin{align}
& \sum_{i=1}^{m}\binom{m}{i}(-1)^{m-i}C_{i-1}^{(-k-1)}=\sum_{i=1}^{k}\binom{k}{i}(-1)^{k-i}C_{i-1}^{(-m-1)}, \label{C-dual1}\\
& (-1)^{k+m}2^m+\sum_{i=1}^{m}\binom{m}{i}\left\{(-2)^{m-i}-(-3)^{m-i}\right\}C_{i-1}^{(-k-1)}\notag \\
& \quad =(-1)^{k+m}2^k+\sum_{i=1}^{k}\binom{k}{i}\left\{(-2)^{k-i}-(-3)^{k-i}\right\}C_{i-1}^{(-m-1)} \label{C-dual2}
\end{align}
for $k,m\in \mathbb{Z}_{\geq 1}$.
By \eqref{Dual-F-4} with $(y,w,g)=(-l,l,g_\eta)$ for $l\in \mathbb{Z}_{\geq 0}$, we obtain
\if0
Let $g=g_\xi$ in Example \ref{Exam-3-1}. By \eqref{Dual-F-4-2}, we have
\begin{equation}
\mathbb{B}_k^{(-m)}(-l,-l-1;g_\xi)=-\mathbb{B}_m^{(-k)}(-l,-l-1;g_\xi^{-1}). \label{C-dual2-2}
\end{equation}
Combining \eqref{Inverse-B} and \eqref{Dual-F-4}, we obtain
\begin{align}
\mathbb{B}_k^{(-l)}(y,w;g_\eta)& =\mathbb{B}_l^{(-k)}(w+1,y-1;g_\eta) \notag\\
& =(-1)^l \mathbb{B}_l^{(-k)}(w+1,-y;g_\xi)=(-1)^{l+1}\mathbb{B}_k^{(-l)}(-y+1,w;g_\xi^{-1}).\label{Ber-relation}
\end{align}
Therefore \eqref{C-dual2-2} can be written as
$$(-1)^k \mathbb{B}_k^{(-m)}(-l,l;g_\eta)=-(-1)^{k+1}\mathbb{B}_m^{(-k)}(l+1,-l-1;g_\eta)\quad (l\in \mathbb{Z}_{\geq 0}).$$
\fi
$$\mathbb{B}_k^{(-m)}(-l,l;g_\eta)=\mathbb{B}_m^{(-k)}(l+1,-l-1;g_\eta). $$
Similar to the above consideration, this produces new duality relations among $C_{m}^{(-k)}$ different from the above formulas. For example, the case $l=0$ implies \eqref{1-5-2}, and the case $l=1$ gives a new formula
\begin{equation}
\sum_{j=1}^{k-1}\binom{k}{j}C_{j-1}^{(-m-1)}=\sum_{j=0}^{m}\binom{m}{j}\frac{C_{m-j}C_{j+1}^{(-k)}}{j+1}\quad (k,m\in \mathbb{Z}_{0}). \label{dual-C-l-1}
\end{equation}
\end{example}
Finally, we give certain explicit expressions of poly-Bernoulli polynomials.
\begin{lemma}\label{Lem-6-10}\ \ Assume $g1=0$.
For $m\in\mathbb{Z}_{\geq 0}$ and $u,y,w\in \mathbb{C}$ except for appropriate branch cuts,
\begin{equation}
\mathbb{B}_m^{(u)}(y,w;g
=\xi_{2,m+1}(u,-m;y,w;g). \label{xi-2-exp}
\end{equation}
\end{lemma}
\begin{proof}
Since $g1=0$, we have $O(ge^t)=O(t)$ ($t \to 0$). Substitute $s=1-k$ $(k\in \mathbb{Z}_{\geq 1})$ into \eqref{Eq-xi-2}. Then the first term on the right-hand side of \eqref{Eq-xi-2} vanishes, because its integrand is holomorphic in $t$ around the origin.
Hence, from Theorem
\ref{Th-6-2},
we see that \eqref{xi-2-exp} holds for $u,y,w\in \mathbb{C}$ except for appropriate branch cuts. Replacing $m=k-1$, we have the assertion.
\end{proof}
Combining Lemmas \ref{lm:xi_secondp} and \ref{Lem-6-10}, we have the following.
\begin{example}\label{Exam-6-11}\
Let $g=
\begin{pmatrix} a & b \\ c & d
\end{pmatrix}$.
First we assume $g1=0$ and $g\infty=\infty$, namely, $a+b=0$ and $c=0$.
By Theorem \ref{thm:simple_trans}, we have only to consider $g=h_d:=\begin{pmatrix} -1 & 1 \\ 0 & d
\end{pmatrix}$
for $d\in \mathbb{C}\setminus \{0\}$. Note that $h_1=g_\eta$ (see Example \ref{Exam-3-1}). Combining Lemma \ref{lm:xi_secondp} with $k=m+1$, Theorem \ref{Th-6-2} and Lemma \ref{Lem-6-10}, we have
\begin{align}
\mathbb{B}_m^{(u)}(y,w;h_d)& =\sum_{n=0}^{m}\frac{1}{(y+n)^u}(1-D_w^{-1})^n \frac{w^m}{d^{n+1}}\notag\\
& =\sum_{n=0}^{m}\frac{1}{(y+n)^u}\sum_{j=0}^{n}\binom{n}{j}(-1)^j \frac{(w-j)^m}{d^{n+1}}.\label{Ber-expr-01}
\end{align}
In particular when $(d,y,w)=(1,1,0)$, from Example \ref{Exam-6-1}, we obtain the well-known expression
$$B_m^{(u)}=(-1)^m \sum_{n=0}^{m}\frac{(-1)^n n!}{(n+1)^u}{m \brace n}$$
(see \cite[Theorem 1]{Kaneko1997}),
where ${m \brace n}$ is the Stirling number of the second kind determined by
$${m \brace n}=\frac{(-1)^n}{n!}\sum_{j=0}^n (-1)^j \binom{n}{j}j^m\quad (m,n\in \mathbb{Z}_{\geq0}).$$
Next we assume $g1=0$ and $g0=\infty$, namely, $a+b=0$ and $d=0$. Hence we consider $g=h_c':=\begin{pmatrix} 1 & -1 \\ c & 0
\end{pmatrix}$
for $c\in \mathbb{C}\setminus \{0\}$. Note that $h_1'=g_\xi$ (see Example \ref{Exam-3-1}). Combining Lemma \ref{lm:xi_secondp} with $k=m+1$, Theorem \ref{Th-6-2} and Lemma \ref{Lem-6-10}, we have
\begin{align}
\mathbb{B}_m^{(u)}(y,w;h_c')& =\sum_{n=0}^{m}\frac{1}{(y+n)^u}(1-D_w^{-1})^n \frac{(w+n+1)^m}{c^{n+1}}\notag\\
& =\sum_{n=0}^{m}\frac{1}{(y+n)^u}\sum_{j=0}^{n}\binom{n}{j}(-1)^j \frac{(w+n+1-j)^m}{c^{n+1}}.\label{Ber-expr-02}
\end{align}
\end{example}
\section{Proofs of Lemmas \ref{lm:boundV} and \ref{lm:boundNV}}\label{sec:pr}\label{sec-7}
\begin{lemma}
\label{lm:boundn1}
Let $N$ be a neighborhood of the origin in $\mathbb{R}_{\geq 0}$.
Let $a(U),b(U),c(U)$ be real continuous functions in $U\in N$ such that $a(U),c(U)>0$ and
$-\sqrt{a(U)c(U)}\leq b(U)<\sqrt{a(U)c(U)}$
for all $U\in N$.
Let $0\leq q\leq 1$.
Then there exists $M>0$ such that
\begin{equation}
F(U,Y)=\frac{a(U)Y^2-2b(U)UY+c(U)U^2}{U^{2-q}Y^q}\geq M
\end{equation}
for all $(U,Y)$ in a sufficiently small neighborhood of the origin in $\mathbb{R}_{\geq0}^2$ unless the denominator vanishes.
\end{lemma}
\begin{proof}
We denote $a(U_0),b(U_0),c(U_0)$ by $a,b,c$ respectively for short.
First assume $0<q\leq 1$.
Fix a sufficiently small $U_0>0$.
Then
\begin{equation}
\frac{\partial F(U_0,Y)}{\partial Y}=
\frac{a(2-q)Y^2-2b(1-q)U_0Y-cqU_0^2}{U_0^{2-q}Y^{q+1}}=0
\end{equation}
implies the unique solution
\begin{equation}
\label{eq:Y_01}
Y_0=AU_0>0
\end{equation}
with
\begin{equation}
A=\frac{b (1 - q) + \sqrt{b^2 (1 - q)^2 + a c (2 - q) q}}{a (2 - q)}>0.
\end{equation}
Thus we have
\begin{equation}
F(U_0,Y)\geq F(U_0,Y_0)=2 \frac{a c (2 - q) - b^2 (1 - q) -
b\sqrt{b^2 (1 - q)^2 + a c (2 - q) q}}{a (2 - q)^2 A^q}.
\end{equation}
Here
\begin{gather}
a c (2 - q) - b^2 (1 - q)
=a c +(ac - b^2) (1 - q)
\geq ac
>0,
\\
-b\sqrt{b^2 (1 - q)^2 + a c (2 - q) q}\geq
-|b|\sqrt{a c (1 - q)^2 + a c (2 - q) q}\geq
-|b|\sqrt{ac}.
\end{gather}
If $a(0)c(0)\neq b(0)^2$,
then
\begin{equation}
F(U_0,Y_0)\geq
2\frac{\sqrt{a c}(\sqrt{a c} -|b|)}{a (2 - q)^2 A^q}
\end{equation}
and
there exists $M>0$ such that
\begin{equation}
F(U,Y)\geq M
\end{equation}
for all $(U,Y)$ in a sufficiently small neighborhood of the origin in $\mathbb{R}_{>0}^2$.
If $a(0)c(0)=b(0)^2$, then by the assumption we have $b(0)=-\sqrt{a(0)c(0)}<0$ and $b(U)<0$ for all sufficiently small $U\geq0$.
Then
\begin{equation}
-b \sqrt{b^2 (1 - q)^2 + a c (2 - q) q}\geq 0
\end{equation}
and
\begin{equation}
F(U_0,Y_0)\geq\frac{2ac}{a(2-q)^2A^q}.
\end{equation}
Hence we have the same conclusion.
Next assume $q=0$.
Fix a sufficiently small $U_0>0$.
Then
\begin{equation}
\frac{\partial F(U_0,Y)}{\partial Y}=
2\frac{aY-bU_0}{U_0^{2}}=0
\end{equation}
implies the unique solution
\begin{equation}
\label{eq:Y_02}
Y_0=\frac{bU_0}{a}\in\mathbb{R}.
\end{equation}
If $a(0)c(0)\neq b(0)^2$, then
we have
\begin{equation}
F(U_0,Y)\geq F(U_0,Y_0)=\frac{ac-b^2}{a}
\end{equation}
and
there exists $M>0$ such that
\begin{equation}
F(U,Y)\geq M
\end{equation}
for all $(U,Y)$ in a sufficiently small neighborhood of the origin in $\mathbb{R}_{>0}\times\mathbb{R}_{\geq0}$.
If $a(0)c(0)=b(0)^2$, then by the assumption we have $b(0)=-\sqrt{a(0)c(0)}<0$ and $b(U)<0$ for all sufficiently small $U\geq0$.
Then
\begin{equation}
F(U_0,Y)\geq F(U_0,0)=c
\end{equation}
for $Y\geq 0$
and we have the same conclusion.
\end{proof}
\begin{lemma}
\label{lm:boundn2}
Let $N$ be a neighborhood of the origin in $\mathbb{R}_{\geq 0}$.
Let $a(U),b(U),c(U)$ be real continuous functions in $U\in N$ such that $a(U),c(U)>0$, $-\sqrt{a(U)c(U)}\leq b(U)<\sqrt{a(U)c(U)}$
for all $U\in N\setminus\{0\}$,
$b(0)=\sqrt{a(0)c(0)}$ and
\begin{equation}
K=\lim_{U\to 0}\frac{a(U)c(U)-b(U)^2}{U^2}>0.
\end{equation}
Let $0\leq q\leq 2$.
Then there exists $M>0$ such that
\begin{equation}
G(U,Y)=\frac{a(U)Y^2-2b(U)UY+c(U)U^2}{U^{4-q}Y^q}\geq M
\end{equation}
for all $(U,Y)$ in a sufficiently small neighborhood of the origin in $\mathbb{R}_{\geq0}^2$ unless the denominator vanishes.
\end{lemma}
\begin{proof}
We denote $a(U_0),b(U_0),c(U_0)$ by $a,b,c$ respectively for short.
Note that $G(U,Y)=U^{-2}F(U,Y)$, where $F(U,Y)$ is given in Lemma \ref{lm:boundn1}.
First assume $0<q<2$.
Fix a sufficiently small $U_0>0$.
Then $G(U_0,Y)$ attains its minimum at the same $Y_0$ as \eqref{eq:Y_01}, which is also valid for $1\leq q<2$
and
\begin{equation}
G(U_0,Y)\geq G(U_0,Y_0)=2 \frac{a c (2 - q) - b^2 (1 - q) -
b\sqrt{b^2 (1 - q)^2 + a c (2 - q) q}}{a (2 - q)^2 A^q U_0^2}
\end{equation}
with
\begin{gather}
a c (2 - q) - b^2 (1 - q)
=b^2 +(ac - b^2) (2 - q)
\geq 0,
\\
(a c (2 - q) - b^2 (1 - q))^2 -
(b\sqrt{b^2 (1 - q)^2 + a c (2 - q) q})^2=
a c (ac-b^2) (2-q)^2.
\end{gather}
Since
\begin{gather}
B= a c (2 - q) - b^2 (1 - q)+
b\sqrt{b^2 (1 - q)^2 + a c (2 - q) q}\to
2a(0)c(0),\\
A\to \sqrt{c(0)/a(0)}
\end{gather}
as $U_0\to 0$, we have
\begin{equation}
G(U_0,Y)\geq
G(U_0,Y_0)=
2\frac{a c (2-q)^2}{a (2 - q)^2 A^q B}
\frac{a c -b^2}{U_0^2 }
\to
\frac{K}{a(0)\sqrt{c(0)/a(0)}^q}>0
\end{equation}
as $U_0\to 0$.
Thus
there exists $M>0$ such that
\begin{equation}
G(U,Y)\geq M
\end{equation}
for all $(U,Y)$ in a sufficiently small neighborhood of the origin in $\mathbb{R}_{>0}^2$.
Secondly assume $q=0$.
Fix a sufficiently small $U_0>0$.
Then $G(U_0,Y)$ attains its minimum at the same $Y_0$ as \eqref{eq:Y_02} and
\begin{equation}
G(U_0,Y)\geq G(U_0,Y_0)=\frac{ac-b^2}{aU_0^2}\to\frac{K}{a(0)}>0
\end{equation}
as $U_0\to 0$.
Thus
there exists $M>0$ such that
\begin{equation}
G(U,Y)\geq M
\end{equation}
for all $(U,Y)$ in a sufficiently small neighborhood of the origin in $\mathbb{R}_{>0}\times\mathbb{R}_{\geq0}$.
Thirdly we assume $q=2$.
Fix a sufficiently small $U_0>0$.
Then
\begin{equation}
\frac{\partial G(U_0,Y)}{\partial Y}=
2\frac{bU_0Y-cU_0^2}{U_0^{2}Y^{3}}=0
\end{equation}
implies the unique solution
\begin{equation}
Y_0=\frac{cU_0}{b}>0
\end{equation}
because
by the assumption, $b(U)>0$ for all sufficiently small $U\geq0$.
Thus we have
\begin{equation}
G(U_0,Y)\geq G(U_0,Y_0)=\frac{ac-b^2}{cU_0^2}\to\frac{K}{c(0)}>0
\end{equation}
as $U_0\to 0$
and
there exists $M>0$ such that
\begin{equation}
G(U,Y)\geq M
\end{equation}
for all $(U,Y)$ in a sufficiently small neighborhood of the origin in $\mathbb{R}_{>0}^2$.
\end{proof}
\begin{lemma}
\label{lm:bound}
Assume that $h=\begin{pmatrix}
\alpha & \beta \\ \gamma & \delta
\end{pmatrix}\in\mathrm{GL}_2(\mathbb{C})$ satisfies $hU=Y$ for only $(U,Y)=(0,0)$ in a neighborhood of the origin in $\mathbb{R}_{\geq 0}^2$.
Then for $0\leq q\leq1$,
there exists $M>0$ such that
\begin{equation}
\frac{1}{|\alpha U+\beta-Y(\gamma U+\delta)|}\leq
\begin{cases}
\dfrac{M}{U^{1-q}Y^q}\qquad&\text{if the origin is not a cusp}, \\
\dfrac{M}{U^{2(1-q)}Y^{2q}}\qquad&\text{if the origin is a cusp}
\end{cases}
\end{equation}
in a neighborhood of the origin in $\mathbb{R}_{>0}^2$.
\end{lemma}
\begin{proof}
Assume that $h=\begin{pmatrix}
\alpha & \beta \\ \gamma & \delta
\end{pmatrix}\in\mathrm{GL}_2(\mathbb{C})$ satisfies $hU=Y$ for only $(U,Y)=(0,0)$ in the neighborhood of the origin in $\mathbb{R}_{\geq 0}^2$,
Then $h0=0$ implies $\beta=0$ and $\det h=\alpha\delta\neq 0$.
Hence $hU=Y$ is rewritten as
\begin{equation}
\label{eq:pos_Y}
Y=\frac{\alpha U}{\gamma U+\delta}=\frac{(\alpha\overline{\gamma} U+\alpha\overline{\delta}) U}{|\gamma U+\delta|^2}.
\end{equation}
Assume that
$\alpha\overline{\delta}\in\mathbb{R}_{>0}$ and
$\alpha\overline{\gamma}\in\mathbb{R}$.
Then in any neighborhood of the origin, a pair $(U,Y)$ with a small $U>0$ and
$Y$ given by
\eqref{eq:pos_Y}
is a solution.
Thus if the solution is only $(U,Y)=(0,0)$ in a neighborhood of the origin in $\mathbb{R}_{\geq 0}^2$, then
$\alpha\overline{\delta}\notin\mathbb{R}_{>0}$ or
$\alpha\overline{\gamma}\notin\mathbb{R}$.
If the origin is a cusp,
then
$\dfrac{d}{dU} hU\Bigr|_{U=0}=\dfrac{\det h}{\delta^2}=\dfrac{\alpha\overline{\delta}}{|\delta|^2}>0$
and hence $\alpha\overline{\delta}\in\mathbb{R}_{>0}$. The converse is also true.
Assume $0\leq q\leq 1/2$.
Consider
\begin{equation}
|\alpha U-\delta Y-\gamma UY|^2
=|\delta+\gamma U|^2
Y^2-2\Re(\alpha\overline{\delta}+\alpha\overline{\gamma}U)UY+|\alpha|^2 U^2
\end{equation}
and let
\begin{equation}
a(U)= |\delta+\gamma U|^2, \qquad
b(U)= \Re(\alpha\overline{\delta}+\alpha\overline{\gamma}U),\qquad
c(U)= |\alpha|^2.
\end{equation}
We check the assumptions in Lemmas \ref{lm:boundn1} and \ref{lm:boundn2}.
Since $\alpha,\delta\neq 0$, we see that $a(U),c(U)>0$ for all sufficiently small $U\geq 0$. Furthermore
\begin{equation}
a(U)c(U)-b(U)^2=|\alpha\overline{\delta}+\alpha\overline{\gamma}U|^2-
(\Re(\alpha\overline{\delta}+\alpha\overline{\gamma}U))^2
=
(\Im(\alpha\overline{\delta}+\alpha\overline{\gamma}U))^2\geq0,
\end{equation}
which implies
$-\sqrt{a(U)c(U)}\leq b(U)\leq\sqrt{a(U)c(U)}$.
Since $\alpha\overline{\delta}\notin\mathbb{R}_{>0}$ or
$\alpha\overline{\gamma}\notin\mathbb{R}$,
\begin{equation}
\sqrt{a(U)c(U)}-b(U)=
|\alpha\overline{\delta}+\alpha\overline{\gamma}U|-
\Re(\alpha\overline{\delta}+\alpha\overline{\gamma}U)\neq 0
\end{equation}
holds for all sufficiently small $U\geq 0$ if $\alpha\overline{\delta}\notin\mathbb{R}_{>0}$,
and for all sufficiently small $U>0$ if $\alpha\overline{\delta}\in\mathbb{R}_{>0}$. In the latter case,
\begin{equation}
b(0)=\Re \alpha\overline{\delta}=|\alpha\overline{\delta}|=\sqrt{a(0)c(0)}
\end{equation}
and
\begin{equation}
\frac{a(U)c(U)-b(U)^2}{U^2}=
\frac{(\Im(\alpha\overline{\delta}+\alpha\overline{\gamma}U))^2}{U^2}
=
\frac{(\Im \alpha\overline{\gamma}U)^2}{U^2}
=
(\Im \alpha\overline{\gamma})^2>0.
\end{equation}
Thus we have checked the assumptions required and have the assertions in this case.
For $1/2< q\leq 1$,
exchanging the roles of $U$ and $Y$, and
applying Lemmas \ref{lm:boundn1} and \ref{lm:boundn2}
with
\begin{equation}
|\alpha U-\delta Y-\gamma UY|^2
=|\alpha-\gamma Y|^2
U^2-2\Re(\delta\overline{\alpha}-\delta\overline{\gamma}Y)YU+|\delta|^2 Y^2
\end{equation}
and
\begin{equation}
a(Y)=|\alpha-\gamma Y|^2,\qquad
b(Y)=\Re(\delta\overline{\alpha}-\delta\overline{\gamma}Y),\qquad
c(Y)=|\delta|^2,
\end{equation}
we
have the assertions in this case.
Here we used the fact that
$\alpha\overline{\delta}\in\mathbb{R}_{>0}$ implies
$\alpha\overline{\gamma}\notin\mathbb{R}$,
and hence
$\delta\overline{\alpha}\in\mathbb{R}_{>0}$ and
$\delta\overline{\gamma}\notin\mathbb{R}$.
\end{proof}
\begin{lemma}
\label{lm:div}
Assume that $h=\begin{pmatrix}
\alpha & \beta \\ \gamma & \delta
\end{pmatrix}\in\mathrm{GL}_2(\mathbb{C})$ satisfies $hU=Y$ for only $(U,Y)=(0,0)$ in a neighborhood of the origin in $\mathbb{R}_{\geq 0}^2$.
Then there exists $\epsilon>0$ such that
\begin{equation}
\frac{1}{\epsilon}|Y|> |U|>\epsilon |Y|
\end{equation}
for any
pair $(U,Y)$ satisfying
$hU=Y$ in
a sufficiently small neighborhood of the origin in $\mathbb{C}^2$.
\end{lemma}
\begin{proof}
From the first paragraph of the proof of Lemma \ref{lm:bound}, we see that
$\beta=0$ and $\alpha\delta\neq 0$.
Since $hU=Y$ is rewritten as
$Y=\dfrac{\alpha U}{\gamma U+\delta}$,
we have
\begin{equation}
|Y
\geq\frac{|\alpha|}{|\delta|\Bigl|1+\dfrac{\gamma}{\delta}U\Bigr|}|U|
\geq\frac{|\alpha|}{2|\delta|}|U|.
\end{equation}
Similarly
$U=\dfrac{\delta Y}{\gamma Y-\alpha}$ implies
\begin{equation}
|U|
\geq\frac{|\delta|}{2|\alpha|}|Y|.
\end{equation}
\end{proof}
\begin{proof}[Proof of Lemma \ref{lm:boundV}]
For $Z\in\{1,\infty\}$, let
\begin{equation}
k_Z=
\begin{pmatrix}
\Tilde{Z} & -1 \\ -(-1)^{\Tilde{Z}} & 0
\end{pmatrix}=
\begin{cases}
\begin{pmatrix}
1 & -1 \\ 1 & 0
\end{pmatrix}\qquad&(Z=1),\\
\begin{pmatrix}
0 & -1 \\ -1 & 0
\end{pmatrix}\qquad&(Z=\infty).
\end{cases}
\end{equation}
Note that $k_Z$ maps a neighborhood of $Z$ in $[1,+\infty]$ to a neighborhood of the origin in $\mathbb{R}_{\geq 0}$.
By putting $U=k_{T_0}T$ and $Y=k_{X_0}X$,
we see that $h=k_{X_0}gk_{T_0}^{-1}=
\begin{pmatrix}
\alpha & \beta \\ \gamma & \delta
\end{pmatrix}$ satisfies the assumption in Lemma \ref{lm:bound}.
Since
\begin{equation}
k_Z^{-1}=
\begin{pmatrix}
0 & -(-1)^{\Tilde{Z}} \\ -1 & -(-1)^{\Tilde{Z}}\Tilde{Z}
\end{pmatrix}
\end{equation}
and
\begin{gather}
j_D(k_{X_0}^{-1}hk_{T_0},k_{T_0}^{-1}U)=\frac{j_D(k_{X_0}^{-1}h,U)}{j_D(k_{T_0}^{-1},U)},\\
j_D(k_{X_0}^{-1}h,U)=j_D(k_{X_0}^{-1},hU)j_D(h,U),\qquad
j_N(k_{X_0}^{-1}h,U)=j_N(k_{X_0}^{-1},hU)j_D(h,U),\qquad
\end{gather}
we have
\begin{equation}
\label{eq:jD}
\begin{split}
j_D(g,T)(1-(gT)X^{-1})&=
j_D(k_{X_0}^{-1}hk_{T_0},k_{T_0}^{-1}U)(1-(k_{X_0}^{-1}hU)(k_{X_0}^{-1}Y)^{-1})\\
&=
\frac{j_D(k_{X_0}^{-1}h,U)}{j_D(k_{T_0}^{-1},U)}
\Bigl(1-\frac{j_N(k_{X_0}^{-1}h,U)}{j_D(k_{X_0}^{-1}h,U)}
\frac{j_D(k_{X_0}^{-1},Y)}{j_N(k_{X_0}^{-1},Y)}
\Bigr)
\\
&=
\frac{j_D(k_{X_0}^{-1}h,U)j_N(k_{X_0}^{-1},Y)-j_N(k_{X_0}^{-1}h,U)j_D(k_{X_0}^{-1},Y)}
{j_D(k_{T_0}^{-1},U)j_N(k_{X_0}^{-1},Y)}
\\
&=
\frac{j_D(k_{X_0}^{-1},hU)-j_D(k_{X_0}^{-1},Y)}
{j_D(k_{T_0}^{-1},U)}j_D(h,U)
\\
&=
\frac{j_N(h,U)-Yj_D(h,U)}
{U+(-1)^{\Tilde{T_0}} \Tilde{T_0}}
\\
&=
\frac{\alpha U+\beta-Y (\gamma U+\delta)}
{U+(-1)^{\Tilde{T_0}} \Tilde{T_0}}.
\end{split}
\end{equation}
Hence
\begin{multline}
\Bigl|\frac{1}{j_D(g,T)}\frac{1}{(1-(gT)X^{-1})}\Bigr|\\
\leq M|U+(-1)^{\Tilde{T_0}} \Tilde{T_0}|
\times
\begin{cases}
\dfrac{1}{U^{1-q}Y^q}\qquad&\text{if the vertex is not a cusp}, \\
\dfrac{1}{U^{2(1-q)}Y^{2q}}\qquad&\text{if the vertex is a cusp}.
\end{cases}
\end{multline}
Since
\begin{align}
U=k_{T_0}T&=\frac{\Tilde{T_0}T-1}{-(-1)^{\Tilde{T_0}}T}, \\
Y=k_{X_0}X&=\frac{\Tilde{X_0}X-1}{-(-1)^{\Tilde{X_0}}X},
\end{align}
we obtain the first result.
The second statement follows from Lemma \ref{lm:div}.
\end{proof}
\begin{proof}[Proof of Lemma \ref{lm:boundNV}]
We use the same notation as in Lemma \ref{lm:boundV}.
If $V(g)\neq\emptyset$, then we fix $X_0\in V(g)$ and $T_0=g^{-1}X_0$,
and otherwise put $X_0=T_0=\infty$.
Further
put $U=k_{T_0}T$, $Y=k_{X_0}X$,
$h=k_{X_0}gk_{T_0}^{-1}=
\begin{pmatrix}
\alpha & \beta \\ \gamma & \delta
\end{pmatrix}$
and $S(g)=\{(U,Y)\in[0,1]^2~|~hU=Y\}$.
We see that
\begin{equation}
S(g)=
\begin{cases}
\emptyset\qquad& (\sharp V(g)=0),\\
\{(0,0)\}\qquad& (\sharp V(g)=1),\\
\{(0,0),(1,1)\}\qquad& (\sharp V(g)=2),
\end{cases}
\end{equation}
and
$S(g)$
coincides with the set of all solutions of $\alpha U+\beta=Y(\gamma U+\delta)$ in $[0,1]^2$.
Let $N_{\epsilon'}\subset(k_{T_0}\times k_{X_0})(N)$ be an open $\epsilon'$-neighborhood of $S(g)$ in $\mathbb{C}^2$ and
$B_{\epsilon''}$ be an $\epsilon''$-neighborhood of $[0,1]$ in $\mathbb{C}$.
Since $[0,1]^2\setminus N_{\epsilon'}$ is a compact set in $\mathbb{C}^2$, there exists $M>0$ and $\epsilon''>0$
such that
\begin{equation}
|\alpha U+\beta-Y(\gamma U+\delta)|>\frac{1}{M}
\end{equation}
for all $(U,Y)\in B_{\epsilon''}^2\setminus N_{\epsilon'}$.
By the same calculation as \eqref{eq:jD},
we have
\begin{equation}
j_D(g,T)(1-(gT)X^{-1})
=
\frac{\alpha U+\beta-Y(\gamma U+\delta)}{U+(-1)^{\Tilde{T_0}} \Tilde{T_0}}.
\end{equation}
Hence
\begin{equation}
\Bigl|\frac{1}{j_D(g,T)}\frac{1}{(1-(gT)X^{-1})}\Bigr|
\leq \frac{M}{|T|}
\end{equation}
for all $(T,X)\in (k_{T_0}\times k_{X_0})^{-1}(B_{\epsilon''}^2\setminus N_{\epsilon'})\cap\mathbb{C}^2$.
Since $k_1^{-1}(B_{\epsilon''})=k_\infty^{-1}(B_{\epsilon''})\supset W_{1,\epsilon}$ for a sufficiently small $\epsilon>0$, we have
\begin{equation}
(k_{T_0}\times k_{X_0})^{-1}(B_{\epsilon''}^2\setminus N_{\epsilon'})\cap\mathbb{C}^2
\supset ((k_{T_0}^{-1}(B_{\epsilon''})\times k_{X_0}^{-1}(B_{\epsilon''}))\setminus N)\cap\mathbb{C}^2
\supset W_{1,\epsilon}^2\setminus N,
\end{equation}
and
the assertion.
\end{proof}
|
\section{Introduction}
It is well established today that stars form within turbulent complexes that range from tens to hundreds
of parsecs, that harbour thousands of solar masses of cold gas: the molecular clouds \protect\citep[e.g.][ for a review]{McKeeOstriker2007}. Turbulence within these clouds generates
over-dense regions where the balance between the thermal and non-thermal (outward) pressure and the gravitational
(inward) force is disrupted, causing the gas to collapse. The mass distribution of these dense cores
shows many similarities with the stellar mass function \citep[see e.g.][]{Konyves2010}, making them the most obvious stellar progenitors. The details of the formation process are still actively debated however. The
(initially optically thin) core is believed to first contract isothermally as the compression heating is lost
through radiation, until the density is high enough to render the cooling ineffective. This leads to the
formation of a hydrostatic body, known as the first Larson core \protect\citep{Larson1969}, which accretes material from the surrounding envelope.
The sustained increase in mass, density, and temperature eventually triggers the dissociation of $\mathrm{H}_{2}$ molecules above 2000 K. This leads to the second phase of collapse
because of the endothermic nature of the dissociation process.
The collapse ceases when most or all of the $\mathrm{H}_{2}$ molecules
have been dissociated, at which point a second much more dense and compact hydrostatic core (Larson's second core) is formed at the centre \protect\citep{Larson1969,Masunaga2000,2013arXiv1307.1010V}.
The temperature inside the second core continues to rise until the nuclear reactions are ignited: the young
star is born.
This problem entails many physical processes over a very wide range of spatial scales, making
any modelling of the entire process challenging; the cloud core has an initial radius of $\sim$10$^{4}$ astronomical
units (AU)
with an average density of a few $10^3~{\rm cm}^{-3}$, while the protostellar core measures only $10^{-3}$ AU at birth,
with densities over $10^{20}~{\rm cm}^{-3}$. Describing and understanding
the physical processes at work involves an intricate interplay between large-scale environmental factors,
which regulate the supply of mass, angular momentum, and magnetic flux, and small-scale processes, which control the evolution and dynamics in protostellar systems. An accurate description of a large number of complex
physical mechanisms, involving the magnetic field, gravity, radiative transfer, time-dependent chemistry,
and dust physics, is necessary to derive realistic models of the global star formation process.
Recently, various studies have been devoted to the role magnetic fields play in collapsing systems and the effect on the transport of angular momentum.
The first studies were based on ideal magnetohydrodynamics (MHD), implying numerical instead of physical diffusivity. The results concerning the disk formation are thus of dubious validity \citep{AllenShuLi,2004ApJ...616..266M,GalliShuLizano2006,PriceBate2007,HennebelleTeyssier2008,HennebelleFromang2008,commercon10,DA1}.
The reconnection and diffusion of the field are essential components of the magnetic braking process. Using the framework of non-ideal MHD allows describing the diffusivity and the magnetic properties of the charged fluid accurately\citep{Machida_etal06,DuffinPudritz,MellonLi2009,MachidaMatsumotoDisk}.
This requires the accurate calculations of magnetic resistivities, however.
This remains challenging as they depend on many factors such as temperature, density, chemical abundances and magnetisation.
The interstellar gas from which the cores (and thus stars) form is essentially composed of hydrogen ($\sim$74\% by mass), helium ($\sim$25\%), and
heavier elements ($\sim$1\%) such as carbon, oxygen and heavy metals (Na, Fe, etc.), whose respective abundances are determined by an elaborate set of chemical reactions. The complexity is even increased by of the
formation of dust grains, which arise from the aggregation of several molecules and can reach micrometer sizes \citep{KunzMouschovias2009}. Not only do grains react with other elements, they also carry electric charges
and play the role of catalysts for other chemical reactions.
The grain ionisation rates, or even the chemical reaction rates themselves, remain poorly constrained in environments typical of prestellar core collapse.
The relative abundances and the degree of ionisation of the grains and molecules define the magnetic resistivities that regulate the dissipation of the magnetic flux through ambipolar and Ohmic diffusion and the Hall effect \citep{Krasnopolsky,Machida_etal06,LiKrasnopolskyShang}.
These dissipation processes have a fundamental role in the formation and evolution of the first and second Larson cores and their associated disks and outflows. In particular, the interplay between flux-freezing and condensation of the global angular momentum strongly depends on whether ambipolar diffusion, Hall effect, or Ohmic diffusion is the dominant process.
To compute the accurate resisitivities under the conditions typical of collapsing molecular clouds, we have developed
a relevant reduced chemical network. This allows us to test the effect of
various parameters, such as the equilibrium abundances of chemical species, the evolution of grains of different sizes, and the cosmic-ray ionisation rate on the various non-ideal MHD diffusion coefficients.
This network significantly extends these and other previous prescriptions \citep[]{UmebayashiNakano1990,NishiNakanoUmebayashi1991,Wardle1999,nakano2002,Wardle2007,KunzMouschovias2009,IlgnerNelson,Bai2011}
by including new pieces of physics that are necessary to precisely describe the chemical evolution of the interstellar gas.
The paper is organised as follows. In Sect. 2, we outline the main processes and physical ingredients relevant to star formation. In Sect. 3, we present our chemical network and the numerical method used to solve the reaction equations.
The resulting resistivities, the effect of each ingredient on the chemical equilibrium of the gas, and the consequences for star-forming systems are discussed in Sect. 4, while Sect. 5 is devoted to the conclusion.
\section{Physics of collapsing prestellar cores}
\subsection{Magnetic resistivities}\label{resistivities}
The complete induction equation in non-ideal MHD reads
\begin{align}
\frac{\partial \mathbf{B}}{\partial t} - \nabla \times ( \mathbf{v} \times \mathbf{B} ) =
-\frac{c^2}{4\pi}& \nabla \times \Bigg[ \eta_{\Omega} (\nabla \times \mathbf{B}) \nonumber \\
+& \eta_\mathrm{H} \left\{ (\nabla \times \mathbf{B})\times \frac{\mathbf{B}}{||\vect{B}||} \right\} \nonumber \\
+& \eta_\mathrm{AD} \frac{\mathbf{B}}{||\vect{B}||} \times \left\{ (\nabla \times \mathbf{B})\times \frac{\mathbf{B}}{||\mathbf{B}||} \right\} \Bigg] \label{induc_1},
\end{align}
where $\mathbf{B}$ denotes the magnetic field, $||\vect{B}||$ its $\mathrm{L}_2$ norm, and $\mathbf{v}$ the fluid velocity.
$\eta_{\Omega}$, $\eta_{\mathrm{H}}$ and $\eta_{\mathrm{AD}}$ represent the Ohmic, Hall, and ambipolar resistivities, respectively. These dissipative terms account for collisions between neutral and charged species. They strongly depend on the chemical equilibrium and thus on the thermodynamic conditions. In contrast, ideal MHD considers the fluid as a mixture of perfectly coupled charged fluids, which corresponds to $\eta_{\Omega} = \eta_{\mathrm{H}} = \eta_{\mathrm{AD}} = 0$, ensuring flux-freezing of the magnetic field.
The resistivities are defined in terms of the conductivities of the gas-dust mixture as
\begin{align}
\eta_{\Omega} &= \frac{1}{\sigma_{\parallel}}, \\
\eta_\mathrm{H} &= \frac{\sigma_\mathrm{H}}{\sigma_{\bot}^2+ \sigma_\mathrm{H}^2}, \\
\eta_\mathrm{AD} &= \frac{\sigma_{\bot}}{\sigma_{\bot}^2+ \sigma_\mathrm{H}^2} - \frac{1}{\sigma_{\parallel}},
\end{align}
where the
parallel, perpendicular, and Hall conductivites are in turn expressed, respectively, as
\begin{align}
\sigma_{\parallel} &= \sum_i \sigma_i, \\
\sigma_{\bot} &= \sum_i \frac{\sigma_i}{1+(\omega_i \tau_{i\mathrm{n}})^2}, \\
\sigma_\mathrm{H} &= -\sum_i \frac{\sigma_i \omega_i \tau_{i\mathrm{n}}}{1+(\omega_i \tau_{i\mathrm{n}})^2}.
\end{align}
with
$\displaystyle \sigma_i = \frac{n_i q_i^2 \tau_{i\mathrm{n}}}{m_i}$, $\displaystyle \omega_i = \frac{q_i B}{m_i c}$ the cyclotron frequency, and
\begin{equation}
\tau_{i\mathrm{n}} = \frac{1}{a_{i\mathrm{He}}} \frac{m_i + m_\mathrm{H_2}}{m_\mathrm{H_2}} \frac{1}{n_\mathrm{H_2} \langle \sigma_\mathrm{coll} w \rangle_{i}}. \label{defpoursigma}
\end{equation}
Here $i$ stands for any charged particle of charge $q_i$, with a charge particle number-density $n_i$, $m$ denotes the mass of a particle,
and $c$ is the speed of light. The factor $a_{i\mathrm{He}}$ accounts for collisions with helium atoms and is equal to 1.14 for ions, 1.16 for electrons and 1.28 for grains \citep{DeschMouschovias}.
$\langle \sigma_\mathrm{coll} w \rangle_{i}$ is the rate constant for collisions between a particle $i$ and H$_2$ molecules\citep{DeschMouschovias,PintoGalli2}.
The values are taken from \citet{PintoGalli2}.
We note that these rates were calculated in a three-fluid formalism, and we use them in a multifluid context, but their dependance with temperature is a better approximation than the Langevin model \citet{PintoGalli2}.
$\omega_i$ can be negative, depending on the charge $q_i$. This is important when calculating the conductivities, as the Hall conductivity $\sigma_\mathrm{H}$
can be either positive or negative.
This implies that the Hall resistivity can be negative, since it is of the same sign as $\sigma_\mathrm{H}$.
\subsection{Density and temperature range}
Our chemical network was used to compute conductivities for an entire density-temperature range spanning $10^{2}~\text{cm}^{-3} < n < 10^{26}~\text{cm}^{-3}$ and $10~\text{K} < T < 10^{5}~\text{K}$. This covers typical (parent) molecular cloud conditions (low temperature and density) as well as the interior of first and second Larson cores, where densities and temperatures have increased by many orders of magnitude, as a result of the strong gravitational compression of the gas. However, for clarity as well as for comparison with previous studies, the majority of the results presented in this work are presented only as a function of density. To mimic the natural temperature evolution as a function of density in a collapsing dense core (as opposed to using a single constant temperature), we used the piecewise barotropic equation of state (EOS) from \citet{Machida_etal06}
\begin{equation}
T=T_0 \sqrt{1+\left(\frac{n}{n_1}\right)^{2 g_1}} \left(1+\left(\frac{n}{n_2}\right)\right)^{g_2} \left(1+\left(\frac{n}{n_3}\right)\right)^{g_3},
\end{equation}
with $n$ the total density and
\begin{equation}
\begin{array}{l@{~}c@{~}l@{~}c@{~}l@{~}c@{~}l}
n_1 &=& 10^{11}~{\rm cm}^{-3} &; ~~~~~~~~~~~ & g_1 &=& 0.4; \\
n_2 &=& 10^{16}~{\rm cm}^{-3} &; ~~~~~~~~~~~ & g_2 &=& -0.3; \\
n_3 &=& 10^{21}~{\rm cm}^{-3} &; ~~~~~~~~~~~ & g_3 &=& 0.56667,
\end{array}
\end{equation}
and $T_0=10$ K. This EOS successively characterises the isothermal phase of the collapse, the adiabatic phase during the first Larson core evolution, the second collapse and the second Larson core evolution.
It is important to use such a typical EOS to present our results because the temperature increase during the collapse strongly influences on the chemistry of the grains
(see Sect. \ref{grains_vap_sect}) and on the ionisation of potassium (Sect. \ref{network_sect}).
The EOS is represented in \refig{eosmag} with our magnetic field prescription (see next paragraph).
\begin{figure}
\begin{center}
\includegraphics[trim = 2cm 2cm 2cm 2cm,width=0.5\textwidth]{./EOS.pdf}
\caption{Solid line : Temperature as a function of density for the equation of state. Dashed line : Magnetic field prescription following \citet{LiKrasnopolskyShang}}
\label{eosmag}
\end{center}
\end{figure}
\subsection{Magnetic field} \label{magfield}
Computing the resistivities also requires a knowledge of the magnetic field intensity.
To present our magnetic resistivities as a function of density alone, we assumed that the magnetic intensity scales as $B(n_\mathrm{H}) = 1.43 \times 10^{-7} \sqrt{n_\mathrm{H}}$ \citep{LiKrasnopolskyShang}, which corresponds to magnetic flux conservation (flux-freezing approximation).
It is represented in \refig{eosmag}.
Although the scaling in real collapse calculations is more complicated \citep[see e.g.][]{DA1}, the magnetic field here is only used to illustrate the behaviour of the resistivities.
It has no influence on the chemistry. In detailed prestellar collapse calculations, the magnetic field evolution is properly calculated and the resistivities are computed consistently during the collapse \citep[see][]{DA1}.
\subsection{Dust grain model}\label{grains_sect}
Grains can be the main charge carriers and thus need to be accurately described, both in size and number density, because these two quantities determine the surface area available for chemical reactions. Furthermore, grain evaporation is a process of prime importance in the present context because it occurs at temperatures close to the second collapse, after the first core formation.
\subsubsection{Grain size}\label{grains_size}
The grain reaction rates and the conductivity of the dust-gas mixture depend on the grain cross section.
In our calculations, we included a power-law grain-size distribution by considering a finite number $N_{\mathrm{bins}}$ of size bins with equal widths in log space.
We define a minimum and maximum grain size $a_{\mathrm{min}}$ and $a_{\mathrm{max}}$, respectively,
with a number density of grains of radius between $a$ and $a+da$
\begin{equation}
dn_{\mathrm{g,tot}}(a)= \mathcal{C} \, a^{\lambda} \,da~,
\end{equation}
where the subscript g denotes the grains and $\mathcal{C}$ is a normalisation constant.
Unless otherwise stated, we used the standard MRN distribution with $\lambda = -3.5$ \citep{mathis} throughout this work. For the sake of generality,
however, we write here the equations for any power-law index $\lambda$.
Following \citet{KunzMouschovias2009}, we chose for the minimum and maximum radii $a_{\mathrm{min}} = 0.0181 \, \mu\trm{m}$ and $ a_{\mathrm{max}} = 0.9049 \, \mu\trm{m}$.
Each size bin is defined by a lower and upper radius that give the number density and size for the $\alpha$th bin ($\alpha = 1,2,\ldots,N_{\mathrm{bins}}$)
\begin{align}
n_{\mathrm{g},\alpha} &= n_{\mathrm{g,tot}} \xi^{\frac{-(\lambda+1)\alpha}{N_{\mathrm{bins}}}} \left( \frac{1-\xi^{\frac{\lambda+1}{N_{\mathrm{bins}}}}}{\xi^{-(\lambda+1)} - 1} \right),\\
a_{\alpha} &= a_{\mathrm{min}} \xi^{\frac{-\alpha}{N_{\mathrm{bins}}}} \left[ \left(\frac{\lambda+1}{\lambda+3}\right) \left( \frac{1-\xi^{\frac{\lambda+3}{N_{\mathrm{bins}}}}}{1-\xi^{\frac{\lambda+1}{N_{\mathrm{bins}}}}} \right) \right]^{\frac{1}{2}}.
\end{align}
where $\xi = \frac{a_{\mathrm{min}}}{a_{\mathrm{max}}}$.
The total number density of dust $n_{\mathrm{g,tot}}$ is determined by constraining the total grain mass density in the size distribution to be
\begin{equation}
\rho_{\mathrm{g,tot}} = \int_{a_{\mathrm{min}}}^{a_{\mathrm{max}}} \frac{4}{3} \pi \rho_{s} a^{3} \mathcal{C} a^{\lambda} da ~,
\end{equation}
which yields
\begin{equation}
n_{\mathrm{g,tot}} =\left( \frac{\rho_{\mathrm{g,tot}}}{\frac{4}{3}\pi \rho_s a_{\trm{min}}^3} \right) \left( \frac{\lambda+4}{\lambda+1} \right) \left( \frac{1-\xi^{-(\lambda+1)}}{\xi^{\lambda+4}-1} \right) \xi^{\lambda+4} .
\end{equation}
Finally, we constrained the factor $\mathcal{C}$ by choosing the total grain density $\rho_{\mathrm{g,tot}}$ to obtain the same total surface area as a fiducial uniform distribution with a grain size $a_{0}$ \citep[see][]{KunzMouschovias2009}. Because
\begin{equation}
n_{\mathrm{g,tot}} = \frac{a_{\mathrm{max}}^{\lambda+1} \mathcal{C}}{\lambda+1} \left( 1 - \xi^{\lambda+1}\right) ~,
\end{equation}
this yields
\begin{equation}
\rho_{\mathrm{g,tot}} = \rho_{\mathrm{g,tot}}^{\mathrm{fiducial}} \left( \frac{a_{\mathrm{min}}}{a_{0}} \right) \left( \frac{\lambda+3}{\lambda+4} \right) \left( \frac{1-\xi^{-(\lambda+4)}}{1-\xi^{-(\lambda+3)}} \right),
\end{equation}
where, for a dust to gas ratio of 1\%, $\rho_{\mathrm{g,tot}}^{\mathrm{fiducial}} = 0.01~\rho_{\mathrm{n,tot}}$ ($\rho_{\mathrm{n,tot}}$ represents the density of neutral gas).
In the MRN distribution, small grains vastly outnumber the large grains, contributing dominantly to the total surface area.
The total grain density is then $\rho_{\mathrm{g,tot}}^{(\trm{MRN})}~=~0.0341 \rho_{\mathrm{n,tot}}$.
\subsubsection{Grains at high temperature}\label{grains_vap_sect}
\paragraph{Grain evaporation}
The three main grain constituents are carbon (essentially amorphous), silicates (here represented by the molecule (MgFe)SiO$_4$) and aluminium oxyde (Al$_2$O$_3$).
For the sake of simplicity, we assumed that each grain is composed of only one of these three materials, instead of considering a layered structure, as suggested by various studies \protect\citep[e.g.][]{Semenov2003}
The precise evolution of the grain population is a complex issue. Grains evaporate during the first core contraction, before the second collapse. \citet{Lenzuni} proposed two main processes of grain destruction:
thermal evaporation (destruction directly through thermal vibration), and chemisputtering (reactions between dust and gas). The authors found that carbon evaporates between 750 K and 1100 K, silicates between 1200 K and 1300 K, and aluminium oxides between 1600 K and 1700 K.
We here assumed that for each material, the quantity of evaporated grains grows linearly with temperature inside the above ranges until total depletion of this type of grain.
Based on the relative fractional abundances of each material calculated from Table 2 in \citet{Lenzuni} C 85\%, (MgFe)SiO$_4$ 14.4\%, and Al$_2$O$_3$ 0.6\%,
we obtain the three-step evolution curve displayed in \refig{fracofgrains}.
\begin{figure}
\begin{center}
\includegraphics[trim = 2cm 2cm 2cm 2cm,width=0.5\textwidth]{./Fraction.pdf}
\caption{Abundance of grains (relative to their value at T $< 750$ K) as a function of temperature. The most abundant species (C, MgFeSiO$_4$ and Al$_2$O$_3$) evaporate during the three represented main destruction stages.}
\label{fracofgrains}
\end{center}
\end{figure}
\paragraph{Thermionic emission}
Thermal agitation on grains induces spontaneous emission of electrons adsorbed on the grain surface \citep{deschturner}. Richardson's law gives the rate of emission
\begin{equation}
\phi = 4\pi a^2 \lambda_\mathrm{R} \frac{4\pi m_\mathrm{e} (k_\mathrm{B}T)^2}{h^2} \exp \left(\frac{W + \frac{Ze^2}{a}}{k_\mathrm{B}T}\right),
\end{equation}
with $\lambda_\mathrm{R} = 0.5$, $W = 5 \mathrm{eV}$, $Z$ the grain charge and $a$ its radius.
\subsubsection{Grain charges}
Grains can hold several electric charges \citep{DraineSutin}. However, multiply charged grains are weakly abundant in comparison to the singly charged or neutral grains \citep{Sano2004}. Including these grains means handling abundances that range over 20 orders of magnitude, which is numerically difficult to achieve accurately. Furthermore, current analytical models do not correctly describe the charge distribution when grain-grain reactions dominate (see Appendix \ref{Charge_appendix} for more details). In the present paper, we considered grains holding only one electric charge but we rook the grain-grain reactions into account. We acknowledge that multiply charged grains may change our results, and we will address this issue in future work.
\section{Chemistry}\label{chem}
\subsection{Chemical network}\label{network_sect}
We considered the following elements and their ionised counterparts: H, He, C, O and heavy metallic elements such as Na, Mg, Al, Ca, Fe, Ni, and Si. In conditions typical of molecular clouds and cold neutral medium, H, C and O are primarily found in their molecular forms (H$_2$, CO, O$_2$, H$_2$O, OH). We
assumed this to be still the case after the second collapse, but we kept in mind that we lack a precise description of the evolution of these molecules at $T>2000~$K.
The charged particles taken into account are electrons e$^-$,
H$^+$, He$^+$, C$^+$, H$_\mathrm{3}^+$, molecular ions m$^+$, and metallic ions M$^+$.
We considered grains of various sizes (see Sect. \ref{grains_size}), either neutral or with an electric charge $\pm e$.
Potassium, sodium, and hydrogen are major contributors to ionised species in number density at high temperature, because of their low ionisation energy.
These ionisation reaction{s} \citep[described in][see Appendix \protect\ref{Networkappendix}]{PneumanMitchell} become relevant at $T > 1500~$K
and are included in our network.
Since Na and K are alkali metal, we assumed that their reactions and associated rate coefficients are the same as for the other metallic ions M$^+$.
Let $\alpha_{ij}$ represent the reactions of ionisation of species $j$ into $i$
\begin{align}
j \rightarrow i + e^-,
\end{align}
with the ionisation rate of hydrogen molecules $\zeta$. In our context, UV and radionucleides contributions to ionisation rate are negligible compared to cosmic rays that can deeply penetrate dense cores, and we therefore write $\zeta = \zeta_{\mathrm{CR}}$.
Let $\beta_{ijk}$ represent the reactions between $j$ and $k$ to form $i$
\begin{align}
j +k \rightarrow i + ,
\end{align}
and $\beta_{*ij}$ (where $*$ denotes any other species that might be present) the reactions between $i$ and $j$ to form another species.
We note that $\beta_{ijk}=\beta_{ikj}$. We also defined $\gamma_{ij}$ to represent the reactions between $i$ and $j$ to form another species, such as $\beta_{*ij}$,
but $\gamma_{ij}$ specifically characterises the destruction of $i$ and $j$ rather than the creation of a given species
\begin{align}
i + j \rightarrow *.
\end{align}
Here $\gamma_{ij}=\gamma_{ji}$.
\noindent We then solved the complete set of equations for each charged species (written in dimensionless form)
\begin{align}
\left\{
\begin{array}{l}
... \\
\frac{d x_i}{\tilde{dt}} = \sum_{j=1}^N \big[ \alpha_{ij} x_j + \frac{n_\mathrm{H}}{2 \zeta} \sum_{k=1}^N \beta_{ijk} x_j x_k - \frac{n_\mathrm{H}}{\zeta} \gamma_{ij} x_j x_i \big] \\
...
\end{array}
\right. \label{base}
\end{align}
where $N$ is the total number of species (both neutrals and charged particles), $n_\mathrm{H}$ is the density of neutrals (here the density of hydrogen molecules), and $x_i$ denotes the fractional abundances of various particles, $x_i = \frac{n_i}{n_\mathrm{H}}$, and $\tilde{dt}=dt \zeta$.
We considered that neutral abundances are constant, with values taken from \citet{UmebayashiNakano1990}, and we solved for the eight above-mentioned cations, plus electrons and grains.
The reaction rates were taken from the UMIST database \citep{McElroy} for gas species and \citet{KunzMouschovias2009} for the interactions with and between grains.
More details on the chemical network (the considered reactions, the initial abundances, etc.) are given in Appendix \ref{Networkappendix}.
\subsection{Numerical method}
Our resolution method is a semi-implicit scheme. It is unconditionally stable and permits either accurate following of the temporal evolution of the solution (using a stringent constraint on the time step) or acceleration of the equilibrium abundances calculations (with a larger time step). In the latter case, we lose precision on the temporal evolution of the network, but the convergence toward equilibrium is unconditional, which is our main interest.
We write $ F(\mathbf{x})_i = \sum_{j=1}^N \big[ \alpha_{ij} x_j + \frac{n_\mathrm{H}}{2 \zeta} \sum_{k=1}^N \beta_{ijk} x_j x_k - \frac{n_\mathrm{H}}{\zeta} \gamma_{ij} x_j x_i \big]$, and Taylor-expand the right-hand side of Eq. (\ref{base}). This yields
\begin{align}
x_i^{n+1} &= x_i^n + \tilde{dt} F_i ( \mathbf{x}^{n+1}) \nonumber \\
&= x_i^n + \tilde{dt} \left[ F_i (\mathbf{x}^{n}) + \sum_{j=1}^N \mathbb{J}_{ij}^n \delta x_j + \mathcal{O}(||\mathbf{\delta x}||) \right],
\end{align}
where $\mathbb{J}$ is the Jacobian matrix, $\mathbf{x} = (x_1,x_2,\dots,x_N)$, and $\delta x_i$ denotes the variation in abundance of the species $i$ between the time steps $n$ and $n+1$. In matrix form, this reads
\begin{align}\label{simplicit}
(\mathbb{I}-\tilde{dt} \mathbb{J}^n) \,\mathbf{\delta x} = \tilde{dt} \,\mathbf{F(\mathbf{x^n})},
\end{align}
where $\mathbb{I}$ is the identity matrix, and $\mathbf{F}(\mathbf{x}) = (F_1(\mathbf{x}), \dots, F_n(\mathbf{x}))$.
We limited $\tilde{dt}$ by constraining the maximum allowed relative variation during one time step
\begin{align}
\frac{\Delta \mathbf{x}}{\mathbf{x}} < \epsilon, \label{timestep}
\end{align}
with the control parameter $\epsilon=10^{-2}$.
This permits equilibrium to be rapidly reached and with good precision.
The matrix on the left-hand side of Eq. (\ref{simplicit}) is singular, or numerically very close to singular\footnote{Because of the neutral grains, although it is very close to singular even without them, because of very rare species.}. We used the Singular Value Decomposition (SVD), described in \citet{NumRec} to solve system (\ref{simplicit}).
We imposed $F_i({\mathbf{x})} = 0$ for species whose abundances are more than eight orders of magnitude smaller than the most abundant ones, because their variations have a negligible influence on the chemical evolution, and this avoids unnecessary small time steps. For $T > 1700$ K, we also set up the fractional abundance of grains to $10^{-30}$ instead of to $0$ to avoid numerical problems.
\section{Results}
\subsection{Fiducial case}
Our fiducial case includes ten bins of grain sizes and a standard cosmic-ray ionisation rate of $10^{-17}$ s$^{-1}$ \citep[as in][]{UmebayashiNakano1990}.
The evolution of the various abundances of charged species as function of density during the global collapse of a prestellar core is presented
in \refig{fiducial}.
\begin{figure*}
\begin{center}
\includegraphics[width=0.8\textwidth]{./abundances_fiducial.pdf}
\caption{Evolution of the fractional abundances for the charged species with density for our fiducial case: 10 bins of grains, barotropic equation of state and a cosmic-ray ionisation rate $\zeta_\mathrm{CR}=10^{-17}$ s$^{-1}$.}
\label{fiducial}
\end{center}
\end{figure*}
Electrons and M$^+$ are the dominant charged species at low densities. For $n_\mathrm{H} > 10^8$ cm$^{-3}$, grains take over while the abundances
of all other species decrease by several orders of magnitude. Negatively charged grains are at first more abundant until the neutral grain prevalence for $n_\mathrm{H} > 10^{9}$cm$^{-3}$, eventually becoming the main charge carriers alongside positively charged grains.
At $10^{16}$ cm$^{-3}$, the thermionic emission of grains becomes relevant and releases many electrons.
Meanwhile, grain evaporation proceeds through the three stages of destruction that are clearly visible until $n_\mathrm{H} = 10^{18}$ cm$^{-3}$.
This affects the abundances of other species, especially M$^+$, K$^+$, Na$^+$ and e$^-$. Immediately after the complete destruction of the grains,
the thermal ionisation of K, Na and H become important, and their ionised counterparts become the dominant species along with M$^+$ and e$^-$.
Eventually, all neutral K, Na and M atoms disappear, leaving H$^+$ as the most abundant ionised species.
Grain evaporation takes place at the end of the first core phase, and the thermal ionisations essentially take place during the second collapse.
The corresponding conductivities and resistivities are plotted in \refigs{conduct}{resist}. Ohmic and ambipolar resistivities are positive,
but Hall conductivities and resistivities have negative values at low densities (light blue curves), before becoming positive (dark blue curves).
For $n_\mathrm{H}~<~10^{15}$ cm$^{-3}$, these figures are qualitatively comparable to Fig. 7 of \citet{Kunz2}.
We recovered the result of \citet{Wardle1999} concerning the Hall conductivity, becoming comparable to the Pedersen conductivity for
$10^6~<~n_\mathrm{H}~<~10^{11}$ cm$^{-3}$ for an MRN grain-size distribution, while it is slightly higher in our case.
There is a peak in resistivities at $n_\mathrm{H}~\approx~10^{18}$ cm$^{-3}$ that is due to grain evaporation,
where all three resistivities have similar values (but are still dominated by the Ohmic diffusion).
The peak does not extend over a wide range of densities because the number density of charged species increases again as soon as
thermal ionisations begin, which drastically decreases the resistivities.
After the peak, resistivity is dominated by the Ohmic and Hall contributions, which remain comparable, until Ohmic resistivity eventually prevails. \refig{resist} also clearly highlights the differences, in the evolution of the various resistivities, between the present calculations and the results of previous studies. For the ambipolar resistivity, \protect\citet{DuffinPudritz} used the simple analytical expression $\eta_\mathrm{AD} \propto \frac{B^2}{n_\mathrm{H}\sqrt{n_\mathrm{H}}}$, so that their resistivity scales as $\frac{1}{n_\mathrm{H}}$ (because we consider $B \propto \sqrt{n_\mathrm{H}}$). Our ambipolar resistivity is close to theirs at low densities, but the two values diverge around $n_\mathrm{H}~=~10^{10}~{\rm cm}^{-3}$. This is due to their assumption that ions are perfectly coupled to the magnetic field, and that the ion-neutral collision time is much shorter than the other characteristic physical times of the system. The authors acknowledge that their model fails for dense regions, with $n_\mathrm{H}~>~10^{10} {\rm cm}^{-3}$. The model of Ohmic resistivity from \citet{Machida_etal07} also matches ours for $n_\mathrm{H}~\le~10^{15} $. The chemical network they considered \citep[][]{nakano2002}, however, does not directly include potassium in this form, neither the present updated reaction rates nor grain evaporation. At low density ($n_\mathrm{H}~\le~10^{[15-16]}~{\rm cm}^{-3}$ for the Ohmic resistivity and $n_\mathrm{H}~\le~10^{10}~{\rm cm}^{-3}$ for ambipolar resistivity), these two commonly used models are then in agreement with our results, but the additional physics included in our work significantly improves the situation for the conditions inside the first and second cores.
\begin{figure}
\begin{center}
\includegraphics[trim= 2cm 2cm 2cm 2cm, width=0.50\textwidth]{./conductivities_fiducial.pdf}
\caption{Conductivities as a function of density for the fiducial case. Light blue: negative Hall conductivity, dark blue : positive Hall conductivity, red: parallel conductivity, green: perpendicular conductivity.}
\label{conduct}
\end{center}
\end{figure}
\begin{figure}
\begin{center}
\includegraphics[trim= 2cm 2cm 2cm 2cm, width=0.50\textwidth]{./resistivities_fiducial.pdf}
\caption{Resistivities as a function of density for the fiducial case. Light blue: negative Hall resistivity: dark blue: positive Hall resistivity, red: ambipolar diffusion resistivity, green: Ohm resistivity.}
\label{resist}
\end{center}
\end{figure}
\subsection{Magnetic field variations}
The magnetic field only influences the resistivities and the conductivities and has no effect on the chemistry. \refig{mag_change} shows the resistivities for the fiducial case and for magnetic fields three times lower and higher. Hall and ambipolar resistivities are slightly shifted, while the Ohmic resistivity is of course not affected because it does not depend on $B$. Varying the magnetic field has the strongest effect on the first collapse density range. The density at which the Hall resistivity changes sign during the first core contraction is also shifted, and
the ratio between the three resistivities is strongly affected, especially in the $10^{16}-10^{18}$ cm$^{-3}$ density range. Because the resistivities were computed on the fly with the magnetic field of the simulation, this variation will influence the gravitational collapse. As the Hall effect is strongly sign dependent, the formation of some structures, like the first Larson core or the protoplanetary disk, may be delayed or made impossible \citep{Tsukamoto2015,Wurster2015}.
\begin{figure}
\begin{center}
\includegraphics[trim= 2cm 2cm 2cm 2cm, width=0.50\textwidth]{./compa_resistivities_b.pdf}
\caption{Resistivities as a function of density for the fiducial case, and a magnetic field three times higher and lower. Same colour coding as \refig{resist}.}
\label{mag_change}
\end{center}
\end{figure}
\subsection{Effect of grain evaporation}
\refig{novap_nh} presents the same calculations as for the fiducial case, but without grain evaporation. There are substantial changes for $n_\mathrm{H} > 10^{16}$ cm$^{-3}$, at the onset of grain destruction.
The abundances of both electrons and metallic ions increase as a result of the thermionic emission of the grains and the thermal ionisations.
They are the dominant species along with negatively charged grains, which are more prone to form because of the large number of free electrons released by K,
Na and H atoms. Consequently, the abundances of neutral and positive grains both drop, while the abundances of other species remain very small.
\refig{novap_eta} shows the effect that removing grain evaporation has on the resistivities. At high densities ($>10^{20}$~cm$^{-3}$)
the resistivities still decrease because the number of ionised particles increases in the medium.
In the density range typical of the second collapse and the second Larson core,
$10^{15} < n_\mathrm{H} < 10^{22}\trm{cm}^{-3}$, the Hall and the Ohmic resistivites show significant differences compared to the fiducial case.
The Hall resistivity is first lower and then higher than the reference case, while the Ohmic resistivity is tremendously higher in this density range.
At $n_\mathrm{H} \approx 10^{22}\trm{cm}^{-3}$, the excessive abundance of electrons in the medium cancels out the difference between the two cases.
An accurate description of grain evaporation is therefore mandatory to study the possible transformation of the first core into a disk around the second Larson core \citep[as described in][]{Machida_etal06}.
\begin{figure}
\begin{center}
\includegraphics[trim= 2cm 2cm 2cm 2cm, width=0.50\textwidth]{./abundances_novap.pdf}
\caption{Fractional abundances, using ten bins, without grain evaporation.}
\label{novap_nh}
\end{center}
\end{figure}
\begin{figure}
\begin{center}
\includegraphics[trim= 2cm 2cm 2cm 2cm, width=0.50\textwidth]{./compa_resistivities_vap.pdf}
\caption{Comparison of the resistivities with and without grain evaporation. Same colour coding as in \refig{resist}. Dashed lines represent the absence of evaporation, whereas solid lines stand for the fiducial case.}
\label{novap_eta}
\end{center}
\end{figure}
\subsection{Cosmic-ray ionisation rates} \label{ionisation_sect}
Cosmic-rays (hereafter CR) propagation along field lines is affected by two competing effects: magnetic focusing, which increases the ionisation rate, and magnetic mirroring, which prevents CRs from reaching deep parts of the cloud. \citet{PadovaniGalli2011,PadovaniHennebelleGalli2013,2014A&A...571A..33P} found that mirroring always dominates focusing for a field topology obtained by ideal-MHD simulations of collapsing rotating clouds and that the ionisation rate could vary by up to a factor $50$, depending on the mass-to-flux ratio and the magnetic flux tube considered. In addition, CR are partly absorbed by the dense medium, which lowers the CR ionisation rate \citep{Padovani2009}.
To quantify the effect of these uncertainties on the CR ionisation rate in a protostellar environment with a complex magnetic field topology (twisted field lines, misalignement, turbulence, etc.), we computed abundances and resistivities for two CR values in addition to our standard case, namely $\zeta_\mathrm{CR} = 5\times 10^{-18} \, \mathrm{s}^{-1}$ and $\zeta_\mathrm{CR} = 1\times 10^{-18} \, \mathrm{s}^{-1}$. The results are shown \refig{ionis_try} (we do not show the abundances because they are similar to the fiducial case).
The Hall and ambipolar diffusion contributions are alternatingly increase and decrease.
In comparison, our fiducial value $\zeta_\mathrm{CR} = 1\times 10^{-17} \, \mathrm{s}^{-1}$ yields about an Ohmic dissipation that is about an order of magnitude smaller
before the resistivities decrease at $n_\mathrm{H} \approx 10^{17}$~cm$^{-3}$.
Minor deviations are visible in the second collapse density range, but the overwhelming contribution of electrons and hydrogen compensates for most of the variations.
\begin{figure}
\begin{center}
\includegraphics[trim= 2cm 2cm 2cm 2cm, width=0.50\textwidth]{./compa_resistivities_xi.pdf}
\caption{Resistivities for different cosmic-ray ionisation rates, with the barotropic EOS. Solid lines: fiducial value $\zeta_{\mathrm{CR}_{\trm{ref}}} = 1\times 10^{-17} \mathrm{s}^{-1}$. Dashed lines: $\zeta_\mathrm{CR} = \frac{\zeta_{\mathrm{CR}_\trm{ref}}}{2} = 5\times 10^{-18} \mathrm{s}^{-1}$. Dotted lines: $\zeta_\mathrm{CR} = \frac{\zeta_{\mathrm{CR}_\trm{ref}}}{10} = 1\times 10^{-18} \mathrm{s}^{-1}$. Same colour coding as \refig{resist}}
\label{ionis_try}
\end{center}
\end{figure}
\subsection{Grain-size distribution}\label{sizedistrib}
Most of the grain surface is due to the smallest grains, therefore a large enough number of grain bins is necessary to properly evaluate of the final conductivity.
Similar as \citet{KunzMouschovias2009}, we found that five size bins seem to be sufficient to reach a relative precision of the order of $1\%$ for every considered species. In this part, our reference case includes ten size bins. The error on the abundances was calculated as $\frac{|| \mathbf{x}_{N_\mathrm{bins}} - \mathbf{x}_\mathrm{ref}||}{||\mathbf{x}_\mathrm{ref}||}$, where $||\ ||$ is the $\mathrm{L}_2$ norm of the abundance vector $\mathbf{x}$, $\mathbf{x}_{N_\mathrm{bins}}$ is the abundance vector for the number of bins $N_\mathrm{bins}$ considered, and $\mathbf{x}_\mathrm{ref}$ is the abundance vector for the ten bin case. The relative error on the least abundant gas molecules becomes fairly high when grains start to evaporate at $10^{17}~$cm$^{-3}$, but this is inconsequential since these species hardly contribute to the resistivity at this stage. Five bin abundances clearly yield a smaller error than the ten bins case, which shows that our fiducial calculations have a good precision.
The resistivities for different numbers of bins (one, five, and ten) are plotted in \refig{resist_bins}.
When only one bin is considered, the resistivities are shifted up and down by about one order of magnitude and are strongly overestimated in
the $10^{12} - 10^{17}~$cm$^{-3}$ density range. However, the five and ten bins cases are extremely close to each other.
A large enough number of bins is thus necessary to properly describe this highly dynamic phase of the prestellar core evolution.
\begin{figure}
\begin{center}
\includegraphics[trim= 2cm 2cm 2cm 2cm, width=0.50\textwidth]{./relative_error_grains_10.pdf}
\includegraphics[trim= 2cm 2cm 2cm 2cm, width=0.50\textwidth]{./relative_error_species_10.pdf}
\caption{Relative error in the species abundances ($=\frac{||\mathbf{x_{N_\mathrm{bins}}}-\mathbf{x_{ref}}||}{||\mathbf{x_{ref}}||}$) for different numbers of size bins (relatively to the ten bins results) for grains only (top panel), and for other species (bottom panel) in the density range before grain evaporation.}
\label{precisiongrains}
\end{center}
\end{figure}
\begin{figure}
\begin{center}
\includegraphics[trim= 2cm 2cm 2cm 2cm, width=0.50\textwidth]{./compa_resistivities_bins.pdf}
\caption{Resistivities for different numbers of size bins. Solid line: ten bin fiducial case, dotted line: five bins, dash-dotted line: one bin. Same colour coding as \refig{resist}.}
\label{resist_bins}
\end{center}
\end{figure}
Even though the MRN grain-size distribution is reasonable when considering interstellar dust, it becomes of questionable validity for denser media such as molecular clouds or Larson cores, for which a precise grain-size distribution is still lacking.
We examined the effect of this uncertainty by conducting calculations with another distribution: $\lambda = -2.8$
(instead of $\lambda = -3.5$ for the MRN distribution), as suggested by \citet{Compiegne} for amorphous carbon grains between radii of$\sim 5$
and few hundred nanometers. The result for the resistivities is shown in \refig{bins_inv_fig}.
Despite the similarity of the comportment of the resistivities between $10^5$ cm$^{-3}$ and $10^{17}$ cm$^{-3}$,
there is a slight difference in the partitioning for the dominant effect. For example, around $n_\mathrm{H} = 10^{14}$ cm$^{-3}$,
Ohmic diffusion takes the lead upon the ambipolar diffusion for a density ten times higher than the MRN distribution.
This density range is typical of protostellar disks, which means that the respective evolution of these latter might be quite different because the size distributions may vary from one to another, with effects difficult to control (grain coalescence, premature destruction, etc.).
Several authors proposed their own size distribution. \citet{Compiegne} also assumed a lognormal distribution for the smallest grains (PAH and small amorphous carbon) and a power law with an exponential cut-off for larger amorphous carbon grains and amorphous silicate grains to reproduce observed emission and extinction spectra (see their Fig. 2).
\begin{figure}
\begin{center}
\includegraphics[trim= 2cm 2cm 2cm 2cm, width=0.5\textwidth]{./compa_resistivities_mrn.pdf}
\caption{Ambipolar diffusion resistivity for the MRN $\lambda=-3.5$ (full line) and the \citet{Compiegne} $\lambda=-2.8$ (dashed line) distributions, with the same (our) barotropic EOS.}
\label{bins_inv_fig}
\end{center}
\end{figure}
\subsection{Non-equilibrium chemistry}
Until now, all the species abundances were calculated at chemical equilibrium. In real situations, the chemical reaction timescale could be greater than the dynamical (collapse) one. In that case, the environment conditions (density, temperature, etc.) can change significantly before chemical equilibrium is reached.
We explored this possibility by comparing the timescale required for our chemical network to reach equilibrium with the typical free-fall time for a self-gravitating spherical cloud,
$t_\mathrm{ff} = \sqrt{\frac{3\pi}{32G\bar{\rho}}}$ (with $\bar{\rho}$ the mean density of the cloud). The results are portrayed in \refig{times}. Clearly, the free-fall time is far longer than the chemical equilibrium time at all densities. Furthermore, the above free-fall time estimate is likely to be underestimated since real clouds are additionally supported by thermal, turbulent and magnetic pressures. Therefore, assuming chemical equilibrium seems to be valid in the context of collapsing prestellar cores, with the limitation that we did not consider the history of the chemical species during the collapse. Particles may be transported from one specific environment to another (e.g. from the core region to the outflow then to the disk). The only way to properly account for this complicated pattern is to calculate non-equilibrium chemical reactions on the fly during the dynamical collapse. Additionally the flow of the fluid changes the dynamics and statistics of the collisions, which results in chemical transformations and should therefore also be taken into account. This task remains computationally prohibitive for now.
\begin{figure}
\begin{center}
\includegraphics[trim= 1cm 2cm 1cm 2cm,width=0.49\textwidth]{./Times.pdf}
\caption{Typical chemical equilibrium timescale (solid red) and dynamical timescale (dash green) as a function of density.}
\label{times}
\end{center}
\end{figure}
\section{Conclusion}
We have developed a solver that computes a detailed network of the main chemical reactions relevant to the first and second collapse of prestellar cores. The network is based on the work of \citet{UmebayashiNakano1990} but extends this study significantly by updating the reaction rates and including the effects of dust evaporation, thermal ionisation of potassium, and exploring various cosmic-ray ionisation rates. We also used a distribution of grain sizes, the MRN distribution, and explored the effect of the number of size-bins on the results. The solver yields the chemical equilibrium abundances of the various neutral and ionised species\footnote{It can also be used to derive out-of-equilibrium abundances of given species during the collapse, if necessary.}. The various abundances were used to calculate the non-ideal MHD resistivities, namely Ohmic, Hall and ambipolar resistivities, during the collapse, using a barotropic EOS to reproduce the typical density-temperature conditions. The resistivities determine the dynamics of the first and second collapse, and thus the properties of the first and second Larson cores.
Above a temperature $T \sim 500~$K , the effects of thermionic emission, grain evaporation and thermal ionisation become preponderant. An accurate description of these processes is mandatory to properly characterise the collapse because they occur during the first core contraction and influence the initial conditions of the second collapse. Dust destruction has a double effect on the collapse. First, it modifies the opacity of the medium \protect\citep[see e.g.][]{Lenzuni}, which regulates the radiative cooling of the system. Evaporation increases the efficiency of this process, and the collapse accelerates as the gas is less thermally supported. Second, it affects the various resistivities of the non-ideal MHD terms with direct effect on magnetic field topology and a diminution of the magnetic braking.
We did not include the molecular dissociation of elements in the chemical network, in particular the dissociation of H$_2$ at 2000 K, which leads to the second collapse. However, we do
not expect the resistivities to be significantly affected by this process because H$^+$ ions and electrons are the dominant charged species at these temperatures. As mentioned in the text, our grain model is simplified because we assumed that each grains was composed of only one material. A more realistic structure containing several layers of different materials that evaporate one after the other will be included in future work.
In addition to the general outcome of these calculations and their effect on prestellar core evolution, we wish to highlight the following points
\begin{itemize}
\item At least five bins for the grain-size distribution are necessary to reliably determine of the resistivities. As discussed in Sect. \ref{sizedistrib}, a precise knowledge of the grain-size distribution would certainly improve the reliability of the results.
\item As shown in Sect. \ref{ionisation_sect}, resistivities change by up to two orders of magnitude when ionisation rates vary by a factor 10. This highlights the importance of shielding against cosmic rays in collapsing cores \citep{Padovani2014}.
\item In the temperature range 750 K $\lesssim T \lesssim 1700$ K, dust grains evaporate. This evaporation has tremendous consequences on the various chemical abundances and thus on the resistivities, since grains are the main contributors to the resistivities at these temperatures.
\item Around 1500 K and above, at which thermal ionisation of metallic ions and hydrogen occur, grains have been entirely destroyed and H$^+$ and electrons become the main charge carriers, which causes the resistivities to drop even further.
\item Our chemical integration time is always shorter than the free-fall time. We can therefore assume equilibrium chemistry, which is less demanding than non-equilibrium chemistry, especially during hydrodynamics simulations.
\end{itemize}
This solver allows us to compute a large multi-dimensional multi-species equilibrium abundance table for a wide range in temperatures, densities and ionisation rates.
This table can be used during simulations of the first and second collapse of prestellar cores, allowing a consistent dynamical-chemical description of this process. The table can be downloaded at
https://bitbucket.org/pmarchan/chemistry.
\begin{acknowledgements}
The research leading to these results has received funding from the European Research Council under the European Community's Seventh Framework Programme (FP7/2007-2013 Grant Agreement no. 247060).
BC gratefully acknowledges support from the French ANR Retour Postdoc program (ANR-11-PDOC-0031).
NV is supported by the European Commission through the Horizon 2020 Marie Sk{\l}odowska-Curie Actions Individual Fellowship 2014 programme (Grant Agreement no. 659706).
We acknowledge financial support from the ``Programme National de Physique Stellaire'' (PNPS) of CNRS/INSU, France.
We thank T.~Grassi for useful discussions during the writing of this paper. Finally, we would also like to thank the referee for very insightful comments that have greatly helped to improve the completeness of this work.
\end{acknowledgements}
\begin{appendix}
\section{Details of the chemical network}\label{Networkappendix}
Table \ref{reactions} gives a list of all the reactions implemented in the code, taken from \citet{UmebayashiNakano1990}. The reaction rates are taken from the UMIST Database \citep{McElroy}. The $\bar{\alpha}$, $\bar{\beta}$, and $\bar{\gamma}$ coefficients are defined as
\begin{align*}
k=\bar{\alpha} \left(\frac{T}{300}\right)^{\bar{\beta}} e^{-\frac{\bar{\gamma}}{T}},
a=1
\end{align*}
with $k$ the reaction rate. The units of $k$ are cm$^3$s$^{-1}$ for reactions between species and s$^{-1}$ for ionisation and photo-reactions with cosmic rays.
M stands for metals such as Mg, Al, Ca and Fe. Following \citet{UmebayashiNakano1990},
we used for all these elements the typical coefficient rates of Mg, which is the most abundant species.
m stands for molecules that can be ionised and are represented by HCO$^+$.
\begin{table}
\caption{Chemical reactions and coefficient rates of the chemical network.}
\label{reactions}
\centering
\begin{tabular}{lrrr}
\hline\hline
Reaction & $\bar{\alpha}$ & $\bar{\beta}$ & $\bar{\gamma}$\\
\hline
H$^+$ + O $\rightarrow$ H + O$^+$ & $6.86 \times 10^{-10}$ & $0.26$ & $0$\\
H$^+$ + O$_2$ $\rightarrow$ H + O$_2^+$ & $2.00 \times 10^{-9}$ & $0.00$ & $0$\\
H$^+$ + M $\rightarrow$ H + M$^+$ & $1.10 \times 10^{-9}$ & $0.00$ & $0$\\
He$^+$ + H$_2$ $\rightarrow$ He + H$^+$ + H & $3.70 \times 10^{-14}$ & $0.00$ & $35$\\
He$^+$ + CO $\rightarrow$ He + C$^+$ + O & $1.60 \times 10^{-9}$ & $0.00$ & $0$\\
He$^+$ + O$_2$ $\rightarrow$ He + O$^+$ + O & $1.10 \times 10^{-9}$ & $0.00$ & $0$\\
H$_3^+$ + CO $\rightarrow$ H$_2$ + HCO$^+$ & $1.36 \times 10^{-9}$ & $-0.14$ & $0$\\
H$_3^+$ + O $\rightarrow$ H$_2$ + OH$^+$ & $7.98 \times 10^{-10}$ & $-0.16$ & $0$\\
H$_3^+$ + O$_2$ $\rightarrow$ H$_2$ + O$_2$H$^+$ & $9.30 \times 10^{-10}$ & $0.00$ & $0$\\
H$_3^+$ + M $\rightarrow$ H$_2$ + H + M$^+$ & $1.10 \times 10^{-9}$ & $0.00$ & $0$\\
C$^+$ + H$_2$ $\rightarrow$ CH$_2^+$ + $h\nu$ & $2.00 \times 10^{-16}$ & $0.00$ & $0$\\
C$^+$ + O$_2$ $\rightarrow$ CO$^+$ + O & $3.42 \times 10^{-10}$ & $0.00$ & $0$\\
C$^+$ + O$_2$ $\rightarrow$ CO + O$^+$ & $4.54 \times 10^{-10}$ & $0.00$ & $0$\\
C$^+$ + M $\rightarrow$ C + M$^+$ & $1.10 \times 10^{-9}$ & $0.00$ & $0$\\
m$^+$ + M $\rightarrow$ m + M$^+$ & $2.90 \times 10^{-9}$ & $0.00$ & $0$\\
H$^+$ + e$^-$ $\rightarrow$ H + $h\nu$ & $3.50 \times 10^{-12}$ & $-0.75$ & $0$\\
He$^+$ + e$^-$ $\rightarrow$ He + $h\nu$ & $5.36 \times 10^{-12}$ & $-0.5$ & $0$\\
H$_3^+$ + e$^-$ \begin{tabular}{l} $\rightarrow$ H + H + H \\ $\rightarrow$ H$_2$ + H\end{tabular} & $2.34 \times 10^{-8}$ & $-0.52$ & $0$\\
C$^+$ + e$^-$ $\rightarrow$ C + $h\nu$ & $2.36 \times 10^{-12}$ & $-0.29$ & $0$\\
m$^+$ + e$^-$ $\rightarrow$ m$_1$ + m$_2$ & $2.40 \times 10^{-7}$ & $-0.69$ & $0$\\
M$^+$ + e$^-$ $\rightarrow$ M + $h\nu$ & $2.78 \times 10^{-12}$ & $-0.68$ & $0$\\
H$_2$ $\rightarrow$ H$_2^+$ + e$^-$ & $0.98\xi$ & &\\
H$_2$ $\rightarrow$ H$^+$ + H + e$^-$ & $0.02\xi$ & &\\
He $\rightarrow$ He$^+$ + e$^-$ & $0.53\xi$ & &\\
\hline
\end{tabular}
\end{table}
\noindent {We mention that the two reactions H$_3^+$ + e$^-$ $\rightarrow$ H + H + H and H$_3^+$ + e$^-$ $\rightarrow$ H$_2$ + H occur at the same rate.}
\noindent The ionisation rate for potassium, sodium and hydrogen are given by \cite{PneumanMitchell}
\begin{align}
\frac{dn_\mathrm{K^+}}{dt}= 6.5 \times 10^{-15} n_\mathrm{H_2} T^{\frac{1}{2}} \times e^{-\frac{5.1 \times 10^4\, \mathrm{K}}{T}} \mathrm{cm}^{-3}\, \mathrm{s}^{-1},\\
\frac{dn_\mathrm{Na^+}}{dt}= 1.4 \times 10^{-15} n_\mathrm{H_2} T^{\frac{1}{2}} \times e^{-\frac{6.0 \times 10^4\, \mathrm{K}}{T}} \mathrm{cm}^{-3}\, \mathrm{s}^{-1},\\
\frac{dn_\mathrm{H^+}}{dt}= 2.0 \times 10^{-10} n_\mathrm{H_2} T^{\frac{1}{2}} \times e^{-\frac{15.8 \times 10^4\, \mathrm{K}}{T}} \mathrm{cm}^{-3}\, \mathrm{s}^{-1}.
\end{align}
\noindent We considered recombination reactions at the surface of the grains. We used the collision rates of \cite{DraineSutin} and the interactions described in \citet{UmebayashiNakano1990}, \citet{IlgnerNelson} and \citet{KunzMouschovias2009}:
\begin{itemize}
\item Neutral grains: when hit by an electron, the electron sticks onto the grain with a probability of $P_e = 60\%$, while an ion always sticks.
\item Negatively charged grains: when hit by an ion, the ion recombines.
\item Positively charged grains: when hit by an electron, the grain becomes neutral.
\item Charged grains: if two grains with opposite charges collide, one electric charge is transferred.
\item Neutral grains: if hit by a charged grain, singly charged is transferred to the neutral grain.
\end{itemize}
The mean collision rate $\left< \sigma v\right>$ between a grain with a radius $a$ and a charge $q_\mathrm{g}$ and another species with a mass $m$ and a charge $q_\mathrm{s}$ is
\begin{equation}
\left< \sigma v \right> = \pi a^2 \left(\frac{8 k_\mathrm{B}T}{\pi m}\right)^{\frac{1}{2}}\left(1 - \frac{q_\mathrm{s}q_\mathrm{g}}{ak_\mathrm{B}T}\right)\left(1 + \left(\frac{2}{\frac{ak_\mathrm{B}T}{e^2}-2\frac{q_g}{q_s}}\right)^\frac{1}{2}\right)
\end{equation}
for $q_\mathrm{s}q_\mathrm{g} < 0$,
\begin{align}
\left< \sigma v \right> = \pi a^2 \left(\frac{8 k_\mathrm{B}T}{\pi m}\right)^{\frac{1}{2}}\left(1 + \left(\frac{4ak_\mathrm{B}T}{e^2} + 3\frac{q_\mathrm{g}}{q_\mathrm{s}}\right)^{-\frac{1}{2}}\right)^2 \nonumber \\
\times \exp \left(- \frac{q_\mathrm{g}e^2}{(q_\mathrm{s}ak_\mathrm{b}T)\left(1+\left(\frac{q_\mathrm{s}}{q_\mathrm{g}}\right)^{\frac{1}{2}}\right)}\right)
\end{align}
for $q_\mathrm{s}q_\mathrm{g} > 0$ and
\begin{equation}
\left< \sigma v \right> = \pi a^2 \left(\frac{8 k_\mathrm{B}T}{\pi m}\right)^{\frac{1}{2}}\left(1 + \left(\frac{\pi e^2}{2ak_\mathrm{B}T}\right)^{\frac{1}{2}}\right).
\end{equation}
for $q_\mathrm{g} = 0$.
For two grains of opposite charges $q$ and $q^{'}$ with radii $a$ and $a^{'}$ and a reduced mass $\mu_\mathrm{g}=\frac{m m^{'}}{m+m^{'}}$, the collision rate is
\begin{equation}
\left< \sigma v \right> = \pi (a + a^{'})^2 \left(\frac{8 k_\mathrm{B}T}{\pi \mu_\mathrm{g}}\right)^{\frac{1}{2}}\left(1 - \frac{qq^{'}}{(a+a^{'})k_\mathrm{B}T}\right),
\end{equation}
and
\begin{equation}
\left< \sigma v \right> = \pi (a + a^{'})^2 \left(\frac{8 k_\mathrm{B}T}{\pi \mu_\mathrm{g}}\right)^{\frac{1}{2}}\left(1 + \left(\frac{\pi e^2}{2(a+a')k_\mathrm{B}T}\right)^{\frac{1}{2}}\right)P_a.
\end{equation}
between a charged and a neutral grain. $P_a = \frac{a^2}{a^2+a^{'^2}}$ denotes the probability of a charge transfer to the neutral grain of radius $a^{'}$.
The abundances of the neutrals are also taken from \citet{UmebayashiNakano1990} (\citet{KunzMouschovias2009} for potassium). Because of its high thermal ionisation rate, K is the only neutral species whose fractional abundance varies in our network.
\begin{table}
\label{quantities}
\caption{Abundances of neutrals relative to H.}
\centering
\begin{tabular}{lr}
\hline\hline
Species & Relative abundance\\
\hline
H$_2$ & $0.5$\\
He & $8.5 \times 10^{-2}$\\
C & $8.4 \times 10^{-5}$\\
O & $4.1 \times 10^{-5}$\\
O$_2$ & $4.8 \times 10^{-5}$\\
M & $1.7 \times 10^{-6}$\\
K & $2.2 \times 10^{-10}$\\
Na & $3.1 \times 10^{-9}$\\
\hline
\end{tabular}
\end{table}
\section{Grain charges \label{Charge_appendix}}
Multiply charged grains are part of a chemical network \citep{NishiNakanoUmebayashi1991}. Figure \ref{2charges} shows the abundances of species in a simplified case (only one bin of size, without Na, the thermionic emission and thermal ionisation of H) but with grains holding two electric charges. Although they are generally less abundant than single-charge grains, they effect the charge distribution, especially for $n_\mathrm{H} > 10^{12}$cm$^{-3}$. The main effect is that one-charge grains, the main charge carriers, seem to form more neutral grains and are less numerous than in the fiducial case. This of course affects the resistivities, as shown in \refig{comp_eta_charges}.
\begin{figure}
\begin{center}
\includegraphics[width=0.5\textwidth]{./abundances_2charges.pdf}
\caption{Abundances of the chemical species with double-charge grains, without Na, the thermal ionisation of H and the thermionic emission.}
\label{2charges}
\end{center}
\end{figure}
\begin{figure}
\begin{center}
\includegraphics[width=0.55\textwidth]{./compa_resistivities_charges.pdf}
\caption{Resistivity comparison for the simplified case. Dashed line: network with only singly charged grains, solid line: network with singly and doubly charged grains.}
\label{comp_eta_charges}
\end{center}
\end{figure}
We were only able to produce such a result for one bin of size with the current method of resolution. The abundance gap between the two-charge holding grains and the remaining the species spans over 20 orders of magnitude (especially at low densities in this case). This gap widens for several number of bins because small grains tend to hold fewer charges, and large grains are less abundant. Dealing with so many orders of magnitude is problematic because numeric round-off errors may artificially change the contribution of the less abundant species. Several authors have used analytical expressions of charge distribution to avoid this numerical difficulty \citep{DraineSutin,Okuzumi2009,Fujii2011}. These models, however, do not take the charge transfer between grains into account. \refig{Coefs} shows the highest reaction rates of grain-ion, grain-electron and grain-grain reactions. Reaction rates between grains are largely dominant for $n_\mathrm{H} > 10^{12}$cm$^{-3}$, and not taking them into account leads to large discrepancies in the grains abundances in this density range (see \refig{grain_transfornot}), with in turn affects the resistivities.
\begin{figure}
\begin{center}
\includegraphics[trim=2cm 0cm 0cm 0cm, width=0.55\textwidth]{./coefs.pdf}
\caption{Highest reactions rates for grain/ion and grain/electron reactions (red curve), positively charged grain/negatively charged grain reactions (green curve) and neutral grain/charged grain reactions (blue curve).}
\label{Coefs}
\end{center}
\end{figure}
\begin{figure}
\begin{center}
\includegraphics[width=0.45\textwidth]{./compa_1charge_notransf.pdf}
\includegraphics[width=0.45\textwidth]{./compa_2charges_notransf.pdf}
\caption{Comparison of the grain abundances with (dashed lines) and without (solid lines) charge transfer between grains for singly charged grains (top figure) and singly and doubly charged grains (bottom figure).}
\label{grain_transfornot}
\end{center}
\end{figure}
On the other hand, using the analytical expressions of \citet{DraineSutin} with the ion and electron abundances calculated in our simplified case with only one charge and without considering grain-grain reactions enables us to predict the grain abundances for one and two charges with good precision. \refig{predict} depicts these predicted abundances of grains, compared to those computed with our code, for one and two charges. The abundances of the doubly charged grains are slightly overestimated for $10^{14} < n_\mathrm{H} < 10^{17}$cm$^{-3}$, but the agreement is very good otherwise. \refig{error_predict} shows the relative error $\frac{\mathbf{x}_\mathrm{predict} - \mathbf{x}_\mathrm{num}}{\mathbf{x}_\mathrm{num}}$ of the model prediction for the numerical run with two charges allowed. All abundances agree within roughly 10\%, except for g$^{++}$ at low densities and g$^-$ and g$^{++}$ for $n_\mathrm{H} > 10^{12}$cm$^{-3}$. \refig{comp_2chg_predict_eta} shows the corresponding resistivities. Both models are relatively similar except in the density ranges mentioned above. For $10^{14} < n_\mathrm{H} < 10^{17}$cm$^{-3}$, the model resistivities are slightly underestimated, but the differences with the numerical results remain similar. At low densities, the errors on the abundances result in a sign change of the Hall resistivity because even a small change allows the positive contribution of $\eta_\mathrm{H}$ to overcome the negative contribution. However, the Hall effect is not expected to play a role at these early stages of protostellar collapse. Therefore, even though we were unable to verify the exactness of the prediction for grains holding a larger number of charges (because of numerical difficulties), it seems reasonable to say that our method gives satisfying results at least for a small number of charges, which is the relevant case because grains holding more than three charges are not expected to be abundant enough to significantly modify the resistivities \citep{Sano2004}.
\begin{figure}
\begin{center}
\includegraphics[width=0.5\textwidth]{./match_1charge.pdf}
\includegraphics[width=0.5\textwidth]{./match_2charges.pdf}
\caption{Comparison of the abundances of grains computed with our code (dashed lines) and predicted from the ions and electron abundances (solid lines) for singly charged grains (top figure) and singly and doubly charged grains with one bin (bottom figure).}
\label{predict}
\end{center}
\end{figure}
\begin{figure}
\begin{center}
\includegraphics[width=0.5\textwidth]{./error_predict.pdf}
\caption{Relative error $\frac{\mathbf{x}_\mathrm{predict} - \mathbf{x}_\mathrm{num}}{\mathbf{x}_\mathrm{num}}$ between the numerical abundances of grains and the predicted results of \refig{predict} for singly and doubly charged grains.}
\label{error_predict}
\end{center}
\end{figure}
\begin{figure}
\begin{center}
\includegraphics[width=0.5\textwidth]{./compa_resistivities_2chg.pdf}
\caption{Comparison of the resistivities using abundances computed with our code (dashed lines) and abundances predicted with the \citet{DraineSutin} formulae (solid lines) for singly and doubly charged grains, without charge transfer between grains.}
\label{comp_2chg_predict_eta}
\end{center}
\end{figure}
\section{Details of the numerical method}
The Jacobian general expression (for charged particles alone, neutral grains are taken care of separately) reads:
\begin{align}
\mathbb{J}_{ij} &= \frac{\partial F_i}{\partial x_j} \nonumber \\
&=\alpha_{ij} + \sum_{k=1}^N \beta_{ijk} x_k - \gamma_{ij} x_i -\delta_{ij} \sum_{k=1}^N \gamma_{ik} x_k.
\end{align}
The Jacobian expression for neutral grains in the bin $\alpha$ is:
\begin{align}
\mathbb{J}_{g_0^{\alpha}j} = -\mathbb{J}_{g_+^{\alpha}j}-\mathbb{J}_{g_-^{\alpha}j}.
\end{align}
This makes the Jacobian matrix $\mathbb{J}$ singular, which is a great problem when solving the system using Newton-Raphson iterations. For the semi-implicit method, however, a simple solution consists of reducing the calculated species to charged particles alone and then updating with the neutral grains at the end of the iteration.\\
\noindent A schematic diagram of the system is shown in \refig{matrix}, with
\begin{align}
A_{ij} &= \delta_{ij} - \tilde{dt} \left[ \alpha_{ij} - \frac{n_\mathrm{H}}{\zeta} \gamma_{ij} x_i^n + \frac{n_\mathrm{H}}{\zeta} \sum_{k=1}^N (\beta_{ijk} - \gamma_{ik} \delta_{ij}) x_k^n \right], \\
B_{i} &= \frac{n_\mathrm{H}}{\zeta} \left[ \sum_{j=1}^N \gamma_{ij} x_j^n x_i^n - \frac{1}{2} \sum_{j=1}^N \sum_{k=1}^N \beta_{ijk} x_j^n x_k^n \right]\tilde{dt} + x_i^n.
\end{align}
\begin{figure*}
\begin{center}
\includegraphics[width=0.85\textwidth]{./implicit_matrix.pdf}
\caption{Matrix visualisation of the system to be solved after linearisation in time.}
\label{matrix}
\end{center}
\end{figure*}
While the system nearly reaches equilibrium, the abundances of the least abundant species may continue to vary significantly in relative values
for a long time. For this reason, we chose to stop the calculations when the time-step $\tilde{dt}$ reached a final constant value.
The least abundant species may continue to evolve, but this is inconsequential for evaluating the equilibrium abundances of the dominant species.
\section{Code validation}
In order to test the code with the most simple parameter set, we compared it with the results of \citet{UmebayashiNakano1990}, which did not include potassium and grain evaporation. We considered the basic case of one bin of grains, with a size a$_0$. Let $\delta_1$ be the fraction of C and O in the gas phase, and $\delta_2$ the fraction of metals. Our calculations are shown in \refig{UN90}, with $\delta_1=0.2$ and $\delta_2=0.02$ for the top panel, and $\delta_1=\delta_2=0$ for the bottom panel. It represents the evolution of the relative abundances with the density at $T=10$ K, compared with data from \citet{UmebayashiNakano1990}. It shows that the two agree very well. For $n_\mathrm{H} < 10^{10}$ cm$^{-3}$, most of the grains have a negative charge and electrons and ions are the dominant species. For $n_\mathrm{H} > 10^{13}$ cm$^{-3}$, charged grains are more abundant than electrons and ions.
\begin{figure}
\begin{center}
\includegraphics[trim= 2cm 2cm 2cm 2cm, width=0.5\textwidth]{./UN90_2.pdf}
\includegraphics[trim= 2cm 2cm 2cm 2cm, width=0.5\textwidth]{./UN90_4.pdf}
\caption{Evolution of the abundances of various charged particles as a function of the number density of hydrogen atoms, at $T=10$ K. Solid lines are our results, and circles are taken from Figs. 2 and 4 of \citet{UmebayashiNakano1990}. Top: $\delta_1 = 0.2$, $\delta_2 = 0.02$. Bottom: $\delta_1 = \delta_2= 0$.}
\label{UN90}
\end{center}
\end{figure}
\end{appendix}
\bibliographystyle{aa}
|
\section{Introduction}
\subsection{Mathematical formulation and motivation}
In this paper, we are concerned with the scattering of acoustic waves in the time-harmonic regime. Let $\Omega\subset\mathbb{R}^N$, $N=2, 3$, be a bounded Lipschitz domain with a connected complement $\mathbb{R}^N\backslash\overline{\Omega}$. Let $\sigma(x)=(\sigma^{jl}(x))_{j,l=1}^N$, $x=(x^j)_{j=1}^N\in\mathbb{R}^N$. It is assumed that $\sigma^{jl}=\sigma^{lj}$, $1\leq j, l\leq N$, are real-valued and measurable functions such that
\begin{equation}\label{eq:reg1}
\exists\ \lambda \in (0, 1),\ \forall\xi=(\xi_j)_{j=1}^N\in\mathbb{R}^N,\ \forall x\in\mathbb{R}^N,\ \lambda \|\xi\|^2\leq \sum_{j,l=1}^N \sigma^{jl}\xi_j\xi_l\leq \lambda^{-1} \|\xi\|^2,
\end{equation}
and
\[
\forall x\in \mathbb{R}^N\backslash\overline{\Omega},\quad \sigma^{jl}=\delta_{jl},
\]
where $\delta_{jl}$ is the Kronecker delta function, $1\leq j, l\leq N$. We also let $n(x)=\Re n(x)+\mathrm{i}\Im n(x)\in L^\infty(\mathbb{R}^N)$ be a complex-valued function such that
\begin{equation}\label{eq:reg2}
\exists\, n_0>0,\ \ \forall x\in\mathbb{R}^N,\ \mbox{$\Re n(x)>n_0$\ \ and\ \ $\Im n(x)\geq 0$.}
\end{equation}
It is further assumed that $n(x)\equiv 1$ for $x\in\mathbb{R}^N\backslash\overline{\Omega}$. $(\mathbb{R}^N; \sigma, n)$ denotes an acoustic medium in $\mathbb{R}^N$ with its inhomogeneity supported in $\Omega$. $\sigma^{-1}$ signifies the density tensor of the acoustic medium, whereas $\Re n$ and $\Im n$ are, respectively, associated with the modulus and the loss of the acoustic material parameters. We remark that \eqref{eq:reg1} and \eqref{eq:reg2} are the {\it physical conditions} satisfied by a regular medium. In what follows, $\sigma$ and $n$ are said to be {\it uniformly elliptic} with constants $\lambda$ and $n_0$, if they respectively, satisfy \eqref{eq:reg1} and \eqref{eq:reg2}. The inhomogeneity of the acoustic medium $(\Omega; \sigma, n)$ is located in an isotropic and homogeneous background/matrix medium whose material parameters are normalised to be $\sigma=\mathbf{I}_{N}$ and $n=1$, where $\mathbf{I}_{N}$ denotes the $N\times N$ identity matrix. $(\Omega; \sigma, n)$ is referred to as a {\it scatterer} in the following. The scatterer $(\Omega; \sigma, n)$ is said to be {\it isotropic} if $\sigma^{jl}(x)=\gamma(x)\delta_{jl}$, $1\leq j, l\leq N$, for a scalar function $\gamma\in L^\infty(\Omega)$, otherwise it is called {\it anisotropic}.
Next, we consider the time-harmonic acoustic wave propagation in the space $(\mathbb{R}^N;\sigma, n)$. Let $u^i(x)$, $x\in\mathbb{R}^N$ be an entire solution to the following Helmholtz equation
\begin{equation}\label{eq:Helm1}
\Delta u^i+\kappa^2 u^i=0\quad\mbox{in}\ \ \mathbb{R}^N,
\end{equation}
where $\kappa\in\mathbb{R}_+$ denotes a wavenumber. The propagation of the acoustic wave $u^i$ will be interrupted due to the presence of the inhomogeneity $(\Omega; \sigma, n)$, and this leads to the so-called {\it scattering}. We let $u^s$ denote the perturbed/scattered wave field and $u=u^i+u^s$ denote the total wave field. The total wave field $u\in H_{loc}^1(\mathbb{R}^N)$ is governed by the following Helmholtz system
\begin{equation}\label{eq:Helm2}
\begin{cases}
& \displaystyle{\sum_{j,l=1}^N\frac{\partial }{\partial x_j}\left(\sigma^{jl}(x)\frac{\partial u}{\partial x_l}\right)(x)+\kappa^2 n(x) u(x)=0}\qquad\mbox{for}\ \ x\in\mathbb{R}^N,\smallskip\\
& \mbox{$u-u^i$ satisfies the Sommerfeld radiation condition}.
\end{cases}
\end{equation}
In \eqref{eq:Helm2}, a function $w(x)=u(x)-u^i(x)$ is said to satisfy the Sommerfeld radiation condition if the following limit
\begin{equation}\label{eq:sommerfeld}
\lim_{\|x\|\rightarrow+\infty}\|x\|^{(N-1)/2}\left\{\frac{\partial w(x)}{\partial \|x\|}-\mathrm{i}\kappa w(x)\right\}=0,
\end{equation}
holds uniformly for $\hat{x}:=x/\|x\|$, $x\in\mathbb{R}^N\backslash\{0\}$. It is known that $u$ admits the following asymptotic expansion as $\|x\|\rightarrow+\infty$ (cf. \cite{ColKre,Mcl,Ned}),
\begin{equation}\label{eq:farfield}
u(x)=u^i(x)+\frac{e^{\mathrm{i}\kappa\|x\|}}{\|x\|^{(N-1)/2}}\, u^\infty(\hat x)+\mathcal{O}\left(\frac{1}{\|x\|^{(N+1)/2}}\right),
\end{equation}
which holds uniformly in $\hat x\in\mathbb{S}^{N-1}$. $u^\infty(\hat x)=u^\infty(\hat x; u^i, (\Omega; \sigma, n))$ is known as the {\it far-field pattern} or the {\it scattering amplitude}.
An important inverse scattering problem arising from practical application is to recover $(\Omega; \sigma, n)$ by knowledge of the corresponding far-field pattern $u^\infty(\hat x)$. $(\Omega; \sigma, n)$ is said to be {\it invisible} under the wave interrogation by $u^i$ if $u^\infty(\hat x; u^i, (\Omega; \sigma, n))\equiv 0$, which corresponds to the nonidentification in the inverse scattering problem mentioned above. In the current work, we shall consider the cloaking technique in achieving the invisibility. Let $D\Subset\Omega$ be a bounded Lipschitz domain. Consider a cloaking device of the following form
\begin{equation}\label{eq:cloak}
(\Omega; \sigma, n)=(D;\sigma_a, n_a)\wedge (\Omega\backslash\overline{D}; \sigma_c, n_c).
\end{equation}
In \eqref{eq:cloak}, $(D; \sigma_a, n_a)$ denotes the target object being cloaked, and $(\Omega\backslash\overline{D}; \sigma_c, n_c)$ denotes the cloaking shell. For a practical cloaking device of the form \eqref{eq:cloak}, there are several crucial ingredients that one should incorporate into the design:
\medskip
\noindent(i).~The target object $(D; \sigma_a, n_a)$ can be allowed to be arbitrary (but regular). That is, the cloaking device should not be object-dependent. In what follows, this issue shall be referred to as the target independence for a cloaking device.\smallskip
\noindent(ii).~The cloaking medium $(\Omega\backslash\overline{D}; \sigma_c, n_c)$ should be feasible for construction and fabrication. Indeed, it would be the most practically feasible if $(\Omega\backslash\overline{D}; \sigma_c, n_c)$ is uniformly elliptic with fixed constants and isotropic as well. In what follows, this issue shall be referred to as the practical feasibility for a cloaking device.\smallskip
\noindent(iii).~For an ideal cloaking device, one can expect the following invisibility performance,
\begin{equation}\label{eq:ii}
u^\infty(\hat x; u^i, (\Omega; \sigma, n))= 0\quad \forall\hat{x}\in\mathbb{S}^{N-1},\ \ \forall u^i.
\end{equation}
However, in practice, especially in order to fulfil the requirements in items (i) and (ii) above, one can relax the ideal cloaking requirement \eqref{eq:ii} to be
\begin{equation}\label{eq:ni}
|u^\infty(\hat x; u^i, (\Omega; \sigma, n))|\ll 1,\quad \forall\hat{x}\in\mathbb{S}^{N-1},\ \ \forall u^i\in\mathscr{W},
\end{equation}
where $\mathscr{W}$ is a set of incident waves consisting of entire solutions to the Helmholtz equation \eqref{eq:Helm1}. That is, near-invisibility can be achieved for scattering measurements made with interrogating waves from the set $\mathscr{W}$. In what follows, this issue shall be referred to as the relaxation and approximation for a cloaking device.\medskip
In this paper, we aim to explore as much as possible the three issues listed above for a practical cloaking scheme.
\subsection{Existing developments and discussion}
A region of space is said to be \emph{cloaked} if its contents, together with the cloak, are invisible to a particular class of wave measurements. Invisibility cloaking could find striking applications in many areas of science and technology such as radar and sonar, medical imaging, earthquake science and, energy science and engineering, to name just a few. Due to its practical importance, the invisibility cloaking has received great attentions in the literature in recent years, and several cloaking schemes have been proposed, including one based on transformation optics \cite{GLU,GLU2,PenSchSmi,Leo} and another one based on plasmon resonances \cite{AE,MN}.
The plasmonic cloaking uses metamaterials with negative parameters, and can be used to cloak an active source. We refer to \cite{ACKLM,AKL,KLO,KLSW,LLL} and the references therein for the existing developments in this direction. The transformation-optics approach uses the transformation properties of optical parameters via a so-called push-forward to form the cloaking mediums. The transformation-optics mediums for an ideal cloak are nonnegative, but anisotropic and singular, possessing degeneracy and/or blowup singularities. In order to avoid the singular structures, various regularised cloaking schemes have been proposed and investigated in the literature, and instead of ideal cloaking, one considers approximate/near-invisibility cloaking for the regularised constructions. We refer to\cite{Ammari1,Ammari2,Ammari4,BL,BLZ,KOVW,GKLUoe,LiLiuRonUhl,Liu,Liu2,LiuSun} and the references therein for the existing developments in this direction. Though the regularised transformation-optics mediums are nonsingular, they retain the anisotropy, which still poses server difficulties to the practical fabrication. In \cite{GKLLU,GKLU_2,GKLU0}, the authors propose to further approximate the non-singular anisotropic cloaking mediums by isotropic ones using the theory of effective medium and inverse homogenisation. This is closely related to the issues of practical feasibility and relaxation/approximation discussed in Section 1.1. However, the isotropic cloaking medium obtained in \cite{GKLLU,GKLU_2,GKLU0} through the inverse homogenisation are still nearly-singular in the sense that the ellipticity constants of the cloaking material parameters are asymptotic depending on a regularisation parameter.
In this paper, we investigate the non-singular and isotropic cloaking issue through a different perspective. We consider the cloaking device \eqref{eq:cloak} in the ideal case directly for a given cloaking medium. This would lead to an interior transmission eigenvalue problem, which is the one considered in \cite{CCH}. In \cite{CCH}, the authors consider an interior transmission eigenvalue problem for inhomogeneous media containing sound-soft obstacles. We connect the theoretical study in \cite{CCH} with some important practical application on the invisibility cloaking, and propose a generalised interior transmission eigenvalue problem as well. The interior transmission eigenvalue problem arising from the study of inverse scattering theory \cite{ColKre,CM} has also received significant attentions in the literature in recent years \cite{CakCol}. Indeed, the invisibility cloaking problem is naturally connected to a certain interior transmission eigenvalue problem, as shall be discussed in Section 2. Such an observation was also made in a recent paper \cite{BPS} where the authors show that a generic inhomogeneous scatterer with a rectangular support cannot be ideally invisible to every incident wave; that is, it scatters every interrogating wave field. This idea was further picked up in \cite{BCN} where the authors numerically show that ideal invisibility can be achieved for certain wavenumbers with respect to a discrete and finite set of far-field measurement data. In \cite{EH1,EH2}, from a different perspective, the authors show that if the support of a generic inhomogeneous scatterer possesses certain irregularities including a corner, an edge or a circular cone, then it scatters every interrogating wave field. The corner scattering problem has been quantified in \cite{BLU} with stability estimates; see our remarks after Theorem~\ref{thm:3} for more relevant discussions. Our current study shall indicate that an acoustic scatterer, satisfying a certain non-transparency condition, is nearly-invisible with respect to certain incident wave fields. Those incident wave fields are generated from the Herglotz-approximation to certain interior transmission eigenfunctions. Furthermore, based on this study, we propose a novel cloaking scheme using non-singular and isotropic cloaking mediums. The proposed cloaking device takes a three-layer structure with a cloaked region, a lossy layer and a cloaking shell. The target medium in the cloaked region can be arbitrary but regular, whereas the mediums in the lossy layer and the cloaking shell are both non-singular and isotropic. To our best knowledge, the results obtained in the current article are new to the literature. Finally, we refer to \cite{CC,GKLU4,GKLU5,Nor,U2} for comprehensive surveys on the theoretical and experimental progress on invisibility cloaking in the literature; and we also refer to \cite{BPS,CakCol,CCG,CGH,CK,CKP,ColKre,CM,CMS,Kir,PavSyl,S} and the references therein for relevant theoretical and computational studies on the interior transmission eigenvalues.
The rest of the paper is organised as follows. In Section 2, we connect the interior transmission eigenvalue problem with the invisibility cloaking, along with some relevant discussions. In Section 3, we consider the isotropic invisibility cloaking, and establish the near-invisibility results. Section 4 is devoted to numerical verification and demonstration.
\section{Interior transmission eigenvalue problem and Herglotz-approximation}
Let us consider the scattering problem associated with a cloaking device of the form \eqref{eq:cloak}. We first assume that the cloaked region $D$ is isolated from the outer space $\mathbb{R}^N\backslash\overline{D}$. That is, we consider an idealised case that the scattering problem is described by the following Helmholtz system for $u\in H_{loc}^1(\mathbb{R}^N\backslash\overline{D})$,
\begin{equation}\label{eq:Helmi1}
\begin{cases}
& \displaystyle{\nabla\cdot(\sigma_c(x)\nabla u)(x)+\kappa^2 n_c(x) u(x)=0}\qquad\mbox{for}\ \ x\in\Omega\backslash\overline{D},\smallskip\\
& \displaystyle{\Delta u(x)+\kappa^2 u(x)=0}\hspace*{3.2cm}\mbox{for}\ \ x\in\mathbb{R}^N\backslash\overline{\Omega},\smallskip\\
& \mathcal{B} u(x)=0\hspace*{4.7cm}\text{for}\ \ x\in\partial D,\smallskip\\
& \mbox{$u-u^i$ satisfies the Sommerfeld radiation condition},
\end{cases}
\end{equation}
where $\mathcal{B} u:=u$ or $\mathcal{B} u:=\partial u/\partial \nu_{\sigma_c}$ with
\begin{equation}\label{eq:nd}
\frac{\partial u}{\partial\nu_{\sigma_c}}:=\sum_{j,l=1}^N\sigma_c^{jl}\nu_j\partial_{x^l} u\quad\text{on}\ \ \partial D,
\end{equation}
and $\nu=(\nu_j)_{j=1}^N\in\mathbb{S}^{N-1}$ the exterior unit normal vector to $\partial D$. Similar as before, we let $u^s:=u-u^i$ and $u^\infty$ signify the corresponding scattered wave field and the far-field pattern, respectively. If perfect invisibility is achieved for the scattering system \eqref{eq:Helmi1}, namely, $u^\infty(\hat x; (\Omega\backslash\overline{D};\sigma_c, n_c), u^i)\equiv 0$, then by the Rellich theorem (cf. \cite{ColKre}), one has that
\begin{equation}\label{eq:vanish1}
u^s(x)=0\ \ \ \text{for}\ \ x\in\mathbb{R}^N\backslash\overline{\Omega}.
\end{equation}
Next, by using the standard transmission condition across $\partial \Omega$ for the solution $u$ to \eqref{eq:Helmi1}, one has
\begin{equation}\label{eq:vanish2}
u\big|_{\partial \Omega^+}=u\big|_{\partial \Omega^-}\quad\text{and}\quad \frac{\partial u}{\partial\nu}\Big|_{\partial \Omega^+}=\frac{\partial u}{\partial\nu_{\sigma_c}}\Big|_{\partial \Omega^-}:=\sum_{j,l=1}^N\sigma_c^{jl}\nu_j\partial_{x^l} u\Big|_{\partial\Omega^-},
\end{equation}
where $\partial\Omega^{\pm}$ signify the limits taken from outside and inside of $\Omega$, respectively. Applying \eqref{eq:vanish1} to \eqref{eq:vanish2} and by setting $v(x):=u(x)$ and $w(x)=u^i(x)$ for $x\in \Omega$, one can readily show that the following PDE system holds for $(u, v)\in H^1(\Omega\backslash\overline{D})\times H^1(\Omega)$,
\begin{equation}\label{eq:ite}
\begin{cases}
\nabla\cdot(\sigma_c \nabla v)+\kappa^2 n_c v=0\quad & \mbox{in}\ \ \Omega\backslash\overline{D},\smallskip\\
\Delta w+\kappa^2 w=0\quad & \mbox{in}\ \ \Omega,\smallskip\\
\mathcal{B} w=0\quad & \mbox{on}\ \ \partial D,\smallskip\\
\displaystyle{v=w,\qquad \frac{\partial v}{\partial \nu_{\sigma_c}}=\frac{\partial w}{\partial\nu}} \quad & \mbox{on}\ \ \partial\Omega.
\end{cases}
\end{equation}
If for a certain $\kappa\in\mathbb{R}_+$, there exists a nontrivial pair of solutions to \eqref{eq:ite}, then $\kappa$ is called an interior transmission eigenvalue associated with $(\Omega\backslash\overline{D}; \sigma_c, n_c, \mathcal{B})$, and $(v, w)$ is called the corresponding pair of transmission eigenfunctions. It is pointed out that the interior transmission eigenvalue problem \eqref{eq:ite} with $\mathcal{B}w=w$ on $\partial D$ was first proposed and investigated in \cite{CCH} from a theoretical perspective. In this paper, we shall find some important application of \eqref{eq:ite} to invisibility cloaking.
According to our discussion above, if perfect invisibility is obtained for the scattering system \eqref{eq:Helmi1}, then one has the eigenfunctions for the interior transmission eigenvalue problem \eqref{eq:ite}. However, the existence of interior transmission eigenfunctions for \eqref{eq:ite} does not necessarily imply perfect invisibility for the scattering system \eqref{eq:Helmi1}. Nevertheless, we shall show that near-invisibility can still be achieved under certain cirumstances. To that end, we first need to extend the interior transmission eigenfunction $w$ to the whole space $\mathbb{R}^N$ by the so-called Herglotz-approximation to form an incident wave field for \eqref{eq:Helmi1}. Starting from now and throughout the rest of the paper, we assume that $\Omega$ is of class $C^1$. Define
\begin{equation}\label{eq:app1}
w_\kappa^g(x):=\int_{\mathbb{S}^{N-1}} e^{i\kappa x\cdot \xi} g(\xi)\ ds(\xi),\quad x\in\mathbb{R}^N,\quad g\in L^2(\mathbb{S}^{N-1}).
\end{equation}
$w_\kappa^g$ is called a Herglotz wave function. We have
\begin{thm}[Theorem 2 in \cite{W}]\label{thm:herg1}
Let $\mathbf{W}_\kappa$ denote the space of all Herglotz wave functions of the form \eqref{eq:app1}.
Define, respectively,
\[
W_\kappa(\Omega):=\{u\in C^\infty(\Omega); (-\Delta-\kappa^2) u=0\},
\]
and
\[
\mathbf{W}_\kappa(\Omega):=\{u|_{\Omega}; u\in \mathbf{W}_\kappa\}.
\]
Then $\mathbf{W}_\kappa(\Omega)$ is dense in $W_\kappa(\Omega)\cap H^1(\Omega)$ with respect to the topology induced by the $H^1$-norm.
\end{thm}
We shall also need to introduce the following non-transparency condition for $(\Omega; \sigma_c, n_c, \mathcal{B})$. Consider the following PDE,
\begin{equation}\label{eq:pde1}
\nabla\cdot(\sigma_c\nabla \psi)+\kappa^2 n_c \psi=0\quad\mbox{in}\ \ \Omega\backslash\overline{D},\qquad \mathcal{B}\psi|_{\partial D}=0,\quad \psi\big|_{\partial \Omega}=f\in H^{1/2}(\Omega).
\end{equation}
It is assumed that $\kappa^2$ is not an eigenvalue to \eqref{eq:pde1} in the sense that if $f\equiv 0$, then there exists only a trivial solution to \eqref{eq:pde1}. Hence one has a well-defined DtN map as follows,
\begin{equation}\label{eq:dtn}
\Lambda^\kappa_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}(f)=\frac{\partial\psi}{\partial\nu_{\sigma_c}}\bigg|_{\partial\Omega}\in H^{-1/2}(\partial\Omega),
\end{equation}
where $\psi\in H^1(\Omega\backslash\overline{D})$ is the unique solution to \eqref{eq:pde1}. Moreover, we assume that the PDE system \eqref{eq:pde1}, with the Dirichlet boundary condition $\psi\big|_{\partial \Omega}=f\in H^{1/2}(\Omega)$ replaced by a Neumann boundary condition $\partial \psi/\partial \nu_{\sigma_c}\big|_{\partial \Omega}=f\in H^{-1/2}(\partial \Omega)$, is also well-posed. Hence, the NtD map $\big(\Lambda^\kappa_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}\big)^{-1}: H^{-1/2}(\partial \Omega)\rightarrow H^{1/2}(\partial\Omega)$, is also well-defined. Next, we consider the following exterior scattering problem
\begin{equation}\label{eq:pde2}
\begin{cases}
& (\Delta+\kappa^2)u=0\quad\mbox{in}\ \ \mathbb{R}^N\backslash\overline{\Omega},\medskip\\
& u|_{\partial\Omega}=f\in H^{1/2}(\Omega),\\
&\mbox{$u$ satisfies the Sommerfeld radiation condition}.
\end{cases}
\end{equation}
Define the exterior DtN map by
\begin{equation}\label{eq:edtn}
\Gamma^\kappa_{\Omega}(g):=\frac{\partial u}{\partial\nu}\Big|_{\partial\Omega}\in H^{-1/2}(\partial\Omega),
\end{equation}
where $u\in H_{loc}^1(\mathbb{R}^N\backslash\overline{D})$ is the unique solution to \eqref{eq:pde2}. It is known that $\Gamma^\kappa_\Omega$ and its inverse $(\Gamma^\kappa_\Omega)^{-1}$ are both well-defined (cf. \cite{ColKre,Ned}). Then $(\Omega\backslash\overline{D}; \sigma_c, n_c, \mathcal{B})$ is said to satisfy the non-transparency condition associated with $\kappa$ if there holds
\begin{equation}\label{eq:norm}
\|\Lambda^\kappa_{\Omega\backslash\overline{D}, \sigma_c, n_c,\mathcal{B}}\circ(\Gamma^\kappa_\Omega)^{-1}\|_{\mathcal{L}\big({H}^{-1/2}(\partial\Omega), H^{-1/2}(\partial\Omega)\big)}\neq 1.
\end{equation}
\begin{rem}\label{rem:nontransparency}
It can be shown that one must have
\begin{equation}\label{eq:norm11}
\Lambda^\kappa_{\Omega\backslash\overline{D}, \sigma_c, n_c,\mathcal{B}}(f)\neq\Gamma_\Omega^\kappa(f)
\end{equation}
for any $f\in H^{1/2}(\partial\Omega)$ unless $f\equiv 0$. Indeed, for $f\in H^{1/2}(\partial\Omega)$, we let $\psi\in H^{1}(\Omega\backslash\overline{D})$ be the solution to \eqref{eq:pde1}, and $u\in H_{loc}^1(\Omega\backslash\overline{\Omega})$ be the solution to \eqref{eq:pde2}. Set $p=\psi\chi_{\Omega\backslash\overline{D}}+u\chi_{\mathbb{R}^3\backslash\overline{\Omega}}$. If $\Lambda_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}^\kappa(f)=\Gamma^\kappa_\Omega(f)$, then one readily verifies that $p\in H_{loc}^1(\mathbb{R}^3\backslash\overline{D})$ is the solution to the following system
\begin{equation}\label{eq:pde3}
\begin{cases}
\nabla\cdot (\sigma_c\nabla p)+\kappa^2 n_c p=0\quad & \mbox{in}\ \ \mathbb{R}^N\backslash\overline{D},\medskip\\
\mathcal{B}p=0\quad & \mbox{on}\ \ \partial D, \\
\mbox{$p$ satisfies the Sommerfeld}&\hspace*{-2mm}\mbox{radiation condition}.
\end{cases}
\end{equation}
Hence, one must have that $p\equiv 0$ in $\mathbb{R}^N\backslash \overline{\Omega}$ (see Section 8, \cite{ColKre}), which readily implies $f\equiv 0$. Hence, it is unobjectionable to claim that the non-transparency condition \eqref{eq:norm} is a generic condition, when $\kappa$ is an interior transmission eigenvalue for $(\Omega\backslash\overline{D}; \sigma_c, n_c, \mathcal{B})$. Nevertheless, we would like to remark that it seems, at least according to our numerical observations, that the non-transparency condition is not satisfied for an inhomogeneous scatterer with an irregular/non-smooth support, say a corner in its support; see our remarks after Theorem~\ref{thm:3} for more relevant discussions.
\end{rem}
Now, we are in a position to present one of the main theorems of this paper which connects the interior transmission eigenvalue problem \eqref{eq:ite} to the invisibility cloaking.
\begin{thm}\label{thm:2}
Let $\kappa_0\in\mathbb{R}_+$ be an interior transmission eigenvalue associated with $(\Omega\backslash\overline{D}; \sigma_c, n_c, \mathcal{B})$, and $(v_0, w_0)\in H^1(\Omega\backslash\overline{D})\times H^1(\Omega)$ be a corresponding pair of eigenfunctions. For any sufficiently small $\varepsilon\in\mathbb{R}_+$, by Theorem~\ref{thm:herg1}, we let $w_{\kappa_0}^g\in\mathbf{W}_{\kappa_0}(\Omega)$ be such that
\begin{equation}\label{eq:herg2}
\|w_{\kappa_0}^g-w_0\|_{H^1(\Omega)}<\varepsilon.
\end{equation}
Consider the scattering problem \eqref{eq:Helmi1} by taking the incident wave field
\begin{equation}\label{eq:scattering2}
u^i=w_{\kappa_0}^g.
\end{equation}
If $(\Omega\backslash\overline{D}; \sigma_c, n_c, \mathcal{B})$ satisfies the non-transparency condition \eqref{eq:norm} with respect to $\kappa_0$, then there holds
\begin{equation}\label{eq:app3}
\Big|u^\infty(\hat x; w^g_{\kappa_0}, (\Omega\backslash\overline{D});\sigma_c, n_c, \mathcal{B}))\Big|\leq C \varepsilon,\quad\forall \hat x\in\mathbb{S}^{N-1},
\end{equation}
where $C$ is a positive constant depending only on $\kappa_0, \sigma_c, n_c$, $\mathcal{B}$ and $\Omega, D$.
\end{thm}
\begin{proof}
Since $\kappa_0\in \mathbb{R}_+$ is an interior transmission eigenvalue associated with $(\Omega\backslash\overline{D}; \sigma_c, n_c, \mathcal{B})$ and $v_0, w_0$ are the corresponding eigenfunctions, we see from \eqref{eq:ite} that
\begin{equation}\label{eq:e1}
\begin{cases}
\nabla\cdot(\sigma_c\nabla v_0)+\kappa_0^2 n_c v_0=0\quad &\mbox{in}\ \ \Omega\backslash\overline{D},\medskip\\
\Delta w_0+\kappa_0^2 w_0=0\quad\ \ \, & \mbox{in}\ \ \Omega,\medskip\\
\mathcal{B}v_0=0\quad & \mbox{on}\ \ \partial D,\medskip\\
v_0=w_0,\quad \displaystyle{\frac{\partial v_0}{\partial\nu_{\sigma_c}}=\frac{\partial w_0}{\partial \nu}}\ \ & \mbox{on}\ \ \partial\Omega,
\end{cases}
\end{equation}
By \eqref{eq:Helmi1} and setting $u^s:=u-u^i=u-w_{\kappa_0}^g$, we clearly have
\begin{equation}\label{eq:e2}
\begin{cases}
\nabla\cdot(\sigma_c\nabla u)+\kappa_0^2 n_c u=0\quad & \mbox{in}\ \ \Omega\backslash\overline{D},\medskip\\
\mathcal{B} u=0\quad & \mbox{on}\ \ \partial D,\medskip\\
\displaystyle{u=w_{\kappa_0}^g+u^s,\quad \frac{\partial u}{\partial\nu_{\sigma_c}}=\frac{\partial w_{\kappa_0}^g}{\partial\nu_{\sigma_c}}+\frac{\partial u^s}{\partial\nu_{\sigma_c}} }\ \ & \mbox{on}\ \ \partial\Omega,
\end{cases}
\end{equation}
and moreover
\begin{equation}\label{eq:e2h}
\begin{cases}
& (\Delta+\kappa_0^2) u^s=0\quad\mbox{in}\ \ \mathbb{R}^N\backslash\overline{\Omega},\medskip\\
& \mbox{$u^s$ satisfies the Sommerfeld radiation condition. }
\end{cases}
\end{equation}
By subtracting \eqref{eq:e1} from \eqref{eq:e2}, and using the transmission conditions on $\partial \Omega$ in \eqref{eq:e1}, we then obtain
\begin{equation}\label{eq:e3}
\begin{cases}
\nabla\cdot(\sigma_c\nabla(u-v_0))+\kappa_0^2 n_c(u-v_0)=0\quad & \mbox{in}\ \ \Omega\backslash\overline{D},\medskip\\
\mathcal{B} (u-v_0)=0\quad & \mbox{on}\ \ \partial D,\medskip\\
u-v_0=u^s+w_{\kappa_0}^g-v_0=u^s+w_{\kappa_0}^g-w_0\quad & \mbox{on}\ \ \partial\Omega,\medskip\\
\displaystyle{\frac{\partial u}{\partial\nu_{\sigma_c}}-\frac{\partial v_0}{\partial\nu_{\sigma_c}}= \frac{\partial u^s}{\partial\nu_{\sigma_c}}+\frac{\partial w_{\kappa_0}^g}{\partial\nu_{\sigma_c}}-\frac{\partial v_0}{\partial\nu_{\sigma_c}}= \frac{\partial u^s}{\partial\nu_{\sigma_c}}+\frac{\partial w_{\kappa_0}^g}{\partial\nu_{\sigma_c}}-\frac{\partial w_0}{\partial\nu_{\sigma_c}} } \ \ & \mbox{on}\ \ \partial\Omega .
\end{cases}
\end{equation}
Next, by noting the non-transparency condition \eqref{eq:norm}, we first treat the case by assuming that
\begin{equation}\label{eq:norm1}
\|\Lambda_{\Omega\backslash\overline{D}, \sigma_c, n_c,\mathcal{B}}^{\kappa_0}\circ(\Gamma_\Omega^{\kappa_0})^{-1}\|_{\mathcal{L}\big({H}^{-1/2}(\partial\Omega), H^{-1/2}(\partial\Omega)\big)}<1.
\end{equation}
By \eqref{eq:e3}, we have
\begin{equation}\label{eq:d1}
\left(\frac{\partial u}{\partial \nu_{\sigma_c}}-\frac{\partial v_0}{\partial\nu_{\sigma_c}}\right)\bigg|_{\partial \Omega}=\Lambda^{\kappa_0}_{\Omega\backslash\overline{D},\sigma_c, n_c, \mathcal{B}}\big( (u-v_0)|_{\partial\Omega}\big),
\end{equation}
and hence
\begin{equation}\label{eq:d2}
\begin{split}
&\left(\frac{\partial u^s}{\partial\nu_{\sigma_c}}+\frac{\partial w_{\kappa_0}^g}{\partial\nu_{\sigma_c}}-\frac{\partial w_0}{\partial\nu_{\sigma_c}} \right)\bigg|_{\partial\Omega}
=\Lambda^{\kappa_0}_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}\big((u^s+w_{\kappa_0}^g-w_0)|_{\partial\Omega}\big)\\
=& \Lambda^{\kappa_0}_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}(u^s|_{\partial\Omega})+\Lambda^{\kappa_0}_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}\big((w_{\kappa_0}^g-w_0)|_{\partial\Omega}\big)\\
=& \Lambda^{\kappa_0}_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}\circ\big(\Gamma^{\kappa_0}_{\Omega}\big)^{-1}\left(\frac{\partial u^s}{\partial\nu}\Big|_{\partial\Omega}\right)+\Lambda^{\kappa_0}_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}\big((w_{\kappa_0}^g-w_0)|_{\partial\Omega}\big),
\end{split}
\end{equation}
which then yields
\begin{equation}\label{eq:d3}
\begin{split}
& \left(I-\Lambda^{\kappa_0}_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}\circ\big(\Gamma^{\kappa_0}_\Omega\big)^{-1}\right)\left(\frac{\partial u^s}{\partial\nu}\Big|_{\partial\Omega}\right)\\
=&-\left(\frac{\partial w_{\kappa_0}^g}{\partial\nu_{\sigma_c}}-\frac{\partial w_0}{\partial\nu_{\sigma_c}}\right)+\Lambda^{\kappa_0}_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}\left((w_{\kappa_0}^g-w_0)\big|_{\partial\Omega}\right).
\end{split}
\end{equation}
Combining \eqref{eq:herg2}, \eqref{eq:norm1} and \eqref{eq:d3}, together with straightforward calculations, one readily has
\begin{equation}\label{eq:d4}
\left\|\frac{\partial u^s}{\partial\nu}\right\|_{H^{-1/2}(\partial\Omega)}\leq C\varepsilon,
\end{equation}
where $C$ is a positive constant depending only on $\kappa_0, \sigma_c, n_c$, $\mathcal{B}$ and $\Omega, D$.
For the other case with
\begin{equation}\label{eq:norm2h}
\|\Lambda^{\kappa_0}_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}\circ\big(\Gamma^{\kappa_0}_\Omega\big)^{-1}\|_{\mathcal{L}\big({H}^{-1/2}(\partial\Omega), H^{-1/2}(\partial\Omega)\big)}>1;
\end{equation}
that is
\begin{equation}\label{eq:norm2}
\|\Gamma^{\kappa_0}_\Omega\circ\big(\Lambda^{\kappa_0}_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}\big)^{-1}\|_{\mathcal{L}\big({H}^{-1/2}(\partial\Omega), H^{-1/2}(\partial\Omega)\big)}<1,
\end{equation}
by a completely similar argument, one can show that
\begin{equation}\label{eq:d5}
\left\|u^s\right\|_{H^{1/2}(\partial\Omega)}\leq C\varepsilon,
\end{equation}
where $C$ is a positive constant depending only on $\kappa_0, \sigma_c, n_c$, $\mathcal{B}$ and $\Omega, D$.
That is, one either has \eqref{eq:d4} or \eqref{eq:d5} for the exterior scattering system \eqref{eq:e2h}. Finally, by the well-posedness of the scattering problem from a sound-hard or sound-soft obstacle (see \cite{ColKre,Mcl}), one readily has \eqref{eq:app3}.
The proof is complete.
\end{proof}
Now, we let $\mathcal{S}_{\Omega\backslash\overline{D},\sigma_c,n_c,\mathcal{B}}\subset\mathbb{R}_+$ denote the set of all the interior transmission eigenvalues associated with $(\Omega\backslash\overline{D}; \sigma_c, n_c, \mathcal{B})$, and set
\begin{equation}\label{eq:waveset1}
\begin{split}
&\mathcal{W}_{\Omega\backslash\overline{D},\sigma_c,n_c,\mathcal{B}}:=\bigcup_{\kappa\in \mathcal{S}_{\Omega\backslash\overline{D},\sigma_c,n_c,\mathcal{B}}}\Big\{w; (v, w)\in H^1(\Omega\backslash\overline{D})\times H^1(\Omega)\ \text{is a pair of interior}\\
& \text{transmission eigenfunctions corresponding to $\kappa$ associated with $(\Omega\backslash\overline{D}; \sigma_c, n_c, \mathcal{B})$} \Big\}.
\end{split}
\end{equation}
Clearly, $\mathcal{W}_{\Omega\backslash\overline{D},\sigma_c,n_c,\mathcal{B}}$ is a subspace of $W(\Omega):=\cup_{\kappa\in\mathbb{R}_+} W_\kappa(\Omega)$, and by Theorem~\ref{thm:herg1}, for a sufficiently small $\varepsilon\in\mathbb{R}_+$, we let $\mathcal{W}^\varepsilon_{\Omega\backslash\overline{D},\sigma_c,n_c,\mathcal{B}}\subset\mathbf{W}(\Omega):=\cup_{\kappa\in\mathbb{R}_+} \mathbf{W}_\kappa(\Omega)$ be an $\varepsilon$-net of $\mathcal{W}_{\Omega\backslash\overline{D},\sigma_c,n_c,\mathcal{B}}$ in $H^1(\Omega)$ in the sense that for any $w\in \mathcal{W}_{\Omega\backslash\overline{D},\sigma_c,n_c,\mathcal{B}}$, there exists a $w_\kappa^g\in\mathbf{W}(\Omega)$ such that
\begin{equation}\label{eq:herg3}
\|w-w_\kappa^g\|_{H^1(\Omega)}<\varepsilon.
\end{equation}
By Theorem~\ref{thm:2}, one clearly has that
\begin{thm}\label{thm:3}
For any $w_{\kappa_0}^g\in \mathcal{W}^\varepsilon_{\Omega\backslash\overline{D},\sigma_c,n_c,\mathcal{B}}$ associated with an interior transmission eigenvalue $\kappa_0\in \mathcal{S}_{\Omega\backslash\overline{D},\sigma_c,n_c,\mathcal{B}}$, if $(\Omega\backslash\overline{D}; \sigma_c, n_c, \mathcal{B})$ is non-transparent with respect to $\kappa_0$, then there holds
\begin{equation}\label{eq:appg1}
\Big|u^\infty(\hat x; w^g_{\kappa_0}, (\Omega\backslash\overline{D});\sigma_c, n_c, \mathcal{B}))\Big|\leq C \varepsilon,\quad\forall \hat x\in\mathbb{S}^{N-1},
\end{equation}
where $C$ is a positive constant depending only on $\kappa_0, \sigma_c, n_c$, $\mathcal{B}$ and $\Omega, D$.
\end{thm}
Therefore, by Theorem~\ref{thm:3}, as long as the non-transparency condition holds, the cloaked region $D$ with the coating $(\Omega\backslash\overline{D}; \sigma_c, n_c)$ is nearly invisible to the wave interrogation for any incident field from $\mathcal{W}^\varepsilon_{\Omega\backslash\overline{D},\sigma_c,n_c,\mathcal{B}}$, under the assumption that the cloaked region $D$ is isolated from the outer space. Some remarks and discussions are in order.
\begin{enumerate}
\item Clearly, the existence and distribution of interior transmission eigenvalues and eigenfunctions for \eqref{eq:ite} shall be of crucial importance. The existence, discreteness and infiniteness of the interior transmission eigenvalues for \eqref{eq:ite} under general assumptions on $\sigma_c$ and $n_c$ for the case with $\mathcal{B}w=w$ was established in \cite{CCH}. We believe that the case with $\mathcal{B}w=\partial w/\partial \nu_{\sigma_c}$ on $\partial D$ can be treated similarly. Inversely, for certain specific wavenumbers and entire wave fields, the design of $(\Omega\backslash\overline{D}; \sigma_c, n_c, \mathcal{B})$ such that those wavenumbers and wave fields are the respective interior transmission eigenvalues and eigenfunctions shall also be of great interest for customised invisibility cloaking constructions. We leave the theoretical investigation on these issues for our future study. In Section 4, we present extensive numerical experiments to illustrate the discreteness and infiniteness of $\mathcal{S}_{\Omega\backslash\overline{D},\sigma_c,n_c,\mathcal{B}}$, and the validity of Theorems~\ref{thm:2} and \ref{thm:3}.
\item The non-transparency condition \eqref{eq:norm} is critical for the near-invisibility result in Theorem~\ref{thm:3}. Our numerical examples in Section 4 indicate that if $\partial\Omega$ is smooth/regular, then near-invisibility can be achieved at almost all the computed interior transmission eigenvalues; whereas if $\partial \Omega$ is irregular, say possessing a corner, then near-invisibility generically cannot be achieved. The numerical observation is consistent with the theoretical studies in \cite{BLU,BPS,EH1,EH2}. Indeed, as discussed in Section 1.2, it is shown in \cite{BPS,EH1,EH2} that if the support of the scatterer possesses certain irregularities, then it scatters every interrogating wave field. In \cite{BLU}, it is further quantified that the scattered wave field from a corner possesses a positive lower bound. Hence, it might be justifiable to conclude that the non-transparency condition \eqref{eq:norm} holds true for generic acoustic mediums with smooth/regular supports. More quantitatively, according to \eqref{eq:d3},
\begin{equation}\label{eq:lowerbound1}
\left\|I-\Lambda^{\kappa_0}_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}\circ\big(\Gamma^{\kappa_0}_\Omega\big)^{-1}\right\|_{\mathcal{L}\big({H}^{-1/2}(\partial\Omega), H^{-1/2}(\partial\Omega)\big)}^{-1}
\end{equation}
should be a regular number when $\kappa_0\in\mathcal{S}_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}$ and, both $\partial D$ and $\partial \Omega$ are regular/smooth; whereas \eqref{eq:lowerbound1} either blows up or becomes very large when $\kappa_0\in\mathcal{S}_{\Omega\backslash\overline{D}, \sigma_c, n_c, \mathcal{B}}$ and, $\partial D$ or $\partial \Omega$ are irregular. Providing more justifications for the above conclusion is fraught with difficulties, we shall also leave it for further investigation.
\item Theorem~\ref{thm:3} is based on the idealised assumption that the cloaked region $D$ is completely isolated from the outer space. In Section 3, we shall present a finite realisation of $\mathcal{B}$ on $\partial D$ by using properly designed isotropic mediums with loss. The loss mediums are also regular and isotropic, and moreover for the target-independence consideration of the cloaking device, it should enable the object being cloaked to be arbitrary.
\end{enumerate}
\section{Isotropic invisibility cloaking}
Let $(\Omega\backslash\overline{D}; \sigma_c, n_c, \mathcal{B})$ be the one considered in Theorem~\ref{thm:3}. It is assumed that $\partial D$ is of class $C^2$ and, that $n_c>n_0$ is real and $\sigma_c=\mathbf{I}_N$. Let $\Sigma\Subset D$ be a domain of Lipschitz class. Let $\tau\in\mathbb{R}_+$ be an asymptotically small parameter. Set
\begin{equation}\label{eq:lossy1}
\sigma_l(x)=\gamma\tau^{-2} \mathrm{I}_{N\times N},\quad n_l=\alpha+\beta\tau^{-2}\mathrm{i}\quad \mbox{for}\ \ x\in D\backslash\overline{\Sigma},
\end{equation}
if $\mathcal{B}w=w$ in \eqref{eq:ite}; and
\begin{equation}\label{eq:lossy2}
\sigma_l(x)=\gamma\tau^2 \mathrm{I}_{N\times N},\quad n_l=\alpha\tau^2+\beta\tau^2\mathrm{i}\quad \mbox{for}\ \ x\in D\backslash\overline{\Sigma},
\end{equation}
if $\mathcal{B}w=\partial w/\partial\nu$ in \eqref{eq:ite}, where $\alpha, \beta$ and $\gamma$ are positive constants. Consider an acoustic medium configuration as follows,
\begin{equation}\label{eq:cloakr1}
(\mathbb{R}^N; \sigma, n)=(\Sigma;\sigma_a, n_a)\wedge (D\backslash\overline{\Sigma}; \sigma_l, n_l)\wedge (\Omega\backslash\overline{D}; \sigma_c, n_c)\wedge (\mathbb{R}^N\backslash\overline{\Omega}; \mathbf{I}_N, 1),
\end{equation}
where $(\Sigma; \sigma_a, n_a)$ is a regular acoustic medium. Then, we have
\begin{thm}\label{thm:4}
Let $(\mathbb{R}^N; \sigma, n)$ be described in \eqref{eq:cloakr1}. Let $\kappa_0$ and $w_{\kappa_0}^g$ be the same as those in Theorem~\ref{thm:2} satisfying the non-transparency condition \eqref{eq:norm}. Consider the scattering system \eqref{eq:Helm2} corresponding to $(\mathbb{R}^N; \sigma, n)$ with $u^i=w_{\kappa_0}^g$. Then we have
\begin{equation}\label{eq:est1}
\big|u^\infty(\hat x; w_{\kappa_0}^g, (\Omega;\sigma, n))\big|\leq C\big(\tau\|w_{\kappa_0}^g\|_{H^1(\Omega)}+\varepsilon \big),\quad\forall \hat x\in\mathbb{S}^{N-1},
\end{equation}
where $C$ is positive constant depending only on $\Omega, D, \Sigma$, and $\kappa_0, \alpha, \beta, \gamma, n_c$, but independent of $\sigma_a, n_a$ and $\hat x$, $w_{\kappa_0}^g$.
\end{thm}
\begin{proof}
Let us consider the scattering system \eqref{eq:Helm2} corresponding to $(\Omega; \sigma, n)$ described in \eqref{eq:cloakr1}. By multiplying both sides of the equation in \eqref{eq:Helm2} by the complex conjugate of $u$, namely $\overline{u}$, and integrating over $\Omega$, together with the use of integration by parts, we have
\begin{equation}\label{eq:f1}
\begin{split}
& 0= \int_{\Omega}\big[\nabla\cdot(\sigma(x)\nabla u(x))+\kappa_0^2 n(x) u(x) \big]\cdot\overline{u}(x)\ dV(x)\\
=&-\int_{\Omega}(\sigma\nabla u)(x)\cdot(\nabla\overline{u})(x)\ dx+\kappa_0^2\int_{\Omega} n(x) |u(x)|^2\ dV(x)\\
&\qquad\qquad\qquad+\int_{\partial\Omega}\frac{\partial u}{\partial\nu}(x)\cdot\overline{u}(x)\ ds(x)
\end{split}
\end{equation}
By taking the imaginary parts of both sides of \eqref{eq:f1}, one can easily verify that
\begin{equation}\label{eq:f2}
\left|\kappa_0^2\Im n_l\int_{D\backslash\overline{\Sigma}}|u(x)|^2 dV(x)\right|\, dx\leq \left|\int_{\partial\Omega}\frac{\partial u}{\partial \nu}(x)\cdot\overline{u}(x)\, ds(x) \right|.
\end{equation}
Hence, if $n_l$ is given in \eqref{eq:lossy1}, one has
\begin{equation}\label{eq:f3}
\|u\|_{L^2(D\backslash\overline{\Sigma})}\leq \kappa_0\sqrt{\beta}\tau\left|\int_{\partial\Omega}\frac{\partial u}{\partial \nu}\cdot \overline{u}\, ds\right|^{1/2},
\end{equation}
whereas if $n_l$ is given in \eqref{eq:lossy2}, then one has
\begin{equation}\label{eq:f4}
\|u\|_{L^2(D\backslash\overline{\Sigma})}\leq \kappa_0\sqrt{\beta}\tau^{-1}\left|\int_{\partial\Omega}\frac{\partial u}{\partial \nu}\cdot \overline{u}\, ds\right|^{1/2}.
\end{equation}
Next, we first consider the case with $(D\backslash\overline{\Sigma}; \sigma_l, n_l)$ given in \eqref{eq:lossy1}; that is, $\mathcal{B} v=v$ in \eqref{eq:ite}. We claim that
\medskip
\noindent\underline{\bf Claim 1.}~Let $u^+$ and $u^-$ denote the traces of $u$ on $\partial D$ when approaching $\partial D$, respectively, from the exterior and interior of $D$. Then there holds
\begin{equation}\label{eq:f5}
\|u^+\|_{H^{-1/2}(\partial D)}\leq C \tau \left|\int_{\partial\Omega}\frac{\partial u}{\partial \nu}\cdot \overline{u}\, ds\right|^{1/2},
\end{equation}
where $C$ is a positive constant depending only on $\kappa_0$, $\alpha, \beta, \gamma,$ and $D, \Sigma$, but independent of $(\Sigma; \sigma_a, n_a)$.
\medskip
\noindent\underline{\bf Proof of Claim 1.}~~By the transmission conditions across $\partial D$ for $u\in H_{loc}^1(\mathbb{R}^N)$, one clearly has $u^+=u^-$, and hence in order to prove \eqref{eq:f5}, it suffices for us to verify that the same estimate holds for $u^-$. To that end, we make use of the following duality identity,
\begin{equation}\label{eq:f6}
\|u^-\|_{H^{-1/2}(\partial D)}=\sup_{\|\varphi\|_{H^{1/2}(\partial D)}\leq 1}\left|\int_{\partial D} u^-\cdot \varphi\ ds \right|.
\end{equation}
For any $\varphi\in H^{1/2}(\partial D)$, there exists $w\in H^2(D)$ such that (cf. \cite{Wlo})\smallskip
\begin{enumerate}
\item[i).]~~$\displaystyle{\frac{\partial w}{\partial\nu}=\varphi}$ and $w=0$ on $\partial D$;\smallskip
\item[ii).]~~$w=0$ on $\Sigma$, and $\|w\|_{H^2(D)}\leq C\|\varphi\|_{H^{1/2}(\partial D)}$;
\end{enumerate}
where $C$ is a positive constant depending only on $\Sigma$ and $D$. Then we have
\begin{equation}\label{eq:f7}
\begin{split}
& \int_{\partial D} u^-\cdot \varphi\ ds=\int_{\partial D} u^-\cdot\frac{\partial w}{\partial \nu}-\frac{\partial u^-}{\partial\nu}\cdot w\ ds\\
=& \int_{D\backslash\overline{\Sigma}} u(x)\cdot\Delta w(x)-\Delta u(x)\cdot w(x)\ dV(x).
\end{split}
\end{equation}
Noting that in $D\backslash\overline{\Sigma}$, one has
\begin{equation}\label{eq:f8}
\nabla\cdot(\sigma_l\nabla u)(x)+\kappa_0^2 n_l u(x)=0\quad\mbox{for}\ \ x\in D\backslash\overline{\Sigma},
\end{equation}
which together with \eqref{eq:lossy1} readily implies that
\begin{equation}\label{eq:f9}
\Delta u=-\kappa_0^2(\alpha\tau^2+\mathrm{i}\beta)u\quad\mbox{in}\ \ D\backslash\overline{\Sigma}.
\end{equation}
By plugging \eqref{eq:f9} into \eqref{eq:f7}, together with the use of Schwarz inequality, we then have
\begin{equation}\label{eq:f10}
\begin{split}
\left|\int_{\partial D}u^-\cdot \varphi\ ds\right|\leq & \left(1+\kappa_0^2|\alpha+\mathrm{i}\beta| \right)\|u\|_{L^2(D\backslash\overline{\Sigma})}\|w\|_{H^2(D)}\\
\leq & C \left(1+\kappa_0^2|\alpha+\mathrm{i}\beta| \right)\|u\|_{L^2(D\backslash\overline{\Sigma})}\|\varphi\|_{H^{1/2}(\partial D)},
\end{split}
\end{equation}
which in combination with \eqref{eq:f3}, along with straightforward calculations, readily verifies \eqref{eq:f5} for $u^-$, and hence for $u^+$ as well. This completes the proof of Claim 1. \hfill $\Box$
\medskip
For the other case with $(D\backslash\overline{\Sigma}; \sigma_l, n_l)$ given in \eqref{eq:lossy2}; that is, $\mathcal{B} w=\partial w/\partial\nu$ in \eqref{eq:ite}. We can show that
\medskip
\noindent\underline{\bf Claim 2.}~Let $\partial u^+/\partial\nu$ and $\partial u^-/\partial\nu$ denote the traces of $\partial u/\partial\nu$ on $\partial D$ when approaching $\partial D$, respectively, from the exterior and interior of $D$. Then there holds
\begin{equation}\label{eq:f11}
\left\|\frac{\partial u^+}{\partial\nu}\right\|_{H^{-3/2}(\partial D)}\leq C \tau \left|\int_{\partial\Omega}\frac{\partial u}{\partial \nu}\cdot \overline{u}\, ds\right|^{1/2},
\end{equation}
where $C$ is a positive constant depending only on $\kappa_0$, $\alpha, \beta, \gamma$ and $D, \Sigma$, but independent of $(\Sigma; \sigma_a, n_a)$.
\medskip
\noindent\underline{\bf Proof of Claim 2.}~~Claim 2 can be proved by following a similar argument to that for the proof of Claim 1. Indeed, we first estimate $\|\partial u^-/\partial\nu\|_{H^{-3/2}(\partial D)}$, and make use of the following duality identity
\begin{equation}\label{eq:f6h}
\left\|\frac{\partial u^-}{\partial\nu}\right\|_{H^{-3/2}(\partial D)}=\sup_{\|\varphi\|_{H^{3/2}(\partial D)}\leq 1}\left|\int_{\partial D} \frac{\partial u^-}{\partial\nu}\cdot \phi\ ds \right|.
\end{equation}
For any $\phi\in H^{3/2}(\partial D)$, there exists $w\in H^2(D)$ such that (cf. \cite{Wlo})\smallskip
\begin{enumerate}
\item[i).]~~$\displaystyle{\frac{\partial w}{\partial\nu}=0}$ and $w=\phi$ on $\partial D$;\smallskip
\item[ii).]~~$w=0$ on $\Sigma$, and $\|w\|_{H^2(D)}\leq C\|\phi\|_{H^{3/2}(\partial D)}$;
\end{enumerate}
where $C$ is a positive constant depending only on $\Sigma$ and $D$. Then by a similar argument to that for the proof of Claim 1 in deriving \eqref{eq:f10}, together with the use of \eqref{eq:lossy2}, one can show that
\begin{equation}\label{eq:f12}
\left\|\frac{\partial u^-}{\partial \nu} \right\|_{H^{-3/2}(\partial D)}\leq \frac{C}{\sqrt{\beta}}(\gamma+\kappa_0^2|\alpha+\mathrm{i}\beta|)\tau^{-1}\left| \int_{\partial\Omega}\frac{\partial u}{\partial\nu}\cdot\overline{u}\, ds\right|^{1/2}.
\end{equation}
Finally, by using the following transmission condition across $\partial D$
\[
\sigma_l\frac{\partial u^-}{\partial \nu}=\frac{\partial u^+}{\partial\nu}\quad\mbox{on}\ \ \partial D,
\]
and \eqref{eq:f12}, one readily sees \eqref{eq:f11}. This completes the proof of Claim 2. \hfill $\Box$
\medskip
We are ready to prove \eqref{eq:est1}. Let us first treat the case with $\mathcal{B} w=w$ in \eqref{eq:ite}. Set
\begin{equation}\label{eq:g1}
f= u^+|_{\partial D}\in H^{1/2}(\partial D)\ \mbox{and}\ u^s(x)=u(x)-w_{\kappa_0}^g(x)\ \ \mbox{for}\ x\in\mathbb{R}^N\backslash\overline{D},
\end{equation}
It is easily seen that
\begin{equation}\label{eq:g2}
\begin{cases}
(\Delta+\kappa_0^2 n) u=0\quad & \mbox{in}\ \ \mathbb{R}^N\backslash\overline{D},\smallskip\\
u=f\qquad & \mbox{on}\ \ \partial D,\smallskip\\
u=u^s+w_{\kappa_0}^g\qquad & \mbox{in}\ \ \mathbb{R}^N\backslash\overline{D},\smallskip\\
\mbox{$u^s$ satisfies the Sommerfeld}&\hspace*{-2.5mm}\mbox{radiation condition}.
\end{cases}
\end{equation}
We also introduce $u_c\in H_{loc}^1(\mathbb{R}^N\backslash\overline{D})$ and $u_c^s(x):=u_c(x)-w_{\kappa_0}^g(x)$, $x\in\mathbb{R}^N\backslash\overline{D}$, satisfying
\begin{equation}\label{eq:g3}
\begin{cases}
(\Delta+\kappa_0^2 n) u_c=0\quad & \mbox{in}\quad\mathbb{R}^N\backslash\overline{D},\medskip\\
u_c=0\quad & \mbox{on}\ \ \partial D,\\
\mbox{$u_c^s$ satisfies the Sommerfeld}&\hspace*{-2.5mm}\mbox{radiation condition}.
\end{cases}
\end{equation}
Set
\begin{equation}\label{eq:g4}
\widetilde{u}(x)=u(x)-u_c(x),\quad x\in\mathbb{R}^N\backslash\overline{D}.
\end{equation}
Then $\widetilde{u}\in H_{loc}^1(\mathbb{R}^N\backslash\overline{D})$ satisfies
\begin{equation}\label{eq:g5}
\begin{cases}
&(\Delta+\kappa_0^2 n_c)\widetilde{u}=0\quad\mbox{in}\ \ \mathbb{R}^N\backslash\overline{D},\smallskip\\
& \widetilde{u}=f\quad\mbox{on}\ \ \partial D,\smallskip\\
&\mbox{$\widetilde u$ satisfies the Sommerfeld radiation condition. }
\end{cases}
\end{equation}
By Lemma~\ref{lem:aux} in the following, we have
\begin{equation}\label{eq:g6}
\|\widetilde u\|_{H^{1/2}(\partial \Omega)}\leq C\|f\|_{H^{-1/2}(\partial D)},
\end{equation}
where $C$ is a positive constant depending only on $\Omega, D$ and $\kappa_0, n_c$. That is,
\begin{equation}\label{eq:g7}
\|u^s-u_c^s\|_{H^{1/2}(\partial\Omega)}=\|u-u_c\|_{H^{1/2}(\partial\Omega)}=\|\widetilde{u}\|_{H^{1/2}(\partial\Omega)}\leq C\|f\|_{H^{-1/2}(\partial D)},
\end{equation}
which in turn implies that
\begin{equation}\label{eq:g8}
\|u^s\|_{H^{1/2}(\partial \Omega)}\leq \|u_c^s\|_{H^{1/2}(\partial\Omega)}+C\|f\|_{H^{-1/2}(\partial\Omega)}.
\end{equation}
Next, by the argument in the proof of Theorem~\ref{thm:2} (cf. \eqref{eq:d4} and \eqref{eq:d5}), we see that
\begin{equation}\label{eq:x1}
\|u_c^s\|_{H^{1/2}(\partial \Omega)}\leq C\varepsilon.
\end{equation}
By applying \eqref{eq:x1}, \eqref{eq:f5} to \eqref{eq:g8}, we have
\begin{equation}\label{eq:g9}
\|u^s\|_{H^{1/2}(\partial\Omega)}\leq C\varepsilon+C \tau\left|\int_{\partial\Omega}\frac{\partial u}{\partial\nu}\cdot\overline{u}\ ds \right|^{1/2}.
\end{equation}
Next, by Green's formula and Schwarz inequality, one can deduce as follows
\begin{equation}\label{eq:g10}
\begin{split}
&\left|\int_{\partial\Omega}\frac{\partial u}{\partial\nu}\cdot\overline{u}\ ds \right|\\
=&\left| \int_{\Omega}\left(\frac{\partial u^s}{\partial\nu}+\frac{\partial w_{\kappa_0}^g}{\partial\nu} \right)\cdot(\overline{u^s}+\overline{w_{\kappa_0}^g})\ ds \right|\\
\leq & \left|\int_{\partial\Omega}\frac{\partial u^s}{\partial\nu}\cdot\overline{u^s}\ ds\right|+\left|\int_{\partial\Omega}\frac{\partial u^s}{\partial\nu}\cdot\overline{w_{\kappa_0}^g}\ ds\right|+\left|\int_{\partial\Omega}\frac{\partial w_{\kappa_0}^g}{\partial\nu}\cdot\overline{u^s}\ ds\right|\\
&\quad +\big|\|\nabla w_{\kappa_0}^g\|^2_{L^2(\Omega)}-\kappa_0^2\|w_{\kappa_0}^g\|^2_{L^2(\Omega)} \big|\\
\leq & \left\|\frac{\partial u^s}{\partial\nu}\right\|_{H^{-1/2}(\partial\Omega)}\|u^s\|_{H^{1/2}(\partial\Omega)}+\left\|\frac{\partial u^s}{\partial \nu} \right\|_{H^{1/2}(\partial\Omega)}\|w_{\kappa_0}^g\|_{H^{1/2}(\partial\Omega)}\\
&\left\|\frac{\partial w_{\kappa_0}^g}{\partial\nu} \right\|_{H^{-1/2}(\partial\Omega)}\|u^s\|_{H^{1/2}(\partial\Omega)}+\|\nabla w_{\kappa_0}^g\|^2_{L^2(\Omega)}+\kappa_0^2\|w_{\kappa_0}^g\|^2_{L^2(\Omega)} \\
\leq & \|\Gamma_\Omega^{\kappa_0}\|_{\mathcal{L}(H^{1/2}(\partial\Omega), H^{-1/2}(\partial\Omega))}\|u^s\|^2_{H^{1/2}(\partial\Omega)}\\
&+\left\|\frac{\partial u^s}{\partial\nu} \right\|_{H^{-1/2}(\partial\Omega)}^2+\frac{1}{4}\|w_{\kappa_0}^g\|^2_{H^{1/2}(\partial\Omega)}+\|u^s\|_{H^{1/2}(\partial\Omega)}^2\\
&+\frac{1}{4}\left\|\frac{\partial w_{\kappa_0}^g}{\partial\nu}\right\|_{H^{-1/2}(\partial\Omega)}^2+\|\nabla w_{\kappa_0}^g\|^2_{L^2(\Omega)}+\kappa_0^2\|w_{\kappa_0}^g\|^2_{L^2(\Omega)}\\
&\leq \|\Gamma^{\kappa_0}_\Omega\|_{\mathcal{L}(H^{1/2}(\partial\Omega), H^{-1/2}(\partial\Omega))}\|u^s\|^2_{H^{1/2}(\partial\Omega)}
+\|u^s\|_{H^{1/2}(\partial\Omega)}^2\\
&+\|\Gamma^{\kappa_0}_\Omega\|^2_{\mathcal{L}(H^{1/2}(\partial\Omega), H^{-1/2}(\partial\Omega))}\|u^s\|^2_{H^{1/2}(\partial\Omega)}+C\|w_{\kappa_0}^g\|_{H^1(\Omega)}^2
\end{split}
\end{equation}
where $C$ is positive constant depending only on $\kappa_0$ and $\Omega$. By plugging \eqref{eq:g10} into \eqref{eq:g9}, we then have
\begin{equation}\label{eq:g11}
\begin{split}
\|u^s\|_{H^{1/2}(\partial\Omega)}\leq & C\varepsilon+C\tau\Big(1+\|\Gamma_\Omega\|_{\mathcal{L}(H^{1/2}(\partial\Omega), H^{-1/2}(\partial\Omega) ) } \Big) \|u^s\|_{H^{1/2}(\partial\Omega)}\\
&+C\tau\|w_{\kappa_0}^g\|_{H^1(\Omega)}.
\end{split}
\end{equation}
For sufficiently small $\tau$, we obviously have from \eqref{eq:g11} that
\begin{equation}\label{eq:g12}
\|u^s\|_{H^{1/2}(\partial\Omega)}\leq C\big(\varepsilon+\tau\|w_0^g\|_{H^1(\Omega)}\Big)
\end{equation}
Finally, by the well-posedness of the acoustic scattering problem from a sound-soft obstacle (see, \cite{ColKre,Mcl}), one readily has \eqref{eq:est1} from \eqref{eq:g12}.
The other case with $\mathcal{B} v=\partial v/\partial v$ in \eqref{eq:ite} can be proved by following a similar argument. In what follows, we only sketch the necessary modifications that will be needed. In \eqref{eq:g1}, $f=u^+|_{\partial D}\in H^{1/2}(\partial D)$ should be modified to be $f=\partial u^+/\partial\nu\in H^{-1/2}(\partial D)$; and in \eqref{eq:g2} and \eqref{eq:g5}, the Dirichlet boundary conditions on $\partial D$ should be modified to be the corresponding Neumann ones. Then, by following similar arguments in \eqref{eq:g6}--\eqref{eq:g10}, along with the use of \eqref{eq:f11}, one can arrive at a similar estimate to \eqref{eq:g11} for $\|u^s\|_{H^{1/2}(\partial\Omega)}$, and hence verify \eqref{eq:est1}.
The proof is complete.
\end{proof}
The following lemma was needed in the proof of Theorem~\ref{thm:4}.
\begin{lem}\label{lem:aux}
Let $(\mathbb{R}^N\backslash\overline{D}; \sigma_c, n_c)$ be described in \eqref{eq:cloakr1}. Let $u\in H_{loc}^1(\mathbb{R}^N\backslash\overline{D})$ be the (unique) solution to
\begin{equation}\label{eq:gg5}
\begin{cases}
&(\Delta+\kappa_0^2 n){u}=0\qquad\ \mbox{in}\ \ \mathbb{R}^N\backslash\overline{D},\smallskip\\
& {u}=f\in H^{1/2}(\partial D)\quad\mbox{on}\ \ \partial D,\smallskip\\
&\mbox{$ u$ satisfies the Sommerfeld radiation condition. }
\end{cases}
\end{equation}
Then there holds
\begin{equation}\label{eq:gg6}
\|u\|_{H^1(\Omega\backslash\overline{D})}\leq C\|f\|_{H^{-1/2}(\partial D)},
\end{equation}
where $C$ is positive constant depending only on $\kappa_0, n_c$ and $\Omega, D$. If the Dirichlet boundary condition in \eqref{eq:gg5} is replaced by
\[
\frac{\partial u}{\partial\nu}=f\in H^{-1/2}(\partial D)\quad\mbox{on}\ \ \partial D,
\]
then there holds
\begin{equation}\label{eq:gg7}
\|u\|_{H^1(\Omega\backslash\overline{D})}\leq C\|f\|_{H^{-3/2}(\partial D)},
\end{equation}
where $C$ is positive constant depending only on $\kappa_0, n_c$ and $\Omega, D$.
\end{lem}
\begin{proof}
The proof follows from a completely similar argument to that for the proof of Theorem 2.2 in \cite{KP} by making use of the integral equation method, along with straightforward and necessary modifications by using the mapping properties of the involved potential operators in the Sobolev spaces in \cite{Mcl,Ned}.
\end{proof}
\section{Numerical experiments}
In this section, we conduct extensive numerical experiments to illustrate and verify the theoretical results in Sections 2 and 3. Specifically, the following three goals shall be achieved in our numerical study.
\begin{itemize}
\item[i).] The existence and discreteness of interior transmission eigenvalues of \eqref{eq:ite} shall be numerically verified.
\item[ii).] The results in Theorems~\ref{thm:2} and \ref{thm:3} shall be numerically demonstrated and verified.
\item[iii).] The results in Theorem~\ref{thm:4} shall be numerically demonstrated and verified.
\end{itemize}
Different shapes of the scatterer such as circle, ellipse and square are considered. Throughout, we take $\sigma_c=1$ without loss of generality.
\subsection{Computation of the interior transmission eigenvalues}
Following our earlier discussion, we consider the following system of PDEs associated with the interior transmission eigenvalue problem \eqref{eq:ite},
\begin{equation}\label{eq:iten1}
\begin{cases}
\Delta v+\kappa^2 n_c v=0\quad & \mbox{in}\ \ \Omega\backslash\overline{D},\smallskip\\
\Delta w+\kappa^2 w=0\quad & \mbox{in}\ \ \Omega,\smallskip\\
v=0\quad & \mbox{on}\ \ \partial D,\smallskip\\
\displaystyle{v=w,\quad\frac{\partial v}{\partial \nu}=\frac{\partial w}{\partial\nu}} \quad & \mbox{on}\ \ \partial\Omega.
\end{cases}
\end{equation}
Here, we impose the homogeneous Dirichlet boundary condition on $\partial D$ for the subsequent discussion on the finite element discretisation of \eqref{eq:iten1}, and the homogeneous Neumann boundary condition can be treated similarly.
The weak formulation for (\ref{eq:iten1}) is read as follows for any $\phi\in H^1(\Omega)$,
\begin{eqnarray}\label{weak1}
&\int_{\partial\Omega \cup \partial D } \frac{\partial v}{\partial \nu}\phi\, ds-\int_{\Omega\backslash D}\nabla v\cdot \nabla \phi\, dV=-\int_{\Omega\backslash D} k^2n_c v\phi\, dV,\smallskip\\
& \int_{\partial\Omega}\frac{\partial w}{\partial \nu}\phi\, ds-\int_\Omega \nabla w\cdot\nabla \phi\, dV=-\int_\Omega k^2 w\phi\, dV. \label{weak2}
\end{eqnarray}
Subtracting (\ref{weak2}) from (\ref{weak1}) and using the boundary conditions in (\ref{eq:iten1}), we have
\begin{equation}\label{weak3}
\int_{\Omega\backslash D} \nabla v\cdot \nabla \phi\, dV-\int_{\Omega}\nabla w\cdot \nabla \phi\, dV-\int_{\partial D} \frac{\partial v}{\partial \nu}\phi\, ds=\int_{\Omega\backslash D} \kappa^2n_cv\phi\, dV-\int_{\Omega} \kappa^2 w \phi\, dV.
\end{equation}
For the numerical discretisation of \eqref{weak3}, we make use of the standard Lagrange finite elements. Define
\begin{eqnarray}
S_h&=&\mbox{the space of continuous piecewise $p$-degree finite elements on $\Omega$},\\
S_h^0&=&S_h\cap H_0^1(\Omega)\nonumber\\
&=&\mbox{the subspace of functions in $S_h$ with vanishing DoF on $\partial \Omega$},\\
S_h^B&=&\mbox{the subspace of functions in $S_h$ with vanishing DoF in $\Omega$},\\
S_h^D&=& S_h^0 \cap H_0^1(\Omega\backslash D).
\end{eqnarray}
where DoF stands for degrees of freedom. We explicitly enforce the Dirichlet boundary condition in (\ref{eq:ite}) by letting
\begin{eqnarray}
v_h&=&v_{0,h}+v_{B,h}, \quad \mbox{where } v_{0,h}\in S_h^D \mbox{ and } v_{B,h}\in S_h^B,\\
w_h&=&w_{0,h}+v_{B,h}, \quad \mbox{where } w_{0,h} \in S_h^0.
\end{eqnarray}
In (\ref{weak1}), by letting the test function $\xi_h\in S_h^D$, we obtain the standard weak formulation for $v_h$ as
\begin{equation}\label{dis1}
\int_{\Omega\backslash D}\nabla(v_{0,h}+v_{B,h})\nabla \xi_h dx=\int_{\Omega\backslash D} k^2n_c (v_{0,h}+v_{B,h})\xi_h\, dV
\end{equation}
for all $\xi_h\in S_h^D$.
Analogously, by letting the test function $\eta_h\in S_h^0$, we obtain the weak formulation for $w_h$ as
\begin{equation}\label{dis2}
\int_\Omega \nabla (w_{0,h}+v_{B,h})\nabla \eta_h\, dV=\int_\Omega k^2 (w_{0,h}+v_{B,h})\eta_h\, dV
\end{equation}
for all $\eta_h\in S_h^0$.
For (\ref{weak3}), by letting $\phi_h\in S_h^B$, we have
\begin{eqnarray}\label{dis3}
\int_{\Omega\backslash D}\nabla (v_{0,h}+v_{B,h})\nabla \phi_h\, dV-\int_{\Omega}\nabla (w_{0,h}+v_{B,h})\nabla \phi_h\, dV\nonumber\\
=\int_{\Omega\backslash D}k^2n_c(v_{0,h}+v_{B,h})\phi_h\, dV-\int_{\Omega}k^2(w_{0,h}+v_{B,h}) \phi_h\, dV.
\end{eqnarray}
Let $N_h,N_h^0,N_h^B$ and $N_h^D$ be the dimensions of $S_h$, $S_h^0$, $S_h^B$ and $S_h^D$, respectively. In addition, we choose $\{\xi_1,\cdots,\xi_{N_h}\}$ to be the finite element basis for $S_h$. We define the following matrices
\begin{center}
\begin{tabular}{l|l}
\hline
$S$ & stiffness matrix, $(S)_{j,\ell}=\int_\Omega\nabla\xi_\ell\cdot \nabla\xi_{j}\, dV$\\
$S_D$ & stiffness matrix, $(S)_{j,\ell}=\int_{\Omega\backslash D}\nabla\xi_\ell\cdot \nabla\xi_{j}\, dV$\\
$M_n$& mass matrices, $(M_n)_{j,\ell}=\int_\Omega n_c \xi_\ell \xi_{j}\, dV$\\
$M$& mass matrices, $(M)_{j,\ell}=\int_\Omega \xi_\ell\xi_{j}\, dV$\\
$M_{nD}$& mass matrices, $(M_{nD})_{j,\ell}=\int_{\Omega\backslash D}n_c \xi_\ell \xi_{j}\, dV$\\
\hline
\end{tabular}
\end{center}
Combining \eqref{dis1},\eqref{dis2} and \eqref{dis3}, the discrete counterpart associated with \eqref{eq:iten1} is to solve the following generalised eigenvalue problem
\begin{equation}
{\mathcal A}\vec{\mathbf{x}}=\kappa^2{\mathcal B}\vec{\mathbf{x}},
\end{equation}
where the matrices ${\mathcal A}$ and ${\mathcal B}$ are given block-wisely by
\[
{\mathcal A}=\left(\begin{array}{ccc}
S_D^{N_h^D\times N_h^D}&0&S_D^{N_h^D \times N_h^B} \\
0&S^{N_h^0\times N_h^0}&S^{N_h^0 \times N_h^B}\\
S_D^{N_h^B \times N_h^D}&-S^{N_h^B \times N_h^0}&S_D^{N_h^B \times N_h^B}-S^{N_h^B \times N_h^B}\end{array}\right),
\]
and
\[
{\mathcal B}=\left(\begin{array}{ccc}
M_{nD}^{N_h^D\times N_h^D}&0&M_{nD}^{N_h^D \times N_h^B} \\
0&M^{N_h^0\times N_h^0}&M^{N_h^0 \times N_h^B}\\
M_{nD}^{N_h^B \times N_h^D}&-M^{N_h^B \times N_h^0}&M_{nD}^{N_h^B \times N_h^B}-M^{N_h^B \times N_h^B}\end{array}\right).
\]
In all the numerical examples, we set $n_c=16$. Table \ref{table1} and Table \ref{table2} present the interior transmission eigenvalues for circles ($\{\Omega: \|x\|<1\}$ and $\overline{\{D: \|x\|<0.5\}}$) with the homogeneous Dirichlet boundary condition on $\partial D$, and the results converge when we decrease the size of the mesh. In Table \ref{table2}, complex eigenvalues exist due to the non-selfadjointness of the interior eigenvalue problem \eqref{eq:iten1}. Table \ref{table3} gives the convergence test for circles with the homogeneous Neumann boundary condition imposed on $\partial D$.
Table \ref{table4} presents the interior transmission eigenvalues for ellipses ($\{\Omega: (x^1)^2+(\frac{x^2}{1.2})^2<1 \}$ and $\overline{\{D:(\frac{x^1}{0.5})^2+(\frac{x^2}{0.6})^2<1\}}$) with $h=0.1$, and the first line is the result for the Dirichlet boundary condition, while the second line
for the Neumann boundary condition.
Table \ref{table5} presents the interior transmission eigenvalues for squares ($\{\Omega: |x^1|<1\cap |x^2|<1 \}$ and $\overline{\{D: |x^1|<0.5\cap |x^2|<0.5\}}$) with $h=0.1$, and the first line is the result for the Dirichlet boundary condition, while the second line for the Neumann boundary condition.
\begin{table}
\begin{center}
\begin{tabular}{l|l|l|l|l|l}
\hline
$h=0.2$ & 0.352664 &0.353659 &0.519072& 0.518733 & 0.743794 \\
$h=0.1$ & 0.353965 &0.354349& 0.517122& 0.517444& 0.738215 \\
$h=0.05$& 0.353811 &0.353770& 0.516314& 0.516468&0.736280\\
\hline
\end{tabular}
\caption{Five interior transmission eigenvalues closest to 1 in the circle geometry with $n_c=16$ and the Dirichlet boundary condition. }
\label{table1}
\end{center}
\end{table}
\begin{table}
\begin{center}
\begin{tabular}{l|l|l }
\hline
$h=0.2$ & 2.457778-0.466055i & 2.457778+0.466055i\\
$h=0.1$ & 2.402496-0.415131i & 2.402496+0.415131i \\
$h=0.05$& 2.387120-0.401892i & 2.387120+0.401892i\\
\hline
\end{tabular}
\caption{Complex interior transmission eigenvalues closest to 2.5 in the circle geometry with $n_c=16$ and the Dirichlet boundary condition.}
\label{table2}
\end{center}
\end{table}
\begin{table}
\begin{center}
\begin{tabular}{l|l|l|l|l|l}
\hline
$h=0.2$ & 1.748573 &1.757866 &1.802944& 1.811505 & 1.991750 \\
$h=0.1$ & 1.671757 &1.675173& 1.721631& 1.723695& 1.890939 \\
$h=0.05$& 1.646361 &1.647434& 1.692928& 1.694515&1.842568\\
\hline
\end{tabular}
\caption{Five smallest interior transmission eigenvalues in the circle geometry with $n_c=16$ and the Neumann boundary condition. }
\label{table3}
\end{center}
\end{table}
\begin{table}
\begin{center}
\begin{tabular}{l|l|l|l|l|l|l}
\hline
Dirichlet & 2.097681 &2.165191 &2.207713& 2.220829 & 2.225652-0.359758i& 2.225652+0.359758i \\
Neumann & 1.483283 &1.533343& 1.594063& 1.597701 &1.747153& 1.751044 \\
\hline
\end{tabular}
\caption{Interior transmission eigenvalues in the ellipse geometry with $n_c=16$ and $h=0.1$: the first line lists the six eigenvalues closet to 2 with the Dirichlet boundary condition; the second line lists the smallest six eigenvalues for the Neumann boundary condition.}
\label{table4}
\end{center}
\end{table}
\begin{table}
\begin{center}
\begin{tabular}{l|l|l|l|l|l|l}
\hline
Dirichlet & 1.800246-0.198428i &1.800246+0.198428i &2.170438& 2.317611& 2.431338& 2.471902 \\
Neumann & 0.761138 &1.192171& 1.649127& 1.678710 &1.679462& 1.736597 \\
\hline
\end{tabular}
\caption{Interior transmission eigenvalues in the square geometry with $n_c=16$ and $h=0.1$: the first line lists the six eigenvalues closet to 2 with the Dirichlet boundary condition; the second line lists the smallest six eigenvalues for the Neumann boundary condition.}
\label{table5}
\end{center}
\end{table}
\subsection{Exterior scattering problem with the idealised boundary condition on $\partial D$}
In this section, we shall numerical demonstrate and verify Theorem~\ref{thm:2} with the idealised homogenous Dirichlet or Neumann condition on the boundary of the cloaked region $\partial D$. We first discuss the numerical strategy in determining the Herglotz approximation of the interior transmission eigenfunction $w$ in \eqref{eq:iten1} by $w_\kappa^g$ in \eqref{eq:app1}. In the sequel, we let $\Gamma'$ be a closed curve, and we require
\begin{equation}
w_\kappa^g|_{\Gamma'} \approx w|_{\Gamma'}.
\end{equation}
Assume $(\omega_i,\xi_i)$ is a quadrature rule for $\mathbb{S}^2$, and we choose the sampling points $x_1,\cdots,x_N$ on $\Gamma'$ such that
\begin{equation}\label{eq:ddd1}
\sum_i e^{i\kappa x_j\cdot \xi_i}g(\xi_i)\omega_i=w(x_j),\quad j=1,\cdots,N.
\end{equation}
\eqref{eq:ddd1} can be written as
\begin{equation}
\mathcal{A}g=W,
\end{equation}
which is ill-conditioned and we shall make use of the standard regularisation strategy by minimising the following Tikhonov functional
\begin{equation}\label{eq:ddd2}
||\mathcal{A}g-W||^2+r ||g||^2,
\end{equation}
where $r\in\mathbb{R}_+$ signifies a regulariser and should be properly chosen. In order to determine a minimiser of \eqref{eq:ddd2}, we solve the following normal equation
\begin{equation}
(r I +\mathcal{A}^*\mathcal{A})g=\mathcal{A}^*W.
\end{equation}
After the numerical determination of the Herglotz wave function $w^g_\kappa$, we use it as the incident wave $u^i$ to check if the following exterior problem has a small scattered wave filed,
\begin{equation}\label{eq:ddd3}
\begin{cases}
\displaystyle{\Delta u(x)+\kappa^2 n_c(x) u(x)=0}\qquad & \mbox{for}\ \ x\in\Omega\backslash\overline{D},\smallskip\\
\displaystyle{\Delta u(x)+\kappa^2 u(x)=0}\qquad & \mbox{for}\ \ x\in\mathbb{R}^N\backslash\overline{\Omega},\smallskip\\
\mathcal{B} u(x)=0\qquad & \text{for}\ \ x\in\partial D,\smallskip\\
\mbox{$u-u^i$ satisfies the Sommerfeld}&\hspace*{-2mm} \mbox{radiation condition}.
\end{cases}
\end{equation}
We make use the PML (perfectly matched layer) technique to reduce the unbounded problem \eqref{eq:ddd3} for the scatted wave $u^s=u-u^i$ to be a bounded-domain problem. The PML formulation takes the following form,
\begin{equation}\label{PML}
\frac{\partial}{\partial x^1}\Big(\frac{S_{x^2}}{S_{x^1}}u^s_{x^1}\Big)+\frac{\partial}{\partial x^2}\Big(\frac{S_{x^1}}{S_{x^2}}u^s_{x^2}\Big)+\kappa^2nS_{x^1}S_{x^2}u^s=-\kappa^2(n-1)u^i,
\end{equation}
where
\begin{equation}
S_{x^1}=1+\frac{\sigma_{x^1}}{\mathrm{i}\kappa},\quad S_{x^2}=1+\frac{\sigma_{x^2}}{\mathrm{i}\kappa},
\end{equation}
and $\sigma_{x^1}$ and $\sigma_{x^2}$ are, respectively, functions of $x^1, x^2$ only. In our numerical experiments, we choose
\begin{equation}
\sigma_{x^1}=(l/d)^m\sigma_{x,max},
\end{equation}
where $l$ is the distance from the interface between the PML and the physical solution domain, $d$ is the thickness of the PML, and
\begin{equation}
\sigma_{x^1,max}=-\frac{(m+1)\ln(R(0))}{2d},
\end{equation}
with $R(0)$ taken to be $e^{-16}$ and $m=3$.
The definition of $\sigma_{x^2}$ is similar. We define the scattering ratio as $\frac{||u^s||_{L^2(\Gamma)}}{||u^i||_{L^2(\Gamma)}}$ with $\Gamma$ being a closed curve chosen to be a circle of radius 1.8. In all the subsequent figures, we use the mesh with $h=0.1$ and $n_c=16$.
Figure \ref{Fig1} presents the distributions of the scattered field, total field and incident field in the circle geometry when $\kappa=0.354349$ with the Dirichlet boundary condition. The scattering ratio is 0.032857. Figure \ref{Fig2} presents the fields in the circle geometry when $\kappa=3.028932$ with the Dirichlet boundary condition, and the scattering ratio is 0.014606. Figure \ref{Fig3} is the result for $\kappa=3.857263$ with the Dirichlet boundary condition and the scattering ratio is 0.061382. We also give a result in the circle geometry with the Neumann boundary condition in Figure \ref{Fig4}, where $\kappa=1.890939$ and the scattering ratio 0.032492. Clearly, the near-invisibility is achieved for all of the cases and this verifies Theorems~\ref{thm:2} and \ref{thm:3}.
\begin{figure}[!ht]
\centerline{
\includegraphics[height=5cm,width=12cm,angle=0]{ringd1}
}
\caption{Field distributions in the circle geometry when $\kappa=0.354349$ with the Dirichlet boundary condition.}
\label{Fig1}
\end{figure}
\begin{figure}[!ht]
\centerline{
\includegraphics[height=5cm,width=12cm,angle=0]{ringd2}
}
\caption{Field distributions in the circle geometry when $\kappa=3.028932$ with the Dirichlet boundary condition.}
\label{Fig2}
\end{figure}
\begin{figure}[!ht]
\centerline{
\includegraphics[height=5cm,width=12cm,angle=0]{ringd3}
}
\caption{Field distributions in the circle geometry when $\kappa=3.857263$ with the Dirichlet boundary condition.}
\label{Fig3}
\end{figure}
\begin{figure}[!ht]
\centerline{
\includegraphics[height=5cm,width=12cm,angle=0]{ringn1}
}
\caption{Field distributions in the circle geometry when $\kappa=1.890939$ with the Neumann boundary condition.}
\label{Fig4}
\end{figure}
Next, we will consider the examples for the ellipse geometry. Figure \ref{Fig5} gives the distributions of the scattered field, total field and incident field of the ellipse geometry when $\kappa=2.097681$ with the Dirichlet boundary condition, and the scattering ratio is 0.074928. Figure \ref{Fig6} gives the results when $\kappa=1.747153$ with the Neumann boundary condition, and the scattering ratio is 0.061357. The near-invisibility is also achieved for all both of the computed cases.
\begin{figure}[!ht]
\centerline{
\includegraphics[height=5cm,width=12cm,angle=0]{ellipsed}
}
\caption{Field distributions in the ellipse geometry when $\kappa=2.097681$ with the Dirichlet boundary condition.}
\label{Fig5}
\end{figure}
\begin{figure}[!ht]
\centerline{
\includegraphics[height=5cm,width=12cm,angle=0]{ellipsen}
}
\caption{Field distributions in the ellipse geometry when $\kappa=1.747153$ with the Neumann boundary condition.}
\label{Fig6}
\end{figure}
Next, we consider the square geometry. Figure \ref{Fig7} presents the distributions of the scattered field, total field and incident field in the square geometry when $\kappa=2.431338$ with the Dirichlet boundary condition, and the scattering ratio is 0.816597. Figure \ref{Fig8} presents the corresponding results when $\kappa=0.761138$ with the Neumann boundary condition, and the scattering ratio is 1.136312. Clearly, near-invisibility cannot be achieved. We believe that this is mainly due to that the non-transparency condition is not fulfilled in those cases; see our remarks after Theorem~2.3 in Section 2.
\begin{figure}[!ht]
\centerline{
\includegraphics[height=5cm,width=12cm,angle=0]{squared}
}
\caption{Field distributions in the square geometry when $\kappa=2.431338$ with the Dirichlet boundary condition.}
\label{Fig7}
\end{figure}
\begin{figure}[!ht]
\centerline{
\includegraphics[height=5cm,width=12cm,angle=0]{squaren}
}
\caption{Field distributions in the square geometry when $\kappa=0.761138$ with the Neumann boundary condition.}
\label{Fig8}
\end{figure}
\subsection{Numerical results for isotropic invisibility cloaking}
In this section, we use the the isotropic lossy layers as in \eqref{eq:lossy1} and \eqref{eq:lossy2} for the finite realisation of the idealised boundary condition on $\partial D$. We define $\Sigma := \{\|x\|<0.3\} $ in the case of a circle and $\Sigma := \{ (\frac{x^1}{0.3})^2+(\frac{x^2}{0.36})^2<1\}$ for an ellipse; and $\sigma_a=I$ and $n_a=12$ in $\Sigma$. We also set $\gamma=1,\tau=0.01,\alpha=1,\beta=0.3$.
Figure \ref{Fig9} presents the distributions of the scattered field, total field and incident field in the circle geometry when $\kappa=3.857263$ with the setting \eqref{eq:lossy1}, and the scattering ratio is 0.100874. Figure \ref{Fig10} gives the field distributions when $\kappa=1.890939$ with the setting \eqref{eq:lossy2}, and the scattering ratio is 0.024135.
Figure \ref{Fig11} presents the distributions of the scattered field, total field and incident field in the ellipse geometry when $\kappa=2.097681$ with the setting \eqref{eq:lossy1}, and the scattering ratio is 0.247339. Figure \ref{Fig11} presents the distributions of the fields in the ellipse geometry when $\kappa=1.747153$ with the setting \eqref{eq:lossy2}, and the scattering ratio is 0.068411.
\begin{figure}[!ht]
\centerline{
\includegraphics[height=5cm,width=12cm,angle=0]{ringdlayer}
}
\caption{Field distributions in the circle geometry when $\kappa=3.857263$ with the setting \eqref{eq:lossy1}.}
\label{Fig9}
\end{figure}
\begin{figure}[!ht]
\centerline{
\includegraphics[height=5cm,width=12cm,angle=0]{ringnlayer}
}
\caption{Field distributions in the circle geometry when $\kappa=1.890939$ with the setting \eqref{eq:lossy2}.}
\label{Fig10}
\end{figure}
\begin{figure}[!ht]
\centerline{
\includegraphics[height=5cm,width=12cm,angle=0]{ellipsedlayer}
}
\caption{Field distributions in the ellipse geometry when $\kappa=2.097681$ with the setting \eqref{eq:lossy1}.}
\label{Fig11}
\end{figure}
\begin{figure}[!ht]
\centerline{
\includegraphics[height=5cm,width=12cm,angle=0]{ellipsenlayer}
}
\caption{Field distributions in the ellipse geometry when $\kappa=1.747153$ with the setting \eqref{eq:lossy2}.}
\label{Fig12}
\end{figure}
\section*{Acknowledgement}
The work of H. Liu was supported by the FRG grants from Hong Kong Baptist University, Hong Kong RGC General Research Funds, 12302415 and 405513, and the NSFC grant under No. 11371115. X. Ji was supported by the National Natural Science Foundation of China (No. 11271018, No. 91230203) and the Special Funds for National Basic Research Program of China, 973 Program 2012CB025904.
|
\section{Introduction}
\label{sec:introduction}
Both in statistical mechanics and in quantum field theory, the numerical study of a large class of physical quantities by Monte~Carlo methods can be reduced to the evaluation of differences of free energies $F$. For lattice gauge theory, the most typical examples arise in the investigation of the phase diagram of QCD and QCD-like theories. For instance, in the study of the QCD equation of state at finite temperature $T$ (and zero baryon density), the difference between the pressure $p(T)$ and its value at $T=0$ can be computed using the fact that $p$ is opposite to the free energy density $f=F/V$, where $V$ denotes the system volume.\footnote{Strictly speaking, the $p=-f$ equality holds only for an infinite-volume system. In a periodic, cubic box of volume $V=L^3$, the relation is violated by corrections that depend on the aspect ratio $LT$ of the time-like cross-section of the hypertorus (for a gas of free, massless bosons)~\cite{Gliozzi:2007jh} or on the ratio of the linear size of the system $L$ over the inverse of the smallest screening mass (if screening effects are present)~\cite{DeTar:1985kx, Elze:1988zs, Meyer:2009kn}: see also ref.~\cite{Panero:2008mg} for a numerical study of these effects on lattices of typical sizes used in Monte~Carlo simulations.} In turn, $f$ can then be evaluated for example by ``integrating a derivative''~\cite{Engels:1990vr}: during the past few years, this method has led to high-precision determinations of the equation of state for QCD~\cite{Bazavov:2009zn, Borsanyi:2013bia} and for Yang--Mills theories based on different gauge groups~\cite{Umeda:2008bd, Panero:2009tv, Borsanyi:2012ve, Bruno:2014rxa} and/or in lower dimensions~\cite{Bialas:2008rk, Caselle:2011mn}. These results can be compared with those obtained in other recent works~\cite{Asakawa:2013laa, Giusti:2014ila}, in which novel techniques (respectively based on the Wilson flow~\cite{Luscher:2010iy, Suzuki:2013gza} and on shifted boundary conditions~\cite{Giusti:2010bb, Giusti:2012yj}) have been used.
Other objects having a natural interpretation in terms of free-energy differences in finite-temperature non-Abelian gauge theories are the interfaces separating different center domains and/or regions of space characterized by different realizations of center symmetry~\cite{Kajantie:1988hn, Kajantie:1989xk, Enqvist:1990ae, Huang:1990jf, Kajantie:1990bu, Bhattacharya:1990hk, Bhattacharya:1992qb, KorthalsAltes:1993ca, Iwasaki:1993qu, Monden:1997hb, Giovannangeli:2001bh, Pisarski:2002ji}: they could have phenomenological implications for heavy-ion collisions~\cite{Asakawa:2012yv} and for cosmology~\cite{Ignatius:1991nk} and have been studied quite extensively in lattice simulations~\cite{Lucini:2003zr, Lucini:2005vg, Bursa:2005yv}.
In the study of QCD at finite baryon chemical potential $\mu$, a possible computational strategy to cope with the notorious sign problem~\cite{deForcrand:2010ys, Philipsen:2012nu, Levkova:2012jd, Aarts:2013lcm, D'Elia:2015rwa, Gattringer:2016kco} is the one based on the method first introduced in ref.~\cite{Ferrenberg:1988yz} and later extended to applications in lattice QCD~\cite{Toussaint:1989fn, Fodor:2001au}, whereby importance sampling is carried out in an ensemble of configurations generated using the determinant of the Dirac operator $D$ at $\mu=0$, and the expectation value in the target ensemble at finite $\mu$ is obtained through reweighting by the expectation value of $\det D(\mu)/\det D(0)$, computed in the $\mu=0$ ensemble. The natural logarithm of the latter quantity can be interpreted as ($1/T$ times) the difference between the free energies associated with the partition functions of the $\mu=0$ and finite-$\mu$ ensembles. Note that the \emph{extensive} nature of these quantities implies that a severe overlap problem arises in a large volume: for a Markov chain generated using the determinant of the Dirac operator $D$ at $\mu=0$, the probability of probing those regions of phase space, where the measure of the finite-$\mu$ ensemble is largest, gets exponentially suppressed with the system hypervolume, resulting in extremely poor sampling.
Free-energy differences are also relevant for the study of operators in the ground state of gauge theories. For example, vacuum expectation values of extended operators like 't~Hooft loops ($\widetilde{\mathcal{W}}$)~\cite{'tHooft:1977hy}, which have been studied on the lattice in several works~\cite{Kovacs:2000sy, Hoelbling:2000su, DelDebbio:2000cx, deForcrand:2000fi, deForcrand:2001nd}, can be generically written in the form
\begin{equation}
\label{tHooft}
\langle \widetilde{\mathcal{W}} \rangle = \frac{\int \mathcal{D} \phi \widetilde{\mathcal{W}}[\phi] \exp \left(-S[\phi]\right)}{\int \mathcal{D} \phi \exp \left(-S[\phi]\right)} = \frac{Z_{\widetilde{\mathcal{W}}}}{Z} = \exp\left[ - \left( F_{\widetilde{\mathcal{W}}} - F \right) L \right],
\end{equation}
where $\mathcal{D} \phi$ denotes the measure for the (regularized) functional integration over the generic fields $\phi$, $S$ is the Euclidean action, $Z$ is the partition function, $F$ is the free energy, and $L$ is the system size in the Euclidean-time direction, while $Z_{\widetilde{\mathcal{W}}}$ denotes a \emph{modified} partition function, in which the observable has been included in the action (by twisting a set of plaquettes that tile the $\widetilde{\mathcal{W}}$ loop~\cite{Srednicki:1980gb}) and $F_{\widetilde{\mathcal{W}}}$ is the corresponding free energy. Note that, in the case of a ``maximal'' 't~Hooft loop, i.e. one extending through a whole cross-section of the system, this problem has a natural connection to the study of fluctuating interfaces in statistical mechanics. It is worth noting that there exist many experimental realizations of fluctuating interfaces, particularly in mesoscopic physics, in chemistry and in biophysics: some well-known examples include binary mixtures and amphiphilic membranes~\cite{Gelfand:1990fse, Privman:1992zv}.
Other extended operators, like Wilson loops or Polyakov-loop correlation functions, can be easily recast into simple expressions of the form of eq.~(\ref{tHooft}) in a dual formulation of the theory, at least for Abelian (or, more generally, solvable) gauge groups~\cite{Panero:2004zq, Panero:2005iu, Caselle:2014eka, Caselle:2016mqu}.
This list of examples is by no means exhaustive, as the class of physical observables whose expectation values can be written in a natural way in terms of a free-energy difference---i.e. as a ratio of partition functions---is much broader. Note that, while it is always possible to trivially \emph{define} the expectation value of any arbitrary operator $\mathcal{O}$ as a ratio of partition functions of the form $Z_{\mathcal{O}}/Z=\exp\left[-\left(F_{\mathcal{O}}-F\right)L\right]$, here we are interested in the cases in which the quantity $Z_{\mathcal{O}}$ can be written as an integral over positive weights, that can be sampled efficiently by Monte~Carlo methods.
The examples above (and the computational problems that they involve) show that, in general, the numerical evaluation of free-energy differences remains a non-trivial computational challenge---one that cannot be easily tackled by brute-force approaches---in particular for large systems.
In this work, we present an application of non-equilibrium methods from numerical statistical mechanics, in lattice gauge theory. More precisely, we show that the class of algorithms based on Jarzynski's relation (whose derivation is presented in section~\ref{sec:Jarzynski}, along with some comments relevant for practical implementations in Monte~Carlo simulations) can be applied to gauge theories formulated on a Euclidean lattice, in a straightforward way. In a nutshell, this is so, because the Euclidean lattice formulation of a gauge theory~\cite{Wilson:1974sk} can be interpreted as a statistical mechanics system of a countable (and, in actual Monte~Carlo simulations, finite) number of degrees of freedom~\cite{Kogut:1979wt}. The main difference of Euclidean lattice gauge theories with respect to statistical spin models, namely the existence of an invariance under \emph{local}, rather than \emph{global}, transformations of the internal degrees of freedom, does not play any r\^ole in Jarzynski's theorem, so that there is no conceptual obstruction to its application for lattice gauge theories. Nevertheless, this theorem has received surprisingly little attention in the lattice community. With the notable exception of some works carried out in the three-dimensional Ising model (see, e.g., ref.~\cite{Chatelain:2007ts} and additional references mentioned below), which is exactly equivalent to a three-dimensional $\mathbb{Z}_2$ lattice gauge theory, we are not aware of any large-scale numerical studies of lattice QCD or of other lattice gauge theories, using Jarzynski's theorem. A motivation of the present work is to partially fill this gap, by presenting examples of applications of Jarzynski's theorem in two computationally challenging problems, and, as will be discussed in more detail in the following, by initiating a study of the practical details of computationally efficient algorithmic implementations of Jarzynski's relation. We will discuss applications in two different problems, namely in a high-precision numerical study of the physics of fluctuating interfaces, and in the calculation of the equation of state in non-Abelian gauge theories. The body of literature about the dynamics of interfaces (in different statistical-mechanics models) is vast~\cite{Binder:1982mc, Burkner:1983mc, Berg:1991sn, Hasenbusch:1992zz, Potoff:2000st, Davidchack:2005cs, Caselle:1992ue, Caselle:1994df, Caselle:2006dv, Billo:2006zg, Caselle:2007yc, Billo:2007fm,
condmat0602580, Chatelain:2007ts, Hijar2007, 0905.4569, Limmer:2011tp, Binder:2011mc, 1401.7870, 1406.0616, 1411.5588}; for our present purposes, particularly relevant works include those that have been recently carried out by Binder and collaborators (see refs.~\cite{1401.7870, 1406.0616, 1411.5588} and references therein), as well as those reported in refs.~\cite{condmat0602580, Chatelain:2007ts, Hijar2007}. We will also compare our new results with those obtained in earlier works by the Turin group~\cite{Caselle:1992ue, Caselle:1994df, Caselle:2006dv, Billo:2006zg, Caselle:2007yc, Billo:2007fm}. The results obtained in this benchmark study are compared with state-of-the-art analytical predictions based on an effective-string model~\cite{Aharony:2009gg, Aharony:2010cx, Aharony:2010db, Kol:2010fq, Aharony:2011gb, Gliozzi:2012cx, Dubovsky:2012sh, Aharony:2013ipa, Caselle:2013dra, Ambjorn:2014rwa, Brandt:2016xsp}: the precision of the results that we obtain with this algorithm in $\mathbb{Z}_2$ gauge theory in three dimensions allows us to clearly resolve subleading corrections predicted by the effective theory, which scale like the \emph{seventh} and the \emph{ninth} inverse powers of the linear size of the interface. In section~\ref{sec:equation_of_state} we discuss an implementation of this type of algorithm in non-Abelian gauge theory with $\mathrm{SU}(2)$ gauge group, and present preliminary results for the computation of the equation of state in the confining phase of this theory. Finally, in section~\ref{sec:conclusions} we summarize the key features of non-equilibrium algorithms like the one discussed in this work, and discuss their potential for applications in computationally challenging problems, in particular those relevant for the calculation of free energies (or, more generally, effective actions) in QCD and in other strongly coupled field theories.
\section{Jarzynski's relation}
\label{sec:Jarzynski}
The class of algorithms that we are discussing in the present work are based on a theorem proven by Jarzynski in refs.~\cite{Jarzynski:1996ne, Jarzynski:1997ef} (for a discussion about the relation with earlier work by Bochkov and Kuzovlev~\cite{Bochkov:1977gt, Bochkov:1979fd, Bochkov:1981nf}, see refs.~\cite{condmat0612305, Kuzovlev:2011sr}; for the connection with entropy-production fluctuation theorems~\cite{Evans:1993po}, see ref.~\cite{Crooks:1999ep}). Remarkably, this relation has also been verified experimentally, as discussed, for instance, in ref.~\cite{Liphardt:2002ei}.
In a nutshell, Jarzynski's relation states the equality of the exponential average of the work done on a system in non-equilibrium processes, and the difference between the free energies of the initial ($F_{\mbox{\tiny{in}}}$) and the final ($F_{\mbox{\tiny{fin}}}$) ensembles, respectively associated with the system parameters realized at ``times'' $t_{\mbox{\tiny{in}}}$ and $t_{\mbox{\tiny{fin}}}$. Here, ``time'' can either refer to Monte~Carlo time (in a numerical simulation), or to real time (in an experiment), and the average is taken over a large number of realizations of such non-equilibrium evolutions from the initial and the final ensembles.
In the following, we summarize the original derivation presented in refs.~\cite{Jarzynski:1996ne, Jarzynski:1997ef}, using natural units ($\hbar=c=k_{\mbox{\tiny{B}}}=1$) and focusing, for definiteness, on a statistical-mechanics system---although, as we will show below, the generalization to lattice gauge theories is straightforward.
Consider a system, whose microscopic degrees of freedom are collectively denoted as $\phi$ (for instance, $\phi$ could represent the spins defined on the sites of a regular $D$-dimensional lattice: $\phi = \{ \phi_{(x_1,\dots,x_D)}\}$). Let the dynamics of the system be described by the Hamiltonian $H$, which is a function of the degrees of freedom $\phi$, and depends on a set of parameters (e.g. couplings). When the system is in thermal equilibrium with a large heat reservoir at temperature $T$, the partition function of the system is
\begin{equation}
\label{partition_function}
Z =\sum_{\phi} \exp \left( - \frac{H}{T} \right),
\end{equation}
where, as usual, $\sum_{\phi}$ denotes the multiple sum (or integral) over the values that each microscopic degree of freedom can take. The statistical distribution of $\phi$ configurations in thermodynamic equilibrium is given by the Boltzmann distribution:
\begin{equation}
\label{Boltzmann_distribution}
\pi[\phi] = \frac{1}{Z} \exp \left( - \frac{H}{T} \right),
\end{equation}
which, in view of eq.~(\ref{partition_function}), is normalized to $1$:
\begin{equation}
\label{Boltzmann_distribution_normalization}
\sum_\phi \pi[\phi] = 1.
\end{equation}
Let us denote the conditional probability (or the conditional probability density, if the degrees of freedom of the system can take values in a continuous domain) that the system undergoes a transition from a configuration $\phi$ to a configuration $\phi^\prime$ as $P[\phi\to\phi^\prime]$. The sum of such probabilities over all possible distinct final configurations is one,
\begin{equation}
\label{transition_probability}
\sum_{\phi^\prime} P[\phi\to\phi^\prime] = 1,
\end{equation}
because the system certainly must evolve to \emph{some} final configuration. Since the Boltzmann distribution is an equilibrium thermal distribution, it satisfies the property
\begin{equation}
\label{Boltzmann_distribution_stationarity}
\sum_{\phi} \pi[\phi] P[\phi\to\phi^\prime] = \pi[\phi^\prime].
\end{equation}
In the following, we will assume that the system satisfies the stronger, detailed-balance condition:
\begin{equation}
\label{detailed_balance}
\pi[\phi] P[\phi\to\phi^\prime] = \pi[\phi^\prime] P[\phi^\prime \to \phi];
\end{equation}
note that, if eq.~(\ref{transition_probability}) holds, then eq.~(\ref{detailed_balance}) implies eq.~(\ref{Boltzmann_distribution_stationarity}), but the converse is not true.
In general, the Boltzmann distribution $\pi$ (as well as $Z$ and $P$) will depend on the couplings appearing on the Hamiltonian and on the temperature $T$; denoting them collectively as $\lambda$, one can then highlight such dependence by writing the configuration distribution as $\pi_\lambda$ (and the partition function and transition probabilities as $Z_\lambda$ and $P_\lambda$, respectively).
Let us introduce a time dependence for the $\lambda$ parameters---including the couplings of the Hamiltonian and, possibly, also the temperature $T$~\cite{Chatelain:2007ts}. Starting from a situation, at the initial time $t=t_{\mbox{\tiny{in}}}$, in which the couplings of the Hamiltonian take certain values, and the system is in thermal equilibrium at the temperature $T_{\mbox{\tiny{in}}}$, the parameters of the system are modified as functions of time, according to some specified procedure, $\lambda(t)$, and are driven to final values $\lambda(t_{\mbox{\tiny{fin}}})$ over an interval of time $\Delta t = t_{\mbox{\tiny{fin}}}-t_{\mbox{\tiny{in}}}$. $\lambda(t)$ is assumed to be a continuous function; for simplicity, we take it to interpolate linearly in $(t-t_{\mbox{\tiny{in}}})$ between the initial, $\lambda(t_{\mbox{\tiny{in}}})$, and final, $\lambda(t_{\mbox{\tiny{fin}}})$, values. During the time interval between $t_{\mbox{\tiny{in}}}$ and $t_{\mbox{\tiny{fin}}}$, the system is, in general, out of thermal equilibrium.\footnote{For example, the parameters of the system could be changed in a sufficiently short interval of real time in an actual experiment, or of Monte~Carlo time in a numerical simulation. Unless $\Delta t \to \infty$, the system ``does not have enough time'' to thermalize.}
Now, discretize the $\Delta t$ interval in $N$ sub-intervals of the same width $\tau=\Delta t /N$, define $t_n=t_{\mbox{\tiny{in}}} + n \tau$ for integer values of $n$ ranging from $0$ to $N$ (so that $t_0=t_{\mbox{\tiny{in}}}$ and $t_N=t_{\mbox{\tiny{fin}}}$); correspondingly, the linear $\lambda(t)$ mentioned above can be discretized by a piecewise-constant function, taking the value $\lambda(t_n)$ for $t_n \le t < t_{n+1}$. Furthermore, let $\phi(t)$ denote one possible (arbitrary) ``trajectory'' in the space of field configurations, i.e. a mapping between the time interval $[t_{\mbox{\tiny{in}}},t_{\mbox{\tiny{fin}}}]$ and the configuration space of the system; upon discretization of the $[t_{\mbox{\tiny{in}}},t_{\mbox{\tiny{fin}}}]$ interval, such trajectory can be associated with the $(N+1)$-dimensional array of field configurations defined as $\left\{ \phi(t_{\mbox{\tiny{in}}}), \phi(t_1), \phi(t_2), \dots , \phi(t_{N-1}), \phi(t_{\mbox{\tiny{fin}}}) \right\}$. Finally, let us introduce the quantity $\mathcal{R}_N[\phi]$ defined as
\begin{equation}
\label{discretized_exponential_work}
\mathcal{R}_N[\phi] = \exp \left( - \sum_{n=0}^{N-1} \left\{ \frac{H_{\lambda\left(t_{n+1}\right)}\left[\phi\left(t_n\right)\right]}{T\left(t_{n+1}\right)} - \frac{H_{\lambda\left(t_n \right)}\left[\phi\left(t_n \right)\right]}{T\left(t_n \right)} \right\}\right)
\end{equation}
(where the Hamiltonian $H_\lambda$ depends on its couplings, not on the temperature $T$): each summand appearing on the right-hand side of eq.~(\ref{discretized_exponential_work}) is the work (over $T$) done on the system during a time interval $\tau$, by switching the couplings from their values at $t=t_{\mbox{\tiny{in}}} + n \tau$ to those at $t=t_{\mbox{\tiny{in}}} + (n+1) \tau$. Thus, $\mathcal{R}_N[\phi]$ provides a discretization of the exponentiated work done on the system in the time interval from $t=t_{\mbox{\tiny{in}}}$ to $t=t_{\mbox{\tiny{fin}}}$, during which the parameters are switched as a function of time, $\lambda(t)$, and the fields trace out the trajectory $\phi(t)$ in configuration space. This discretization gets more and more accurate for larger and larger values of $N$, and becomes exact in the $N \to \infty$ limit, whereby the sum on the right-hand side of eq.~(\ref{discretized_exponential_work}) turns into a definite integral.
Recalling that the usual mapping between statistical mechanics and lattice gauge theory~\cite{Wilson:1974sk} associates $H/T$ with the Euclidean action of the lattice theory, one easily realizes that, from the point of view of the lattice theory, each term within the braces on the right-hand side of eq.~(\ref{discretized_exponential_work}) can be interpreted as the \emph{difference in Euclidean action} for the field configuration denoted as $\phi\left(t_n \right)$, which is induced when the parameters are changed from $\lambda\left(t_n \right)$ to $\lambda\left(t_{n+1}\right)$. Thus, evaluating the work (over $T$) during a Monte Carlo simulation of this statistical system corresponds to evaluating the variation in Euclidean action in the lattice gauge theory---and this is precisely the quantity that was evaluated in the simulations discussed in sections~\ref{sec:interface} and~\ref{sec:equation_of_state}.
Using eq.~(\ref{Boltzmann_distribution}), eq.~(\ref{discretized_exponential_work}) can then be recast in the form
\begin{equation}
\label{discretized_exponential_work_Z_pi_ratios}
\mathcal{R}_N[\phi] = \prod_{n=0}^{N-1} \frac{Z_{\lambda(t_{n+1})} \cdot \pi_{\lambda(t_{n+1})}\left[\phi\left(t_n \right)\right]}{Z_{\lambda(t_n)} \cdot \pi_{\lambda(t_n)}\left[\phi\left(t_n \right)\right]} .
\end{equation}
Next, consider the average of eq.~(\ref{discretized_exponential_work_Z_pi_ratios}) over all possible field-configuration trajectories realizing an evolution of the system from one of the configurations of the initial ensemble (at $t=t_{\mbox{\tiny{in}}}$, when the parameters of the system take the values $\lambda(t_{\mbox{\tiny{in}}})$) to a configuration of the final ensemble (at $t=t_{\mbox{\tiny{fin}}}$, when the parameters of the system take the values $\lambda(t_{\mbox{\tiny{fin}}})$). In practice, in a Monte Carlo simulation, this is realized by averaging over a sufficiently large number of discretized trajectories starting from configurations of the initial, equilibrium ensemble (described by the partition function $Z_{\lambda(t_{\mbox{\tiny{in}}})}$ and by the canonical distribution $\pi_{\lambda(t_{\mbox{\tiny{in}}})}$), and assuming that, given a configuration of fields at a certain time $t=t_n$, a new field configuration at time $t=t_{n+1}$ is obtained by Markov evolution with transition probability $P_{\lambda(t_{n+1})}\left[ \phi(t_n) \to \phi(t_{n+1}) \right]$, which is assumed to satisfy the detailed balance condition eq.~(\ref{detailed_balance}). Note that $P$ is taken to depend on $\lambda(t_{n+1})$: for every finite value of $\tau$ (and for every Monte Carlo computation with finite statistics), this way of discretizing the non-equilibrium transformation introduces an ``asymmetry'' in the time evolution (one could alternatively carry out the two steps in the opposite order) and a related systematic uncertainty. As it will be discussed below, this leads to a difference in the results obtained when the transformation of the parameters is carried out in one direction or in the opposite one, but such ``discretization effect'' is expected to vanish for $\tau \to 0$ (i.e. for $N \to \infty$), and our numerical results do confirm that. Another, more important, reason why the evolution of the system is not ``symmetric'' under time reversal, is that, while the initial ensemble is at equilibrium, this is not the case at later times: the system is progressively driven (more and more) out of equilibrium.
Then, the average of eq.~(\ref{discretized_exponential_work_Z_pi_ratios}) over all possible field-configuration trajectories realizing an evolution of the system from $t=t_{\mbox{\tiny{in}}}$ to $t=t_{\mbox{\tiny{fin}}}$ can be written as
\begin{equation}
\label{averaged_discretized_exponential_work_Z_pi_ratios}
\sum_{\left\{ \phi(t) \right\} } \mathcal{R}_N[\phi] = \sum_{\left\{ \phi(t) \right\} } \pi_{\lambda(t_{\mbox{\tiny{in}}})}\left[ \phi(t_{\mbox{\tiny{in}}}) \right] \prod_{n=0}^{N-1} \left\{ \frac{Z_{\lambda(t_{n+1})}}{Z_{\lambda(t_n)}} \cdot \frac{\pi_{\lambda(t_{n+1})}\left[\phi\left(t_n \right)\right]}{\pi_{\lambda(t_n)}\left[\phi\left(t_n \right)\right]} \cdot P_{\lambda(t_{n+1})}\left[ \phi(t_n) \to \phi(t_{n+1}) \right] \right\},
\end{equation}
where we used the fact that the system is initially in thermal equilibrium, hence the probability distribution for the configurations at $t=t_{\mbox{\tiny{in}}}$ is given by eq.~(\ref{Boltzmann_distribution}), and where $\sum_{\left\{ \phi(t) \right\} }$ denotes the $N+1$ sums over field configurations at all discretized times from $t_{\mbox{\tiny{in}}}$ to $t_{\mbox{\tiny{fin}}}$:
\begin{equation}
\sum_{\left\{ \phi(t) \right\} } \dotsc = \sum_{\phi(t_{\mbox{\tiny{in}}})} \sum_{\phi(t_1)} \sum_{\phi(t_2)} \dots \sum_{\phi\left(t_{\mbox{\tiny{fin}}}-\tau\right)} \sum_{\phi(t_{\mbox{\tiny{fin}}})} \dotsc .
\end{equation}
The telescopic product of partition-function ratios in eq.~(\ref{averaged_discretized_exponential_work_Z_pi_ratios}) simplifies, and the equation can be rewritten as
\begin{equation}
\label{discretized_exponential_work_pi_ratios}
\sum_{\left\{ \phi(t) \right\} } \mathcal{R}_N[\phi] = \frac{Z_{\lambda(t_{\mbox{\tiny{fin}}})}}{Z_{\lambda(t_{\mbox{\tiny{in}}})}} \sum_{\left\{ \phi(t) \right\} } \pi_{\lambda(t_{\mbox{\tiny{in}}})}\left[ \phi(t_{\mbox{\tiny{in}}}) \right] \prod_{n=0}^{N-1} \left\{ \frac{\pi_{\lambda(t_{n+1})}\left[\phi\left(t_n \right)\right] \cdot P_{\lambda(t_{n+1})}\left[ \phi(t_n) \to \phi(t_{n+1}) \right]}{\pi_{\lambda(t_n)}\left[\phi\left(t_n \right)\right]} \right\}.
\end{equation}
Using eq.~(\ref{detailed_balance}), this expression can be turned into
\begin{equation}
\label{simplified_discretized_exponential_work_pi_ratios}
\sum_{\left\{ \phi(t) \right\} } \mathcal{R}_N[\phi] = \frac{Z_{\lambda(t_{\mbox{\tiny{fin}}})}}{Z_{\lambda(t_{\mbox{\tiny{in}}})}} \sum_{\left\{ \phi(t) \right\} } \pi_{\lambda(t_{\mbox{\tiny{in}}})}\left[ \phi(t_{\mbox{\tiny{in}}}) \right] \prod_{n=0}^{N-1} \left\{ \frac{\pi_{\lambda(t_{n+1})}\left[\phi\left(t_{n+1} \right)\right]}{\pi_{\lambda(t_n)}\left[\phi\left(t_n \right)\right]} \cdot P_{\lambda(t_{n+1})}\left[ \phi(t_{n+1}) \to \phi(t_n)\right] \right\}.
\end{equation}
At this point, also the telescopic product of ratios of Boltzmann distributions can be simplified, reducing the latter expression to
\begin{equation}
\label{discretized_exponential_P_product}
\sum_{\left\{ \phi(t) \right\} } \mathcal{R}_N[\phi] = \frac{Z_{\lambda(t_{\mbox{\tiny{fin}}})}}{Z_{\lambda(t_{\mbox{\tiny{in}}})}} \sum_{\left\{ \phi(t) \right\} } \pi_{\lambda(t_{\mbox{\tiny{fin}}})}\left[ \phi(t_{\mbox{\tiny{fin}}}) \right] \prod_{n=0}^{N-1} P_{\lambda(t_{n+1})}\left[ \phi(t_{n+1}) \to \phi(t_n)\right].
\end{equation}
Note that, in eq.~(\ref{discretized_exponential_P_product}), $\phi(t_{\mbox{\tiny{in}}})$ appears only in the $P_{\lambda(t_1)}\left[ \phi(t_1) \to \phi(t_{\mbox{\tiny{in}}})\right]$ term: thus, one can use eq.~(\ref{transition_probability}) to carry out the sum over the $\phi(t_{\mbox{\tiny{in}}})$ configurations, and eq.~(\ref{discretized_exponential_P_product}) reduces to
\begin{equation}
\label{simplified_discretized_exponential_P_product}
\sum_{\left\{ \phi(t) \right\} } \mathcal{R}_N[\phi] = \frac{Z_{\lambda(t_{\mbox{\tiny{fin}}})}}{Z_{\lambda(t_{\mbox{\tiny{in}}})}} \sum_{\phi(t_1)} \sum_{\phi(t_2)} \dots \sum_{\phi\left(t_{\mbox{\tiny{fin}}}-\tau\right)} \sum_{\phi(t_{\mbox{\tiny{fin}}})} \pi_{\lambda(t_{\mbox{\tiny{fin}}})}\left[ \phi(t_{\mbox{\tiny{fin}}}) \right] \prod_{n=1}^{N-1} P_{\lambda(t_{n+1})}\left[ \phi(t_{n+1}) \to \phi(t_n)\right].
\end{equation}
Repeating the same argument, eq.~(\ref{simplified_discretized_exponential_P_product}) can then be simplified using the fact that the only remaining dependence on $\phi(t_1)$ is in the $P_{\lambda(t_2)}\left[ \phi(t_2) \to \phi(t_1)\right]$ term, and so on. One arrives at
\begin{equation}
\label{almost_completely_simplified_discretized_exponential_P_product}
\sum_{\left\{ \phi(t) \right\} } \mathcal{R}_N[\phi] = \frac{Z_{\lambda(t_{\mbox{\tiny{fin}}})}}{Z_{\lambda(t_{\mbox{\tiny{in}}})}} \sum_{\phi(t_{\mbox{\tiny{fin}}})} \pi_{\lambda(t_{\mbox{\tiny{fin}}})}\left[ \phi(t_{\mbox{\tiny{fin}}}) \right].
\end{equation}
Finally, eq.~(\ref{Boltzmann_distribution_normalization}) implies that also the last sum yields one, so one gets
\begin{equation}
\label{almost_completely_simplified_discretized_exponential_P_product}
\sum_{\left\{ \phi(t) \right\} } \mathcal{R}_N[\phi] = \frac{Z_{\lambda(t_{\mbox{\tiny{fin}}})}}{Z_{\lambda(t_{\mbox{\tiny{in}}})}}.
\end{equation}
Recalling that, as we discussed above, in the large-$N$ limit $\mathcal{R}_N[\phi]$ equals the exponentiated work done on the system during the evolution from $t_{\mbox{\tiny{in}}}$ to $t_{\mbox{\tiny{fin}}}$, and writing $Z_{\lambda(t_{\mbox{\tiny{in}}})}$ and $Z_{\lambda(t_{\mbox{\tiny{fin}}})}$ in terms of the associated equilibrium free energies at the respective temperatures, eq.~(\ref{almost_completely_simplified_discretized_exponential_P_product}) yields the (generalized) Jarzynski relation:
\begin{equation}
\label{generalized_Jarzynski}
\left\langle \exp \left[ - \int \frac{\delta W}{T} \right] \right\rangle = \exp \left[ - \left( \frac{F_{\mbox{\tiny{fin}}}}{T_{\mbox{\tiny{fin}}}} - \frac{F_{\mbox{\tiny{in}}}}{T_{\mbox{\tiny{in}}}}\right)\right],
\end{equation}
where $\delta W$ denotes the work done on the system during an infinitesimal interval in the transformation from $t_{\mbox{\tiny{in}}}$ to $t_{\mbox{\tiny{fin}}}$, the integral is taken over all such intervals, and the average is taken over all possible realizations of this transformation.
In the particular case of a non-equilibrium transformation in which the temperature $T$ of the system is not varied, the latter expression can be written as~\cite{Jarzynski:1996ne}
\begin{equation}
\label{Jarzynski}
\left\langle \exp \left[ - \frac{W(t_{\mbox{\tiny{in}}},t_{\mbox{\tiny{fin}}})}{T} \right] \right\rangle = \exp \left( - \frac{F_{\mbox{\tiny{fin}}}-F_{\mbox{\tiny{in}}}}{T} \right),
\end{equation}
where $W(t_{\mbox{\tiny{in}}},t_{\mbox{\tiny{fin}}})$ denotes the total work done on the system during the transformation from $t_{\mbox{\tiny{in}}}$ to $t_{\mbox{\tiny{fin}}}$.
Before closing this section, we point out some important remarks.
First of all, as we discussed above, the evaluation of free-energy differences using Jarzynski's relation assumes $N \to \infty$ (with $t_{\mbox{\tiny{in}}}$ and $t_{\mbox{\tiny{fin}}}$ fixed and finite). In this limit, the time-discretization step $\tau$ becomes infinitesimally small, and from the continuity of $\lambda$ it follows that the $\pi_{\lambda(t_n)}$ and $\pi_{\lambda(t_{n+1})}$ distributions at all pairs of subsequent times become more and more overlapping. Correspondingly, in a Monte~Carlo simulation the aforementioned potential systematic effects related to the asymmetric r\^oles of $t_n$ and $t_{n+1}$ in the Markov evolution of a field configuration with transition probability $P_{\lambda(t_{n+1})}\left[ \phi(t_n) \to \phi(t_{n+1}) \right]$ depending on the parameter values at time $t=t_{n+1}$ (or, conversely, in the summands on the right-hand side of eq.~(\ref{discretized_exponential_work}), where the difference is evaluated by keeping the field configuration fixed to its value at $t=t_n$) are expected to vanish---an expectation which is indeed confirmed by our numerical results.
It is also instructive to discuss what happens in the opposite limit, i.e. for $N=1$. In this case, the calculation reduces to evaluating the exponential average of the work (in units of $T$) that is done on the system when its parameters are switched from $\lambda_{\mbox{\tiny{in}}}$ directly to $\lambda_{\mbox{\tiny{fin}}}$. In particular, according to the derivation above (in which the work done on the system is evaluated by computing the variation in energy on one of the configurations of the initial ensemble), one can realize that for $N=1$ the field configurations from the initial, equilibrium ensemble with parameters $\lambda_{\mbox{\tiny{in}}}$ are not ``evolved'' at all, and that the parameters of the system are instantaneously switched to their final values $\lambda_{\mbox{\tiny{fin}}}$ at $t=t_1=t_{\mbox{\tiny{fin}}}$: at this time, the work done on the system is calculated on the initial configuration, but then the configuration itself is not subject to any evolution, and, in particular, is not driven out of equilibrium at all. Interestingly, the exponential average of the work done on the system is exactly equal to $Z_{\lambda(t_{\mbox{\tiny{fin}}})}/Z_{\lambda(t_{\mbox{\tiny{in}}})}$ also in the $N=1$ case, as it was already pointed out in the first work in which Jarzynski's relation was derived~\cite{Jarzynski:1996ne}. In fact, the existence of a relation of this type has been known for a long time (see, e.g., ref.~\cite{Zwanzig:1954ht}), and does not involve any non-equilibrium evolution. From a lattice gauge theory point of view, in the $N=1$ case this calculation corresponds to computing the average value of the exponential of the difference in Euclidean action, that is induced by a change in the parameters characterizing the system; this average is performed in the starting ensemble, with partition function $Z_{\lambda(t_{\mbox{\tiny{in}}})}$. Using a terminology that may be more familiar among lattice practitioners, this can be recognized as a reweighting technique~\cite{Ferrenberg:1988yz, Barbour:1997bh, Fodor:2001au}. Although this method to compute the free-energy difference of the initial and final ensembles is in principle exact, its practical applications in Monte~Carlo simulations of lattice QCD (which necessarily involve finite configuration samples) is of very limited computational efficiency, being affected by dramatically large uncertainties when the configuration probability distributions of the simulated ($\pi_{\lambda(t_{\mbox{\tiny{in}}})}$) and target ($\pi_{\lambda(t_{\mbox{\tiny{fin}}})}$) ensembles are poorly overlapping. Such \emph{overlap problem} becomes more severe when the probability distributions are more sharply peaked (which is the case for systems with a large number of degrees of freedom---including, in particular, lattice gauge theories defined on large and fine lattices) and/or more widely separated in configuration space, so that the simulation of the ensemble specified by the parameters $\lambda(t_{\mbox{\tiny{in}}})$ samples only a very limited subset of the most likely configurations of the target ensemble.
What happens in the case when $N$ is finite and larger than one? In particular: in view of the previous observation, could one think that for finite $N>1$ the evaluation of the free-energy difference between the initial and the final ensemble by means of Jarzynski's relation is equivalent to a sequence of reweighting steps, at parameter values $\lambda(t_n)$, with $0 \le n < N$? The answer is no: a Monte~Carlo algorithm to compute the free-energy difference using Jarzynski's relation is crucially different from a combination of reweighting steps, because, in contrast to the former, the latter assumes that \emph{also} the field configurations at all later times $\phi(t_n)$, for $0 < n$, are drawn from equilibrium distributions. On the contrary, the sequence of field configurations produced during each trajectory in a numerical implementation of Jarzynski's relation are genuinely out of equilibrium: only the configurations at $t=t_{\mbox{\tiny{in}}}$ are drawn from an equilibrium distribution. As a consequence, there is no contradiction between the fact that the computation of the free-energy difference between two ensembles using Jarzynski's relation becomes exact only for \emph{infinite} $N$, and the fact that the same computation can also (at least in principle, i.e. neglecting the overlap problem mentioned above) be carried out exactly by reweighting the \emph{equilibrium} distributions defined at a \emph{finite} number of intermediate parameter values corresponding to $\lambda(t_n)$, with $0 \le n < N$. Similarly, there is no inconsistency in the fact that, using the algorithm based on Jarzynski's theorem for finite $N>1$, the results for $Z_{\lambda(t_{\mbox{\tiny{fin}}})}/Z_{\lambda(t_{\mbox{\tiny{in}}})}$ obtained from Monte~Carlo calculations in ``direct'' ($\lambda_{\mbox{\tiny{in}}} \to \lambda_{\mbox{\tiny{fin}}}$) and in ``reverse'' ($\lambda_{\mbox{\tiny{fin}}} \to \lambda_{\mbox{\tiny{in}}}$) evolutions of the system are not necessarily equal: they only have to agree in the large-$N$ limit---and, as our numerical results show, they do agree in that limit.
Note that these observations do not imply that a Monte~Carlo calculation of $Z_{\lambda(t_{\mbox{\tiny{fin}}})}/Z_{\lambda(t_{\mbox{\tiny{in}}})}$ using Jarzynski's relation, which requires $N$ to be large, is less efficient than one based on a combination of $N$ reweightings, which is exact for every value of $N$: on the contrary, the overhead of generating \emph{non-equilibrium} configurations at a larger number of intermediate values of the system parameters (whose computational cost grows like $O(N)$ and, for typical lattice gauge theory simulation algorithms, \emph{polynomially} in the number of degrees of freedom of the system), may be largely offset by the growth in statistics necessary for proper ensemble sampling in simulations using reweighting, which is \emph{exponential} in the number of degrees of freedom of the system~\cite{Gattringer:2016kco}.
For a given physical system, in Monte~Carlo simulations based on Jarzynski's relation, the optimal choice of $N$ and of the number $n_{\mbox{\tiny{r}}}$ of ``trajectories'' in configuration space (or ``realizations'' of the non-equilibrium evolution of the system) over which the averages appearing on the left-hand-side of eqs.~(\ref{generalized_Jarzynski}) and (\ref{Jarzynski}) are evaluated, is the one minimizing the total computational cost, for a desired maximum level of uncertainty on the numerical results. In general, determining the optimal values of $N$ and $n_{\mbox{\tiny{r}}}$ is non-trivial, as they depend strongly on the system under consideration (and, often, on the details of the Monte~Carlo simulation). During the past few years, some aspects of this problem have been addressed in detail in various works: see refs.~\cite{Jarzynski:2006re, Pohorille:2010gp, Rohwer:2014co, YungerHalpern:2016hm} and references therein.
Finally, note that the derivation of Jarzynski's relation does not rely on any strong assumption about the nature of the system, and can be applied to every system with a Hamiltonian bounded from below. As such, it can be directly applied to statistical systems describing lattice gauge theories in Euclidean space. In the following, we present two applications of Jarzynski's relation in lattice gauge theory, first in the computation of the interface free energy in a gauge theory in three dimensions, and then in the calculation of the equation of state in $\mathrm{SU}(2)$ Yang--Mills theory in $3+1$ Euclidean dimensions.
\section{Benchmark study I: The interface free energy}
\label{sec:interface}
As a first benchmark study, we apply Jarzynski's relation eq.~(\ref{Jarzynski}) for a computation of the free energy associated with a fluctuating interface in a lattice gauge theory in three dimensions. As mentioned in section~\ref{sec:introduction}, interfaces have important experimental realizations in condensed-matter physics and in various other branches of science~\cite{Gelfand:1990fse, Privman:1992zv}. Moreover, they are also interesting for high-energy physics, as they can be related to the world-sheets spanned by flux tubes in confining gauge theories. Because of quantum fluctuations, the energy stored in a confining flux tube has a non-trivial dependence on its length~\cite{Luscher:1980fr, Luscher:1980ac}, which can be systematically studied in the framework of an effective theory~\cite{Aharony:2013ipa} and investigated numerically in lattice simulations (see refs.~\cite{Kuti:2005xg, Teper:2009uf, Panero:2012qx, Lucini:2012gg} for reviews). In particular, the effective action that describes the dynamics of flux tubes joining static color sources may include non-trivial terms associated with the boundaries of the string world-sheet~\cite{Aharony:2010cx, Aharony:2010db}. A possible way to disentangle the effect of these boundary contributions to the effective string action consists in studying closed string world-sheets, like those describing the evolution of a torelon (a flux loop winding around a spatial size of a finite system) over compactified Euclidean time: in that case the string world-sheet has the topology of a torus, and can be interpreted as a fluctuating interface. A closely related setup is relevant for the study of maximal 't~Hooft loops~\cite{'tHooft:1977hy, Srednicki:1980gb}.
The simplest lattice gauge theory, in which one can carry out a high-precision numerical Monte~Carlo study of interfaces, is the $\mathbb{Z}_2$ gauge model in three Euclidean dimensions, whose degrees of freedom are $\sigma_\mu(x)$ variables (taking values $\pm 1$) defined on the bonds between nearest-neighbor sites of a cubic lattice $\Lambda$ of spacing $a$. Following ref.~\cite{Caselle:2005vq}, we take the Euclidean action of the model to be the Wilson action~\cite{Wilson:1974sk}
\begin{equation}
S_{\mathbb{Z}_2} = - \beta_{\mbox{\tiny{g}}} \sum_{x \in \Lambda} \sum_{0 \le \mu < \nu \le 2} \sigma_\mu(x) \sigma_\nu(x+a\hat{\mu}) \sigma_\mu(x+a\hat{\nu}) \sigma_\nu(x)
\end{equation}
(where $\beta_{\mbox{\tiny{g}}}$ denotes the Wilson parameter for the $\mathbb{Z}_2$ gauge theory); it is trivial to verify that the model enjoys invariance under local $\mathbb{Z}_2$ transformations, that flip the sign of the $\sigma_\mu(x)$ link variables touching a given site. The partition function of the model reads
\begin{equation}
Z_{\mathbb{Z}_2} = \sum_{ \left\{ \sigma_\mu(x) = \pm 1 \right\} } \exp\left( -S_{\mathbb{Z}_2}\right).
\end{equation}
For small values of $\beta_{\mbox{\tiny{g}}}$ this model has a confining phase, which terminates at a second-order phase transition at $\beta_{\mbox{\tiny{g}}} = 0.76141346(6)$~\cite{Deng:2003wv}.
$Z_{\mathbb{Z}_2}$ can be exactly rewritten as the partition function of the three-dimensional Ising model~\cite{Kramers:1941kn, Wegner:1984qt}, whose degrees of freedom are $\mathbb{Z}_2$ variables $s_x$ defined on the sites of a dual cubic lattice $\widetilde{\Lambda}$, and whose Hamiltonian reads
\begin{equation}
H = - \beta \sum_{x \in \widetilde{\Lambda}} \sum_{0 \le \mu \le 2} J_{x,\mu} s_x s_{x+a\hat{\mu}},
\end{equation}
where $J_{x,\mu}=1$ corresponds to ferromagnetic couplings, while $J_{x,\mu}=-1$ would yield antiferromagnetic couplings, and $\beta$ and $\beta_{\mbox{\tiny{g}}}$ are related to each other by
\begin{equation}
\label{symmetric_beta_betagauge_relation}
\sinh(2\beta)\sinh(2\beta_{\mbox{\tiny{g}}})=1.
\end{equation}
Note that, since $\sinh(2x)$ is a strictly increasing function, eq.~(\ref{symmetric_beta_betagauge_relation}) implies that the confining regime of the gauge theory (at small $\beta_{\mbox{\tiny{g}}}$) corresponds to the ordered phase of the Ising model (at large $\beta$). Eq.~(\ref{symmetric_beta_betagauge_relation}) can be rewritten as
\begin{equation}
\label{beta_betagauge_relation}
\beta=-\frac{1}{2} \ln \tanh \beta_{\mbox{\tiny{g}}}.
\end{equation}
Note that on a finite lattice, denoting the number of sites along the direction $\mu$ as $N_\mu$ and defining the site coordinates (in units of the lattice spacing) modulo $N_\mu$, one can impose periodic boundary conditions by setting all $J_{x,\mu}=1$, whereas antiperiodic boundary conditions in the direction $\mu$ can be imposed setting $J_{x,\mu}=-1$ only for the couplings between a spin in the first and a spin in the last lattice slice in direction $\mu$, i.e. $J_{x,\mu}=-1$ when $x_\mu/a=N_\mu-1$: in that case, a frustration is induced in the system, and an interface separating domains of opposite magnetization is formed. Finally, the choice $J_{x,\mu}=0$ for those bonds corresponds to decoupling the spins in the last lattice slice in direction $\mu$ from those in the first.
Thus, the ratio of the partition function with antiperiodic boundary conditions in one direction ($Z_{\mbox{\tiny{a}}}$) over the one with periodic boundary conditions in all directions ($Z_{\mbox{\tiny{p}}}$) is directly related to the expectation value of an interface separating domains of different magnetizations. More precisely, if $N_0$ denotes the lattice size (in units of the lattice spacing $a$) in the direction in which antiperiodic boundary conditions are imposed, one can introduce a first definition of the interface free energy $F^{(1)}$ from
\begin{equation}
\label{f1_defining_relation}
\frac{Z_{\mbox{\tiny{a}}}}{Z_{\mbox{\tiny{p}}}} = N_0 \exp\left( - F^{(1)} \right)
\end{equation}
(where the $N_0$ factor on the right-hand side accounts for the fact that the interface can be located anywhere along the direction in which antiperiodic boundary conditions are imposed), namely
\begin{equation}
\label{f1}
F^{(1)} = -\ln\left(\frac{Z_{\mbox{\tiny{a}}}}{Z_{\mbox{\tiny{p}}}}\right) + \ln N_0.
\end{equation}
Note that here $F^{(1)}$ is defined as a dimensionless quantity. For a system of sufficiently large transverse cross-section (i.e. when the sizes $L_1$ and $L_2$ in the directions normal to the one in which antiperiodic boundary conditions are imposed are large), $F^{(1)}$ is expected to be proportional to $L_1 L_2$, with a positive proportionality coefficient. As a consequence, the expectation value of large interfaces is exponentially suppressed with their area, and one can assume that only one ``large'' interface (i.e. one extending through a whole cross-section of the system) is formed in the presence of antiperiodic boundary conditions---whereas no large interfaces are formed in the system with periodic boundary conditions. For a finite-size system, however, one can also consider the case of multiple large interfaces (in particular: an odd number of them for antiperiodic boundary conditions in one direction, and an even number of them for periodic boundary conditions). As discussed in ref.~\cite{Caselle:2007yc}, under the assumption that these interfaces are indistinguishable, dilute and non-interacting, one can derive an improved definition of the dimensionless interface free energy:
\begin{equation}
\label{f2}
F^{(2)} = -\ln \arctanh \left( \frac{Z_{\mbox{\tiny{a}}}}{Z_{\mbox{\tiny{p}}}} \right) + \ln N_0.
\end{equation}
Note that $F^{(2)}$ tends to $F^{(1)}$ when $Z_{\mbox{\tiny{a}}} \ll Z_{\mbox{\tiny{p}}}$.
These definitions show that the dimensionless interface free energy can be evaluated in a numerical simulation, by computing the $Z_{\mbox{\tiny{a}}}/Z_{\mbox{\tiny{p}}}$ ratio. As discussed above, $Z_{\mbox{\tiny{a}}}$ and $Z_{\mbox{\tiny{p}}}$ can be interpreted as the partition functions of two systems that differ by the value of the $J_{x,\mu}$ couplings in one direction, that we have assumed to be the one labelled by $0$, on one slice (say, the one corresponding to $x_0=N_0-1$): $Z_{\mbox{\tiny{a}}}$ is the partition function of the Ising spin system in which those couplings are set to $-1$ (while $J_{x,\mu}=1$ for $\mu \neq 0$ or for $x_0 \neq N_0-1$), whereas $Z_{\mbox{\tiny{p}}}$ is the partition function of the Ising spin system in which all couplings are ferromagnetic ($J_{x,\mu}=1$ for all $\mu$ and for all $x$). One can thus evaluate the $Z_{\mbox{\tiny{a}}}/Z_{\mbox{\tiny{p}}}$ ratio by applying Jarzynski's relation eq.~(\ref{Jarzynski}), identifying the $J$ couplings on the $\mu=0$ bonds from the sites in the $x_0=N_0-1$ slice of the system as the $\lambda$ parameters to be varied as a function of Monte~Carlo time $t$. In particular, one can let those couplings vary linearly with time, interpolating from $J=1$ at $t=t_{\mbox{\tiny{in}}}$ to $J=-1$ at $t=t_{\mbox{\tiny{fin}}}$,
\begin{equation}
\label{J_evolution}
\lambda\left(t_{\mbox{\tiny{in}}} + n\tau \right) = J_{(N_0-1,x_1,x_2),0} \left( t_{\mbox{\tiny{in}}} + n\tau \right)= 1 - \frac{2n}{N}, \qquad \mbox{with}~\tau=\frac{t_{\mbox{\tiny{fin}}}-t_{\mbox{\tiny{in}}}}{N},
\end{equation}
for $~n \in \left\{ 0, 1, \dots , N \right\}$, or vice~versa. A similar application of Jarzynski's relation was used in the study of the Ising model in two dimensions~\cite{condmat0602580, Chatelain:2007ts, Hijar2007}.
It is worth remarking that parallelization (as well as other standard algorithmic techniques for spin systems, like multi-spin coding) is straightforward to implement in a computation of the free energy based on Jarzynski's relation.
We carried out a set of Monte~Carlo calculations of the interface free energy using this method (with $N=10^6$ and averaging over $n_{\mbox{\tiny{r}}}=10^3$ realizations of the discretized non-equilibrium transformation), at the parameters used in the study reported in ref.~\cite{Caselle:2007yc}, finding perfect agreement with the results of that study. We also observed that the exponential work averages corresponding to a ``direct'' (from $Z_{\mbox{\tiny{p}}}$ to $Z_{\mbox{\tiny{a}}}$) or a ``reverse'' (from $Z_{\mbox{\tiny{a}}}$ to $Z_{\mbox{\tiny{p}}}$) parameter switch converge to the same results, and that the latter are independent of the $\lambda(t)$ parametrization at large $N$.
This can be clearly seen in tables~\ref{tab:96_48_64}, \ref{tab:96_24_64} and \ref{tab:96_32_32}, where we report results for the interface free energies in the three-dimensional $\mathbb{Z}_2$ gauge model at $\beta_{\mbox{\tiny{g}}}=0.758264$, obtained from Monte~Carlo simulations of the Ising model at $\beta=0.223102$. These tables show that the free-energy estimates obtained from a ``direct'' and a ``reverse'' realization of the non-equilibrium transformation from $Z_{\mbox{\tiny{p}}}$ to $Z_{\mbox{\tiny{a}}}$ converge to the same value (which is consistent with earlier calculations carried out by different methods~\cite{Caselle:2007yc}), when the discretization of the parameter evolution involved in the non-equilibrium transformation is carried out with a sufficient number of points. The results obtained from simulations on a lattice of sizes $L_0=96a$, $L_1=24a$ and $L_2=64a$ are also displayed in fig.~\ref{fig:96_24_64}.
\begin{table}[!htb]
\centering
\begin{tabular}{|c||c|c||c|c|}
\hline
$N$ & $n_{\mbox{\tiny{r}}}$ & $F^{(1)}$, direct & $n_{\mbox{\tiny{r}}}$ & $F^{(1)}$, reverse \\
\hline
$10^{3}$ & $64 \cdot 320$ & $11.25(13)$ & $ 64 \cdot 80 $ & $12.19(11) $ \\
$5 \cdot 10^{3}$ & $64 \cdot 320$ & $11.23(8) $ & $ 64 \cdot 80 $ & $11.52(4) $ \\
$10^{4}$ & $64 \cdot 320$ & $11.33(5) $ & $ 64 \cdot 80 $ & $11.41(3) $ \\
$5 \cdot 10^{4}$ & $64 \cdot 80 $ & $11.25(3) $ & $ 64 \cdot 80 $ & $11.33(2) $ \\
$10^{5}$ & $64 \cdot 80 $ & $11.29(2) $ & $ 64 \cdot 80 $ & $11.32(1) $ \\
\hline
\end{tabular}
\caption{Results for the interface free energy defined in eq.~(\ref{f1}) from ``direct'' and ``reverse'' realizations of the non-equilibrium parameter transformation from periodic to antiperiodic boundary conditions in the $\mu=0$ direction, on a lattice with $N_0=96$, $N_1=48$, $N_2=64$, at $\beta=0.223102$ (i.e. at $\beta_{\mbox{\tiny{g}}}=0.758264$), and for a different number $N$ of intervals used to discretize the temporal evolution of $\lambda$. $n_{\mbox{\tiny{r}}}$ is the statistics used in the average over non-equilibrium processes. The interface free energy evaluated in ref.~\cite{Caselle:2007yc} for these parameters is $F^{(1)} = 11.3138(25)$.\label{tab:96_48_64}}
\end{table}
\begin{table}[!htb]
\centering
\begin{tabular}{|c||c|c||c|c|}
\hline
$N$ & $n_{\mbox{\tiny{r}}}$ & $F^{(1)}$, direct & $n_{\mbox{\tiny{r}}}$ & $F^{(1)}$, reverse \\
\hline
$10^{3}$ & $ 64 \cdot 320 $ & $ 6.27(20) $ & $ 64 \cdot 80 $ & $ 7.241(67) $ \\
$5 \cdot 10^{3}$ & $ 64 \cdot 320 $ & $ 6.794(20) $ & $ 64 \cdot 80 $ & $ 6.996(24) $ \\
$10^{4}$ & $ 64 \cdot 320 $ & $ 6.845(12) $ & $ 64 \cdot 80 $ & $ 6.941(17) $ \\
$5 \cdot 10^{4}$ & $ 64 \cdot 80 $ & $ 6.888(8) $ & $ 64 \cdot 80 $ & $ 6.893(8) $ \\
$ 10^{5}$ & $ 64 \cdot 80 $ & $ 6.881(6) $ & $ 64 \cdot 80 $ & $ 6.892(5) $ \\
\hline
\end{tabular}
\caption{Same as in table~\ref{tab:96_48_64}, but for $N_0=96$, $N_1=24$, $N_2=64$. The reference value of the interface free energy at these parameters, taken from ref.~\cite{Caselle:2007yc}, is $F^{(1)}=6.8887(20)$. The results listed in this table are also plotted in fig.~\ref{fig:96_24_64}.\label{tab:96_24_64}}
\end{table}
\begin{table}[!htb]
\centering
\begin{tabular}{|c||c|c||c|c|}
\hline
$N$ & $n_{\mbox{\tiny{r}}}$ & $F^{(1)}$, direct & $n_{\mbox{\tiny{r}}}$ & $F^{(1)}$, reverse \\
\hline
$10^{3}$ & $64 \cdot 80$ & $5.68(7) $ & $64 \cdot 80$ & $6.32(6) $ \\
$10^{4}$ & $64 \cdot 80$ & $5.943(14)$ & $64 \cdot 80$ & $6.018(13)$ \\
$10^{5}$ & $64 \cdot 80$ & $5.979(4) $ & $64 \cdot 80$ & $5.982(4) $ \\
\hline
\end{tabular}
\caption{Same as in table~\ref{tab:96_48_64}, but for square interfaces with $N_0=96$, $N_1=N_2=32$.\label{tab:96_32_32}}
\end{table}
\begin{figure}[!htpb]
\centerline{\includegraphics[width=0.9\textwidth]{96_24_64.pdf}}
\caption{(Color online) Convergence of our results for the interface free energy---defined according to eq.~(\ref{f1})---obtained in direct (blue bullets) and reverse (red triangles) transformations from $Z_{\mbox{\tiny{p}}}$ to $Z_{\mbox{\tiny{a}}}$ in Monte~Carlo simulations at $\beta=0.223102$ (corresponding to $\beta_{\mbox{\tiny{g}}}=0.758264$) on a lattice of sizes $L_0=96a$, $L_1=24a$, $L_2=64a$. The green band denotes the value of the interface free energy determined in ref.~\cite{Caselle:2007yc} for these values of the parameters, and with a different method. $N$ is the number of intervals used to discretize the temporal evolution of the parameter by which the boundary conditions of the system in direction $\mu=0$ are switched from periodic to antiperiodic, according to eq.~(\ref{J_evolution}).}
\label{fig:96_24_64}
\end{figure}
It is interesting to study how our determination of the interface free energy using Jarzynski's relation compares with those based on different techniques. A state-of-the-art example of the latter was reported in ref.~\cite{1401.7870}, using the so-called ``ensemble-switch'' method. Carrying out some numerical tests, we found that the computational efficiency of the two algorithms is similar. In general, the structure of the ensemble-switch algorithm makes it more demanding in terms of CPU time. On the other hand, we observed that the algorithm based on Jarzynski's relation typically leads to results affected by somewhat larger intrinsic fluctuations. An important difference between the ensemble-switch algorithm and ours is that, in contrast to the former, the latter can be parallelized in a more straightforward way. For large $N$, our algorithm has a similar efficiency as (and in some cases even outperforms) the ensemble-switch algorithm.
Having verified the convergence of the interface free energy estimates from our algorithm based Jarzynski's relation (for non-equilibrium transformations from one ensemble to the other, in both directions), we report some results from simulations on lattices of different sizes in tables~\ref{tab:96_xx_xx_beta0223102}, \ref{tab:96_xx_32_beta0223102}, \ref{tab:96_xx_48_beta0223102}, \ref{tab:96_xx_64_beta0223102}, \ref{tab:96_xx_80_beta0223102} and \ref{tab:96_xx_96_beta0223102} (from simulations at $\beta=0.223102$) and in table~\ref{tab:96_xx_64_beta0226102} (from simulations at $\beta=0.226102$).
\begin{table}[!htb]
\centering
\begin{tabular}{|c|c|c|}
\hline
$N_1=N_2$ & $F^{(1)} $ & $F^{(2)}$ \\
\hline
$18$ & $4.61969(21)$ & $3.9800(9)$ \\
$20$ & $4.68520(24)$ & $4.2252(6)$ \\
$22$ & $4.79156(32)$ & $4.4785(5)$ \\
$24$ & $4.94312(34)$ & $4.7412(5)$ \\
$28$ & $5.3850(5)$ & $5.3143(5)$ \\
$32$ & $5.9785(6)$ & $5.9583(6)$ \\
$36$ & $6.6849(7)$ & $6.6801(7)$ \\
$40$ & $7.4819(9)$ & $7.4809(9)$ \\
$44$ & $8.3653(12)$ & $8.3652(11)$ \\
$48$ & $9.3318(15)$ & $9.3318(13)$ \\
\hline
\end{tabular}
\caption{Interface free energies---evaluated according to eq.~(\ref{f1}) and to eq.~(\ref{f2}), and respectively reported in the second and in the third column---obtained from simulations at $\beta=0.223102$ (corresponding to $\beta_{\mbox{\tiny{g}}}=0.758264$) on lattices of square cross-section with $N_0=96$ and for different values of $N_1=N_2$ (first column). For a comparison, the corresponding values obtained in ref.~\cite{Caselle:2007yc} at the same $\beta$ and for $N_0=96$, $N_1=N_2=40$, are $F^{(1)}=F^{(2)}=7.481(1)$.}
\label{tab:96_xx_xx_beta0223102}
\end{table}
\begin{table}[!htb]
\centering
\begin{tabular}{|c|c|c|}
\hline
$N_1$ & $F^{(1)} $ & $F^{(2)}$ \\
\hline
$22$ & $5.1677(4)$ & $5.0520(5)$ \\
$24$ & $5.3257(5)$ & $5.2450(5)$ \\
$26$ & $5.4868(5)$ & $5.4301(6)$ \\
$28$ & $5.6503(6)$ & $5.6103(7)$ \\
\hline
\end{tabular}
\caption{Interface free energies evaluated according to eq.~(\ref{f1}) and to eq.~(\ref{f2}) (second and third column) obtained from simulations at $\beta=0.223102$ (i.e. for $\beta_{\mbox{\tiny{g}}}=0.758264$) on lattices with $N_0=96$ and rectangular cross-section, for different values of $N_1$ (first column) at $N_2=32$.}
\label{tab:96_xx_32_beta0223102}
\end{table}
\begin{table}[!htb]
\centering
\begin{tabular}{|c|c|c|}
\hline
$N_1$ & $F^{(1)} $ & $F^{(2)}$ \\
\hline
$22$ & $5.8304(5)$ & $5.8030(6)$ \\
$24$ & $6.1238(5)$ & $6.1088(6)$ \\
$28$ & $6.6984(8)$ & $6.6937(8)$ \\
$32$ & $7.2520(9)$ & $7.2504(9)$ \\
$36$ & $7.7876(11)$ & $7.7871(11)$ \\
$40$ & $8.3142(15)$ & $8.3140(15)$ \\
$44$ & $8.8255(16)$ & $8.8255(16)$ \\
\hline
\end{tabular}
\caption{Same as in table~\ref{tab:96_xx_32_beta0223102}, but from simulations on lattices with $N_0=96$ and $N_2=48$.}
\label{tab:96_xx_48_beta0223102}
\end{table}
\begin{table}[!htb]
\centering
\begin{tabular}{|c|c|c|}
\hline
$N_1$ & $F^{(1)} $ & $F^{(2)}$ \\
\hline
$18$ & $5.6068(6)$ & $5.5629(5)$ \\
$20$ & $6.0369(6)$ & $6.0190(6)$ \\
$22$ & $6.4676(7)$ & $6.4601(7)$ \\
$24$ & $6.8868(8)$ & $6.8836(8)$ \\
\hline
\end{tabular}
\caption{Same as in table~\ref{tab:96_xx_32_beta0223102}, but from simulations on lattices with $N_0=96$ and $N_2=64$. The results obtained in ref.~\cite{Caselle:2007yc}
at this $\beta$ and for $N_0=96$, $N_1=24$, $N_2=64$, are $F^{(1)}=6.889(2)$ and $F^{(2)}=6.886(2)$.}
\label{tab:96_xx_64_beta0223102}
\end{table}
\begin{table}[!htb]
\centering
\begin{tabular}{|c|c|c|}
\hline
$N_1$ & $F^{(1)} $ & $F^{(2)}$ \\
\hline
$18$ & $5.9318(6)$ & $5.9095(6) $ \\
$20$ & $6.5018(7)$ & $6.4948(7) $ \\
$22$ & $7.0654(8)$ & $7.0631(8) $ \\
$24$ & $7.6140(9)$ & $7.6132(9) $ \\
$26$ & $8.1412(11)$ & $8.1410(11)$ \\
$28$ & $8.6550(15)$ & $8.6549(13)$ \\
$32$ & $9.6341(17)$ & $9.6341(17)$ \\
$36$ & $10.5758(20)$ & $10.5758(20)$ \\
\hline
\end{tabular}
\caption{Same as in table~\ref{tab:96_xx_32_beta0223102}, but from simulations on lattices with $N_0=96$ and $N_2=80$.}
\label{tab:96_xx_80_beta0223102}
\end{table}
\begin{table}[!htb]
\centering
\begin{tabular}{|c|c|c|}
\hline
$N_1$ & $F^{(1)} $ & $F^{(2)}$ \\
\hline
$18$ & $6.2314(7)$ & $6.2193(7)$ \\
$20$ & $6.9412(8)$ & $6.9383(8)$ \\
$22$ & $7.6392(9)$ & $7.6385(9)$ \\
$24$ & $8.3137(12)$ & $8.3135(10)$ \\
$26$ & $8.9583(12)$ & $8.9583(12)$ \\
$28$ & $9.5840(17)$ & $9.5840(17)$ \\
$32$ & $10.7834(20)$ & $10.7834(20)$ \\
\hline
\end{tabular}
\caption{Same as in table~\ref{tab:96_xx_32_beta0223102}, but from simulations on lattices with $N_0=N_2=96$.}
\label{tab:96_xx_96_beta0223102}
\end{table}
\begin{table}[!htb]
\centering
\begin{tabular}{|c|c|}
\hline
$N_1$ & $F^{(2)}$ \\
\hline
$18$ & $13.9858(24)$ \\
$20$ & $15.4881(29)$ \\
$22$ & $16.9667(31)$ \\
$24$ & $18.4127(34)$ \\
\hline
\end{tabular}
\caption{Interface free energy (second column), defined according to eq.~(\ref{f2}), from simulations at $\beta=0.226102$ (corresponding to $\beta_{\mbox{\tiny{g}}}=0.751805$) on lattices with $N_0=96$ and $N_2=64$, for various values of $N_1$ (first column). The result reported in ref.~\cite{Caselle:2007yc} at this $\beta$, for $N_0=96$, $N_1=24$, and $N_2=64$, is $F^{(2)}=18.4131(26)$.}
\label{tab:96_xx_64_beta0226102}
\end{table}
These high-precision results can be directly compared with an effective theory, describing the transverse fluctuations of the interface at low energies. In direct analogy with the effective description of the world-sheets associated with fluctuating, string-like flux tubes in confining gauge theories~\cite{Kuti:2005xg}, or with solitonic strings in Abelian Higgs models~\cite{Abrikosov:1956sx, Nielsen:1973cs}, this effective theory must be consistent with the Lorentz--Poincar\'e symmetries of the space in which the interface is defined~\cite{Aharony:2009gg} (see also ref.~\cite{Meyer:2006qx}). This condition puts strong constraints on the coefficients of the possible terms appearing in the effective action of the theory, making the latter very predictive: in particular, one finds that, on sufficiently long distances, the dynamics can be approximated very well by assuming that the possible ``configurations'' of the fluctuating interface occur with a Boltzmann weight $\exp(-S_{\mbox{\tiny{eff}}})$, in which $S_{\mbox{\tiny{eff}}}$ is proportional to the \emph{area} of the interface itself, i.e. the effective action tends to the Nambu--Got\={o} action~\cite{Goto:1971ce, Nambu:1974zg}
\begin{equation}
\label{Nambu-Goto_action}
S_{\mbox{\tiny{eff}}} \simeq \sigma \int {\rm{d}}^2 \xi \sqrt{\det g_{\alpha\beta}},
\end{equation}
where $\xi$ are coordinates parametrizing the interface surface, while $g_{\alpha\beta}$ is the metric induced by the embedding of the interface in the target space, while $\sigma$ can be thought of as the tension associated with the interface, in the classical limit. As discussed in ref.~\cite{Aharony:2009gg}, the actual form of the effective action deviates from the expression on the right-hand side of eq.~(\ref{Nambu-Goto_action}) by terms which, for the problem of interest (a closed interface of linear size denoted as $L$, in a three-dimensional space) scale at least with the seventh inverse power of $L$.
The partition function associated with an interface described by the Nambu--Got\={o} effective action in eq.~(\ref{Nambu-Goto_action}) has been calculated analytically in ref.~\cite{Billo:2006zg}: for a system in $D$ spacetime dimensions, this computation predicts
\begin{equation}
\label{interface_partition_function}
\frac{Z_{\mbox{\tiny{a}}}}{Z_{\mbox{\tiny{p}}}} = 2 \mathcal{C} \left( \frac{\sigma}{2\pi} \right)^{\frac{D-2}{2}}\, V_{\mbox{\tiny{T}}} \, \sqrt{\sigma L_1 L_2 u}
\sum_{k=0}^\infty \sum_{k'=0}^\infty c_k c_{k'}
\left(\frac{\mathcal{E}_{k,k'}}{u}\right)^{\frac{D-1}{2}}\, K_{\frac{D-1}{2}} \left(\sigma L_1 L_2 \mathcal{E}_{k,k'}\right) = \mathcal{C} \mathcal{I},
\end{equation}
where $u=L_2/L_1$, $V_{\mbox{\tiny{T}}}$ denotes the ``volume'' of the system along the dimensions transverse to the interface (so $V_{\mbox{\tiny{T}}}=L_0$ in our case), $K_\nu(z)$ denotes the modified Bessel function of the second kind of order $\nu$ and argument $z$, while $c_k$ and $c_{k'}$ are coefficients appearing in the expansion of an inverse power of Dedekind's $\eta$ function:
\begin{equation}
\frac{1}{\eta\left( i u \right)^{D-2}} = \sum_{k=0}^{\infty}c_k q^{k-\frac{D-2}{24}},\qquad \mbox{with}\;\; q=\exp\left( -2\pi u \right)
\end{equation}
(so that, for the $D=3$ case, $c_k$ equals the number of partitions of $k$) and
\begin{equation}
\label{string_energies}
\mathcal{E}_{k,k'} = \sqrt{ 1 + \frac{4\pi\, u}{\sigma L_1 L_2 }\left(k+k'-\frac{D-2}{12}\right) + \left[\frac{2\pi u (k-k')}{\sigma L_1 L_2 }\right]^2}.
\end{equation}
Finally, $\mathcal{C}$ is an undetermined, non-universal multiplicative constant, which is not predicted by the effective bosonic-string model (and, following the notations of ref.~\cite{Billo:2006zg}, in the last term of eq.~(\ref{interface_partition_function}) we define the ratio of $Z_{\mbox{\tiny{a}}}/Z_{\mbox{\tiny{p}}}$ over $\mathcal{C}$ as $\mathcal{I}$). Similarly, the model does not predict the value of the multiplicative constant involved in the partition function associated with one (or more) static color source(s): see refs.~\cite{Mykkanen:2012ri, Mykkanen:2012dv} for a discussion. These aspects are related to the fact that the bosonic-string model is a low-energy effective theory, which cannot capture non-universal terms whose origin involves ultraviolet dynamics.
The accuracy of this effective theory depends on the dimensionless parameter $1/(\sigma L_1 L_2)$: when this parameter is small, the bosonic-string model is expected to provide a good description of the interface free energy.
Given that the algorithm based on Jarzynski's relation allows one to reach high numerical precision, it is particularly interesting to compare our results for the interface free energy with the predictions from the effective string model, trying to identify deviations from the terms predicted by a Nambu--Got\={o} action. To this purpose, we analyzed the results obtained at $\beta=0.223102$ expressing all dimensionful quantities in units of the interface tension $\sigma$: as determined in ref.~\cite{Caselle:2007yc}, at this value of $\beta$, one has $\sigma a^2 = 0.0026083(6)(7)$. Note that this implies that the lattice spacing is quite small, so discretization effects should be under control.
The first step in this analysis consists in subtracting the Nambu--Got\={o} prediction for the free energy, obtained from the logarithm of the r.h.s. of the first equality in eq.~(\ref{interface_partition_function}), from our data. Since eq.~(\ref{interface_partition_function}) predicts the $Z_{\mbox{\tiny{a}}}/Z_{\mbox{\tiny{p}}}$ ratio only up to the undetermined multiplicative constant $\mathcal{C}$, it predicts the interface free energy only up to an additive term $q=-\ln\mathcal{C}$. Like $\mathcal{C}$, $q$ depends only on the ultraviolet details of the theory, namely it can depend on the lattice spacing $a$ (or, equivalently, on $\beta$), but not on the lattice sizes. At each $\beta$, the value of $q$ can be fixed, by observing that the corrections to the Nambu--Got\={o} prediction are expected to become negligible for sufficiently large interfaces, i.e. for $\sigma L_1 L_2 \gg 1$. To this purpose, for each combination of values of $\sigma a^2$ and lattice sizes, we define our numerical estimate of the free energy ($F_{\mbox{\tiny{num}}}$) according to eq.~(\ref{f1}), using the results of our Monte~Carlo simulations for the $Z_{\mbox{\tiny{a}}}/Z_{\mbox{\tiny{p}}}$ ratio. Then, for the same combination of $\sigma a^2$ and lattice sizes, we compute the quantity $\mathcal{I}$ appearing in eq.~(\ref{interface_partition_function}), and we define a quantity (denoted as $F_{\mathcal{I}}$) using $\mathcal{I}$ in place of the $Z_{\mbox{\tiny{a}}}/Z_{\mbox{\tiny{p}}}$ ratio in eq.~(\ref{f2}). It is easy to see that $q$ can be obtained from
\begin{equation}
\label{q_definition}
q = \lim_{\sigma L_1 L_2 \to \infty} \left( F_{\mbox{\tiny{num}}} - F_{\mathcal{I}} \right)
\end{equation}
(note that, when $ \sigma L_1 L_2$ is large, the $Z_{\mbox{\tiny{a}}}/Z_{\mbox{\tiny{p}}}$ ratio tends to zero, and, as discussed above, the free-energy definitions given by eqs.~(\ref{f1}) and (\ref{f2}) become equivalent). For every value of $\sigma a^2$, when $\sigma L_1 L_2$ becomes large our results for the $F_{\mbox{\tiny{num}}}-F_{\mathcal{I}}$ difference tend, indeed, to a constant, and can be fitted to $q=0.9168(5)$.
Then, we study the deviations of our Monte~Carlo results from the Nambu--Got\={o} predictions (for each value of $\beta$, and for each combination of lattice sizes), by defining the difference
\begin{equation}
\label{y_definition}
y = F_{\mbox{\tiny{num}}} - F_{\mathcal{I}} - q.
\end{equation}
This quantity depends on the interface sizes $L_1$ and $L_2$, and encodes the contributions to the free energy from terms appearing in the effective string action, that do not arise from in a low-energy expansion of the Nambu--Got\={o} action (and/or from possible systematic effects, related for example to the finiteness of the lattice spacing; however, previous studies indicate that the latter should be very modest for $\beta$ values in the range under consideration here---see, for example, ref.~\cite{Caselle:2005vq} and references therein). For each set at fixed $L_2 > 32a$, these data can be successfully fitted to the form expected for the leading and next-to-leading corrections to the Nambu--Got\={o} model, which, according to the discussion in ref.~\cite{Aharony:2013ipa}, scale with the seventh and with the ninth inverse power of the $L_1$ length scale:\footnote{The fact that, in three spacetime dimensions, the leading correction to the Nambu--Got\={o} model scales at least with the seventh inverse power of the length scale of the system has been recently observed also in lattice simulations of $\mathrm{SU}(N)$ gauge theories~\cite{Athenodorou:2016kpd}.}
\begin{equation}
\label{corrections_to_NG}
y = \frac{1}{\left( L_1 \sqrt{\sigma} \right)^{7}} \left[ k_{-7} + \frac{k_{-9}}{\left( L_1 \sqrt{\sigma} \right)^{2}} \right].
\end{equation}
Note that, for an interface in $D=3$ dimensions, the effective-string arguments indicate that additional subleading corrections, not included in the expression on the right-hand side of eq.~(\ref{corrections_to_NG}), are expected to be $O\left( (L_1 \sqrt{\sigma} )^{-11} \right)$, i.e. to be suppressed by at least one further factor of $1/(L_1^2 \sigma)$. The results of these fits are reported in table~\ref{tab:corrections_to_NG_fit}, where $\chi^2_{\tiny\mbox{red}}$ denotes the reduced $\chi^2$ obtained in the fit, i.e. the ratio of the $\chi^2$ over the number of degrees of freedom.
\begin{table}[!htb]
\centering
\begin{tabular}{|c|c|c|c|}
\hline
$N_2$ & $k_{-7}$ & $k_{-9}$ & $\chi^2_{\tiny\mbox{red}}$ \\
\hline
$48$ & $0.389(1)$ & $0.03(3)$ & $1.09$ \\
$64$ & $0.432(2)$ & $0.22(3)$ & $1.06$ \\
$80$ & $0.593(2)$ & $0.25(3)$ & $1.47$ \\
$96$ & $0.650(5)$ & $0.410(7)$ & $0.07$ \\
\hline
\end{tabular}
\caption{Results of our fits of the difference between our numerical results for the interface free energy and the corresponding Nambu--Got\={o} prediction, as defined in the text, to eq.~(\ref{corrections_to_NG}).}
\label{tab:corrections_to_NG_fit}
\end{table}
We also observed that a single inverse-power (of $L_1 \sqrt{\sigma}$) correction is not sufficient to describe our data. When we tried to set $k_{-9}$ to zero, leaving $k_{-7}$ as the only parameter to be fitted in eq.~(\ref{corrections_to_NG}), we always obtained values of the $\chi^2$ per degree of freedom much larger than $1$ (e.g. $\chi^2_{\tiny\mbox{red}} \simeq 24$ for $N_2=80$, and $\chi^2_{\tiny\mbox{red}} \simeq 61.5$ for the $N_2=96$ case), indicating that a term of order $\left( L_1 \sqrt{\sigma} \right)^{-7}$ alone does not fit our numerical results for $y$. In addition, we also observed that, if $k_{-9}$ is set to zero, but the exponent of $L_1 \sqrt{\sigma}$ for the other term (besides its coefficient) is treated as a fit parameter, i.e. if we make the \emph{Ansatz}
\begin{equation}
\label{single-power_correction}
y = \frac{k}{\left( L_1 \sqrt{\sigma} \right)^{\alpha}}
\end{equation}
with $k$ and $\alpha$ as fit parameters, the fits yield values of $\alpha$ that are incompatible across the data sets corresponding to different $N_2$, and that increase with $N_2$, ranging from $7.10(8)$ (for $N_2=48$), to $7.54(7)$ (for $N_2=64$), to $7.44(5)$ (for the data set at $N_2=80$), to $7.60(2)$ (for $N_2=96$). While the value of $\alpha$ obtained from the data set at $N_2=48$ may be compatible with $7$, the others, clearly, are not: the results at $N_2=64$ and $N_2=80$ may be compatible with a half-integer exponent $15/2$ (for which, however, there is no theoretical justification), but this is not the case for those at $N_2=96$. We also observe that the values of the reduced $\chi^2$ for some of these fits are significantly larger than $1$ (for example, $\chi^2_{\tiny\mbox{red}}$ is around $1.7$ for the data sets corresponding to $N_2=48$ and to $N_2=80$). This led us to conclude that our numerical results for the deviations from the Nambu--Got\={o} model cannot be fitted to a functional form including a correction given by a single inverse power of $L_1 \sqrt{\sigma}$ of the form given in eq.~(\ref{single-power_correction}).
These results support the expectations from the effective string model discussed in ref.~\cite{Aharony:2013ipa}; however, a puzzle remains: the values of $k_{-7}$ and $k_{-9}$ extracted from the fits have a residual dependence on $L_2$, whose origin is not clear. This could indicate that, as already pointed out in ref.~\cite{Caselle:2010pf}, the effective action describing the low-energy dynamics of this gauge theory includes additional terms. One possible such term could be the one describing the string ``stiffness''~\cite{Polyakov:1986cs, Kleinert:1986bk, Braaten:1986bz, German:1989vk, Klassen:1990dx}. We postpone a detailed analysis of this problem to a future, dedicated study.
We conclude this section with an important remark: even though we have calculated the interface free energy of the $\mathbb{Z}_2$ lattice gauge in three dimensions by mapping it to the Ising model, this was not a necessary condition for the application of Jarzynski's relation. An explicit example of application of Jarzynski's relation directly in a lattice gauge theory is presented in the following section~\ref{sec:equation_of_state}.
\section{Benchmark study II: The equation of state}
\label{sec:equation_of_state}
As another example of application of Jarzynski's relation eq.~(\ref{Jarzynski}) in lattice gauge theory, we discuss the calculation of the pressure in $\mathrm{SU}(2)$ Yang--Mills theory in $D=4$ spacetime dimensions. As is well-known, this gauge theory has a second-order deconfinement phase transition at a finite critical temperature $T_c$~\cite{Fingberg:1992ju, Engels:1994xj, Lucini:2005vg}, which, when expressed in physical units, is approximately $300$~MeV~\cite{Teper:1998kw, Lucini:2002ku, Lucini:2003zr, Lucini:2005vg}. As usual, the main quantities describing the thermal equilibrium properties of this theory are the pressure ($p$), the energy density ($\epsilon=E/V$) and the entropy density ($s=S/V$); these observables are related to each other by standard thermodynamic identities:
\begin{equation}
\epsilon = (D-1)p + \Delta, \qquad s =\frac{Dp + \Delta}{T},
\end{equation}
where $\Delta$ is the trace of the energy-momentum tensor, which, in turn, satisfies the relation
\begin{equation}
\Delta = T^{D+1} \frac{\partial}{\partial T} \left( \frac{p}{T^D} \right).
\end{equation}
As we mentioned in section~\ref{sec:introduction}, in the thermodynamic limit $V\to \infty$, the pressure equals minus the free-energy density, $p=-f=-F/V$, and this opens up the possibility to evaluate it using Jarzynski's relation. More precisely, we focus our attention on determining how the pressure depends on the temperature in the confining phase, i.e. at temperatures $T< T_{\mbox{\tiny{c}}}$, assuming that the pressure vanishes for $T=0$. As it was recently shown in ref.~\cite{Caselle:2015tza}, the equilibrium-thermodynamics properties in the confining phase of this theory can be modelled very well in terms of a gas of free glueballs, using the masses of the lightest states known from previous lattice studies~\cite{Teper:1998kw} and assuming that the spectral density of heavier states has an exponential form~\cite{Hagedorn:1965st} (see also refs.~\cite{Buisseret:2011fq, Arriola:2014bfa} for discussions on related topics, and ref.~\cite{Caselle:2011fy} for an analogous lattice study in $2+1$ dimensions). Similar results have also been obtained in lattice studies of $\mathrm{SU}(3)$ Yang--Mills theory~\cite{Meyer:2009tq, Borsanyi:2012ve} and may be of direct phenomenological relevance even for real-world QCD~\cite{Stoecker:2015zea, Stocker:2015nka}.
It is worth remarking that the lattice determination of the equation of state in the confining phase of $\mathrm{SU}(N)$ Yang--Mills theory is not a computationally trivial problem: at low temperatures, the thermodynamic quantities mentioned above take values, that are significantly smaller than in the deconfined phase ($T > T_{\mbox{\tiny{c}}}$). In the hadron-gas picture, the exponential suppression of these thermodynamic quantities for $T \ll T_{\mbox{\tiny{c}}}$ is a direct consequence of confinement, i.e. of the existence of a finite mass gap---a relatively large one: when converted to physical units, the mass of the lightest glueball is around $1.6$~GeV for both $\mathrm{SU}(2)$~\cite{Teper:1998kw, Lucini:2001ej, Lucini:2004my} and $\mathrm{SU}(3)$~\cite{Morningstar:1999rf} Yang--Mills theories.
Here, we focus on $\mathrm{SU}(2)$ Yang--Mills theory in four spacetime dimensions, and, following the notations of ref.~\cite{Caselle:2015tza}, we discretize it on a isotropic hypercubic lattice of spacing $a$ by introducing Wilson's gauge action~\cite{Wilson:1974sk}:
\begin{equation}
\label{Wilson_action}
S_{\mathrm{SU}(2)} = -\frac{2}{g^2} \sum_{x \in \Lambda} \sum_{0 \le \mu < \nu \le 3} \Tr U_{\mu\nu} (x),
\end{equation}
where $g$ is the coupling, related to $\beta_{\mbox{\tiny{g}}}$ via $\beta_{\mbox{\tiny{g}}}=4/g^2$, and $U_{\mu\nu} (x)$ denotes the plaquette from the site $x$ and lying in the oriented $(\mu,\nu)$ plane:
\begin{equation}
\label{plaquette}
U_{\mu\nu} (x) = U_\mu (x) U_\nu \left(x+a\hat{\mu}\right) U_{\mu}^\dagger \left(x+a\hat{\nu}\right) U_{\nu}^\dagger (x),
\end{equation}
where $\hat{\mu}$ and $\hat{\nu}$ denote unit vectors in the positive $\mu$ and $\nu$ directions, respectively. In the following, we assume that the compactified Euclidean-time direction is the $\mu=0$ direction, so that $T=1/(aN_0)$, while we take the lattice sizes in the three other directions to be equal ($N_1=N_2=N_3$, that we denote as $N_s$) and sufficiently large, to avoid finite-volume effects. Note that, in order to control the temperature of the system, we used the relation between $a$ and the inverse coupling $\beta_{\mbox{\tiny{g}}}$ determined in ref.~\cite{Caselle:2015tza}, and discussed in the next paragraph, so that we were able to change the temperature $T$ simply by varying $\beta_{\mbox{\tiny{g}}}$ at fixed $N_0$. We denote the normalized expectation value of the average of the trace of the plaquette at a generic temperature $T$ as $\langle U_{\Box}\rangle_T$: this quantity is averaged over all sites of the lattice and over all of the distinct $(\mu,\nu)$ planes, and is normalized to $1$ by dividing the trace by the number of color charges, i.e. by $2$ for the $\mathrm{SU}(2)$ gauge theory.
In order to ``set the scale'' of the lattice theory (i.e. to define a physical value for the lattice spacing $a$, as a function of $\beta_{\mbox{\tiny{g}}}$), we use the same non-perturbative procedure as in ref.~\cite{Caselle:2015tza}, based on the determination of the value of the force between static fundamental color sources at asymptotically large distances (i.e. the string tension of the theory) in lattice units, $\sigma a^2$: in the $2.25 \le \beta_{\mbox{\tiny{g}}} \le 2.6$ range, the relation between $a$ and $\beta_{\mbox{\tiny{g}}}$ is parametrized as
\begin{equation}
\label{betaform}
\ln \left( \sigma a^2 \right) = \sum_{j=0}^{3} h_j \left( \beta_{\mbox{\tiny{g}}} - \beta_{\mbox{\tiny{g}}}^{\mbox{\tiny{ref}}} \right)^j,
\end{equation}
where $\beta_{\mbox{\tiny{g}}}^{\mbox{\tiny{ref}}}=2.4$, while $h_0 = -2.68 $, $h_1 = -6.82 $, $h_2 = -1.90 $ and $h_3 = 9.96$. In addition, we mention that, for this gauge theory, the value of the ratio of the deconfinement critical temperature over the square root of the string tension is $T_c/\sqrt{\sigma} = 0.7091(36)$~\cite{Lucini:2003zr}.
A popular technique to compute the pressure $p$ (as a function of the temperature $T$, and with respect to the pressure at a conventional reference temperature: usually one defines $p$ as the difference with respect to the value it takes at $T=0$, which can be assumed to vanish) in lattice gauge theory is the integral method introduced in ref.~\cite{Engels:1990vr}. Here we describe it for the pure Yang--Mills theory. The method is based on the fact that, as we mentioned above, in the thermodynamic limit the pressure equals minus the free energy density; in turn, this quantity is proportional to the logarithm of the partition function, which can be computed by integrating its derivative with respect to the Wilson parameter $\beta_{\mbox{\tiny{g}}}$. At $T=0$ the pressure is vanishing, hence one could think of defining it as
\begin{equation}
\label{unphysical_pressure}
p^{\mbox{\tiny{unphys}}} = - f = \frac{T}{V} \ln Z = \frac{1}{a^4 N_0 N_s^3} \int_{\beta_{\mbox{\tiny{g}}}^{(0)}}^{\beta_{\mbox{\tiny{g}}}^{(T)}} {\rm{d}} \beta_{\mbox{\tiny{g}}} \frac{\partial \ln Z}{\partial \beta_{\mbox{\tiny{g}}}},
\end{equation}
where the upper integration extremum $\beta_{\mbox{\tiny{g}}}^{(T)}$ is the value of Wilson's parameter at which the lattice spacing $a$ equals $1 / \left( N_0 T \right)$, while the lower integration extremum $\beta_{\mbox{\tiny{g}}}^{(0)}$ is a value of Wilson's parameter, corresponding to a lattice spacing $a^{(0)}$ sufficiently large, so that the temperature $1/\left(a^{(0)}N_0\right)$ is close to zero. Using the fact that the logarithmic derivative of $Z$ with respect to $\beta_{\mbox{\tiny{g}}}$ equals the plaquette expectation value times the number of plaquettes (which is $6 N_0 N_s^3$), eq.~(\ref{unphysical_pressure}) reduces to
\begin{equation}
\label{unphysical_pressure_bis}
p^{\mbox{\tiny{unphys}}} = \frac{6}{a^4} \int_{\beta_{\mbox{\tiny{g}}}^{(0)}}^{\beta_{\mbox{\tiny{g}}}^{(T)}} {\rm{d}} \beta_{\mbox{\tiny{g}}} \langle U_{\Box} \rangle_{\mathcal{T}(\beta_{\mbox{\tiny{g}}})},
\end{equation}
where $\mathcal{T}(\beta_{\mbox{\tiny{g}}})=1/\left[N_0 a(\beta_{\mbox{\tiny{g}}})\right]$ is the temperature of the theory defined on a lattice with $N_0$ sites along the Euclidean-time direction and at Wilson parameter $\beta_{\mbox{\tiny{g}}}$, corresponding to a lattice spacing $a(\beta_{\mbox{\tiny{g}}})$.
However, a definition of the pressure according to eq.~(\ref{unphysical_pressure_bis}) is actually unphysical (whence the $^{\mbox{\tiny{unphys}}}$ superscript), because it diverges in the continuum limit. This is easy to see, by inspection of eq.~(\ref{unphysical_pressure_bis}): in the $a \to 0$ limit, the integrand appearing on the right-hand side is a quantity that remains $O(1)$ in the whole integration domain, and the integral is multiplied by the divergent factor $6/a^4$. This unphysical ultraviolet divergence can be removed by subtracting the plaquette expectation value at $T=0$ (and at the same $\beta_{\mbox{\tiny{g}}}$) from the integrand on the right-hand side of eq.~(\ref{unphysical_pressure_bis}). This leads to the correct physical definition of the pressure according to the integral method:
\begin{equation}
\label{integral_method}
p = \frac{6}{a^4} \int_{\beta_{\mbox{\tiny{g}}}^{(0)}}^{\beta_{\mbox{\tiny{g}}}^{(T)}} {\rm{d}} \beta_{\mbox{\tiny{g}}} \left[ \langle U_{\Box} \rangle_{\mathcal{T}(\beta_{\mbox{\tiny{g}}})} - \langle U_{\Box} \rangle_0 \right],
\end{equation}
where $\langle U_{\Box}\rangle_0$ is evaluated from simulations on a symmetric lattice of sizes $N_s^4$ at the same value of $\beta_{\mbox{\tiny{g}}}$ (i.e. at the same lattice spacing) as $\langle U_{\Box}\rangle_{\mathcal{T}(\beta_{\mbox{\tiny{g}}})}$.
Accordingly, the dimensionless $p(T)/T^4$ ratio can be evaluated as
\begin{equation}
\label{lattice_pressure}
\frac{p}{T^4} = 6 N_0^4 \int_{\beta_{\mbox{\tiny{g}}}^{(0)}}^{\beta_{\mbox{\tiny{g}}}^{(T)}} {\rm{d}} \beta_{\mbox{\tiny{g}}} \left[ \langle U_{\Box}\rangle_{\mathcal{T}(\beta_{\mbox{\tiny{g}}})} - \langle U_{\Box}\rangle_0 \right].
\end{equation}
Thus, the integral method reduces the computation of the pressure to an integration of differences between the plaquette expectation values at finite ($\mathcal{T}$) and at zero temperature. Such integration can be carried out numerically (e.g. using the trapezoid rule, or some of the methods listed in ref.~\cite[Appendix]{Caselle:2007yc}), once the $\langle U_{\Box}\rangle_{\mathcal{T}(\beta_{\mbox{\tiny{g}}})} - \langle U_{\Box}\rangle_0$ differences are known to sufficient precision, and at a large enough number of values of the Wilson parameter in the $\left[\beta_{\mbox{\tiny{g}}}^{(0)},\beta_{\mbox{\tiny{g}}}^{(T)}\right]$ interval.
Note that eq.~(\ref{lattice_pressure}) reveals a potentially challenging aspect of the lattice determination of the equation of state obtained with the integral method, in the extrapolation to the continuum limit. The pressure, in units of the fourth power of the temperature, is evaluated as the product of $6N_0^4$ times the integral of a difference in plaquette expectation values. For a fixed temperature $T$, the number of lattice sites in the Euclidean-time direction $N_0=1/(aT)$ becomes large in the continuum limit $a \to 0$, and, since the $p(T)/T^4$ ratio tends to a finite constant (its physical value) in that limit, while the integration range remains finite, this means that at the same time the $\langle U_{\Box}\rangle_{\mathcal{T}} - \langle U_{\Box}\rangle_0$ differences must necessarily become small, scaling like $a^4$. This implies that, in a numerical simulation, both $\langle U_{\Box}\rangle_{\mathcal{T}}$ and $\langle U_{\Box}\rangle_0$ have to be determined with relative statistical uncertainties $O(a^4)$, which requires a computational effort scaling (at least) like $O(N_0^8)$.
This significant computational cost provides a motivation to use Jarzynski's relation for the numerical computation of the pressure; in this case, $\lambda$ can be taken to be Wilson's parameter, which is let vary from $\beta_{\mbox{\tiny{g}}}^{(0)}$ at $t=t_{\mbox{\tiny{in}}}$, to $\beta_{\mbox{\tiny{g}}}^{(T)}$ at $t=t_{\mbox{\tiny{fin}}}$. A potential advantage of determining the equation of state this way, is that, in contrast to the standard implementation of the integral method described above, it would not require complete equilibration of the system at all intermediate values of $\beta_{\mbox{\tiny{g}}}$, and, hence, could reduce the computational cost of the calculation, at least by a factor. While there is no obvious reason to expect that the computational costs of an algorithm based on Jarzynski's relation could scale with a lower power of $N_0$ when the continuum limit is approached, its intrinsic non-equilibrium nature suggests that it could nevertheless be significantly cheaper than a standard algorithm to implement eq.~(\ref{lattice_pressure}), because it would dramatically reduce the costs associated with thermalization (only the configurations in the starting ensemble need to be equilibrated).
We computed the pressure of the theory at different temperatures $0 < T < T_{\mbox{\tiny{c}}}$, using the method based on Jarzynski's relation eq.~(\ref{Jarzynski}), assuming the equality of the pressure and minus the density of free energy, and using the ``physical'' definition of the pressure, consistent with eq.~(\ref{integral_method}), in which the unphysical ultraviolet divergences are subtracted. For later convenience, in order to allow a direct comparison with the results obtained in ref.~\cite{Caselle:2015tza}, in which this subtraction was carried out using lattices of sizes $\widetilde{N}^4$ (where $\widetilde{N}$ can be different from $N_s$, but it must be sufficiently large to enforce that the temperature is close to zero, and to avoid systematic uncertainties due to finite-volume effects) instead of $N_s^4$, we include this slight generalization of the divergence-subtraction procedure discussed above in the present discussion. Moreover, we also relax the assumption that the starting temperature $T_0=1/\left[ a\left(\beta_{\mbox{\tiny{g}}}^{(0)}\right) N_0\right]$ is close to zero, and that $p(T_0)$ vanishes.
As already mentioned in section~\ref{sec:Jarzynski}, we interpreted the differences appearing on the right-hand side of eq.~(\ref{discretized_exponential_work}) as differences in the Euclidean action of the lattice theory---i.e. as differences in the Wilson action defined in eq.~(\ref{Wilson_action})---when the $\beta_{\mbox{\tiny{g}}}$ parameter is varied. This leads to the following formula for the determination of $p/T^4$:
\begin{equation}
\label{lattice_pressure_Jarzynski}
\frac{p(T)}{T^4} = \frac{p(T_0)}{T_0^4} + \left( \frac{N_0}{N_s} \right)^3 \ln \frac{ \langle \exp \left[ - \Delta S_{\mathrm{SU}(2)} (t_{\mbox{\tiny{in}}},t_{\mbox{\tiny{fin}}})_{N_0 \times N_s^3} \right] \rangle }{ \langle \exp \left[ - \Delta S_{\mathrm{SU}(2)} (t_{\mbox{\tiny{in}}},t_{\mbox{\tiny{fin}}})_{\widetilde{N}^4} \right] \rangle^{\gamma} } ;
\end{equation}
on the right-hand side of this expression, $\Delta S_{\mathrm{SU}(2)} (t_{\mbox{\tiny{in}}},t_{\mbox{\tiny{fin}}})_{N_0 \times N_s^3}$ is the total variation in Wilson action calculated on a lattice of sizes $N_0 \times N_s^3$ during a non-equilibrium trajectory starting from a configuration of the initial, equilibrium ensemble with Wilson parameter $\beta_{\mbox{\tiny{g}}}^{(0)}$ realized at $t=t_{\mbox{\tiny{in}}}$, to a final configuration, obtained driving the system out of equilibrium until $\beta_{\mbox{\tiny{g}}}$ reaches its value $\beta_{\mbox{\tiny{g}}}^{(T)}$ at $t=t_{\mbox{\tiny{fin}}}$, and the $\langle \dots \rangle$ notation indicates averaging over $n_{\mbox{\tiny{r}}}$ such trajectories, as discussed in section~\ref{sec:Jarzynski}. Similarly, $\Delta S_{\mathrm{SU}(2)} (t_{\mbox{\tiny{in}}},t_{\mbox{\tiny{fin}}})_{\widetilde{N}^4}$ denotes an analogous total variation in Wilson action, but evaluated on a lattice of sizes $\widetilde{N}^4$, while the exponent $\gamma = \left( N_0 \times N_s^3 \right) / \widetilde{N}^4$ is the ratio of the lattice hypervolumes.
Like for the determination of the interface free energy discussed in section~\ref{sec:interface}, we found that, when the transformation is discretized using a sufficiently large number of intervals $N$, the results obtained with a ``direct'' or a ``reverse'' non-equilibrium transformation converge to the same values, which are compatible with those obtained by the integral method used in ref.~\cite{Caselle:2015tza} at nearby temperatures. This is shown in table~\ref{tab:su2_pressure} and in fig.~\ref{fig:su2_pressure}, which report results for the pressure, in units of the fourth power of the temperature, from simulations on lattices at fixed $N_0=6$ (so that the temperature is varied by tuning $\beta_{\mbox{\tiny{g}}}$, and the results are shown as a function of it) and spatial sizes in units of the lattice spacing $N_s=72$, while the corresponding simulations at $T=0$ were run on lattices of sizes $\widetilde{N}=40$ in all the four directions (so that $\gamma=(6 \times 72^3)/40^4=0.8748$), like in ref.~\cite{Caselle:2015tza}. Note that these results were obtained using independent non-equilibrium transformations from one value of $\beta_{\mbox{\tiny{g}}}$ to the next, i.e. applying eq.~(\ref{lattice_pressure_Jarzynski}) to compute only the \emph{difference} in pressure. Furthermore, we did not determine the pressure at very small temperatures; instead, we started the analysis at a finite temperature $T_0$, corresponding to $\beta_{\mbox{\tiny{g}}}=2.4058$, and used the value obtained from the integral method (which is reported in table~\ref{tab:su2_pressure}) for $p(T_0)/T_0^4$ in eq.~(\ref{lattice_pressure_Jarzynski}).
\begin{table}[!htb]
\centering
\begin{tabular}{|c||c|c|c|}
\hline
$\beta_{\mbox{\tiny{g}}}^{(T)}$ & $p/T^4$, direct & $p/T^4$, reverse & $p/T^4$, integral method \\
\hline
\hline
$2.4058$ & -- & -- & $0.00980(22)$ \\
$2.4108$ & $0.01122(9)$ & $0.01130(11)$ & $0.01114(22)$ \\
$2.4157$ & -- & -- & $0.01274(22)$ \\
$2.4158$ & $0.01276(15)$ & $0.01304(14)$ & -- \\
$2.4186$ & -- & -- & $0.01381(22)$ \\
$2.4208$ & $0.01492(20)$ & $0.01505(16)$ & -- \\
$2.4214$ & -- & -- & $0.01501(22)$ \\
$2.4228$ & -- & -- & $0.01569(22)$ \\
$2.4243$ & -- & -- & $0.01656(22)$ \\
$2.4257$ & -- & -- & $0.01751(22)$ \\
$2.4258$ & $0.01780(35)$ & $0.01774(24)$ & -- \\
$2.4271$ & -- & -- & $0.01867(22)$ \\
$2.428$ & -- & -- & $0.01956(22)$ \\
$2.429$ & -- & -- & $0.02068(22)$ \\
$2.43$ & -- & -- & $0.02198(22)$ \\
$2.4308$ & $0.02354(37)$ & $0.02402(27)$ & -- \\
$2.431$ & -- & -- & $0.02341(22)$ \\
\hline
$2.4108$ & $0.01122(9)$ & $0.01130(11)$ & $0.01116(51)$ \\
\hline
\end{tabular}
\caption{Results for $p/T^4$ at different values of $\beta_{\mbox{\tiny{g}}}^{(T)}$ (first column), from simulations on lattices with $N_0=6$ and spatial sizes $N_s^3=72^3$ (while the simulations at $T=0$ were run on lattices of sizes $\widetilde{N}^4=40^4$) using Jarzynski's relation eq.~(\ref{Jarzynski}) with a direct (second column) or a reverse implementation (third column) of the parameter switch, in comparison with those obtained with the integral method~\cite{Engels:1990vr} in ref.~\cite{Caselle:2015tza} (fourth column). The data in the last line provide a comparison of results from the method based on Jarzynski's relation and the integral method, for the same number ($3 \times 10^4$) of gauge configurations. \label{tab:su2_pressure}}
\end{table}
\begin{figure}[!htpb]
\centerline{\includegraphics[width=0.9\textwidth]{su2_pressure.pdf}}
\caption{(Color online) Results for the pressure $p$ (in units of the fourth power of the temperature) in the confining phase of $\mathrm{SU}(2)$ Yang--Mills theory, as a function of the Wilson parameter $\beta_{\mbox{\tiny{g}}}^{(T)}$ (which controls the lattice spacing $a$, and, thus, the temperature $T=1/(aN_0)$), from simulations on lattices with $N_0=6$ and spatial sizes $N_s^3=72^3$ (while the corresponding simulations at $T=0$ were performed on lattices of sizes $\widetilde{N}^4=40^4$). The results obtained using Jarzynski's relation eq.~(\ref{Jarzynski}) with a direct (red squares) and a reverse (blue circles) implementation of the parameter transformation converge to those obtained in ref.~\cite{Caselle:2015tza} using the integral method~\cite{Engels:1990vr} (green triangles).}
\label{fig:su2_pressure}
\end{figure}
The computational cost to get these results using Jarzynski's relation was rather modest: each of the values of $p/T^4$ reported in table~\ref{tab:su2_pressure} was obtained from simulations with $N=10^3$ (or $N=2 \times 10^3$, at the two largest $\beta_{\mbox{\tiny{g}}}$ values) and $n_{\mbox{\tiny{r}}}=30$. Thus, we are in a position to compare the efficiency of the method based on Jarzynski's relation to that of the integral method: for the latter, plaquette expectation values $\langle U_{\Box}\rangle_{\mathcal{T}} $ and $ \langle U_{\Box}\rangle_0$ were calculated using about $10^5$ configurations for each value of $\beta_{\mbox{\tiny{g}}}$ and then integrated numerically; conversely, using the method based on Jarzynski's relation, each point required either $3 \times 10^4$ or $6 \times 10^4$ configurations, with errors generally comparable to those obtained from the integral method.
We have to emphasize that a comprehensive comparison in terms of CPU cost between the two methods is not straightforward, since it depends on how many values of $\beta_{\mbox{\tiny{g}}}$ for which the integrand of eq.~(\ref{lattice_pressure}) is computed are chosen, in order to obtain a reliable numerical integration. To address this issue we attempted a comparison at fixed number of configurations ($3 \times 10^4$) for a single point at $\beta_{\mbox{\tiny{g}}}=2.4108$: as it can be seen in the last line of table~\ref{tab:su2_pressure}, the statistical uncertainty of the result obtained with the integral method is larger, so that the method based on Jarzynski's relation proves to be computationally more efficient.
Moreover, we remark that, in principle, during a single trajectory $t_{\mbox{\tiny{in}}} \to t_{\mbox{\tiny{fin}}}$ it is possible to determine the work (and, hence, the pressure) at any intermediate step between the initial and final value of $\beta_{\mbox{\tiny{g}}}$, without having to thermalize the system. Even if in this analysis all the values of $p/T^4$ were computed in independent transformations, it is worth stressing that a rather detailed determination of the equation of state would be feasible in this way, provided the correlations among results obtained during a single out-of-equilibrium transformation are properly taken into account.
Finally, we can conclude that the method based upon Jarzynski's relation proved to be very efficient in the determination of the pressure in the temperature region of choice, making it a viable and CPU-cost-effective technique to determine the equation of state.
\section{Discussion and further applications}
\label{sec:conclusions}
In this article, we have shown that the non-equilibrium work relation derived by Jarzynski in statistical mechanics~\cite{Jarzynski:1996ne, Jarzynski:1997ef} can be successfully extended to study problems in lattice gauge theory. This relation links the ratio of the equilibrium partition functions describing a system at two different sets of physical parameters, to the exponential average of the work performed on the system during a non-equilibrium transformation, in which the system parameters and the fields are let evolve.
The generalization of Jarzynski's relation to lattice gauge theory is simply an application of a statistical-mechanics technique to a field-theory context, and does not involve any \emph{ad~hoc} assumptions: this elementary but important point is made clear by the detailed derivation of eqs.~(\ref{generalized_Jarzynski}) and~(\ref{Jarzynski}) in section~\ref{sec:Jarzynski}.
As examples of application, we used Jarzynski's relation to study the interface free energy in the $\mathbb{Z}_2$ gauge model in three dimensions (section~\ref{sec:interface}) and the equation of state in the confining phase of $\mathrm{SU}(2)$ Yang--Mills theory (section~\ref{sec:equation_of_state}).
In the study of the interface free energy, we compared our results with the expectations from effective string theory, and we were able to identify the leading and next-to-leading deviations from the behavior predicted by the Nambu--Got\={o} string. The form of these corrections agrees with theoretical expectations~\cite{Aharony:2013ipa}, but a more detailed quantitative analysis will be carried out later, in a larger-scale study.
In the study of the equation of state, the algorithm successfully reproduced the results obtained with the integral method in ref.~\cite{Caselle:2015tza}, and proved very competitive in terms of computational cost.
In both cases, the calculation of free energies based on this method gave precise results, which converge rapidly to those obtained by different techniques, when the transformation of parameters relating the initial and final partition functions of the system is discretized in a sufficiently smooth way, i.e. when $N$ is large enough: under such conditions, the computational efficiency of the algorithm based on Jarzynski's relation proves to be comparable or, in certain cases, superior with respect to other algorithms.
Numerical calculations involving Jarzynski's relation could also be carried out to study lattice gauge theories coupled to dynamical fermions, including QCD. Although in the present work we have not carried out any studies in this direction yet, there is no conceptual obstruction to generalizing the derivation presented in section~\ref{sec:Jarzynski} to Monte~Carlo calculations involving state-of-the-art fermionic algorithms~\cite{Hasenbusch:2001ne, Luscher:2005rx, Urbach:2005ji, Clark:2006fx, Luscher:2007se, Luscher:2007es}.
In view of the results obtained in the benchmark studies presented here, we envisage a number of further applications of Jarzynski's relation in lattice QCD.
A particularly interesting one could be in studies involving the Schr{\"o}dinger functional~\cite{Symanzik:1981wd, Luscher:1985iu}, which is a powerful method to evaluate running physical quantities in asymptotically free theories~\cite{Luscher:1991wu, Luscher:1992an}. The Schr{\"o}dinger functional provides an elegant, gauge-invariant, finite-volume scheme, which is free from many of the technical challenges related to the chiral limit or to the presence of bosonic-field zero-modes for theories defined on a torus, and which, in addition, is particularly suitable for perturbative computations.
In this approach, one considers the evolution of the system during a Euclidean-time interval $L$, from an initial state $\mathcal{I}$, to a final state $\mathcal{F}$. At the classical level, the action $S_{\mbox{\tiny{cl}}}$ of the field configuration induced by the presence of these boundary conditions is inversely proportional to the squared bare coupling of the theory $g$. At the quantum level, denoting the Hamiltonian of the system by $H$, one can compute the transition amplitude
\begin{equation}
Z_{\mathcal{I},\mathcal{F}; L} = \langle \mathcal{F} | \exp \left(- H L \right) | \mathcal{I} \rangle
\end{equation}
and define the effective action $\Gamma_{\mbox{\tiny{eff}}}$ as
\begin{equation}
\Gamma_{\mbox{\tiny{eff}}} = - \ln Z_{\mathcal{I},\mathcal{F}; L}.
\end{equation}
Then, one can define a renormalized coupling $\bar{g}$ at the momentum scale $L^{-1}$, by assuming that $\Gamma_{\mbox{\tiny{eff}}}$ is proportional to $1/\bar{g}^2$. In practical simulations, if the boundary states $\mathcal{I}$ and $\mathcal{F}$ depend on a set of parameters $\chi$, then $\bar{g}^2(L^{-1})$ can be computed from
\begin{equation}
\label{SF_coupling}
\bar{g}^2(L^{-1}) = g^2 \frac{S_{\mbox{\tiny{cl}}}^\prime}{\Gamma_{\mbox{\tiny{eff}}}^\prime},
\end{equation}
where the prime denotes derivation with respect to $\chi$.
This approach has been used for studies of pure-glue non-Abelian gauge theories~\cite{Luscher:1992zx, Luscher:1993gh, Bode:1998hd, Lucini:2008vi} and can be extended to include dynamical fermions~\cite{Sint:1993un}: this has direct applications in QCD~\cite{Sint:1998iq, Bode:1999sm} and in strongly interacting theories~\cite{Appelquist:2007hu, Shamir:2008pb, Hietanen:2009az, Karavirta:2011zg, DeGrand:2011qd, DeGrand:2012qa} that might provide viable models for dynamical breaking of electro-weak symmetry at the TeV scale~\cite{Sannino:2009za, DelDebbio:2010zz} and/or for composite dark matter~\cite{Kribs:2016cew}.
Using Jarzynski's relation, in principle one could evaluate $\bar{g}^2(L^{-1})$ by computing the variation induced in $Z_{\mathcal{I},\mathcal{F}; L}$ by a change in the $\chi$ parameters that specify $\mathcal{I}$ and $\mathcal{F}$.
Finally, it is tempting to think that Jarzynski's relation could also find applications in lattice QCD at finite density, where, as we mentioned in section~\ref{sec:introduction}, the loss of $\gamma_5$-Hermiticity of the Dirac operator induces a severe sign problem~\cite{deForcrand:2010ys, Philipsen:2012nu, Levkova:2012jd, Aarts:2013lcm, D'Elia:2015rwa, Gattringer:2016kco}. In particular, the connections between Jarzynski's relation and the reweighting technique~\cite{Ferrenberg:1988yz, Barbour:1997bh, Fodor:2001au}, that we mentioned in section~\ref{sec:Jarzynski}, deserve further investigation. We leave these issues for future work.
\vskip1.0cm
\noindent{\bf Acknowledgements.}\\
The simulations were run on INFN Pisa GRID Data Center and on CINECA machines. The work of A.~T. is partially supported by the Danish National Research Foundation grant DNRF90. We thank C.~Bonati, R.~C.~Brower, M.~D'Elia, M.~Mesiti, M.~Pepe, A.~Ramos and E.~Vicari for helpful comments and discussions.
|
\section{Introduction}
\begin{figure}[t]%
\tikzset{cmplx/.style={draw,thick,rounded corners,inner sep=0mm}}%
\mbox{}\hspace*{-0.3em}\begin{tikzpicture}[x=7.2mm,y=4.5mm]
\draw[thick] (0.4,-0.4) rectangle +(8.2,-6.2);
\node[rotate=90] at (-0.3,-4.0) {\scriptsize ontology depth};
\begin{scope}[ultra thin]
\draw (0.4,-1) -- +(8.2,0); \node at (0.1,-1) {\scriptsize 1};
\draw (0.4,-2) -- +(8.2,0); \node at (0.1,-2) {\scriptsize 2};
\draw (0.4,-3) -- +(8.2,0); \node at (0.1,-3) {\scriptsize 3};
\draw (0.4,-4) -- +(8.2,0); \node at (0,-4) {\scriptsize \dots};
\draw (0.4,-5) -- +(8.2,0); \node at (0.1,-5) {\scriptsize $d$};
\draw (0.4,-6) -- +(8.2,0); \node at (0,-6) {\scriptsize arb.};
\draw (1,-0.4) -- +(0,-6.2); \node at (1,-7) {\scriptsize 2};
\draw (2,-0.4) -- +(0,-6.2); \node at (2,-7) {\scriptsize \dots};
\draw (3,-0.4) -- +(0,-6.2); \node at (3,-7) {\scriptsize $\ell$};
\draw (4,-0.4) -- +(0,-6.2); \node at (4,-7) {\scriptsize trees};
\draw (5,-0.4) -- +(0,-6.2); \node at (5,-7) {\scriptsize 2};
\draw (6,-0.4) -- +(0,-6.2); \node at (6,-7) {\scriptsize \dots};
\draw (7,-0.4) -- +(0,-6.2); \node at (7,-7) {\scriptsize bound.};
\draw (8,-0.4) -- +(0,-6.2); \node at (8,-7) {\scriptsize arb.};
\end{scope}
\node at (2,-7.5) {\scriptsize number of leaves};
\node at (6.5,-7.5) {\scriptsize treewidth};
\node [fill=gray!25,cmplx,fill opacity=0.9,fit={(0.6,-1.6) (3.4,-6.4)}]
{\raisebox{-6ex}{\begin{tabular}{c}poly NDL\\[2pt] no poly PE\\[2pt]
\footnotesize poly FO\\[-3pt]\scriptsize iff\\[-3pt]\scriptsize \ensuremath{\mathsf{NL}}/\ensuremath{\mathsf{poly}} $\,\subseteq\,$ {\ensuremath{\mathsf{NC}^1}}\end{tabular}}};
\node [fill=gray!50,cmplx,fill opacity=0.9,fit={(3.6,-1.6) (7.4,-5.4)}]
{\raisebox{-7ex}{\begin{tabular}{c}poly NDL\\[1pt] no poly PE\\[1pt]
\footnotesize poly FO\\[-5pt] \scriptsize iff\\[-5pt] \scriptsize LOGCFL/poly $\!\subseteq\!$ {\ensuremath{\mathsf{NC}^1}}\end{tabular}}};
\node [fill=black,cmplx,fit={(3.6,-5.6) (8.4,-6.4)}]
{\hspace*{-1.8em}\raisebox{-9pt}{\textcolor{white}{\begin{tabular}{c}\small no poly NDL\,{\scriptsize\&}\,PE
\end{tabular}}}};
\node [fill=black,cmplx,fit={(7.6,-1.6) (8.4,-6.4)}]
{\rotatebox{90}{\hspace*{-3.5em}\textcolor{white}{\begin{tabular}{c}
\scriptsize \begin{tabular}{c}poly\\text{FO}\end{tabular}\! iff NP{\tiny\!/\!poly} $\!\!\subseteq\!\!$ NC$^1$
\end{tabular}}}};
\node [fill=gray!5,cmplx,fill opacity=0.9,fit={(0.6,-0.6) (4.4,-1.4)}] {\raisebox{-1.5ex}{poly $\Pi_4$-PE}};
\node [fill=gray!5,cmplx,fill opacity=0.9,fit={(4.6,-0.6) (7.4,-1.4)}] {\raisebox{-1.5ex}{poly PE}};
\node [fill=gray!25,cmplx,fill opacity=0.9,fit={(7.6,-0.6) (8.4,-1.4)}] { };
\node[inner sep=0pt] (test) at (5.5,0.3) {\begin{tabular}{c}poly NDL, {\scriptsize but} no poly PE\\[-3pt]\footnotesize poly FO \scriptsize iff \ensuremath{\mathsf{NL}}/\ensuremath{\mathsf{poly}} $\,\subseteq\,$ {\ensuremath{\mathsf{NC}^1}}\end{tabular}};
\draw (8,-1) -- (test.-15);
\node at (-0.05,0.3) {\footnotesize (a)};
\end{tikzpicture}
\hspace*{0.2em}
\begin{tikzpicture}[x=5.8mm,y=4.5mm]
\draw[thick] (0.4,-0.4) rectangle +(8.2,-6.2);
\begin{scope}[ultra thin]
\draw (0.4,-1) -- +(8.2,0); \node at (0.1,-1) {\scriptsize 1};
\draw (0.4,-2) -- +(8.2,0); \node at (0.1,-2) {\scriptsize 2};
\draw (0.4,-3) -- +(8.2,0); \node at (0.1,-3) {\scriptsize 3};
\draw (0.4,-4) -- +(8.2,0); \node at (0,-4) {\scriptsize \dots};
\draw (0.4,-5) -- +(8.2,0); \node at (0.1,-5) {\scriptsize $d$};
\draw (0.4,-6) -- +(8.2,0); \node at (0,-6) {\scriptsize arb.};
\draw (1,-0.4) -- +(0,-6.2); \node at (1,-7) {\scriptsize 2};
\draw (2,-0.4) -- +(0,-6.2); \node at (2,-7) {\scriptsize \dots};
\draw (3,-0.4) -- +(0,-6.2); \node at (3,-7) {\scriptsize $\ell$};
\draw (4,-0.4) -- +(0,-6.2); \node at (4,-7) {\scriptsize trees};
\draw (5,-0.4) -- +(0,-6.2); \node at (5,-7) {\scriptsize 2};
\draw (6,-0.4) -- +(0,-6.2); \node at (6,-7) {\scriptsize \dots};
\draw (7,-0.4) -- +(0,-6.2); \node at (7,-7) {\scriptsize bound.};
\draw (8,-0.4) -- +(0,-6.2); \node at (8,-7) {\scriptsize\hspace*{0.5em} arb.};
\end{scope}
\node at (2,-7.5) {\scriptsize number of leaves};
\node at (6.5,-7.5) {\scriptsize treewidth};
\node [fill=gray!5,cmplx,fill opacity=0.9,fit={(3.4,-5.4) (0.6,-0.6)}] {\ensuremath{\mathsf{NL}}};
\node [fill=gray!40,cmplx,fill opacity=0.9,fit={(3.6,-0.6) (7.4,-5.4)}] {\ensuremath{\mathsf{LOGCFL}}};
\node [fill=black,cmplx,fit={(8.4,-6.4) (7.6,-0.6)}] {};
\node [fill=black,cmplx,fit={(3.6,-5.6) (8.4,-6.4)}] {\hspace*{7em}\raisebox{-1ex}{\textcolor{white}{\ensuremath{\mathsf{NP}}}}};
\node [fill=gray!40,cmplx,fill opacity=0.9,fit={(0.6,-5.6) (3.4,-6.4)}] {\raisebox{-1ex}{\ensuremath{\mathsf{LOGCFL}}}};
\node at (-0.05,0.3) {\footnotesize (b)};
\end{tikzpicture}%
\caption{(a) Size of OMQ rewritings; (b) combined complexity of OMQ evaluation.}
\label{pic:results}
\end{figure}
Ontology-based data access (OBDA) via query rewriting~\cite{PLCD*08} reduces the problem of finding answers to conjunctive queries (CQs) mediated by \textsl{OWL\,2\,QL}{} ontologies to standard database query answering. The question we are concerned with here is whether this reduction is optimal with respect to the combined complexity of query evaluation. Figure~\ref{pic:results}~(a) summarises what is known about the size of positive existential (PE), nonrecursive datalog (NDL) and first-order (FO) rewritings of \textsl{OWL\,2\,QL}{} ontology-mediated queries (OMQs) depending on the existential depth of their ontologies and the shape of their CQs~\cite{DBLP:conf/icalp/KikotKPZ12,DBLP:journals/ai/GottlobKKPSZ14,LICS14,DBLP:conf/lics/BienvenuKP15}. Figure~\ref{pic:results}~(b) shows the combined complexity of OMQ evaluation for the corresponding classes of OMQs~\cite{CDLLR07,DBLP:conf/dlog/KikotKZ11,LICS14,DBLP:conf/lics/BienvenuKP15}. Thus, we see, for example, that PE-rewritings for OMQs with ontologies of bounded depth and CQs of bounded treewidth can be of super-polynomial size, and so not evaluable in polynomial time, while the evaluation problem for these OMQs is decidable in $\ensuremath{\mathsf{LOGCFL}} \subseteq \mathsf{P}$. On the other hand, the OMQs in this class enjoy polynomial-size NDL-rewritings. However, these rewritings were defined using an argument from circuit complexity~\cite{DBLP:conf/lics/BienvenuKP15}, and it has been unclear whether they can be constructed and evaluated in \ensuremath{\mathsf{LOGCFL}}. The same concerns the class of OMQs with ontologies of bounded depth and bounded-leaf tree-shaped queries, which can be evaluated in \ensuremath{\mathsf{NL}}, and the class of OMQs with arbitrary ontologies and bounded-leaf tree-shaped queries, which can be evaluated in \ensuremath{\mathsf{LOGCFL}}.
In this paper, we consider OMQs in these three classes and construct NDL-rewritings that are theoretically optimal in the sense that the rewriting and evaluation can be carried out by algorithms of optimal combined complexity, that is, from the complexity classes \ensuremath{\mathsf{LOGCFL}}, \ensuremath{\mathsf{NL}}{} and \ensuremath{\mathsf{LOGCFL}}, respectively. Such algorithms are known to be space efficient and highly parallelisable.
We compared our optimal NDL rewritings with those produced by query rewriting engines Clipper~\cite{DBLP:conf/aaai/EiterOSTX12} and Rapid~\cite{DBLP:conf/cade/ChortarasTS11}, using a sequence of OMQs with linear CQs and a fixed ontology of depth 1.
\section{Preliminaries}\label{sec:prelims}
We give $\textsl{OWL\,2\,QL}$ in the DL syntax with \emph{individual names} $a_i$, \emph{concept names}~$A_i$, and \emph{role names} $P_i$ ($i\ge 1$). \emph{Roles} $R$ and \emph{basic concepts} $B$ are defined by
\begin{equation*}
R \quad ::=\quad P_i \quad\mid\quad P_i^-, \qquad\qquad
B \quad ::=\quad
A_i \quad\mid\quad \exists R.
\end{equation*}
A \emph{TBox}, $\mathcal{T}$, is a finite set of inclusions of the form
\begin{equation*}
B_1 \sqsubseteq B_2, \qquad B_1 \sqcap B_2 \sqsubseteq \bot, \qquad R_1 \sqsubseteq R_2,\qquad R_1 \sqcap R_2 \sqsubseteq \bot. \end{equation*}
An \emph{ABox}, ${\cal A}$, is a finite set of atoms of
the form $A_k(a_i)$ or $P_k(a_i,a_j)$. We denote by $\mathsf{ind}({\cal A})$ the set of individual names in ${\cal A}$, and by $\boldsymbol{R}_{\cal T}$ the set of role names occurring in ${\cal T}$ and their inverses. We use $A \equiv B$ for $A\sqsubseteq B$ and $B \sqsubseteq A$.
The semantics for \textsl{OWL\,2\,QL}{} is defined in the usual way based on interpretations $\mathcal{I} = (\Delta^\mathcal{I}, \cdot^\mathcal{I})$~\cite{BCMNP03}.
For every role $R\in\boldsymbol{R}_{\cal T}$, we take a fresh concept name $A_R$ and add $A_R \equiv \exists R$ to ${\cal T}$. The resulting TBox is said to be in \emph{normal form}, and we assume, without loss of generality, that all our TBoxes are in normal form. The subsumption relation induced by ${\cal T}$ is denoted by $\sqsubseteq_{\cal T}$: we write $S_1\sqsubseteq_{\cal T} S_2$ if ${\cal T}\models S_1\sqsubseteq S_2$, where $S_1$, $S_2$ are both either concepts or roles. We write $R(a,b)\in {\cal A}$ if $P(a,b)\in {\cal A}$ and $R= P$, or $P(b,a)\in{\cal A}$ and $R = P^-$; we also write $(\exists R)(a)\in {\cal A}$ if $R(a,b)\in{\cal A}$ for some $b$. An ABox ${\cal A}$ is called \emph{H-complete with respect to ${\cal T}$} in case
\begin{align*}
P(a,b) \in {\cal A} & \ \ \text{ if } \ R(a,b)\in {\cal A}, \text{ for roles } P \text{ and } R\text{ with } R\sqsubseteq_{\cal T} P,\\
A(a) \in {\cal A} & \ \ \text{ if } \ B(a)\in {\cal A}, \text{ for a concept name } A \text{ and basic concept } B \text{ with } B\sqsubseteq_{\cal T} A.
\end{align*}
A \emph{conjunctive query} (CQ) ${\boldsymbol{q}}(\vec{x})$ is a formula $\exists \vec{y}\, \varphi(\vec{x}, \vec{y})$, where $\varphi$ is a conjunction of atoms $A_k(z_1)$ or $P_k(z_1,z_2)$ with $z_i \in \vec{x} \cup \vec{y}$ (without loss of generality, we assume that CQs do not contain constants).
We denote by $\mathsf{var}({\boldsymbol{q}})$ the variables $\vec{x} \cup \vec{y}$ of ${\boldsymbol{q}}$ and by $\mathsf{avar}({\boldsymbol{q}})$ the \emph{answer variables}~$\vec{x}$.
An \emph{ontology-mediated query} (OMQ) is a pair ${\ensuremath{\boldsymbol{Q}}}(\vec{x}) = ({\cal T},{\boldsymbol{q}}(\vec{x}))$, where ${\cal T}$ is a TBox and ${\boldsymbol{q}}(\vec{x})$ a CQ. A tuple $\vec{a}$ in $\mathsf{ind} (\mathcal{A})$ is a \emph{certain answer} to ${\ensuremath{\boldsymbol{Q}}}(\vec{x})$ over an ABox $\mathcal{A}$ if $\mathcal{I} \models {\boldsymbol{q}}(\vec{a})$ for all models $\mathcal{I}$ of ${\cal T}$ and ${\cal A}$; in this case we write \mbox{${\cal T},{\cal A} \models {\boldsymbol{q}}(\vec{a})$}. If $\vec{x} = \emptyset$, then a certain answer to ${\ensuremath{\boldsymbol{Q}}}$ over ${\cal A}$ is `yes' if ${\cal T},{\cal A} \models {\boldsymbol{q}}$ and `no' otherwise. We often regard a CQ ${\boldsymbol{q}}$ as the set of its atoms.
Every consistent \textsl{OWL\,2\,QL}{} \emph{knowledge base} (KB) $({\cal T},{\cal A})$ has a \emph{canonical model}
$\C_{\T, \A}$ with the property that
${\cal T},{\cal A} \models {\boldsymbol{q}}(\vec{a})$ iff $\C_{\T, \A} \models {\boldsymbol{q}}(\vec{a})$,
for any CQ ${\boldsymbol{q}}$ and any $\vec{a}$ in $\mathsf{ind}({\cal A})$.
Thus, CQ answering in \textsl{OWL\,2\,QL}{} amounts to finding a homomorphism from the given CQ into the canonical model.
Informally, $\C_{\T, \A}$ is obtained from ${\cal A}$ by repeatedly applying the axioms in ${\cal T}$,
introducing fresh elements
as needed to serve as witnesses for the existential quantifiers.
According to the standard construction (cf.~\cite{KR10our}),
the domain $\Delta^{\C_{\T, \A}}$ of $\C_{\T, \A}$ consists of words of the form
$a R_1 \dots R_n$ ($n \geq 0$) with $a\in\mathsf{ind}({\cal A})$ and $R_1 \dots R_n \in \ensuremath{\role_\T}^*$ such that
(\emph{i}) ${\cal T}, {\cal A} \models \exists R_1(a)$ and (\emph{ii}) $\exists R_i^- \sqsubseteq_{\cal T} \exists R_{i+1}$ and $R_i^- \not \sqsubseteq_{\cal T} R_{i+1}$, for $1 \leq i < n$.
We let $\mathbf{W}_\T$ consist of all words $R_1 \dots R_n \in \ensuremath{\role_\T}^*$ satisfying condition~(\emph{ii}).
A TBox ${\cal T}$ is \emph{of depth} $\omega$ if $\mathbf{W}_\T$ is infinite, and
\emph{of depth} $d< \omega$, if $d$ is the maximum length of the words in $\mathbf{W}_\T$.
A \emph{datalog program}, $\Pi$, is a finite set of Horn clauses
$\forall \vec{z}\, (\gamma_0 \leftarrow \gamma_1 \land \dots \land \gamma_m)$,
where each $\gamma_i$ is an atom $S(\vec{y})$ with $\vec{y} \subseteq \vec{z}$ or an equality $(z = z')$ with $z,z'\in \vec{z}$. (As usual, when writing clauses, we omit $\forall \vec{z}$.) The atom $\gamma_0$ is the \emph{head} of the clause, and $\gamma_1,\dots,\gamma_m$ its \emph{body}. All variables in the head must also occur in the body, and $=$ can only occur in the body.
The predicates in the heads of clauses in $\Pi$ are \emph{IDB predicates}, the rest (including~$=$) \emph{EDB predicates}.
A predicate $S$ \emph{depends} on $S'$ in $\Pi$ if $\Pi$ has a clause with $S$ in the head and $S'$ in the body; $\Pi$ is a \emph{nonrecursive datalog} (NDL) \emph{program} if the (directed) \emph{dependence graph} of the dependence relation is acyclic.
An \emph{NDL query} is a pair $(\Pi,G(\vec{x}))$, where $\Pi$ is an NDL program and $G(\vec{x})$ a predicate. A tuple $\vec{a}$ in $\mathsf{ind}({\cal A})$ is an \emph{answer to $(\Pi,G(\vec{x}))$ over} an ABox ${\cal A}$ if $G(\vec{a})$ holds in the first-order model with domain $\mathsf{ind}({\cal A})$ obtained by closing ${\cal A}$ under the clauses in $\Pi$; in this case we write $\Pi, {\cal A} \models G(\vec{a})$. The problem of checking whether $\vec{a}$ is an answer to $(\Pi,G(\vec{x}))$ over ${\cal A}$ is called the \emph{query evaluation problem}.
The \emph{arity of} $\Pi$ is the maximal arity, $\mathsf{r}(\Pi)$, of predicates in $\Pi$. The \emph{depth} of $(\Pi,G(\vec{x}))$ is the length, $\mathsf{d}(\Pi,G)$, of the longest directed path in the dependence graph for $\Pi$ starting from $G$.
NDL queries are \emph{equivalent} if they have exactly the same answers over any ABox.
An NDL query $(\Pi,G(\vec{x}))$ is an \emph{\text{NDL}-rewriting of an OMQ ${\ensuremath{\boldsymbol{Q}}}(\vec{x}) = ({\cal T},{\boldsymbol{q}}(\vec{x}))$ over H-complete ABoxes} in case ${\cal T},{\cal A}\models {\boldsymbol{q}}(\vec{a})$ iff $\Pi,\mathcal{A} \models G(\vec{a})$, for any H-complete ABox ${\cal A}$ and any tuple $\vec{a}$ in $\mathsf{ind} (\mathcal{A})$.
Rewritings \emph{over arbitrary ABoxes} are defined by dropping the condition that the ABoxes are H-complete.
Let $(\Pi, G(\vec{x}))$ be an \text{NDL}-rewriting of ${\ensuremath{\boldsymbol{Q}}}(\vec{x})$ over H-complete ABoxes. Denote by $\Pi^*$ the result of replacing each predicate $S$ in $\Pi$ with a fresh predicate $S^*$ and adding the clauses
$A^*(x) \leftarrow B'(x)$, for $B \sqsubseteq_{\cal T} A$, and
$P^*(x,y) \leftarrow R'(x,y)$, for $R \sqsubseteq_{\cal T} P$,
where $B'(x)$ and $R'(x,y)$ are the obvious first-order translations of $B$ and $R$ (for example, $B'(x) = \exists y\, R(x,y)$ if $B = \exists R$).
It is easy to see that $(\Pi^*,G^*(\vec{x}))$ is an \text{NDL}-rewriting of ${\ensuremath{\boldsymbol{Q}}}(\vec{x})$ over arbitrary ABoxes.
It is well-known~\cite{DBLP:journals/ws/CaliGL12} that, without loss of generality, we can only consider NDL-rewritings of OMQs $({\cal T},{\boldsymbol{q}}(\vec{x}))$ over ABoxes ${\cal A}$ that are \emph{consistent} with ${\cal T}$.
We call an NDL query $(\Pi,G(x_1,\dots,x_n))$ \emph{ordered} if each of its IDB predicates $S$ comes with fixed variables $x_{i_1},\dots,x_{i_k}$ ($1 \le i_1 < \dots < i_k \le n$), called the \emph{parameters of} $S$, such that (\emph{i}) every occurrence of $S$ in $\Pi$ is of the form $S(y_1,\dots,y_m,x_{i_1},\dots,x_{i_k})$, (\emph{ii}) the $x_i$ are the parameters of $G$, and (\emph{iii}) if $\vec{x}'$ are all the parameters in the body of a clause, then the head has $\vec{x}'$ among its parameters. The \emph{width} $\mathsf{w}(\Pi,G)$ of an ordered\linebreak $(\Pi,G)$ is the maximal number of non-parameter variables in a clause of $\Pi$. All our NDL-rewritings in Secs.~\ref{sec:boundedtw}--\ref{sec:boundedleaf} are ordered, so we now only consider ordered NDL queries.
\section{NL and LOGCFL Fragments of Nonrecursive Datalog}\label{sec3}
In this section, we identify two classes of (ordered) \text{NDL}{} queries with the evaluation problem in the complexity classes \ensuremath{\mathsf{NL}}{} and \ensuremath{\mathsf{LOGCFL}}{} for combined complexity.
Recall~\cite{Abitebouletal95} that an NDL program is called \emph{linear} if the body of its every clause contains at most one IDB predicate (remember that equality is an EDB predicate).
\begin{theorem}\label{linear-nl}
Fix some $\mathsf{w} > 0$. The combined complexity of evaluating linear NDL queries of width at most $\mathsf{w}$ is \ensuremath{\mathsf{NL}}-complete.
\end{theorem}
\begin{proof}
Let $(\Pi,G(\vec{x}))$ be a linear NDL query.
Deciding whether $\Pi, {\cal A} \models G(\vec{a})$ is reducible to finding a path to $G(\vec{a})$ from a certain set $X$ in the \emph{grounding graph} $\mathfrak{G}(\Pi, {\cal A},\vec{a})$ constructed as follows. The vertices of the graph are the ground atoms
obtained by taking an IDB atom from $\Pi$, replacing each of its parameters by the corresponding constant from $\vec{a}$, and replacing each non-parameter variable by some constant from ${\cal A}$. The graph has an edge from $S(\vec{c})$ to $S'(\vec{c}')$
iff the grounding of $\Pi$ contains a clause
$S'(\vec{c}')\leftarrow S(\vec{c})\land E_1(\vec{e}_1)\land \dots \land E_k(\vec{e}_k)$
with $E_j(\vec{e}_j) \in {\cal A}$, for $1\le j \le k$ (we assume that $(c=c) \in {\cal A}$).
The set $X$ consists of all vertices $S(\vec{c})$ with IDB predicates $S$ being
of in-degree 0 in the dependency graph of $\Pi$ for which there is a clause
$S(\vec{c}) \leftarrow E_1(\vec{e}_1)\land \dots \land E_k(\vec{e}_k)$ in the grounding
of $\Pi$ with $E_j(\vec{e}_j) \in {\cal A}$ \mbox{($1\le j \le k$)}.
Bounding the width of $(\Pi,G)$ ensures that
$\mathfrak{G}(\Pi, {\cal A},\vec{a})$ is of polynomial size and can be constructed by a deterministic Turing machine with separate input, write-once output and logarithmic-size working tapes.\qed
\end{proof}
The transformation of NDL-rewritings over H-complete ABoxes into rewritings for arbitrary ABoxes in Section~\ref{sec:prelims} does not preserve linearity.
However, we can still show that it suffices to consider the H-complete case:
\begin{lemma}\label{linear-arbitrary}
For any fixed $\mathsf{w} > 0$, there is an $\mathsf{L}^\ensuremath{\mathsf{NL}}$-transducer that, given a linear \text{NDL}-rewriting of an OMQ ${\ensuremath{\boldsymbol{Q}}}(\vec{x})$ over H-complete ABoxes that is of width at most $\mathsf{w}$, computes a linear NDL-rewriting of ${\ensuremath{\boldsymbol{Q}}}(\vec{x})$ over arbitrary ABoxes whose width is at most $\mathsf{w}+1$.
\end{lemma}
The complexity class \ensuremath{\mathsf{LOGCFL}}{} can be defined in terms of \emph{nondeterministic auxiliary pushdown automata} (NAuxPDAs)~\cite{DBLP:journals/jacm/Cook71}, which are nondeterministic Turing machines with an additional work tape constrained to operate as a pushdown store. Sudborough~\cite{sudborough78} proved that \ensuremath{\mathsf{LOGCFL}}{} coincides with the class of problems that are solved by NAuxPDAs running in logarithmic space and polynomial time (the space on the pushdown tape is not subject to the logarithmic bound).
We call an NDL query $(\Pi,G)$ \emph{skinny} if the body of any clause in $\Pi$ has $\le 2$ atoms.
\begin{lemma}\label{prop:SkinnyNDLEvaluation}
For any skinny NDL query $(\Pi, G(\vec{x}))$ and ABox ${\cal A}$, query evaluation can be done by an NAuxPDA in space $\log |\Pi| + \mathsf{w}(\Pi,G) \cdot \log |{\cal A}|$ and time $2^{O(\mathsf{d}(\Pi,G))}$.
\end{lemma}
\begin{proof}
Let $\Pi_{{\cal A}}^{\vec{a}}$ be the set of ground clauses obtained by first replacing each parameter in $\Pi$ by the corresponding constant from $\vec{a}$,
and then performing the standard grounding of $\Pi$ using the constants from ${\cal A}$.
Consider the monotone Boolean circuit $\boldsymbol{C}(\Pi,{\cal A},\vec{a})$ constructed as follows.
The output of $\boldsymbol{C}(\Pi,{\cal A},\vec{a})$ is $G(\vec{a})$.
For every atom $\gamma$ occurring in the head of a clause in $\Pi_{{\cal A}}^{\vec{a}}$, we take an \textsc{or}-gate whose output is $\gamma$ and inputs are the bodies of the clauses with head~$\gamma$; for every such body, we take an \textsc{and}-gate whose inputs are the atoms in the body. We set an input gate $\gamma$ to 1 iff $\gamma \in {\cal A}$. Clearly, $\boldsymbol{C}(\Pi,{\cal A},\vec{a})$ is a semi-unbounded fan-in circuit (where \textsc{or}-gates have arbitrarily many inputs, and \textsc{and}-gates two inputs) with $O(|\Pi| \cdot |{\cal A}|^{\mathsf{w}(\Pi,G)})$ gates and depth $O(\mathsf{d}(\Pi,G))$.
It is known that the nonuniform analog of \ensuremath{\mathsf{LOGCFL}}{} can be defined using families of semi-unbounded fan-in circuits of polynomial size and logarithmic depth. Moreover, there is an algorithm that, given such a circuit $\boldsymbol{C}$, computes the output using an NAuxPDA
in logarithmic space in the size of $\boldsymbol{C}$ and exponential time in the depth of $\boldsymbol{C}$~\cite[pp.~392--397]{DBLP:journals/jcss/Venkateswaran91}.
Observing that $\boldsymbol{C}(\Pi,{\cal A},\vec{a})$ can be computed by a deterministic logspace Turing machine, we conclude that the query evaluation problem can be solved by an NAuxPDA in space $\log |\Pi| + \mathsf{w}(\Pi,G) \cdot \log |{\cal A}|$ and time $2^{O(\mathsf{d}(\Pi,G))}$.\qed
\end{proof}
A function $\nu$ from the predicate names in $\Pi$ to $\mathbb N$ is a \emph{weight function for} an NDL-query $(\Pi, G(\vec{x}))$ if $\nu(P) > 0$, for any IDB $P$ in $\Pi$, and $\nu(P) \ge \nu(Q_1) + \dots + \nu(Q_n)$, for any
$P(\vec{z}) \leftarrow Q_1(\vec{z}_1) \land \dots \land Q_n(\vec{z}_n)$ in $\Pi$.
\begin{lemma}\label{thm:NDLToSkinny}
If $(\Pi, G(\vec{x}))$ has a weight function $\nu$, then it is equivalent to a skinny NDL query $(\Pi',G(\vec{x}))$ such that $|\Pi'|$ is polynomial in $|\Pi|$, $\mathsf{d}(\Pi',G) \le \mathsf{d}(\Pi,G) + \log \nu (G)$ and $\mathsf{w}(\Pi',G) \le \mathsf{w}(\Pi,G)$.
\end{lemma}
\begin{proof}
The proof is by induction on $\mathsf{d}(\Pi,G)$. If $\mathsf{d}(\Pi,G)=0$, we take $\Pi'=\Pi$.
Suppose $\Pi$ contains a clause $\psi$ of the form $G(\vec{z}) \leftarrow P_1(\vec{z}_1) \land \dots \land
P_k(\vec{z}_k)$ and, for each $1\le j \le k$, we have an NDL query $(\Pi'_{P_j},P_j)$ which is equivalent to $(\Pi, P_j)$ and such that
\begin{equation}\label{eq:depPj}
\mathsf{d}(\Pi'_{P_j},P_j) ~\le~ \mathsf{d}(\Pi_{P_j},P_j) + \log \nu(P_j) ~\le~ \mathsf{d}(\Pi,G) - 1 + \log \nu(P_j).
\end{equation}
We construct the Huffman tree~\cite{huf52} for the alphabet $\{1,\dots,k\}$, where the frequency of $j$ is $\nu(P_j)/\nu(G)$ (by definition, $\nu(G) >0$). The Huffman tree is binary and has $k$ leaves, denoted $1,\dots,k$, and $k-1$ internal nodes (including the root, $g$), and the length of the path from $g$ to any leaf $j$ at most $\lceil \log(\nu(G)/\nu(P_j))\rceil$. For each internal node $v$ of the tree (but the root), we take a predicate $P_v(\vec{z}_v)$, where $\vec{z}_v$ is the union of $\vec{z}_u$ for all descendants $u$ of $v$; for the root $g$, we take $P_g(\vec{z}_g) = G(\vec{z})$. Let $\Pi'_\psi$ be the extension of the union of $\Pi'_{P_j}$, for $1\leq j \leq k$, with clauses $P_v(\vec{z}_{v}) \leftarrow P_{u_1}(\vec{z}_{u_1}) \land P_{u_2}(\vec{z}_{u_2})$, for each $v$ with immediate successors $u_1$ and $u_2$.
The number of the new clauses is $k-1$. Consider the NDL query $(\Pi'_\psi,G(\vec{z}))$. By~\eqref{eq:depPj}, we have:
\begin{multline*}
\mathsf{d}(\Pi'_\psi,G) \le \max\nolimits_j \{ \lceil \log (\nu(G) / \nu(P_j)) \rceil + \mathsf{d}(\Pi'_{P_j},P_j) \} \le{} \\
\max\nolimits_j \{ \log (\nu(G) / \nu(P_j)) + \mathsf{d}(\Pi,G) + \log \nu(P_j) \} =
\log \nu(G) + \mathsf{d}(\Pi,G).
\end{multline*}
Let $\Pi'$ be the result of applying this transformation to
each clause in $\Pi$ with head $G(\vec{z})$.
It is readily seen that $(\Pi',G)$ is as required; in particular, $|\Pi'|= O(|\Pi|^2)$. \qed
\end{proof}
\begin{theorem} Fix $c \ge 1$, $\mathsf{w} \ge 1$ and a polynomial $p$. Query evaluation for NDL queries $(\Pi, G(\vec{x}))$ with a weight function $\nu$ such that $\nu(G) \le p(|\Pi|)$, $\mathsf{w}(\Pi,G) \le \mathsf{w}$ and
$\mathsf{d}(\Pi,G) \le c \log \nu(G)$ is in \ensuremath{\mathsf{LOGCFL}}{} for combined complexity.
\end{theorem}
\begin{proof}
By Lemma~\ref{thm:NDLToSkinny}, $(\Pi,G)$ is equivalent to a skinny NDL query $(\Pi',G')$ with $|\Pi'|$ polynomial in $|\Pi|$, $\mathsf{w}(\Pi',G) \le \mathsf{w}$, and $\mathsf{d}(\Pi',G') \le (c + 1)\log \nu(G)$. By
Lemma~\ref{prop:SkinnyNDLEvaluation}, query evaluation for $(\Pi',G')$ over ${\cal A}$ is solved by an NAuxPDA in space $\log |\Pi'| + \mathsf{w}(\Pi',G) \cdot \log |{\cal A}| = O(\log |\Pi|+ \log |{\cal A}|)$ and time $2^{O(\mathsf{d}(\Pi',G'))} \le 2^{O(\log \nu(G))} = (\nu(G))^{O(1)} \le p'(|\Pi|)$, for some polynomial $p'$.\qed
\end{proof}
\begin{corollary}\label{cor:weight}
Suppose there is an algorithm that, given any OMQ ${\ensuremath{\boldsymbol{Q}}}(\vec{x})$ from some class~$\mathcal{C}$, constructs its NDL-rewriting $(\Pi,G(\vec{x}))$ over H-complete ABoxes having a weight function $\nu$ with $\nu(G) \le |{\ensuremath{\boldsymbol{Q}}}|$ and $\mathsf{d}(\Pi,G) \le c \log \nu(G)$, and such that $\mathsf{w}(\Pi,G) \le \mathsf{w}$ and $|{\ensuremath{\boldsymbol{Q}}}| \le |\Pi| \le p(|{\ensuremath{\boldsymbol{Q}}}|)$, for some fixed constants $c$, $\mathsf{w}$ and polynomial $p$.
Then the evaluation problem for the NDL-rewritings $(\Pi^*,G^*(\vec{x}))$ of the OMQs in $\mathcal{C}$ over arbitrary ABoxes \textup{(}defined in Section~\ref{sec:prelims}\textup{)} is in \ensuremath{\mathsf{LOGCFL}}{} for combined complexity.
\end{corollary}
\section{Bounded Treewidth CQs and Bounded-Depth TBoxes}\label{sec:boundedtw}
With every CQ ${\boldsymbol{q}}$, we associate its \emph{Gaifman graph} $\mathcal{G}$ whose vertices are the variables of ${\boldsymbol{q}}$ and edges are the pairs $\{u,v\}$ such that $P(u,v)\in{\boldsymbol{q}}$, for some $P$. We call ${\boldsymbol{q}}$ \emph{tree-shaped} if $\mathcal{G}$ is a tree; ${\boldsymbol{q}}$ is \emph{connected} if the graph $\mathcal{G}$ is connected.
A \emph{tree decomposition} of an undirected graph $\mathcal{G}=(V,E)$ is a pair $(T,\lambda)$, where $T$ is an (undirected) tree and $\lambda$ a function from the set of nodes of $T$ to $2^V$ such that
the following conditions hold:
\begin{itemize}
\item[--] for every $v \in V$, there exists a node $t$ with $v \in \lambda(t)$;
\item[--] for every $e \in E$, there exists a node $t$ with $e \subseteq \lambda(t)$;
\item[--] for every $v \in V$, the nodes $\{t\mid v \in \lambda(t)\} $ induce a connected subtree of~$T$.
\end{itemize}
We call the set $\lambda(t) \subseteq V$ a \emph{bag for} $t$. The \emph{width} of $(T, \lambda)$ is $\max_{t\in T} |\lambda(t)| - 1$. The \emph{treewidth of a graph} $\mathcal{G}$ is the minimum width over all tree decompositions of $\mathcal{G}$. The \emph{treewidth of a CQ} is the treewidth of its Gaifman graph.
\begin{example}\label{ex:rewriting:1}
Consider CQ ${\boldsymbol{q}}(x_0, x_7)$ depicted below (black nodes are answer variables):\\
\centerline{\begin{tikzpicture}[>=latex]\footnotesize
\node[bpoint,label=below:{$x_0$}] (v0) at (0,0) {};
\node[wpoint,label=below:{$x_1$}] (v1) at (1.5,0) {};
\node[wpoint,label=below:{$x_2$}] (v2) at (3,0) {};
\node[wpoint,label=below:{$x_3$}] (v3) at (4.5,0) {};
\node[wpoint,label=below:{$x_4$}] (v4) at (6,0) {};
\node[wpoint,label=below:{$x_5$}] (v5) at (7.5,0) {};
\node[wpoint,label=below:{$x_6$}] (v6) at (9,0) {};
\node[bpoint,label=below:{$x_7$}] (v7) at (10.5,0) {};
\begin{scope}[thick,shorten >= 2pt, shorten <= 2pt]\scriptsize
\draw[->] (v0) to node[above] {$R$} (v1);
\draw[->] (v1)to node[above] {$S$} (v2);
\draw[->] (v2) to node[above] {$R$} (v3);
\draw[->] (v3) to node[above] {$R$} (v4);
\draw[->] (v4) to node[above] {$S$} (v5);
\draw[->] (v5) to node[above] {$R$} (v6);
\draw[->] (v6) to node[above] {$R$} (v7);
\end{scope}
\end{tikzpicture}}\\
Its natural tree decomposition of treewidth 1 is based on the the chain $T$ of 7~vertices, which are represented as bags as follows:\\[2pt]
\centerline{\begin{tikzpicture}[>=latex,yscale=0.8]\scriptsize
\draw[rounded corners=3mm,fill=gray!7] (-0.7,-0.6) rectangle (9.7,1.6);
\foreach \x in {0,1.5,3,4.5,6,7.5,9} {
\draw[fill=gray!20,thin] (\x,0.5) ellipse (0.4 and 1);
}
\foreach \x in {0,1.5,3,4.5,6,7.5} {
\draw[thick] (\x+0.5,0.5) -- +(0.5,0);
}
\node[bpoint,label=below:{$x_0$}] (v0) at (0,0) {};
\node[wpoint,label=above:{$x_1$}] (v1p) at (0,1) {};
\node[wpoint,label=below:{$x_1$}] (v1) at (1.5,0) {};
\node[wpoint,label=above:{$x_2$}] (v2p) at (1.5,1) {};
\node[wpoint,label=below:{$x_2$}] (v2) at (3,0) {};
\node[wpoint,label=above:{$x_3$}] (v3p) at (3,1) {};
\node[wpoint,label=below:{$x_3$}] (v3) at (4.5,0) {};
\node[wpoint,label=above:{$x_4$}] (v4p) at (4.5,1) {};
\node[wpoint,label=below:{$x_4$}] (v4) at (6,0) {};
\node[wpoint,label=above:{$x_5$}] (v5p) at (6,1) {};
\node[wpoint,label=below:{$x_5$}] (v5) at (7.5,0) {};
\node[wpoint,label=above:{$x_6$}] (v6p) at (7.5,1) {};
\node[wpoint,label=below:{$x_6$}] (v6) at (9,0) {};
\node[bpoint,label=above:{$x_7$}] (v7p) at (9,1) {};
\begin{scope}[thick,shorten >= 2pt, shorten <= 2pt]\scriptsize
\draw[->] (v0) to node[left] {$R$} (v1p);
\draw[->] (v1)to node[left] {$S$} (v2p);
\draw[->] (v2) to node[left] {$R$} (v3p);
\draw[->] (v3) to node[left] {$R$} (v4p);
\draw[->] (v4) to node[left] {$S$} (v5p);
\draw[->] (v5) to node[left] {$R$} (v6p);
\draw[->] (v6) to node[left] {$R$} (v7p);
\end{scope}
\end{tikzpicture}}
\end{example}
Fix a connected CQ ${\boldsymbol{q}}(\vec{x})$ and a tree decomposition $(T, \lambda)$ of its Gaifman graph $\mathcal{G} = (V,E)$.
Let $D$ be a subtree of $T$. The \emph{size} of $D$ is the number of nodes in it.
We call a node $t$ of $D$ \emph{boundary} if $T$ has an edge $\{t,t'\}$ with $t'\notin D$, and let the \emph{degree} $\mathsf{deg}(D)$ of $D$ be the number of its boundary nodes. Note that $T$ itself is the only subtree of $T$ of degree $0$. We say that a node $t$ \emph{splits} $D$ into subtrees $D_1,\dots,D_k$ if the $D_i$ partition $D$ without $t$: each node of $D$ except $t$ belongs to exactly one $D_i$.
\begin{lemma}[\cite{DBLP:conf/lics/BienvenuKP15}]\label{l:6.8}
Let $D$ be a subtree of $T$ of size $m > 1$.\\
If $\mathsf{deg}(D) =2$, then there is a node $t$ splitting $D$ into subtrees of size $\leq m/2 $ and degree~$\leq 2$ and, possibly, one subtree of size $<m-1$ and degree~$1$.\\
If $\mathsf{deg}(D) \leq 1$, then there is $t$ splitting $D$ into subtrees of size $\leq m/2 $ and degree $\leq 2$.
\end{lemma}
In Example~\ref{ex:rewriting:1}, $t$ splits $T$ into $T_1$ and $T_2$ depicted below:\\[2pt]
\centerline{\begin{tikzpicture}[>=latex,yscale=0.8]\scriptsize
\draw[rounded corners=3mm,fill=gray!7] (-0.9,-0.7) rectangle (9.9,1.7);
\draw[rounded corners=3mm,fill=gray!50] (-0.7,-0.6) rectangle (3.7,1.6);
\node at (2.3,1.3) {\normalsize $T_1$};
\draw[rounded corners=3mm,fill=gray!50] (5.3,-0.6) rectangle (9.7,1.6);
\node at (6.8,1.3) {\normalsize $T_2$};
\node at (4.85,1.5) {\normalsize $t$};
\foreach \x in {0,1.5,3,4.5,6,7.5,9} {
\draw[fill=gray!20,thin] (\x,0.5) ellipse (0.4 and 1);
}
\foreach \x in {0,1.5,3,4.5,6,7.5} {
\draw[thick] (\x+0.5,0.5) -- +(0.5,0);
}
\node[bpoint,label=below:{$x_0$}] (v0) at (0,0) {};
\node[wpoint,label=above:{$x_1$}] (v1p) at (0,1) {};
\node[wpoint,label=below:{$x_1$}] (v1) at (1.5,0) {};
\node[wpoint,label=above:{$x_2$}] (v2p) at (1.5,1) {};
\node[wpoint,label=below:{$x_2$}] (v2) at (3,0) {};
\node[wpoint,label=above:{$x_3$}] (v3p) at (3,1) {};
\node[wpoint,label=below:{$x_3$}] (v3) at (4.5,0) {};
\node[wpoint,label=above:{$x_4$}] (v4p) at (4.5,1) {};
\node[wpoint,label=below:{$x_4$}] (v4) at (6,0) {};
\node[wpoint,label=above:{$x_5$}] (v5p) at (6,1) {};
\node[wpoint,label=below:{$x_5$}] (v5) at (7.5,0) {};
\node[wpoint,label=above:{$x_6$}] (v6p) at (7.5,1) {};
\node[wpoint,label=below:{$x_6$}] (v6) at (9,0) {};
\node[bpoint,label=above:{$x_7$}] (v7p) at (9,1) {};
\begin{scope}[thick,shorten >= 2pt, shorten <= 2pt]\scriptsize
\draw[->] (v0) to node[left] {$R$} (v1p);
\draw[->] (v1)to node[left] {$S$} (v2p);
\draw[->] (v2) to node[left] {$R$} (v3p);
\draw[->] (v3) to node[left] {$R$} (v4p);
\draw[->] (v4) to node[left] {$S$} (v5p);
\draw[->] (v5) to node[left] {$R$} (v6p);
\draw[->] (v6) to node[left] {$R$} (v7p);
\end{scope}
\end{tikzpicture}}
\smallskip
We define recursively a set $\mathsf{sub}(T)$ of subtrees of $T$, a binary relation $\prec$ on $\mathsf{sub}(T)$ and a function $\sigma$ on $\mathsf{sub}(T)$ indicating the splitting node. We begin by adding $T$ to $\mathsf{sub}(T)$. Take $D\in \mathsf{sub}(T)$ that has not been split yet. If $D$ is of size~1 then let $\sigma(D)$ be the only node of $D$. Otherwise, by Lemma~\ref{l:6.8}, we find a node $t$ in $D$ that splits it into $D_1,\dots,D_k$. We set $\sigma(D) = t$ and, for each $1\leq i\leq k$, add $D_i$ to $\mathsf{sub}(T)$ and set $D_i \prec D$; then, we apply the procedure recursively to each of $D_1,\dots,D_k$.
In Example~\ref{ex:rewriting:1} with $t$ splitting $T$, we have $\sigma(T) = t$, $T_1 \prec T$ and
$T_2 \prec T$.
For each $D\in\mathsf{sub}(T)$, we recursively define a set of atoms ${\boldsymbol{q}}_D$ by taking
$$
{\boldsymbol{q}}_D \ \ = \ \ \bigl\{S(\vec{v}) \in {\boldsymbol{q}} \mid \vec{v} \subseteq \lambda(\sigma(D)) \bigr\} \ \cup \ \bigcup\nolimits_{D' \prec D} {\boldsymbol{q}}_{D'}.
$$
By the definition of tree decomposition, ${\boldsymbol{q}}_T = {\boldsymbol{q}}$. Denote by $\vec{x}_D$ the subset of $\mathsf{avar}({\boldsymbol{q}})$ that occur in ${\boldsymbol{q}}_D$. In our running example, $\vec{x}_{T} = \{x_0, x_7\}$, $\vec{x}_{T_1} = \{x_0\}$
and $\vec{x}_{T_2} = \{x_7\}$.
Denote by $\partial D$ the union of all $\lambda(t) \cap\lambda(t')$ for
a boundary node $t$ of $D$ and its unique neighbour $t'$ in $T$ \emph{outside} $D$. If $D$ is a singleton $\{d\}$, then $\partial D$ consists of those variables in $\lambda(d)$ that occur in at least one other bag.
In our example, $\partial T=\emptyset$, $\partial T_1 =\{x_3\}$ and $\partial T_2 =\{x_4\}$.
Let ${\cal T}$ be a TBox of finite depth $k$. A \emph{type} is a partial map $\vec{w}$ from
$V$ to $\mathbf{W}_\T$; its domain is denoted by $\mathsf{dom}(\vec{w})$. By $\vec{\varepsilon}$ we denote the unique partial type with \mbox{$\mathsf{dom}(\vec{\varepsilon}) = \emptyset$}.
We use types to represent how variables are mapped into $\C_{\T, \A}$, with $\vec{w}(u)=w$ indicating that $u$ is mapped to an element of the form $a w$ (for some $a \in \mathsf{ind}({\cal A})$), and
with $\vec{w}(u)=\varepsilon$ that $u$ is mapped to an ABox individual.
We say that a type $\vec{w}$ is \emph{compatible} with
a bag $t$ if, for all $u,v\in\lambda(t)\cap\mathsf{dom}(\vec{w})$, we have
\begin{itemize}\itemsep=0pt
\item if $v \in \mathsf{avar}({\boldsymbol{q}})$, then $\vec{w}(v) = \varepsilon$;
\item if $A(v) \in {\boldsymbol{q}}$, then either $\vec{w}(v)=\varepsilon$ or
$\vec{w}(v)= w R \text{ with } \exists R^- \sqsubseteq_{\cal T} A$;
\item if $R(v, u)\in {\boldsymbol{q}}$, then
$\vec{w}(v) = \vec{w}(u) =\varepsilon$, or \mbox{$\vec{w}(u) = \vec{w}(v) R'$} with $R' \sqsubseteq_{\cal T} R$,
or $\vec{w}(v) = \vec{w}(u) R'$ with $R' \sqsubseteq_{\cal T} R^-$.
\end{itemize}
In the sequel, we abuse notation and use sets of variables in place of sequences assuming that they are ordered in some (fixed) way. For example, we use $\vec{x}_D$ for a tuple of variables in the set $\vec{x}_D$ (ordered in some way). Also, given a tuple $\vec{a}$ in $\mathsf{ind}({\cal A})$ of length $|\vec{x}_D|$ and $x\in\vec{x}_D$, we write $\vec{a}(x)$ to refer to the element of $\vec{a}$ that corresponds to $x$ (that is, to the component of the tuple with the same index).
Let $\Pi_{\ensuremath{\boldsymbol{Q}}}$ be an NDL program that---for any $D\in\mathsf{sub}(T)$, any types $\vec{w}$ and $\vec{s}$ for which $\mathsf{dom} (\vec{w})=\partial D$, $\mathsf{dom}(\vec{s}) = \lambda(\sigma(D))$, $\vec{s}$ is compatible with $\sigma(D)$ and agrees with $\vec{w}$ on their common domain---contains the clause
\begin{equation}
G^{\vec{w}}_D(\partial D, \vec{x}_D) \ \ \leftarrow \ \ \mathsf{At}^{\vec{s}} \ \land
\bigwedge\nolimits_{D' \prec D} G^{(\vec{s}\cup\vec{w}) \upharpoonright\partial D'}_{D'}(\partial D',\vec{x}_{D'}),
\end{equation}
where $\vec{x}_D$ are the parameters of predicate $G^{\vec{w}}_D$,
$(\vec{s}\cup\vec{w}) \upharpoonright\partial D'$ is
the restriction\footnote{
By construction,
$\mathsf{dom}(\vec{s}\cup\vec{w})$ covers $\partial D'$, and so
the domain of
$(\vec{s}\cup\vec{w}) \upharpoonright \partial D'$ is $\partial D'$.
} of the union $\vec{s}\cup\vec{w}$ of $\vec{s}$ and $\vec{w}$ to $\partial D'$,
and $\mathsf{At}^{\vec{s}}$ is defined as follows:
\begin{equation}\label{eq:at}
\mathsf{At}^{\vec{s}} \ \ \ =\ \ \bigwedge_{\substack{A(u)\in{\boldsymbol{q}}\\\vec{s}(u) = \varepsilon}} \hspace*{-0.5em}A(u) \ \ \ \land
\bigwedge_{\substack{R(u,v)\in {\boldsymbol{q}}\\ \vec{s}(u) = \vec{s}(v) = \varepsilon}} \hspace*{-1.5em}R(u, v) \ \ \ \land
\bigwedge_{\substack{R(u,v)\in {\boldsymbol{q}}\\ \vec{s}(u) \ne\varepsilon \text{ or } \vec{s}(v) \ne \varepsilon}} \hspace*{-2em} (u = v) \ \ \ \land
\bigwedge_{\substack{\vec{s}(u) = Sw'\\\text{ for some } w'}} \hspace*{-1em}A_S(u).
\end{equation}
The first two conjunctions in $\mathsf{At}^{\vec{s}}$ ensure that atoms all of whose variables are assigned $\varepsilon$
are present in the ABox. The third conjunction ensures that if one of the variables in a role atom is not mapped to $\varepsilon$,
then the images of the variables share the same initial individual.
Finally, atoms in the final conjunction ensure that if a variable is to be mapped to $aSw'$,
then the individual $a$ satisfies $\exists S$ (so $aSw'$ is part of the domain of $\C_{\T, \A}$).
\begin{example}\label{ex:rewriting:2}
Now we fix an ontology ${\cal T}$ with the following axioms:
\begin{align*}
A & \equiv \exists P, & P & \sqsubseteq S, & P & \sqsubseteq R^-, &\qquad
B & \equiv \exists Q, & Q & \sqsubseteq R, & Q & \sqsubseteq S^-.
\end{align*}
Since $\lambda(t) = \{ x_3, x_4\}$, there are only three types compatible with $t$:
\begin{equation*}
\vec{s}_1\colon x_3\mapsto \varepsilon, x_4\mapsto \varepsilon,\qquad \vec{s}_2\colon x_3 \mapsto P, x_4\mapsto \varepsilon\quad \text{ and }\quad
\vec{s}_3\colon x_3 \mapsto \varepsilon, x_4\mapsto Q.
\end{equation*}
So,
$\mathsf{At}^{\vec{s}_1} = R(x_3, x_4)$,
$\mathsf{At}^{\vec{s}_2} = A(x_3) \land (x_3 = x_4)$,
$\mathsf{At}^{\vec{s}_3} = B(x_4) \land (x_3 = x_4)$.
Thus, predicate $G^{\vec{\varepsilon}}_{T}$ is defined by the following clauses, for $\vec{s}_1$, $\vec{s}_2$ and $\vec{s}_3$, respectively:
\begin{align*}
G^{\vec{\varepsilon}}_{T} (x_0,x_7) &\leftarrow G^{x_3\mapsto\varepsilon}_{T_1} (x_3, x_0)\land R(x_3, x_4)\land G^{x_4\mapsto\varepsilon}_{T_2}(x_4, x_7),\\
G^{\vec{\varepsilon}}_{T} (x_0,x_7) &\leftarrow G^{x_3\mapsto P}_{T_1} (x_3,x_0)\land A(x_3)\land (x_3 = x_4)\land G^{x_4\mapsto\varepsilon}_{T_2}(x_4, x_7),\\
G^{\vec{\varepsilon}}_{T} (x_0,x_7) &\leftarrow G^{x_3\mapsto\varepsilon}_{T_1} (x_3,x_0)\land B(x_4)\land (x_3 = x_4)\landG^{x_4\mapsto Q}_{T_2} (x_4, x_7).
\end{align*}
\end{example}
By induction on $\prec$ on $\mathsf{sub}(T)$,
we show that $(\Pi_{\ensuremath{\boldsymbol{Q}}}, G^{\vec{\varepsilon}}_T)$ is a rewriting of ${\ensuremath{\boldsymbol{Q}}}(\vec{x})$.
\begin{lemma}\label{prop:logdepth:rewriting}
For any ABox ${\cal A}$, any $D \in \mathsf{sub}(T)$, any type $\vec{w}$ with $\mathsf{dom}(\vec{w}) = \partial D$, any $\vec{b} \in \mathsf{ind}({\cal A})^{|\partial D|}$ and $\vec{a}\in \mathsf{ind}({\cal A})^{|\vec{x}_D|}$, we have $\Pi_{\ensuremath{\boldsymbol{Q}}},{\cal A} \models G^{\vec{w}}_D(\vec{b}, \vec{a})$ iff there is a homomorphism $h\colon {\boldsymbol{q}}_D \to \C_{\T, \A}$ such that
\begin{equation*}
h(x) = \vec{a}(x), \text{ for } x\in \vec{x}_D, \quad\text{ and }\quad
h(v) = \vec{b}(v) \vec{w}(v), \text{ for } v\in \partial D.
\end{equation*}
\end{lemma}
Fix now $k$ and $t$, and consider the class of OMQs ${\ensuremath{\boldsymbol{Q}}}(\vec{x}) = ({\cal T},{\boldsymbol{q}}(\vec{x}))$ with ${\cal T}$ of depth~$\leq k$ and ${\boldsymbol{q}}$ of treewidth $\leq t$. Let $T$ be a tree decomposition of ${\boldsymbol{q}}$ of treewidth~$\leq t$. We take the following weight function: $\nu(G^{\vec{w}}_D) = |D|$. Clearly, $\nu(G^{\vec{\varepsilon}}_T) \le |{\ensuremath{\boldsymbol{Q}}}|$. By Lemma~\ref{l:6.8},
$\mathsf{d}(\Pi_{\ensuremath{\boldsymbol{Q}}},G^{\vec{\varepsilon}}_T) \le 2 \log |T| = 2 \log \nu(G^{\vec{\varepsilon}}_T) \le 2 \log |{\ensuremath{\boldsymbol{Q}}}|$.
Since $|\mathsf{sub}(T)| \le |T|^2$ and
there are at most $|{\cal T}|^{2tk}$ options for $\vec{w}$, there are polynomially
many predicates $G^{\vec{w}}_D$, and so $\Pi_{\ensuremath{\boldsymbol{Q}}}$ is of polynomial size. Thus, by Corollary~\ref{cor:weight}, the obtained NDL-rewriting over arbitrary ABoxes can be evaluated in \ensuremath{\mathsf{LOGCFL}}{}. Finally, we note that a tree decomposition of treewidth $\leq t$ can be computed using an $\textsf{L}^{\ensuremath{\mathsf{LOGCFL}}}$-transducer~\cite{DBLP:conf/icalp/GottlobLS99}, and so the NDL-rewriting can also be constructed by an $\textsf{L}^{\ensuremath{\mathsf{LOGCFL}}}$-transducer.
\section{Bounded-Leaf CQs and Bounded-Depth TBoxes}\label{sec:5}
We next consider OMQs with tree-shaped CQs
in which both the depth of the ontology and the number of leaves in the CQ are bounded.
Let ${\cal T}$ be a TBox of finite depth $k$,
and let ${\boldsymbol{q}}(\vec{x})$ be a tree-shaped CQ with at most $\ell$ leaves.
Fix one of the variables of ${\boldsymbol{q}}$ as root, and let $M$ be the maximal distance to a leaf from the root.
For $n \leq M$, let
$\vec{z}^n$ denote the set of all variables of ${\boldsymbol{q}}$ at distance $n$
from the root; clearly, $|\vec{z}^n| \le \ell$.
We call the $\vec{z}^n$ \emph{slices} of ${\boldsymbol{q}}$ and observe that
they satisfy the following: for every
$R(u,v) \in {\boldsymbol{q}}$ with $u \neq v$, there exists $0 \leq n < M$ such that either $u\in \vec{z}^n$ and $v\in \vec{z}^{n+1}$ or $u\in\vec{z}^{n+1}$ and $v\in \vec{z}^n$.
For $0 \leq n \leq M$, we denote by ${\boldsymbol{q}}_n(\vec{z}^n_{\scriptscriptstyle\exists}, \vec{x}^n)$ the query
consisting of all atoms $S(\vec{u})$ of ${\boldsymbol{q}}$ such that $\vec{u} \subseteq \bigcup_{n \leq m \leq M} \vec{z}^m$,
where
$\vec{x}^n=\mathsf{var}({\boldsymbol{q}}_n) \cap \vec{x}$ and
$\vec{z}^n_{\scriptscriptstyle\exists} = \vec{z}^n \setminus \vec{x} $.
By \emph{type of a slice} $\vec{z}^n$, we mean
a total map $\vec{w}$ from $\vec{z}^n$ to $\mathbf{W}_\T$.
Analogously to Section~\ref{sec:boundedtw},
we define what it means for a type (or pair of types) to be compatible
with a slice (pair of adjacent slices).
We call $\vec{w}$ \emph{locally compatible} with $\vec{z}^{n}$ if for every $z \in \vec{z}^n$:
\begin{itemize}
\item if $z \in \mathsf{avar}({\boldsymbol{q}})$, then $\vec{w}(z) = \varepsilon$;
\item if $A(z) \in {\boldsymbol{q}}$, then either $\vec{w}(z)= \varepsilon$ or
$\vec{w}(z)= w R$ with $\exists R^- \sqsubseteq_{\cal T} A$;
\item if $R(z, z) \in {\boldsymbol{q}}$, then $\vec{w}(z) = \varepsilon$.
\end{itemize}
If $\vec{w}, \vec{s}$ are types for $\vec{z}^{n}$ and $\vec{z}^{n+1}$ respectively,
then we call $(\vec{w}, \vec{s})$ \emph{compatible} with
$(\vec{z}^{n}, \vec{z}^{n+1})$ if
$\vec{w}$ is locally compatible with $\vec{z}^{n}$,
$\vec{s}$ is locally compatible with $\vec{z}^{n+1}$, and
for every atom
$R(z^n, z^{n+1}) \in {\boldsymbol{q}}$, one of the following holds:
(\emph{i}) $
\vec{w}(z^{n}) =\vec{s}(z^{n+1})
= \varepsilon$,
(\emph{ii}) $\vec{s}(z^{n+1})= \vec{w}(z^{n}) R'$ with $ R' \sqsubseteq_{\cal T} R$, or
(\emph{iii}) $\vec{w}(z^{n}) = \vec{s}(z^{n+1}) R' $ with $R' \sqsubseteq_{\cal T} R^-$.
Consider the \text{NDL}\ program $\Pi_{\ensuremath{\boldsymbol{Q}}}'$ defined as follows.
For every $0 \leq n < M$
and every pair of types $(\vec{w}, \vec{s})$ that is compatible with $(\vec{z}^n, \vec{z}^{n+1})$, we include the clause:
\begin{equation*}
P^{\vec{w}}_{n}(\vec{z}^{n}_{\scriptscriptstyle\exists}, \vec{x}^n) \leftarrow
\mathsf{At}^{\vec{w}\cup\vec{s}}(\vec{z}^n,\vec{z}^{n+1}) \land P^{\vec{s}}_{n+1}(\vec{z}^{n+1}_{\scriptscriptstyle\exists}, \vec{x}^{n+1}),
\end{equation*}
where $\vec{x}^n$ are the parameters of
$P^{\vec{w}}_{n}$ and $\mathsf{At}^{\vec{w}\cup\vec{s}}(\vec{z}^n,\vec{z}^{n+1})$
is the conjunction of atoms~\eqref{eq:at}, as defined in Section~\ref{sec:boundedtw}, for the union $\vec{w}\cup\vec{s}$ of types $\vec{w}$ and $\vec{s}$.
For every type $\vec{w}$ locally compatible with $\vec{z}^M$, we include the clause:
\begin{equation*}
P^{\vec{w}}_{M}(\vec{z}^{M}_{\scriptscriptstyle\exists}, \vec{x}^M) \leftarrow \mathsf{At}^{\vec{w}}(\vec{z}^M).
\end{equation*}
(Recall that $\vec{z}^M$ is a disjoint union of $\vec{z}^M_{\scriptscriptstyle\exists}$ and $\vec{x}^M$.) We use $G$, with parameters $\vec{x}$, as the goal predicate and include
$G(\vec{x}) \leftarrow P^{\vec{w}}_{0}(\vec{z}^{0}, \vec{x})$
for every predicate $P^{\vec{w}}_{0}(\vec{z}^{0}, \vec{x}^0) $ occurring in the head of one of the preceding clauses.
The following lemma (which is proved by induction) is the key step in showing that $(\Pi_{\ensuremath{\boldsymbol{Q}}}',G(\vec{x}))$
is a rewriting of $({\cal T}, {\boldsymbol{q}})$ over H-complete ABoxes:
\begin{lemma}\label{nl-rewriting-correct}
For any H-complete ABox ${\cal A}$, any $0 \leq n \leq M$, any predicate $P^{\vec{w}}_n$,
any $\vec{b} \in \mathsf{ind}({\cal A})^{|\vec{z}^n_\exists|}$ and any $\vec{a}\in \mathsf{ind}({\cal A})^{|\vec{x}^n|}$,
we have
$\Pi_{\ensuremath{\boldsymbol{Q}}}',{\cal A} \models P^{\vec{w}}_n(\vec{b}, \vec{a})$ iff there is a homomorphism
$h\colon {\boldsymbol{q}}_n \to \C_{\T, \A}$ such that
\begin{equation}\label{nl-rewriting-eq}
h(x) = \vec{a}(x), \text{ for } x\in \vec{x}^n, \quad\text{ and }\quad
h(z) = \vec{b}(z) \vec{w}(z), \text{ for } z\in\vec{z}^n_{\scriptscriptstyle\exists}.
\end{equation}
\end{lemma}
It should be clear that $\Pi_{\ensuremath{\boldsymbol{Q}}}'$ is a linear NDL program
of width at most~$2 \ell$. Moreover, when $\ell$ and $k$ are bounded by fixed constants,
it takes only logarithmic space to store a type $\vec{w}$, which allows us to show
that
$\Pi'_{\ensuremath{\boldsymbol{Q}}}$ can be computed
by an $\mathsf{L}^\ensuremath{\mathsf{NL}}$-transducer. We can apply Lemma~\ref{linear-arbitrary} to obtain
an NDL rewriting for arbitrary ABoxes,
and then use Theorem~\ref{linear-nl} to conclude that the resulting
program can be evaluated in \ensuremath{\mathsf{NL}}.
\section{Bounded-Leaf CQs and Arbitrary TBoxes}\label{sec:boundedleaf}
For OMQs with bounded-leaf CQs and ontologies of unbounded depth,
our rewriting utilises the notion of tree witness~\cite{DBLP:conf/kr/KikotKZ12}.
Let ${\ensuremath{\boldsymbol{Q}}}(\vec{x}) = ({\cal T},{\boldsymbol{q}}(\vec{x}))$ with ${\boldsymbol{q}}(\vec{x}) = \exists \vec{y}\, \varphi(\vec{x}, \vec{y})$.
For a pair $\mathsf{t} = (\mathsf{t}_\mathsf{r}, \mathsf{t}_\mathsf{i})$ of disjoint sets of variables in ${\boldsymbol{q}}$, with $\mathsf{t}_\mathsf{i}\subseteq \vec{y}$
and $\mathsf{t}_\mathsf{i} \ne\emptyset$, set
\begin{equation*}
{\boldsymbol{q}}_\mathsf{t} \ = \ \bigl\{\, S(\vec{z}) \in {\boldsymbol{q}} \mid \vec{z} \subseteq \mathsf{t}_\mathsf{r}\cup \mathsf{t}_\mathsf{i} \text{ and } \vec{z}\not\subseteq \mathsf{t}_\mathsf{r}\,\bigr\}.
\end{equation*}
If ${\boldsymbol{q}}_\mathsf{t}$ is a minimal subset of ${\boldsymbol{q}}$ for which there is a homomorphism $h \colon {\boldsymbol{q}}_\mathsf{t} \to {\cal C}_{\cal T}^{\smash{A_R(a)}}$ such that $\mathsf{t}_\mathsf{r} = h^{-1}(a)$ and ${\boldsymbol{q}}_\mathsf{t}$ contains every atom of ${\boldsymbol{q}}$ with at least one variable from $\mathsf{t}_\mathsf{i}$, then we call $\mathsf{t} = (\mathsf{t}_\mathsf{r}, \mathsf{t}_\mathsf{i})$ a \emph{tree witness for ${\ensuremath{\boldsymbol{Q}}}$ generated by $R$}.
Note that the same tree witness $\mathsf{t}$ can be generated by different roles $R$.
The logarithmic-depth NDL-rewriting for bounded-leaf queries and ontologies
of unbounded depth is based upon the following observation~\cite{LICS14}.
\begin{lemma}\label{PrepMiddleVertex}
Every tree $T$ of size $m$ has a node splitting it into subtrees of size
$\leq\! \lceil m/2 \rceil$.
\end{lemma}
We will use repeated applications of this lemma to decompose the input CQ into smaller and smaller subqueries.
Formally, for every tree-shaped CQ ${\boldsymbol{q}}$, we use $v_{\boldsymbol{q}}$ to denote a vertex in the Gaifman graph $\mathcal{G}$ of ${\boldsymbol{q}}$
that satisfies the condition of Lemma~\ref{PrepMiddleVertex}.
If $|\mathsf{var}({\boldsymbol{q}})| = 2$ and ${\boldsymbol{q}}$ has at least one existential variable,
we assume that $v_{\boldsymbol{q}}$ is existentially quantified.
Then, for an OMQ ${\ensuremath{\boldsymbol{Q}}}=({\cal T}, {\boldsymbol{q}}_0(\vec{x}))$, we define $\mathsf{SQ}$ as the smallest set of queries
that contains ${\boldsymbol{q}}_0(\vec{x})$ and is such that, for every ${\boldsymbol{q}}(\vec{z}) \in \mathsf{SQ}$ with $\mathsf{var}({\boldsymbol{q}}) \ne \vec{z}$,
the following queries also belong to $\mathsf{SQ}$:\label{page:decomposition}
\begin{itemize}
\item for every $u_i$ adjacent to $v_{\boldsymbol{q}}$ in $\mathcal{G}$, the query ${\boldsymbol{q}}_i(\vec{z}_i)$
comprising all role atoms linking $v_{\boldsymbol{q}}$ and $u_i$,
as well as all atoms whose variables cannot reach $v_{\boldsymbol{q}}$ in $\mathcal{G}$ without passing by $u_i$,
and with $\vec{z}_i = \mathsf{var}({\boldsymbol{q}}_i) \cap (\vec{z} \cup \{v_{\boldsymbol{q}}\})$;
\item for every tree witness $\mathsf{t}$ for $({\cal T},{\boldsymbol{q}}(\vec{z}))$ with $\mathsf{t}_\mathsf{r}\neq \emptyset$ and $v_{\boldsymbol{q}}\in\mathsf{t}_\mathsf{i}$, the queries\linebreak ${\boldsymbol{q}}_1^\mathsf{t}(\vec{z}_1^\mathsf{t}), \dots, {\boldsymbol{q}}_m^\mathsf{t}(\vec{z}_m^\mathsf{t})$ that correspond
to the connected components of the set of atoms of ${\boldsymbol{q}}$ that are not in ${\boldsymbol{q}}_\mathsf{t}$, with $\vec{z}_i^\mathsf{t} = \mathsf{var}({\boldsymbol{q}}_i^\mathsf{t}) \cap (\vec{z} \cup \mathsf{t}_\mathsf{r})$.
\end{itemize}
The NDL program $\Pi''_{{\ensuremath{\boldsymbol{Q}}}}$ uses IDB predicates $P_{\boldsymbol{q}}$, for ${\boldsymbol{q}}(\vec{z}) \in \mathsf{SQ}$,
with arity $|\vec{z}|$ and parameters $\mathsf{var}({\boldsymbol{q}}) \cap \vec{x}$. For each ${\boldsymbol{q}}(\vec{z}) \in \mathsf{SQ}$ with $\mathsf{var}({\boldsymbol{q}}) = \vec{z}$, we include the clause $P_{\boldsymbol{q}}(\vec{z}) \leftarrow {\boldsymbol{q}}(\vec{z})$.
For each ${\boldsymbol{q}}(\vec{z}) \in \mathsf{SQ}$ with $\mathsf{var}({\boldsymbol{q}}) \ne \vec{z}$, we include the clause
\begin{equation*}
P_{\boldsymbol{q}}(\vec{z}) \ \ \ \leftarrow \bigwedge_{A(v_{\boldsymbol{q}})\in {\boldsymbol{q}}}\hspace*{-1em} A(v_{\boldsymbol{q}}) \ \ \ \land \bigwedge_{R(v_{\boldsymbol{q}},v_{\boldsymbol{q}}) \in {\boldsymbol{q}}} \hspace*{-1em}R(v_{\boldsymbol{q}},v_{\boldsymbol{q}}) \ \ \ \land \bigwedge_{1\leq i\leq n} P_{{\boldsymbol{q}}_i}(\vec{z}_i),
\end{equation*}
where ${\boldsymbol{q}}_1(\vec{z}_1), \ldots, {\boldsymbol{q}}_n(\vec{z}_n)$ are the subqueries induced by the neighbours of $v_{\boldsymbol{q}}$ in $\mathcal{G}$, and the following clause
\begin{equation*}
P_{\boldsymbol{q}}(\vec{z}) \ \ \ \leftarrow \bigwedge_{u,u' \in \mathsf{t}_\mathsf{r}} (u=u') \ \ \ \land \ \bigwedge_{u \in \mathsf{t}_\mathsf{r}} A_R(u)\ \
\land \bigwedge_{1\leq i \leq m} P_{{\boldsymbol{q}}_i^\mathsf{t}}(\vec{z}_i^\mathsf{t})
\end{equation*}
for every tree witness $\mathsf{t}$ for $({\cal T},{\boldsymbol{q}}(\vec{z}))$ with $\mathsf{t}_\mathsf{r}\neq \emptyset$ and $v_{\boldsymbol{q}} \in\mathsf{t}_\mathsf{i}$ and for every role~$R$ generating $\mathsf{t}$,
where ${\boldsymbol{q}}_1^\mathsf{t}, \dots, {\boldsymbol{q}}_m^\mathsf{t}$ are the connected components of ${\boldsymbol{q}}$ without ${\boldsymbol{q}}_\mathsf{t}$.
Finally, if ${\boldsymbol{q}}_0$ is Boolean, then we additionally include clauses
$P_{{\boldsymbol{q}}_0} \leftarrow A(x)$ for all concept names~$A$ such that ${\cal T}, \{A(a)\} \models {\boldsymbol{q}}_0$.
The program $\Pi''_{{\ensuremath{\boldsymbol{Q}}}}$ is inspired by a similar construction from~\cite{LICS14}. By adapting results from the latter paper,
we can show that $(\Pi''_{{\ensuremath{\boldsymbol{Q}}}}, P_{{\boldsymbol{q}}_0}(\vec{x}))$ is indeed a rewriting:
\begin{lemma}\label{bl-logcfl-rewriting-correct}
For any tree-shaped OMQ ${\ensuremath{\boldsymbol{Q}}}(\vec{x})=({\cal T}, {\boldsymbol{q}}_0(\vec{x}))$, any ${\boldsymbol{q}}(\vec{z}) \in \mathsf{SQ}$, any H-complete ABox ${\cal A}$, and any tuple $\vec{a}$ in $\mathsf{ind}(\mathcal{A})$,
$\Pi''_{{\ensuremath{\boldsymbol{Q}}}},{\cal A} \models P_{\boldsymbol{q}}(\vec{a})$ iff there exists a homomorphism $h\colon {\boldsymbol{q}} \to \C_{\T, \A}$ such that $h(\vec{z})= \vec{a}$.
\end{lemma}
Now fix $\ell > 1$, and consider the class of OMQs ${\ensuremath{\boldsymbol{Q}}}(\vec{x})=({\cal T}, {\boldsymbol{q}}(\vec{x}))$ with tree-shaped ${\boldsymbol{q}}(\vec{x})$ having at most $\ell$ leaves.
The size of $\Pi''_{{\ensuremath{\boldsymbol{Q}}}}$ is polynomially bounded in $|{\ensuremath{\boldsymbol{Q}}}|$, since bounded-leaf CQs have polynomially many tree witnesses
and also polynomially many tree-shaped subCQs.
It is readily seen that
the function $\nu$ defined by setting $\nu (P_{{\boldsymbol{q}}'}) = |{\boldsymbol{q}}'|$
is a weight function for $(\Pi''_{{\ensuremath{\boldsymbol{Q}}}},P_{\boldsymbol{q}})$ such that $\nu (P_{{\boldsymbol{q}}}) \leq |{\ensuremath{\boldsymbol{Q}}}|$.
Moreover, by Lemma~\ref{PrepMiddleVertex}, $\mathsf{d}(\Pi,G) \le \log \nu(P_{{\boldsymbol{q}}}) +1$.
We can thus apply Corollary~\ref{cor:weight} to conclude that the obtained NDL-rewritings can be
evaluated in \ensuremath{\mathsf{LOGCFL}}. Finally, we note that since the number of leaves is bounded,
it is in $\ensuremath{\mathsf{NL}}$ to decide whether a vertex satisfies the conditions of Lemma~\ref{PrepMiddleVertex},
and it is in \ensuremath{\mathsf{LOGCFL}}{} to decide whether ${\cal T}, \{A(a)\} \models {\boldsymbol{q}}_0$ \cite{DBLP:conf/lics/BienvenuKP15}
or whether a (logspace) representation of a possible tree witness is
indeed a tree witness. This allows us to show that $(\Pi''_{{\ensuremath{\boldsymbol{Q}}}},P_{\boldsymbol{q}})$ can be generated by an $\mathsf{L}^\ensuremath{\mathsf{LOGCFL}}$-transducer.
\section{Conclusions}
As shown above, for three important classes of OMQs, NDL-rewritings can be constructed and evaluated by theoretically optimal \ensuremath{\mathsf{NL}}{} and \ensuremath{\mathsf{LOGCFL}}{} algorithms. To see whether these rewritings are viable in practice, we generated three sequences of OMQs with the ontology from Example~\ref{ex:rewriting:2} and linear CQs of up to 15 atoms as in Example~\ref{ex:rewriting:1}. We compared our \ensuremath{\mathsf{NL}}{} and \ensuremath{\mathsf{LOGCFL}}{} rewritings from Secs.~\ref{sec:5} and~\ref{sec:boundedtw} (called \textsc{Lin} and \textsc{Log})\linebreak with those produced by Clipper~\cite{DBLP:conf/aaai/EiterOSTX12} and Rapid~\cite{DBLP:conf/cade/ChortarasTS11}. The barcharts below show the \mbox{number} of clauses in the rewritings over H-complete ABoxes. While \textsc{Lin} and \textsc{Log} grow linearly\linebreak (in accord with theory), Clipper and Rapid failed to produce rewritings for longer CQs.\\[-1pt]
\begin{tikzpicture}[xscale=0.43,yscale=0.95]
\def0.025{0.025}
\def0.2{0.2}
\begin{scope}
\clip (-0.5,-1) rectangle (16,145*0.025);
\fill[white] (-0.1,-0.4) rectangle (15.5,125*0.025);
\foreach \x in {1,...,15} {
\draw (\x,-0.1) -- (\x,0);
\node at (\x,-0.25) {\scriptsize \x};
}
\draw (0.7,0) -- ++(0,150*0.025);
\foreach \y in {10,25,50,100} {
\draw (0.7,\y*0.025) -- +(-0.2,0);
\draw[ultra thin,gray] (0.7,\y*0.025) -- +(14.8,0);
\node at (0.2,\y*0.025) {\scriptsize \y};
}
\foreach \x/\v in {1/2,2/5,3/8,4/11,5/14,6/17,7/20,8/23,9/26,10/29,11/32,12/35,13/38,14/41,15/44} {
\filldraw (\x-2*0.2,0) -- ++(0,\v*0.025) -- ++(0.2,0) -- (\x-0.2,0);
}
\foreach \x/\v in {1/1,2/2,3/5,4/8,5/12,6/16,7/20,8/24,9/27,10/32,11/36,12/40,13/45,14/47,15/51} {
\filldraw[pattern=north west lines, pattern color=black] (\x-0.2,0) -- ++(0,\v*0.025) -- ++(0.2,0) -- (\x,0);
}
\foreach \x/\v in {1/1,2/1,3/2,4/3,5/5,6/7,7/10,8/13,9/13,10/26,11/39,12/250,13/250,14/250,15/250} {
\filldraw[fill=gray!50,ultra thin] (\x,0) -- ++(0,\v*0.025) -- ++(0.2,0) -- (\x+0.2,0);
}
\foreach \x/\v in {1/1,2/1,3/2,4/3,5/5,6/7,7/11,8/16,9/16,10/44,11/72,12/126,13/241,14/250,15/250} {
\filldraw[fill=white,ultra thin] (\x+0.2,0) -- ++(0,\v*0.025) -- ++(0.2,0) -- (\x+2*0.2,0);
}
\filldraw[white,draw=white,decorate, decoration={coil,segment length=20pt,aspect=0}] (0,140*0.025) rectangle ++(17,1);
\draw (0.5,0) -- (15.5,0);
\end{scope}
\begin{scope}[xshift=-60mm,yshift=12mm]
\clip (-0.5,-1) rectangle (16,135*0.025);
\fill[white] (-0.1,-0.4) rectangle (15.5,130*0.025);
\foreach \x in {1,...,15} {
\draw (\x,-0.1) -- (\x,0);
\node at (\x,-0.25) {\scriptsize \x};
}
\draw (0.7,0) -- ++(0,100*0.025);
\foreach \y in {10,25,50,100} {
\draw (0.7,\y*0.025) -- +(-0.2,0);
\draw[ultra thin,gray] (0.7,\y*0.025) -- +(14.8,0);
\node at (0.2,\y*0.025) {\scriptsize \y};
}
\foreach \x/\v in {1/2,2/5,3/8,4/11,5/14,6/17,7/20,8/23,9/26,10/29,11/32,12/35,13/38,14/41,15/44} {
\filldraw (\x-2*0.2,0) -- ++(0,\v*0.025) -- ++(0.2,0) -- (\x-0.2,0);
}
\foreach \x/\v in {1/1,2/4,3/5,4/8,5/10,6/15,7/18,8/21,9/27,10/33,11/37,12/42,13/46,14/51,15/52} {
\filldraw[pattern=north west lines, pattern color=black] (\x-0.2,0) -- ++(0,\v*0.025) -- ++(0.2,0) -- (\x,0);
}
\foreach \x/\v in {1/1,2/2,3/2,4/4,5/4,6/8,7/11,8/18,9/24,10/34,11/43,12/56,13/250,14/250,15/250} {
\filldraw[fill=gray!50,ultra thin] (\x,0) -- ++(0,\v*0.025) -- ++(0.2,0) -- (\x+0.2,0);
}
\foreach \x/\v in {1/1,2/2,3/2,4/4,5/4,6/8,7/11,8/24,9/35,10/63,11/100,12/302,13/250,14/250,15/250} {
\filldraw[fill=white,ultra thin] (\x+0.2,0) -- ++(0,\v*0.025) -- ++(0.2,0) -- (\x+2*0.2,0);
}
\draw (0.5,0) -- (15.5,0);
\filldraw[white,draw=white,decorate, decoration={coil,segment length=20pt,aspect=0}] (8,130*0.025) rectangle ++(8,1);
\end{scope}
\begin{scope}[xshift=-120mm,yshift=27mm]
\clip (-0.5,-1) rectangle (16,75*0.025);
\fill[white] (-0.1,-0.4) rectangle (15.5,55*0.025);
\foreach \x in {1,...,15} {
\draw (\x,-0.1) -- (\x,0);
\node at (\x,-0.25) {\scriptsize \x};
}
\draw (0.7,0) -- ++(0,70*0.025);
\foreach \y in {10,25,50,100} {
\draw (0.7,\y*0.025) -- +(-0.2,0);
\draw[ultra thin,gray] (0.7,\y*0.025) -- +(14.8,0);
\node at (0.2,\y*0.025) {\scriptsize \y};
}
\foreach \x/\v in {1/2,2/5,3/8,4/11,5/14,6/17,7/20,8/23,9/26,10/29,11/32,12/35,13/38,14/41,15/44} {
\filldraw (\x-2*0.2,0) -- ++(0,\v*0.025) -- ++(0.2,0) -- (\x-0.2,0);
}
\foreach \x/\v in {1/1,2/4,3/5,4/5,5/8,6/10,7/13,8/16,9/22,10/27,11/29,12/33,13/35,14/36,15/37} {
\filldraw[pattern=north west lines, pattern color=black] (\x-0.2,0) -- ++(0,\v*0.025) -- ++(0.2,0) -- (\x,0);
}
\foreach \x/\v in {1/1,2/2,3/2,4/2,5/2,6/2,7/4,8/6,9/10,10/14,11/14,12/14,13/250,14/250,15/250} {
\filldraw[fill=gray!50,ultra thin] (\x,0) -- ++(0,\v*0.025) -- ++(0.2,0) -- (\x+0.2,0);
}
\foreach \x/\v in {1/1,2/2,3/2,4/2,5/2,6/2,7/4,8/7,9/13,10/26,11/26,12/26,13/30,14/31,15/30} {
\filldraw[fill=white,ultra thin] (\x+0.2,0) -- ++(0,\v*0.025) -- ++(0.2,0) -- (\x+2*0.2,0);
}
\draw (0.5,0) -- (15.5,0);
\filldraw[white,draw=white,decorate, decoration={coil,segment length=20pt,aspect=0}] (13,70*0.025) rectangle ++(3,1);
\end{scope}
\begin{scope}[xshift=-5mm,yshift=-2mm]
\filldraw (-11,0.5) rectangle +(0.2,30*0.025);
\node at (-10.7,0.2) {\footnotesize \textsc{Lin}};
\filldraw[pattern=north west lines, pattern color=black] (-10,0.8) rectangle +(0.2,30*0.025);
\node at (-9.4,0.5) {\footnotesize \textsc{Log}};
\filldraw[fill=gray!50,ultra thin] (-9,1.1) rectangle +(0.2,30*0.025);
\node at (-8.2,0.8) {\footnotesize Rapid};
\filldraw[fill=white,ultra thin] (-8,1.4) rectangle +(0.2,30*0.025);
\node at (-7,1.1) {\footnotesize Clipper};
\end{scope}
\end{tikzpicture}\\[-18pt]
We evaluated the rewritings over a few randomly generated ABoxes using off-the-shelf datalog engine RDFox~\cite{DBLP:conf/semweb/NenovPMHWB15}. The experiments (see the full version) show that our rewritings are usually executed faster than Clipper's and Rapid's when the number of answers is relatively small ($\lesssim 10^4$); for queries with $\gtrsim 10^6$ answers, the execution times are comparable. The version of RDFox we used did not seem to take advantage of the structure of the \ensuremath{\mathsf{NL}}{}/\ensuremath{\mathsf{LOGCFL}}{} rewritings, and it would be interesting to see whether their nonrecursiveness and parallelisability can be utilised to produce efficient execution plans.
\nopagebreak[4]
\smallskip
\noindent\textbf{Acknowledgements\textup{:}} The first author was supported by contract ANR-12-JS02-007-01, the fourth by the Russian Foundation for Basic Research and the grant MK-7312.2016.1.
\pagebreak
|
\section{Introduction}\label{s:i}
In \cite{De2} we embarked upon the journey towards developing a theory of character sheaves on a general affine algebraic group $G$ defined over an algebraically closed field $\k$ of characteristic $p>0$. The study of character sheaves was initiated by Lusztig for reductive groups in his works \cite{L}. Later Boyarchenko and Drinfeld developed the theory of character sheaves on unipotent groups in \cite{BD}, \cite{B}. In this paper, we develop the theory of character sheaves on neutrally solvable groups, namely groups $G$ such that their neutral connected components $G^\circ$ are solvable algebraic groups.
Let us fix two distinct primes $p,\ell$. In this paper, $\k$ will always denote an algebraically closed field of characteristic $p$. One case of particular interest is when $\k=\Fpcl$. All algebraic groups and schemes will be assumed to be over $\k$ unless mentioned otherwise. It is often more convenient to pass to the perfectizations of algebraic groups and schemes. Hence continuing our convention from \cite{De2}, by algebraic group we actually mean perfect quasi-algebraic group over $\k$ (i.e. the perfectization of an algebraic group). We refer to \cite[\S1.9]{BD} for more about this convention.
We shall continue to use all the standard notations and conventions from \cite{BD}, \cite{De2}. Hence for example if $G$ is a (perfect quasi-) algebraic group, then $\DG$ denotes the $\Qlcl$-linear triangulated ribbon $\r$-category of conjugation equivariant constructible $\Qlcl$-complexes. In particular $\DG$ is a braided monoidal category (under convolution with compact supports) with a weak form of duality (denoted by $\f{D}^{-}$) and for each $C\in \DG$ we have a functorial twisting automorphism $\theta_C:C\rar{\cong}C$. We also recall from \cite[Appendix A]{BD} that the (weak) duality functor $\f{D}^{-}$ is defined as the composition $\iota^*\circ \f{D}=\f{D}\circ \iota^*$ where $\f{D}$ denotes Verdier duality and $\iota:G\rar{} G$ denotes the inversion map. We let $\can_G$ denote the dualizing complex on $G$. In this paper we will always assume that our perfect quasi-algebraic group $G$ is defined as the perfectization of some specific algebraic group over $\k$. With this assumption, we have a canonical identification $\can_G\cong \Qlcl[2\dim G](\dim G)$.
Now suppose that $G$ is neutrally solvable. In this paper we will define a set $\CS(G)$ of isomorphism classes of some special objects in $\DG$ known as character sheaves on $G$. If $C\in \CS(G)$, then we will see that $C$ is a simple object in $\DG$, in the sense that $\Hom_{\DG}(C,C)=\Qlcl$. In \cite{De2}, we studied minimal idempotents in the braided monoidal category $\DG$ and proved that each such minimal idempotent is in fact locally closed (cf. \cite[\S2.3.2]{De2}) and can be obtained from an admissible pair for $G$. Let $\hG$ denote the set of (isomorphism classes of) minimal idempotents in $\DG$. For each $e\in \hG$, we will first define the set $\CS_e(G)$ of character sheaves in the full subcategory $e\DG\subset \DG$. If $e,e'\in \hG$ are non-isomorphic minimal idempotents, then $e\DG\cap e'\DG=0$, and hence it will follow that $\CS_e(G)$ and $\CS_{e'}(G)$ are disjoint sets. We will then define $\CS(G)=\coprod\limits_{e\in \hG}\CS_e(G)$. Moreover, we will see that the set $\CS(G)$ can be defined purely in terms of the $\Qlcl$-linear triangulated braided monoidal category $\DG$. In particular, this means that any $\Qlcl$-linear triangulated braided auto-equivalence of $\DG$ preserves the set $\CS(G)$ of character sheaves.
Here we remark that for a neutrally solvable group, the character sheaves may not be perverse sheaves (even up to shift). This is in contrast with the fact that character sheaves on reductive as well as unipotent groups are perverse sheaves (at least up to shift, depending upon convention).
To define the set $\CS_e(G)$ we will use the fact that the minimal idempotent $e$ can be obtained from an admissible pair for $G$. We will further define a partition of the set $\CS_e(G)=\coprod\limits_{f\in\f{L}_e(G)}{\CS_{e,f}}(G)$ into what we will call $\f{L}$-packets of character sheaves. The set $\f{L}_e(G)$ parametrizing $\f{L}$-packets associated with $e$ is equal to the set of equivalence classes of minimal quasi-idempotents (as defined in Appendix \ref{a:qiltc}) in the $\Qlcl$-linear triangulated braided monoidal category $e\DG$. Moreover, each $\f{L}$-packet of character sheaves $\CS_{e,f}(G)$ (which will often be denoted simply as $\CS_f(G)$) is a finite set. Associated with each such $\f{L}$-packet, we will define a modular category $\M_{G,f}$ whose simple objects correspond to the finite set $\CS_f(G)=\CS_{e,f}(G)$. We will construct the tensor product in this modular category by defining a truncated version of convolution. We will prove that any $\Qlcl$-linear triangulated braided auto-equivalence $\Phi:\DG\rar{\cong}\DG$ induces a permutation of $\f{L}$-packets and of character sheaves. In fact we obtain an induced equivalence of braided fusion categories $\Phi:\M_{G,f}\rar{\cong}\M_{G,\Phi(f)}$ for each $\lL$-packet $\CS_{e,f}(G)$.
After defining character sheaves, $\f{L}$-packets and their associated modular categories, we will apply these results to the character theory of the associated finite groups. For this we take $\k=\Fpcl$ and consider an $\Fq$-Frobenius map $F:G\rar{}G$ where $q$ is some power of $p$. We would like to study the character theory of the finite group $G(\Fq)=G^F$ using our theory of character sheaves on $G$. However, as observed in \cite{B} and \cite{De3}, it is more natural to consider all the pure inner forms $G^{gF}$ at the same time. Here $g\in G$ and $gF:=\ad(g)\circ F:G\rar{}G$ is another $\Fq$-Frobenius map for $G$. The pure inner forms of $G^F$ are parametrized by the finite set $H^1(F,G)$ of $F$-twisted conjugacy classes in $G$. Note that if $G$ is connected, then by Lang's theorem $H^1(F,G)$ is singleton and we have only one pure inner form. We refer to \cite[\S2.4.1]{De3}, \cite[\S1.2]{De4} for more on these notions.
We will also continue to use all the notation from \cite{De4}. In particular we have the set
\beq
\Irrep(G,F):=\coprod\limits_{\<g\>\in H^1(F,G)}\Irrep(G^{gF})
\eeq
of irreducible characters (over $\Qlcl$) of all the pure inner forms and the commutative Frobenius $\Qlcl$-algebra
\beq
\Fun([G],F):=\prod\limits_{\<g\>\in H^1(F,G)}\Fun(G^{gF}/\sim)
\eeq
of class functions on all pure inner forms (under convolution of functions). This space has the standard Hermitian inner product with respect to which $\Irrep(G,F)\subset \FunG$ is an orthonormal basis. Note that we will often use the same symbol to denote an irreducible representation as well as its character.
\brk\label{r:complex}
We will fix an identification $\Qlcl\cong \f{C}$. Once we fix this, we also obtain an inclusion $\Q_p/\Z_p\hookrightarrow \Qlcl^\times$. We remark that this choice is not important since all the functions that will arise in this paper can be chosen so as to take values in the subfield of $\Qlcl$ where `complex conjugation' is defined unambiguously.
\erk
Recall that in \cite[\S3.2]{De4} we defined an analogue of Asai's twisting operator, namely a unitary operator $\Theta^*:\FunG\rar{\cong}\FunG$. This unitary operator is obtained using a certain permutation $\Theta$ of the rational conjugacy classes in all pure inner forms which preserves the geometric conjugacy classes. In general, the action of $\Theta^*$ on $\FunG$ can be rather complicated.
Also recall that in \cite{De4}, for each positive integer $m$, we have defined the $m$-th Shintani descent map
\beq
\Sh_m:\Irrep(G,F^m)^F\hookrightarrow \FunG
\eeq
which is well defined only up to scaling by $m$-th roots of unity and that the image of this map is an orthonormal basis of $\FunG$ known as the $m$-th Shintani basis.
Suppose we have an object $C\in \DG$ and an isomorphism $\psi:F^*C\rar{\cong} C$. Then as in \cite[\S2.4.8]{De3}, we have its associated Frobenius trace function $\T_{C,\psi}\in\FunG$. Furthermore if $C$ is simple, in the sense that $\Hom_{\DG}(C,C)=\Qlcl$, then we proved in \cite[\S3.3]{De4} that $\Theta^*(\T_{C,\psi})=\theta_C\cdot \T_{C,\psi}$, where $\theta_C\in \Qlcl^\times$ is the twist automorphism of $C\in\DG$.
We have seen that $\Irrep(G,F)$ is an orthonormal basis of $\FunG$. We will prove that the Frobenius trace functions associated with $F$-stable character sheaves on $G$ also form an orthonormal basis of $\FunG$. By the previous paragraph, class functions in this orthonormal basis are eigenvectors for the twisting operator $\Theta^*$. On the other hand, the action of $\Theta^*$ on the basis $\Irrep(G,F)$ can be rather complicated.
Let us summarize the preliminary versions of the main results that we will prove in this paper. We will state and prove more precise statements later.
\bthm\label{t:main1}
Let $G$ be a neutrally solvable group over any algebraically closed field $k$ of characteristic $p$. We will define a set $\CS(G)$ of character sheaves in $\DG$ such that we have the following:\\
(i) Each character sheaf $C\in \CS(G)$ is a simple object in $\DG$, in the sense that $\Hom_{\DG}(C,C)=\Qlcl$. We have a partition \beq\CS(G)=\coprod\limits_{e\in \hG}\CS_e(G)\eeq where $\CS_e(G)$ are character sheaves in the full subcategory $e\DG\subset \DG$. The set $\CS_e(G)$ will be defined purely in terms of the $\Qlcl$-linear triangulated braided monoidal structure of the category $e\DG$.\\
(ii) For each minimal idempotent $e\in \DG$, we have a partition
\beq
\CS_e(G)=\coprod\limits_{f\in\f{L}_e(G)}\CS_{e,f}(G)
\eeq
into $\f{L}$-packets of character sheaves, where $\lL_e(G)$ is the set of equivalence classes of minimal quasi-idempotents (cf. Appendix \ref{a:qiltc}) in $e\DG$. Each $\f{L}$-packet $\CS_{e,f}(G)=\CS_f(G)$ \footnote{We will sometimes drop $e$ from the notation, since $e$ is determined by $f$ considered as a minimal quasi-idempotent in $\DG$.} is a finite set.\\
(iii) Let $\lL(G)$ denote the set of equivalence classes of minimal quasi-idempotents in $\DG$. Then $$\f{L}(G)=\coprod\limits_{e\in\hG}\f{L}_e(G).$$\\
(iv) Associated with each $\f{L}$-packet $\CS_{e,f}(G)$ of character sheaves is a modular category $\M_{G,f}$ whose simple objects are the character sheaves in that $\f{L}$-packet.\\
(v) Let $\Phi:\DG\rar{\cong}\DG$ be any $\Qlcl$-linear triangulated braided monoidal auto-equivalence. Then clearly we have an induced permutation (also denoted by $\Phi$) of the set $\hG$ of minimal idempotents. Then $\Phi$ preserves the set of character sheaves on $G$ along with its idempotent and $\f{L}$-packet decompositions. Namely we have $\Phi(\CS_e(G))=\CS_{\Phi(e)}(G)$ for each $e\in \hG$ and $\Phi(\CS_{e,f}(G))=\CS_{\Phi(e),\Phi(f)}$. In particular, we have an induced permutation $\Phi:\f{L}(G)\rar{}\f{L}(G)$ of the set of $\fL$-packets such that $\Phi(\f{L}_e(G))=\fL_{\Phi(e)}(G)$ for each $e\in \hG$. Moreover for each $\f{L}$-packet, we have an induced equivalence
\beq
\Phi:\M_{G,f}\rar{\cong} \M_{G,\Phi(f)}
\eeq
of braided fusion categories.
\ethm
One of the main motivations behind the study of character sheaves on an algebraic group $G$ is their relationship with the character theory of the finite groups of the form $G(\Fq)$. Our next main result is in this direction.
\bthm\label{t:main2}
In addition to the assumptions in Theorem \ref{t:main1}, suppose now that $\k=\Fqcl$ and that we have an $\Fq$-Frobenius map $F:G\rar{}G$. This induces a $\Qlcl$-linear triangulated braided monoidal auto-equivalence $F:={F^{*}}^{-1}:\DG\rar{\cong}\DG$ and hence an induced permutation $F$ of the set of character sheaves and $\fL$-packets. Then we have:\\
(i) The set $\CS(G)^F=\coprod\limits_{f\in\fL(G)^F}\CS_{f}(G)^F$ of Frobenius stable character sheaves is finite. The set $\f{L}(G)^F$ of $F$-stable $\fL$-packets is also finite and for each $f\in \fL(G)^F$, the set $\CS_{f}(G)^F$ is nonempty.\\
(ii) We have a partition of the set $\Irrep(G,F)$ of irreducible characters of all pure inner forms of $G^F$ in terms of $\fL(G)^F$:
\beq
\Irrep(G,F)=\coprod\limits_{f\in \fL(G)^F}\Irrep_{f}(G,F).
\eeq
The sets $\Irrep_{f}(G)$ for $f\in \lL(G)^F$ are all non-empty, and are known as $\fL$-packets of irreducible characters. \\
(iii) For each $C\in \CS(G)^F$, let us choose $\psi_C:F^*C\rar{\cong} C$ such that $||\T_{C,\psi_C}||=1$. Then the set $\{\T_{C,\psi_C}|C\in \CS(G)^F\}$ is an orthonormal basis of $\FunG$ consisting of $\Theta^*$-eigenvectors. In particular, $|\Irrep(G,F)|=|\CS(G)^F|$. For each $f\in \fL(G)^F$, the $\Qlcl$-linear spans in $\FunG$ of the two sets $\{\T_{C,\psi_C}|C\in \CS_{f}(G)^F\}$ and $\Irrep_{f}(G,F)$ are equal. In particular, we have $|\Irrep_{f}(G,F)|=|\CS_{f}(G)^F|$. We also deduce from this that the transition matrix between irreducible characters and Frobenius trace functions of $F$-stable character sheaves is block diagonal with blocks parametrized by the set $\fL(G)^F$.\\
(iv) For each $f\in \fL(G)^F$, we have a modular auto-equivalence $F:\M_{G,f}\rar{\cong}\M_{G,f}$ of the modular category $\M_{G,f}$. Then the unitary transition matrix between the two sets $\{\T_{C,\psi_C}|C\in \CS_{f}(G)^F\},\Irrep_{f}(G,F)\subset \FunG$ is given by the crossed S-matrix, as defined in \cite{De5}, (suitably normalized) associated with the modular auto-equivalence $F:\Mfe\rar{\cong}\Mfe$.
\ethm
From this result, for each positive integer $m$, we obtain an $\fL$-packet decomposition of the set $\Irrep(G,F^m)$ with $\fL$-packets parametrized by $\fL(G)^{F^m}$. We also obtain that
\beq
\Irrep(G,F^m)^F=\coprod\limits_{f\in \fL(G)^F\subset \fL(G)^{F^m}}\Irrep_{f}(G,F^m)^F.
\eeq
Finally we relate the theory of character sheaves on neutrally solvable groups to Shintani descent:
\bthm\label{t:main3}
We continue in the setting of Theorem \ref{t:main2}. Then we have:\\
(i) Shintani descent respects the $\fL$-packet decomposition of irreducible characters, namely for each positive integer $m$ and each $f\in \fL(G)^F$, $\Sh_m(\Irrep_{f}(G,F^m)^F)$ is a basis of the subspace of $\FunG$ spanned by $\Irrep_{f}(G,F)$ (or equivalently of the subspace spanned by $\{\T_{C,\psi_C}|C\in \CS_{f}(G)^F\}$). \\
(ii) There exists a positive integer $m_0$ such that for any positive integer $m$, the $m$-th Shintani basis of $\FunG$ only depends (up to scaling by roots of unity) on the residue of $m$ modulo $m_0$. The $m$-th Shintani basis (well defined up to scaling by roots of unity) where $m$ is any positive multiple of $m_0$ is known as the basis of almost characters of $\FunG$.\\
(iii) The orthonormal basis of almost characters of $\FunG$ agrees (up to scaling by roots of unity) with the orthonormal basis $\{\T_{C,\psi_C}|C\in \CS(G)^F\}$ formed by Frobenius trace functions associated with $F$-stable character sheaves on $G$. In particular, almost characters are eigenvectors of the twisting operator $\Theta^*$.
\ethm
We conjecture that there should be an interesting theory of character sheaves on general algebraic groups:
\bconj\label{c:main}
Analogues (see Remark \ref{r:caveat} below) of Theorems \ref{t:main1}, \ref{t:main2} and \ref{t:main3} hold for any algebraic group $G$ over $\k$.
\econj
As we have seen in \cite{De2} and as we will see from the arguments of this paper, we can essentially reduce this conjecture to the Heisenberg case.
\brk\label{r:caveat}
For a general algebraic group $G$, we do not expect the $\f{L}$-packets of character sheaves to be parametrized by equivalence classes of minimal quasi-idempotents in $\DG$. Nevertheless, we do expect that associated with every $\f{L}$-packet will be a modular category. For example, if $G$ is a reductive group, Lusztig has defined certain modular categories associated with $\f{L}$-packets using a notion of truncated convolution of character sheaves. In fact, many aspects of Conjecture \ref{c:main} are known to hold for reductive groups (sometimes under some further restrictions) by the work of Lusztig, Shoji and others.
\erk
Our approach to the theory of character sheaves on neutrally solvable groups is based on the notion of minimal quasi-idempotents in $\Qlcl$-linear braided triangulated categories. We describe this notion in the Appendix \ref{a:qiltc}. In \S\ref{s:cst}, we begin by describing the theory of character sheaves on a torus in terms of the notion of minimal quasi-idempotents. We will then use this to study the case of Heisenberg idempotents in \S\ref{s:thc}, \S\ref{s:icahi}. In \S\ref{s:thc}, we will define character sheaves in the Heisenberg case and prove an analogue of Theorem \ref{t:main1} in this case (see Corollary \ref{c:modcat}, Definition \ref{d:csfg} and Remark \ref{r:csedgg}). We will prove in \S\ref{s:pcshc}, that in the Heisenberg case, the character sheaves are in fact perverse up to a certain shift. (This statement does not necessarily hold in the general case.) In \S\ref{s:icahi}, we study the relationship between irreducible characters and $F$-stable character sheaves in the Heisenberg case and prove the Heisenberg case versions of Theorem \ref{t:main2} (see \S\ref{s:rbiccs}, in particular Theorem \ref{t:relheis}) and Theorem \ref{t:main3} (see \S\ref{s:sdthc}, in particular Corollary \ref{c:tsh}). In \S\ref{s:pmr}, we use the fact that all minimal idempotents in $\DG$ come from some admissible pair to prove our main results in the general case using the results already proved in the Heisenberg case. Theorem \ref{t:main1} is proved in \S\ref{s:dcs} (see Proposition \ref{p:lleg}, Definition \ref{d:csg} and Proposition \ref{p:main1iv}). In \S\ref{s:irap} and \S\ref{s:grpag} we study the set $\Irrep(G,F)$ using $F$-stable geometric conjugacy classes of admissible pairs for $G$. Theorem \ref{t:main2} is proved in \S\ref{s:ircs} and \S\ref{s:c} (see Theorems \ref{t:maingen} and \ref{t:fstap}). In \S\ref{s:sdgc}, we study Shintani descent in the general case and prove Theorem \ref{t:main3} (see Theorems \ref{t:sdgc} and \ref{t:fstap}). In \S\ref{s:example} we study in detail an instructive example, namely the character sheaves on the Borel subgroup of $SL_3$.
\section*{Acknowledgments}
I am grateful to V. Drinfeld for introducing me to the theory of character sheaves on algebraic groups and to T. Shoji for many useful discussions. I thank A. Beilinson for very helpful correspondence. This work was partially supported by World Premier Institute Research Center Initiative (WPI), MEXT, Japan.
\section{Character sheaves on a torus}\label{s:cst}
As a warm-up, we now describe a new way to look at character sheaves on a torus which is more suited for our approach to character sheaves on neutrally solvable groups. A character sheaf on a torus is just a multiplicative local system on $T$. However, in this section we will characterize the character sheaves on a torus $T$ using the notion of minimal quasi-idempotents (cf. Appendix \ref{a:qiltc}) in $\D(T)$ (or in $\D_T(T)$). As a consequence, we will obtain a description of character sheaves on $T$ purely in terms on the $\Qlcl$-linear triangulated monoidal category $\D(T)$ (or $\D_T(T)$). We refer to Appendix \ref{a:qiltc} for the definition and properties of the abstract categorical notion of quasi-idempotents in $\Qlcl$-linear triangulated monoidal categories.
In this section, we will establish a canonical bijection between the set of character sheaves on a torus $T$ and the set of equivalence classes of minimal quasi-idempotents (cf. Defn. \ref{d:minqi}) in the categories $\D(T)$ and $\D_T(T)$. Let $\can_T\cong \Qlcl[2\dim T](\dim T)$ denote the dualizing complex on $T$. In this section we will continue to use the notations from \cite[\S7]{De2}. In particular $\C(T)$ denotes the $\Qlcl$-scheme whose $\Qlcl$-points parametrize the multiplicative local systems on $T$ and $\mathcal{M}_!:\D(T)\rar{}D^b_{coh}(\C(T))$ denotes the Mellin transform. We refer to \cite{GL} for a detailed discussion about these notions.
\blem\label{l:mellin}
(i) Let $M\in \D(T)$ and let $\L$ be a multiplicative local system on $T$. Then we have a natural isomorphism $\L\ast M\rar{\cong}(\L\ast M)_1\otimes \L$ in $\D(T)$, where $(\L\ast M)_1\in D^b\Vec$ denotes the stalk of $\L\ast M$ at $1\in T$. (Here $\otimes$ is used in the sense of the previous section, or equivalently we may identify $D^b\Vec$ with constant sheaves in $\D(T)$ and then $\otimes$ denotes the usual (derived) tensor product in $\D(T)$.)\\
(ii) If $M\in \D(T)$ is nonzero, then there exists a multiplicative local system $\L$ on $T$ such that $\L\ast M\neq 0$.
\elem
\bpf
Statement (i) follows readily from the definition of convolution and the fact that $\L$ is a multiplicative local system, i.e. $\mu^*\L\cong \L\boxtimes \L$ where $\mu:T\times T\to T$ is the multiplication in the torus.
To prove (ii), we will use the Mellin transform and its properties that are studied in \cite{GL}. Suppose that $M$ is any nonzero object in $\D(T)$. Then by \cite[Prop. 3.4.5]{GL}, its Mellin transform $\cM_!(M)$ is also nonzero. In particular there exists a multiplicative local system $\L$ such that the (derived) pullback $i^*_{\L^{-1}}\cM_!(M)$ is nonzero where $i_{\L^{-1}}:\{\L^{-1}\}\hookrightarrow \C(T)$ denotes the inclusion of the closed point $\L^{-1}\in \C(T)$. Now by definition of the Mellin transform, $\cM_!(\L)$ is only supported at the closed point $\L^{-1}\in \C(T)$.
In particular this means that $\cM_!(\L)\otimes \cM_!(M)$ is nonzero. But since Mellin transform takes convolution to tensor product, we conclude that $\L\ast M$ must also be nonzero as desired.
\epf
\bthm\label{t:torcs}
Let $\L\in \D(T)$ be a multiplicative local system (which may also be naturally considered as an object of $\D_T(T)$). Then $e_\L:=\L \otimes \can_T$ is a minimal quasi-idempotent in $\D(T)$ (resp. $\D_T(T)$). Moreover, if $e\in \D(T)$ (resp. $e\in \D_T(T)$) is any minimal quasi-idempotent then there exists a unique (up to isomorphism) multiplicative local system $\L$ on $T$ such that $e_\L\ast e\neq 0$. In other words, $\L\mapsto e_\L$ defines a bijection between $\C(T)(\Qlcl)$ and the set of minimal quasi-idempotents in $\D(T)$ (resp. $\D_T(T)$) up to equivalence.
\ethm
\bpf
Using the isomorphism $\mu^*\L\cong \L\boxtimes \L$ we can define a natural isomorphism
\beq
\L\ast\L\rar{\cong}H^*_c(T,\Qlcl)\otimes \L
\eeq
and hence using the definition of $e_\L$, we obtain an isomorphism $e_\L\ast e_\L\rar\cong H^*_c(T,\can_T)\otimes e_\L$. Hence we see that $e_\L$ is a quasi-idempotent in $\D(T)$. By Lemma \ref{l:mellin}(i), for any $M\in \D(T)$ we have
$\L\ast M \rar{\cong} (\L\ast M)_1\otimes \L$ and hence
\beq\label{e:elm}
e_\L\ast M\cong(\L\ast M)_1\otimes e_\L.
\eeq
In particular this holds for quasi-idempotents $M$. This proves that $e_\L$ is a minimal quasi-idempotent.
On the other hand, let $e\in \D(T)$ be any minimal quasi-idempotent. In particular $e$ is nonzero and by Lemma \ref{l:mellin}(ii) there exists a multiplicative local system $\L$ such that $\L\ast e\neq 0$ and hence $e_\L\ast e\neq 0$. If $\L'$ is another multiplicative local system on $T$ which is not isomorphic to $\L$, then $\L\ast \L'=0$. The uniqueness of $\L$ (up to isomorphism) now follows. This completes the proof of the statements pertaining to the category $\D(T)$.
The statements for $\D_T(T)$ can be proven in the same way by using a $T$-equivariant version of Lemma \ref{l:mellin}(i). It is clear that $e_\L\in \D_T(T)$ is a quasi-idempotent. Now let $e\in \D_T(T)$ be a $V$-quasi-idempotent such that $e_\L\ast e\neq 0$. Then we can define an isomorphism (cf. (\ref{e:elm}))
\beq
e_\L\ast e\cong (\L\ast e)_1\otimes e_\L \mbox{ in $\D_T(T)$},
\eeq
where we consider the stalk $(\L\ast e)_1$ as an object of $\D_T(1)$. Now by Lemma \ref{l:wv'} (or rather by a slight generalization) we obtain that $(\L\ast e)_1\cong V\in D^b\Vec$. This proves that $e_\L\in \D_T(T)$ is a minimal quasi-idempotent. The remaining statements for $\D_T(T)$ now follow readily.
\epf
\brk\label{r:vt}
Let us denote the monic complex (see Definition \ref{d:monic}) $H^*_c(T,\can_T)\in \Dmon$ by $V_T$. Note that we have $V_T\cong H^*_c(T,\Qlcl)[2\dim T](\dim T)$. We have seen that for each multiplicative local system $\L$ on $T$, $e_\L$ is a $V_T$-quasi-idempotent in $\D(T)$.
\erk
\bcor\label{c:allminqi}
Each equivalence class of minimal quasi-idempotents in $\D(T)$ (or in $\D_T(T)$) contains a unique indecomposable object up to isomorphism, namely some $e_\L$ for a multiplicative local system $\L$ on $T$. Any minimal quasi-idempotent in $\D(T)$ (or in $\D_T(T)$) is of the form $W\otimes e_\L$ for some multiplicative local system $\L$ on $T$ and some $W\in \Dmon$.
\ecor
\bpf
Let $e\in \D(T)$ be any minimal quasi-idempotent, and say $e$ is a $V$-quasi-idempotent. Then by Theorem \ref{t:torcs} there exists a unique multiplicative local system $\L$ on $T$ such that $e\sim e_\L$ and clearly $e_\L$ is an indecomposable object of $\D(T)$ (as well as of $\D_T(T)$). Since $e,e_\L$ are equivalent minimal quasi-idempotents, we must have (cf. Lemma \ref{l:wv'})
\beq
e\ast e_\L\cong V_T\otimes e\cong V\otimes e_\L.
\eeq Now we see that the only indecomposable factors of the rightmost term in this isomorphism are $e_\L$ and its shifts. Hence the indecomposable factors of $e$ must also be of this form. In other words, we must have $e\cong W\otimes e_\L$ for some $W\in \Dmon$. This means that all minimal quasi-idempotents equivalent to $e_\L$ are of the form $W\otimes e_\L$ for some $W\in \Dmon$, in particular $e_\L$ is the only indecomposable minimal quasi-idempotent in its equivalence class.
\epf
\bdefn
A character sheaf in the $\Qlcl$-linear triangulated monoidal category $\D_T(T)$ (or in $\D(T)$) is an indecomposable minimal quasi-idempotent.
\edefn
Note that our convention is slightly different from the standard convention. In our convention, the quasi-idempotent $e_\L$ is said to be a character sheaf rather than the multiplicative local system $\L$. The results of this section prove that there is a canonical bijection $e_\L\longleftrightarrow \L$ between isomorphism classes of character sheaves on $T$ and of multiplicative local systems on $T$.
\bcor
Any triangulated monoidal auto-equivalence of $\D(T)$ (or of $\D_T(T)$) preserves the set of isomorphism classes of character sheaves on a torus $T$.
\ecor
\bprop\label{p:eldt}
For each $\L\in \C(T)(\Qlcl)$, the subcategory (see Definition \ref{d:qi}) ${}^{e_\L}\D(T)\subset \D(T)$ is the full subcategory formed by objects of the form $W\otimes e_\L$ for some $W\in D^b\Vec$. In other words, we have a triangulated functor $D^b\Vec\xto{}{}^{e_\L}\D(T), W\mapsto W\otimes e_\L$ which induces a bijection on the isomorphism classes of objects. Similarly, the full subcategory ${}^{e_\L}\D_T(T)\subset \D_T(T)$ is the full subcategory formed by objects of the form $W\otimes e_\L$ for some $W\in \D_T(1)$.
\eprop
\bpf
Let $M\in {}^{e_\L}\D(T)$. Hence $e_\L\ast M\cong V_T\otimes M.$ On the other hand, by (\ref{e:elm}) we have $e_\L\ast M\cong (\L\ast M)_1\otimes e_\L$ and $e_\L$ is indecomposable. The first part of the proposition now follows.
Now recall that we have an action of $\D_T(1)\subset \D_T(T)$ on $\D_T(T)$ which we will also denote by $\otimes$. If $M\in {}^{e_\L}\D_T(T)$, then as before we obtain that $e_\L\ast M\cong V_T\otimes M\cong (\L\ast M)_1\otimes e_\L$, where $(\L\ast M)_1\in \D_T(1)$. From this we see that $M\cong W\otimes e_\L$ for some $W\in \D_T(1)$.
\epf
\brk\label{r:tstr}
For a minimal quasi-idempotent $e_\L\in \D(T)$ (resp. $\D_T(T)$), let ${}^{e_\L}\D(T)^\Delta$ (resp. ${}^{e_\L}\D_T(T)^\Delta$) be the full triangulated subcategories of $\D(T)$ (resp. $\D_T(T)$) generated by ${}^{e_\L}\D(T)$ (resp. ${}^{e_\L}\D_T(T)$) (see Defn. \ref{d:qi}). Then we see that the categories ${}^{e_\L}\D(T)^\Delta$ and ${}^{e_\L}\D_T(T)^\Delta$ have unique $t$-structures such that $e_\L$ lies in their heart. The semisimple abelian subcategories of the hearts formed by the semisimple objects are both equivalent to the category $\Vec$ with $e_\L$ being the unique simple object. Moreover, it follows from Lemma \ref{l:sasha} that any non-degenerate bounded $t$-structure on either of these triangulated categories must necessarily be a shift of the above $t$-structures.
\erk
\section{Character sheaves in the Heisenberg case}\label{s:thc}
In this section we work with neutrally solvable groups $G$ and analyze the case of Heisenberg idempotents $e\in \DG$. We will define character sheaves (cf. Definition \ref{d:csfg}) and their $\fL$-packet decomposition inside the $\Qlcl$-linear triangulated braided monoidal category $e\DG$. We will state and prove a version of our main results (Theorems \ref{t:main1},\ref{t:main2} and \ref{t:main3}) for Heisenberg idempotents in this section and \S\ref{s:icahi}. The results from \cite{De2} would then allow us to prove (in \S\ref{s:pmr}) our main results for general minimal idempotents, since by {\it op. cit.} every minimal idempotent on a neutrally solvable group can essentially be obtained from a Heisenberg idempotent on a subgroup of $G$ by using the induction with compact supports functor.
We begin by describing the setting of Heisenberg idempotents. Let $G$ be a neutrally solvable (perfect quasi-) algebraic group over $\k$. Let $G^\circ=UT$ where $U$ is the unipotent radical and $T$ is some maximal torus. Let $(H,\N)$ be a Heisenberg admissible (cf. \cite[\S2.6]{De2}) pair for $G$. Recall that this means that $H$ is a connected normal unipotent subgroup of $G$, $\N\in (H^*)^G$ a $G$-equivariant multiplicative local system on $H$, $U/H$ is commutative and the induced skewsymmetric biextension
\beq\phi_\N:U/H\rar{}(U/H)^*\eeq is an isogeny. Associated with such a skewsymmetric isogeny we have the metric group $(K_\N,\theta)$ where $K_\N=\ker(\phi_\N)$. Let $e:=\N\otimes\can_H\in\DG$ be the Heisenberg idempotent associated with the admissible pair. Then from \cite{De2} we know that $e\in \DG$ is a minimal idempotent and that it is closed. We also know that the full subcategory $e\D_U(U)\subset e\D_U(G)$ is equivalent to the bounded derived category of the modular category $\M(K_\N,\theta)$ associated with the metric group $(K_\N,\theta)$. We refer to \cite{De1} for details.
\brk\label{r:fundim}
For a Heisenberg idempotent $e$ as above, we set $d_e:=\frac{\dim U-\dim H}{2}$ and call it the functional dimension of $e$.
\erk
Let $\Gamma:=G/U$. We have $\Gamma^\circ=T$. Let $\Pi_0:=\pi_0(G)=G/G^\circ = \pi_0(\Gamma)=\Gamma/T$. Note that conjugation by $\Gamma$ induces an action of $\Pi_0$ on $T$. We want to define character sheaves in the $\Qlcl$-linear triangulated braided monoidal category $e\DG$. We will first study the triangulated braided $\Pi_0$-crossed category
\beq
e\D_{G^\circ}(G)=\bigoplus\limits_{G^\circ g\in \Pi_0}e\D_{G^\circ}(G^\circ g).
\eeq
Now by \cite[Prop. 8.10]{De2}, we have an equivalence $e\D_{G^\circ}(G^\circ)\cong e\D_U(U)\boxtimes \D_T(T)$ of braided triangulated categories and for each $\bar{g}=G^\circ g\in \Pi_0$ a triangulated equivalence
\beq
e\D_{G^\circ}(G^\circ g)\cong e\D_U(Ug)\boxtimes \D^{\bar{g}}_T(T)
\eeq
of $e\D_{G^\circ}(G^\circ)\cong e\D_U(U)\boxtimes \D_T(T)$-module categories, where $\D^{\bar{g}}_T(T)$ is the $T$-equivariant derived category of $T$ for the $\bar{g}$-conjugation action of $T$ on itself (see also \cite[\S8.5]{De2}). We can obtain the braided monoidal category $e\DG$ as the $\Pi_0$-equivariantization of $e\D_{G^\circ}(G)$.
Finally, let us recall from \cite[\S2.3]{De1} that each of the monoidal categories $e\D_U(G), e\D_{G^\circ}(G)$ and $e\DG$ is a monoidal $\r$-category. The duality functor is defined as $M\mapsto M^\vee:=\f{D}^{-}M\otimes \can_H\cong \f{D}^-M[2\dim H](\dim H)$.
\subsection{The connected Heisenberg case}\label{s:chc}
In this section we suppose that $G=TU$ is a connected solvable group over $\k$ and that $(H,\N)$ is a Heisenberg admissible pair for $G$ with $e=\N\otimes\can_H$ being the corresponding Heisenberg idempotent. Let us begin by classifying the minimal quasi-idempotents in the triangulated monoidal category $e\D_U(G)$. By \cite[Thm. 2.26]{De2} we have a canonical monoidal equivalence $e\D_U(G)\cong e\D_U(U)\boxtimes \D(T)$. In particular $e\D_U(G)$ is braided and we can talk of minimal quasi-idempotents in this category.
\bprop\label{p:mqics}
(i) Let $\L\in \D(T)$ be a multiplicative local system and let $e_\L=\L\otimes\can_T\in \D(T)$ be the corresponding minimal quasi-idempotent. Then $e\boxtimes e_\L\in e\D_U(U)\boxtimes \D(T)\cong e\D_U(G)$ is a minimal quasi-idempotent. \\
(ii) The full subcategory (see Definition \ref{d:qi}) ${}^{(e\boxtimes e_\L)}e\D_U(U)\boxtimes \D(T)\subset e\D_U(U)\boxtimes \D(T)\cong e\D_U(G)$ associated with the quasi-idempotent $e\boxtimes e_\L$ is equal to $e\D_U(U)\boxtimes {}^{e_\L}\D(T)$. It is the full subcategory of objects of the form $M\boxtimes e_\L$ for $M\in e\D_U(U)$.\\
(iii) The mapping $\L\mapsto e\boxtimes e_\L$ establishes a bijection between isomorphism classes of multiplicative local systems on $T$ and equivalence classes of minimal quasi-idempotents in $e\D_U(U)\boxtimes \D(T)$. Each equivalence class of minimal quasi-idempotents in $e\D_U(U)\boxtimes \D(T)$ contains a unique (up to isomorphism) indecomposable object, namely some $e\boxtimes e_\L$ for some $\L\in \C(T)(\Qlcl)$. Any minimal quasi-idempotent in $e\D_U(U)\boxtimes \D(T)$ is of the form $W\otimes (e\boxtimes e_\L)$ for some $\L\in \C(T)(\Qlcl)$ and some $W\in \Dmon$.
\eprop
\bpf
It is clear that $e\boxtimes e_\L$ is a $V_T$-quasi-idempotent. Let us first prove (ii). Objects of $e\D_U(U)\boxtimes \D(T)$ are direct sums of objects of the form $A\boxtimes B$ with $A\in e\D_U(U)$ and $B\in \D(T)$. Note that by (\ref{e:elm}) we have
\beq
(e\boxtimes e_\L)\ast (A\boxtimes B)\cong (\L\ast B)_1\otimes A\boxtimes e_\L.
\eeq
Hence for any $X\in e\D_U(U)\boxtimes \D(T)$, the convolution $(e\boxtimes e_\L)\ast X$ is an object of the form $Y\boxtimes e_\L$ for some $Y\in e\D_U(U)$. Hence we see that the full subcategory ${}^{(e\boxtimes e_\L)}e\D_U(U)\boxtimes \D(T)\subset e\D_U(U)\boxtimes \D(T)$ associated with the quasi-idempotent $e\boxtimes e_\L$ is equal to $e\D_U(U)\boxtimes {}^{e_\L}\D(T)$. This is the full subcategory of objects of the form $Y\boxtimes e_\L$ where $Y\in e\D_U(U)$.
Now suppose that such an object is a nonzero quasi-idempotent, i.e. $(Y\boxtimes e_\L)\ast(Y\boxtimes e_\L)\cong V\otimes (Y\boxtimes e_\L)$ for some $V\in \Dmon$. Hence $(Y\ast Y)\boxtimes (V_T\otimes e_\L)\cong V\otimes Y\boxtimes e_\L$, which implies that $V_T\otimes Y\ast Y\cong V\otimes Y$. This means that $Y\in e\D_U(U)$ must be a quasi-idempotent. Now $e\D_U(U)$ is the bounded derived category of a modular category. Hence by Proposition \ref{p:qidbm} $Y$ must be of the form $W\otimes e$ for some $W\in \Dmon$ and hence $Y\boxtimes e_\L\cong W\otimes e\boxtimes e_\L$. Hence by Corollary \ref{c:altminqi} $e\boxtimes e_\L$ is a minimal quasi-idempotent in $e\D_U(G)\cong e\D_U(U)\boxtimes \D(T)$.
Now let $X\in e\D_U(U)\boxtimes \D(T)$ be any minimal quasi-idempotent. Using Lemma \ref{l:mellin}(ii) and the fact that each $X\in e\D_U(U)\boxtimes \D(T)$ can be expressed as a direct sum of objects of the form $A\boxtimes B$, we see that there exists a multiplicative local system $\L$ on $T$ such that $(e\boxtimes e_\L)\ast X\neq 0$. Since both $X$ and $e\boxtimes e_\L$ are minimal quasi-idempotents, they must be equivalent by Definition \ref{d:minqi}. Moreover, since $e\boxtimes e_\L$ is an indecomposable, we must have $X\cong W\otimes (e\boxtimes e_\L)$ for some $W\in \Dmon$ (cf. Cor. \ref{c:allminqi} and its proof).
\epf
\brk\label{r:monfun}
In the future we will denote the canonical equivalence $e\D_U(U)\boxtimes \D(T)\rar{\cong}e\D_U(G)$ by $X\mapsto \bar{X}$. Note that this equivalence also defines a canonical triangulated monoidal functor $\D(T)\rar{}e\D_U(G)$ (cf. \cite[\S8.5]{De2}) which we will also denote by $N\mapsto \bar{N}$. In particular, image of the minimal quasi-idempotent $e\boxtimes e_\L$ in $e\D_U(G)$ will be denoted by $\bar{e_\L}$. An object $M\boxtimes N\in e\D_U(U)\boxtimes \D(T)$ corresponds to the object $M\ast \bar{N} \in e\D_U(G)$.
\erk
\subsection{The possibly disconnected case}
Let $G$ be a neutrally solvable group and let $(H,\N)$ be a Heisenberg admissible pair for $G$ and let $e\in \DG$ be the corresponding Heisenberg idempotent. In the next few sections, we will classify all the minimal quasi-idempotents in the $\Qlcl$-linear triangulated braided category $e\DG$. In this section, we study some of these minimal quasi-idempotents.
We continue to use the notation from the introduction of \S\ref{s:thc}. In particular $U$ is the unipotent radical of $G$ and $G^\circ=TU$ where $T$ is some maximal torus. We denote the surjection $G^\circ \onto T$ by $h\mapsto \bar h$. We have an action of $\Pi_0$ on $T$ coming from the conjugation action of $\Gamma=G/U$ on $T$ and this gives us an action of $G$ on $T$. We denote this action by $g:t\mapsto{}^gt$.
\subsubsection{The category $e\D_U(G)$}
We will first work with the category $e\D_U(G)$. We have $e\D_U(G)=\bigoplus\limits_{G^\circ g\in \Pi_0}e\D_U(G^\circ g)$. By \cite[Defn. 8.7, Prop. 8.8]{De2} for each $g\in G$ we have an equivalence
\beq
e\D_U(Ug)\boxtimes \D(T)\cong e\D_U(G^\circ g)\mbox{ defined by } M\boxtimes N\mapsto M\ast \bar{N},
\eeq
where $N\mapsto \bar{N}$ is the canonical monoidal functor $\D(T)\rar{}e\D_U(G^\circ)$ as defined in {\it loc. cit.} (see also Remark \ref{r:monfun}). Moreover, by \cite[Thm. 6.2]{De2} $e\D_U(Ug)\cong D^b(\tMg)$, where $\tMg$ is an invertible module category over the pointed modular category $\tM_{U,e}\cong \M(K_\N,\theta)$.
Note that for each $h\in G^\circ$ we have an equivalence of $e\D_U(U)$-module categories
\beq
e\D_U(Ug)\xto{(\cdot)\ast {\bar\delta_{{}^{g^{-1}}{\bar{h}}}}}e\D_U(Uhg).
\eeq
Now for each $a\in \Pi_0$, let us choose a lift $\ta\in G$ such that $\t{1}=1$. For $a,b\in \Pi_0$, let
\beq
\ta\tb=f(a,b)\t{ab}, \mbox{ where } f(a,b)\in G^\circ.
\eeq Then by \cite[Prop. 8.9]{De2}, the convolution $e\D_U(G^\circ\ta)\times e\D_U(G^\circ\tb)\rar{\ast}e\D_U(G^\circ\tilde{ab})$ (for $a,b\in \Pi_0$) can be identified with the composition
\beq
e\D_U(U\ta)\boxtimes \D(T)\times e\D_U(U\tb)\boxtimes \D(T)\rar{}e\D_U(U\ta\tb)\boxtimes \D(T)\rar{\cong}e\D_U(U\t{ab})\boxtimes \D(T)
\eeq defined by
\beq\label{e:convinedug}
(M_1\boxtimes N_1)\ast(M_2\boxtimes N_2)=(M_1\ast M_2\ast \bar{\delta}_{{}^{b^{-1}a^{-1}}(\bar{f(a,b)^{-1}})})\boxtimes (\delta_{{}^{b^{-1}a^{-1}}(\bar{f(a,b)})}\ast b^{-1}(N_1)\ast N_2).
\eeq
Let us define an auxiliary triangulated monoidal category $(\D,\ast')$ as follows:
\beq
\D=\bigoplus\limits_{a\in \Pi_0}e\D_U(U\ta)
\eeq
and we define $M_1\ast' M_2:=M_1\ast M_2\ast \bar\delta_{{}^{b^{-1}a^{-1}}(\bar{f(a,b)^{-1}})}$ for $M_1\in e\D_U(U\ta), M_2\in e\D_U(U\tb)$ and where the convolution on the right hand side comes from the category $e\D_U(G)$. Then $\D$ can be equipped with an associativity constraint using the isomorphisms $\bar\delta_s\ast \bar\delta_t\cong \bar\delta_{st}$ in $e\D_U(G)$ for $s,t\in T$. This associativity constraint is not quite canonical, however this does not matter in the proof of the next lemma. Moreover note that by \cite{De1} each $e\D_U(U\ta)$ is the bounded derived category of a finite semisimple abelian category and $\D$ is equivalent to the bounded derived category of a fusion category.
\blem\label{l:minqiedug}
Let $\L$ be a $\Pi_0$-equivariant multiplicative local system on $T$ and $e_\L\in \D(T)$ the corresponding minimal quasi-idempotent. Then $e\boxtimes e_\L\in e\D_U(U)\boxtimes \D(T)\cong e\D_U(G^\circ)\subset e\D_U(G)$ is a minimal weakly central quasi-idempotent in $e\D_U(G)$. (The image of $e\boxtimes e_\L$ in $e\D_U(G^\circ)\subset e\D_U(G)$ is $\beel$.) We have
\beq
{}^{\beel}e\D_U(G)=\bigoplus\limits_{G^\circ g\in \Pi_0}{}^{\beel}e\D_U(G^\circ g)\cong\bigoplus\limits_{G^\circ g\in \Pi_0} e\D_U(Ug)\boxtimes {}^{e_\L}\D(T).
\eeq
In other words, the full subcategory ${}^{\beel}e\D_U(G^\circ g)\subset e\D_U(G^\circ g)\cong e\D_U(Ug)\boxtimes \D(T)$ consists of objects of the form $\bar{M\boxtimes e_\L}$ with $M\in e\D_U(Ug)$. Hence we also obtain (see Definition \ref{d:qi} for notation)
\beq
{}^{\beel}e\D_U(G^\circ g)^\Delta=\bigoplus\limits_{G^\circ g\in \Pi_0}{}^{\beel}e\D_U(G^\circ g)^\Delta\cong\bigoplus\limits_{G^\circ g\in \Pi_0} e\D_U(Ug)\boxtimes {}^{e_\L}\D(T)^\Delta.
\eeq
\elem
\bpf
Using the $\Pi_0$-equivariance of $\L$ and (\ref{e:convinedug}), it is easy to check that $\beel$ is a weakly central quasi-idempotent in $e\D_U(G)$. Let $A\boxtimes B\in e\D_U(Ug)\boxtimes \D(T)$. Then we have $(e\boxtimes e_\L)\ast(A\boxtimes B)\cong A\boxtimes (g^{-1}(e_\L)\ast B)$. Since $\L$ is $\Pi_0$-equivariant, we obtain $(e\boxtimes e_\L)\ast(A\boxtimes B)\cong A\boxtimes (e_\L\ast B)\cong (\L\ast B)_1\otimes A\boxtimes e_\L$ using (\ref{e:elm}). Then as in the proof of Proposition \ref{p:mqics}, we conclude that each object in ${}^{(e\boxtimes e_\L)}e\D_U(Ug)\boxtimes \D(T)$ is of the form ${M\boxtimes e_\L}$. Now by Proposition \ref{p:qidbm} the nonzero quasi-idempotents in the category $(\D,\ast')$ defined above are all of the form $V\otimes e$ for some $V\in \Dmon$. Hence we see that all the nonzero quasi-idempotents in ${}^{\beel}e\D_U(G)$ are of the form $V\otimes \beel$ for some $V\in \Dmon$. Hence by Corollary \ref{c:altminqi} $\beel$ is a minimal weakly central quasi-idempotent in $e\D_U(G)$.
\epf
\subsubsection{The category $e\D_{G^\circ}(G)$}
Let us now study the category $e\D_{G^\circ}(G)$ which is a braided $\Pi_0$-crossed category:
\beq
e\D_{G^\circ}(G)=\bigoplus\limits_{G^\circ g\in \Pi_0}e\D_{G^\circ}(G^\circ g).
\eeq
By \cite[Prop. 8.10]{De2}, we have identifications
\beq
e\D_{G^\circ}(G^\circ g)\cong e\D_U(Ug)\boxtimes \D^g_T(T),
\eeq
where $\D^g_T(T)$ denotes the category $T$-equivariant $\Qlcl$-complexes for the $g$-twisted conjugation action of $T$ on itself. In terms of this identification, for $g_1,g_2\in G$, the convolution (cf. \cite[Prop. 8.9]{De2})
\beq
e\D_{G^\circ}(G^\circ g_1)\times e\D_{G^\circ}(G^\circ g_2)\rar{\ast}e\D_{G^\circ}(G^\circ g_1g_2) \mbox{ corresponds to the convolution }
\eeq
\beq
e\D_{U}(Ug_1)\boxtimes \D^{g_1}_T(T)\times e\D_{U}(Ug_2)\boxtimes \D^{g_2}_T(T)\rar{\ast}e\D_{U}(Ug_1g_2)\boxtimes \D^{g_1g_2}_T(T) \mbox{ defined by}
\eeq
\beq\label{e:convinedgg}
(M_1\boxtimes N_1)\ast (M_2\boxtimes N_2):=(M_1\ast M_2)\boxtimes ({}^{g_2^{-1}}(N_1)\ast N_2).
\eeq
Using the results of the previous section, we will prove
\bcor\label{c:beeledgg}
In the setup of Lemma \ref{l:minqiedug}, we may consider $\beel$ as an object of $e\D_{G^\circ}(G^\circ)\subset e\D_{G^\circ}(G)$. Then $\beel$ is a minimal weakly central quasi-idempotent in the braided $\Pi_0$-crossed category $e\D_{G^\circ}(G)$. We have
\beq\label{e:beeledgg}
{}^{\beel}e\D_{G^\circ}(G)=\bigoplus\limits_{G^\circ g\in \Pi_0}{}^{\beel}e\D_{G^\circ}(G^\circ g)\cong\bigoplus\limits_{G^\circ g\in \Pi_0} e\D_U(Ug)\boxtimes {}^{e_\L}\D^g_T(T).
\eeq
All objects of ${}^{\beel}e\D_{G^\circ}(G^\circ g)\cong e\D_U(Ug)\boxtimes {}^{e_\L}\D^g_T(T)$ are of the form $V\otimes (M\boxtimes e_\L)$ for some $M\in e\D_U(Ug)$ and $V\in \D_T(1)$. We also obtain (see Definition \ref{d:qi} for notation)
\beq\label{e:beeledggdelta}
{}^{\beel}e\D_{G^\circ}(G)^\Delta=\bigoplus\limits_{G^\circ g\in \Pi_0}{}^{\beel}e\D_{G^\circ}(G^\circ g)^\Delta\cong\bigoplus\limits_{G^\circ g\in \Pi_0} e\D_U(Ug)\boxtimes {}^{e_\L}\D^g_T(T)^\Delta.
\eeq
\ecor
\bpf
Note that we have a canonical monoidal functor $\D_T(T)\rar{}e\D_{G^\circ}(G^\circ)\subset e\D_{G^\circ}(G)$, which we also denote by $X\mapsto \bar{X}$. Then we see that $\beel$ is a $V_T$-quasi-idempotent in $e\D_{G^\circ}(G)$. We see that it is weakly central from (\ref{e:convinedgg}). Furthermore, we see that $\beel$ is a minimal weakly central quasi-idempotent in $e\D_{G^\circ}(G)$ using Lemma \ref{l:minqiedug} and the forgetful functor $e\D_{G^\circ}(G)\rar{}e\D_U(G)$. The proof of (\ref{e:beeledgg}) is similar to the proof of Lemma \ref{l:minqiedug} using (\ref{e:convinedgg}). To prove the next statement, we only need to further observe that all objects of ${}^{e_\L}\D_T^g(T)$ are of the form $V\otimes e_\L$ for some $V\in \D_T(\pt)$. First note that $e_\L$ is perverse up to a shift and is $\Pi_0$-equivariant. Using the isomorphism between the multiplicative local systems $\L$ and ${}^g\L$ on $T$, we obtain a canonical equivariant structure on $e_\L$ for the $g$-twisted action of $T$ on itself. Thus we see that $e_\L\in \D^g_T(T)$. Now using a similar argument as in the proof of Proposition \ref{p:eldt} we conclude that all objects of ${}^{e_\L}\D^g_T(T)$ are indeed of the form $V\otimes e_\L$ for some $V\in \D_T(1)$. Statement (\ref{e:beeledggdelta}) about the triangulated subcategories also follows.
\epf
\brk\label{r:edggdgg}
In the setting above, $\beel$ may also be considered as a minimal weakly central quasi-idempotent in $\D_{G^\circ}(G)$ and we see that ${}^{\beel}e\D_{G^\circ}(G)$ and ${}^{\beel}\D_{G^\circ}(G)$ are equal as full subcategories of $\D_{G^\circ}(G)$ and we may use either notation to denote it.
\erk
\subsubsection{Truncated convolution and fusion categories}
Let $\L$ be a $\Pi_0$-equivariant multiplicative local system on $T$ and $\beel\in e\D_{G^\circ}(G)$ the associated minimal weakly central quasi-idempotent. We will now associate with $\beel$ a braided $\Pi_0$-crossed fusion category which we will denote by $\tMbeel$.
\bprop\label{p:beeltrsubcat}
(i) Let $\L\in \C(T)(\Qlcl)^{\Pi_0}$. Then ${}^{\beel}e\D_{G^\circ}(G)^\Delta$ is a $\Qlcl$-linear triangulated braided $\Pi_0$-crossed semigroupal category. It has a unique non-degenerate bounded t-structure, denoted here by $(\D^{\leq 0}, \D^{\geq 0})$ with heart denoted by $\tMbeel^\Delta$, such that $\D^{\leq 0} \ast \D^{\leq 0} \subset \D^{\leq 0}$ and $\D^{\leq 0} \ast \D^{\leq 0}\not\subset \D^{\leq -1}$.\\
(ii) For each $i\in \Z, X\in {}^{\beel}e\D_{G^\circ}(G)^\Delta$ let $X^i\in \tMbeel^\Delta$ denote the $i$-th cohomology of $X$ with respect to this $t$-structure. The truncated convolution
\beq
\underline{\ast}:\tM_{G,\beel}^\Delta\times \tM_{G,\beel}^\Delta\rar{}\tM_{G,\beel}^\Delta \hbox{, defined as } X\uast Y:=(X\ast Y)^0 \h{ for } X,Y\in \tMbeel^\Delta
\eeq
equips $\tMbeel^\Delta$ with the structure of a braided $\Pi_0$-crossed semigroupal category.\\
(iii) Let $\tMbeel\subset \tMbeel^\Delta$ be the full subcategory formed by the semisimple objects. Then $\tMbeel$ is closed under truncated convolution, $\beel$ is a unit object for truncated convolution on $\tMbeel$ and $(\tMbeel,\uast, \beel)$ is a braided $\Pi_0$-crossed fusion category. The simple objects of $\tMbeel$ are of the form $\bar{M\boxtimes e_\L}$ with $M$ a simple object in $\tMg$ for some $g\in G$ and $e_\L$ is considered as an object of $\D_T^g(T)$.\\
(iv) The identity component of $\tMbeel$ is equivalent to the pointed modular category corresponding to the metric group $(K_\N,\theta)$ (see the introduction of \S\ref{s:thc}) and the Frobenius-Perron dimension of $\tMbeel$ (denoted by $\FPdim(\tMbeel)$) is equal to $|\Pi_0|\cdot |K_\N|\in\Z$.
\eprop
\bpf
To prove (i), let us first construct one $t$-structure satisfying the desired properties. We have described the categories ${}^{\beel}e\D_{G^\circ}(G)\subset {}^{\beel}e\D_{G^\circ}(G)^\Delta$ in Corollary \ref{c:beeledgg}. Now by \cite[Thm. 6.2]{De2}, we have $e\D_U(Ug)\cong D^b(\tMg)$ where $\tMg$ is an invertible $\tM_{U,e}$-module category. For $g\in G$, consider the $t$-structure on $e\D_{U}(Ug)$ whose heart is $\tMg$. Also let us consider the $t$-structure on the category ${}^{e_\L}\D_T^g(T)^\Delta$ such that the object $e_\L\in {}^{e_\L}\D^g_T(T)\subset {}^{e_\L}\D^g_T(T)^\Delta$ lies in its heart (which we denote by $\tM_{T,g,e_\L}^\Delta$). In this way, we obtain a $t$-structure on $e\D_U(Ug)\boxtimes {}^{e_\L}\D^g_T(T)^\Delta$. We transfer this $t$-structure to ${}^{\beel}e\D_{G^\circ}(G^\circ g)^\Delta$ using Corollary \ref{c:beeledgg}. Let us denote the heart of this $t$-structure by $\tM_{G^\circ g, \beel}^\Delta$. Thus we obtain a $t$-structure on all of ${}^{\beel}e\D_{G^\circ}(G)^\Delta$. We obtain a grading on the heart of this $t$-structure
\beq\label{e:Delgrading}
\tMbeel^\Delta = \bigoplus\limits_{G^\circ g\in \Pi_0} {\tM_{G^\circ g,\beel}^\Delta}\cong\bigoplus\limits_{G^\circ g\in \Pi_0} \tMg\boxtimes \tM_{T,g,e_\L}^\Delta.
\eeq
Using \cite[Thm. 6.2(iii)]{De2}, Corollary \ref{c:beeledgg} and (\ref{e:convinedgg}) we see that this $t$-structure on ${}^{\beel}e\D_{G^\circ}(G)$ satisfies the properties desired in (i).
Let us now prove the uniqueness of the $t$-structure from statement (i). By Appendix \ref{s:sasha}, the hearts of all the possible different non-degenerate bounded $t$-structures on ${}^{\beel}e\D_{G^\circ}(G)^\Delta$ must have as their simple objects the various shifts of the simple objects of $\tMbeel^\Delta$. Hence we see that there is a unique such $t$-structure which also satisfies the desired properties from (i).
To prove (ii), using the same argument as in \cite[Thm. 3.1.3.1]{Li}, we can construct canonical associativity as well as crossed braiding isomorphisms for the truncated convolution by truncating the corresponding structures from $e\D_{G^\circ}(G)^\Delta$.
We now prove (iii) and (iv). It is clear from (\ref{e:convinedgg}) that $\tMbeel$ is closed under truncated convolution and hence is a braided $\Pi_0$-crossed semigroupal category. From (\ref{e:Delgrading}) we obtain the grading
\beq\label{e:tmbeelgrading}
\tMbeel = \bigoplus\limits_{G^\circ g\in \Pi_0} {\tM_{G^\circ g,\beel}}\cong\bigoplus\limits_{G^\circ g\in \Pi_0} \tMg\boxtimes \tM_{T,g,e_\L},
\eeq
where $\Vec\cong\tM_{T,g,e_\L}\subset \tM_{T,g,e_\L}^\Delta$ is the full subcategory formed by (finite) direct sums of the simple object $e_\L$.
We will now prove that $(\tMbeel,\uast,\beel)$ is a fusion category. First note that we have a canonical morphism $\delta_1\rar{a}e_\L$ in $\D_T(T)$. The construction of this morphism is exactly the same as in the unipotent group case as described in \cite[\S8.1.2]{B1}. Moreover, using a similar argument to the one in \cite[\S8.3]{B1} we can prove that if we convolve this morphism with $e_\L$, we get a morphism $e_\L\rar{}e_\L\ast e_\L\cong V_T\otimes e_\L$ which is an isomorphism onto the direct summand $e_\L$ of $V_T\otimes e_\L$. Using this, we obtain a similar morphism $e\rar{a}\beel$ in $e\D_{G^\circ}(G)$. Now each simple object of $\tMg\boxtimes \tM_{T,g,e_\L}\cong \tM_{G^\circ g,\beel}$ is of the form $M\boxtimes e_\L$ for some simple $M\in \tMg$. Let $X\in\tM_{G^\circ g, \beel}$ be any object. Convolving the morphism $a$ with $X$, we obtain a morphism $X\rar{}\beel\ast X$. Then using the previous observations, we see that the induced morphism $X=X^0\rar{}(\beel\ast X)^0=\beel\uast X$ obtained by taking the $0$-th cohomology with respect to our chosen $t$-structure is a (functorial) isomorphism. This makes $\beel$ into a left unit in $\tMbeel$. Similarly, it is also a right unit. Thus we see that $(\tMbeel,\uast,\beel)$ has the canonical structure of a braided $\Pi_0$-crossed monoidal category with identity component $\tM_{G^\circ,\beel}\cong \tM_{U,e}$ (by (\ref{e:tmbeelgrading})), a pointed modular category which corresponds to the metric group $(K_\N,\theta)$ (cf. \cite{De1}). Now by \cite[\S6.1]{De1} we conclude that $\tMbeel$ is rigid and hence a fusion category as desired. The statement about the Frobenius-Perron dimension follows from the fact that $\FPdim(\M_{U,e})=|K_\N|$ and \cite{DGNO}.
\epf
\brk\label{r:spherical}
Under the identification $e\D_U(Ug)\boxtimes \D(T)\cong e\D_U(G^\circ g)$, the contravariant (weak) duality functor $(\cdot)^\vee=\f{D}^-(\cdot)[2\dim H](\dim H):e\D_U(G^\circ g)\rar{}e\D_U(G^\circ g^{-1})$ corresponds to
$$M\boxtimes N\mapsto M^\vee\boxtimes \f{D}^-g(N)=\f{D}^-M[2\dim H](\dim H)\boxtimes \f{D}^-g(N).$$ Now consider the identification $\tM_{G^\circ g,\beel}\cong \tM_{Ug,e}\boxtimes \tM_{T,g,e_\L}$. Note that the (rigid) duality in $\tM_{T,1,e_\L}(\cong \Vec)$ is given by $\f{D}^-(\cdot)[2\dim T](\dim T)$. Then we see that the duality functor $(\cdot)^*:\tM_{G^\circ g,\beel}\rar{}\tM_{G^\circ g^{-1},\beel}$ corresponds to $M\boxtimes N\mapsto \f{D}^-M[2\dim H](\dim H)\boxtimes \f{D}^-g(N)[2\dim T](\dim T)$. Hence we see that the (rigid) duality in $\tM_{G,\beel}$ is given by $\f{D}^-(\cdot)[2\dim H+2\dim T](\dim H+\dim T)$. We see that we have a natural identification of the square of the duality functor with the identity functor, or in other words $\tM_{G,\beel}$ has a natural spherical structure.
\erk
\subsection{Minimal quasi-idempotents in $e\DG$}\label{s:minqiedgg}
In this section we consider the category $e\DG$ and classify all minimal quasi-idempotents in it. We first obtain the following corollary of our previous results:
\bcor\label{c:minqiedgg}
(i) Let $\L\in \C(T)(\Qlcl)^{\Pi_0}$ be as before. Then we can consider $\beel$ as an object of $e\D_G(G^\circ)\subset e\DG$. Then $\beel$ is a minimal quasi-idempotent in the braided triangulated category $e\DG$ as well as the category $\DG$. \\
(ii) Furthermore, ${}^{\beel}e\D_{G}(G)^{\Delta}$ is a $\Qlcl$-linear triangulated braided semigroupal category. It has a unique $t$-structure, denoted here by $(\D^{\leq 0}, \D^{\geq 0})$, such that $\D^{\leq 0}\ast \D^{\leq 0}\subset \D^{\leq 0}$ but $\D^{\leq 0}\ast \D^{\leq 0}\nsubseteq \D^{\leq -1}$. \\
(iii) Let $\Mbeel^\Delta\subset {}^{\beel}\D_{G}(G)^\Delta$ denote the heart of the above $t$-structure. For each $i\in \Z, X\in {}^{\beel}\D_{G}(G)^\Delta$ let $X^i\in \Mbeel^\Delta$ denote the $i$-th cohomology of $X$ with respect to this $t$-structure. Then $(\M_{G,\beel}^\Delta,\underline{\ast})$ has the structure of a braided semigroupal category, where
\beq
\underline{\ast}:\M_{G,\beel}^\Delta\times \M_{G,\beel}^\Delta\rar{}\M_{G,\beel}^\Delta
\eeq denotes the truncated convolution functor defined by $X\uast Y:=(X\ast Y)^0$ for $X,Y\in \Mbeel^\Delta$. \\
(iv) Let $\Mbeel\subset \Mbeel^\Delta$ denote the full subcategory formed by the semisimple objects. Then $\Mbeel$ is closed under truncated convolution and $(\Mbeel,\uast,\beel)$ is a non-degenerate braided fusion category. We have an identification $\Mbeel=(\tMbeel)^{\Pi_0}$ and $\FPdim(\M_{G,\beel})=|\Pi_0|^2\cdot |K_\N|.$
\ecor
\bpf
Note that from the canonical monoidal functor $\D(T)\rar{}e\D_U(G^\circ)$, we also obtain a monoidal functor $\D_\Gamma(T)\rar{}e\D_G(G^\circ)\subset e\DG$ which we also denote by $X\mapsto \bar X$. Now we can consider $e_\L$ as an object of $\D_T(T)$ and since $\L$ is $\Gamma$-equivariant, we may consider $e_\L$ as an object of $\D_\Gamma(T)$. Thus we can consider the object $\beel$ as an object of $e\D_G(G)$. Then we see that $\beel$ is a minimal quasi-idempotent by using Lemma \ref{l:minqiedug} and the forgetful functor $e\D_G(G)\rar{}e\D_U(G)$. Statements (ii), (iii) and (iv) also follow readily from Proposition \ref{p:beeltrsubcat} after $\Pi_0$-equivariantization. Note that the non-degeneracy of the braided fusion category $\Mbeel$ follows from \cite[Prop. 4.56]{DGNO}.
\epf
We will now classify all minimal quasi-idempotents in the $\Qlcl$-linear triangulated braided category $e\DG$. We will use the facts about induction functors from Appendix \ref{a:iqimc}, where we have studied the induction of quasi-idempotents satisfying the ``(geometric) Mackey condition''.
\bthm\label{t:minqiedgg}
(i) Let $\L\in \C(T)(\Qlcl)$ be any multiplicative local system on $T$. Let $\Pi_0'\subset \Pi_0$ be the stabilizer of $\L$. Let $\Gamma'\subset \Gamma$ (resp. $G'\subset G$) be the subgroup containing $T$ (resp. $G^\circ$) such that $\Gamma'/T= \Pi_0'$ (resp. $G'/G^\circ= \Pi_0'$). Then $\beel$ is a minimal quasi-idempotent in $e\DGp$ satisfying the Mackey criterion with respect to $G$ and $f_\L:=\indg\beel\in e\DG$ is a minimal quasi-idempotent in $e\DG$. The isomorphism class of the minimal quasi-idempotent $f_\L\in e\DG$ only depends on the $\Pi_0$-orbit of $\L$.\\
(ii) The strongly semigroupal braided functor from Proposition \ref{p:indmac} is an equivalence and induces an equivalence
\beq
\indg:{}^{\beel}e\DGp^\Delta\rar{\cong}{ }^{f_\L}e\DG^\Delta
\eeq
of $\Qlcl$-linear triangulated braided semigroupal categories.\\
(iii) Let $f\in e\DG$ be any minimal quasi-idempotent. Then there exists a multiplicative local system $\L$ on $T$ such that $f\sim f_\L$. Moreover, the mapping $\L\mapsto f_\L$ defines a bijection between the set of orbits $\C(T)(\Qlcl)/\Pi_0$ and the set of equivalence classes of minimal quasi-idempotents in $e\DG$.\\
(iii$'$) Each equivalence class of minimal quasi-idempotents in $e\DG$ contains a unique (up to isomorphism) indecomposable object. This indecomposable object is of the form $f_\L$ for some $\L\in \C(T)(\Qlcl)$. Any minimal quasi-idempotent in the corresponding equivalence class is of the form $W\otimes f_\L$ for some $W\in \Dmon$.
\ethm
We first prove the following:
\blem\label{l:multls}
Let $X\in e\D_U(G)$ be any nonzero object. Then there exists a multiplicative local system $\L$ on $T$ such that $\beel\ast X\neq 0$. For any $X\in e\DG$, there exists a multiplicative local system $\L$ on $T$ such that $f_\L\ast X\neq 0$.
\elem
\bpf
Without loss of generality (say by passing to an indecomposable component of $X$), we may suppose that $X\in e\D_U(G^\circ g)\cong e\D_U(Ug)\boxtimes \D(T)$ corresponds to an object of the form $A\boxtimes B$ for some $g\in G$, $A\in e\D_U(Ug)$ and $B\in \D(T)$. Then by (\ref{e:convinedug}) or by \cite[Defn. 8.7, Prop. 8.8]{De2} we have $(\eel)\ast(A\boxtimes B)\cong A\boxtimes({}^{g^{-1}}(e_\L)\ast B)$. Now using Lemma \ref{l:mellin}(ii), we complete the proof of the first part of the Lemma.
Now suppose that $X\in \DG$. Applying the forgetful functor, we may consider $X$ as an object of $\D_U(G)$. Then by the first part, there exists an $\L$ such that $\beel\ast X\neq 0$. Now by definition $f_\L=\indg \beel$ is isomorphic (as an object of $e\D_U(G)$) to a direct sum of conjugates of $\beel$. Hence we conclude that $f_\L\ast X\neq 0$.
\epf
\begin{proof}[Proof of Theorem \ref{t:minqiedgg}]
We see that $\beel\in e\DGp$ is a minimal quasi-idempotent by Corollary \ref{c:minqiedgg}. Moreover, if $x\in G-G'$, then the multiplicative local systems $\L$ and ${}^x\L$ are non-isomorphic. Hence we deduce that $\beel\ast{}^x(\beel)=0$. This means that $\beel\in e\DGp$ satisfies the Mackey condition with respect to $G$. Then by Appendix \ref{a:iqimc}, $f_\L=\indg\beel$ is a quasi-idempotent in $e\DG$. If we consider $f_\L$ as an object of $e\D_U(G)$ (or even of $e\D_{G^\circ}(G)$), it is isomorphic to a direct sum
\beq
f_\L\cong \bigoplus\limits_{G' g\in G/G'}{}^g(\beel).
\eeq
Moreover it is also clear that for any $g\in G$, $f_{{}^g(\L)}\cong f_\L$. To complete the proof of (i), we must show that $f_\L$ is a minimal quasi-idempotent. We will first prove (ii). This would also complete the proof of (i) by Corollary \ref{c:altminqi} since we already know that $\beel\in e\DGp$ is a minimal quasi-idempotent.
Now we have ${}^{\beel}\DGp\cong \left({}^{\beel}\D_{G^\circ}(G')\right)^{\Pi_0'}$ and ${}^{f_\L}\DG\cong{}^{f_\L}\left(e\D_{G^\circ}(G)^{\Pi_0}\right)$. Then we see that
\beq
\indg: \left({}^{\beel}\D_{G^\circ}(G')\right)^{\Pi_0'}\rar{} { }^{f_\L}\left(e\D_{G^\circ}(G)^{\Pi_0}\right)
\eeq
is an equivalence, completing the proof of (i), (ii).
To prove (iii), note that by Lemma \ref{l:multls}, given a minimal quasi-idempotent $f\in e\DG$, there exists a multiplicative local system $\L$ on $T$ such that $f_\L\ast f\neq 0$. Since both $f$ and $f_\L$ are minimal quasi-idempotents, we conclude that $f\sim f_\L$. Moreover it is clear that $f_\L\sim f_{\L'}$ if and only if $\L$ and $\L'$ lie in the same $\Pi_0$-orbit in $\C(T)(\Qlcl)$. Statement (iii$'$) also follows using the same argument as in the proof of Corollary \ref{c:allminqi}.
\end{proof}
\brk\label{r:vtqi}
Note that since $e_\L\in \D_T(T)$ is a $V_T$-quasi-idempotent, each $f_\L\in e\D_G(G)$ is also a $V_T$-quasi-idempotent. In other words, each indecomposable minimal quasi-idempotent in $e\DG$ is a $V_T$-quasi-idempotent.
\erk
\subsection{The modular category and character sheaves associated with a minimal quasi-idempotent}\label{s:mccsamqi}
In this section we will define the set $CS_e(G)$ of all character sheaves associated with the Heisenberg idempotent $e\in \DG$. As a corollary of the results of the previous section, we can associate a modular category with any minimal quasi-idempotent in $e\DG$:
\bcor\label{c:modcat}
(i) Let $f$ be any minimal quasi-idempotent in $e\DG$. Without loss of generality assume that $f$ is indecomposable. Then ${}^fe\DG^\Delta={}^f\DG^\Delta$ is a $\Qlcl$-linear triangulated braided semigroupal category. It has a unique $t$-structure, denoted here by $(\D^{\leq 0}, \D^{\geq 0})$, such that $\D^{\leq 0}\ast \D^{\leq 0}\subset \D^{\leq 0}$ but $\D^{\leq 0}\ast \D^{\leq 0}\nsubseteq \D^{\leq -1}$. \\
(ii) Let $\M_{G,f}^\Delta\subset {}^{f}\D_{G}(G)^\Delta$ denote the heart of the above $t$-structure. For each $i\in \Z, X\in {}^{f}\D_{G}(G)^\Delta$ let $X^i\in \M_{G,f}^\Delta$ denote the $i$-th cohomology of $X$ with respect to this $t$-structure. Then $(\M_{G,f}^\Delta,\underline{\ast})$ has the structure of a braided semigroupal category, where
\beq
\underline{\ast}:\M_{G,f}^\Delta\times \M^\Delta_{G,f}\rar{}\M^\Delta_{G,f}
\eeq denotes the truncated convolution functor defined by $X\uast Y:=(X\ast Y)^0$ for $X,Y\in \M^\Delta_{G,f}$. \\
(iii) Let $\M_{G,f}\subset \M_{G,f}^\Delta$ denote the full subcategory formed by the semisimple objects. Then $\M_{G,f}={}^f\DG\cap \M_{G,f}^\Delta$ is closed under truncated convolution and $(\M_{G,f},\uast,f)$ has the structure of a non-degenerate braided fusion category. There is a natural spherical structure on $\M_{G,f}$, thus giving it the structure of a modular category.\\
(iv) The Frobenius-Perron dimension $\FPdim(\M_{G,f})$ is the square of an integer.\\
(v) Suppose that the ground field $\k$ is $\Fqcl$. Then the natural spherical structure on $\M_{G,f}$ is positive integral, i.e. categorical dimensions of all objects of $\M_{G,f}$ are positive integers.
\ecor
\bpf
Statements (i), (ii), (iii), (iv) follow from Corollary \ref{c:minqiedgg}, Theorem \ref{t:minqiedgg}, Remark \ref{r:spherical} and the fact that $|K_\N|=p^{2k}$ for some $k\in \Z_{\geq 0}$ (cf. \cite{Da}). Statement (v) follows from \cite[\S7.2]{De4}.
\epf
\brk
The natural spherical structure on $\M_{G,f}$ can also be defined using the twist $\theta$ in the category $\DG$ (cf. \cite{BD}).
\erk
Let us now define character sheaves associated with the Heisenberg idempotent $e\in \DG$. First note that if $f,f'\in e\DG$ are minimal quasi-idempotents which are not equivalent, then $f\ast f'=0$ and hence ${}^f\DG\cap {}^{f'}\DG=0$. Let $\f{L}_e(G)$ denote the set of isomorphism classes of indecomposable minimal quasi-idempotents in $e\DG$, or equivalently, the set of equivalence classes of minimal quasi-idempotents in $e\DG$. By Theorem \ref{t:minqiedgg}(iii) we have an identification $\f{L}_e(G)\cong \C(T)(\Qlcl)/\Pi_0$. As we will define below, the set $\f{L}_e(G)$ parametrizes the $\f{L}$-packets of character sheaves in the category $e\DG$.
\bdefn\label{d:csfg}
(i) Let $f\in e\DG$ be an indecomposable minimal quasi-idempotent. Let $\CS_{f}(G)=\CS_{e,f}(G)$ denote the (finite) set of isomorphism classes of simple objects of the modular category $\M_{G,f}\subset {}^f\DG\subset {}^f\D_G(G)^\Delta\subset \DG$. Then we say that the finite set $\CS_f(G)$ is the $\f{L}$-packet of character sheaves on $G$ associated with the (indecomposable) minimal quasi-idempotent $f\in e\DG$. Note that in particular $f$ is itself a character sheaf.\\
(ii) The set $\CS_e(G)$ of character sheaves on $G$ associated with the Heisenberg idempotent $e\in \DG$ is defined as the (disjoint) union of all the $\f{L}$-packets of character sheaves in $e\DG$:
\beq
\CS_e(G):=\coprod\limits_{f\in \f{L}_e(G)} \CS_f(G)= \coprod\limits_{\<\L\>\in \C(T)(\Qlcl)/\Pi_0} \CS_{f_\L}(G).
\eeq
\edefn
\brk\label{r:csedgg}
Let us note that the set $CS_e(G)$ as well as its $\f{L}$-packet decomposition has been described purely in terms of the $\Qlcl$-linear triangulated braided monoidal structure of the category $e\DG$: We look at a minimal quasi-idempotent in this category and then we look at the associated full subcategory which has a canonical $t$-structure which is used to define the character sheaves. It is also clear that for each $C\in \CS_e(G)$, we have $\Hom_{\DG}(C,C)=\Qlcl$. Thus we have now completed the proof of the Heisenberg case version of Theorem \ref{t:main1}.
\erk
\subsection{Perversity of character sheaves in the Heisenberg case}\label{s:pcshc}
We will now see that all the character sheaves in the set $CS_e(G)$ (where $e$ is a Heisenberg idempotent) are perverse up to a shift. We must remark however that this will not necessarily be true for character sheaves associated with general minimal idempotents in $\DG$.
We continue using our previous notations and conventions. In particular $e=\N\boxtimes \can_H$ is the Heisenberg idempotent associated with a Heisenberg admissible pair $(H,\N)$. Note that for each $G^\circ g\in \Pi_0$, we have an equivalence $e\D_U(Ug)\boxtimes \D(T)\cong e\D_U(G^\circ g)$ which has been extensively used previously. Note that there is a perverse $t$-structure on both sides of the equivalence.
\blem\label{l:perversity}
The equivalence $e\D_U(Ug)\boxtimes \D(T)\cong e\D_U(G^\circ g)$ respects the perverse $t$-structure on both the sides. As a consequence, the equivalence $e\D_U(Ug)\boxtimes \D^g_T(T)\cong e\D_{G^\circ}(G^\circ g)$ also respects the perverse $t$-structure on both the sides.
\elem
\bpf
Let us first consider the canonical equivalence $e\D_U(U)\boxtimes \D(T)\cong e\D_U(G^\circ)$. This equivalence has been defined in \cite[\S8.4]{De2}. In the definition we use an extension of the Heisenberg admissible pair $(H,\N)$ to a central admissible pair $(L,\N')$. Recall that the equivalence is then defined using a certain induction (or averaging) functor which defines an equivalence
\beq
\av_{U/U_TL}:e_{\N'}\D_{U_TL}(U_TLT)\rar\cong e\D_U(G^\circ),
\eeq
where $H\subset U_T\subset U$ is such that $U_T/H=(U/H)^T$. We refer to \cite[\S8.4]{De2} for the details and notations. Now $e_{\N'}$ is a closed idempotent in $\D_{U_TL}(U_TLT)$ and $e\cong \av_{U/U_TL}(e_\N')$ is a closed idempotent in $\D_U(G^\circ)$. Hence by the argument from \cite[\S5.6]{BD}, the canonical arrow $\av_{U/U_TL} N\rar{}\h{Av}_{U/U_TL}N$ is an isomorphism for each $N\in e_{\N'}\D_{U_TL}(U_TLT)$. Then using the results and arguments from \cite[\S7.5]{BD} we see that the equivalence $\av_{U/U_TL}:e_{\N'}\D_{U_TL}(U_TLT)\rar\cong e\D_U(G^\circ)$ takes the perverse $t$-structure on $e_{\N'}\D_{U_TL}(U_TLT)$ to a suitably shifted perverse $t$-structure on $e\D_U(G)$ and also that the equivalence $e\D_U(U)\boxtimes \D(T)\cong e\D_U(G^\circ)$ preserves the perverse $t$-structures on both the sides.
Now let us consider a general connected component $G^\circ g$ and the equivalence $e\D_U(Ug)\boxtimes \D(T)\cong e\D_U(G^\circ g)$ defined by $M\boxtimes N\mapsto M\ast \bar{N}$. Note that $e[-\dim H]$ is perverse and hence the previous argument shows that the functor $N\mapsto \bar N$ (which is defined as the composition $\D(T)\rar{}e\D_U(U)\boxtimes \D(T)\rar{}e\D_U(G^\circ)\subset e\D_U(G)$) takes a perverse sheaf in $\D(T)$ to a perverse sheaf shifted by $\dim H$.
Note that we have the full subcategory $\tM_{Ug,e}\subset e\D_U(Ug)$ of perverse sheaves shifted by $\dim H$. By \cite[Thm. 6.2(i)]{De2} $\tM_{Ug,e}$ is a semisimple abelian category and $e\D_U(G)\cong D^b\tM_{Ug,e}$. Now the fact that the equivalence $e\D_U(Ug)\boxtimes \D(T)\cong e\D_U(G^\circ g)$ preserves the perverse $t$-structures follows from Lemma \ref{l:convperv} proved below.
\epf
\blem\label{l:convperv}
Let $M\in \tM_{Ug,e}$. Then the triangulated functor $M\ast(\cdot):e\D_U(G^\circ)\rar{}e\D_U(G^\circ g)$ is exact with respect to the perverse $t$-structures.
\elem
\bpf
By \cite[Lem. 2.1.3.1]{Li} it suffices to prove that $M\ast P$ is perverse whenever $P\in e\D_U(G^\circ)$ is perverse. Note the object $M$ has a rigid dual $M^\vee\in \tM_{Ug^{-1},e}$ (cf. \cite[Thm. 6.2(vi)]{De2}) and we have $M^\vee\ast M\cong e\oplus X\in \tM_{U,e}=\M_{U,e}$. In particular, if $X\in e\D_U(G)$ is non-zero, then $M\ast X$ must also be non-zero. Now by \cite[Prop. 5.2]{De1} we must have $M\ast P\in {}^p\D^{\geq 0}(G^\circ g)$. On the other hand, $M^\vee\ast M\ast P\in \Perv(G^\circ)$ by Lemma \ref{l:perversity} for the case of $e\D_U(G^\circ)$ which has already been established. Hence we conclude that $M\ast P$ must also be perverse. This completes the proof of the lemma.
\epf
\bthm\label{t:perversity}
(i) Let $\L\in \C(T)(\Qlcl)^{\Pi_0}$ and let $\beel\in e\D_{G^\circ}(G)$ be the corresponding minimal weakly central quasi-idempotent. Then the preferred $t$-structure on ${}^{\beel}\D_{G^\circ}(G)^\Delta$ (from Proposition \ref{p:beeltrsubcat}) is equal to the perverse $t$-structure shifted by $\dim H+\dim T$.\\
(ii) Let $\L\in \C(T)(\Qlcl)$ be any multiplicative local system on $T$ and let $f_\L\in e\D_{G}(G)$ be the corresponding minimal quasi-idempotent. Then the preferred $t$-structure on ${}^{f_\L}\D_{G}(G)^\Delta$ (cf. Corollary \ref{c:modcat}) is equal to the perverse $t$-structure shifted by $\dim H+\dim T$. In particular, all the character sheaves associated with the Heisenberg idempotent $e$ are perverse sheaves shifted by $\dim H+\dim T$.
\ethm
\bpf
To prove (i), note that by Lemma \ref{l:perversity}, the equivalence $e\D_U(Ug)\boxtimes {}^{e_\L}\D^g_T(T)^\Delta\cong {}^{\beel}\D_{G^\circ}(G^\circ g)^\Delta$ (cf. Corollary \ref{c:beeledgg}) respects the perverse $t$-structures. In the proof of Proposition \ref{p:beeltrsubcat} we have constructed the preferred $t$-structure on ${}^{\beel}\D_{G^\circ}(G^\circ g)$ using the perverse $t$-structure on $e\D_U(Ug)$ shifted by $\dim H$ and the perverse $t$-structure on ${}^{e_\L}\D^g_T(T)^\Delta$ shifted by $\dim T$. This precisely corresponds to the perverse $t$-structure on ${}^{\beel}\D_{G^\circ}(G^\circ g)$ shifted by $\dim H+\dim T$. Statement (i) now follows.
Statement (ii) follows from (i) using Corollary \ref{c:minqiedgg}, Theorem \ref{t:minqiedgg} and Corollary \ref{c:modcat}. Since the character sheaves in the $\f{\L}$-packet associated with the minimal quasi-idempotent $f_\L$ are defined to lie in the heart of this preferred $t$-structure (cf. Definition \ref{d:csfg}) we see that all character sheaves associated with $e$ are perverse sheaves shifted by $\dim H+\dim T$.
\epf
\section{Irreducible characters associated with Heisenberg idempotents}\label{s:icahi}
In this section, we assume that our base field $\k$ is equal to $\Fqcl$ and that our neutrally solvable group $G$ is equipped with an $\Fq$-Frobenius map $F:G\rar{}G$. As we have stated before, we should also consider all pure inner forms (which are parametrized by the finite set $H^1(F,G)=H^1(F,\Pi_0)$) of the Frobenius.
Now suppose that the Heisenberg idempotent $e\in \DG$ (coming from the Heisenberg admissible pair $(H,\N)$) is $F$-stable. Since $e$ is supported on $H$, $H$ must be an $F$-stable (connected normal) subgroup. Moreover, the multiplicative local system $\N\in H^*$ must also be $F$-stable. Hence the Heisenberg admissible pair $(H,\N)$ is $F$-stable and hence it comes by base change from a Heisenberg admissible pair $(H_0,\N_0)$ defined over $\Fq$. Let $e_0\in \DGn$ be the corresponding Heisenberg idempotent. By taking the sheaf-function correspondence (cf. \S\ref{s:i}) for the multiplicative local system $\N_0$, we obtain for each of the forms $H^t_0(\Fq)$, the corresponding character $\T^t_{\N_0}:H^t_0(\Fq)\rar{}\Qlcl^\times$ and we may combine these into the function $\T_{\N_0}\in \FunG$ by extension by zero outside $H$. Similarly, we have the function $\T_{e_0}=\frac{\T_{\N_0}}{q^{\dim H}}\in \FunG$. Moreover $\T_{e_0}$ is an idempotent in $\FunG$ and is supported only $H$. Consider the Hecke subalgebra $\T_{e_0}\FunG$ with unit $\T_{e_0}$. Let $\Irrep_{e}(G,F)\subset \Irrep(G,F)$ denote the set of irreducible representations (of all pure inner forms of $G^F$) such that the idempotent $\bar{\T_{e_0}}$ (``complex conjugate'' of the idempotent $\T_{e_0}$) acts by the identity. Taking the characters of the irreducible representations, we can consider $\Irrep_{e}(G,F)$ as an orthonormal basis of $\T_{e_0}\FunG$. In this section our goal is to study the set $\Irrepe$ and its relationship with the set $CS_e(G)^F$ of $F$-stable character sheaves associated with $e$.
\brk\label{r:fqform}
The $\Fq$-form $G_0$ of $G$ also defines for us the $\Fq$-forms $U_0, G^\circ_0$ and $T_0:=G^\circ_0/U_0$ of $U, G^\circ$ and $T$ respectively.
\erk
Let us now interpret the set $\Irrepe$ in terms of the category $\D^F_G(G)\cong \D_G(GF)$ of $F$-twisted conjugation equivariant $\Qlcl$-complexes on $G$ that is studied in \cite[\S2.4]{De3}. Recall from {\it loc. cit.} that $\D^F_G(G)$ is equivalent to the bounded derived category of the category of representations of all pure inner forms of $G^F$. In particular $\D^F_G(G)$ also happens to be a semisimple abelian category with simple objects parametrized by $\Irrep(G,F)\times \Z$. (Here $\Z$ corresponds to the shifts in degree.) Given an irreducible representation $W\in \Irrep(G,F)$, we have the associated local system $W_{loc}\in \Sh^F_G(G)\subset \D^F_G(G)$. Moreover, recall that $\D^F_G(G)\cong \D_G(GF)$ is a $\DG$-module category. The following result is proved in \cite[Prop. 6.5]{De3}:
\bprop\label{p:irrepe}
If $W\in \Irrepe$, then $W_{loc}$ lies in the full subcategory $e\D^F_G(G)\subset \D^F_G(G)$. The map $W\mapsto W_{loc}$ sets up a bijection between the set $\Irrepe$ and the set of (isomorphism classes of) simple objects in $e\Sh^F_G(G)$.
\eprop
Combining the results above, let us state the following equivalent characterizations of the set $\Irrepe$:
\bcor\label{c:irrepe}
Let $W\in \Irrep(G,F)$ be an irreducible representation of a pure inner form, say $G^t_0(\Fq)$. Then the following are equivalent:\\
(i) $W\in \Irrepe$.\\
(ii) The subgroup $H^t_0(\Fq)\subset G^t_0(\Fq)$ acts on $W$ by the character $\T_{\N_0}^t:H^t_0(\Fq)\rar{}\Qlcl^\times$.\\
(iii) The dual (i.e., `complex conjugate') idempotent $\bar{\T_{e_0}}\in\FunG$ acts on $W$ trivially.\\
(iv) The character $\chi_W$ lies in $\T_{e_0}\FunG\subset \FunG$.\\
(v) $W_{loc}\in e\D_G(GF)$.\\
The set $\{\chi_W|W\in \Irrepe\}$ forms an orthonormal basis of $\T_{e_0}\FunG$.
\ecor
\subsection{$F$-stable minimal quasi-idempotents}
We have defined $\fL$-packets of character sheaves associated with $e$ in \S\ref{s:mccsamqi}. These $\f{L}$-packets are parametrized by the set $\fL_e(G)$ of isomorphism classes of indecomposable minimal quasi-idempotents in $e\DG$. Recall that by Theorem \ref{t:minqiedgg}, we have a canonical identification $\fL_e(G)=\C(T)(\Qlcl)/\Pi_0$.
Note that in our current situation we also have a braided triangulated auto-equivalence $F^*:e\DG\rar{\cong}e\DG$ with inverse $F:=F_*:e\DG\rar{\cong}e\DG$. In particular, this induces a permutation of the set $\fL_e(G)$ as well as the set $CS_e(G)$ of character sheaves. Using Theorem \ref{t:minqiedgg} (and the same notation), we obtain:
\blem\label{l:faction}
For each $\L\in \C(T)(\Qlcl)$ we have canonical isomorphisms $$F^*f_\L=F^*\indg(\beel)\cong \ind_{F^{-1}(G)}^G(F^*\beel)\cong \ind_{F^{-1}(G)}^G(\bar{e_{F^*\L}})=f_{F^*\L}.$$ Hence the permutation of $\fL_e(G)$ induced by $F^*$ matches with the permutation of $\C(T)(\Qlcl)/\Pi_0$ induced by $F^*$.
\elem
We want to partition the set $\Irrepe$ into what we will call $\fL$-packets of irreducible characters associated with the $F$-stable Heisenberg idempotent $e$. We will see that these $\fL$-packets are parametrized by the set $\fL_e(G)^F$.
Now we have the canonical triangulated monoidal functor $\D(T)\rar{}e\D_U(G^\circ)$ which is fully faithful onto a direct summand of the category $e\D_U(G^\circ)$. We will now prove that there is a canonical monoidal functor $\D(T_0)\rar{}e_0\D_{U_0}(G_0^\circ)$ which is fully faithful onto a direct summand of the category $e\D_{U_0}(G_0^\circ)$ and which is compatible with the functor $\D(T)\rar{}e\D_U(G^\circ)$ and extension of scalars.
Now by the construction of \cite[\S8.4]{De2}, the functor $\D(T)\rar{}e\D_U(G^\circ)$ can be constructed using a certain central admissible pair $(L,\N')$ for $G^\circ$. Now this central admissible pair is defined over $\F_{q^n}$ for some positive integer $n$, i.e. it comes from a central admissible pair $(L_1,\N_1')$ defined over $\F_{q^n}$ for $G^\circ_1:=G_0\otimes_{\F_{q}}\F_{q^n}$. Let $e_1$ be obtained from $e_0$ by base change to $\F_{q^n}$. Hence using the construction of \cite[\S8.4]{De2} over the field $\F_{q^n}$, we obtain a canonical functor $\D(T_1)\rar{}e_1\D_{U_1}(G^\circ_1)$ which is compatible with the $\Fq$-Frobenius.
Now an object of $\D(T_0)$ can be considered as an object of $\D(T_1)$ equipped with some descent data for the finite \'etale cover $T_1\rar{}T_0$. Now such descent data defines for us similar descent data for $e_1\D_{U_1}(G^\circ_1)$, or equivalently an object of $e_0\D_{U_0}(G^\circ_0)$. Hence we have proved:
\bprop\label{p:descent}
We have a canonical triangulated monoidal functor $\D(T_0)\rar{}e_0\D_{U_0}(G_0^\circ)$ which is fully faithful onto a direct summand of the category $e_0\D_{U_0}(G_0^\circ)$ and the following diagram commutes up to a natural isomorphism
$$\xymatrixcolsep{5pc}\xymatrix{
\D(T_0)\ar[r]\ar[d] & e_0\D_{U_0}(G^\circ_0)\ar[d]\\
\D(T)\ar[r] & e\D_U(G^\circ).\\
}$$
Similarly, we have a canonical triangulated monoidal functor $\D_{T_0}(T_0)\rar{}e_0\D_{G^\circ_0}(G_0^\circ)$ which is fully faithful onto a direct summand of the category $e_0\D_{G^\circ_0}(G_0^\circ)$.
\eprop
By Remark \ref{r:vtqi}, each indecomposable minimal quasi-idempotent in $e\DG$ is a $V_T$-quasi-idempotent. Note that the object $V_T=H^*_c(T,\can_T)\in \D_G(\h{Spec}(\k))$ can be obtained by base change from the object $V_{T_0}=H^*_c(T_0,\can_{T_0})\in \D_{G_0}(\h{Spec} \Fq)$. Also note that since $e_0$ is perverse up to a shift, it is the unique weak idempotent in $\DGn$ (up to isomorphism) whose base change to $\DG$ is isomorphic to $e$ (cf. \cite[\S6.1]{B}).
\bprop\label{p:fstminqi}
(i) Let $f\in e\DG$ be an indecomposable minimal quasi-idempotent such that $F^*f\cong f.$ Then there exists a unique (up to isomorphism) $f_0\in \DGn$ whose base change to $\DG$ is isomorphic to $f$ and such that $f_0\ast f_0\cong V_{T_0}\otimes f_0$.\\
(ii) Let $f$ be as above. Say $f\cong f_\L$ with $\L\in \C(T)(\Qlcl)$. Then since $f$ is $F$-stable, the $\Pi_0$-orbit of $\L$ in $\C(T)(\Qlcl)$ is $F$-stable, i.e. $F^*\L\cong g(\L)$ for some $g\in \Pi_0$, i.e. $(gF)^*\L\cong \L$. Then there exists a unique multiplicative local system $\L_0^g$ on the $\Fq$-form $T_0^g$ (corresponding to the Frobenius $gF:T\to T$) whose base change to $T$ is $\L$. Then the $f_0$ from (i) can be constructed as $f_0:=f_{\L_0^g}\in \D_{G_0^g}(G_0^g)\cong\DGn$.
\eprop
\bpf
We have seen in Theorem \ref{t:perversity} that each indecomposable minimal quasi-idempotent $f$ in $e\DG$ is a perverse sheaf shifted by $\dim H+\dim T$. Hence the uniqueness part of (i) follows from \cite[\S6.1]{B}. To show existence, it suffices to prove (ii). Note that by Lemma \ref{l:faction}, we have $F^*f_\L\cong f_{F^*\L}$. Hence if $f_\L$ is $F$-stable we must have $(gF)^*\L\cong \L$ for some $g\in \Pi_0$. Hence $\L$ comes by base change from a unique multiplicative local system $\L_0^g$ on $T_0^g$. Here $T_0^g$ is the $\Fq$-form of $T$ corresponding to the Frobenius $gF:T\to T$. Then using Proposition \ref{p:descent} we can construct the object $f_{\L_0^g}\in \D_{G_0^g}(G^g_0)$ such that we have $f_{\L_0^g}\ast f_{\L_0^g}\cong V_{T_0^g}\otimes f_{\L_0^g}$. It is clear that by base change of $f_{\L_0^g}$ to $\DG$ we obtain $f_\L$. Moreover by \cite[\S4.4]{B} we have an identifications $\D_{G_0^g}(G_0^g)\cong\DGn$ and $\D_{G_0^g}(\h{Spec}(\Fq))\cong\D_{G_0}(\h{Spec}(\Fq))$ under which $V_{T_0^g}$ maps to $V_{T_0}$. This completes the proof.
\epf
\brk\label{r:bijctql}
The previous result means that given an $F$-stable $\fL$-packet associated with $e$ (i.e. an element of the set $(\C(T)(\Qlcl)/\Pi_0)^F=\fL_e(G)^F$) we can define the corresponding object $f_0\in e_0\DGn$.
\erk
\brk\label{r:trf}
Let $f\in \f{L}_e(G)$ be an $F$-stable indecomposable minimal quasi-idempotent. We have $V_{T_0}\in \D_{G_0}(\h{Spec} \Fq)\subset \DGn$ considered as a complex supported at $1\in G_0$. Then we have seen in Proposition \ref{p:fstminqi} that $f_0\ast f_0\cong {V_{T_0}}\ast f_0$ and hence
\beq\label{e:trf}\T_{f_0}\ast \T_{f_0}=\T_{V_{T_0}}\ast \T_{f_0}.\eeq
Note that the function $\T_{V_{T_0}}$ is only supported on $1\in G$ and corresponding to the inner form $G^t_0(\Fq)$ we have $\T^t_{V_{T_0}}(1)=\frac{|T^t_0(\Fq)|}{q^{\dim T}}$. Consider the function
$${\t{\T}}_{f_0}^t:=\frac{q^{\dim T}}{|T^t_0(\Fq)|}\cdot \T_{f_0}^t\in \Fun(G^t_0(\Fq)/\sim).$$
Then from (\ref{e:trf}), we conclude that $\t{\T}_{f_0}^t$ is an idempotent. Combining these functions over all the pure inner forms we obtain the idempotent $\t{\T}_{f_0}\in \T_{e_0}\FunG\subset \FunG$.
\erk
\subsection{$\fL$-packets of irreducible characters in $\Irrep_{e}(G,F)$}\label{s:lpicirrepe}
In this section, we will partition the set $\Irrepe$ into what we will call $\fL$-packets of irreducible characters which will be parametrized by the set $\fL_e(G)^F$. Recall that the category $e\D_G(GF)\cong e\D^F_G(G)$ is the bounded derived category of a finite semisimple category and hence is itself a semisimple abelian triangulated category. The simple objects of $e\D_G(GF)$ are parametrized by $\Irrepe\times \Z$ (cf. Proposition \ref{p:irrepe}) with $\Z$ corresponding to the degree shift.
We have (cf. \cite[Prop. 8.10]{De2})
\beq\label{e:edggf}
e\D_{G^\circ}(GF)=\bigoplus\limits_{G^\circ g\in \Pi_0}e\D_{G^\circ}(G^\circ gF)\cong \bigoplus\limits_{G^\circ g\in \Pi_0}e\D_{U}(U gF)\boxtimes \D_T^{gF}(T).
\eeq
Hence we see that each simple object of $e\D_{G^\circ}(GF)$ is of the form $\bar{M\boxtimes N}$, where $M$ is a simple object of $e\D_{U}(U gF)$ and $N$ a simple object of $\D^{gF}_T(T)$ for some $g\in G$.
\blem\label{l:edgn}
Consider a connected component $G^\circ g\subset G$ and the Frobenius $gF:G^\circ \to G^\circ$. Let $W\in \Irrep_{e}(G^\circ, gF)=\Irrep_{e}({G^\circ}^{gF}).$ Then there exists a unique (up to isomorphism) $gF$-stable indecomposable minimal quasi-idempotent $\beel$ (where $\L\in \C(T)(\Qlcl)^{gF}$) in $e\D_{G^\circ}(G^\circ)$ such that $W_{loc}\in {}^{\beel}\D_{G^\circ}(G^\circ gF)$.
\elem
\bpf
By Proposition \ref{p:irrepe}, $W_{loc}\in e\D_{G^\circ}(G^\circ gF)\cong e\D_{U}(U gF)\boxtimes \D_T^{gF}(T)$ is a simple object and hence corresponds to an object of the form $M\boxtimes N\in e\D_{U}(U gF)\boxtimes \D_T^{gF}(T)$, with $M,N$ simple. In particular, $N$ corresponds to an irreducible character of $T^{gF}$, which in turn corresponds to a unique $gF$-stable multiplicative local system $\L$ on $T$. In fact we can check that $N$ must be isomorphic to $\L$ considered as an object of $\D^{gF}_T(T)$ (cf. \cite[\S6.1]{De3}). Then it is clear that $W_{loc}=\bar{M\boxtimes \L}\in {}^{\beel}\D_{G^\circ}(G^\circ gF)$ (cf. Corollary \ref{c:beeledgg}). The uniqueness is clear.
\epf
\bprop\label{p:lpdec}
Let $W\in \Irrepe$. Then there exists a unique (up to isomorphism) $F$-stable indecomposable minimal quasi-idempotent $f\in e\DG$ such that $W_{loc}\in {}^f\D_G(GF)={}^f\D_G(GF)^\Delta$.
\eprop
\bpf
Let $W$ be an irreducible representation of the inner form $G^{gF}$ for some $g\in G$. Let $\O\subset G$ denote the $F$-twisted conjugacy class of $g$. Then by Lang's theorem we must have $\O=\coprod G^\circ g_i$ where the set $\{G^\circ g_i\}\subset \Pi_0$ is the $F$-twisted conjugacy class of the element $G^\circ g$ in $\Pi_0$. Then we have
\[W_{loc}\in e\D_G(\O F)\cong e\D_{G^\circ}(\O F)^{\Pi_0}\cong \left(\bigoplus e\D_{G^\circ}(G^\circ g_iF)\right)^{\Pi_0}\cong e\D_{G^\circ}(G^\circ gF)^{\Pi_0^{gF}}.\]
Now let $W'\in \Irrep_{e}(G^\circ, gF)$ be an irreducible representation appearing in the restriction of $W$ to the subgroup ${G^\circ}^{gF}$. Now let $\L$ be the unique $gF$-stable multiplicative local system on $T$ guaranteed by Lemma \ref{l:edgn}, such that $W'_{loc}\in {}^{\beel}\D_{G^\circ}(G^\circ gF)$.
Now using the same notation as we have used before, let $\Pi_0'\subset \Pi_0$ denote the stabilizer of $\L\in \C(T)(\Qlcl)$ and let $G'\subset G$ be such that $G'/G^\circ=\Pi_0'$. Then from Theorem \ref{t:minqiedgg} we know that $\beel\in e\DGp$ is a minimal quasi-idempotent satisfying the Mackey criterion with respect to $G$. Since $\L$ is $gF$-stable, $G'$ is a $gF$-stable subgroup of $G$.
We will now construct an irreducible representation $W_\L$ of ${G'}^{gF}$. Let $W_\L\subset W$ be the direct sum of all the isotypic components for the action of ${G^\circ}^{gF}$ on $W$ which correspond to the local system $\L$ as above. Then by the Clifford theory of finite groups, we see that ${G'}^{gF}$ acts on the space $W_\L$, that $W\cong \ind_{{G'}^{gF}}^{G^{gF}}W_\L$ and that $W_\L$ is irreducible. Moreover by construction, we have ${W_\L}_{loc}\in {}^{\beel}\D_{G'}(G'gF)$.
As before, we set $f_\L=\indg \beel$. This is an indecomposable minimal quasi-idempotent in $e\DG$. Since $\L$ is $gF$-stable, $f_\L$ is $F$-stable. Moreover we have (cf. Appendix \ref{a:iqimc} and \cite[\S4.3]{De3}) $W_{loc}\cong \indg {W_{\L}}_{loc}\in {}^{f_\L}\D_{G}(GF)$ as desired. The uniqueness is clear, since the convolution of distinct indecomposable minimal quasi-idempotents is zero.
\epf
We can now define the $\fL$-packet decomposition of $\Irrepe$.
\bdefn\label{d:deflpirre}
Let $f$ be an $F$-stable indecomposable minimal quasi-idempotent in $e\DG$. We define
\[\Irrep_{e,f}(G,F):=\{W\in \Irrepe|W_{loc}\in {}^f\D_G(GF)\}\]
and call this set the $\fL$-packet of irreducible representations associated with $f$. By Proposition \ref{p:lpdec} we have
\[\Irrepe=\coprod\limits_{f\in \fL_e(G)^F}\Irrep_{e,f}(G,F).\]
\edefn
In \S\ref{s:mccsamqi} we defined character sheaves in $e\DG$ in terms of minimal quasi-idempotents $f\in e\DG$ and by considering the full subcategory (denoted by $\M_{G,f}$) of semisimple objects in the heart of a certain canonical $t$-structure on the triangulated category ${}^f\DG^\Delta\subset e\DG$. Using the same arguments we obtain similar results for the category $e\D_G(GF)$.
\bprop\label{p:tstrmodcat}
(i) Let $f$ be an $F$-stable indecomposable minimal quasi-idempotent in $e\DG$. Then ${}^f\D_G(GF)={}^f\D_G(GF)^\Delta$ is a $\Qlcl$-linear triangulated (as well as semi-simple abelian) module category (under convolution with compact supports) over the triangulated braided semigroupal category ${}^f\DG^\Delta$. There is a unique $t$-structure on ${}^f{\D_G(GF)^\Delta}$ which is compatible under convolution (cf. Corollary \ref{c:modcat}(i)) with the canonical $t$-structure on ${}^f\DG$. This $t$-structure is equal to the perverse $t$-structure shifted by $\dim H+\dim T$.\\
(ii) Let $\M_{GF,f}\subset {}^f\D_G(GF)$ denote the heart of the above $t$-structure. Then as in Corollary \ref{c:modcat}(ii) we can define a truncated convolution
\beq
\uast:\M_{G,f}\times \M_{GF,f}\rar{}\M_{GF,f}
\eeq
which provides $\M_{GF,f}$ with the structure of an invertible $\M_{G,f}$-module category. Moreover, there is a natural $\M_{G,f}$-module trace $\tr_{F,f}$ on $\M_{GF,f}$.\\
(iii) The map $W\mapsto M_W:=W_{loc}[\dim G+\dim H+\dim T]$ defines a bijection between the set $\Irrep_{e,f}(G,F)$ and the set $\O_{\M_{GF,e}}$ of (isomorphism classes of) simple objects of $\M_{GF,f}$.
\eprop
\bpf
The proofs of statements (i) and (ii) are the same as that of Corollary \ref{c:modcat} using (\ref{e:edggf}). Note that the $\M_{G,f}$-module category which is inverse to $\M_{GF,f}$ can be constructed as the heart of a preferred $t$-structure on the category ${}^f\D_G(GF^{-1})$ (see also \cite[\S6]{ENO2}). Also note that for each $n\in \Z$, we have a duality functor $\M_{GF^n,f}\rar{}\M_{GF^{-n},f}$ given by $\f{D}^{-}(\cdot)[2\dim H+2\dim T](\dim H+\dim T)$. Hence as in Remark \ref{r:spherical} we can define a natural spherical structure on the monoidal category $\bigoplus\limits_{n\in \Z}\M_{GF^n,f}$. This gives us the desired natural $\M_{G,f}$-module trace in the category $\M_{GF,f}$. Statement (iii) is clear from Proposition \ref{p:lpdec} and Definition \ref{d:deflpirre}.
\epf
\brk
In view of the definition of character sheaves and the result above, we may think of the irreducible characters $\Irrepe$ as character sheaves in the category $e\D_G(GF)$. Recall from \cite[\S2.4.7]{De3} that associated with each object $M\in \D_G(GF)$ is its character $\chi_M\in \FunG$. In particular for each $W\in \Irrepe$ we have the function $\chi_{M_W}=(-1)^{\dim G+\dim H+\dim T}\chi_W=(-1)^{2d_e}\chi_{W}\in \T_{e_0}\FunG$, where $d_e=\frac{\dim U-\dim H}{2}=\frac{\dim G-\dim H-\dim T}{2}$ is the functional dimension of the Heisenberg idempotent $e$.
\erk
\brk\label{r:+tr}
We know that the modular category $\M_{G,f}$ is positive integral by Corollary \ref{c:modcat}. Let $\tr^+_{F,f}$ denote the positive $\M_{G,f}$-module trace on $\M_{GF,f}$ normalized according to \cite[\S1.3]{De5}. The natural trace $\tr_{F,f}$ also satisfies the previous condition. Hence we deduce that $\tr^+_{F,f}=\pm \tr_{F,f}$.
\erk
\subsection{The relationship between irreducible characters and character sheaves}\label{s:rbiccs}
Let us consider the action of the Frobenius on the set $CS_e(G)$. If $C\in CS_e(G)$ is such that we have an isomorphism $\psi:F^*C\rar{\cong}C$, then we have the associated trace of Frobenius function $\T_{C,\psi}\in \T_{e_0}\FunG$. For each $C\in CS_e(G)^F$, let $\psi_C:F^*C\rar{\cong}C$ denote some choice of an isomorphism. In this section we will describe the relationship between the two sets $\Irrepe, \{\T_{C,\psi}|C\in CS_e(G)^F\}\subset \T_{e_0}\FunG$. We have partitions
\beq
CS_e(G)^F=\coprod\limits_{f\in \fL_e(G)^F}CS_{e,f}(G)^F \mbox{ and }
\eeq
\beq
\Irrepe=\coprod\limits_{f\in \fL_e(G)^F}\Irrep_{e,f}(G,F).
\eeq
We know that $\Irrepe$ forms an orthonormal basis of $\T_{e_0}\FunG$.
Now if $f,f'\in \fL_e(G)^F$ are distinct, and if $C\in {}^f\DG$ and $M\in {}^{f'}\D_G(GF)$, then $C\ast M=0.$ Hence by \cite[Thm. 2.14]{De3} we see that the sets $\{\T_{C,\psi_C}|C\in CS_{e,f}(G)^F\}$ and $\Irrep_{e,f'}(G,F)$ are orthogonal to each other.
In other words, we are reduced to finding the relationship between the sets $\{\T_{C,\psi_C}|C\in CS_{e,f}(G)^F\}$ and $\Irrep_{e,f}(G,F)$ which correspond to the same $\fL$-packet. Let $C\in CS_{e,f}(G)^F$ equipped with an isomorphism $\psi_C:F^*C\rar{\cong}C$ and let $W\in \Irrep_{e,f}(G,F)$. Then we have $C\in \M_{G,f}$ and $M_W\in \M_{GF,f}$. We have the associated character $\chi_{M_W}=(-1)^{2d_e}\chi_W\in \T_{e_0}\FunG$. The inner product between the functions $\T_{C,\psi_C}$ and $\chi_{M_W}$ is given by (cf. \cite[Thm. 2.14]{De3})
\beq
\<\T_{C,\psi_C},\chi_{M_W}\>=\tr_F(\g_{C,\psi_C,M_W}),
\eeq
where $\g_{C,\psi_C,M_W}$ is the following composition in $^f\D_G(GF)$:
\beq
C\ast M_W\xto{\beta_{M_W,F^*C}^{-1}} M_W\ast F^*C\xto{\beta^{-1}_{F^*C,M_W}} F^*C\ast M_W\xto{\psi_C\ast \id_{M_W}}C\ast M_W
\eeq
with $\beta_{\cdot,\cdot}$ denoting the crossed braiding isomorphisms (cf. \cite[\S2.4.4]{De3}). Hence the matrix relating the sets $\{\T_{C,\psi_C}|C\in CS_{e,f}(G)^F\}$ and $\{\chi_W|W\in\Irrep_{e,f}(G,F)\}$ is equal to the matrix $\t{S}(F,f)$ whose entries are defined by
\beq\label{e:defts}
\t{S}(F,f)_{C,W}:=\<\T_{C,\psi_C},\chi_{W}\>=\<\T_{C,\psi_C},(-1)^{2d_e}\chi_{M_W}\>=(-1)^{2d_e}\tr_F(\g_{C,\psi_C,M_W}),
\eeq
for $C\in \CS_{e,f}(G)^F ,W\in \Irrep_{e,f}(G,F)$.
Our next goal is to express the above transition matrix in terms of a certain crossed S-matrix. Truncating the automorphism $\g_{C,\psi_C,M_W}$ with respect to the canonical $t$-structure on $^f\DG$, we obtain the following composition in $\M_{GF,f}$:
\beq
\g_{C,\psi_C,M_W}^0:C\uast M_W\xto{\underline{\beta}_{M_W,F^*C}^{-1}} M_W\uast F^*C\xto{\underline{\beta}^{-1}_{F^*C,M_W}} F^*C\uast M_W\xto{\psi_C\uast \id_{M_W}}C\uast M_W.
\eeq
Now we have seen in Proposition \ref{p:tstrmodcat} that the invertible $\M_{G,f}$-module category $\M_{GF,f}$ is equipped with a canonical module trace $\tr_{F,f}$. We also have on $\M_{GF,f}$ the positive module trace $\tr^+_{F,f}$. Hence we are now in the situation studied in \cite{De5}. Consider the crossed S-matrix (cf. \cite[\S2]{De5}) $S^+(F,f)$ whose entries are defined by
\beq
S^+(F,f)_{C,W}:=\tr^+_{F,f}(\g^0_{C,\psi_C,M_W})
\eeq
for $C\in \CS_{e,f}(G)^F ,W\in \Irrep_{e,f}(G,F)$.
Note that in this case the modular auto-equivalence of $\M_{G,f}$ corresponding to the module category $\M_{GF,f}$ is given by $F=F_*:\M_{G,f}\rar{}\M_{G,f}$. In addition, let us assume that
\bit
\item[$\bigstar$] the isomorphisms $\psi_C:F^*C\rar{\cong}C$ are chosen to satisfy the further requirements as in {\it loc. cit.}
\eit
Then by \cite[Thm. 2.9]{De5} the entries of $S^+(F,f)$ are cyclotomic integers and the matrix $S^+(F,f)$ is unitary up to a scaling, namely
\beq\label{e:defs+}
S^+(F,f)\cdot \bar{S^+(F,f)}^T=\dim \M_{G,f}.\cdot I = \bar{S^+(F,f)}^T\cdot S^+(F,f),
\eeq
where $\dim \M_{G,f}$ denotes the categorical dimension of the modular category $\M_{G,f}$.
Let us now describe the relationship between the two traces $\tr_F$ and $\tr^+_{F,f}$ encountered above as well as that between the matrices $\t{S}(F,f)$ and $S^+(F,f)$:
\bthm\label{t:relheis}
(i) Let $M\in \M_{GF,f}\subset {}^f\D_G(GF)$ be an object supported on a single $G$-orbit $\O F\subset GF$ and let $\alpha:M\rar{}M$ be an endomorphism. Then
\beq
\tr_F(\alpha)=(-1)^{2d_e}\frac{q^{d_e}}{q^{\dim G}\cdot \sqrt{\dim \M_{G,f}}}\cdot\frac{q^{\dim T}}{|T_0^t(\Fq)|}\cdot\tr^+_{F,f}{(\alpha)},
\eeq where $tF$ is a point in the orbit $\O F$.
\\
(ii) Let $W\in \Irrep_{e,f}(G,F)$ be an irreducible representation of the pure inner form $G^t_0(\Fq)$. Then we have
\beq
\dim W = \frac{\dim^+(M_W)}{\sqrt{\dim \M_{G,f}}}\cdot |\Pi_0^{tF}|\cdot q^{d_e},
\eeq where $\dim^+(M_W):=\tr_{F,f}^+(\id_{M_W})=\FPdim(M_W)$.\\
(iii) Let $C\in \M_{G,f}$, $\psi:F^*(C)\rar{\cong}C$ and $M\in \M_{GF,f}$. Then
\beq\label{e:trftr+}
\tr_F(\g_{C,\psi,M})=(-1)^{2d_e}\frac{q^{d_e}}{q^{\dim G}\cdot \sqrt{\dim \M_{G,f}}}\cdot \tr_{F,f}^+(\g^0_{C,\psi,M}) \hbox{ and hence}
\eeq
\beq
\t{S}(F,f)=\frac{q^{d_e}}{q^{\dim G}\cdot \sqrt{\dim \M_{G,f}}}\cdot S^+(F,f).
\eeq
\ethm
\brk
Note that ${\dim \M_{G,f}}$ is a perfect square by Corollary \ref{c:modcat} and we use its positive integral square root in the theorem above. Also, $d_e\in \frac{1}{2}\Z$ and we may need to use the positive square root of $q$ according to our chosen isomorphism $\Qlcl\cong \f{C}$.
\erk
We will prove this result in \S\ref{s:pot:relheis}. Let us now derive some corollaries.
\bcor\label{c:relheis}
Let $W\in \Irrep(G,F)$ be an irreducible representation of a pure inner form and let $f\in \f{L}_e(G)^F$. Then the following are equivalent:\\
(i) The representation $W$ lies in the $\f{L}$-packet $\Irrep_{e,f}(G,F)$.\\
(ii) The local system $W_{loc}$ lies in ${}^f\D_G(GF)$. \\
(iii) The character $\chi_W$ lies in the subspace $\t{\T}_{f_0}\FunG\subset \FunG$.\\
(iv) The dual (i.e., `complex conjugate') idempotent $\bar{\t{\T}_{f_0}}$ acts on $W$ as identity.\\
The set $\{\chi_W|W\in \Irrep_{e,f}(G,F)\}$ forms an orthonormal basis of the space $\t{\T}_{f_0}\FunG$.
\ecor
\bpf
The equivalence (i)$\Leftrightarrow$(ii) follows from Definition \ref{d:deflpirre} and the fact that ${}^f\D_G(GF)\subset e\D_G(GF)$. The equivalence (iii)$\Leftrightarrow$(iv) follows from standard character theory of finite groups. Let us now prove (i)$\Rightarrow$(iii). So suppose that $W\in \Irrep_{e,f}(G,F)$. Let $M_W\in \M_{GF,f}$ be the corresponding simple object. Then by \cite[Rem. 2.2]{De5}, we see that the row of the crossed S-matrix $S^+(F,f)$ corresponding to the unit object $f\in \M_{G,F}$ contains only nonzero entries. In particular, by (\ref{e:defs+}), $\tr_{F,f}^+(\g^0_{f_0, M_W})\neq 0$. Hence by Theorem \ref{t:relheis}(iii) and \cite[Thm. 2.14]{De3}, $\tr_F(\g_{f_0,M_W})=\<\T_{f_0},\chi_{M_W}\>=\l(\T_{f_0}\ast \chi_{M_W})\neq 0$. Hence $\T_{f_0}\ast \chi_{W}\neq 0$. This implies (iii).
Let us now prove that (iii)$\Rightarrow$(i). Suppose that $\chi_W\in \t{\T}_{f_0}\FunG$, i.e. $\t{\T}_{f_0}\ast \chi_W=\chi_W$. Hence we can prove that $\<\T_{f_0},\chi_{W}\>=\tr_{F}(\g_{f_0,W_{\loc}})=\l(\T_{f_0}\ast \chi_{W})\neq 0$. Hence $f\ast W_{\loc}\neq 0$ and consequently $W\in \Irrep_{e,f}(G,F)$.
The last statement of the corollary follows since $\{\chi_W|W\in \Irrep(G,F)\}$ forms an orthonormal basis of $\FunG$.
\epf
\bcor\label{c:sumsq}
We have
\beq
\sum\limits_{W\in \Irrep_{e,f}(G,F)}\frac{(\dim W)^2}{|\Pi_0^{tF}|^2}=q^{2d_e},
\eeq
where in the summation $\<t\>\in H^1(F,G)$ denotes the $F$-twisted conjugacy class in $G$ on which $W_{\loc}$ is supported. In particular if $G$ is connected solvable, then
\beq
\sum\limits_{W\in \Irrep_{e,f}(G_0(\Fq))}{(\dim W)^2}=q^{2d_e}.
\eeq
\ecor
\bpf
This follows from Theorem \ref{t:relheis}(ii) and the fact that $\sum\limits_{W\in \Irrep_{e,f}(G,F)}\dim^+(M_W)^2=\dim \M_{G,f}$.
\epf
\brk\label{r:nominqi}
We know that the $F$-stable indecomposable minimal quasi-idempotents are parametrized by the set $\f{L}_e(G)^F=(\C(T)(\Qlcl)/\Pi_0)^F$. We can prove, for example using the above, that
\beq
|\f{L}_e(G)^F|=|(\C(T)(\Qlcl)/\Pi_0)^F|=\sum\limits_{\<t\>\in H^1(F,\Pi_0)}\frac{|T^{tF}|}{|\Pi_0^{tF}|}=\frac{1}{\Pi_0}\sum\limits_{t\in \Pi_0}|T^{tF}|.
\eeq
\erk
\subsection{Proof of Theorem \ref{t:relheis}}\label{s:pot:relheis}
In this section we will complete the proof of Theorem \ref{t:relheis} stated above. Using the definition of $\tr_F$ it is straightforward to check that statements (i) and (ii) of the Theorem are equivalent. Hence we will prove below statements (ii) and (iii).
\subsubsection{The connected case}\label{s:tcc}
Let us first consider the case that $G$ is a connected solvable group.
\begin{proof}[Proof of Thm. \ref{t:relheis}(ii) in the connected case]
Let $W$ be an irreducible representation of $G_0(\Fq)$ lying in the $\f{L}$-packet $\Irrep_{e,f}(G,F)$ under consideration. We want to prove that (in the connected case)
\beq\label{e:tpt1}
\FPdim(M_W)^2=\frac{|K_\N|}{q^{2d_e}}\dim(W)^2.
\eeq
In the connected case, we have canonical equivalences $e\DG\cong e\D_U(U)\boxtimes \D_T(T)$ and $e\D_G(GF)\cong e\D_U(UF)\boxtimes \D_T^F(T)$. The indecomposable minimal quasi-idempotent $f$ in $e\DG$ must be of the form $\beel$ for some $\L\in \C(T)(\Qlcl)^F$. The simple object $M_W\in \M_{GF,f}$ corresponds to an object of the form $M\boxtimes e_\L\in e\D_U(UF)\boxtimes \D_T^F(T)$. Now $M_W$ is just a suitably shifted local system
supported on $GF$. The rank of this local system is equal to the dimension of the irreducible representation $W$ of $G_0(\Fq)$. Now we have noted above that $M_W=M\ast\beel$ for some $M\in \M_{UF,e}\subset e\D_U(UF)$. Now $M$ is a suitably shifted local system on $UF$ corresponding to a representation $V$ of $U_0(\Fq)$ corresponding to the minimal idempotent $e\in \D_U(U)$. We will now prove that $\dim W=\dim V$. For this we compute the rank of the stalk of $M_W$ at the point $F\in GF$. We have
$M_W(F)=(M\ast \beel)(F)=\int\limits_U M(uF)\otimes \beel(F^{-1}(u^{-1}))$. Now we can consider $\beel$ as an object of $e\D_U(G)$ and $\beel|_U$ as an object of $e\D_U(U)$. From \cite[\S8.5]{De2} we can see that $\beel|_U\cong e[2\dim T](\dim T)$ is supported only on $H$. Also we have $M\in e\D_U(UF)$, hence we see that $M_W(F)\cong\int\limits_H M(F)[2\dim H+2\dim T](\dim H+\dim T).$ Thus we see that rank of the stalk of $M_W$ at $F$ is equal to the rank of the stalk of $M$ at $F$. Hence we have $\dim W=\dim V$. Statement (\ref{e:tpt1}) now follows from \cite[\S6.2]{De3}.
\epf
\begin{proof}[Proof of Thm. \ref{t:relheis}(iii) in the connected case]
To prove (\ref{e:trftr+}) it suffices to consider the case where the objects $C,M$ are simple. Hence let us compare the two automorphisms
$$\g_{C,\psi_C,M_W}:C\ast M_W \rar{} C\ast M_W \hbox{ and }\g^0_{C,\psi_C,M_W}:C\uast M_W \rar{} C\uast M_W,$$
where $C,M_W$ are (simple objects) as before where we now assume that $G$ is a connected solvable group. As before, we have the canonical equivalences $e\DG\cong e\D_U(U)\boxtimes \D_T(T)$ and $e\D_G(GF)\cong e\D_U(UF)\boxtimes \D_T^F(T)$ and we have $f\cong \beel$ for some $\L\in \C(T)(\Qlcl)^F$. Then $C$ corresponds to an object $C'\boxtimes e_\L\in e\D_U(U)\boxtimes \D_T(T)$ with $C'\in \M_{U,e}$ and $M_W$ corresponds to an object $M\boxtimes e_\L\in e\D_U(UF)\boxtimes \D_T^F(T)$ with $M\in \M_{UF,e}$. Then $\g_{C,\psi_C,M_W}$ corresponds to the automorphism
\beq
\g^U_{C',\psi_{C'},M}\boxtimes \g^T_{e_\L,e_\L}:(C'\ast M)\boxtimes (F^*e_\L\ast e_\L)\rar{}(C'\ast M)\boxtimes (F^*e_\L\ast e_\L)
\eeq
and $\g^0_{C,\psi_C,M_W}$ corresponds to the automorphism
\beq
\g^U_{C',\psi_{C'},M}\boxtimes {\g^T_{e_\L,e_\L}}^0:(C'\ast M)\boxtimes (F^*e_\L\uast e_\L)\rar{}(C'\ast M)\boxtimes (F^*e_\L\uast e_\L).
\eeq
Hence we are essentially reduced to studying the case of the torus. Let us look at the stalks of the automorphisms $\g^T_{e_\L,e_\L}$ and ${\g^T_{e_\L,e_\L}}^0$ at the point $1\in T$. Then using the explicit description of this stalk in the spirit of \cite[\S3]{De3} we obtain $\g^T_{e_\L,e_\L}(1):\int\limits_Te_\L{(F(t))}\boxtimes e_\L(t^{-1})\rar{}\int\limits_Te_\L(t)\boxtimes e_\L(F^{-1}(t^{-1}))$ and we can deduce that $\g^T_{e_\L,e_\L}\cong V_{T_0}\otimes {\g^T_{e_\L,e_\L}}^0.$ Hence we conclude that $\tr(\g^T_{e_\L,e_\L}(1))=\frac{|T_0(\Fq)|}{q^{\dim T}}\cdot \tr({\g^T_{e_\L,e_\L}}^0(1))$. Then using the definition of $\tr_F$, we obtain
\beq\label{e:trg0}
\tr_F(\g_{C,\psi_C,M_W})=\frac{|T_0(\Fq)|}{q^{\dim T}}\cdot \tr_F(\g^0_{C,\psi_C,M_W}).
\eeq
But now using Theorem \ref{t:relheis}(i), we obtain that
\beq\tr_F(\g_{C,\psi_C,M_W})=(-1)^{2d_e}\frac{q^{d_e}}{q^{\dim G}\cdot \sqrt{\dim \M_{G,f}}}\cdot \tr_{F,f}^+(\g^0_{C,\psi_C,M_W})
\eeq
which proves (\ref{e:trftr+}).
Finally comparing the above with (\ref{e:defts}) we complete the proof of Theorem \ref{t:relheis}(iii) in the connected case.
\epf
\subsubsection{An intermediate case}\label{s:aic}
We now consider a general neutrally solvable group $G$, but we only consider (indecomposable) minimal quasi-idempotents $f$ of the form $\beel$ with $\L\in (\C(T)(\Qlcl)^{\Pi_0})^F$.
\begin{proof}[Proof of Thm. \ref{t:relheis}(ii) in the intermediate case]
Let $W\in \Irrep_{e,\beel}(G,F)$. For simplicity of notation, let us assume without loss of generality that $W$ is an irreducible representation of the pure inner form $G_0(\Fq)$. The object $M_W$ is supported on the $G$-conjugation orbit $\O F$ of $F\in GF$. Recall from Proposition \ref{p:beeltrsubcat} that we have the braided $\Pi_0$-crossed fusion category $\tMbeel\subset {}^{\beel}\D_{G^\circ}(G)$ and we have $\M_{G,\beel}\cong (\tMbeel)^{\Pi_0}$. Similarly we can construct the $\tMbeel$-module category $\tM_{GF,\beel}\subset { }^{\beel}\D_{G^\circ}(GF)$ (cf. \cite[\S6.2]{De3}) and prove that $\M_{GF,\beel}\cong (\tM_{GF,\beel})^{\Pi_0}$. Let us consider the object of $\tM_{GF,\beel}$ underlying $M_W$ and also restrict $W$ to the connected component $G^\circ_0(\Fq)$. The same argument as in \cite[\S6.2, in particular (96)]{De3} can now be used to complete the proof of the statement (ii) in the intermediate case by reducing it to the connected case.
\epf
\begin{proof}[Proof of Thm. \ref{t:relheis}(iii) in the intermediate case]
Let $C$ be any object of $\M_{G,\beel}\cong (\tM_{G,\beel})^{\Pi_0}$ and let $M$ be any object of $\M_{GF,\beel}\cong (\tM_{GF,\beel})^{\Pi_0}$. We can represent $C$ by a pair $\left(\bigoplus\limits_{g\in \Pi_0}C_g, \phi_C\right)$, where for each $g\in\Pi_0$, $C_g\in \tMbeel$ lies in the graded component labelled by $g$ and where $\phi_C$ denotes the $\Pi_0$-equivariant structure. Similarly we can represent $M$ by a pair $\left(\bigoplus\limits_{h\in \Pi_0}M_{hF}, \phi_M\right)$ where $M_{hF}\in \tM_{GF,\beel}$ lies in the graded component labelled by $hF\in \Pi_0F$. We have to compare the two automorphisms $\g_{C,\psi,M}:C\ast M\rar{}C\ast M$ and $\g^0_{C,\psi,M}:C\uast M\rar{}C\uast M$. For each $tF\in \Pi_0F$, let us compare the respective components with grading $tF$, namely $\g_{C,\psi,M}(tF):(C\ast M)_{tF}\rar{}(C\ast M)_{tF}$ and $\g^0_{C,\psi,M}(tF):(C\uast M)_{tF}\rar{}(C\uast M)_{tF}$. Now we have $(C\ast M)_{tF}=\bigoplus\limits_{h_1h_2=t}C_{h_1}\ast M_{h_2F}$. Now we have $C_{h_1}\in \tM_{G^\circ h_1,\beel}\subset {}^{\beel}\D_{G^\circ}(G^\circ h_1)\cong e\D_U(Uh_1)\boxtimes {}^{e_\L}\D_T^{h_1}(T)$ and $M_{h_2F}\in \tM_{G^\circ h_2F,\beel}\subset {}^{\beel}\D_{G^\circ}(G^\circ h_2F)\cong e\D_U(Uh_2F)\boxtimes {}^{e_\L}\D_T^{h_2F}(T)$, where by a slight abuse of notation we have used the letter $h_i$ to denote both $h_i\in \Pi_0$ as well as its lift in $G$. Then using a similar argument as in the connected case, we deduce that $\g_{C,\psi,M}(tF)\cong V_{T_0^t}\otimes \g_{C,\psi,M}^0(tF)$ and hence that
\beq
\tr^{G^\circ}_{tF}(\g_{C,\psi,M}(tF))=\frac{|T_0^t(\Fq)|}{q^{\dim T}}\cdot \tr^{G^\circ}_{tF}(\g^0_{C,\psi,M}(tF)),
\eeq where we consider $\g_{C,\psi,M}(tF)$ and $\g_{C,\psi,M}(tF)$ as morphisms in $\D_{G^\circ}(G^\circ tF)$ and where $\tr^{G^\circ}_{tF}$ denotes the trace in this category. Then using Theorem \ref{t:relheis}(i) in the connected case, we obtain that
\beq
\tr^{G^\circ}_{tF}(\g_{C,\psi,M}(tF))= (-1)^{2d_e}\frac{q^{d_e}}{q^{\dim G}\cdot \sqrt{\dim \M_{G^\circ, \beel}}}\cdot \tr_{tF,f}^+(\g^0_{C,\psi,M}(tF)).
\eeq
Now from the definition of the trace $\tr_F=\tr^G_F$ on $\D_G(GF)$ (see also \cite[\S6.2]{De3}), we obtain that for any endomorphism $\alpha$ in $\D_G(GF)$ we have
$$\tr^G_{F}(\alpha)=\frac{1}{|\Pi_0|}\sum\limits_{t\in \Pi_0}\tr^{G^\circ}_{tF}(\alpha_{tF}).$$
Moreover, it is clear that for any endomorphism $\alpha$ in $\M_{GF,\beel}\cong (\tM_{GF,\beel})^{\Pi_0}$, we have
$$\tr^{G,+}_{F,\beel}(\alpha)=\sum\limits_{t\in \Pi_0}\tr^{G^\circ,+}_{tF,\beel}(\alpha_{tF}).$$ Hence this completes the proof of Theorem \ref{t:relheis}(iii) in the intermediate case since we have $\dim \Mbeel=|\Pi_0|^2\cdot\dim \M_{G^\circ,\beel}$.
\epf
\subsubsection{The general case}\label{s:tgc}
We now consider the general case, namely $G$ is any neutrally solvable algebraic group and $f\cong f_\L\in e\DG$ is a general $F$-stable indecomposable minimal quasi-idempotent where $\<\L\>\in (\C(T)(\Qlcl)/\Pi_0)^F$. As in \S\ref{s:minqiedgg}, let $\Pi_0'\subset \Pi_0$ denote the stabilizer of $\L$ and let $G^\circ\subset G'\subset G$ be the corresponding subgroup. Then $\beel\in e\DGp$ is a minimal quasi-idempotent for $G'$ and we can apply the results of \S\ref{s:aic} to this case. Note that since the $\Pi_0$-orbit of $\L$ is $F$-stable, we must have $(gF)^*\L\cong \L$ for some pure inner form $gF:G\rar{}G$. Hence without loss of generality we may assume that $F^*\L\cong \L$. With this assumption, the subgroup $G'$ is $F$-stable.
Recall from $\S\ref{s:minqiedgg}$ that we have equivalences
\beq\label{e:indg}
\indg:{}^{\beel}\DGp^\Delta\rar{\cong} {}^{f_\L}\DG^\Delta \hbox{ and hence } \indg:\M_{G',\beel}\rar{\cong}\M_{G,f}.
\eeq
Similarly, we can prove that (under the assumption that $F^*\L\cong \L$) we have equivalences
\beq\label{e:indgf}
\indg:{}^{\beel}\D_{G'}(G'F)\rar{\cong} {}^{f_\L}\D_G(GF) \hbox{ and } \indg:\M_{G'F,\beel}\rar{\cong}\M_{GF,f}.
\eeq
Concretely, let $W'\in \Irrep_{e,\beel}(G',F)$ be an irreducible representation of an inner form ${G'_0}^h(\Fq)$ for some $h\in G'$. Let $W=\ind^{G_0^h(\Fq)}_{{G'_0}^h(\Fq)}$. Then by (\ref{e:indgf}), $W\in \Irrep_{e,f_\L}(G,F)$ and we have $\M_{G'F,\beel}\ni M_{W'}\longmapsto M_W\in \M_{GF,f_\L}$. Thus we have a bijection $\Irrep_{e,\beel}(G',F)\cong \Irrep_{e,f_\L}(G,F)$.
\begin{proof}[Proof of Thm. \ref{t:relheis}(ii) in the general case]
Using Theorem \ref{t:relheis} for $W'$, we have
\beq
\dim W' = \frac{\dim^+(M_{W'})}{\sqrt{\dim \M_{G',\beel}}}\cdot |{\Pi_0'}^{hF}|\cdot q^{d_e}.
\eeq
Now $\dim W=\frac{|G^h_0(\Fq)|}{|{G'_0}^h(\Fq)|}\cdot\dim W'=\frac{|\Pi^{hF}_0|}{|{\Pi'_0}^{hF}|}\cdot\dim W'$, $\dim^+(M_{W'})=\dim^+(M_W)$ and $\M_{G',\beel}\cong \M_{G,f_\L}$. Hence we obtain that
\beq
\dim W = \frac{\dim^+(M_{W})}{\sqrt{\dim \M_{G,f_\L}}}\cdot |{\Pi_0}^{hF}|\cdot q^{d_e}
\eeq as desired.
\epf
\begin{proof}[Proof of Thm. \ref{t:relheis}(iii) in the general case]
By \S\ref{s:aic}, statement (iii) holds for $C'\in \M_{G',\beel}$, $\psi':F^*C'{\cong} C'$ and $M'\in \M_{G'F,\beel}$. Let $(C,\psi)=\indg (C',\psi')$ and $M=\indg M'$. Then we see that $\indg(\g_{C',\psi',M'})=\g_{C,\psi,M}$ and that $\indg(\g^0_{C',\psi',M'})=\g^0_{C,\psi,M}$. The statement (iii) in the general case then follows using (\ref{e:indg}) and (\ref{e:indgf}).
\epf
\subsection{Shintani descent in the Heisenberg case}\label{s:sdthc}
We will now study Shintani descent in the Heisenberg case and prove Theorem \ref{t:main3} in the Heisenberg case. Recall that for each positive integer $m$, we have defined the $m$-th Shintani descent map (well defined up to scaling by $m$-th roots of unity, cf. \cite{De4})
\beq
\Sh_m:\Irrep(G,F^m)^F\hookrightarrow\FunG.
\eeq
We will continue to study the Heisenberg case and we will use all our previous notations and conventions from \S\ref{s:icahi}. In particular we have a Heisenberg admissible pair $(H_0,\L_0)$ defined over $\Fq$ and the corresponding idempotent $e_0\in \DGn$. In this section, we are interested in the restriction of the Shintani descent map to the subset $\Irrep_{e}(G,F^m)^F\subset \Irrep(G,F^m)^F$. Using the same argument as in \cite[Prop. 6.4]{De4}, we have
\beq
\Sh_m(\Irrep_{e}(G,F^m)^F)\subset \T_{e_0}\FunG
\eeq
and that the image forms an orthonormal basis of $\T_{e_0}\FunG$ which we call the $m$-th Shintani basis of $\T_{e_0}\FunG$. Now the set of irreducible characters
\beq\label{e:lpdecf}
\Irrepe=\coprod\limits_{f\in \f{L}_e(G)^F}\Irrep_{e,f}(G,F)
\eeq
associated with $e_0$ is also an orthonormal basis of $\T_{e_0}\FunG$. Similar to (\ref{e:lpdecf}), we also obtain the $\f{L}$-packet decompositions
\beq\label{e:lpdecfm}
\Irrep_{e}(G,F^m)=\coprod\limits_{f\in \f{L}_e(G)^{F^m}}\Irrep_{e,f}(G,F^m),
\eeq
\beq\label{e:lpdecfmf}
\Irrep_{e}(G,F^m)^F=\coprod\limits_{f\in \f{L}_e(G)^F}\Irrep_{e,f}(G,F^m)^F.
\eeq
We will prove that Shintani descent respects the $\f{L}$-packet decompositions above and will then prove the analogue of Theorem \ref{t:main3} in the Heisenberg case.
\subsubsection{Some notation and results related to Shintani descent}
Let us now recall some notation and results from \cite{De4}. For any $m_1,m_2\in \Z$, we let $\D_{G}(GF^{m_1})^{F^{m_2}}$ denote the category consisting of pairs $(M,\psi)$ where $M\in \D_G(GF^{m_1})$ and $\psi:{F^{m_2}}^*M\rar{\cong}M$. We have a functor $\eta_m$ defined as the composition (cf. \cite[Lem. 5.1]{De4}):
\beq
\eta_m:\D_{G}(GF)\rar{}\D_G(GF)^{\id}\rar{\cong} \D_G(GF)^{F^m}.
\eeq
For $L\in \D_G(GF^m)^F$ and $M\in \D_{G}(GF)^{F^m}$, we have the automorphism (cf. \cite[\S5.2, (70)]{De4})
\beq\label{e:defzeta}
\zeta_{L,M}:L\ast M\rar{}M\ast F^*L\rar{}F^*L\ast {F^m}^*M\rar{}L\ast M.
\eeq
For $W\in \Irrep(G,F^m)^F$ and $V\in \Irrep(G,F)$, let $(W_{loc},\psi_W)\in \D_G(GF^m)^F$ and $V_{loc}\in \D_G(GF)$ be the associated objects, where $\psi_W:F^*W_{loc}\rar{\cong}W_{loc}$ is chosen according to {\it op cit, \S2.6}. Then the inner product between the Shintani descent $\Sh_m(W)$ and the character $\chi_V$ is described by \cite[Cor. 5.5]{De4} as below:
\beq\label{e:innprodsd}
\<\Sh_m(W),\chi_V\>=\tr_{F^{m+1}}\left(\zeta_{W_{loc},\psi_W, \eta_m(V_{loc})}:W_{loc}\ast V_{loc}\rar{}W_{loc}\ast V_{loc}\right).
\eeq
In \cite[\S4]{De4} we have defined the twists $\theta^{F^m}$ in the categories $\D_G(GF^m)$ for each $m\in \Z$, i.e., we have natural isomorphisms (where $F$ is the inverse functor to $F^*$):
\beq
\theta^{F^m}_M:M\rar{\cong} F^m(M) \hbox{ for each } M\in \M_{GF^m}
\eeq
satisfying certain compatibility relations with the crossed braidings (cf. \cite[Lem. 4.2.]{De4}).
Also for each $M\in \D_{G}(GF)$ we have the automorphism
\beq\label{e:defnu}
\nu_{\theta^F_M}:M\ast M \xto{\beta^{-1}_{M,F^*M}} M\ast F^*M\xto{\id_M\ast F^*(\theta^F_M)}M\ast M \hbox{ in } \D_{G}(GF^2)
\eeq
and we have (cf. \cite[Thm. 4.3.]{De4})
\beq\label{e:de4trnu}
\tr_F{(\id_M)}=\tr_{F^2}(\nu_{\theta^F_M}).
\eeq
\subsubsection{Shintani descent and $\f{L}$-packet decomposition in the Heisenberg case}\label{s:sdlpdthc}
Let $V\in \Irrep_{e,f}(G,F)$ for some $f\in \f{L}_e(G)^F$. Then by Definition \ref{d:deflpirre} we have $V_{loc}\in {}^f\D_G(GF)$. Let $W\in \Irrep_{e,f'}(G,F^m)^F$ for some $f'\in \f{L}_e(G)^F$. Similarly we have $W_{loc}\in {}^{f'}\D_G(GF^m)$. Hence we see that if $f,f'$ are non-isomorphic, then $W_{loc}\ast V_{loc}=0$. Hence using (\ref{e:innprodsd}) we see that in this case we must have $\<\Sh_m(W),\chi_V\>=0$. Hence we see that for each $f\in \f{L}_e(G)^F$, $\Sh_m(\Irrep_{e,f}(G,F^m)^F)$ lies in the subspace $\t{\T}_{f_0}\FunG$ of $\T_{e_0}\FunG$ spanned by the characters $\Irrep_{e,f}(G,F)$, i.e. Shintani descent respects the $\f{L}$-packet decomposition, at least in the Heisenberg case.
We will now describe the matrix $\t{\Sh}_m(F,f)$ relating the sets $\Sh_m(\Irrep_{e,f}(G,F^m)^F)$ and $\Irrep_{e,f}(G,F)$. The entries of this matrix are given by
\beq
\t{\Sh}_m(F,f)_{W,V}=\<\Sh_m(W),\chi_V\> = \tr_{F^{m+1}}\left(\zeta_{W_{loc},\psi_W, \eta_m(V_{loc})}\right)
\eeq
for $W\in \Irrep_{e,f}(G,F^m)^F$ and $V\in \Irrep_{e,f}(G,F)$.
Suppose that $M\in \M_{GF^{m+1},f}\subset {}^f\D_G(GF^{m+1})$ is an object supported on a single $G$-orbit $\<tF^{m+1}\>\subset GF^{m+1}$ and that $\alpha:M\to M$ is an endomorphism. By Theorem \ref{t:relheis}(i) we have
\beq
\tr_F(\alpha)=(-1)^{2d_e}\frac{q^{(m+1)d_e}}{q^{(m+1)\dim G}\cdot \sqrt{\dim \M_{G,f}}}\cdot \frac{q^{(m+1)\dim T}}{|T^{tF^{m+1}}|}\cdot \tr_{F^{m+1},f}^+(\alpha).
\eeq
Using the same argument as in the proof of Theorem \ref{t:relheis}(iii), we can prove the following more general result:
\blem\label{l:trzeta}
Let $(L,\psi_L)\in (\M_{GF^{m},f})^F\subset \D_G(GF^m)^F$ and let $(M,\psi_M)\in (\M_{GF,f})^{F^{m}}\subset \D_G(GF)^{F^m}$. Let $\zeta_{L,\psi_L,M,\psi_M}:L\ast M \rar{\cong} L\ast M$ be the automorphism as defined by (\ref{e:defzeta}). Then
\beq
\tr_{F^{m+1}}(\zeta_{L,\psi_L,M,\psi_M})=\frac{(-1)^{2d_e}}{\sqrt{\dim \M_{G,f}}}\cdot\left(\frac{q^{d_e}}{q^{\dim G}}\right)^{m+1}\cdot\tr_{F^{m+1},f}^+(\zeta^0_{L,\psi_L,M,\psi_M}).
\eeq
\elem
We will use this result in \S\ref{s:acthc} describe the matrices $\t{{\Sh}}_m(F,f)$ in terms of the Shintani matrices as defined in \cite[\S4]{De5} in the setting of modular categories.
\subsubsection{Twists in the categories $\M_{GF^m,f}$}
Previously, we have described the twists $\theta^{F^m}$ in the categories $\D_G(GF^m)$. Now for $f\in \f{L}_e(G)^F$ we will define new twists $\theta^{F^m,f,+}$ in the invertible $\M_{G,f}$-module categories $\M_{GF^m,f}\subset \D_G(GF^m)$. Note that we have a braided $\Z$-crossed rigid monoidal category (under truncated convolution)
\beq
\M_{G\<F\>,f}:=\bigoplus\limits_{m\in \Z} \M_{GF^m,f}\subset \D_G(G\<F\>),
\eeq
where $G\<F\>$ denotes the semidirect product of $G$ and $\Z=\<F\>$. It can be equipped with a unique positive spherical structure and the positive traces $\tr_{F^m,f}^+$ on $\M_{GF^m,f}$ correspond to this spherical structure. This spherical structure also gives rise to twists $\theta^{F^m,f,+}$ on the categories $\M_{GF^m,f}$ as follows:\\
For each $M\in \M_{GF^m,f}$, define the isomorphism $\theta^{F^m,f,+}_M$ as the composition
\beq
\theta_{M}^{F^m,f,+}:M\xto{\id_M\uast \c_M}M\uast M\uast M^*\xto{\beta_{M,M}}F(M)\uast M \uast M^*\xto{\id_{F(M)}\uast \e_{M^*}}F(M),
\eeq
where the positive spherical structure has been used implicitly in the last map of the composition.
\blem\label{l:cfe}
There exists a number $c_{F,f}^+\in \Qlcl^\times$ such that for each $m\in \Z$ and $M\in \M_{GF^m,f}$ we have
\beq\label{e:defcf}
\theta^{F^m}_M=(c_{F,f}^+)^m\cdot \theta^{F^m,f,+}_M.
\eeq
\elem
\bpf
The twists $\theta^{F^m,f,+}$ are defined using a spherical structure on $\M_{G\<F\>,f}$ and hence satisfy properties (i),(ii) from \cite[\S4.1]{De5}. We can also check that the twists $\theta^{F^m}$ also satisfy these properties. For example for $a,b\in \Z$, $L\in \M_{GF^a,f}\subset \D_G(GF^a)$ and $M\in \M_{GF^b,f}\subset \D_G(GF^b)$ we have from \cite[Lem. 4.2.]{De4} that $\theta^{F^{a+b}}_{L\ast M}$ equals the composition
\beq
L\ast M\xto{\beta_{L,M}} F^a(M)\ast L\xto{\beta_{F^a(M),L}} F^b(L)\ast F^a(M) \xto{\theta^{F^a}_{F^b(L)}\ast \theta^{F^b}_{F^a(M)}}F^{a+b}(L)\ast F^{a+b}(M)\to F^{a+b}(L\ast M).
\eeq
Truncating the above with respect to the canonical $t$-structure, we see that $(\theta^{F^{a+b}}_{L\ast M})^0=\theta^{F^{a+b}}_{L\uast M}$ equals the composition
\beq
L\uast M\xto{\beta^0_{L,M}} F^a(M)\uast L\xto{\beta^0_{F^a(M),L}} F^b(L)\uast F^a(M) \xto{\theta^{F^a}_{F^b(L)}\uast \theta^{F^b}_{F^a(M)}}F^{a+b}(L)\uast F^{a+b}(M)\to F^{a+b}(L\uast M).
\eeq
Hence the twists $\theta^{F^m}$ correspond to a pivotal structure on $\M_{G\<F\>,f}$ (cf. \cite[\S4.1]{De4}). The lemma now follows using the same argument as in \cite[Prop. 7.2.]{De4}.
\epf
Next, let us compute $c_{F,f}^+$. We will prove the following result in \S\ref{s:pl:trnu}:
\blem\label{l:trnu}
Let $M\in \M_{GF,f}$ be an object supported on the $G$-orbit $\<tF\>\subset GF$. Then
\beq\label{e:trnu}
\tr_{F^2}(\nu_{\theta^F_M})=\frac{(-1)^{2d_e}}{\sqrt{\dim \M_{G,f}}}\cdot\frac{q^{2d_e}}{q^{2\dim G}}\cdot\frac{q^{\dim T}}{|T^t_0(\Fq)|}\tr^+_{F^2,f}(\nu^0_{\theta_M^F})
\eeq
where $\nu_{\theta^F_M}:M\ast M\rar{}M\ast M$ is defined by (\ref{e:defnu}) and where $\nu_{\theta^F_M}^0:M\uast M\rar{} M\uast M$ denotes its truncation. We have
\beq\label{e:cfval}
c_{F,f}^+=\frac{q^{\dim G}}{q^{d_e}}.
\eeq
\elem
\subsubsection{Proof of Lemma \ref{l:trnu}}\label{s:pl:trnu}
First let us prove that equations (\ref{e:trnu}) and (\ref{e:cfval}) are in fact equivalent. For each $M\in \M_{GF,f}\subset \D_G(GF)$, we have the automorphism $\nu_{\theta^F_M}$ defined by (\ref{e:defnu}). Similarly, we can define the automorphism $\nu_{\theta^{F,f,+}_M}$ in ${}^f\D_G(GF)$ as the composition
\beq\label{e:defnuf}
\nu_{\theta^{F,f,+}_M}:M\ast M \xto{\beta^{-1}_{M,F^*M}} M\ast F^*M\xto{\id_M\ast F^*(\theta^{F,f,+}_M)}M\ast M
\eeq
and its truncation
\beq\label{e:defnuftr}
\nu^0_{\theta^{F,f,+}_M}:M\uast M \xto{\left(\beta^{-1}_{M,F^*M}\right)^0} M\uast F^*M\xto{\id_M\uast F^*(\theta^{F,f,+}_M)}M\uast M.
\eeq
Using the fact that the twists $\theta^{F^m,f,+}$ and the traces $\tr_{F^m,f}^+$ in $\M_{GF^m,f}$ come from a spherical structure, we see that (cf. \cite[\S7.1]{De4})
\beq\label{e:idmnuf+}
\tr_{F,f}^+(\id_M)=\tr_{F^2,f}^+(\nu^0_{\theta^{F,f,+}_M}).
\eeq
Then from (\ref{e:defnu}), (\ref{e:defnuf}), \ref{e:defnuftr} and (\ref{e:defcf}) we see that
\beq\label{e:nucfnu}
\nu_{\theta^F_M} = c_{F,f}^+\cdot\nu_{\theta^{F,f,+}_M} \hbox{ and } \nu_{\theta^F_M}^0 = c_{F,f}^+\cdot\nu_{\theta^{F,f,+}_M}^0.
\eeq
By (\ref{e:de4trnu}) we have
\beq
\tr_{F^2}(\nu_{\theta^F_M})=\tr_F(\id_M)
\eeq
\beq
=\frac{(-1)^{2d_e}}{\sqrt{\dim \M_{G,f}}}\cdot \frac{q^{d_e}}{q^{\dim G}}\cdot \frac{q^{\dim T}}{|T^t_0(\Fq)|}\cdot\tr_{F,f}^+(\id_M) \hbox{ }\hbox{ }\cdots\hbox{by Thm. \ref{t:relheis}(i)}
\eeq
\beq
=\frac{(-1)^{2d_e}}{\sqrt{\dim \M_{G,f}}}\cdot \frac{q^{d_e}}{q^{\dim G}}\cdot \frac{q^{\dim T}}{|T^t_0(\Fq)|}\cdot\frac{\tr_{F^2,f}^+(\nu_{\theta_{M}^{F}}^0)}{c_{F,f}^+} \hbox{ }\hbox{ }\cdots\hbox{by (\ref{e:idmnuf+}) and (\ref{e:nucfnu})}.
\eeq
Moreover, we know that $\tr_{F,f}^+(\id_M)\neq 0$. Hence we can now see that (\ref{e:trnu}) and (\ref{e:cfval}) are in fact equivalent.
Now let us prove that the lemma holds for tori. Hence suppose that $G=T$, a torus. In this case, the Heisenberg idempotent $e$ must be the unit $\delta_1\in \D_T(T)$. Let $\L\in \C(T)(\Qlcl)^F$ be such that $f\cong e_\L\in \D_T(T)$. Note that in our situation we have
\beq\label{e:torcase}
d_e=0 \hbox{ and } \M_{T,e_\L}\cong \Vec.
\eeq
Since we know that (\ref{e:trnu}) and (\ref{e:cfval}) are equivalent, let us prove (\ref{e:trnu}) for the torus $T$. Towards this end, we prove:
\blem\label{l:trf2}
Suppose that $G=T$ is a torus and that $f\cong e_\L\in \D_T(T)$ is an $F$-stable minimal quasi-idempotent as before. Then for $M\in \M_{TF,e_\L}$ we have
\beq
\tr_{F^2}(\nu_{\theta_M^F})=\frac{|\{s\in T|sF(s)=1\}|}{q^{\dim T}}\cdot\tr_{F^2}(\nu^0_{\theta_{M}^F}).
\eeq
\elem
\bpf
We know that $\M_{TF,e_\L}\cong \Vec$ and hence let us suppose that $M$ is the (unique) simple object, namely $e_\L$ translated by $F$. The proof is similar to the proof of (\ref{e:trg0}). Proceeding in the same way, let us look at the stalk (where we identify $M$ with the object $e_\L\in \D^F_G(G)\cong \D_G(GF)$, cf. \cite[\S4.2]{De4})
\beq
\nu_{\theta^F_M}(1): \int\limits_{h_1F(h_2)=1}e_{\L}({h_1})\otimes e_\L({h_2}) \rar{\cong} \int\limits_{h_1F(h_2)=1}e_\L({h_2})\otimes e_\L(F^{-1}(h_2^{-1}h_1)h_2).
\eeq
Then using the same argument as in the proof of (\ref{e:trg0}) and \cite[\S4.2]{De4} we complete the proof of the lemma.
\epf
Note that we have $\{s\in T|sF(s)=1\}\subset T^{F^2}$. In fact, we have the short exact sequence
\beq
0\to \{s\in T|sF(s)=1\}\subset T^{F^2}\xto{s\mapsto sF(s)} T^F\to 0
\eeq
corresponding to the `norm' map. Hence we have
\beq\label{e:tf2}
|T^{F^2}|=|T^F|\cdot |\{s\in T|sF(s)=1\}|.
\eeq
Now by Theorem \ref{t:relheis}(i) applied to the Frobenius $F^2:T\rar{}T$ and (\ref{e:torcase}) we have
\beq\label{e:trf2+}
\tr_{F^2}(\nu^0_{\theta_{M}^F})=\frac{1}{|T^{F^2}|}\cdot{\tr_{F^2,e_\L}^+(\nu_{\theta_{M}^{F}}^0)}.
\eeq
Hence using Lemma \ref{l:trf2}, (\ref{e:tf2}) and (\ref{e:trf2+}) we get
\beq
\tr_{F^2}(\nu_{\theta_M^F})=\frac{1}{q^{\dim T}\cdot |T^{F}|}\cdot{\tr_{F^2,e_\L}^+(\nu_{\theta_{M}^{F}}^0)}.
\eeq
This completes the proof of (\ref{e:trnu}) and hence of Lemma \ref{l:trnu} in the case of the torus. In particular for a torus we have $c^+_{T,F,e_\L}=q^{\dim T}$.
Next let us consider the case of a connected solvable group $G=TU$. Let $f\cong \beel$, where $\L\in \C(T)(\Qlcl)^F$. In this case we have
\beq\label{e:edgf}
{}^{\beel}\D_G(G)\cong e\D_U(U)\boxtimes {}^{e_\L}\D_T(T) \hbox{ and } {}^{\beel}\D_G(GF)\cong e\D_U(UF)\boxtimes {}^{e_\L}\D^F_T(T).
\eeq
Since we know that Lemma \ref{l:trnu} holds for unipotent groups by \cite{De4} and since we have proved it for tori above, it follows that the lemma holds for connected solvable $G$ and in particular we have $c^+_{G,F,\beel}=\frac{q^{\dim G}}{q^{d_e}}$.
Finally using the connected case, we can also prove the result for all neutrally solvable groups.
\subsubsection{Shintani matrices and almost characters in the Heisenberg case}\label{s:acthc}
Recall that we have a (positive integral) modular category $\M_{G,f}$ and an invertible $\M_{G,f}$-module category $\M_{GF,f}$ equipped with the (positive) $\M_{G,f}$-module trace $\tr_{F,f}^+$. In this abstract categorical setting, for each positive integer $m$, we have defined the $m$-th Shintani matrix in \cite[\S4]{De5}. Let us denote the matrix we obtain this way by $\Sh_m^+(F,f)$. On the other hand, we have the matrix $\t{\Sh}_m(F,f)$ from \S\ref{s:sdlpdthc} which relates the two sets $\Sh_m(\Irrep_{e,f}(G,F^m)^F)$ and $\Irrep_{e,f}(G,F)$ and whose entries are given by
\beq\label{e:deftsh}
\t{\Sh}_m(F,f)_{W,V}=\<\Sh_m(W),\chi_V\> = \tr_{F^{m+1}}\left(\zeta_{W_{loc},\psi_W, \eta_m(V_{loc})}\right)=\tr_{F^{m+1}}\left(\zeta_{M_W,\psi_{M_W}, M_V,\psi_{M_V}}\right)
\eeq
for $W\in \Irrep_{e,f}(G,F^m)^F$ and $V\in \Irrep_{e,f}(G,F)$, where
$$\psi_{M_W}:=\psi_W[\dim G+\dim H+\dim T]:F^*M_W\rar\cong M_W$$
is chosen in such a way that the composition (cf. \cite[Rem. 4.1.]{De4})
\beq\label{e:psicondi}
{F^m}^*M_W\xto{{F^{(m-1)}}^*(\psi_{M_W})}{F^{(m-1)}}^*M_W\to\cdots F^*M_W\xto{\psi_{M_W}}M_W
\eeq equals ${F^m}^*\theta^{F^m}_{M_W}$ and where $\psi_{M_V}:{F^m}^*M_V\rar{\cong} M_V$ is defined using the twist $\theta^F$ in $\M_{GF,f}\subset \D_G(GF)$ (cf. \cite[\S5.1.]{De4}).
Let us recall the definition of the matrix ${\Sh}^+_m(F,f)$ from \cite[\S4.2.]{De5}. For this we must choose $$\psi'_{M_W}:F^*M_W\rar\cong M_W$$
in such a way that the composition
\beq
{F^m}^*M_W\xto{{F^{(m-1)}}^*(\psi'_{M_W})}{F^{(m-1)}}^*M_W\to\cdots F^*M_W\xto{\psi'_{M_W}}M_W
\eeq
equals ${F^m}^*\theta^{F^m,f,+}_{M_W}=\frac{{F^m}^*\theta^{F^m}_{M_W}}{\left(c^+_{F,f}\right)^m}$ and we define $\psi'_{M_V}:{F^m}^*M_V\rar{\cong} M_V$ using the twist $\theta^{F,f,+}=\frac{\theta^F}{c^+_{F,f}}$ in $\M_{GF,f}$. In particular, we may (and will) choose $\psi'_{M_W}=\frac{\psi_{M_W}}{c_{F,f}^+}$ where $\psi_{M_W}$ is chosen to be as before and we have $\psi'_{M_V}=\frac{\psi_{M_V}}{\left(c_{F,f}^+\right)^m}$.
Then the entries of the matrix $\Sh^+_m(F,f)$ are defined by
\beq
{\Sh}^+_m(F,f)_{W,V}:=\tr_{F^{m+1},f}^+\left(\zeta^0_{M_W,\psi'_{M_W}, M_V,\psi'_{M_V}}\right)=\frac{1}{(c_{F,f}^+)^{m+1}}\tr_{F^{m+1},f}^+\left(\zeta^0_{M_W,\psi_{M_W}, M_V,\psi_{M_V}}\right).
\eeq
Finally, by (\ref{e:deftsh}), Lemma \ref{l:trzeta} and Lemma \ref{l:trnu} we obtain:
\bthm\label{t:tshsh}
For each $W\in \Irrep_{e,f}(G,F^m)^F$ choose $\psi_{M_W}$ satisfying (\ref{e:psicondi}) and set $\psi'_{M_W}=\frac{\psi_{M_W}}{c^+_{F,f}}$. With these choices, we have
\beq
\t{\Sh}_m(F,f)=\frac{(-1)^{2d_e}}{\sqrt{\dim \M_{G,f}}}\cdot\Sh^+_m(F,f).
\eeq
\ethm
As a corollary we can now complete the proof of the Heisenberg case of Theorem \ref{t:main3}.
\bcor\label{c:tsh}
Let $e$ be an $F$-stable Heisenberg idempotent in $\DG$ and let $f$ be an $F$-stable indecomposable minimal quasi-idempotent in $e\DG$. Then\\
(i) For each positive integer $m$, the image $\Sh_m(\Irrep_{e,f}(G,F^m))^F\subset \t\T_{f_0}\FunG$ is an orthonormal basis known as the $m$-th Shintani basis of $\t\T_{f_0}\FunG$.\\
(ii) There exists a positive integer $m_0$ such that for any positive integer $m$, the $m$-th Shintani basis of $\t\T_{f_0}\FunG$ depends (up to scalings by roots of unity) only on the residue of $m$ modulo $m_0$.\\
(iii) Let $m$ be a positive multiple of $m_0$. Then the $m$-th Shintani basis of $\t\T_{f_0}\FunG$ agrees with the basis $\left\{\frac{q^{\dim G}}{q^{d_e}}\cdot \T_{C,\psi_C}|C\in \CS_{e,f}(G)^F\right\}$ up to scaling by roots of unity.
\ecor
\bpf
By Theorem \ref{t:tshsh} and \cite[Prop. 4.7.]{De5}, the matrix $\t\Sh_m(F,f)$ which relates the sets $\Sh_m(\Irrep_{e,f}(G,F^m))^F$ and $\Irrep_{e,f}(G,F)$ is unitary. Hence statement (i) follows.
Using \cite[Thm. 4.10(ii)]{De5}, we see that there exists an $m_0$ such that the matrices $\Sh_m^+(F,f)$ only depend (up to scaling by roots of unity) on the residue of $m$ modulo $m_0$. This completes the proof of (ii).
By Theorem \ref{t:relheis}, the transition matrix between the sets $\left\{\frac{q^{\dim G}}{q^{d_e}}\cdot \T_{C,\psi_C}|C\in \CS_{e,f}(G)^F\right\}$ and $\Irrep_{e,f}(G,F)$ is given by $\frac{1}{\sqrt{\dim \M_{G,f}}}\cdot S^+(F,f)$, where $S^+(F,f)$ is the crossed S-matrix. Statement (iii) now follows from \cite[Thm. 4.10(iii)]{De5}.
\epf
This completes the proofs of the Heisenberg case versions of all the main results of this paper (Theorems \ref{t:main1}, \ref{t:main2} and \ref{t:main3}).
\section{Proof of the main results in the general case}\label{s:pmr}
In this section, we will use the results from the Heisenberg case to complete the proofs of all our main results in the general case. In fact, we will also state more precise versions of our main results.
\subsection{Definition of character sheaves and $\f{L}$-packets}\label{s:dcs}
In this section we will define the set $\CS(G)$ of all character sheaves on a neutrally solvable algebraic group $G$ over any algebraically closed field $\k$ of characteristic $p>0$. We will also describe an $\f{L}$-packet decomposition of the set $\CS(G)$ as well as the modular categories attached to such $\f{L}$-packets.
As in \S\ref{s:i}, for a group $G$ as above, let $\hG$ denote the set of (isomorphism classes of) minimal idempotents in the braided monoidal category $\DG$. For each minimal idempotent $e\in \hG$ we will first define the set $\CS_e(G)$ of character sheaves in the braided monoidal category $e\DG\subset \DG$. By \cite[Thm. 2.28]{De2} for such an $e$, there exists an admissible pair $(H,\N)$ for $G$ which gives rise to the minimal idempotent $e$. Let $G'\subset G$ be the normalizer of $(H,\N)$ and let $e'_\N:=\N\otimes \can_H\in \DGp$ be the corresponding Heisenberg idempotent. Then according to the results {\it op cit.}, we have an equivalence of triangulated braided monoidal categories
\beq\label{e:indgedgp}
\indg:e'_\N\DGp \rar{\cong} e\DG \hbox{ with } e'_\N \mapsto e.
\eeq
\brk\label{r:ribbon}
As we have noted before, the triangulated braided monoidal category $e'_\N\DGp$ has the structure of a ribbon $\r$-category with the duality functor defined by $\f{D}^-_{G'}(\cdot)[2\dim H](\dim H)$ (cf. \cite[\S2.3]{De1}, \cite[Appendix A]{BD}). Transferring this structure along the above equivalence, we see that $e\DG$ must have the structure of a ribbon $\r$-category. On the other hand, $\DG$ is also a ribbon $\r$-category with duality functor $\f{D}^-_G$ and $e\in \DG$ is a locally closed idempotent by \cite[Thm. 2.28]{De2}. Hence by using the argument from \cite[Appendix A.6]{BD}, we can prove that $e\DG$ is a Grothendieck-Verdier category with dualizing object $\f{D}^-_Ge$. Hence, both $e$ (the unit object of $e\DG$) and $\f{D}^-_Ge$ are dualizing objects of $e\DG$. Hence by \cite[Rem. A.3]{BD}, the object $\f{D}^-_Ge$ must be invertible in $e\DG$.
\erk
Let $e\in \hG$ be a minimal idempotent with $(H,\N)$ an admissible pair giving rise to $e.$ With all notation as before, suppose that $T'$ is a maximal torus of $G'$. By Remark \ref{r:vtqi}, each indecomposable minimal quasi-idempotent in $e'_\N\DGp$ is a $V_{T'}$-quasi-idempotent. Hence it follows that each indecomposable minimal quasi-idempotent in $e\DG\cong e'_\N\DGp$ must also be a $V_{T'}$-quasi-idempotent. In particular, we see that the object $V_{T'}\in \Dmon$ is independent of the choice of the admissible pair $(H,\N)$ that gives rise to $e$ and hence $\dim T'$ is also independent of the choice of admissible pair. In particular, to each $e\in \hG$ we can associate an object $V_e\in \Dmon$ such that every indecomposable minimal quasi-idempotent in $e\DG$ is a $V_e$-quasi-idempotent. The object $V_e$ is supported in cohomological degrees $\{0,-1,\cdots,-\dim T'\}$.
For $e\in \hG$ as above, consider its stalk $e_1\in \D_G(1)$. Then we have identifications $e_1\cong \avg ({e'_\N}_1)\cong \avg(\Qlcl)[2\dim H](\dim H)$. Apply the forgetful functor and consider $e_1$ as an object of $D^b\Vec$. As such its cohomology is nonzero in degree $2(\dim(G/G')-\dim H)$ and vanishes in all higher degrees. In particular, we see that the integer $n_e:=\dim H-\dim(G/G')$ only depends on $e$ and not on the choice of the admissible pair $(H,\N)$ giving rise to $e$.
In view of these comments, let us make the following definitions:
\bdefn\label{d:miniinv}
Let $e\in \hG$ be a minimal idempotent. Then we have the associated object $V_e\in \Dmon$ as described above. Let $\tau_e\in \Z_{\geq 0}$ be such that $V_e$ is supported in cohomological degrees $\{0,\cdots,-\tau_e\}$. Define the functional dimension as $d_e:=\frac{\dim G - n_e -\tau_e}{2}$.
\edefn
\brk
If $e\in \hG$ comes from an admissible pair $(H,\N)$, we have $n_{e'}=\dim H$, $V_{e'}\cong V_e\cong V_{T'}$, $\tau_{e'}=\tau_e$ and $d_e=d_{e'}+\dim G-\dim G'$. Moreover, the definition of $d_e$ above agrees with the definition from Remark \ref{r:fundim} in the case of Heisenberg idempotents.
\erk
\bthm\label{t:modcatgen}
Let $G$ be a neutrally solvable group. Let $e\in \hG$ and let $f$ be any indecomposable minimal quasi-idempotent in $e\DG$.\\
(i) Then ${}^fe\DG^\Delta={}^f\DG^\Delta$ is a $\Qlcl$-linear triangulated braided semigroupal category. It has a unique $t$-structure, denoted here by $(\D^{\leq 0}, \D^{\geq 0})$, such that $\D^{\leq 0}\ast \D^{\leq 0}\subset \D^{\leq 0}$ but $\D^{\leq 0}\ast \D^{\leq 0}\nsubseteq \D^{\leq -1}$. \\
(ii) Let $\M_{G,f}^\Delta\subset {}^{f}\D_{G}(G)^\Delta$ denote the heart of the above $t$-structure. For each $i\in \Z, X\in {}^{f}\D_{G}(G)^\Delta$ let $X^i\in \M_{G,f}^\Delta$ denote the $i$-th cohomology of $X$ with respect to this $t$-structure. Then $(\M_{G,f}^\Delta,\underline{\ast})$ has the structure of a braided semigroupal category, where
\beq
\underline{\ast}:\M_{G,f}^\Delta\times \M_{G,f}^\Delta\rar{}\M_{G,f}^\Delta
\eeq denotes the truncated convolution functor defined by $X\uast Y:=(X\ast Y)^0$ for $X,Y\in \M_{G,f}$. \\
(iii) Let $\M_{G,f}\subset \M_{G,f}^\Delta$ denote the full subcategory formed by the semisimple objects. Then $\M_{G,f}={}^f\DG\cap \M_{G,f}^\Delta$ is closed under truncated convolution and $(\M_{G,f},\uast,f)$ has the structure of a non-degenerate braided fusion category. There is a natural spherical structure on $\M_{G,f}$, thus giving it the structure of a modular category.\\
(iv) The Frobenius-Perron dimension $\FPdim(\M_{G,f})$ is the square of an integer.\\
(v) Suppose that the ground field $\k$ is $\Fqcl$. Then the natural spherical structure on $\M_{G,f}$ is positive integral, i.e. categorical dimensions of all objects of $\M_{G,f}$ are positive integers.
\ethm
\bpf
Let $(H,\N)$ be an admissible pair (with normalizer $G'$) which gives rise to the minimal idempotent $e$ as above and let $e'_\N\in \DGp$ be the corresponding Heisenberg idempotent. The theorem is now clear using Corollary \ref{c:modcat} for the Heisenberg idempotent $e'_\N\in \DGp$ and the equivalence (\ref{e:indgedgp}).
\epf
\bdefn\label{d:lp}
Let $\f{L}(G)$ denote the set of all indecomposable minimal quasi-idempotents in the triangulated braided monoidal category $\DG$. For $e\in \hG$, let $\f{L}_e(G)$ denote the set of all indecomposable minimal quasi-idempotents in the triangulated braided monoidal category $e\DG$.
\edefn
\bprop\label{p:lleg}
We have
\beq
\f{L}(G)=\coprod\limits_{e\in \hG}{\f{L}_e(G)}.
\eeq
Each equivalence class of minimal quasi-idempotents in $\DG$ contains a unique (up to isomorphism) indecomposable object.
\eprop
\bpf
Let $f$ be any minimal quasi-idempotent. Then by \cite[\S5.5]{De2}, there exists a minimal idempotent $e\in\DG$ such that $e\ast f\neq 0.$ Then using the facts that $f$ is a minimal quasi-idempotent, $e$ is an idempotent and Lemma \ref{l:wv'}, we conclude that $e\ast f \cong f$, i.e. $f\in e\DG$. Both the statements of the proposition now follow (using Theorem \ref{t:minqiedgg}(iii$'$) and (\ref{e:indgedgp}) to prove the second statement).
\epf
Let us now define character sheaves on neutrally solvable groups.
\bdefn\label{d:csg}
Let $G$ be a neutrally solvable group. \\
(i) Let $f\in \f{L}(G)$ be an indecomposable minimal quasi-idempotent with the associated modular category $\M_{G,f}\subset {}^f\DG\subset {}^f\DG^\Delta\subset \DG$. We define $\CS_f(G)$ to be the (finite) set of isomorphism classes of simple objects of $\M_{G,f}$. The set $\CS_f(G)$ is known as the $\f{L}$-packet of character sheaves associated with $f\in \f{L}(G)$.\\
(ii) Let $e\in \hG$ be a minimal idempotent. The set of character sheaves on $G$ associated with $e$ is defined as the union $\CS_e(G):=\coprod\limits_{f\in \f{L}_e(G)}\CS_f(G)$.\\
(iii) The set of all character sheaves on $G$ is defined as the union $\CS(G):=\coprod\limits_{f\in \f{L}(G)}\CS_f(G)=\coprod\limits_{e\in \hG}\CS_e(G)$.
\edefn
\brk
Here we have implicitly used the fact that if $f,f'\in \f{L}(G)$ (resp. $e,e'\in \hG$) are non-isomorphic, then $f\ast f'=0$ (resp. $e\ast e'=0$).
\erk
With the following result, we see that the set $\CS(G)$ of character sheaves satisfies all the properties as desired in Theorem \ref{t:main1}:
\bprop\label{p:main1iv}
Let $\Phi:\DG\rar\cong \DG$ be any $\Qlcl$-linear triangulated braided monoidal auto-equivalence. Then $\Phi$ preserves the set $\CS(G)$ of character sheaves in $\DG$ as well as their idempotent and $\f{L}$-packet decompositions, i.e. $\Phi$ induces a permutation of the sets $\hG$, $\f{L}(G)$ and we have $\Phi(\CS_e(G))=\CS_{\Phi(e)}(G)$ and $\Phi(\leG)=\lL_{\Phi(e)}(G)$ for each $e\in \hG$ and $\Phi(\CS_f(G))=\CS_{\Phi(f)}(G)$ for each $f\in \f{L}(G)$. For each $f\in \lG$, the restriction of $\Phi$ to $\M_{G,f}\subset \DG$ induces an equivalence of modular categories:
\beq
\Phi:\M_{G,f}\rar{\cong} \M_{G,\Phi(f)}.
\eeq
\eprop
\bpf
The sets $\hG, \lG, \CS(G)$ as well as the modular categories $\M_{G,f}$ are all defined purely in terms of the $\Qlcl$-linear triangulated braided monoidal structure of $\DG$. Hence the proposition is obvious.
\epf
\subsection{Irreducible representations and admissible pairs}\label{s:irap}
For the remainder of this paper, we take the ground field to be $\Fpcl$ and we let $G$ be a neutrally solvable group over $\Fpcl$ equipped with an $\Fq$-Frobenius $F:G\rar{}G$. In the remainder of the paper, our goal is to study the irreducible characters of all pure inner forms $G_0^g(\Fq)$ using the theory of character sheaves.
We will begin by studying the set $\Irrep(G,F)$ in terms of admissible pairs. Let $\P_{\h{adm}}(G)$ denote the set of all admissible pairs $(H,\N)$ (where the multiplicative local system $\N$ is considered as a point of $H^*$). Then $G$ acts on $\Padm$ by conjugation and we let $[\Padm]$ denote the quotient for this action. By \cite[Thm. 2.28]{De2}, we have a surjective map
\beq\label{e:padmhg}
[\Padm] \onto \hG \hbox{ defined by } (H,\N)\mapsto \indg e'_\N.
\eeq
Now the Frobenius $F$ acts on the set $[\Padm]$. Consider the set of fixed points $[\Padm]^F$. We see that the geometric conjugacy class $\<(H,\N)\>$ is $F$-stable if and only if there exists a pure inner form $gF$ of $F$ such that the admissible pair $(H,\N)$ is $gF$-stable. In this case, the normalizer $G'$ must also be $gF$-stable. Such a pair gives rise to an object $e'_{\N_0^g}\in \D_{{G'}^g_0}({G'}^g_0)$ and the induced object $e^g_0:=\ind_{{G'}^g_0}^{G^g_0}e'_{\N_0^g}\in \D_{G^g_0}(G^g_0)$. Now by \cite[\S4.4]{B} we have an identification $\D_{G^g_0}(G^g_0)\cong \D_{G_0}(G_0)$ and hence we obtain the idempotent $e_0\in \D_{G_0}(G_0)$. We also obtain the function $\T_{e_0}\in \FunG$ which will also be an idempotent. In other words, if the geometric conjugacy class of an admissible pair $(H,\N)$ is $F$-stable, then the corresponding minimal idempotent $e\in \hG$ comes from an idempotent $e_0\in \DGn$ by extension of scalars. Moreover, in this case, it is easy to check that the idempotent $\T^g_{e_0}\in \Fun(G^g_0(\Fq)/\sim)$ is nonzero. Indeed, using \cite[Prop. 4.12]{B} we can prove that $\T^g_{e_0}(1)$ is a positive rational number (see also \cite[Prop. 2.20, \S A.6]{B}). Hence the idempotent $\T_{e_0}\in \FunG$ obtained from an $F$-stable geometric conjugacy class of an admissible pair as above is nonzero. Moreover it is clear that $\T_{e_0}$ only depends on the geometric conjugacy class $\<(H,\N)\>\in [\Padm]^F$. In fact we have
\blem\label{l:tre0e}
Let $\<(H_1,\N_1)\>, \<(H_2,\N_2)\>\in [\Padm]^F$ and let $\T_{{e_1}_0}, \T_{{e_2}_0} \in \FunG$. Then either $\T_{{e_1}_0}\ast\T_{{e_2}_0}=0$ or $\T_{{e_1}_0}=\T_{{e_2}_0}$.
\elem
\bpf
Suppose that $\T_{{e_1}_0}\ast\T_{{e_2}_0}\neq 0$. Hence we must have ${e_1}_0\ast {e_2}_0\neq 0$ and hence $e_1\ast e_2\neq 0$. But both $e_1,e_2\in \hG$ are minimal idempotents. Hence we must have $e_1\cong e_2$. Also, $e_i\in \DG$ are simple, i.e. $\Hom(e_i,e_i)=\Qlcl$. Hence it follows that the associated idempotents $\T_{{e_1}_0},\T_{{e_2}_0}$ must be equal.
\epf
The map (\ref{e:padmhg}) induces a map
\beq\label{e:padmfhgf}
[\Padm]^F\rar{}\hG^F.
\eeq
Let us denote the image of the above map by $\hG^F_{\h{adm}}$. This is the set of $F$-stable minimal idempotents in $\DG$ that can be obtained from an $F$-stable geometric conjugacy class of admissible pairs. The following lemma is clear:
\blem\label{l:uniqweil}
Given $e\in \hG^F_{\h{adm}}$, it has a unique Weil structure $\psi_e:F^*e\rar\cong e$ such that the associated trace function $\T_{e,\psi_e}\in \FunG$ is an idempotent. By a slight abuse of notation, we may often denote it by $\T_e$. Thus associated with each $e\in \hG^F_{\h{adm}}$ is a nonzero idempotent $\T_e\in \FunG$.
\elem
\bdefn
Suppose that $\<(H,\N)\>\in [\Padm]^F$ as above and let $\T_{e_0}\in \FunG$ be the corresponding idempotent with its `complex conjugate' being denoted $\bar\T_{e_0}$. Let $e\in \hG^F_{\h{adm}}$ be the corresponding minimal idempotent. Then we define
\beq
\Irrep_{H,\N}(G,F)=\Irrepe:=\{W\in \Irrep(G,F)|\bar\T_{e_0}=\bar\T_e \hbox{ acts in $W$ as the identity}\}.
\eeq
By Lemmas \ref{l:tre0e}, \ref{l:uniqweil} the sets $\Irrep_{H,\N}(G,F)$ are all non-empty and are either equal or disjoint as we vary the pair $(H,\N)$. Moreover, for two such admissible pairs $(H_1,\N_1), (H_2,\N_2)$ we have $\Irrep_{H_1,\N_1}(G,F)=\Irrep_{H_2,\N_2}(G,F)$ if and only if the associated minimal idempotents in $\hG^F_{\h{adm}}$ are isomorphic.
\edefn
Below we give an alternative characterization of the set $\Irrep_{H,\N}(G,F)$ in the spirit of \cite[Def. 2.13]{B1}.
\bprop\label{p:altlp}
Let $\C\in [\Padm]^F$ be an $F$-stable geometric conjugacy class of admissible pairs, let $e$ be its image in $\hG^F_{\h{adm}}$ and let $\T_e\in \FunG$ be the corresponding idempotent. \\
(i) For $g\in G$, the idempotent $\T_e^g\in \Fun(G^g_0(\Fq)/\sim)$ is nonzero if and only if there exists a $gF$-stable admissible pair $(H,\N)$ in the geometric conjugacy class $\C$.\\
(ii) For $g\in G$, define $\Irrep_{\C}(G^g_0(\Fq))=\Irrep_{e}(G^g_0(\Fq)):=\Irrep(G^g_0(\Fq))\cap\Irrepe$. Let $W\in \Irrep(G^g_0(\Fq))$. Then $W\in \Irrep_{\C}(G^g_0(\Fq))$ if and only if $W$ occurs inside $\h{ind}_{H^g_0(\Fq)}^{G^g_0(\Fq)}\T_{\N_0^g}$ for some $gF$-stable admissible pair $(H,\N)\in \C$, where $\T_{\N_0^g}:H^g_0(\Fq)\to \Qlcl^\times$ is the multiplicative character associated with the $gF$-stable multiplicative local system $\N$.
\eprop
\bpf
Let us prove statement (i). If an admissible pair $(H,\N)$ in $\C$ is $gF$-stable, then we have already seen that $\T_e^g\in \Fun(G^g_0(\Fq))$ is nonzero.
In the other direction, suppose that $g\in G$ is such that $\T^g_e\neq 0$. Let us fix an admissible pair $(H,\N)\in \C\in [\Padm]^F$. Now there exists some pure inner form $tF$ of $F$ such that our chosen admissible pair $(H,\N)$ is $tF$-stable. For simplicity, let us replace our original Frobenius $F$ with $tF$ everywhere. With this choice, $(H,\N)$ is $F$-stable and hence its normalizer $G'$ is an $F$-stable subgroup of $G$. Now we have the Heisenberg idempotent $e'_0\in \D_{G'_0}(G'_0)$ and the corresponding minimal idempotent $e_0\in \DGn$ obtained by induction. Now we have assumed that $\T_{e_0}^g\in \Fun(G^g_0(\Fq)/\sim)$ is nonzero. Hence by \cite[Prop. 4.12]{B} we see that the $F$-twisted conjugacy class $\<g\>$ must lie in the image of the map $H^1(G',F)\rar{}H^1(G,F)$. In other words, there must be an $h\in G$ such that $hgF(h^{-1})\in G'$, i.e., such that $({}^{hgF(h^{-1})}H,{}^{hgF(h^{-1})}\N)=(H,\N)$. But since $(H,\N)$ is $F$-stable, this means that the admissible pair ${}^{h^{-1}}(H,\N)\in \C$ must be $gF$-stable as desired.
To prove (ii), by passing to pure inner form of $F$ if necessary, we may assume that $g=1$. Suppose that $(H,\N)\in \C$ is $F$-stable. (If there is no such pair in $\C$, then by part (i), $\T_e^1=0$ in $\Fun(G_0(\Fq)/\sim)$, in which case statement (ii) is vacuous.) Let $e'_0\in \D_{G'_0}(G'_0)$ be the corresponding Heisenberg idempotent. By \cite[Prop. 4.12]{B} we have
\beq
\T_e^1=\sum\limits_{\substack{\<g'\>\in H^1(G',F)\\g'=hF(h^{-1}) \h{ for }\\\h{ some }h\in G}}\ind_{{G'}^{g'}_0(\Fq)}^{G_0(\Fq)}\T^{g'}_{e'_0}.
\eeq
On the other hand, for $h\in G$, the pair ${}^{h^{-1}}(H,\N)\in \C$ is $F$-stable if and only if $hF(h^{-1})\in G'$. Statement (ii) now follows. (See also Corollary \ref{c:irrepe}.)
\epf
\subsection{Geometric reduction process for algebraic groups}\label{s:grpag}
In this section we prove a result relating irreducible representations and admissible pairs for any algebraic group $G$ over $\Fqcl$ equipped with an $\Fq$-Frobenius $F:G\rar{}G$. The following result is a straightforward generalization of \cite[Thm. 7.1]{B1}:
\bthm\label{t:wadm}
Let $G$ be any algebraic group over $\Fqcl$ and let $F:G\rar{}G$ be an $\Fq$-Frobenius. Let $W$ be an irreducible representation of a pure inner form $G^g_0(\Fq)$. Let $(A,\K)$ be a pair consisting of a $gF$-stable connected unipotent normal subgroup $A\normal G$ and a $G$-invariant multiplicative local system $\K\in (A^*)^{gF}$ such that the subgroup $A^{gF}\subset G^g_0(\Fq)$ acts on $W$ by the character $\T_{\K^g_0}:A^{gF}\rar{}\Qlcl^\times$. Then there exists a $gF$-stable admissible pair $(H,\N)\geq (A,\K)$ for $G$ such that $W$ restricted to the subgroup $H^{gF}=H^g_0(\Fq)\subset G^g_0(\Fq)$ contains the associated character $\T_{\N^g_0}:H^g_0(\Fq)\rar{}\Qlcl^\times$ as a direct summand, or equivalently, such that $W$ occurs as a direct summand in $\ind_{H^g_0(\Fq)}^{G^g_0(\Fq)}\T_{\N_0^g}$.
\ethm
\brk
If we take the pair $(A,\K)=(1,\Qlcl)$, then the result above implies that to any $W\in \Irrep(G,F)$ we can associate some admissible pair compatible with $W$ in the above sense.
\erk
\begin{proof}[Proof of Thm. \ref{t:wadm}]
The proof of \cite[Thm. 7.1]{B1} readily extends to the general case. Namely, let us first consider the case $[G,\R_u(G)]\subset A$. Now the argument from \cite[\S7.5]{B1} completes the proof in this case.
Now suppose that $[G,\R_u(G)]$ is not contained in $A$, i.e. $\R_u(G)/A=\R_u(G/A)$ is not central in $G/A$. Let $A\subset Z\subset \R_u(G)$ be such that $\R_u(Z(G/A))=Z/A$. Then $Z$ must be a proper subgroup of $\R_u(G)$ by our assumption. Now consider the map
$\phi_\K:\R_u(G)/A\rar{}(Z/A)^*$ as defined in \cite[\S7.6]{B1}. Using the argument {\it loc. cit.}, we obtain a $gF$-stable subgroup $A\subsetneq B\subset Z$ with an extension $\K'\in (B^*)^{gF}$ of $\K\in A^*$ such that the pair $(B,\K')$ is compatible with $W$. Let $G_1\subset G$ be the normalizer of the pair $(B,\K')$. If $G=G_1$, we can replace our original pair with the strictly larger pair $(B,\K')$ and proceed. Else $G_1$ is strictly smaller and we can proceed by induction following the argument from \cite[\S7.6]{B1}.
\epf
Combining Theorem \ref{t:wadm} with the results from \S\ref{s:irap} we obtain:
\bcor\label{c:irreppart}
Assume once again that $G$ is neutrally solvable equipped with a Frobenius. Then we have a partition
\beq
\Irrep(G,F)=\coprod\limits_{e\in \hG^F_{\h{adm}}}\Irrepe.
\eeq
\ecor
\subsection{Irreducible representations and character sheaves}\label{s:ircs}
In this section we will describe the relationship between irreducible characters and character sheaves on a neutrally solvable group $G$. In view of Corollary \ref{c:irreppart}, let us fix a minimal idempotent $e\in \hG^F_{\h{adm}}$ and study the set $\Irrepe=\Irrep_\C(G,F)$, where $\C\in [\Padm]^F$ is some pre-image of $e$ under the map (\ref{e:padmfhgf}). By passing to a pure inner form of $F$ if needed, let us assume that the geometric conjugacy class $\C$ contains an $F$-stable admissible pair $(H,\N)$ with normalizer $G'$. Let $e'\in \DGp$ be the corresponding Heisenberg idempotent. Then we have $e=\indg e'$ and an equivalence
\beq\label{e:indedgp}
\indg:e'\DGp\rar{\cong}e\DG
\eeq
of $\Qlcl$-linear triangulated braided monoidal categories compatible with the actions of the Frobenius on each side. We also have a $\Qlcl$-linear triangulated equivalence (cf. \cite[\S4.2]{De3})
\beq\label{e:indirrepe}
\indg:e'\D_{G'}(G'F)\rar{}e\D_G(GF)
\eeq
of module categories. Also note that the functor
\beq
\indg:\D_{G'}(G'F)\rar{}\D_G(GF)
\eeq
identifies with induction of representations of pure inner forms of $G'_0(\Fq)$ (cf. \cite[\S4.3]{De3}). Also we have the `induction of class functions' map (cf. \cite[\S4.3]{De3}):
\beq\label{e:indfun}
\indg:\Fun([G'],F)\rar{}\FunG.
\eeq
Given an object $M'\in \D_{G'}(G'F)$ we have its character $\chi_{M'}\in \Fun([G'],F)$. We have seen {\it loc. cit.} that
\beq
\chi_{\indg M'}=\indg\chi_{M'}.
\eeq
Also we have the compatible functors
\beq
\ind_{G'_0}^{G_0}:\D_{G'_0}(G'_0) \rar{} \DGn,
\eeq
\beq
\ind_{G'}^{G}:\D_{G'_0}^{\h{Weil}}(G'_0) \rar{} \D_{G_0}^{\h{Weil}}(G_0).
\eeq
By \cite[Prop. 4.12]{B1}, for each $(C',\psi')\in \D_{G'_0}^{\h{Weil}}(G'_0)$ we have
\beq
\indg(\T_{C',\psi'})=\T_{\indg(C',\psi')}.
\eeq
Since the pair $(H,\N)$ is assumed to be $F$-stable, we have the corresponding Heisenberg idempotent $e'_0\in \D_{G'_0}(G'_0)$ and the idempotent $e_0\in \DGn$. We have equivalences
\beq
\ind_{G'_0}^{G_0}:e'_0\D_{G'_0}(G'_0) \rar{\cong} e_0\DGn,
\eeq
\beq
\ind_{G'}^{G}:e'\D_{G'_0}^{\h{Weil}}(G'_0) \rar{\cong} e\D_{G_0}^{\h{Weil}}(G_0).
\eeq
By \cite[Lem. 5.1, 5.2]{De3}, (\ref{e:indfun}) gives rise to an isomorphism of Frobenius algebras
\beq\label{e:indefun}
\indg: \T_{e'}\Fun([G'],F)\rar{\cong} \T_e\FunG,
\eeq
where $\T_{e'}\in \Fun([G'],F)$ and $\T_e\in \FunG$ are the corresponding idempotents.
Combining this with (\ref{e:indirrepe}) and Corollary \ref{c:irrepe}, we obtain
\bprop
(i) The equivalence (\ref{e:indirrepe}) induces a bijection $\indg:\Irrep_{e'}(G',F)\rar\cong \Irrep_e(G,F)$.\\
(ii) For a $W\in \Irrep(G,F)$, the following are equivalent:
\bit
\item[(a)] $W$ lies in $\Irrepe$.
\item[(b)] $\chi_W$ lies in $\T_e\FunG$.
\item[(c)] $W_{\h{loc}}$ lies in $e\D_G(GF)$.
\eit
(iii) The set $\{\chi_W|W\in \Irrepe\}$ is an orthonormal basis of $\T_e\FunG$.
\eprop
Also using (\ref{e:indedgp}) we have an equivalence between the theory of character sheaves in $e'\DGp$ and $e\DG$ compatible with the Frobenius actions.
Now suppose that $f\in \lL_e(G)^F$ is an $F$-stable indecomposable minimal quasi-idempotent in $e\DG$. As in the Heisenberg case, we define the $\lL$-packet of irreducible representations associated with $f$ as the set
\beq\label{e:deflpirrepe}
\Irrep_f(G,F)=\Irrep_{e,f}(G,F):=\{W\in \Irrep(G,F)|W_{\loc}\in {}^f\D_G(GF)={}^f\D_G(GF)^\Delta\}\subset \Irrepe.
\eeq
By Proposition \ref{p:lpdec} and the results above we have
\beq\label{e:irrepedec}
\Irrepe=\coprod\limits_{f\in \lL_e(G)^F}\Irrep_{e,f}(G,F).
\eeq
By (\ref{e:indedgp}), let $f'$ be the corresponding minimal quasi-idempotent in $e'\DGp$. In this setting we have:
\bprop
The equivalence (\ref{e:indirrepe}) induces an equivalence $\indg:{}^{f'}\D_{G'}(G'F)\rar\cong {}^f\D_G(GF)$ and hence Proposition \ref{p:tstrmodcat} holds for every $e\in \hG^F_{\h{adm}}$. In particular ${}^f\D_G(GF)$ has a distinguished $t$-structure (namely, the perverse $t$-structure shifted by $n_e+\tau_e$, cf. Definition \ref{d:miniinv}) with heart, denoted by $\M_{GF,f}$, which is an invertible $\M_{G,f}$-module category (under truncated convolution) equipped with a natural $\M_{G,f}$-module trace. This invertible modular category corresponds to the modular auto-equivalence $F:={F^*}^{-1}:\M_{G,f}\rar\cong \M_{G,f}$. The map
\beq
W\mapsto M_W:=W_{\loc}[\dim G+n_e+\tau_e]\in \M_{GF,f}
\eeq
defines a bijection between the sets $\Irrep_f(G,F)$ and $\O_{\M_{GF,f}}$. Let $\t\T_f:=\indg \t\T_{f'}\in \T_e\FunG$, where $\t\T_{f'}\in \T_{e'}\Fun([G'],F)$ is the idempotent function associated with the quasi-idempotent $f'\in \lL_{e'}(G')^F$ (cf. Remark \ref{r:trf}). Let $W\in \Irrep(G,F)$. Then $W\in \Irrep_f(G,F)$ if and only if $\chi_W\in \t\T_f\FunG$. The set $\{\chi_W|W\in \Irrep_f(G,F)\}$ is an orthonormal basis of the Frobenius algebra $\t\T_f\FunG$.
\eprop
\bpf
The proposition is straightforward using the equivalences (\ref{e:indedgp}) and (\ref{e:indirrepe}). One only needs to observe that the equivalence (\ref{e:indirrepe}) takes local systems in $e'\D_{G'}(G'F)$ to local systems in $e\D_G(GF)$ and then use Definition \ref{d:miniinv}.
\epf
In the setting of the proposition, we have equivalences
\beq
\indg: \M_{G',f'}\rar\cong \M_{G,f} \hbox{ and } \indg: \M_{G'F,f'}\rar\cong \M_{GF,f}
\eeq
of modular categories and their module categories respectively. The induction functor takes the positive trace $\tr_{G',F,f'}^+$ in $\M_{G'F,f'}$ to the positive trace $\tr_{G,F,f}^+$ in $\M_{GF,f}$. Moreover, it is easy to check that for any endomorphism $\alpha\in \D_{G'}(G'F)$ we have $\tr_{G,F}(\indg \alpha)=\tr_{G',F}(\alpha)$ for the natural traces in $\D_{G'}(G'F)$ and $\D_G(GF)$.
Our next goal is to study the relationship between the sets $\CS_f(G)^F$ and $\Irrep_f(G,F)$. As in the Heisenberg case, for each $C\in \CS_f(G)^F$ let us choose $\psi_C:F^*C\rar\cong C$ so as to satisfy $\bigstar$ from \S\ref{s:rbiccs} and let $\t{S}(F,f)$ denote the transition matrix, i.e. the matrix with entries
\beq
\t{S}(F,f)_{C,W}:=\<\T_{C,\psi_C},\chi_{W}\>=\<\T_{C,\psi_C},(-1)^{2d_e}\chi_{M_W}\>=(-1)^{2d_e}\tr_F(\g_{C,\psi_C,M_W})
\eeq
for $C\in \CS_f(G)^F$ and $W\in \Irrep_f(G,F)$. On the other hand, let $S^+(F,f)$ denote the crossed S-matrix associated with the $\M_{G,f}$-module category $\M_{GF,f}$ equipped with the positive module trace. Using the results of this section, in particular (\ref{e:indefun}) along with Theorem \ref{t:relheis} we can now prove
\bthm\label{t:maingen}
(i) We have $\t{S}(F,f)=\frac{q^{d_e}}{q^{\dim G}\cdot \sqrt{\dim \M_{G,f}}}\cdot S^+(F,f)$.\\
(ii) Let $W'\in \Irrep_{f'}(G',F)$ be an irreducible representation of the pure inner form ${G'}^{g'F}$ for some $\<g'\>\in H^1(G',F)$. Then $W:=\ind_{{G'}^{g'F}}^{G^{g'F}} W'\in \Irrep_f(G,F)$ and we have
\beq
\dim W=\frac{\dim^+M_W}{\sqrt{\dim \M_{G,f}}}\cdot\frac{|T^{g'F}|}{|{T'}^{g'F}|}\cdot|\Pi_0^{g'F}|\cdot q^{d_e+\tau_e-\dim T},
\eeq
where $T$ denotes the torus $G^\circ/\R_u(G)$. Moreover each $W\in \Irrep_f(G,F)$ can be obtained from a unique $W'\in \Irrep_{f'}(G',F)$ by induction.
\ethm
\bpf
The result follows from the preceding remarks using the fact that $d_{G,e}=d_{G',e'}+\dim G -\dim G'$.
\epf
\subsection{Shintani descent in the general case}\label{s:sdgc}
In this section, we will prove results related to Shintani descent in the general case. Suppose that $e\in \hG^F_{\h{adm}}$. We continue to use all notation as before. In particular, let us assume that $e$ comes from an $F$-stable (by replacing $F$ by a pure inner form if necessary) admissible pair $(H,\N)$ for $G$ with normalizer $G'$. As before, let $\T_e\in \FunG$ denote the associated idempotent.
We have already studied Shintani descent in the Heisenberg case in \S\ref{s:sdthc}. Moreover, we have seen in \S\ref{s:grpag} that we can reduce the study of the general case to the Heisenberg case for the subgroup $G'$ using the induction functor $\indg$.
Hence we obtain the following result in general:
\bthm\label{t:sdgc}
Let $e\in \hG^F_{\h{adm}}$ as above and let $m$ be a positive integer. Let us continue to use all notations and conventions as above. Then\\
(i) We have an $\lL$-packet decomposition
\beq
\Irrep_e(G,F^m)^F=\coprod\limits_{f\in \lL_e(G)^F}\Irrep_f(G,F^m)^F.
\eeq
(ii) The $m$-th Shintani descent $\Sh_m:\Irrep(G,F^m)^F\hookrightarrow \FunG$ respects $\lL$-packet and idempotent decompositions, namely $\Sh_m(\Irrep_e(G,F^m)^F)\subset \T_e\FunG$ with the image being an orthonormal basis and for each $f\in \lL_e(G)^F$, $\Sh_m(\Irrep_f(G,F^m)^F)\subset \t\T_f\FunG$ with the image again being an orthonormal basis. \\
(iii) For $f\in\lL_e(G)^F$, let $\t{\Sh}_m(F,f)$ denote the transition matrix relating the $m$-th Shintani basis of $\t\T_f\FunG$ as described above and the basis $\Irrep_f(G,F)$ (see also (\ref{e:deftsh})). Let $\Sh^+_m(F,f)$ be the $m$-th Shintani matrix associated with the modular category $\M_{G,f}$ and the module category $\M_{GF,f}$ equipped with the positive module trace. Then
\beq
\t{\Sh}_m(F,f)=\frac{(-1)^{2d_e}}{\sqrt{\dim \M_{G,f}}}{\Sh}^+_m(F,f).
\eeq
(iv) There exists a positive integer $m_0$ such that for each $f\in \lL_e(G)^F$ and each positive integer $m$, the $m$-th Shintani basis of $\t\T_f\FunG$ only depends (up to scaling by roots of unity) on the residue class of $m$ modulo $m_0$.\\
(v) Let $m$ be a positive multiple of $m_0$. Then the $m$-th Shintani basis of $\T_e\FunG$ agrees with the basis $\left\{\frac{q^{\dim G}}{q^{d_e}}\cdot \T_{C,\psi_C}|C\in \CS_e(G)^F\right\}$ up to scaling by roots of unity.
\ethm
\brk
Let us recall that we have the twist $\theta^{F^m}$ in the category $\D_G(GF^m)$. On the other hand for each $f\in \lL_e(G)^F$ we also have the twist $\theta^{F^m,f,+}$ in $\M_{GF^m,f}$ corresponding to the positive module trace. On restricting to $\M_{GF^m,f}\subset \D_G(GF^m)$ we have (cf. Lemmas \ref{l:cfe}, \ref{l:trnu})
\beq
\theta^{F^m,f,+}=\frac{q^{md_e}}{q^{m\dim G}}\cdot \theta^{F^m}.
\eeq
\erk
\subsection{Conclusion}\label{s:c}
Finally in this section we complete the proof of all our main results in the general case. We have seen that the $\lL$-packets of character sheaves are parametrized by the set $\lL(G)$ of minimal indecomposable quasi-idempotents in $\DG$. We will now show that the $\lL$-packets of $\Irrep(G,F)$ are parametrized by the set $\lL(G)^F$.
\bthm\label{t:fstap}
Let $f\in \lL(G)^F$ and let $e\in \hG$ be the minimal idempotent (cf. Proposition \ref{p:lleg}) such that $f\in \lL_e(G)$. Then $e\in \hG^F_{\h{adm}}$ and hence the $\f{L}$-packet $\Irrep_{e,f}(G,F)$ is non-empty. We have the $\lL$-packet decomposition
\beq
\Irrep(G,F)=\coprod\limits_{f\in \lL(G)^F}\Irrep_f(G,F).
\eeq
\ethm
\bpf
Since $f$ is $F$-stable, it is clear that $e\in \hG^F$. Hence we must prove that $e$ in fact can be obtained from an $F$-stable conjugacy class of admissible pairs for $G$. By \cite{De2} we know that $e$ must come from some admissible pair $(H,\N)$ defined over $\Fqcl$. This pair must be defined over some finite field $\F_{q^m}$. Hence $e\in \hG^{F^m}_{\h{adm}}$. In particular we have the $\lL$-packet $\Irrep_{e,f}(G,F^m)$ and the bijection $\Irrep_{e,f}(G,F^m)\cong \O_{\M_{GF^m,f}}$. Since $f$ is $F$-stable, we have an action of $F$ on the $\lL$-packet $\Irrep_{e,f}(G,F^m)$. This action agrees with the action of $F$ on $\O_{\M_{GF^m,f}}$ under the above bijection. We also have a modular action of $F$ on the modular category $\M_{G,f}$ and the $\M_{G,f}$-module category $\M_{GF^m,f}$ corresponds to the action of $F^m$. Hence by \cite[Corollary 3.10]{De5} (used for $a=0$ and $a=m$) implies that $|\O_{\M_{GF^m,f}}^F|=|\O_{\M_{G,f}}^F|$. Hence we see that $\Irrep_{e,f}(G,F^m)^F$ is non-empty. By Corollary \ref{c:irreppart} we have an orthonormal decomposition
\beq
\FunG=\bigoplus\limits_{e'\in \hG^F_{\h{adm}}}\T_{e'}\FunG.
\eeq
Now using the fact that $\Sh_m(\Irrep(G,F^m)^F)\subset \FunG$ is a basis and Theorem \ref{t:sdgc}(ii), we see that $e$ must necessarily lie in $\hG^F_{\h{adm}}$. Once we know this, using Corollary \ref{c:irreppart} and (\ref{e:irrepedec}) we obtain the desired $\lL$-packet decomposition.
\epf
Once we have this last result, we can use our previous results about $\hG^F_{\h{adm}}$ to study all $\lL$-packets. Thus in view of Theorems \ref{t:maingen}, \ref{t:sdgc} the proofs of our main results (Theorems \ref{t:main2}, \ref{t:main3}) are now complete.
\subsection{An example}\label{s:example}
Let us workout the character sheaves and characters in an example, namely let $B=\left\{\left( \begin{smallmatrix} t_1 & a & c \\ 0 & t_2 & b\\ 0 & 0 & t_3\end{smallmatrix} \right): t_1t_2t_3=1 \right\}$ be the Borel subgroup of $SL_3(\k)$.
Let $T$ be the diagonal maximal torus of $B$. Let us consider certain 1-parameter subgroups of $T$. Let $T_{12}=\left\{\left( \begin{smallmatrix} t & 0 & 0 \\ 0 & t & 0\\ 0 & 0 & t^{-2}\end{smallmatrix}\right)\right\}, T_{23}=\left\{\left( \begin{smallmatrix} t^{-2} & 0 & 0 \\ 0 & t & 0\\ 0 & 0 & t\end{smallmatrix}\right)\right\}$ and $T_{13}=\left\{\left( \begin{smallmatrix} t & 0 & 0 \\ 0 & t^{-2} & 0\\ 0 & 0 & t\end{smallmatrix}\right)\right\}$. Also, let $\mu_3=\left\{\left( \begin{smallmatrix} \omega & 0 & 0 \\ 0 & \omega & 0\\ 0 & 0 & \omega\end{smallmatrix}\right):\omega^3=1 \right\}\subset T$.
The unipotent radical of $B$ is $U:=\left\{\left( \begin{smallmatrix} 1 & a & c \\ 0 & 1 & b\\ 0 & 0 & 1\end{smallmatrix}\right)\right\}$. The center (as well as commutator subgroup) of $U$ is $Z:=\left\{\left( \begin{smallmatrix} 1 & 0 & c \\ 0 & 1 & 0\\ 0 & 0 & 1\end{smallmatrix}\right)\right\}$. Let $V=U/Z =U^{ab} \cong\f{G}_a^2$. Let us fix a non-trivial character $\psi:\Z/p\Z\hookrightarrow \Qlcl^\times$ and hence we obtain the Artin-Schreier local system $\L$ on $\f{G}_a$. We can then identify the Serre dual of $V$ (which parametrizes multiplicative local systems on $V$) with the `linear dual' $V^*$ via pullback of the Artin-Schreier local system along linear functionals. Hence given a row vector $(x,y)\in V^*$, we have the corresponding multiplicative local system $\L_{(x,y)}$ on $V$. We have a canonical identification of Serre duals $U^*\cong V^*$ and by a slight abuse of notation, we will also consider $\L_{(x,y)}$ as a multiplicative local system on $U$ via the homomorphism $U\onto V$.
Then we have 5 minimal idempotents in $\D_B(B)$ corresponding to the following admissible pairs:
\begin{enumerate}
\item The Heisenberg admissible pair $(U,\Qlcl)$ normalized by all of $B$.
\item The admissible pair $(U,\L_{(1,0)})$ with normalizer $T_{12}U$.
\item The admissible pair $(U,\L_{(0,1)})$ with normalizer $T_{23}U$.
\item The admissible pair $(U,\L_{(1,1)})$ with normalizer $\mu_3U$.
\item The admissible pair $(Z,\L)$ with normalizer $T_{13}U$.
\end{enumerate}
\brk
If $\L'$ is any multiplicative local system on $U$, then $(U,\L')$ is an admissible pair for $B$. However, the associated minimal idempotent only depends on the $T$-orbit of $\L'\in V^*\cong U^*$ and hence is covered by one of the first four cases. Similarly, for any non-trivial $\L'\in Z^*$, $(Z,\L')$ is an admissible pair which gives rise to the same minimal idempotent as case 5 above.
\erk
Of the five minimal idempotents in $\D_B(B)$, the cases $4$ and $5$ are more interesting and we will analyse them further. The analysis of the first three cases is simpler.
{\it The admissible pair $(U,\L_{(1,1)})$}: Suppose first that $\h{char} \k \neq 3$. The normalizer $\mu_3U\cong \mu_3\times U$ of this pair is a neutrally unipotent group. The object $e'_{(1,1)}:=\L_{(1,1)}[6](3)$ is a minimal idempotent in $\D_{\mu_3U}(\mu_3U)$ and $e_{(1,1)}:=\ind_{\muU}^B e'_{(1,1)}$ is the minimal idempotent in $\D_B(B)$ corresponding to this admissible pair.
The category $e'_{(1,1)}\D_{\mu_3U}(\mu_3U)$ is equivalent to $D^b((\Vec_{\mu_3})^{\mu_3})$ where $(\Vec_{\mu_3})^{\mu_3}$ is the Drinfeld double of $\mu_3$. By Appendix \ref{s:qidcfc}, $e'_{(1,1)}$ is the unique minimal indecomposable quasi-idempotent in $e'_{(1,1)}\Dmu$. So in this case we have a unique $\f{L}$-packet of character sheaves in $e'_{(1,1)}\Dmu$ and it has 9 character sheaves. The underlying objects of $\D(\muU)$ for these 9 character sheaves are: the object $e'_{(1,1)}=\L_{(1,1)}[6](3)$ supported on $U$ and its two translates supported on the other connected components $\omega U, \omega^2 U$ of $\muU$. The 9 character sheaves come from the 3 different $\mu_3$-equivariance structures on each of the above 3 sheaves.
Finally we induce to $e_{(1,1)}\D_B(B)$ and obtain analogous results here. The modular category $\M_{B,e_{(1,1)}}$ is equivalent to the Drinfeld double $(\Vec_{\mu_3})^{\mu_3}$. There are 9 character sheaves in this $\f{L}$-packet.
Now let $\Fq$ be a finite field and let $\k=\Fqcl$. Let us consider the finite group $B(\Fq)$. Let $F:B\to B$ be the Frobenius endomorphism. The admissible pair $(U,\L_{(1,1)})$ can also be defined over $\Fq$ and it is clear that the minimal quasi-idempotent $e_{(1,1)}\in \D_B(B)$ is $F$-stable. The modular autoequivalence of $\M_{B,e_{(1,1)}}\cong (\Vec_{\mu_3})^{\mu_3}$, $F:\M_{B,e_{(1,1)}}\rar{}\M_{B,e_{(1,1)}}$ is induced by the Frobenius $F:\mu_3\rar{}\mu_3$.
This leads to two cases:\\
{\it (i) $\Fq$ does not contain the cuberoots of unity:} In this case $F$ interchanges the cuberoots $\omega$ and $\omega^2$ and it can be checked that the unit object $e_{(1,1)}\in \M_{B,e_{(1,1)}}\cong (\Vec_{\mu_3})^{\mu_3}$ is the only $F$-stable character sheaf in the $\f{L}$-packet. Hence there is a unique irreducible representation of $B(\Fq)$ lying in the corresponding $\f{L}$-packet $\Irrep_{e_{(1,1)}}(B(\Fq))$. This is the $(q-1)^2$-dimensional irreducible representation of $B(\Fq)$ obtained by inducing the `generic' character of $U(\Fq)$ corresponding to the $F$-stable multiplicative local system $\L_{(1,1)}$ on $U$.
{\it (ii) $\Fq$ contains the cuberoots of unity:} In this case $F$ acts as the identity on $\mu_3$ and hence all the 9 character sheaves in $\M_{B,e_{(1,1)}}$ are $F$-stable. In this case the $\f{L}$-packet $\Irrep_{e_{(1,1)}}(B(\Fq))$ consists of nine $\frac{(q-1)^2}{3}$-dimensional irreducible representations of $B(\Fq)$. In this case, the action of $T(\Fq)$ on the set of 1-dimensional characters of $U(\Fq)$ has three `generic orbits'. The induction to $B(\Fq)$ of each generic character of $U(\Fq)$ breaks into three irreducible representations. This gives the nine irreducible characters in this $\f{L}$-packet.
Finally, let us also consider the case $\h{char} \k =3$. In fact in this case things are simpler and we have $\M_{B,e_{(1,1)}}\cong \Vec$ and there is a unique character sheaf as well as a unique irreducible representation of $B(\Fq)$ in the corresponding $\f{L}$-packet. This completes the analysis of the admissible pair $(U,\L_{(1,1)})$.
{\it The admissible pair $(Z,\L)$}: The normalizer of this admissible pair is $T_{13}U$. Let $e'=\L[2](1)$ be the corresponding minimal idempotent in $\D_{T_{13}U}(T_{13}U)$ and $e=\ind_{T_{13}U}^B e'$ the associated minimal idempotent in $\D_B(B)$.
Consider $U\supset H=\left\{\left( \begin{smallmatrix} 1 & a & c \\ 0 & 1 & 0\\ 0 & 0 & 1\end{smallmatrix}\right)\right\}\supset Z$. Let $\L'$ be the multiplicative local system on $H$ obtained by pulling back $\L$ along the evident projection $H\onto Z$. Then $\L'$ is a $T_{13}$-stable extension of $\L$ from $Z$ to $H$. Then by \cite[\S8.4]{De2} $(H,\L')$ is a {\it central} admissible pair for $B$ giving rise to the same minimal idempotent $e\in \D_B(B)$. The normalizer of the pair $(H,\L')$ is $T_{13}H$. Let $e'':=\L'[4](2)$ be the associated minimal idempotent in $\D_{T_{13}H}(T_{13}H)$. We have an identification $e''\D_{T_{13}H}(T_{13}H)\cong e''\D_{H}(H)\boxtimes \D_{T_{13}}(T_{13})\cong \D_{T_{13}}(T_{13})$ since $e''\D_H(H)\cong D^b\Vec$.
Hence in this case, for each multiplicative local system $\K\in \C(T_{13})$ on the torus $T_{13}$, we obtain the corresponding minimal quasi-idempotent $e_\K\in \D_{T_{13}}(T_{13})$ and consequently the minimal quasi-idempotent $e''\boxtimes e_\K\in e''\D_{HT_{13}}(HT_{13})$. In other words, the set $\f{L}_{e''}(HT_{13})$ of $\f{L}$-packets of character sheaves in $e''\D_{HT_{13}}(HT_{13})$ can be identified with $\C(T_{13})$. Each such $\f{L}$-packet contains a unique character sheaf, namely the sheaf $e''\boxtimes e_\K$. The modular category associated with each $\f{L}$-packet is simply $\Vec$.
Consequently, character sheaves (which coincide with indecomposable minimal quasi-idempotents in this case) in $e\D_B(B)$ are in bijection with $\C(T_{13})$. Namely, given $\K\in \C(T_{13})$, $\ind_{HT_{13}}^B (e''\boxtimes e_\K)$ is the corresponding character sheaf in $e\D_B(B)$.
Now suppose $\Fq$ is a finite field, $\k=\Fqcl$ and $F:B\to B$ the Frobenius. We want to classify the corresponding irreducible characters of $B(\Fq)$. In this case, the admissible pair $(H,\L')$ and the subgroup $T_{13}$ is defined over $\Fq$. Hence the $F$-stable character sheaves $C$ in $e\D_B(B)$ correspond to $\C(T_{13})^F$ which in turn are in bijection with characters $\chi$ of $T_{13}(\Fq)$. Given an $F$-stable character sheaf $C$ as above, we have the corresponding irreducible representation of $B(\Fq)$ constructed as follows: Let $\chi:T_{13}(\Fq)\to \Qlcl^\times$ be the character corresponding to $C$ as above and let $\psi_{\L'}:H(\Fq)\to \Qlcl^\times$ be the character corresponding to the $F$-stable multiplicative local system $\L'$ on $H$. Then the irreducible representation corresponding to $C$ is $\ind_{HT_{13}(\Fq)}^{B(\Fq)}\psi_{\L'}\chi$. It is $q(q-1)$-dimensional. Thus we see that $\Irrep_e(B(\Fq))$ contains $q-1$ $q(q-1)$-dimensional irreducible representations and each $\f{L}$-packet in $\Irrep_e(B(\Fq))$ is singleton.
|
\section{Introduction}
The main source of information about the accelerated electrons produced during solar flares is observation of their hard X-ray (HXR) emission \cite{Kontar2011}. HXR bremsstrahlung emission is generated by nonthermal electrons with approximately power-law distribution interacting with protons of ambient solar plasma. Using some analytical models \cite{Brown1971,Syrovatskii1972} one can extract information about the flux of the accelerated electrons and their power-law spectral index. Applying more sophisticated inversion technique of the X-ray spectrum \cite{Piana2007,Kontar2008} one can obtain spectra of the electron population numerically and without any ad-hoc assumptions about the spectral shape.
Another way to learn something about accelerated electrons is to study their radio emission \cite{Pick2008}. Basically, there are two types of radio emission associated with nonthermal electrons: coherent and incoherent. These two types correspond to different frequency ranges (slightly overlapping) and physical mechanisms. Coherent radio emission (e.g., type III bursts) up to $\sim 5$~GHz is produced by plasma waves (electron-cyclotron or Langmuir waves) excited by wave-particle interaction. Incoherent microwave emission ($\gtrsim 1$~GHz) is associated with gyrosynchrotron radiation of individual nonthermal electrons gyrating around magnetic field lines. In this paper we consider only the incoherent microwave emission of nonthermal electrons; this type of emission provides us with information about kinetics of nonthermal electrons in the coronal flaring loops as well as about the magnetic field strength and topology there. On the other hand, coherent emission is usually associated with electron beams passed through the corona and its study is more suitable for coronal plasma diagnostics.
Intensity of the HXR bremsstrahlung emission mostly depends on plasma density and nonthermal electron flux. Microwave radio emission brightness temperature and polarization degree also strongly depend on the nonthermal electrons pitch-angle distribution, magnetic field strength and its orientation relatively to the line-of-sight (LOS). Moreover, radio emission is not entirely optically thin. We should take into account radiative transfer to calculate the escaping flux of the microwave emission and its polarization. Direct computation of the gyrosynchrotron radio emissivity and absorbtion coefficient involves time-consuming numerical integration for all cyclotron harmonics \cite{Melrose1968,Ramaty1969}. However, there are some ways to simplify calculations. The simplest way to estimate parameters of nonthermal electrons with power-law distribution is to apply the formulae from the work of \opencite{Dulk1985} to observed gyrosynchrotron spectrum. This analytical approximation assumes uniform plasma density and magnetic field strength and isotropic pitch-angle distribution of nonthermal electrons and is valid only in the limited range of cyclotron harmonics and viewing angles relative to magnetic field. \opencite{Fleishman2010} introduced fast gyrosynchrotron codes, where the authors use some analytical approaches and numerical methods to evaluate the microwave radio spectra with high speed and good accuracy for different energy and pitch-angle distributions.
In reality, both the nonthermal electrons and thermal plasma fill the curved magnetic loops nonuniformly and, therefore, we need detailed three-dimensional modelling of microwave emission. The IDL-based widget tool {\it GX Simulator} \cite{Nita2015} allows us to do such 3D simulations. Using this interactive tool, one can import any magnetic field model and reconstruct magnetic flaring loop. Then we can define the spatial, pitch-angle and energetic distribution of the nonthermal electrons inside the magnetic loop. Numerical integration of the radiation transfer equation allows us to obtain the resulting radio brightness and polarization maps.
In the standard model of an eruptive two-ribbon flare \cite{Hirayama1974,Magara1996,Tsuneta1997} quasipotential magnetic loops are formed due to magnetic reconnection in the cusp under erupting plasmoid. These magnetic loops are filled with nonthermal electrons and we observe loop-like SXR sources connecting double HXR sources, which correspond to the loop footpoints. HXR observations made by RHESSI, Reuven Ramaty High Energy Solar Spectroscopic Imager \cite{Lin2002}, reveal a lot of loop-like HXR emission sources \cite{Battaglia2005,Jiang2006,Guo2012}. Nobeyama radioheliograph, NoRH \cite{Nakajima1995} observations also show us loop structures in the microwave range \cite{Kupriyanova2010,Morgachev2014}. Loop geometry of X-ray and microwave emission sources seems to be the usual observational manifestation of the flare energy release. The best way to understand the basic peculiarities of the radio brightness and polarization distribution along magnetic loop filled with nonthermal electrons is to consider potential magnetic field, as it possesses the simplest topology, describing flare loops. The work of \opencite{Kuznetsov2011} presents analysis of microwave emission from magnetic loops filled with nonthermal electrons. The authors discuss the effects of anisotropy and nonuniform distribution of nonthermal electrons along the loop. It was found that the effect of the electron anisotropy is the most pronounced near the footpoints and it also depends strongly on the loop orientation. Concentration of the emitting particles at the looptop results in a corresponding spatial shift of the radio brightness peak, thus reducing effects of the anisotropy. At frequencies around $10-20$ GHz, the spectrum is strongly dependent on the electron anisotropy, spatial distribution, and magnetic field nonuniformity.
Classical two-dimensional model of magnetic reconnection assume interaction of the opposite-polarity magnetic flux tubes at a null-point. But magnetic reconnection can occur in a magnetic configuration without null points as well. For example, twisted magnetic field flux ropes can experience internal magnetic reconnection \cite{Demoulin1996,Gordovskyy2011,Pinto2015}. In such case accelerated particles will be directly accelerated and injected into the loop volume \cite{Gordovskyy2011,Gordovskyy2012,Gordovskyy2013,Gordovskyy2014}. We know that orientation of the magnetic field in the flare region affects the spatial distribution of brightness and polarization of the microwave radio emission. Thus, one could suppose that twisted magnetic loop filled with nonthermal electrons will produce microwave emission with a peculiar (compared with potential loops) spatial distribution of brightness and polarization. These peculiarities probably depend on the twist degree. The main scope of this paper is to model the gyrosynchrotron radio emission from the twisted magnetic loop and understand influence of the twist degree on the spatial structure of the radio emission sources. We will investigate radio emission of nonthermal electrons with different pitch-angle distributions (isotropic and anisotropic) and also consider central and limb locations of the twisted magnetic loop. Any found peculiarities could provide us with a new tool of diagnostics of magnetic field topology in the region where nonthermal electrons propagate.
{\bf In this paper, we focus on theoretical aspects and numerical simulations; observational examples of (possibly) twisted magnetic loops have been omitted for clarity. The model magnetic configuration is described in Section \ref{loopmodels}. The radio simulations using {\it GX Simulator} are presented in Section \ref{gxmodel}. The results are discussed and conclusions are formulated in Section \ref{conclusion}.}
\section{Model of a twisted magnetic loop}\label{loopmodels}
To simulate twisted magnetic loop, we chose the analytical model of \opencite{Titov1999} developed to describe basic topology of the sheared twisted magnetic field in the active regions. The magnetic field is modelled by superposition of two opposite magnetic charges $q$, line current $I_0$ (connecting two charges and directed from positive to negative one) submerged under the photosphere, and a circular current $I$ in the plane perpendicular to the line current, which is an axis of the circle. Besides, circular current $I$ is distributed over some circular area $\pi a^2$, where $a$ is radius of the cross section of the tube. Thus, we actually consider current-carrying torus, which has coronal part corresponding to the loop. Finally, the value of the current $I$ is determined from the force balance condition. In the case of the thin current tube the magnetic configuration is very close to the force-free conditions, and that is why this model is often used as a test for non-linear force-free extrapolation algorithms \cite{Valori2010,Jiang2015}.
For our calculation we use the following values (very close to those used in the original work): $q=100$ T Mm$^{-2}$, $I_0=-7\times 10^{12}$ A, distance between the magnetic charges $L=100$ Mm, radius of the circular current $R=70$ Mm, and the depth of the line current $d=50$ Mm. The value of $a$ is determined by the twist number $N_t$, which corresponds to the number of the turns of the magnetic field line around torus. This parameter is of order of several units. We use the following formula \cite{Titov1999} to calculate $a$:
\begin{equation}
a = R\sqrt{N_t\frac{I_0}{I}}.
\end{equation}
Number of turns of the magnetic field lines around coronal part of the flux tube $N_c$ is given by
\begin{equation}
N_c = \frac{N_t}{\pi}\arccos\left(\frac{d}{R}\right).
\end{equation}
\begin{figure}
\centering
\includegraphics[width=1.0\linewidth]{fig1.eps}
\caption{The left and right columns correspond to the moderate and high twist cases accordingly. The top panels show top views of the synthetic photospheric magnetograms and reconstructed magnetic field lines. The bottom panels show stereoscopic views of the topology of the magnetic field lines.}
\label{TD_lines}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=0.5\linewidth]{fig2.eps}
\caption{Two variants of magnetic loops with different twist degrees calculated in {\it GX Simulator} and used for simulations in this paper.}
\label{TD_loops}
\end{figure}
In most calculations, we consider the cases of a moderate twist ($N_c\approx 1.2$, $N_t=5$) and a high twist ($N_c\approx 3.7$, $N_t=15$). For these values of $N_t$ the electric current density in the twisted magnetic loop is $j=I/(\pi a^2)\approx 2.5$ mA m$^{-2}$ for the moderate-twist case ($a\approx$~30~Mm) and $\approx 10$ mA m$^{-2}$ in the high-twist case ($a\approx$~15~Mm). After all calculations we rescaled the simulation box (to 40\% of its initial size) with preserving proportions and twist degree in order to obtain reasonable length of the loop of $\sim 20$~Mm which should be in accordance with typical observations. Top view of the synthetic photospheric magnetogram and reconstructed magnetic field lines for the above-mentioned twist numbers is shown in the top panels of Figure \ref{TD_lines}. Stereoscopic view of the magnetic field configuration is also presented in bottom panel of Figure \ref{TD_lines}. One can see that twisted magnetic configuration is surrounded by quasipotential sheared shell. We are interested only in the twisted magnetic field lines, so we will construct the radio-emitting magnetic loops only in the core of that region. Using the {\it GX Simulator} magnetic tube selection tool we defined approximately symmetric twisted magnetic loops, which are shown in Figure \ref{TD_loops}. One should note that the magnetic field strength does not varies much along the loop; we have $B\approx 630$ G in the loop with moderate twist and $B\approx 890$ G in the highly-twisted loop. Thus distribution of the polarization and brightness of radio emission along the loop will be only affected by the topological peculiarities of the twisted magnetic field.
\section{Modelling of the nonthermal microwave emission from the twisted magnetic loops}\label{gxmodel}
\subsection{Parameters of the energetic electrons}
Nonthermal electrons are distributed along the loop uniformly with the number density of $10^8$~cm$^{-3}$. Their energetic spectrum is a power-law with the index of $\delta=3$, the low-energy cutoff $E_{\mathrm{low}}=10$ keV and the high-energy cutoff of $E_{\mathrm{high}}=10$ MeV. The background thermal plasma in the loop has the density of $n=5\times 10^9$~cm$^{-3}$ and the temperature of $T=20$ MK. We consider both the isotropic and anisotropic pitch-angle distributions of the nonthermal electrons. The anisotropic distribution has the Gaussian form:
\begin{equation}
g(\mu) = A\exp\left[-\frac{(\mu-\mu_0)^2}{\Delta\mu^2}\right],
\end{equation}
where $\mu_0=\cos\alpha_0$ characterizes the beam direction relatively to the magnetic field, $\Delta\mu$ is the width of the angular distribution, and $A$ is the normalization factor. We consider two types of anisotropy:
1) a pancake-like (or a symmetric loss-cone) distribution with $\mu_0=0$, which means mostly transversal propagation of the nonthermal electrons;
2) a beam-like distribution with $\mu_0=1$, when the nonthermal electrons propagate mostly along the magnetic field (the upward direction on the synthetic magnetograms in bottom panels of Figure \ref{TD_lines}).
Unless otherwise specified, we adopt the value of $\Delta\mu=0.15$ for both types of anisotropic distributions, which corresponds to a rather strong anisotropy.
To calculate the radio brightness maps, we use the fast gyrosynchrotron codes with radiation transfer \cite{Fleishman2010,Kuznetsov2011,Nita2015} implemented in the {\it GX Simulator}. To take into account the loop orientation relatively to the line-of-sight, we consider loop positions at the solar disk center and on the limb.
\begin{figure}
\centering
\includegraphics[width=0.7\linewidth]{fig3.eps}
\caption{The total (spatially integrated) spectra of the microwave gyrosynchrotron emission from the nonthermal electrons in the twisted magnetic loop. Top and bottom rows correspond to the cases of high and moderate twist of the loop (see Section \protect\ref{loopmodels}), respectively. Left and right columns show the spectra for the central and limb positions of the twisted loop. Spectra are calculated for the isotropic nonthermal electron distribution (thick line), anisotropic pancake-like distribution (thin line) and anisotropic beam-like distribution (dashed line); the pitch-angle distribution width for anisotropic distributions is $\Delta\mu=0.15$.}
\label{GS_spec}
\end{figure}
\subsection{Magnetic twist and electron anisotropy: general effects}
In Figure \ref{GS_spec} we show simulated spectra of the total (spatially integrated) emission. For central position of the loop the difference between isotropic and pancake-like cases is small: we only have a slight shift of the spectral peak and a bit enhanced radio emission at high frequencies for the pancake-like distribution. When the loop is at the solar limb, the anisotropy effect is more pronounced: the shift of the spectral peak is larger and the high-frequency emission is a few times more intense for the pancake-like electron distribution. However, in real flares these effects are expected to be not very significant, since the time-varying nonuniform distribution of the plasma density, magnetic field and parameters of the nonthermal electrons inside the loop will wipe out the spectral peculiarities connected with the twist of the loop. The nonthermal electrons with beam-like distribution produce the weakest emission at high frequencies comparing with the pancake-like and isotropic distributions.
In Figure \ref{GS_spec} we also indicate three frequencies (marked by dotted vertical lines): 10, 17 and 34 GHz. These different frequencies were selected to calculate the Stokes $I$ and $V$ maps and to compare the optically thin (34~GHz) and thick (10~GHz) cases. Radio emission at 17~GHz corresponds to the intermediate case with the optical depth of $\tau\sim 1$. The frequencies of 17 and 34~GHz are also the working frequencies of the Nobeyama Radioheliograph.
\begin{figure}
\centering
\includegraphics[width=1.0\linewidth]{fig4.eps}
\caption{Simulated radio maps for the magnetic loop at the solar disk center, for different frequencies, and loop twist degrees. Top three panels correspond to the strong twist while the bottom ones show the case of moderate twist. The pitch angle distribution of the nonthermal electrons is isotropic. Blue-red images show Stokes V. Black thick contours correspond to Stokes $I$ (at 30 and 70\% levels).}
\label{center_isotrop}
\end{figure}
Simulated Stokes $I$ and $V$ maps at the disk center for the isotropic nonthermal electron distribution are shown in Figure \ref{center_isotrop} (moderate and high twist). The observed width of the loop is maximal for the optically thick case at the frequency of 10~GHz and decreases towards higher frequencies and lower optical depths. The main peculiarity of the simulated maps is that the inversion of the polarization sign occurs near the inclined line crossing the loop. The angle of the inclination does not much depend on the twist degree. This orientation of the polarization sign inversion line (PSIL) is natural for a twisted magnetic loop. In the case of potential loop without any twist the PSIL will be approximately (depending on a loop orientation) perpendicular to the line connecting loop footpoints \cite{Kuznetsov2011}. Change of the circular polarization sign is associated with the change of the electron gyromotion direction (from clockwise to counter clockwise and vice versa) in the picture plane. In the twisted loop the electrons attached to different magnetic lines experience change of the gyromotion direction relative to the observer in different places of the loop (at different distances from its apex); therefore we observe strong inclination of the PSIL relative to the axis of the twisted loop.
\begin{figure}
\centering
\includegraphics[width=1.0\linewidth]{fig5.eps}
\caption{Simulated radio maps for the magnetic loop at the solar disk center, for different frequencies, and loop twist degrees. Nonthermal electrons have the anisotropic pancake-like (top six images) and beam-like (bottom six images) pitch-angle distributions; $\Delta\mu=0.15$. Contours and color background have the same meanings as in Figure~\ref{center_isotrop}}
\label{center_anisotrop}
\end{figure}
Anisotopic nonthermal electrons with pancake-like pitch-angle distribution in the twisted loop produce microwave emission from a more compact source compared with the isotropic electrons (top six panels in Figure~\ref{center_anisotrop}). Like in the previous case, the PSIL is strongly inclined relative to the axis of the loop. Comparing with the isotropic case, the radio emission source itself is slightly inclined relative to the loop axis as well, but this effect can be negligible for different orientations of the loop relative to the observer. Another pronounced effect for the pancake-like distribution is a shrinkage of the radio emission source along the loop for lower twist: the radio emission source in the highly twisted loop is more elongated than in the case of the moderate twist. This effect is also connected with topology of the magnetic field. The gyrosynchrotron emission of the relativistic electron possesses strong directivity: it is collimated in the solid angle around the electron motion direction. The considered anisotropic nonthermal electron distribution in the loop with a moderate twist near the disk center produce emission mostly in the direction to the observer from the loop-top. In the highly twisted loop, gyrating electrons propagating along magnetic field lines have possibility to radiate radio emission effectively towards to the observer even from the footpoint region of the loop. However, a compact radio source can be formed also due to strong accumulation of the nonthermal electrons in the loop-top region (for example, due to the magnetic trapping), which is not considered in this work.
Polarization of the optically thin radio emission generated by nonthermal electrons with isotropic and pancake-like pitch-angle distributions corresponds to X-mode, while beam-like nonthermal electrons propagating along the magnetic field generate mostly O-mode radio waves \cite{Fleishman2003a,Kuznetsov2010}. In bottom six panels of Figure~\ref{center_anisotrop} we show Stokes $I$ and $V$ radio maps for the beam-like pitch-angle distribution. Direction of the beam coincides with the magnetic field direction, which is shown by an arrow in Figure \ref{center_anisotrop}. One can note that the PSIL intersects the footpoint region, where the radio emission is mostly localized. Radio emission source is more elongated in the case of the loop with higher twist degree, which is similar to the case of anisotropic pancake-like distribution. Thus a general property of the anisotropic nonthermal electrons distributions is shrinkage of the radio emission source in the magnetic loops with lower twist.
\begin{figure}
\centering
\includegraphics[width=1.0\linewidth]{fig6.eps}
\caption{Simulated radio maps for the magnetic loop on the solar limb with the moderate twist ($N_t=5$, top three images) and high twist ($N_t=15$, bottom three images). Nonthermal electrons have the anisotropic pancake-like pitch-angle distribution. The left, middle and right columns correspond to the frequencies of 10, 17 and 34 GHz, respectively. Blue-red images show the polarization (Stokes $V$) maps.}
\label{limb_pancake}
\end{figure}
Simulated radio maps for the limb position of the loop have similar qualitative peculiarities of emission source structure regardless of the twist degree and anisotropy of nonthermal electrons distribution. We show only one case for illustration in Figure \ref{limb_pancake} (circular polarization only), which corresponds to the anisotropic nonthermal electrons with pancake-like pitch-angle distribution. The PSIL divides the loop into two parts along its length and coincides with its axis. Distribution of the radio emission along the loop does not reveal any interesting features.
\begin{figure}
\centering
\includegraphics[width=1.0\linewidth]{fig7.eps}
\caption{The figure shows influence of nonthermal electrons anisotropy ($\Delta\mu$) on frequency ($f_{\max}$) of spectral maximum (panels A and B) and maximal intensity $I(f_{\max})$ (panels C and D). Cases of pancake-like (triangles) and beam-like (squares) anisotropy are considered. Panels A and C correspond to the central position of a loop on solar disk when other panels show the limb case. Red and blue colors mark high and moderate twist of a loop.}
\label{anisop_spec1}
\end{figure}
\subsection{Magnetic twist and electron anisotropy: parametric study}
We now consider quantitative dependencies of the radio emission on various parameters of its source. Influence of the nonthermal electrons anisotropy on the total (spatially integrated) microwave spectrum is demonstrated (for moderate and high twist) in Figure~\ref{anisop_spec1}; $\Delta\mu\ll 1$ corresponds to strong anisotropy (either beam-like or pancake-like), while $\Delta\mu\gg 1$ means a nearly isotropic distribution. One can note that the frequency ($f_{\max}$) of spectral maximum (panels A and B) decreases with increasing width ($\Delta\mu$) of the Gaussian pancake-like pitch-angle distribution. In the case of beam-like distribution we observe the opposite behaviour: increasing $f_{\max}$ corresponds to increasing $\Delta\mu$. Maximal spectral intensity (panels C and D) has tendency to decrease with increasing $\Delta\mu$ for pancake-like distribution and to increase for beam-like anisotropy of the nonthermal electrons. One can see that in the case of beam-like anisotropy radio intensity experiences significant changes due to variation of anisotropy degree for constant energetic spectrum and number density of nonthermal electrons. Such situation can arise in the case of isotropization of nonthermal electrons without significant dissipation: for example, magnetic field fluctuations can change direction of electrons motion without loss of their energy.
\begin{figure}
\centering
\includegraphics[width=0.5\linewidth]{fig8.eps}
\caption{The figure illustrates influence of nonthermal electrons anisotropy on microwave source size (area inside the 50\% contour) for the loop central position. Cases of pancake-like (triangles) and beam-like (squares) anisotropy are considered. Red and blue colors correspond to high and moderate twist of a loop.}
\label{anisop_spec2}
\end{figure}
Figure~\ref{anisop_spec2} shows how the nonthermal electrons anisotropy affects the microwave emission source size (which was determined as the area inside 50\% intensity contour); only the central position of the loop is considered. For smaller $\Delta\mu$ we have smaller sizes of radio sources for both types of anisotropy; this effect is more pronounced in the case of beam-like anisotropy. As expected, when $\Delta\mu$ increases, both the spectral peak frequency, maximum emission intensity and the emission source area for the beam-like and pancake-like distributions converge and approach the respective values for the isotropic electron distribution.
\begin{figure}
\centering
\includegraphics[width=0.8\linewidth]{fig9.eps}
\caption{Inclination angle of the PSIL relative to the loop axis is shown in the left panel as a function of twist degree($N_t$). Red color corresponds to the case of pancake-like anisotropy (with $\Delta\mu=0.15$), while black color marks isotropic nonthermal electrons. The right panel demonstrates influence of the twist degree on the length of the microwave source (at 50\% level) for the nonthermal electrons with pancake-like pitch-angle distribution ($\Delta\mu=0.15$).}
\label{Nt_trends}
\end{figure}
In the left panel of Figure~\ref{Nt_trends} we demonstrate how inclination angle between the PSIL and the loop axis (for the loop located at the disk center) depends on the twist degree $N_{t}$. The inclination angle is measured between the Y-axis and the line connecting two points corresponding to the intersections between the PSIL and the 50\% intensity contour. In the right panel of Fig.\,\ref{Nt_trends} we show the influence of the twist degree on length of the microwave source (measured at the 50\% level) for the case of nonthermal electrons with pancake-like pitch-angle distribution. One can note that larger twist corresponds to larger inclination of the PSIL to the loop axis; the resulting inclinations are almost the same both for isotropic and anisotropic nonthermal electrons. Larger twist also corresponds to longer microwave source for pancake-anisotropy of nonthermal electrons. We do not consider beam-like distribution in this parametric study as the PSIL is curvy (it is hard to determine the inclination to any direction) and the source shape is asymmetric. However, one can see that larger twist also corresponds to longer microwave source (Fig.\,\ref{center_anisotrop}). Length of the radio source in the isotropic case shows no significant dependence on the twist degree and, thus, we do not present it in the right panel of Fig.\,\ref{Nt_trends}.
\begin{figure}
\centering
\includegraphics[width=1.0\linewidth]{fig10.eps}
\caption{Simulated radio maps for the magnetic loop at the solar disk center (similar to those in Figure \protect\ref{center_isotrop}) convolved with instrumental response functions, for different frequencies, loop twist degrees and electron pitch-angle distributions. Blue-red images and contours show Stokes $V$ maps (at 10, 30, 50, 70, 90 and 95\% levels); the black thin line marks the PSIL. Black thick contours correspond to Stokes $I$ (at 30, 50, 70 and 90\% levels).}
\label{NORH_sims}
\end{figure}
\subsection{Smoothed radio maps with reduced spatial resolution}
To obtain images similar to those observed by the Nobeyama Radioheliograph and other existing radio instruments, the simulated Stokes $I$ and $V$ radio maps are convolved with symmetric Gaussians (simulating point spread function, PSF) with the widths of 3.5~Mm ($\sim 5''$) for 34 GHz, 7~Mm ($\sim 10''$) for 17 GHz and 10~Mm ($\sim 17''$) for 10 GHz, respectively; the widths at 17 and 34 GHz correspond to the NoRH resolutions at these frequencies, while the width at 10 GHz is an extrapolation for a NoRH-sized instrument. We do not attempt to reproduce the real instrumental response function which depends on the heliograph base projection and hence varies according to day time and season; we are only interested in a qualitative picture and want to understand whether it is possible to detect any peculiarities of the gyrosynchrotron emission distribution in a twisted loop using the currently available observational data. The convolved radio maps for the loop located at the solar disk center are shown in Figure \ref{NORH_sims}; we consider here the isotropic and pancake-like pitch-angle distributions of nonthermal electrons.
After the convolution the resulting intensity per pixel is naturally reduced and the emission source sizes are increased. The PSIL for the convolved maps has a bit reduced inclination to the tube axis comparing with non-convolved radio maps. For anisotropic (pancake-like) nonthermal electrons, the size of the convolved emission source also depends on the twist degree of the loop: a more compact emission source is observed in the loop with moderate twist. The widths of the radio emission sources with different polarization signs are small comparing with the loop length. We do not present a figure showing the result of convolution of the limb images with a Gaussian because width of a Gaussian is larger than loop width and convolution leads simply to a corresponding increase of the visible loop width and to mutual compensation of the opposite polarizations.
The size of radio emission sources in the case of the beam-like pitch-angle distribution of nonthermal electrons is the smallest comparing with the isotropic and pancake-like distributions. We do not discuss the convolved images for this case, since we expect that all peculiarities of polarization will become undetectable in real observations.
Summarizing the results of the simulations, one can say that the most pronounced impact of the twisted magnetic field topology on the resulted spatial structure of the radio emission polarization is the inclination of the PSIL relatively to the loop axis. This effect is also pronounced in the smoothed radio maps. To find the flares where the PSIL is oriented relatively to the loop axis in the same manner as in our simulations, one should analyze the events with large-scale flare region ($\gtrsim 30$ Mm).
\section{Discussion and conclusions}\label{conclusion}
Obtained simulation results show that investigation of the spatial distribution of the radio emission polarization in the flare region can be used as twist diagnostics of the magnetic field where magnetized nonthermal electrons produce gyrosynchrotron emission. Moreover, it seems to be the only direct way to investigate topology of the magnetic fields in the region with accelerated electrons. Of course, twisting structures can be recognised by using high-resolution EUV and optical observations \cite{Wang2015}; however, those data (even together with X-ray observations) can only reveal local heating, which is not necessarily associated with propagating nonthermal electrons and cannot be considered as direct diagnostics of their activity.
In our modelling we use the simplest approach to describe the nonthermal electron population with analytical representation of their energetic and pitch-angle distributions. The modelling of the magnetic field is also simplified by using analytical derivations. To improve simulations of the radio emission from more or less realistic twisted magnetic fields, it would be better to use data-driven numerical 3D MHD simulations coupled with physics of electron acceleration and propagation. This task is very difficult technically and is a scope of future works. The main conclusions of the work can be summarized in a following way:
\begin{itemize}
\item Nonthermal electrons with isotropic pitch-angle distribution in the twisted loops produce gyrosynchrotron radio emission whose distribution along the loop does not show crucial dependence on the twist degree.
\item Nonthermal electrons with anisotropic pitch-angle distribution in the twis\-ted loop produce gyrosynchrotron radio emission from more compact source in the case of lower twist.
\item Inversion of the polarization sign of the radio emission, generated by nonthermal electrons in the twisted loop located in the center of the solar disk, has form of the line inclined relatively to the loop axis. Polarization of radio emission from twisted loop on the solar limb experiences change of its sign along its axis.
\end{itemize}
Definitely, to fully utilize the diagnostic potential of radio observations coupled with 3D simulations, we need new polarimetric multifrequency data with high spatial resolution. Very perspective instruments for these purposes are the Upgraded Siberian Solar Radio Telescope (uSSRT), Expanded Owens Valley Solar Array (EOVSA) and Mingantu Ultrawide Spectral Radioheliograph (MUSER).
As said above, in this paper we focus on numerical simulations and theoretical predictions. Some of the expected signatures of a twisted magnetic field (e.g., the specific orientation of the polarization inversion line) have been actually detected in the imaging observations of the Nobeyama Radioheliograph; these observations will be analyzed in detail in a forthcoming work.
\acknowledgements
This work was supported by the Russian Foundation for Basic Research (grant 15-32-51171). I.S. is grateful to the colleagues from the Institute of Solar-Terrestrial Physics for discussions and hospitality during staying at the ISTP.
|
\section{Introduction}
\label{intro}
Study of the cool neutral gas over various redshifts gives insight into the evolution of the star forming reservoir and
is a science goal of the forthcoming Square Kilometre Array (SKA, \citealt{msc+15}). The distribution of cool neutral
hydrogen (H{\sc \,i}) with galactocentric radius in external galaxies is crucial in interpreting the data from the forthcoming
surveys of H{\sc \,i}\ 21-cm absorption with the SKA and its pathfinders.\footnote{For example, the {\em First Large Absorption
Survey in H{\sc \,i}} (FLASH) on the Australian Square Kilometre Array Pathfinder (ASKAP), of which the {\em Boolardy
Engineering Test Array} has already detected redshifted H{\sc \,i}\ 21-cm (at $z=0.44$, \citealt{asm+15}).} To this end, we
\citep{rsa+15,rsa+16} have undertaken a survey of 21-cm absorption of background radio sources at various impact
parameters in the disks of intervening, nearby galaxies ($z < 0.04$, Fig.~\ref{distbn}).
\begin{figure}
\centering \includegraphics[angle=-90,scale=0.55]{distance_hist-det_n=12.ps}
\caption{The redshift distribution of the galaxies searched for H{\sc \,i}\ 21-cm at various impact parameters.
The filled histogram shows the 21-cm detections and the unfilled the non-detections. The galaxies of \citet{rsa+15,rsa+16} are selected from the H{\sc \,i}\ Parkes All-Sky Survey (HIPASS, \citealt{ksk+04})
and so have redshifts of $z < 0.04$.}
\label{distbn}
\end{figure}
For impact parameters of $\rho\lapp20$ kpc, the H{\sc \,i}\ detection rate is approximately 50 per-cent
\citep{gsb+10,bty+11,bmh+14,sgr+13}. However, \citet{rsa+15} find a significantly lower detection rate (4 per-cent),
which they attribute to the unbiased nature of their sample. That is, no target pre-selection based upon impact
parameter nor the nature of the background source. For a given sight-line, a background radio galaxy could result in a
lower covering factor, reducing the observed optical depth in comparison to a quasar (see Sect.
\ref{ebss}).
Although the gas density in a galaxy is known to decrease with galactocentric radius (e.g. \citealt{too63}),
none of the previous surveys have found convincing evidence of a decrease in 21-cm absorption strength with impact
parameter (\citealt{gsb+10,bty+11,gsn+13,zlp+15}). This is despite evidence of an anti-correlation between the Lyman-\AL\ and C{\sc iv}
equivalent widths and the impact parameter being well established in the optical/UV bands
(e.g. \citealt{lbtw95,tls98,clwb01,rbt+11,bht+15}). By adding the latest results \citep{rsa+15,rsa+16,dgso16} to the
previously published data and incorporating the limits, obtained from the non-detections, here we
report the first clear evidence of an anti-correlation between the 21-cm absorption strength and the impact parameter.
\section{Data, results and analysis}
\subsection{H{\sc \,i}\ 21-cm absorption strength and impact parameter}
\subsubsection{Raw impact parameters}
There are now 90 spectral line observations of radio source sight-lines through the disks of galaxies (summarised in Table~\ref{table1}).
\begin{table*}
\centering
\begin{minipage}{180mm}
\caption{Summary of the searches for H{\sc \,i}\ 21-cm absorption at various impact parameters in external galaxies. In the
interest of consistency we quote the NED name of the galaxy, followed by its redshift. ``Type'' designates
whether the search targetted quasar--galaxy pairs (P) or metal-line systems (M). For ease of matching, the sight-line is
named as in the reference, followed by its NED classification -- galaxy (G), QSO (Q) or unclassified
radio source (U). This is followed by the velocity integrated optical depth (or the $3\sigma$ limit) of the 21-cm absorption,
the impact parameter, the search reference and finally the blue and far-infrared luminosities as obtained from the
photometry (see main text). \label{table1}}
\begin{tabular}{@{}l c cc c c r c r c c@{}}
\hline
Galaxy (NED) & $z_{\rm gal}$ & Type & Sight-line & Class& $N_{\text H{\sc \,i}}$ & $\int\!\tau dv$ & $\rho$ & Ref. & $L_{\rm B}$ & $L_{\rm K}$\\% $EW_{\text {Ca{\sc ii}}}$
& & & & & [$10^{20}$\, \scm] &[\hbox{${\rm km\ s}^{-1}$}] & [kpc] & & \multicolumn{2}{c}{[$\log_{10}$W Hz$^{-1}$]} \\
\hline
CGCG\,045--091 & 0.032465 & P & 134528.765+034720.09& Q & --- & $<0.08$ & 53.3 & B11 & 21.54 & 22.42\\
CGCG\,244--046 & 0.032092 & P& 125247.588+474042.81& U & --- & $<0.06$ & 18.1 & B11 & 21.55 & 22.61\\
... & ... & ... & 125249.326+474042.19 & Q & --- & $<0.10$ & 15.2 & B11 & ... & ...\\
ESO\,150--G005 & 0.004790 & P & C-ESO150-G005-1 & U & --- & $<14.1$ & 18.7 & R15 & 20.60 & ---\\% ESO 150-G005
... & ... & P & C-ESO150-G005-2 & U & --- & $<23.3$ & 25.1 & R15 & ... & ...\\
ESO\,300--G014 &0.003186 & P & C-ESO300-G014-1 &U & $1.4\pm0.1$ &$<1.22$ & 11.6 & R16 & 20.62& 21.78\\
... & ... & .. & C-ESO300-G014-2 &U& $8.1\pm0.2$ & $<1.63$ & 6.1 & R16 & ... & ...\\
ESO\,345--G046 & 0.007168 & P & C-ESO345-G046 & U & $28\pm12$ & $<2.90$ & 13.6 & R15 & 21.16& ---\\
ESO\,357--G012 & 0.005227 & P& C-ESO357-G012-1a & U& $1.0\pm0.2$ &$<3.49$ & 20.0 &R16 & 20.82 & 21.69\\
... & ... & ... & C-ESO357-G012-1b & U & $1.0\pm0.2$ &$<11.7$ & 18.8 & R16 & ... & ...\\
ESO\,363-G015 &0.004216 & P & C-ESO363-G015-1 & U & --- &$<1.90$ & 18.1 & R16 & 20.77 & 19.28\\
... & ... & ... & C-ESO363-G015-2a & U & --- &$<6.09$ & 17.0& R16 & ... & ...\\
... & ... & ... & C-ESO363-G015-2b & U & --- &$<6.81$ & 17.6& R16 & ... & ...\\
ESO\,400-G012 & 0.026999 & M & 2030--370 & Q & $2.7\pm1.3$ & 0.22 & 10.0 & C92 & 21.48 & 21.79\\
ESO\,402-G025 &0.008577 & P& C-ESO402-G025-1 & U & $5.2\pm1.1$ & $<1.18$ & 17.7 &R15 & 20.46 & 20.57 \\
... & ... & P &C-ESO402-G025-2 & U & $9.3\pm1.0$ & $<2.88$ & 16.9 & R15 & ... & ...\\
ESO\,576-G069 &0.017809 & M & 1327--206 & Q & $0.6\pm0.2$ & 0.20 & 13.9 & C92 & 21.48 & 22.24 \\
IC\,1914 & 0.003432 & P& C-IC1914-1a & U & --- &$<1.34$ & 17.2 & R16 & 20.63 & 19.76 \\
... & ... & ... & C-IC1914-1b & U & --- &$<1.91$ & 16.9 & R16 & ... & ...\\
IC\,1954 & 0.003542 & P & C-IC1954 & U & --- & $<0.48$ & 10.7 & R15 & 20.50 & 21.40\\
IC\,4386 & 0.006278 & P & C-IC4386-1 & U & --- &$<0.97$ & 21.5 & R16 & 21.57 & 20.29\\
... & ... & ... & C-IC4386-2 & U & $3.2\pm0.2$ & $<3.91$ & 26.6 & R16 & ... & ...\\
IRAS\,02483+4302 & 0.051440 & M &0248+430 & Q & --- & 0.26 & 15.0 & H04 & --- & 22.69 \\
\protect[KAC2002]\,A & 0.437 & M & 1243--072 & Q & --- & 0.75 & 11.6 & K02 & ---& ---\\%& ---
2MASX\,J08495751+5108416 & 0.312 & M & J0849+5108 & Q & --- & $0.95$ & 14 & G13 & 21.87 & 22.02\\
2MASX\,J13253523+4953246 & 0.047829 & P & 132534.240+495348.47 & U & --- & $<0.39$ & 23.9 & B11 & 21.12 & 22.20 \\
... & ... & ... & 132534.565+495342.26 & Q & --- & $<0.64$ & 17.5 & B11& ... & ...\\
2MASX\,J13540065+5650007 & 0.095513 & M & 4C\,+57.23 & U &--- &$<1.17$ & 11 & Z15 & 21.61 & 22.38 \\
NGC\,2188 & 0.002492 & P &C-NGC2188-1a & G & $1.5\pm0.2$ & $<6.25$ & 7.7 &R16 & 20.93 & 20.21\\
... & ... &...& C-NGC2188-1b & G & $1.5\pm0.2$ &$<8.37$ & 8.0 & R16 & ... & ...\\
NGC\,0628 & 0.002192 & P & 0131+154 & Q & --- &$<0.15$ & 94.1 & C90 & 21.18 & 21.54 \\
NGC\,0660 & 0.002835 & P & 0139+132 & U & --- & $<0.067$ & 51.9 & C90 &20.17 & 21.96 \\
NGC\,1249 &0.003576 & P & C-NGC1249-1 & U & $2.9\pm0.7$ &$<4.64$ & 13.2 & R16 & 21.18 & 20.67 \\
... & ... & ... & C-NGC1249-2 & U & --- &$<5.28$ & 19.6 & R16 & ... & ...\\
... & ... & ... & C-NGC1249-3a & U & --- &$<9.54$ & 25.0 & R16 & ... & ...\\
... & ... & ... & C-NGC1249-3b & U & --- &$<10.5$ & 25.5 & R16 & ... & ...\\
NGC\,1566 & 0.005017 & P & C-NGC1566-1 & U& $130\pm19$ &$<3.30$ & 17.2 & R16 & 21.83 & 22.01 \\
... & ... & ... & C-NGC1566-2a & U & $6.6\pm0.9$ &$<6.16$ & 25.5 & R16 & ... & ...\\
... & ... & ... & C-NGC1566-2b & U & $7.7\pm0.9$ &$<13.42$ & 21.7 & R16 &... & ...\\
NGC\,3067$^*$ & 0.004923 & M & 0955+326 & Q &$0.8\pm0.4$ & 0.12 & 11.1 & C92 & 21.18 & 21.48 \\
NGC\,4138 & 0.002962 & P & 3C\,268.4 & Q & --- & $<0.08$ & 10.5 & H75 & 20.88 & 21.57 \\
NGC\,4651 & 0.002628 & P & 3C\,275.1 & Q & -- & $<0.010$ & 12.1 & C90 & 21.21 & 21.60 \\
NGC\,5156 & 0.009967 &P & C-NGC5156 & U & $14.3\pm2.2$ & $1.02$ & 18.5 & R16 & 22.15 & 22.43\\
NGC\,5832 & 0.001491 & P & 3C\,309.1 & Q & $1.0$ & $<0.014$ & 11.2 & H75 & 20.23 & ---\\
NGC\,6503 & 0.000083 & P & 1749+70.1 & Q & --- & $<0.01$ & 10.3 & B88 & 20.80 & 20.71 \\
NGC,7162A & 0.007569 & P& C-NGC7162A-1 & U & $4.4\pm1.3$ & $<2.25$ & 16.1 & R16 & 21.22 & ---\\
.... & ... & ...& C-NGC7162A-2 & G & --- & $<4.01$ & 46.7 & R16 & ... & ...\\
NGC\,7412 & 0.005704 & P & C-NGC7412-1 & U & $6.6\pm0.7$ &$<2.08$ &12.9 & R15 & 21.46 & 21.48\\
... & ... & ... & C-NGC7412-2 & U & $6.6\pm0.7$ & $<2.63$ & 12.6 & R15 & ... & ...\\
NGC\,7413$^*$ & 0.032489 & P & 3C\,455 & Q & --- & $<0.026$ & 14.9 & C90 & 21.84 & 22.53\\
NGC\,7424 & 0.003132 & P & C--NGC7424 & Q & $103\pm14$ & $<0.99$ & 10.0 & R15 & 21.02 & 20.62 \\
NGC\,7490 & 0.020724 & P & 2304+32B & U & --- & $<0.10$ & 204.8 & C90 & ---& 22.53\\
PGC\,016074 & 0.066046 & P & 0446--208C & Q & --- & 0.21 & 15.4 & C92 & --- & ---\\
... & ... & ... & 0446--208E & Q & --- & 0.32 & 37.1 & C92 & ... & ... \\
... & ... & ... & 0446--208W & Q & --- & 0.63 & 35.2 & C92 &... & ... \\
SDSS\,J074842.58+173450.6 & 0.052822 & P & 074841.773+173456.82 & Q & --- & $<0.10$ & 13.5 & B11 & 21.18 & 22.15\\
... & ... & ... & 074841.786+173512.20 & U & --- & $<0.19$ & 25.1 & B11 & ... & ...\\
... & ... &... &074842.084+173443.37 & U & --- & $<0.26$ & 10.4 & B11 & ... & ...\\
\hline
\end{tabular}
\end{minipage}
\end{table*}
\begin{table*}
\centering
\begin{minipage}{180mm}
\addtocounter{table}{-1}
\caption{\em Continued}
\begin{tabular}{@{}l c cc c c r c r c c @{}}
\hline
Galaxy (NED) & $z_{\rm gal}$ & Type & Sight-line & Class& $N_{\text H{\sc \,i}}$ & $\int\!\tau dv$ & $\rho$ & Ref. & $L_{\rm B}$ & $L_{\rm K}$\\
& & & & & [$10^{20}$\, \scm] &[\hbox{${\rm km\ s}^{-1}$}] & [kpc] & & \multicolumn{2}{c}{[$\log_{10}$W Hz$^{-1}$]} \\
\hline
SDSS\,J082153.75+503125.7 & 0.1835 & P & J0821+5031 & Q & --- & $<0.38$ & 15.9 & G10 & --- & ---\\% & $<0.25$
... & ... & P & 082153.833+503120.57 & Q & --- & $<0.16$ & 16.0 & B11 & ... & ...\\
SDSS\,J084912.42+275740.4 & 0.1948 & P & 084914.282+275729.90 & Q & --- & $<0.02$ & 86.7 & B11 & 21.82 & --- \\
SDSS\,J084957.48+510842.3 & 0.073485 & P & J0849+5108 & Q & --- & $<0.08$ & 19.4 & G10 & 21.87 & 22.02\\
SDSS\,J085519.04+575140.7 & 0.026003 & M& GB6\,J0855+5751 & G & --- &$<0.75$ & 9.5 & Z15 & 20.49 & ---\\
SDSS\,J102257.92+123439.1 & 0.1253 & P& 102258.415+123426.26 & Q & --- & $<0.03$ & 33.1 & B11 & 21.46 & 22.37 \\
... &... & P & 102258.552+123439.94 & U & --- & $<0.13$ & 20.9 & B11 & .... & ...\\
SDSS\,J104257.74+074751.3 & 0.03321 & M &J104257.74+074751.3 & Q & --- & $0.19$ & 1.7 &B10 & --- & ---\\
... & ... &P & 104257.598+074850.60 &Q & --- & $0.04962$ & 1.7 & B11 & ... & ...\\
SDSS\,J010643.94-103419.3 & 0.146 & P & 010644.15-103410.5 & Q & --- & $<0.02$ & 23.4 & B11 & 21.69 & 22.54 \\
SDSS\,J110736.60+090114.7 & 1.22823 & P& 110736.607+090114.72 & Q & --- & $<0.18$ & 8.1 & B11 & --- & ---\\
SDSS\,J111025.09+032138.8 & 0.030115 & P & J1110+0321C & Q & --- & $<2.8$ & 11.2 & G10 & 21.17 & ---\\
... & ... & ... & J1110+0321E & Q & --- & $<0.13$ & 22.5 & G10& .... & ...\\
... & ... & P & J1110+0321W & Q & --- & $<0.08$ & 15.3 & G10 & .... & ...\\
SDSS\,J124157.26+633237. 6 & 0.143 & P & J1241+6332C & Q & --- & $2.90$ & 11.0 & G10 & --- & 22.49\\
... & ... & ... & 1241+6332E & Q & --- & $<2.50$ & 34.0& G10 & ... & ...\\
... & ... &... & J1241+6332W & Q & --- & $<0.62$ & 53.0& G10 & ... & ...\\
SDSS\,J122847.72+370606.9 & 0.138336 & P & J1228+3706 & Q & --- & $<0.07$ & 15.0& G10 & --- & ---\\
SDSS\,J132839.89+622136.0 & 0.0423 & P & 132840.599+622136.65 & Q & --- & $<0.04$ & 4.2 & B11 & 20.46 & ---\\
SDSS\,J141629.25+372120.4 & 0.0341 & P & 141631.039+372203.01 & Q & $0.17^{\dagger}$ & $<0.16$ & 32.4 & B11 & --- & ---\\
... & ... & ... & 141630.672+372137.09 & U & ... & $<0.16$ & 16.2 & B14 & ... & ...\\
SDSS\,J144304.53+021419.3 & 0.371503 & M & J1443+0214 & G & --- & $3.4$ & $<5$ &G13 & 21.75 & ---\\
SDSS\,J160659.13+271642.6 & 0.046199 & P & 160658.315+271705.86 & Q & $0.32^{\dagger}$& $<0.03$ & 23.3& B11 & 20.95 & ---\\
SDSS\,J163956.38+112802.1 & 0.08 & M & J163956+112758 & G & --- & $15.7$ & 4 &S13 & 21.23 & 22.23 \\
UG\,00439 & 0.017669 & P & UM\,266 -- L1 & Q& $1.77\pm0.19^{\dagger}$ &$<0.07$ & 24.7 & D16& 21.75 & 22.06\\
... & ... & ... & UM\,266 -- C& ...& --- & --- & 24.8 & D16& ... & ...\\
... & ... & P & UM\,266 -- L2&... & --- &$0.08$ & 25.7 & D16 & ... & ...\\
UGC\,07408 & 0.001541 &P & 122105.480+454838.80 & U & $4.6^{\dagger}$ & $0.11$ & 3.3 & B11 & 19.80 & 20.63\\
... & .... &...& 122106.854+454852.16 & Q & $4.6^{\dagger}$ & $1.53$ & 2.8 & B14 & ...& ...\\
... & ... &... & 122107.811+454908.02 & Q & $4.6^{\dagger}$ & $<0.47$ & 2.6 & B14 & ...& ...\\\
UGC\,12081 & 0.038817 & P & 2231+0953 & Q & --- & $<0.10$ & 92.3 & C90 & ---& 22.80 \\
\hline
\end{tabular}
{References: H75 -- \citet{hb75}, B88 -- \citet{bdkb88}, C90 -- \citet{cs90}, C92 -- \citet{cv92}, K02 -- \citet{kac02}, H04 -- \citet{hc04}, B10 -- \citet{bty+10},
G10 -- \citet{gsb+10}, B11 -- \citet{bty+11}, G13 -- \citet{gsn+13},
S13 -- \citet{sgr+13}, B14 -- \citet{bmh+14}, R15 -- \citet{rsa+15}, Z15 -- \citet{zlp+15}, D16 -- \citet{dgso16}, R16 -- \citet{rsa+16}.\\
Notes:
$^*$Also observed by \citet{hb75}.
$^{\dagger}$Obtained from the quoted integrated flux density of the H{\sc \,i}\ emission or the quoted H{\sc \,i}\ mass.}
\end{minipage}
\end{table*}
In order to fully utilise these data, we include the upper limits to the optical depths (from the non-detections), via
the {\em Astronomy SURVival Analysis} ({\sc asurv}) package \citep{ifn86}. These are added to the 16 detected
sight-lines as censored data points. For the bivariate data, a generalised non-parametric Kendall-tau test gives a
probability of $P(\tau) = 9.39\times10^{-4}$ of the observed $\int\tau dv$--$\rho$ anti-correlation correlation arising
by chance, which is significant at $S(\tau) = 3.31\sigma$, assuming Gaussian statistics (Fig. \ref{N-impact}, top
panel).
\begin{figure}
\centering \includegraphics[angle=-90,scale=0.5]{strength-impact_full_n=18.ps}
\caption{The velocity integrated optical depth versus the impact parameter for all of the published searches. The shapes
show the classification of the background source: star -- quasar/Quasi-Stellar Object (QSO), circle -- Radio Galaxy
(RG) and square -- unclassified radio source, with the coloured symbols representing the known metal-line absorbers.
The downward arrows signify the $3\sigma$ upper limits and the dotted vertical line shows where the sample is split in
half with 45 sight-lines each at $\rho<16.2$ kpc and $\rho>16.2$ kpc. The probability of the correlation arising by
chance, $P(\tau)$, and the corresponding significance, $S(\tau)$, is shown in the top right for both the whole sample
(black text) and the known metal-line absorbers only (coloured text). The bottom panel shows the binned values,
including the limits via the Kaplan--Meier estimator, in equally sized bins. The horizontal error bars show the range
of points in the bin and the vertical error bars the $1\sigma$ uncertainty in the mean value}
\label{N-impact}
\end{figure}
As seen from Table \ref{table1}, only 14 of the 90 sight-lines were originally targetted as known metal-line
absorbers, although these drive the correlation giving a $S(\tau) =
1.94\sigma$ significance from just 14 data points. However, this is due to the metal-line absorbers
constituting 11 of the 16 detections, which define the parent population against which the limits are quantified,
thus requiring their inclusion.
The limits may also be included in the binned univariate data to give the mean $\int\!\tau dv$ value of each bin, via
the Kaplan--Meier estimator which gives a maximum-likelihood
estimate based upon the parent population \citep{fn85}. Presenting the data thus, it is visually apparent that the absorption
strength does decrease with increasing impact parameter (Fig. \ref{N-impact}, bottom panel).
In addition to the generalised Kendall-tau test and the Kaplan--Meier estimates, we split the data in half via the
median impact parameter: At $\rho<16.2$ kpc, there are 14 detections and 31 non-detections, that is a 31.1 per-cent
detection rate. Applying this to the $\rho>16.2$ kpc bin, gives a binomial probability of $1.16\times10^{-5}$ of
obtaining two detections or fewer out of 45 sight-lines, which is significant at $4.37\sigma$.
\subsubsection{Normalised impact parameters}
Although by the inclusion of the limits, we see a decrease in absorption strength with impact parameter, the sample is
heterogeneous, comprising a variety of background source classifications (discussed in Sect. \ref{ebss}), in addition to
potential differences in the foreground absorbing galaxies. These may arise from the search strategy of each individual
survey, whether an unbiased survey towards galaxy--quasar pairs or the selection of {\em known} metal-line
absorbers.\footnote{Although this does not preclude any of the 76 designated as pairs as being potentially metal-rich --
11 have been detected in Ca{\sc ii} absorption (see \citealt{cv92,hc04,gsb+10}), although a further nine have been
searched and not detected (see \citealt{cs90,bty+10,gsb+10}).} The detection rate of the former is just 7\%, compared
to 79 per-cent for the latter, with these also tending to be at low impact parameters (Fig. \ref{N-impact}). Such
metal-line absorbers also comprise the foreground galaxies in the optical surveys which exhibit an equivalent
width--impact parameter anticorrelation (Sect. \ref{intro}).
Until all of the sample is observed and their metallicities quantified, this possible bias cannot be directly
removed. However, both metallicity and equivalent width appear to be correlated with galaxy size
(\citealt{ell06,ctp+07,mcw+07}) and so a potentially wide range of metallicities is expected to reflect a large range of
galaxy sizes. This could have the effect of a given impact parameter, which lies well within the disk for an $L^*$
(high metallicity) galaxy, being located well outside the disk of a dwarf galaxy. In order to account for this, we
normalise each impact parameter by the luminosity of the galaxy: As described in \citet{cwsb12}, for each galaxy we
obtain the photometry from NASA/IPAC Extragalactic Database (NED), the Wide-Field Infrared Survey Explorer (WISE) and
the Two Micron All Sky Survey (2MASS), correcting each value for Galactic extinction \citep{wil13} before fitting to the
required wavelength in the galaxy rest-frame.
We summarise the derived blue-band luminosities in Fig.~\ref{L-blue}.
\begin{figure}
\centering \includegraphics[angle=-90,scale=0.5]{blue_hist_n=8.ps}
\caption{The distribution of the blue-band luminosities of the absorbing galaxies, where sufficient photometry is
available. The hatched histogram shows the metal-line searches and the unfilled the galaxy--quasar pair searches.}
\label{L-blue}
\end{figure}
Using these to normalise the impact parameter, via the same $(\rho/h)\times(L_{\rm B}/L_{\rm B}^*)^{-0.46}$ correction as \citet{clwb01},
\begin{figure}
\centering \includegraphics[angle=-90,scale=0.48]{strength-impact_blue_n=14.ps}
\caption{As Fig. \ref{N-impact} but with the impact parameter normalised by the B-band luminosity (cf. \citealt{clwb01}).}
\label{N-blue}
\end{figure}
we find the absorption strength--impact parameter anti-correlation retains a similar significance, although with 16
fewer data points. As before, we can also compare detection rates above and below the median (normalised) impact
parameter: At $(\rho/h)\times(L_{\rm B}/L_{\rm B}^*)^{-0.46} <18.7$ kpc, there are 9 detections and 28 non-detections,
that is a 24.3 per-cent detection rate. Applying this to the $>18.7$ kpc bin, gives a binomial probability of
$4.28\times10^{-4}$ of obtaining two or fewer detections out of 37 sight-lines, which is significant at $3.52\sigma$.
\citet{clwb01} also normalise the impact parameter by the near-infrared luminosity, since this is less susceptible to extinction and
irregularities caused by star formation, providing a better tracer of the total stellar mass.
\begin{figure}
\centering \includegraphics[angle=-90,scale=0.48]{K-hist_n=11.ps}
\caption{As Fig. \ref{L-blue}, but for the near-infrared luminosity.}
\label{L-K}
\end{figure}
\begin{figure}
\centering \includegraphics[angle=-90,scale=0.5]{strength-impact_K_n=13.ps}
\caption{As Fig. \ref{N-blue} but with the impact parameter normalised by the K-band luminosity (cf. \citealt{clwb01}).}
\label{N-K}
\end{figure}
Normalising the impact parameter, the significance of the anti-correlation increases (Fig. \ref{L-K}) and,
again comparing detection rates above and below the median (normalised) impact
parameter: At $(\rho/h)\times(L_{\rm K}/L_{\rm K}^*)^{-0.28} <22.2$ kpc, there are 10 detections and 21 non-detections, that is
a 30.5 per-cent detection rate. Applying this to the $>22.2$ kpc bin, gives a binomial probability of
$3.05\times10^{-5}$ of obtaining one detection or fewer out of 33 sight-lines, which is significant at
$4.17\sigma$.
Since we have both the blue and near-infrared luminosities for many of the galaxies, we can verify that the observed
decrease in $\int\!\tau dv$ with impact parameter is not dominated by a colour bias, where the redder (and presumably,
dustier) galaxies are more hospitable to the presence of cool gas.\footnote{As is seen for both H{\sc \,i}\ \citep{cw10}
and \MOLH\ \citep{cwc+11} at high redshift.} In Fig. \ref{colour} we
\begin{figure}
\centering \includegraphics[angle=-90,scale=0.48]{strength_colour_n=18.ps}
\caption{The velocity integrated optical depth versus the blue--near-infrared colours of the sample.}
\label{colour}
\end{figure}
plot the 21-cm absorption strength against the $B-K$ colour, where no correlation is apparent, leaving the decrease in gas density with impact parameter the major most likely cause.
We also note that the known metal-line systems do exhibit some reddening ($B - K >0$), which is consistent with the
metallicity--dust (and molecular fraction) relation (see \citealt{cwmc03} and references therein).
\subsection{The effect of the background source size}
\label{ebss}
As mentioned in Sect. \ref{intro}, in addition to the impact parameter, it is believed that the extent of the background source can have an effect on the 21-cm detection
rate. Specifically, for a given absorption cross section\footnote{H{\sc \,i}\ 21-cm absorbing clouds in
external galaxies are believed to have 1.4~GHz cross-sections of $\sim100$ pc \citep{bra12,cag+13}.} different background source sizes will have
different observed optical depths, $\tau_{\rm obs}$, according to
\begin{equation}
\tau \equiv-\ln\left(1-\frac{\tau_{\rm obs}}{f}\right) \approx\frac{\tau_{\rm obs}}{f} \text{ for }\tau_{\rm obs}\lapp0.3 \Rightarrow \tau_{\rm obs}\approx f \tau,
\label{tau_eq}
\end{equation}
in the optically thin regime\footnote{The
maximum of the sample is $\tau_{\rm obs}= 0.24$ \citep{zlp+15}.}, where the observed optical depth is defined as the ratio of the
line depth to the continuum ($\tau_{\rm obs}\equiv \Delta S/S$). Given that the covering factor ranges over $0\leq f
\leq 1$ for zero to full coverage of the background flux, larger background sources could give systematically lower
observed optical depths. That is, we may expect the more compact quasar sight-lines to give a higher detection rate than those
of radio galaxies.\footnote{\citet{cag+13}
have shown that the observed anti-correlation between the atomic hydrogen column density and the projected linear size of the
background radio emission \citep{pcv03,gs06,gs06a,gss+06,omd06,css11} is most likely driven by
the observed optical depth resulting from the coverage of the radio source.}
Addressing this, from the NED classifications, contrary to our expectations, we find a higher
($50-100$ per-cent) detection rate towards radio galaxies compared to the quasars ($20-37$ per-cent, Fig.~\ref{sl}).
\begin{figure}
\centering \includegraphics[angle=-90,scale=0.6]{type-hist.ps}
\caption{Breakdown of the various sight-line types, from NED (where quasars are
classified as QSOs), for the whole sample (top panel) and for impact parameters less than the median value (bottom). The
filled histogram shows the 21-cm detections and the unfilled the non-detections.}
\label{sl}
\end{figure}
Performing a Pearson $\chi^2$--statistic test and applying Yates's correction for continuity gives a significance of $p = 0.25$.
Thus, the null hypothesis that the detection rates are the equal for radio galaxies and quasars cannot be rejected.
It is generally accepted that the turnover frequency of a radio source is anti-correlated with its extent
(e.g. \citealt{ffs+90}), with flat spectral indices arising from radio emission projected along our line-of-sight, thus also
appearing more compact. Therefore, in the absence of high resolution radio images, we can use any clustering of either
or both the turnover frequency/spectral index to gauge whether an unclassified background source is likely to be a
quasar or a radio galaxy. We therefore compiled the photometry of each background source and, using the methods
described in \citet{cwsb12}, determined the rest-frame turnover frequency, $\nu_{_{\rm TO}}$, and spectral index at a
rest frequency of 1.4~GHz, $\alpha$.
\begin{figure}
\centering \includegraphics[angle=-90,scale=0.5]{TO-SI_panel.ps}
\caption{The rest-frame turnover frequency versus the spectral index for the background sources for which these
could be determined. If no turnover is apparent in the radio SED we assume that this occurs below the lowest
observed frequency (typically $\sim10$ MHz) and use this to assign an upper limit to $\nu_{_{\rm TO}}$.
Again, the filled symbols represent the detections and the unfilled the non-detections with shapes representing the
classification of the background source.
In the bottom panel, the binned values of the detections and non-detections are shown.}
\label{TO-SI}
\end{figure}
From this (Fig.~\ref{TO-SI}), we see that both the radio galaxies and unclassified sources,
for which both $\nu_{_{\rm TO}}$ and $\alpha$ could be determined, are too few in number to exhibit any clustering, which is absent from the
sources classified as QSOs in any case. Thus, at least at present,
this method is of little use in predicting the nature of the background source. Based upon this limited sample, however,
we see that, while there is a large overlap in the spectral indices (although the detections are more ``flat'', $|\alpha| < 0.5$), the
detections and non-detections have distinct mean turnover frequencies
($\nu_{_{\rm TO}} = 10^{8.66\pm0.32}$ and $10^{8.00\pm0.21}$ Hz, respectively). Since the turnover frequency is anti-correlated with the source size
(e.g. \citealt{ode98,fan00,omd06}), this is consistent with a detection bias towards the more compact radio sources, indicating that the covering factor is important.
\subsection{Spin temperature and impact parameter}
In the optically thin regime (Equ. \ref{tau_eq}), the neutral hydrogen column density, $N_{\text{H{\sc \,i}}}$ [\scm], is related to the absorption
strength via
\begin{equation}
N_{\text{H{\sc \,i}}} \approx 1.8\times10^{18}\,\frac{T_{\rm spin}}{f}\int\!\tau_{\rm obs}\,dv,
\label{N_eq}
\end{equation}
where $T_{\rm spin}$ [K] is the spin temperature of the gas and $\int\!\tau_{\rm obs}\,dv$ [\hbox{${\rm km\ s}^{-1}$}] the velocity
integrated optical depth of the absorption. The comparison of $\int\!\tau_{\rm obs}\,dv$ with $N_{\text{H{\sc \,i}}}$, from
Lyman-\AL\ ($\lambda=1216$~\AA) observations, has shown an increase in $T_{\rm spin}/f$ with redshift, possibly
suggesting an evolution in the spin temperature (e.g. \citealt{kps+14}). However, the effect can adequately be accounted
for by a decrease in $f$ with redshift, due to the geometry effects of an expanding Universe \citep{cur12}.
For this near-by sample we have the opportunity to determine whether $T_{\rm spin}/f$ generally varies with galactocentric radius, which
could possibly introduce a beam-filling effect, where the mean value of $T_{\rm spin}/f$ within the beam could also
contribute to a redshift dependence. Given that the gas is optically thin, for the low redshifts of the sample
(Fig.~\ref{distbn}), where 21-cm emission can be detected ($z\lapp0.2$, \citealt{cc15}), the column density can be
obtained directly from the brightness temperature of the line emission, $T_{\rm b}$ [K], via
\begin{equation}
N_{\text{H{\sc \,i}}} \approx 1.8\times10^{18} \int\! T_{\rm b}\,dv,
\label{em_eq}
\end{equation}
which in conjunction with Equ. \ref{N_eq} yields $T_{\rm spin}/f$. Plotting this (Fig.~\ref{Toverf}),
\begin{figure}
\centering \includegraphics[angle=-90,scale=0.5]{Toverf_impact_K_n=9.ps}
\caption{The spin temperature--covering factor degeneracy versus the normalised impact parameter for all of the published searches
where a measure of the column density is available. In the top panel, the symbols are as per Fig.~\ref{N-impact} and in the bottom panel
the grey box shows the range in the outer Milky Way ($T_{\rm spin} = 250-400$ K, \citealt{dsg+09}). Since $f\leq1$, this places a lower
limit on $T_{\rm spin}/f$.}
\label{Toverf}
\end{figure}
we see no evidence of a variation in $T_{\rm spin}/f$ with the normalised impact parameter over $(\rho/h)\times(L_{\rm K}/L_{\rm K}^*)^{-0.28} \lapp100$~kpc, which corresponds to the inner $r\approx30$ kpc of galactocentric radius.
This is consistent the result of \citet{dsg+09}, who find remarkably little variation in the spin temperature over
radii of 8--25~kpc in the Milky Way, despite both the 21-cm emission and absorption strengths varying by
two orders of magnitudes.
\subsection{Disk inclination}
By assuming the known H{\sc \,i}\ column density distribution of the Milky Way, we can estimate the approximate orientation of
the average H{\sc \,i}\ absorbing disk, based upon the $\int\tau dv$--$\rho$ relationship: The Galactic volume density of the
neutral gas exhibits an exponential decrease with galactocentric radius according to $n = n_0\,e^{-r/R}$, where $n_0 =
13.4$~\ccm\ and the scale-length $R = 3$~kpc \citep{kdkh07}. The column density at each value of $\rho$ is obtained
from the volume density via $N_{\text{H{\sc \,i}}}\equiv\int\!ndl$, where $N_{\text{H{\sc \,i}}}= n\,h = n_0\,e^{-\rho/R}\,h$ for a
face-on ($i=90$$^{\circ}$) disk\footnote{Where the height of the disk, $h$, is given by the flare factor, $f_{\rm FL} =
\rho/h$, which describes the flaring of the H{\sc \,i}\ gas with galactocentric radius \citep{kdkh07}.} and $N_{\text{H{\sc \,i}}}=
n_0\int_{0}^{\rho}e^{-r/R}dr = n_0R\,e^{-\rho/R}$ for an edge-on ($i=0$$^{\circ}$) disk (Fig. \ref{model}).
\begin{figure}
\centering \includegraphics[angle=-90,scale=0.52]{model-impact_K_n=13.ps}
\caption{Top: The binned 21-cm absorption strength (left ordinate axis, Fig.~\ref{N-impact}) versus the impact parameter
overlaid with the Galactic H{\sc \,i}\ column density distribution (where $n_0 = 13.4$ \ccm, $R = 3$ kpc \& $f_{\rm FL} =20$,
right ordinate axis, dotted curve -- viewed face-on, broken curve -- viewed edge-on). Bottom: The values of $T_{\rm
spin}/f$ obtained from the face-on case. As per Fig. \ref{Toverf}, the grey box shows the range in the outer Milky
Way.}
\label{model}
\end{figure}
From this, the face-on galactic disk appears to better trace the binned integrated optical depth values, again with
$T_{\rm spin}/f\sim10^3$~K
remaining approximately consistent with galactocentric radius out to $(\rho/h)\times(L_{\rm K}/L_{\rm K}^*)^{-0.28} \sim20$ kpc,
beyond which this falls to $T_{\rm spin}/f=40$~K (Fig. \ref{Toverf}).
Applying the
edge-on Galactic disk would give much larger values of $T_{\rm spin}/f$, due either to very high spin temperatures
and/or very low covering factors, the latter of which would be expected from a low inclination disk presenting a much
smaller absorbing cross-section. We thus suggest that the targetted galaxies tend to have face-on inclinations, which
is consistent with the observations of \citet{rsa+15}, who, from the azimuthal profiles of the H{\sc \,i}\ emission, suggest
that the intervening galaxies could be highly inclined (or highly asymmetric).
\section{Conclusions}
One of the goals of current surveys for H{\sc \,i}\ 21-cm absorption at various impact parameters is to determine the expected
detection rate of cool, neutral gas in distant galaxies with the next generation of large radio telescopes. An important
aspect of this is the determination of the expected detection rate of 21-cm absorption at redshifts where the detection
of 21-cm emission will not be possible. Here we demonstrate a clear anti-correlation between the
integrated optical depth and the impact parameter, where previously only weak correlations were apparent at best
(significance levels of $\leq0.81\sigma$, \citealt{gsb+10,bty+11,gsn+13,zlp+15}).
Also, investigating the hypothesis that 21-cm absorption is more readily detected towards quasars in comparison to radio
galaxies, we find that the statistics are insufficient to draw any conclusions. However, we do find that the mean detection occurs towards
a radio source with a higher turnover frequency than a non-detection. Since the turnover frequency is anti-correlated with
source size, this suggests that the coverage of the background emission is important and thus we would expect a higher detection
rate towards quasars in comparison to radio galaxies.
Lastly, using the neutral hydrogen column density obtained from the 21-cm emission, we find no statistical evidence for
a variation of the spin temperature (degenerate with the covering factor) over the inner $\approx30$ kpc of the disk,
similar to the consistency in spin temperature observed across the Milky Way \citep{dsg+09}.
By using $N_{\text H{\sc \,i}}$ obtained from the H{\sc \,i}\ distribution of the Milky Way, the observed
$\int\tau dv$--$\rho$ correlation may suggest that the intervening galactic disks have high inclinations (close to face-on). This is consistent
with the H{\sc \,i}\ emission maps of \citet{rsa+15}, who suggest that galaxies which intercept background sources may be highly inclined.
\section*{Acknowledgements}
We wish to thank the anonymous referee for their helpful and detailed comments and the {\em Radio Galaxy Morning Tea}
group at the University of Sydney for useful discussion. This research has made use of the NASA/IPAC Extragalactic
Database (NED) which is operated by the Jet Propulsion Laboratory, California Institute of Technology, under contract
with the National Aeronautics and Space Administration and NASA's Astrophysics Data System Bibliographic Service. This
research has also made use of NASA's Astrophysics Data System Bibliographic Service and {\sc asurv} Rev 1.2
\citep{lif92a}, which implements the methods presented in \citet{ifn86}.
|
\section{Introduction }
Recall that a \Index{simplicial complex} $\Delta$ on the vertex set $\mathcal{V}(\Delta)=V$ is a finite subset of $2^{V}$, such that $A \in \Delta$ and $B \subseteq A$ implies $B \in \Delta$.
Typically, for the simplicial complexes considered here, the vertex set is $[n]\coloneqq\Set{1,2,\dots,n}$ for some $n\in {\mathbb Z}_+$.
The set $A$ is called a \Index{face} if $A \in \Delta$, and called a \Index{facet} if $A$ is a maximal face with respect to inclusion.
Sets of facets of $\Delta$ will be denoted by $\mathcal{F}(\Delta)$.
When $\mathcal{F}(\Delta)=\Set{F_1,\dots,F_t}$, we write $\Delta=\braket{F_1,\dots,F_t}$.
Any set in $2^V\setminus \Delta$ is called a \Index{nonface} of $\Delta$. The \Index{dimension} of a face $A$, denoted by $\dim(A)$, is $|A|-1$. The \Index{dimension} of a simplicial complex $\Delta$, denoted by $\dim(\Delta)$, is the maximum dimension of its faces. The simplicial complex $\Delta$ is \Index{pure} if all the facets of $\Delta$ have the same dimension.
Recall that a simplicial complex $\Delta$ is called \Index{shellable} if there exists a linear order $F_1, \dots, F_m$ on its facet set $\mathcal{F}(\Delta)$ such that for each pair $i<j$, there exists a $k<j$, such that $F_j \setminus F_k = \{v\}$ for some $v \in F_j \setminus F_i$.
Such a linear order is called a \Index{shelling order}.
Shellability is an important property when investigating a simplicial complex. It is well-known that a pure shellable simplicial complex is Cohen-Macaulay, see \cite{MR2724673}.
Matroid complexes, shifted complexes and vertex decomposable complexes are all known to be shellable.
In \cite{SSC}, a stronger requirement was imposed on the shelling orders of shellable simplicial complexes. A simplicial complex $\Delta$ is called \Index{strongly shellable} if its facets can be arranged in a linear order $F_1,\dots,F_t$ in such a way that for each pair $i<j$, there exists $k<j$, such that $|F_j\setminus F_k|=1$ and $F_i\cap F_j\subseteq F_k \subseteq F_i\cup F_j$. Such an ordering of facets will be called a \Index{strong shelling order}. Matroid complexes and pure shifted complexes are all known to be strongly shellable.
As a simple example, let $L_n$ be the line graph with $n$ vertices. Considered as a one-dimensional simplicial complex, $L_n$ is shellable (actually, even vertex decomposable) for all $n$. But $L_n$ is strongly shellable only for $n\le 4$. Additionally, it is well-known that the Stanley-Reisner ideals of the Alexander dual of shellable complexes have linear quotients. An important fact about pure strongly shellable complexes is that the corresponding facet ideals also have linear quotients. Therefore, pure vertex decomposable complexes, not having this property, are in general not strongly shellable. Conversely, we also showed an example in \cite{SSC} that pure strongly shellable complexes are not necessarily vertex decomposable. Some of the other pertinent facts of strong shellability are summarized in Section 2.
To provide more concrete examples for pure strongly shellable complexes, we show in this paper that strong shellability occurs naturally when considering chordal clutters and graphs.
Recall that a finite simple graph $G$ is \Index{chordal} if each cycle in $G$ of length at least
$4$ has at least one chord. For finite simple graphs, chordality is an important and fascinating topic. Chordal graphs have many seemingly quite different characterizations, which were later generalized from various perspectives to clutters.
Note that the facet set $\mathcal{F}(\Delta)$ of a simplicial complex $\Delta$ gives rise to a clutter $\mathcal{C}$ whose edge set is $\mathcal{F}(\Delta)$. When $\Delta$ is strongly shellable, we will call $\mathcal{C}$ \Index{edgewise strongly shellable}, abbreviated as ESS. In section 3 of the current paper, we will show, roughly speaking, if $\mathcal{C}$ is a chordal clutter in the sense of Woodroofe \cite{MR2853065} or in the sense of Emtander \cite{MR2603461}, then the complement clutter is ESS; see our Theorems \ref{W-chordal-ss} and \ref{E-chordal-ss}. Since these two types of chordality are mutually non-comparable, the converses of aforementioned two theorems are not true in general, namely, the complement clutter of ESS clutters are generally not chordal in either sense.
Recently, Bigdeli, Yazdan Pour and Zaare-Nahandi \cite{arXiv:1508.03799} also introduced chordal property for $d$-uniform clutters. This class will be denoted by $\mathfrak{C}_d$. The edge ideals of the complement clutters of the objects in $\mathfrak{C}_d$ have linear resolutions over any field, but not necessarily have linear quotients. Meanwhile, we can denote the class of $d$-uniform clutters whose complement clutters are ESS, by CESS. A natural question would be whether CESS is a subclass of $\mathfrak{C}_d$. An answer for this is pertinent to the two questions in \cite{arXiv:1508.03799}; see our Remark \ref{two-questions}.
In Section 4, we will focus on ESS finite simple graphs. As a consequence of the aforementioned results for chordal clutters, we have a new characterization of chordal graphs in Theorem \ref{ssg and chordal graph}: a graph is chordal if and only if the complement graph is ESS. We will provide in-depth investigation of some of the known characterizations of chordal graphs, all from the perspectives of strong shellability.
Recently, Herzog and Rahimi \cite{arXiv:1508.07119} studied the bi-Cohen-Macaulay (abbreviated as bi-CM) property of finite simple graphs. Recall that a simplicial complex $\Delta$ is called \Index{bi-CM}, if both $\Delta$ and its Alexander dual complex $\Delta^{\vee}$ are CM. A simple graph $G$ is called \Index{bi-CM}, if the Stanley-Reisner complex $\Delta_G$ of the edge ideal $I(G)$ of $G$ is bi-CM.
As a complete classification of all bi-CM graphs seems to be impossible, they gave a classification of all bi-CM graphs up to separation. As they showed in \cite[Theorem 11]{arXiv:1508.07119},
the generic graph $G_T$ of a tree $T$ provides a bi-CM inseparable model. In particular, $G_T$ is bi-CM.
Following the same spirit, we will call a simplicial complex $\Delta$ \Index{bi-strongly shellable} (abbreviated as bi-SS), if both $\Delta$ and its Alexander dual complex $\Delta^{\vee}$ are strongly shellable. Bi-SS graphs can be similarly defined. In the present paper, we will show that the generic graph of a tree is not only bi-CM, but also bi-SS; see Theorem \ref{bi-strongly shellable theorem}.
The final section is devoted to bipartite graphs which have no isolated vertex. As a quick corollary of the characterizations of chordal graphs, a bipartite graph with no isolated vertex is ESS if and only if it is a Ferrers graph. We will reconstruct ESS bipartite graphs by upward sequences in Theorem \ref{ssbg=cbuds}. This new point of view will induce the Ferrers-graph characterization of ESS bipartite graphs which have no isolated vertex.
\section{Strongly shellable complexes}
In this section, we summarize some of the properties related to strongly shellable simplicial complexes, that will be applied in this paper.
Recall that a \Index{matroid complex} $\Delta$ is a simplicial complex whose faces are the independent sets of a matroid. By \cite[Proposition III.3.1]{MR1453579}, this is equivalent to saying that $\Delta$ is a simplicial complex such that for every subset $W\subseteq \mathcal{V}(\Delta)$, the induced subcomplex $\Delta_W\coloneqq \Set{F\in \Delta|F\subseteq W}$ is pure.
\begin{proposition}
[{\cite[Proposition 6.3]{SSC}}]
\label{matroid implies ss}
Matroid complexes are strongly shellable.
\end{proposition}
Let $\Delta$ be a pure simplicial complex. For arbitrary facets $F$ and $G$, the \Index{distance} between them is defined as $\operatorname{dis}(F,G)\coloneqq |F\setminus G|$, which is certainly $|G\setminus F|$ as well. This function satisfies the usual triangle inequality. Sometimes, we will write it as $\operatorname{dis}_\Delta$ to emphasize the underlying simplicial complex.
\begin{lemma}
[{\cite[Lemma 4.2]{SSC}}]
\label{d=d-1+1}
Let $\Delta$ be a pure simplicial complex. Then $\Delta$ is strongly shellable if and only if there exists a linear order $\succ$ on $\mathcal{F}(\Delta)$, such that whenever $F_i\succ F_j$, there exists a facet $F_k\succ F_j$, such that $\operatorname{dis}(F_k, F_j)=1$ and $\operatorname{dis}(F_i, F_k) = \operatorname{dis}(F_i, F_j)-1$.
\end{lemma}
For a pure simplicial complex $\Delta$, its \Index{complement complex} $\Delta^c$ has the facet set $\mathcal{F}(\Delta^c)=\Set{F^c: F\in \mathcal{F}(\Delta)}$, where $F^c\coloneqq\mathcal{V}(\Delta)\setminus F$. The strong shellabilities of $\Delta$ and $\Delta^{c}$ have the following relation:
\begin{lemma}
[{\cite[Lemma 4.10]{SSC}}]
\label{complement shellable}
A pure simplicial complex $\Delta$ is strongly shellable if and only if its complement complex $\Delta^{c}$ has the same property.
\end{lemma}
Let $S={\mathbb K}[x_1,\dots,x_n]$ be a polynomial ring over a field ${\mathbb K}$ and $I$ a graded proper ideal. Recall that $I$ has \Index{linear quotients}, if there exists a system of homogeneous generators $f_1 ,f_2 ,\dots,f_m$ of $I$ such that the colon ideal $\braket{f_1 ,\dots,f_{i-1}} : f_i$ is generated by linear forms for all $i$. If $I$ has linear quotients, then $I$ is componentwise linear; see \cite[Theorem 8.2.15]{MR2724673}. In particular, if $I$ has linear quotients and can be generated by forms of degree $d$, then it has a $d$-linear resolution; see \cite[Proposition 8.2.1]{MR2724673}.
Another important result in \cite{SSC} is that:
\begin{theorem}
[{\cite[Theorem 4.11]{SSC}}]
\label{linear quotients}
If $\Delta$ is a pure strongly shellable complex, then the facet ideal $I(\Delta)$ has linear quotients. In particular, $I(\Delta)$ has a linear resolution over any field.
\end{theorem}
Recently, Moradi and Khosh-Ahang \cite{arXiv:1601.00456} considered the expansion of simplicial complexes.
Let $\Delta$ be a simplicial complex with the vertex set $\mathcal{V}(\Delta)=\Set{x_1,\dots,x_n}$ and $s_1,\dots,s_n$ be arbitrary positive integers. The \Index{$(s_1,\dots,s_n)$-expansion} of $\Delta$, denoted by $\Delta^{(s_1,\dots,s_n)}$, is the simplicial complex with the vertex set $\Set{x_{i,j}\mid 1\le i\le n, 1\le j\le s_i}$ and the facet set
\[
\Set{ \{x_{i_1,r_1},\dots,x_{i_{t},r_{t}}\} \mid \{x_{i_1},\dots,x_{i_t}\}\in \mathcal{F}(\Delta) \text{ and } (r_1,\dots,r_{t})\in [s_{i_1}]\times \cdots \times [s_{i_{t}}]}.
\]
Now, we wrap up this section with the following strongly shellable version of \cite[Corollary 2.15]{arXiv:1511.04676}.
\begin{theorem}
[{\cite[Theorem 2.18]{SSC}}]
\label{expansion-complex}
Assume that $s_1, \dots, s_n$ are positive integers. Then $\Delta$ is strongly shellable if and only if $\Delta^{(s_1,\dots,s_n)}$ is so.
\end{theorem}
\section{Edgewise strongly shellable clutters}
Recall that a \Index{clutter} $\mathcal{C}$ with a finite \Index{vertex set} $\mathcal{V}(\mathcal{C})$ consists of a collection $\mathcal{E}(\mathcal{C})$ of nonempty subsets of $\mathcal{V}(\mathcal{C})$, called \Index{edges}, none of which is included in another. Clutters are also known as \Index{finite simple hypergraphs}.
A \Index{subclutter} $\mathcal{K}$ of $\mathcal{C}$ is a clutter such that $\mathcal{V}(\mathcal{K})\subseteq \mathcal{V}(\mathcal{C})$ and $\mathcal{E}(\mathcal{K})\subseteq \mathcal{E}(\mathcal{C})$. If $U\subseteq \mathcal{V}(\mathcal{C})$, the \Index{induced subclutter} on $U$, $\mathcal{C}_U$, is the subclutter with $\mathcal{V}(\mathcal{C}_U)=U$ and with $\mathcal{E}(\mathcal{C}_U)$ consisting of all edges of $\mathcal{C}$ that lie entirely in $U$.
A clutter $\mathcal{C}$ is called \Index{$d$-uniform} if $\left|e\right|=d$ for each $e\in \mathcal{E}(\mathcal{C})$.
If $\mathcal{C}$ is a clutter, we can remove a vertex $v$ in the following two ways.
\begin{enumerate}[a]
\item The \Index{deletion} $\mathcal{C}\setminus v$ is the clutter with $\mathcal{V}(\mathcal{C}\setminus v)=\mathcal{V}(\mathcal{C})\setminus \Set{v}$ and with
$$\mathcal{E}(\mathcal{C}\setminus v)=\Set{e\in \mathcal{E}(\mathcal{C}): v\notin e}.$$
\item The \Index{contraction} $\mathcal{C}/v$ is the clutter with $\mathcal{V}(\mathcal{C}/v)=\mathcal{V}(\mathcal{C})\setminus \Set{v}$ and with edges the minimal sets of $\Set{e\setminus \Set{v}: e\in \mathcal{E}(\mathcal{C})}$ with respect to inclusion.
\end{enumerate}
Thus, \Index{induced subclutters} are obtained by repeated deletions.
A clutter $\mathcal{D}$ obtained from $\mathcal{C}$ by repeated deletions and/or contractions is called a \Index{minor} of $\mathcal{C}$.
Let $d\le n$ be two positive integers and $V$ a set of cardinality $n$. A subset $S\subseteq \binom{V}{d}$ is called \Index{strongly shellable} if the unique complex $\Delta$ over $V$ whose facet set is $S$, is strongly shellable.
If $\mathcal{C}$ is a uniform clutter such that the edge set $\mathcal{E}(\mathcal{C})$ is strongly shellable, we say $\mathcal{C}$ is \Index{edgewise strongly shellable}, abbreviated as ESS.
For a clutter $\mathcal{C}$, the \Index{vertex-complement clutter} $\mathcal{C}^{vc}$ is the clutter on $\mathcal{V}(\mathcal{C})$ such that
\[
\mathcal{E}(\mathcal{C}^{vc})=\Set{\mathcal{V}(\mathcal{C})\setminus E: E\in \mathcal{E}(\mathcal{C})}.
\]
On the other hand, for a $d$-uniform clutter $\mathcal{C}$, the \Index{edge-complement clutter} $\mathcal{C}^{ec}$ is the clutter on $\mathcal{V}(\mathcal{C})$ such that
\[
\mathcal{E}(\mathcal{V}^{ec})=\{E: \left|E\right|=d \text{ and } E\notin \mathcal{E}(\mathcal{C})\}.
\]
The following lemma is a re-statement of Lemma \ref{complement shellable}:
\begin{lemma}
\label{vc}
Let $\mathcal{C}$ be a uniform clutter. Then $\mathcal{C}$ is ESS if and only if its vertex-complement clutter $\mathcal{C}^{vc}$ is ESS.
\end{lemma}
If $\mathcal{C}$ is a clutter, an \Index{independent set} of $\mathcal{C}$ is a subset of $\mathcal{V}(\mathcal{C})$ containing no edge of $\mathcal{C}$. The \Index{independence complex} is
\[
\mathcal{I}(\mathcal{C})\coloneqq\Set{F\subseteq \mathcal{V}(\mathcal{C}): \text{ $F$ is an independent set of $\mathcal{C}$}}.
\]
Fix an integer $d$, which will usually be the minimum edge cardinality of $\mathcal{C}$. Let $c_d(\mathcal{C})$ be the clutter such that $\mathcal{V}(c_d(\mathcal{C}))=\mathcal{V}(\mathcal{C})$ and
\[
\mathcal{E}(c_d(\mathcal{C}))=\{e\subset \mathcal{V}(\mathcal{C}): |e|=d \text{ and }e \notin \mathcal{E}(\mathcal{C})\}.
\]
Edges of $c_d(\mathcal{C})$ will be referred to as \Index{$d$-non-edges} of $\mathcal{C}$.
In the special case that $\mathcal{C}$ is $d$-uniform, $c_d(\mathcal{C})$ is exactly the edge-complement clutter of $\mathcal{C}$.
In general, when $\mathcal{C}$ is not necessarily uniform, it is not difficult to see that $\mathcal{I}(c_d(\mathcal{C}))^\vee$ is the pure simplicial complex whose facet set is
\[
\Set{\mathcal{V}(\mathcal{C})\setminus e: e\in c_d(\mathcal{C})}.
\]
Hence by Lemma \ref{vc}, $\mathcal{I}(c_d(\mathcal{C}))^\vee$ is strongly shellable if and only if $c_d(\mathcal{C})$ is ESS. One also observes that if $\mathcal{C}$ is $d$-uniform, then $\mathcal{F}(\mathcal{I}(c_d(\mathcal{C}))^\vee)=\mathcal{E}((\mathcal{C}^{ec})^{vc})$.
In this section, we will deal with the strong shellability of $\mathcal{I}(c_d(\mathcal{C}))^\vee$ when $\mathcal{C}$ is a chordal clutter. The chordality of finite simple graphs is an important topic in graph theory and commutative algebra. There are many different characterizations; see, for instance, the discussions in \cite{MR0130190, MR2724673}. There are also many non-equivalent generalizations of chordality to higher dimensions. For instance, in the following, we will study the two different chordalities introduced by Woodroofe in \cite{MR2853065} and by Emtander in \cite{MR2603461} respectively. For their relationship, please refer to \cite[Example 4.8]{MR2853065}.
\subsection{Woodroofe's chordality}
Let $\mathcal{C}$ be a clutter. A vertex $v$ of $\mathcal{C}$ is called \Index{simplicial} if for every two distinct edges $e_1$ and $e_2$ of $\mathcal{C}$ that contain $v$, there is a third edge $e_3$ such that $e_3\subseteq (e_1\cup e_2)\setminus \Set{v}$.
A clutter $\mathcal{C}$ is called \Index{W-chordal} if every minor of $\mathcal{C}$ has a simplicial vertex.
Recall that
given a simplicial complex $\Delta$ and a vertex $v$, the \Index{deletion} complex $\Delta\setminus v$ is the simplicial complex
\[
\Delta\setminus v\coloneqq\Set{F\in\Delta\mid v\not \in F},
\]
and the \Index{link} complex $\operatorname{link}_\Delta(v)$ is the simplicial complex
\[
\operatorname{link}_\Delta(v)\coloneqq\Set{F\in \Delta\mid v\notin F \text{ and }\{v\}\cup F \in \Delta}.
\]
On the other hand, a vertex $v$ of a simplicial complex $\Delta$ is called a \Index{shedding vertex} if no facet of $\operatorname{link}_\Delta v$ is a facet of $\Delta\setminus v$.
\begin{theorem}
\label{W-chordal-ss}
If $\mathcal{C}$ is a W-chordal clutter with minimum edge cardinality $d$, then $\mathcal{I}(c_d(\mathcal{C}))^\vee$ is strongly shellable.
\end{theorem}
\begin{proof}
We proceed by induction, with base cases as follows.
\begin{enumerate}[i]
\item If $c_d(\mathcal{C})$ has no edge, then $\mathcal{I}(c_d(\mathcal{C}))^\vee$ is the degenerate complex $\{\}$. There is nothing to show here.
\item If $d=1$ and there is an edge in $c_d(\mathcal{C})$, the clutter $c_d(\mathcal{C})$ is trivially ESS. Therefore, $\mathcal{I}(c_d(\mathcal{C}))^\vee$ is strongly shellable.
\end{enumerate}
For $d\ge 2$, let $v$ be a simplicial vertex of $\mathcal{C}$. By the proof of \cite[Theorem 6.9]{MR2853065}, we have the following two key observations.
\begin{enumerate}[a]
\item \label{part-a} The link
\[
\operatorname{link}_{\mathcal{I}(c_d(\mathcal{C}))^\vee} (v)=\mathcal{I}(c_d(\mathcal{C})\setminus v)^\vee = \mathcal{I}(c_d(\mathcal{C}\setminus v))^\vee.
\]
As $\mathcal{C}\setminus v$ is W-chordal by definition, and has minimum edge cardinality at least $d$, the complex $\mathcal{I}(c_d(\mathcal{C}\setminus v))^\vee$ is either degenerate or by induction strongly shellable.
\item \label{part-b} The deletion
\[
\mathcal{I}(c_d(\mathcal{C}))^\vee\setminus v= \mathcal{I}(c_d(\mathcal{C})/v)^\vee=\mathcal{I}(c_{d-1}(\mathcal{C}/v))^\vee. \label{eqn:deletion}
\]
As $\mathcal{C}/v$ is W-chordal by definition, and has minimum edge cardinality at least $d-1$, the complex $\mathcal{I}(c_{d-1}(\mathcal{C}/v))^\vee$ is either degenerate or by induction strongly shellable.
\end{enumerate}
If $\mathcal{C}\setminus v$ has no non-edge of cardinality $d$, then the vertex $v$ is indeed contained in every edge of $c_d(\mathcal{C})$, hence in no facet of $\mathcal{I}(c_d(\mathcal{C}))^\vee$. In this case, $\mathcal{I}(c_d(\mathcal{C}))^\vee=\mathcal{I}(c_d(\mathcal{C}))^\vee \setminus v$, which by part \ref{part-b} is strongly shellable.
Otherwise, $\mathcal{C}\setminus v$ has at least one non-edge of cardinality $d$. Then $v$ is a shedding vertex in $\mathcal{I}(c_d(\mathcal{C}))^\vee$ by \cite[Lemma 6.8]{MR2853065}. Let $F_1,F_2,\dots,F_m$ be a strong shelling order of the facets of $\operatorname{link}_{\mathcal{I}(c_d(\mathcal{C}))^\vee} (v)$ in part \ref{part-a}. Likewise, let $G_1,G_2,\dots,G_n$ be a strong shelling order of the facets of $\mathcal{I}(c_d(\mathcal{C}))^\vee\setminus v$ in part \ref{part-b}. As $v$ is a shedding vertex, the facet set of $\mathcal{I}(c_d(\mathcal{C}))^\vee$ consists of
\[
G_1,\dots,G_n, F_1\cup \Set{v},\dots,F_m\cup\Set{v}.
\]
We claim that this is a strong shelling order.
It suffice to show that for arbitrary $i\in[n]$ and $j\in[m]$, we can find suitable $i'\in[n]$ such that
\[
\operatorname{dis}(G_{i'},F_j\cup \Set{v})=1\text{ and }\operatorname{dis}(G_{i'},G_i)=\operatorname{dis}(G_i,F_j\cup\Set{v})-1.
\]
Equivalently, we show that
\[
\operatorname{dis}(G_{i'}^c,F_j^c \setminus v)=1 \text{ and } \operatorname{dis}(G_{i'}^c,G_{i}^c)=\operatorname{dis}(G_i^c,F_j^c\setminus v)-1.
\]
The complements are taken with respect to the vertex set $\mathcal{V}(\mathcal{C})$. Therefore, these sets are edges in $c_d(\mathcal{C})$. The case when $\operatorname{dis}(G_i^c,F_j^c\setminus v)=1$ is trivial. Thus, we may assume that $\operatorname{dis}(G_i^c,F_j^c\setminus v)\ge 2$. Note that both $G_i^c$ and $F_j^c$ contain $v$. We only need to find suitable $u\in (F_j^c\setminus v)\setminus G_i^c$ such that $F_j^c \setminus u\in c_d(\mathcal{C})$. Whence, we can take $G_{i'}$ with $G_{i'}^c=F_j^c \setminus u$.
If we cannot find such a vertex $u$, since $\operatorname{dis}(G_i^c,F_j^c\setminus v)\ge 2$, we can take two distinct $u_1,u_2\in (F_j^c\setminus v)\setminus G_i^c$ such that both $e_1\coloneqq F_j^c\setminus u_1$ and $e_2\coloneqq F_j^c\setminus {u_2}$ belong to $\mathcal{C}$. As $v$ is simplicial for $\mathcal{C}$ and belongs to both $e_1$ and $e_2$, we can find suitable edge $e\subseteq (e_1\cup e_2)\setminus v=F_j^c\setminus v$. But the cardinality of $F_j^c \setminus v$ is exactly $d$, the minimum edge cardinality of $\mathcal{C}$. Hence $e=F_j^c\setminus v$ is an edge of $\mathcal{C}$ not containing $v$. This contradicts to the assumption that $F_j^c\setminus v \in c_d(\mathcal{C})$.
\end{proof}
\subsection{Emtander's chordality}
Two distinct vertices $x,y$ of a clutter $\mathcal{H}$ are \Index{neighbors} if there is an edge $E\in \mathcal{E}(\mathcal{H})$, such that $x,y\in E$. For any vertex $x\in \mathcal{V}(\mathcal{H})$, the set of neighbors of $x$ is denoted by $N(x)$, and called the \Index{neighborhood} of $x$. If $N(x)=\varnothing$, $x$ is called \Index{isolated}. Furthermore, we let $N[x]\coloneqq N(x)\cup \Set{x}$ be the \Index{closed neighborhood} of $x$.
The \Index{$d$-complete clutter}, $K_n^d$, on $[n]$, is defined by $\mathcal{E}(K_n^d)=\binom{[n]}{d}$, the set of all subsets of $[n]$ of cardinality $d$. If $n<d$, $K_n^d$ is interpreted as $n$ isolated points.
A clutter $\mathcal{C}$ is said to have a \Index{perfect elimination order} if its vertices can be ordered $x_1,x_2,\dots, x_n$ such that for each $i$, either the induced subclutter $\mathcal{C}_{N[x_i]\cap \{x_i,x_{i+1},\dots,x_n\}}$ is isomorphic to a $d$-complete clutter $K_m^d$ for some $m\ge d$, or else $x_i$ is isolated in $\mathcal{C}_{\{x_i,x_{i+1},\dots,x_n\}}$. By \cite[Lemma 2.2]{MR2603461}, if $\mathcal{C}$ has a perfect elimination order and $\mathcal{E}(\mathcal{C})\ne \emptyset$, then $\mathcal{C}$ has a perfect elimination order $x_1,\dots,x_n$ such that $x_1$ is not isolated.
An \Index{E-chordal clutter} is a $d$-uniform clutter, obtained inductively as follows:
\begin{enumerate}[a]
\item $K_n^d$ is an E-chordal clutter for any $n,d\in {\mathbb N}$.
\item If $\mathcal{K}$ is E-chordal, then so is $\mathcal{C}=\mathcal{K}\cup_{K_j^d}K_i^d$ for some $0\le j<i$. Here, we attach $K_i^d$ to $\mathcal{K}$ by identifying suitable common $K_j^d$.
\end{enumerate}
\begin{lemma}
[{\cite[Theorem-Definition 2.1]{MR2603461}}]
\label{perfect-elimination}
Let $\mathcal{C}$ be a $d$-uniform clutter. Then $\mathcal{C}$ is E-chordal if and only if it has a perfect elimination order.
\end{lemma}
\begin{lemma}
[{\cite[Theorem 4.3]{MR2853077}}]
Let $\mathcal{C}$ be a $d$-uniform E-chordal clutter. Then $ \mathcal{I}(c_d(\mathcal{C}))^\vee$ is shellable.
\end{lemma}
The above shellability result can be strengthened as follows.
\begin{theorem}
\label{E-chordal-ss}
Let $\mathcal{C}$ be a $d$-uniform E-chordal clutter.
Then $ \mathcal{I}(c_d(\mathcal{C}))^\vee$ is strongly shellable.
\end{theorem}
\begin{lemma}
\label{layers of matroids}
Let $X$ and $Y$ be two disjoint finite sets. Let
\[
B_{p,q}=\{X'\cup Y':X'\subseteq X \text{ and } Y'\subseteq Y \text{ with }|X'|=p \text{ and }|Y'|=q\}.
\]
Fix a positive integer $\lambda$. For indices $i$ and $j$ with $\max(0,\lambda-|Y|)\le i\le j \le \min(\lambda,|X|)$, let
\[
A_{i,j}=\bigcup_{i\le k\le j}B_{k,\lambda-k}.
\]
Then $A_{i,j}$ is strongly shellable.
\end{lemma}
\begin{proof}
Let $\Delta$ be the simplicial complex whose facet set is $A_{i,j}$.
Obviously,
\[
\Delta=\{X'\cup Y' : \text{ $X'\subseteq X$ and $Y'\subseteq Y$ with $|X'|\le j$, $|Y'|\le \lambda-i$ and $|X'|+|Y'|\le \lambda$} \}.
\]
For every subset $W\subseteq X\cup Y$, the induced subcomplex
\begin{align*}
\Delta_W= \{X'\cup Y' :& \text{ $X'\subseteq X\cap W$ and $Y'\subseteq Y\cap W$ with}\\
& \text{ $|X'|\le j$, $|Y'|\le \lambda-i$ and $|X'|+|Y'|\le \lambda$} \}.
\end{align*}
This subcomplex is clearly pure. Hence $\Delta$ is a matroid complex. By Proposition \ref{matroid implies ss}, $\Delta$ is strongly shellable, i.e., $A_{i,j}$ is strongly shellable.
\end{proof}
\begin{proof}
[Proof of Theorem \ref{E-chordal-ss}]
We prove by induction. The base cases have already been discussed in the proof for Theorem \ref{W-chordal-ss}. Since $\mathcal{C}$ is E-chordal, it has a perfect elimination order $x_1,x_2,\dots,x_n$ on the vertex set. Take $v=x_1$.
Note that $\mathcal{C}_{\{x_2,\dots,x_n\}}$ is still E-chordal. Thus, by induction, the link complex $\operatorname{link}_{\mathcal{I}(c_d(\mathcal{C}))^\vee}(v)=\mathcal{I}(c_d(\mathcal{C}\setminus v))^\vee$ is strongly shellable. On the other hand, we always have $\mathcal{I}(c_d(\mathcal{C}))^\vee\setminus v= \mathcal{I}(c_d(\mathcal{C})/v)^\vee$.
By the elimination condition, the vertex $v$ is clearly a simplicial vertex. As in the proof for Theorem \ref{W-chordal-ss}, either $v$ is a shedding vertex, or else $\mathcal{I}(c_d(\mathcal{C}))^\vee=\mathcal{I}(c_d(\mathcal{C}))^\vee\setminus v$. In both cases, we are reduced to consider $\mathcal{I}(c_d(\mathcal{C})/v)^\vee$.
Let $N=N(x_1)$ be the neighborhood of $x_1$. By \cite[Lemma 6.7]{MR2853065}, $c_d(\mathcal{C})/v=c_{d-1}(\mathcal{C}/v)$. Its edge set is
\[
\big \{e\subseteq \{x_2,\dots,x_n\}: |e|=d-1 \text{ and }e\not\subset N \big\}.
\]
If we take $X=\Set{x_2,\dots,x_n}\setminus N$ and $Y=N$, then the above edge set is $A_{1,\min(d-1,n-1-|N|)}$ for $\lambda=d-1$ in Lemma \ref{layers of matroids}. Thus, it is strongly shellable. Equivalently, $\mathcal{I}(c_d(\mathcal{C})/v)^\vee$ is strongly shellable.
The rest of the proof will be essentially the same as that for Theorem \ref{W-chordal-ss}.
\end{proof}
\begin{remark}
Under the same assumptions as in Theorems \ref{W-chordal-ss} and \ref{E-chordal-ss}, Woodroofe \cite[Theorem 6.9, Proposition 6.11]{MR2853065} showed that $\mathcal{I}(c_d(\mathcal{C}))^\vee$ is also vertex decomposable respectively. On the other hand, by \cite[Examples 6.7 and 6.9]{SSC}, we know that there is no implication between strongly shellable complexes and vertex decomposable complexes.
\end{remark}
\begin{remark}
\label{two-questions}
Bigdeli, Yazdan Pour and Zaare-Nahandi \cite{arXiv:1508.03799} also introduced chordal property for $d$-uniform clutters. Following their notation, denote this class by $\mathfrak{C}_d$. Among others, they showed the following relation for $d$-uniform clutters:
\begin{center}
\begin{tabular}{r}
W-chordal\\
E-chordal
\end{tabular}
$\bigg\} \subsetneq \mathfrak{C}_d \subseteq \mbox{LinRes}$
\end{center}
Here, LinRes is the class of $d$-uniform clutters whose edge ideals have a linear resolution over any field. Furthermore, they asked the following two questions.
\begin{enumerate}[1]
\item Does there exist any $d$-uniform clutter $\mathcal{C}$ such that the ideal $I (\bar{\mathcal{C}})$ has a linear resolution over any field, but $\mathcal{C}$ is not in the class $\mathfrak{C}_d$?
\item Find a subclass of chordal clutters $\mathcal{C}$ such that their associated ideals $I(\bar{\mathcal{C}})$ have linear quotients.
\end{enumerate}
On the other hand, by Lemma \ref{complement shellable}, Theorems \ref{linear quotients}, \ref{W-chordal-ss} and \ref{E-chordal-ss}, we have
\begin{center}
\begin{tabular}{r}
W-chordal\\
E-chordal
\end{tabular}
$\bigg\} \subsetneq \mbox{CESS} \subseteq \mbox{LinRes}$
\end{center}
Here, CESS denotes the class of $d$-uniform clutters whose (edge)-complement clutter is ESS. By this fact, one might be tempted to ask if CESS is a subclass of $\mathfrak{C}_d$. For the time being, we don't have an answer, though extensive computational examples suggest so. Matroid complexes are typical strongly shellable complexes. But as a matter of fact, it is not clear so far whether the complement of matroid complexes belong to $\mathfrak{C}_d$; see \cite[Proposition 2.2]{arXiv:1601.03207} and the remark after that. Only one thing is for sure: if CESS is not a subclass of $\mathfrak{C}_d$, then we have an answer for the first question.
\end{remark}
\section{Edgewise strongly shellable graphs}
Throughout this section, we focus on 2-uniform clutters, which are actually finite simple graphs. Recall that if $G$ is a \Index{finite simple graph} with the vertex set $\mathcal{V}(G)$ and the edge set $\mathcal{E}(G)$, then $|\mathcal{V}(G)|$ is finite and $\mathcal{E}(G)\subseteq \Set{ \{u,v\}\mid \text{$u,v\in \mathcal{V}(G)$ are distinct}}$.
The \Index{complement graph} $\bar{G}$ is the finite simple graph with identical vertex set and $\{u,v\}\in \mathcal{E}(\bar{G})$ if and only if $\{u,v\}\notin \mathcal{E}(G)$ for distinct $u,v\in \mathcal{V}(G)$.
The \Index{neighborhood} of $v$ in $G$ is $N_G(v)\coloneqq\set{u\in \mathcal{V}(G)\mid \{u,v\}\in\mathcal{E}(G)}$ and its cardinality is called the \Index{degree} of $v$.
And a vertex $v\in \mathcal{V}(G)$ is \Index{isolated} if its degree is $0$, i.e., there exists no edge containing $v$ in $G$. A vertex is a \Index{leaf} if its degree is $1$.
Recall that a \Index{cycle} of $G$ of length $q\ge 3$ is a subgraph $C$ of $G$ such that
\[
\mathcal{E}(C) = \Set{\Set{i_1 ,i_2 },\Set{i_2 ,i_3 }, \dots ,\Set{i_{q-1} ,i_q },\Set{i_q ,i_1 }},
\]
where $i_1 ,i_2 ,\dots,i_q$ are distinct vertices of $G$. A \Index{chord} of a cycle $C$ is an edge $\Set{i,j}$ of $G$ such that $i$ and $j$ are vertices of $C$ with $\Set{i,j} \notin \mathcal{E}(C)$. A \Index{chordal graph} is a finite graph each of whose cycles of length $> 3$ has a chord. Note that W-chordal 2-uniform clutters, E-chordal 2-uniform clutters and chordal graphs coincide.
Given a finite simple graph $G$, a subset $C$ of $\mathcal{V}(G)$ is called a \Index{clique} of $G$ if for all distinct $i$ and $j$ in $C$, one has $\Set{i,j}\in \mathcal{E}(G)$. A \Index{perfect elimination ordering} of $G$ is an ordering $i_1,\dots,i_n$ of the vertices of G such that for each $j$ with $1 \le j < n$,
\[
C_{i_j}= \big\{i_k \in \mathcal{V}(G) \mid j<k\le n,\{i_k ,i_j \} \in \mathcal{E}(G)\big\}
\]
is a clique of $G$. This is obviously a special case of the perfect elimination order that we encountered when discussing Emtander's chordality. The following result is clear.
\begin{lemma}
\label{peo-restriction}
Suppose that $O: v_1,\dots,v_n$ gives a perfect elimination order for $G$. Then for arbitrary nonempty subset $V'$ of $\mathcal{V}(G)$, the restriction of $O$ on $V'$ gives a perfect elimination order for the induced subgraph $G_{V'}$.
\end{lemma}
For a finite simple graph $G$ with $\mathcal{V}(G)=[n]$, its edge ideal is
\[
I(G)=\braket{x_ix_j\mid \{i,j\}\in\mathcal{E}(G)} \subset S={\mathbb K}[x_1,\dots,x_n]
\]
for some base field ${\mathbb K}$.
If instead $\mathcal{V}(G)=\Set{x_1,\dots,x_n}$, then the edge ideal is
\[
I(G)=\braket{x_ix_j\mid \{x_i,x_j\}\in \mathcal{E}(G)}\subset S.
\]
\begin{remark}
\label{ESS-graph}
Let $G$ be a finite simple graph. Notice that a strong shelling order $\succ$ on the edge set $\mathcal{E}(G)=\{E_1,\dots,E_t\}$ simply means that whenever we have two disjoint edges $E_i\succ E_j$, then we can find some $E_k \succ E_j$ that intersects both $E_i$ and $E_j$ non-trivially. In other words, to check the strong shellability of $\succ$, one only needs to check non-adjacent edges.
\end{remark}
The main result of this section is as follows.
\begin{theorem}
\label{ssg and chordal graph}
Let $G$ be a finite simple graph. Then the following conditions are equivalent:
\begin{enumerate}[1]
\item \label{SSGC-1} $G$ is ESS.
\item \label{SSGC-2} The edge ideal $I(G)$ has linear quotients.
\item \label{SSGC-3} The edge ideal $I(G)$ has a linear resolution.
\item \label{SSGC-4} The complement graph $\bar{G}$ is chordal.
\item \label{SSGC-5} The complement graph $\bar{G}$ has a perfect elimination ordering.
\end{enumerate}
\end{theorem}
\begin{proof}
The ``$\ref{SSGC-1}\Rightarrow \ref{SSGC-2}$'' part is due to Theorem \ref{linear quotients}. The ``$\ref{SSGC-2}\Rightarrow \ref{SSGC-3}$'' part is well-known, cf.~\cite[Lemma 1.5]{MR1918513}. The equivalence between \ref{SSGC-3} and \ref{SSGC-4} is due to \cite{MR1171260}. And the equivalence between $\ref{SSGC-4}$ and $\ref{SSGC-5}$, as far as we know, can be traced back to \cite{MR0130190,MR0186421,MR0270957}.
The ``$\ref{SSGC-4}\Rightarrow \ref{SSGC-1}$'' part is due to Theorems \ref{W-chordal-ss} or \ref{E-chordal-ss}, together with Lemma \ref{complement shellable}.
\end{proof}
For completeness, we will also demonstrate the direct proofs of $\ref{SSGC-5}\Rightarrow \ref{SSGC-1}\Rightarrow \ref{SSGC-4}$ and $\ref{SSGC-3}\Rightarrow \ref{SSGC-1}$ respectively. Before that, we first show two quick corollaries to the above characterization.
\begin{definition}
[{\cite[Definition 2.3]{arXiv:1601.00456}}]
Let $\mathcal{C}$ be a clutter with the vertex set $\mathcal{V}(\mathcal{C})=\Set{x_1,\dots,x_n}$ and $s_1,\dots,s_n$ be arbitrary positive integers. The $(s_1,\dots,s_n)$-expansion of $\mathcal{C}$, denoted by $\mathcal{C}^{(s_1,\dots,s_n)}$, is the clutter with the vertex set $\Set{x_{i,j}\mid 1\le i\le n, 1\le j\le s_i}$ and the edge set
\begin{align*}
\Set{\{x_{i_1,r_1},\dots, x_{i_t,r_t}\} \mid \{x_{i_1},\dots, x_{i_t}\}\in \mathcal{E}(\mathcal{C}) \text{ and } (r_1,\dots,r_{t})\in [s_{i_1}]\times \cdots \times [s_{i_{t}}]} \cup \\
\Set{\{x_{i,j},x_{i,k}\} \mid \ 1\le i\le n, \ 1\le j\neq k\le s_i}.
\end{align*}
\end{definition}
Now, we can recover the following result of \cite[Proposition 2.6]{arXiv:1601.00456}.
\begin{corollary}
\label{expansion-complex-chordal}
For any positive integers $s_1,\ldots,s_n$, $G$ is a chordal graph if and only if $G^{(s_1,\dots,s_n)}$ is chordal.
\end{corollary}
\begin{proof}
Let $\Delta$ be the one-dimensional pure simplicial complex over $\mathcal{V}(G)=\Set{x_1,\dots,x_n}$ whose facet set is $\mathcal{E}(\bar{G})$ where $\bar{G}$ is the complement graph of $G$ with respect to $\mathcal{V}(G)$. Let $G'$ be the facet graph of $\Delta^{(s_1,\dots,s_n)}$. Obviously, $G'$ is also the complement graph of $G^{(s_1,\dots,s_n)}$ with respect to $\mathcal{V}(\Delta^{(s_1,\dots,s_n)})=\Set{x_{i,j}\mid 1\le i\le n, 1\le j\le s_i}$. Now, it suffices to apply Theorems \ref{expansion-complex} and \ref{ssg and chordal graph}.
\end{proof}
Recall that for a graph $G$, a property $P$ is \Index{hereditary} if the property $P$ holds for every induced subgraph of $G$ whenever it holds for $G$.
\begin{corollary}
For finite simple graphs, ESS property is hereditary.
\end{corollary}
\begin{proof}
It is well-known that chordality is hereditary. Thus, we can apply the equivalence between \ref{SSGC-1} and \ref{SSGC-4} in Theorem \ref{ssg and chordal graph}.
\end{proof}
Of course, this easy statement can be proved directly and generalized to higher dimensions.
\begin{proposition}
Let $\mathcal{C}$ be a uniform ESS clutter and $W\subseteq \mathcal{V}(\mathcal{C})$. Then the induced sub-clutter $\mathcal{C}_W:=\Set{E\in \mathcal{E}(\mathcal{C}):E\subseteq W}$ is also ESS.
\end{proposition}
\begin{proof}
Suppose that $\succ$ gives a strong shelling order on $\mathcal{E}(\mathcal{C})$ and let $\succ'$ be its restriction on $\mathcal{E}(\mathcal{C}_W)$. Take arbitrary distinct $F,G\in \mathcal{C}_W$ with $F\succ' G$. Then $F\succ G$ with $F\subseteq W$ and $G\subseteq W$. By the strong shellability of $\succ$, one can find suitable $H\in \mathcal{E}(\mathcal{C})$ such that $H\succ G$, $\operatorname{dis}(G,H)=1$ and $F\cap G \subseteq H \subseteq F\cup G$. It follows immediately that $H\subseteq W$, and therefore $H\in \mathcal{E}(\mathcal{C}_W)$. By the definition of $\succ'$, we have $H\succ' G$ such that $\operatorname{dis}(G,H)=1$ and $F\cap G \subseteq H \subseteq F\cup G$. This shows that $\succ'$ is a strong shelling order and $\mathcal{C}_W$ is ESS.
\end{proof}
\subsection{Perfect elimination order, chordality and ESS graphs}
\begin{proof}
[Proof of $\ref{SSGC-5}\Rightarrow \ref{SSGC-1}$ in Theorem \ref{ssg and chordal graph}]
We will prove by induction on $|\mathcal{V}(G)|$ with the base case of $|\mathcal{V}(G)|=2$ being trivial. Now, suppose that $|\mathcal{V}(G)|=n\ge 3$ and there exists a perfect elimination order on $\overline{G}$: $v_1, \dots, v_n$. It follows from Lemma \ref{peo-restriction} that $v_{1}, \dots, v_{n-1}$ is also a perfect elimination order for the induced subgraph $\overline{G}_{\{v_1,\dots,v_{n-1}\}}$. By induction, the induced subgraph $G'\coloneqq G_{\{v_1,\dots,v_{n-1}\}}$, as the complement of $\overline{G}_{\{v_1,\dots,v_{n-1}\}}$, is ESS. Therefore, there exists a strong shelling order $\succ'$ on the edge set $\mathcal{E}(G')$: $e_1, \dots, e_t$. We can define a total order $\succ$ on $\mathcal{E}(G)$ as follows.
\begin{enumerate}[a]
\item If $e_i, e_j \in \mathcal{E}(G')$, $e_i \succ e_j$ if and only if $e_i \succ' e_j$.
\item For the edges $\{v_i, v_n\}$ and $\{v_j, v_n\}$, $\{v_i, v_n\} \succ \{v_j, v_n\}$ if and only if $i<j$.
\item For each edge $e_i \in \mathcal{E}(G')$ and edge $\{v_j, v_n\}$, $e_i \succ \{v_j, v_n\}$.
\end{enumerate}
In the following, we will show that the order $\succ$ is a strong shelling order on $\mathcal{E}(G)$. In fact, by Remark \ref{ESS-graph}, we only need to show that for an edge $e_i \in \mathcal{E}(G')$ and an edge $\{v_j, v_n\}$, if they are not adjacent, then there exists an edge $e \succ \{v_j, v_n\}$ which is adjacent to both $e_i$ and $\{v_j, v_n\}$.
Assume that $e_i=\{v_l, v_k\}$ and $l<k$.
Then $G''\coloneqq \bar{G}_{\{v_l,v_j,v_k,v_n\}}$ has an induced perfect elimination order by Lemma \ref{peo-restriction}.
Now, consider the following two cases.
\begin{enumerate}[a]
\item If $j < l$, then either $\{v_j, v_l\} \in \mathcal{E}(G)$ or $\{v_j, v_k\} \in \mathcal{E}(G)$. In fact, if neither happens, then
$\{v_l, v_k\} \in \mathcal{E}(\overline{G})$ by the definition of perfect elimination ordering. It contradicts to the fact that $\{v_l, v_k\} \in \mathcal{E}(G)$. Note that $\{v_j, v_l\} \succ \{v_j, v_n\}$ and $\{v_j, v_k\} \succ \{v_j, v_n\}$ in this case.
\item If $l < j$, then, as the discussion above, either $\{v_l, v_j\} \in \mathcal{E}(G)$ or $\{v_l, v_n\} \in \mathcal{E}(G)$. Note that $\{v_l, v_j\} \succ \{v_j, v_n\}$ and $\{v_l, v_n\} \succ \{v_j, v_n\}$ in this case.
\end{enumerate}
In both cases, we are able to find an edge $e \succ \{v_j, v_n\}$ which is adjacent to both $\{v_l, v_k\}$ and $\{v_j, v_n\}$. This completes the proof.
\end{proof}
\begin{proof}
[Proof of $\ref{SSGC-1}\Rightarrow \ref{SSGC-4}$ in Theorem \ref{ssg and chordal graph}]
Assume that $G$ is ESS. Then, for each pair of edges $\{v_i, v_j\}$ and $\{v_l, v_k\}$ with no common vertex, they are adjacent to a common edge by Remark \ref{ESS-graph}. This implies that one of $\{v_i, v_l\}$, $\{v_i, v_k\}$, $\{v_j, v_l\}$ and $\{v_j, v_k\}$ is an edge in $\mathcal{E}(G)$. In other words, any cycle with 4 vertices in $\overline{G}$ must have a chord.
We will complete the proof by contradiction. If $\overline{G}$ is not chordal, then there exists a minimal cycle with more than 3 vertices in $\overline{G}$. Let $e_1, \dots, e_t$ be a strong shelling order on $\mathcal{E}(G)$. Let $G_s=G\setminus \Set{e_t,e_{t-1},\dots,e_{s+1}}$. Note that removing edges successively from $\mathcal{E}(G)$ amounts to adding corresponding edges successively to $\mathcal{E}(\overline{G})$. Therefore, we can find suitable $s\ge 1$ such that $\overline{G_s}$ contains a minimal cycle with $4$ vertices. Note that $e_1, \dots, e_s$ is a strong shelling order on $\mathcal{E}(G_s)$. This provides a contradiction.
\end{proof}
\subsection{Linear resolution and ESS graphs}
Given a finite simple graph $G$, a simple graph $H$ is called a \Index{quotient graph} of $G$ if there exists a surjective map $f:\mathcal{V}(G)\to \mathcal{V}(H)$, such that
\begin{enumerate}[a]
\item if $u_1,u_2\in \mathcal{V}(G)$ such that $\{u_1,u_2\}\in \mathcal{E}(G)$ and $f(u_1)\ne f(u_2)$, then $\{f(u_1),f(u_2)\}\in \mathcal{E}(H)$;
\item if $\{v_1,v_2\}\in \mathcal{E}(H)$, then there exists $\{u_1,u_2\}\in \mathcal{E}(G)$ such that $f(u_1)=v_1$ and $f(u_2)=v_2$.
\end{enumerate}
The map $f$ here will be called a \Index{quotient map}.
For simplicity, we will denote the edge $\{f(u_1),f(u_2)\}$ by $f(\{u_1,u_2\})$.
Note that if the edge ideals $I(G)\subset S={\mathbb K}[x_g:g\in G]$ and $I(H)\subset T={\mathbb K}[x_h:h\in H]$ and let $\varphi_f$ be the natural map from $S$ to $T$ sending $x_g$ with $g\in G$ to $x_{f(g)}$ with $f(g)\in H$, it is possible that $\varphi_f(I(G))\ne I(H)$. This happens if and only if
$\varphi_f(I(G))$ contains square monomials, i.e., for some $h\in H$, one can find some $g_1,g_2\in f^{-1}(h)$ such that $\{g_1,g_2\}\in \mathcal{E}(G)$. Thus, we will call the quotient map $f$ to be \Index{proper}, if for each $h\in H$, ${f^{-1}(h)}$ is an independent subset of $\mathcal{V}(G)$. Whence, $H$ is a \Index{proper quotient graph} of $G$.
\begin{example}
Let $G$ be the simple graph on the left side of Figure \ref{Fig:quotient-graph} over the vertex set $\{a,b_1,b_2,c\}$. Let $H$ be the simple graph on the right side of Figure \ref{Fig:quotient-graph} over the vertex set $\{a,b,c\}$. The map $f:G\to H$ sending both $b_1$ and $b_2$ to $b$ while keeping other vertices, is a non-proper quotient map. The image of the edge ideal $I(G)$ is $\braket{ab,b^2,bc}$, which is not $I(H)=\braket{ab,bc}$.
\begin{figure}[!ht]
\ffigbox[\FBwidth]{}{{
\begin{subfloatrow}[2]
\ffigbox{\caption{$G$}}{
\begin{minipage}[h]{\linewidth} \centering
\includegraphics{1.pdf}
\end{minipage}
}
\ffigbox{\caption{$H=f(G)$}}{
\begin{minipage}[h]{\linewidth} \centering
\includegraphics{2.pdf}
\end{minipage}
}
\end{subfloatrow}}
\caption{Quotient graph} \label{Fig:quotient-graph}}
\end{figure}
\end{example}
\begin{lemma}
\label{quotient-graph}
Let $G$ be an ESS graph. If $H$ is a quotient graph of $G$, then $H$ is also ESS.
\end{lemma}
\begin{proof}
Let $\succ_G$ be a strong shelling order on $\mathcal{E}(G)$. Assume that $f:\mathcal{V}(G)\to \mathcal{V}(H)$ is the quotient map. For each $e\in \mathcal{E}(H)$, let $\tilde{e}$ be the least edge in $f^{-1}(e)$ with respect to $\succ_G$. We define the induced order $\succ_H$ as follows:
\[
\text{$e_1\succ_H e_2$ if and only if $\tilde{e}_1\succ_G \tilde{e}_2$.}
\]
Since $G$ is ESS, when $e_1\succ_H e_2$, either $\tilde{e}_1$ is adjacent to $\tilde{e}_2$, or $\tilde{e}_1$ can be connected with $\tilde{e}_2$ by some edge $\{u_1,u_2\}$ such that $\{u_1,u_2\}\succ_G \tilde{e}_2$. In the former case, $e_1$ is adjacent to $e_2$. In the latter case, if $f(u_1)\ne f(u_2)$, then $e_1$ can be connected with $e_2$ by $e_3=f(\{u_1,u_2\})$ with the property that $e_3\succ_H e_2$. Otherwise, $f(u_1)=f(u_2)$. Hence $e_1$ and $e_2$ are adjacent.
\end{proof}
Let $G$ be a finite simple graph. A \Index{blow-up} of $G$ at the vertex $v\in \mathcal{V}(G)$ is the new graph $H$ such that
\begin{enumerate}[a]
\item $\mathcal{V}(H)=(\mathcal{V}(G)\setminus{v})\cup \{v_1,\dots,v_m\}$ with $\{v_1,\dots,v_m\}\cap \mathcal{V}(G)=\varnothing$;
\item $\mathcal{E}(H)$ consists of the following two parts:
\begin{enumerate}[i]
\item $\mathcal{E}(G\setminus v)$;
\item $\big\{ \{v_i,u\} \mid 1\le i \le m \text{ and } \{v,u\}\in \mathcal{E}(G)\big\}$.
\end{enumerate}
\end{enumerate}
If graph $G'$ can be obtained from $G$ by a sequence of blow-ups, $G'$ will be called a \Index{blow-up graph} of $G$.
\begin{lemma}
Let $H$ be a blow-up graph of $G$. If $G$ is ESS, then so is $H$.
\label{blow-up}
\end{lemma}
\begin{proof}
Without loss of generality, we may assume that
$\mathcal{V}(G)=\Set{x_1,\dots,x_n}$ and
$H$ is a blow-up of $G$ at the vertex $x_1$. Let $\Delta$ and $\Delta'$ be the one-dimensional pure simplicial complexes whose facet graphs are $G$ and $H$ respectively. Then $\Delta'=\Delta^{(s_1,1,\dots,1)}$ for some positive integer $s_1$. Now, we apply the ``only if'' part of Theorem \ref{expansion-complex}.
\end{proof}
Let $T$ be a tree, i.e., a connected finite simple graph which contains no cycle. Without loss of generality, we may assume that $\mathcal{V}(T)=[n]$. Note that for arbitrary vertices $i$ and $j$ of $T$, there exists a unique path $P:i=i_0,i_1,\dots,i_r=j$ from $i$ to $j$. Following \cite{MR2457194}, $b(i,j)\coloneqq i_1$ is called the \Index{begin} of $P$ and $e(i,j)=i_{r-1}$ is the \Index{end} of $P$. We can attach a \Index{generic matrix} $A(T)$ to $T$ as follows. Assume that $\mathcal{E}(T)=\Set{e_1,\dots,e_{n-1}}$. For each edge $e_k=\{i,j\}$ with $i<j$, the $k$-th row of $A(T)$ is
\[
r_k=-x_{i,j}\varepsilon_i+x_{j,i}\varepsilon_{j}.
\]
Here $\varepsilon_i$ is the $i$-th canonical unit vector in ${\mathbb R}^n$.
On the other hand, after \cite{arXiv:1508.07119}, we can associate a special graph $G_T$ to the tree $T$. The vertices of the graph $G_T$ is given by
\[
\mathcal{V}(G_T)=\big\{x_{i,j},x_{j,i}\mid \{i,j\}\in \mathcal{E}(T)\big\}.
\]
And $\{x_{i,k},x_{j,l}\}$ is an edge of $G_T$ if and only if there exists a path $P$ from $i$ to $j$ such that $k=b(i,j)$ and $l=e(i,j)$. The graph $G_T$ will be called the \Index{generic bi-CM graph} (abbreviated as \Index{generic graph}) attached to $T$.
\begin{example}
\label{example-2-trees}
For instance, for the two trees in Figure \ref{trees}, we have the corresponding generic matrices
\[
A(T_1)=
\begin{pmatrix}
-x_{1,2} & x_{2,1} & 0 & 0 \\
-x_{1,3} & 0 & x_{3,1} & 0 \\
-x_{1,4} & 0 & 0 & x_{4,1}
\end{pmatrix}
\]
and
\[
A(T_2)=
\begin{pmatrix}
-x_{1,2} & x_{2,1} & 0 & 0 \\
0 & -x_{2,3} & x_{3,2} & 0 \\
0 & 0 & -x_{3,4} & x_{4,3}
\end{pmatrix},
\]
and the attached generic graphs in Figure \ref{GT}.
\end{example}
\begin{figure}[!ht]
\ffigbox[\FBwidth]{}{{
\begin{subfloatrow}[2]
\ffigbox{\caption{$T_1$}}{
\begin{minipage}[h]{\linewidth} \centering
\includegraphics{3.pdf}
\end{minipage}
}
\ffigbox{\caption{$T_2$}}{
\begin{minipage}[h]{\linewidth} \centering
\includegraphics{4.pdf}
\end{minipage}
}
\end{subfloatrow}}
\caption{Some trees} \label{trees} }
\end{figure}
\begin{figure}[!ht]
\ffigbox[\FBwidth]{}{{
\begin{subfloatrow}[2]
\ffigbox{\caption{$G_{T_1}$}}{
\begin{minipage}[h]{\linewidth} \centering
\includegraphics{5.pdf}
\end{minipage}
}
\ffigbox{\caption{$G_{T_2}$}}{
\begin{minipage}[h]{\linewidth} \centering
\includegraphics{6.pdf}
\end{minipage}
}
\end{subfloatrow}}
\caption{Corresponding generic graphs} \label{GT} }
\end{figure}
In the following, we will discuss the properties of the generic graph of a tree with at least $3$ vertices, since the $2$-vertices case is clear. The following observations are easy to check.
\begin{observation}
\label{obs}
\begin{enumerate}[a,leftmargin=6mm]
\item If $i$ is a leaf in $T$, and $k$ is the unique vertex adjacent to $i$, then in the generic graph $G_T$, $x_{k, i}$ is a leaf, and $x_{i, k}$ is the unique vertex adjacent to $x_{k, i}$ in $G_T$.
\item Let $i, j$ be two leaves in $I$, and let $k, l$ be the unique vertices adjacent to $i$ and $j$ respectively. Then in the unique path connecting $i$ and $j$, $b(i,j)=k$ and $e(i,j)=l$. Hence in the generic graph $G_T$, $\{x_{i,k}, x_{j,l}\} \in \mathcal{E}(G_T)$.
\end{enumerate}
\end{observation}
\begin{lemma}
\label{replaced by leaf}
Let $G_T$ be the generic graph of a tree $T$. If $x_{i_1,k_1}, x_{i_2,k_2}, \dots, x_{i_t,k_t}$ are adjacent to $x_{j_1,l_1}$ in $G_T$, then there exists a leaf $x_{l_2, j_2}$, such that $x_{j_2,l_2}$ is adjacent to all of $x_{i_1,k_1}, x_{i_2,k_2}, \dots, x_{i_t,k_t}$.
\end{lemma}
\begin{proof}
If $j_1$ is a leaf in the graph $T$, then $x_{l_1, j_1}$ is a leaf in $G_T$ satisfying the requirement.
If $j_1$ is not a leaf in the graph $T$, then there exists a leaf $j_2$, such that $b(j_1, j_2) \neq l_1$. Assume that $e(j_1, j_2) = l_2$. It is clear that $x_{l_2, j_2}$ is a leaf in the generic graph $G_T$, and $N(x_{j_1,l_1}) \subseteq N(x_{j_2,l_2})$.
\end{proof}
Given a finite simple graph $G$, the \Index{clique number} of $G$ is the largest cardinality of the cliques in $G$.
\begin{proposition}
\label{clique number}
Let $G_T$ be the generic graph of a tree $T$. Then the following quantities coincide:
\begin{enumerate}[1]
\item \label{q-1} The clique number of $G_T$;
\item \label{q-2} the number of leaves in $G_T$;
\item \label{q-3} the number of leaves in $T$.
\end{enumerate}
\end{proposition}
\begin{proof}
Take an arbitrary vertex $x_{l,j}\in \mathcal{V}(G_T)$.
If $j$ is a leaf in $T$, then $l$ is the unique vertex adjacent to $j$ in $G$. Thus, by Observation \ref{obs}, $x_{l,j}$ is a leaf in $G_T$.
On the other hand, if $j$ is not a leaf in $T$, then there exists another vertex, say, $k$, adjacent to $j$ in $G$. As $\{x_{l,j}, x_{j,l}\}, \{x_{l,j}, x_{k,j}\} \in \mathcal{E}(G_T)$, it is clear that $x_{l,j}$ is not a leaf in $G_T$. Hence, \ref{q-2} is identical to \ref{q-3}.
Assume that $j_1, j_2, \dots, j_t$ are all the leaves in $T$, and the unique vertices adjacent to them are $l_1, l_2, \dots, l_t$ respectively. We claim that $\Set{x_{j_1,l_1}, x_{j_2,l_2}, \dots, x_{j_t,l_t}}$ is a maximum clique of $G_T$. If fact, for distinct $a,b \in [t]$, it is clear that $b(j_a, j_b)=l_a$ and $e(j_a, j_b)=l_b$. Therefore, $x_{j_1,l_1}, x_{j_2,l_2}, \dots, x_{j_t,l_t}$ is a clique of $G_T$.
On the other hand, assume that $\Set{x_{i_1, k_1}, x_{i_2, k_2}, \dots, x_{i_s, k_s}}$ is also a maximum clique of $G_T$. By Lemma \ref{replaced by leaf}, if $x_{k_a,i_a}$ is not a leaf of $G_t$, we can replace $x_{i_a, k_a}$ by suitable $x_{j_{a'},l_{a'}}$ and get a clique of same size.
As we will check all the vertices in this maximum clique and do the replacement whenever necessary, we arrive at the expected inequality $s \leq t$.
Hence, the maximum clique number is indeed $t$, i.e., \ref{q-1} is identical to \ref{q-2}.
\end{proof}
Next, we study the diameter of the generic graph of a tree.
\begin{lemma}
\label{there is edge}
Let $G_T$ be the generic graph of a tree $T$. If $\{x_{i_1,k_1}, x_{j_1,l_1}\}$ and $\{x_{i_2,k_2}, x_{j_2,l_2}\}$ are two edges of $G_T$, then at least one of the following four edges belongs to $\mathcal{E}(G_T)$: $\{x_{i_1,k_1}, x_{i_2,k_2}\}$, $\{x_{i_1,k_1}, x_{j_2,l_2}\}$, $\{x_{j_1,l_1}, x_{i_2,k_2}\}$, $\{x_{j_1,l_1}, x_{j_2,l_2}\}$.
\end{lemma}
\begin{proof}
As $\{x_{i_1,k_1}, x_{j_1,l_1}\} \in \mathcal{E}(G_T)$, there exists a unique path in $T$ connecting $i_1$ and $j_1$, such that $b(i_1,j_1)=k_1$ and $e(i_1,j_1)=l_1$. It is easy to see that for any vertex $a$ in $T$, the farthest vertex among $i_1, k_1, j_1, l_1$ is either $i_1$ or $j_1$. Without loss of generality, we assume that $i_1$ is the farthest one for the vertex $k_2$. We have the following two cases.
\begin{enumerate}[i]
\item If the distance $d_T(i_1, i_2)>d_T(i_1, k_2)$, then there exists a path connecting $i_1$ and $i_2$, such that $b(i_1,i_2)=k_1$ and $e(i_1,i_2)=k_2$. Hence $\{x_{i_1,k_1}, x_{i_2,k_2}\} \in \mathcal{E}(G_T)$.
\item If $d_T(i_1, i_2)<d_T(i_1, k_2)$, then clearly there exists a path connecting $i_1$ and $j_2$, such that $b(i_1,j_2)=k_1$ and $e(i_1,i_2)=l_2$. Hence $\{x_{i_1,k_1}, x_{j_2,l_2}\} \in \mathcal{E}(G_T)$. \qedhere
\end{enumerate}
\end{proof}
\begin{corollary}
\label{leaf connect with edge}
Let $i$ be a leaf in $T$, and let $j$ be the unique vertex adjacent to $i$. If $\{x_{k_1,l_1}, x_{k_2,l_2}\}$ is an edge in the generic graph $G_T$, then $\{x_{i,j}, x_{k_1,l_1}\} \in \mathcal{E}(G_T)$ or $\{x_{i,j}, x_{k_2,l_2}\} \in \mathcal{E}(G_T)$.
\end{corollary}
\begin{proof}
Since $\{x_{k_1,l_1}, x_{k_2,l_2}\}, \{x_{i,j}, x_{j,i}\} \in \mathcal{E}(G_T)$, by Lemma \ref{there is edge}, at least one of $\{x_{i,j}, x_{k_1,l_1}\},\, \{x_{i,j}$, $x_{k_2,l_2}\}$, $\{x_{j,i}$, $x_{k_1,l_1}\}$ and $\{x_{j,i}, x_{k_2,l_2}\}$ is an edge in $G_T$. Note by Observation \ref{obs} that $x_{j,i}$ is a leaf in $G_T$, and the unique vertex adjacent to $x_{j,i}$ is $x_{i,j}$. Thus, we have $\{x_{i,j}, x_{k_1,l_1}\} \in \mathcal{E}(G_T)$ or $\{x_{i,j}, x_{k_2,l_2}\} \in \mathcal{E}(G_T)$.
\end{proof}
\begin{proposition}
\label{connect and diameter}
Let $G_T$ be the generic graph of a tree $T$ with at least $3$ vertices. Then $G_T$ is connected and the diameter of $G_T$ is $3$.
\end{proposition}
\begin{proof}
Note that for any vertex $x_{i,k}$, there exists at least one edge $\{x_{i,k}, x_{k,i}\}$ adjacent to $x_{i,k}$. So, the connectivity follows from Lemma \ref{there is edge}. Again, by Lemma \ref{there is edge}, the diameter of $G_T$ is at most $3$. Assume that $i, j$ are two leaves, and $\{i, k\}, \{j, l\} \in \mathcal{E}(T)$.
Since $T$ has at least $3$ vertices, $k\ne j$ and $i\ne l$.
It is clear that $\{x_{i,k}, x_{j,l}\} \in \mathcal{E}(G_T)$, and the distance between $x_{k, i}$ and $x_{l, j}$ in $G_T$ is 3.
\end{proof}
The following is an important property of the generic graph of a tree.
\begin{proposition}
[{\cite[Proposition 6]{arXiv:1508.07119}}]\label{bi-CM}
For any tree $T$, the generic graph $G_T$ is bi-CM.
\end{proposition}
We will generalize it and consider bi-strong-shellability; see Theorem \ref{bi-strongly shellable theorem}.
\begin{proposition}
\label{tree-graph}
For any tree $T$, the generic graph $G_T$ is ESS.
\end{proposition}
\begin{proof}
We prove by induction on $n=|\mathcal{V}(T)|$. If $n$ is $2$, the situation is clear. Hence we may assume that $n\ge 3$ and for all trees $T'$ with $|\mathcal{V}(T')|\le n-1$, this proposition holds for $T'$.
Without loss of generality, we may assume that $\mathcal{V}(T)=[n]$ and $n$ is a leaf of $T$ which is adjacent to the vertex ${n-1}$ in $T$. Let $T'$ be the tree by deleting $n$ from $T$. Thus the edge set $\mathcal{E}(G_{T'})$ of the generic graph $G_{T'}$ has a strong shelling order $\succ_{T'}$. We will extend $\succ_{T'}$ to give a strong shelling order on $\mathcal{E}(G_T)$.
Note that $G_{T}$ can be built from $G_{T'}$ by attaching the following edges:
\begin{enumerate}[i]
\item The ``cone'' part: the edges $\{x_{n,n-1},x_{i,j}\}$ for all $i\in [n-2]$ such that $j=b(i,n)$ for a path from $i$ to $n$ in $T$.
\item The ``handle'' part: the edge $\{x_{n,n-1},x_{n-1,n}\}$.
\end{enumerate}
Let $\succ_{T}$ be an arbitrary total order on $\mathcal{E}(G_T)$ satisfying:
\begin{enumerate}[1]
\item For two edges $e_1, e_2 \in \mathcal{E}(G_{T'})$, $e_1 \succ_{T} e_2$ if and only if $e_1 \succ_{T'} e_2$;
\item If $e_1$ is in the ``cone'' part or in the ``handle'' part, and $e_2 \in \mathcal{E}(G_{T'})$, then $e_1 \succ_{T} e_2$.
\end{enumerate}
The existence of such an ordering is without question.
We claim that $\succ_{T}$ is a strong shelling order on $\mathcal{E}(G_T)$. In fact, the only case we need to check is when $e_1$ is in the ``cone'' part or in the ``handle'' part, and $e_2 \in \mathcal{E}(G_{T'})$. Assume that $e_1= \{x_{n,n-1}, x_{i,j}\}$ and $e_2= \{x_{k_1,l_1}, x_{k_2,l_2}\}$. Note that $n$ is a leaf in the graph $T$, by Corollary \ref{leaf connect with edge}. Thus $\{x_{n,n-1}, x_{k_1,l_1}\} \in \mathcal{E}(G_T)$ or $\{x_{n,n-1} x_{k_2,l_2}\} \in \mathcal{E}(G_T)$. Note that $\{x_{n,n-1}, x_{k_1,l_1}\} \succ_{T} e_2$ and $\{x_{n,n-1}, x_{k_2,l_2}\} \succ_{T} e_2$ by the construction of $\succ_{T}$. This complete the proof.
\end{proof}
\begin{example}
To illustrate the previous proof, let's look back at the aforementioned two figures in Example \ref{example-2-trees}.
In the Figure \ref{trees}, the edge of the leaf that we are considering are labeled with $\clubsuit$. In the Figure \ref{GT}, the ``cone'' part edges are labeled with $\heartsuit$ while the ``handle'' part are labeled with $\spadesuit$.
\end{example}
Recall that if $I$ is a squarefree monomial ideal in $S={\mathbb K}[x_1,\dots,x_n]$ generated by squarefree monomials $u_i$, $1\le i\le m$, then the \Index{Alexander dual} of $I$, denoted by $I^\vee$, is defined to be the squarefree monomial ideal
\begin{equation}
\label{dual}
I^\vee\coloneqq \bigcap_{i=1}^m \braket{x_j\mid x_j \text{ divides } u_i}. \tag{$\star$}
\end{equation}
It is well-known that $(I^\vee)^\vee=I$. Furthermore, if $I$ is minimally generated by $u_i$, $1\le i \le m$, then above equation \eqref{dual} actually gives a minimal irredudant primary decomposition of $I^{\vee}$.
Finally, we are ready to connect the linear resolution property with the strong shellability in Theorem \ref{ssg and chordal graph}.
\begin{proof}
[Proof of $\ref{SSGC-3}\Rightarrow \ref{SSGC-1}$ in Theorem \ref{ssg and chordal graph}]
Without loss of generality, we may assume that $\mathcal{V}(G)=\Set{x_1,\dots,x_n}$. Suppose that the quadratice squarefree monomial ideal $I(G)\subset S={\mathbb K}[x_1,\dots,x_n]$ has a linear resolution and let $J=I(G)^\vee$ be its Alexander dual ideal. Then, by the well-known Eagon-Reiner theorem \cite[Theorem 3]{MR1633767}, $J$ is Cohen-Macaulay with codimension $2$.
Suppose that $\Set{u_1,\dots,u_{m+1}}$ is the minimal monomial generating set of $J$.
Applying the graded Nakayama Lemma to the Taylor resolution of $J$, we have a minimal graded free resolution of of $S/J$ in the form
\[
0\to S^m \stackrel{A}{\to} S^{m+1} \to S\to S/J \to 0,
\]
since it has to satisfy the Hilbert-Burch theorem \cite[Theorem 1.4.17]{MR1251956}. Here, $A$ is called a \emph{Hilbert-Burch matrix} of $J$. Each row of $A$ has exactly two nonzero entries, say, on the $i$-th and $j$-th complements with $i<j$, corresponding to a Taylor relation of $u_i$ and $u_j$:
\[
r_k=-u_{i,j}\varepsilon_i+u_{j,i}\varepsilon_j,
\]
where $u_{i,j}=u_i/\gcd(u_i,u_j)$ and $u_{j,i}=u_j/\gcd(u_i,u_j)$.
Now we have a finite simple graph $T=T_A$ on $[m+1]$ such that the row of $A$ in above form contributes an edge $\{i,j\}$ to $T$. Since $T$ has $m+1$ vertices, $m$-edges and no isolated vertex, $T$ is indeed a tree. For more details of these preparations, see the discussions in \cite[Remark 6.3]{MR1341789} and \cite{MR2457194}.
Actually, the matrix $A$ can be obtained from the generic matrix $A(T)$ by the substitution:
\[
x_{i,j}\mapsto u_{i,j}.
\]
Therefore,
\[
J=\bigcap_{i<j} (u_{i,b(i,j)},u_{j,e(i,j)})
\]
by \cite[Proposition 1.4]{MR2457194}.
For each squarefree monomial $u_{i,j}$, we may denote $\operatorname{deg}(u_{i,j})$ by $d(i,j)$ and assume that
\[
u_{i,j}=x_{i,j;1}x_{i,j;2}\dots x_{i,j;{d(i,j)}},
\]
a product of distinct variables in $S$. We consider the matrix $A_p$ obtained from generic matrix $A(T)$ by the substitution:
\[
x_{i,j} \mapsto x_{i,j}^{(1)}x_{i,j}^{(2)}\dots x_{i,j}^{(d(i,j))},
\]
a product of distinct new variables. The maximal minor ideal of $A_p$ is
\begin{align*}
J_p= & \bigcap_{i<j} (x_{i,b(i,j)}^{(1)}\dots x_{i,b(i,j)}^{(d(i,b(i,j)))},x_{j,e(i,j)}^{(1)}\dots x_{j,e(i,j)}^{(d(j,e(i,j)))})\\
= & \bigcap_{i<j} \bigcap_{1\le k_1 \le d(i,b(i,j))} \bigcap_{1\le k_2 \le d(j,e(i,j))} (x_{i,b(i,j)}^{k_1},x_{j,e(i,j)}^{k_2}).
\end{align*}
Let $G_p$ be the finite simple graph whose edge ideal $I(G_p)=J_p^\vee$. Obviously $G_p$ is a blow-up graph of the generic graph $G_T$; the vertex $x_{i,j}$ is replaced by the vertices $x_{i,j}^{(k)}$, $1\le k\le d(i,j)$. As $G_T$ is ESS by Proposition \ref{tree-graph}, so is $G_p$ by Lemma \ref{blow-up}.
On the other hand, $J$ can be obtained from $J_p$ by the substitution:
\[
x_{i,j}^{(l)} \mapsto x_{i,j;l}.
\]
Notice that $J$ is squarefree with codimension $2$. This implies that $G$ is a proper quotient graph of the graph $G_p$:
\[
\mathcal{E}(G)=\Set{\{x_{i,b(i,j);k_1},x_{j,e(i,j);k_2}\}\mid 1\le i<j\le m+1, 1\le k_1\le d(i,b(i,j)), 1\le k_2\le d(j,e(i,j))}.
\]
As $G_p$ is ESS, so is $G$ by Lemma \ref{quotient-graph}.
\end{proof}
The rest of this subsection is devoted to the bi-SS property of the generic graph $G_T$ of a tree $T$.
Note that we can assign directions to every edge of $T$ and end up with an \Index{oriented tree} $D_T$. A directed edge from $v$ to $u$ will be called an \Index{arc} and can be represented by $\overrightarrow{vu}$.
The set of arcs will be represented by $\mathcal{A}(D_T)$.
With respect to $D_T$, the \Index{in-neighborhood} of $v\in \mathcal{V}(T)$ is
\[
N_{D_T}^-(v)\coloneqq \Set{u\in N_T(v)\mid \overrightarrow{uv}\in D}.
\]
One can similarly define the \Index{out-neighborhood} $N_{D_T}^+(v)$ of $v$ in $D_T$. A vertex of $D_T$ is called a \Index{source} if it does not have in-neighbors. The oriented tree $D_T$ is called an \Index{out-tree} if it has exactly one source, which will be called the \Index{root} of $D_T$. An out-tree $D_T$ with root $v$ will be denoted by $D_{T,v}^+$. Obviously, given a vertex $v\in T$, one can build up a unique oriented tree $D_T$ with $D_T=D_{T,v}^+$: for every edge $\{u_1,u_2\}\in \mathcal{E}(T)$, $\overrightarrow{u_1u_2}\in \mathcal{A}(D_T)$ if and only if $\operatorname{dis}_T(v,u_1)<\operatorname{dis}_T(v,u_2)$.
Given an oriented tree $D_T$, the subset
\[
A_{D_T}\coloneqq \Set{x_{u,v}\mid \overrightarrow{uv}\in\mathcal{A}(D_T)} \subset \mathcal{V}(G_T)
\]
will be called an \Index{orientation assignment} (associated to $D_T$).
Obviously, $|A_{D_T}|=|\mathcal{V}(T)|-1$ and $|A_{D_T}\cap \{x_{u,v},x_{v,u}\}|=1$ for every edge $\{u,v\}\in T$.
Conversely, given a subset $A\subset G_T$ such that $|A|=|\mathcal{V}(T)|-1$ and $|A\cap \{x_{u,v},x_{v,u}\}|=1$ for every edge $\{u,v\}\in T$, one can recover easily the oriented tree $D_T$ such that $A=A_{D_T}$. If $D_T$ is an out-tree, we will also call $A_{D_T}$ an \Index{out-tree orientation assignment}.
\begin{proposition}
\label{facet of independence complex of G_T}
Let $\mathcal{I}(G_T)$ be the independence complex of $G_T$, where $G_T$ is the generic graph of a tree $T$. Then the facet set
\[
\mathcal{F}(\mathcal{I}(G_T))= \Set{A \subset G_T \mid \text{$A$ is an out-tree orientation assignment}}.
\]
In particular, $\mathcal{I}(G_T)$ is pure of dimension $|\mathcal{V}(T)|-2$.
\end{proposition}
\begin{proof}
We may assume that $|\mathcal{V}(T)|=n$. Since $|\mathcal{V}(G_T)|=2(n-1)$, for every subset $B\subset \mathcal{V}(G_T)$ with $|B|\ge n$, one can find suitable $x_{i,j},x_{j,i}\in B$ by the pigeonhole principle. But these two vertices are adjacent in $G_T$, meaning that $B$ is dependent. Hence the cardinality of any independent set of $G_T$ is at most $n-1$.
On the other hand, if $B$ is an independent set containing less than $n-1$ vertices, we claim that there exists some vertex $x_{i,j} \in \mathcal{V}(G_T)$, such that $B \cup \{x_{i,j}\}$ is an independent set. Hence every maximal independent set contains exactly $n-1$ vertices.
In fact, since $|B| < n-1$, there exists some $x_{i,j} \in \mathcal{V}(G_T)$, such that $x_{i,j} \notin B$ and $x_{j,i} \notin B$. If $x_{j,i}$ is not adjacent to any vertex in $B$, then clearly $B \cup \{x_{j,i}\}$ is an independent set. Otherwise, assume that there exists some $x_{l,k} \in B$, such that $\{x_{j,i}, x_{l,k}\} \in \mathcal{E}(G_T)$. It is easy to see that neighborhoods satisfy $N(x_{i,j}) \subseteq N(x_{l,k})$. Since $x_{l,k}$ is a vertex in the independent set $B$,
$N(x_{l,k})\cap B=\varnothing$. Therefore $N(x_{i,j})\cap B=\varnothing$, i.e., $B \cup \{x_{i,j}\}$ is also an independent set.
To establish the description of the facet set, we first show that every out-tree orientation assignment of $G_T$ is a facet of $\mathcal{I}(G_T)$. Let $A=A_{D_T}$ be such an assignment, and let $v$ be the root of $D_T$. Then for every distinct vertices $x_{u_1,v_1}$ and $x_{u_2,v_2}$ in $A$, $\operatorname{dis}_T(v,u_1)<\operatorname{dis}_T(v,v_1)$ and $\operatorname{dis}_T(v,u_2)<\operatorname{dis}_T(v,v_2)$. We claim that $x_{u_1,v_1}$ and $x_{u_2,v_2}$ are not adjacent in $G_T$. In fact, if $\{x_{u_1,v_1}, x_{u_2,v_2}\} \in \mathcal{E}(G_T)$, then for the root $v$, the farthest vertex among $u_1, v_1, u_2, v_2$ is either $u_1$ or $u_2$, a contradiction. On the other hand, for any vertex $x_{i,j} \in \mathcal{V}(G_T) \setminus A$, $x_{j,i} \in A$ and these two vertices are adjacent in $G_T$. Therefore, $A$ cannot be properly expanded to a bigger independent set.
Finally, we will show that every independent set $A$ with $n-1$ vertices in $G_T$ is an out-tree orientation assignment.
Note that any such set $A$ is an orientation assignment. Say $A=A_{D_T}$. It follows from \cite[Proposition 2.1.1]{MR2472389}
that $D_T$ contains at least one source. Let $v$ be one such vertex. If $D_T\ne D_{T,v}^+$, then there exists $x_{u,u'} \in A$, such that $\operatorname{dis}_T(v, u) > \operatorname{dis}_T(v, u')$.
Let $w=e(u,v)$. As $v$ is a source,
$x_{v,w} \in A$ and $\{x_{v,w}, x_{u,u'}\} \in \mathcal{E}(G_T)$. This contradicts to the assumption that $A$ is an independent set. Hence $A=A_{D_{T,v}^+}$ is an out-tree orientation assignment. This completes the proof.
\end{proof}
\begin{lemma}
Let $A_{D_{T,u}^+}$ and $A_{D_{T,v}^+}$ be two distinct out-tree orientation assignments. Then $\operatorname{dis}_{\mathcal{I}(G_T)}(A_{D_{T,u}^+}, A_{D_{T,v}^+})=\operatorname{dis}_T(u,v)$.
\label{lem:Assign-Tree}
\end{lemma}
\begin{proof}
When $\{u,v\}$ is an edge of $T$, it is clear that $A_{D_{T,u}^+}$ and $A_{D_{T,v}^+}$ exchange $x_{u,v}$ with $x_{v,u}$. Hence $\operatorname{dis}(A_{D_{T,u}^+}, A_{D_{T,v}^+})=1$. As the distance function on $\mathcal{F}(\mathcal{I}(G_T))$ satisfies the triangle inequality, for general $u,v\in \mathcal{V}(T)$, one has $\operatorname{dis}_{\mathcal{I}(G_T)}(A_{D_{T,u}^+}, A_{D_{T,v}^+})\le \operatorname{dis}_T(u,v)$.
On the other hand, suppose that $\operatorname{dis}_T(u,v)=t\ge 2$. Say $u=x_{i_0},x_{i_1},\dots,x_{i_t}=v$ is the unique path from $u$ to $v$ in $T$. Then
\[
\{x_{i_0,i_1},x_{i_1,i_2},\dots,x_{i_{t-1},i_t}\} \subseteq A_{D_{T,u}^+}\setminus A_{D_{T,v}^+}.
\]
Hence,
\[
\operatorname{dis}(A_{D_{T,u}^+}, A_{D_{T,v}^+})=|A_{D_{T,u}^+}\setminus A_{D_{T,v}^+}|\ge t=\operatorname{dis}_T(u,v). \qedhere
\]
\end{proof}
\begin{remark}
Let $G$ be a finite simple graph. One can check directly that the Stanley-Reisner complex $\Delta_G$ of the edge ideal $I(G)$ is actually the independence complex $\mathcal{I}(G)$. Its Alexander dual $\mathcal{I}(G)^\vee$ is $\braket{E^c \mid E\in\mathcal{E}(G)}$, where the complement is taken with respect to $\mathcal{V}(G)$. Notice that $\mathcal{I}(G)^\vee$ is strongly shellable if and only if $G$ is ESS by Lemma \ref{complement shellable}.
\end{remark}
\begin{theorem}
\label{bi-strongly shellable theorem}
For any tree $T$, the generic graph $G_T$ is bi-SS.
\end{theorem}
\begin{proof}
By Proposition \ref{tree-graph}, we have already seen that $G_T$ is ESS. Therefore, it remains to show that the independence complex of $G_T$ is strongly shellable. By Proposition \ref{facet of independence complex of G_T}, it suffices to investigate the out-tree orientation assignments of $G_T$.
There exists a total order on $\mathcal{V}(T)$: $u_1, \dots, u_n$, such that the induced subgraph $T_k$ of $T$ on $\{u_1, \dots, u_k\}$ is connected for each $k \in [n]$. We will simply write $A_{D_{T,u_i}^+}$ as $A_{u_i}$. It remains to prove that $A_{u_1}, \dots, A_{u_n}$ is a strong shelling order on $\mathcal{F}(\mathcal{I}(G_T))$. In fact, for each pair $i<j$, since $T_j$ is connected, there exists a $k<j$, such that $\{u_k, u_j\} \in \mathcal{E}(T)$ and $\operatorname{dis}_T(u_i, u_j)=\operatorname{dis}_T(u_i, u_k)+1$. By applying Lemma \ref{lem:Assign-Tree} and Lemma \ref{d=d-1+1}, one can complete the proof.
\end{proof}
As for pure simplicial complexes, strong shellability implies Cohen-Macaulayness, we see immediately that Theorem \ref{bi-strongly shellable theorem} generalizes Proposition \ref{bi-CM}.
\begin{remark}
We considered the codimension one graph $\Gamma(\Delta)$ of a pure simplicial complex $\Delta$ in \cite{SSC}.
This is a finite simple graph whose vertex set is $\mathcal{F}(\Delta)$, and two vertices $F, \, G$ are adjacent in $\Gamma(\Delta)$ if and only if $|F\setminus G|=1$.
Now given the generic graph $G_T$ of some tree $T$, we look that $\Gamma(\mathcal{I}(G_T))$. It follows immediately from Lemma \ref{lem:Assign-Tree} that $\Gamma(\mathcal{I}(G_T))$ is isomorphic to $T$. This fact means that from the generic graph $G_T$ of some tree $T$, we can indeed recover $T$ up to isomorphism.
Also from this point of view, the strong shellability of $\mathcal{I}(G_T)$ in Theorem \ref{bi-strongly shellable theorem} can be regarded as a special case of \cite[Theorem 4.7]{SSC}, where we gave a characterization of strongly shellable pure complexes in terms of their codimension one graphs.
\end{remark}
\section{ESS bipartite graphs}
Recall that a \Index{Ferrers graph} is a bipartite graph $G$ on two disjoint vertex set $X=\{x_1,\dots,x_m\}$ and $Y=\{y_1,\dots,y_n\}$ such that if $\{x_i,y_j\}\in \mathcal{E}(G)$, then so is $\{x_r,y_s\}$ for $1\le r \le i$ and $1\le s \le j$. It follows from \cite[Theorems 4.1, 4.2]{ MR2457403} that a bipartite graph $G$ with no isolated vertex is a Ferrers graph if and only if the complement graph $\bar{G}$ is chordal. Therefore, by Theorem \ref{ssg and chordal graph}, a bipartite graph with no isolated vertex is ESS if and only if it is a Ferrers graph. In this section, we will study the ESS property of these graphs from a new point of view.
Let $G$ be a finite simple graph. Take arbitrary vertex $w$ from $G$.
The set of vertices which has distance $i$ from $w$ will be denoted by $D(w, i)$. Clearly, $D(w, 0)=\{w\}$ and $D(w, 1)=N(w)$, the neighborhood of $w$.
\begin{definition}
For a vertex $x \in D(w, i)$, the \Index{upward neighborhood} of $x$ with respect to $w$, denoted by $\operatorname{uN}_w(x)$, is the set $N(x) \cap D(w, i+1)$. The cardinality of this set will be called the \Index{upward degree} of $x$ with respect to $w$ and denoted by $\operatorname{ud}_w(x)$. The \Index{upward degree sequence} on $D(w, i)$ is a sequence of upward degrees of all vertices in $D(w, i)$ arranged in decreasing order:
\[
\operatorname{ud}_w(x_1) \geq \operatorname{ud}_w(x_2) \geq \cdots \geq \operatorname{ud}_w(x_t).
\]
Correspondingly, we can define the \Index{downward neighborhood} $\operatorname{dN}_w(x)$.
\end{definition}
Let $G$ be a simple graph. Recall that the \Index{line graph} $L(G)$ of $G$ is the graph such that $\mathcal{V}(L(G))=\mathcal{E}(G)$ and $\Set{e_1,e_2}\in \mathcal{E}(L(G))$ if and only if $e_1$ and $e_2$ are adjacent in $G$. For simplicity, if two edges $e_1$ and $e_2$ of $G$ satisfies $\operatorname{dis}_{L(G)}(e_1,e_2)=d$, we will also say that they have distance $d$ in $G$.
In particular, if $G$ is an ESS graph,
then every two non-adjacent edges of $G$ will be adjacent to a common edge in $G$. In other words, every two non-adjacent edges of an ESS graph have distance $2$.
Consequently, the diameter of $G$ is at most $3$. Hence, for any vertex $w$ in $G$, we have the partition of the vertex set
\[
\mathcal{V}(G)=D(w, 0) \sqcup D(w, 1) \sqcup D(w, 2) \sqcup D(w, 3).
\]
\begin{lemma}
\label{inclusion}
Let $w$ be a vertex of an ESS bipartite graph $G$. For $i=1$ or $2$ and two vertices $x, y \in D(w, i)$, we have either $\operatorname{uN}_w(x) \subseteq \operatorname{uN}_w(y)$ or $\operatorname{uN}_w(y) \subseteq\operatorname{uN}_w(x)$.
\end{lemma}
\begin{proof}
Assume for contradiction that we can find $x' \in \operatorname{uN}_w(x) \setminus \operatorname{uN}_w(y)$ and $y' \in \operatorname{uN}_w(y) \setminus \operatorname{uN}_w(x)$. Then $\{x, x'\}, \, \{y, y'\} \in \mathcal{E}(G)$, and $\{x, y'\}, \, \{y, x'\} \notin \mathcal{E}(G)$. Since $G$ is a bipartite graph, we have $\{x, y\}, \, \{x', y'\} \notin \mathcal{E}(G)$. Thus, the distance between $\{x, x'\}$ and $\{y, y'\}$ is more than 2. This is a contradiction since every two non-adjacent edges of an ESS graph have distance $2$.
\end{proof}
\begin{corollary}
\label{decreasing}
Let $w$ be a vertex of an ESS bipartite graph $G$. For $i=1$ or $2$, if $|D(w,i)|=t$, we can order the vertices in $D(w,i): x_1,x_2,\dots,x_t$ such that $\operatorname{uN}_w(x_1)\supseteq \cdots \supseteq \operatorname{uN}_w(x_t)$. In particular, $\operatorname{ud}_w(x_1)\ge \cdots \ge \operatorname{ud}_w(x_t)$.
\end{corollary}
\begin{lemma}
\label{D(w, 2)}
Let $w$ be a vertex of an ESS bipartite graph $G$. For any vertex $x \in D(w, 2)$ with $\operatorname{uN}_w(x) \neq \varnothing$, we have $\operatorname{dN}_w(x)=D(w, 1)$.
\end{lemma}
\begin{proof}
Since $\operatorname{uN}_w(x) \neq \varnothing$, we have $y \in D(w, 3)$ such that $\{x, y\}$ is an edge of $G$. Assume that there exists $z \in D(w, 1) \setminus \operatorname{dN}_w(x)$. We claim that the distance between $\{x, y\}$ and $\{w, z\}$ is more than 2. In fact, the claim follows from the facts that $\{x, z\} \notin \mathcal{E}(G)$, $\operatorname{dis}_G(w, x)=2$ and $\operatorname{dis}_G(w, y)=3$. But this is again a contradiction since every two non-adjacent edges of an ESS graph have distance $2$.
\end{proof}
\begin{corollary}
Let $w$ be a vertex of an ESS bipartite graph $G$.
We order the vertices in $D(w,1): x_1,\dots,x_t$ and in $D(w,2):y_1,\dots,y_s$ as in Corollary \ref{decreasing}. If $\operatorname{ud}_w(y_i) \ge 1$ for some $i\in[s]$, then $y_i\in \operatorname{uN}_w(x_t)$. In particular, this index $i$ is at most $\operatorname{ud}_w(x_t)$.
\end{corollary}
Now, we are ready to explain how to re-construct an ESS bipartite graph $G$ which has no isolated vertex.
\begin{construction}
\label{ESS bipartite graph}
Given two upward degree sequences $d_1\ge\cdots\ge d_t$ and $d_1'\ge \cdots \ge d_{d_t}'\ge d_{d_t+1}'=\cdots=d_{d_1}'=0$, we construct a graph $G$ as follows:
\begin{enumerate}[1]
\item Start with a vertex, which will be called $w$.
\item Choose a set of new vertices $V(w, 1)=\{x_1, \dots, x_t\}$ for $G$. We require that $w$ is adjacent to all vertices in $V(w, 1)$ in $G$. For each $i\in[t]$, label the vertex $x_i$ implicitly by the weight $d_i$.
\item Choose a set of new vertices $V(w, 2)=\{y_1, \dots, y_{d_1}\}$ for $G$. For each $i\in [t]$, we require that $x_i$ is adjacent to all the initial $d_i$ vertices in $V(w, 2)$ in $G$. For each $j\in [d_1]$, label the vertex $y_j$ implicitly by the weight $d_j'$.
\item Choose the final set of new vertices $V(w, 3)=\{z_1, \dots, z_{d'_1}\}$ for $G$. For each $k\in[d_t]$, we require that $y_k$ is adjacent to all the initial $d_k'$ vertices in $V(w,3)$ in $G$.
\end{enumerate}
The graph $G$ here will be called a graph \Index{constructed (from vertex $w$) by upward degree sequences}.
\end{construction}
\begin{example}
In Figure \ref{Construction by upward degree sequences}, we have a graph constructed by upward degree sequences $4\ge 3 \ge 2$ and $2\ge 1 \ge 0 = 0$.
\begin{figure}[!ht]
\begin{minipage}[h]{\linewidth} \centering
\includegraphics{7.pdf}
\end{minipage}
\caption{Construction by upward degree sequences}
\label{Construction by upward degree sequences}
\end{figure}
\end{example}
\begin{remark}
\label{explain ssbg}
\begin{enumerate}[1]
\item Let $G$ be a graph constructed by upward sequences as above. It is clear that $G$ is bipartite and $\operatorname{dis}_G(w,x)\le 3$ for any $x\in G$. Furthermore, $D(w, i) = V(w, i)$ for $i=1, 2, 3$.
\item In addition, if $d_t=0$, then there exists no vertex in $D(w, 2)$ which has nonempty upward neighborhood. Hence $V(w, 3) = \varnothing$.
\end{enumerate}
\end{remark}
\begin{theorem}
\label{ssbg=cbuds}
Let $G$ be a connected finite simple graph. Then the following conditions are equivalent:
\begin{enumerate}[1]
\item \label{ssbg=cbuds-1} $G$ is an ESS bipartite graph.
\item \label{ssbg=cbuds-2} $G$ can be constructed from any vertex of $G$ by upward degree sequences.
\item \label{ssbg=cbuds-3} $G$ can be constructed from a vertex of $G$ by upward degree sequences.
\end{enumerate}
\end{theorem}
\begin{proof}
\ref{ssbg=cbuds-1}$\Rightarrow$\ref{ssbg=cbuds-2}: Let $G$ be an ESS bipartite graph. Choose a vertex $w$ arbitrarily and set $V(w, 1)=D(w, 1)$. It is clear that $w$ is adjacent to any vertex in $V(w, 1)$. By Lemma \ref{inclusion}, there exists a total order $x_1, \dots, x_t$
of the vertices in $V(w,1)$ such that
\begin{equation}
\label{uN-1} \tag{\dag}
\operatorname{uN}_w(x_1)\supseteq \cdots \supseteq \operatorname{uN}_w(x_t).
\end{equation}
If we denote the upward degree of $x_i$ with respect to $w$ by $d_i$, then obviously $d_1 \geq d_2 \geq \cdots \geq d_t$.
Following from the containment in \eqref{uN-1}, there exists a total order $y_1,\dots,y_{d_1}$ of vertices in $\operatorname{uN}_w(x_1)$, such that $y_j\in \operatorname{uN}_w(x_i)$ whenever $j\le d_i$. Note that if $y\in D(w,2)$, then $y$ is adjacent to some $x_i\in D(w,1)$. Hence $y\in \operatorname{uN}_w(x_i)\subseteq \operatorname{uN}_w(x_1)$. Therefore $D(w,2)=\operatorname{uN}_w(x_1)$. We will set $V(w, 2)=D(w, 2)$.
By Lemma \ref{D(w, 2)}, any $y \in D(w,2)$ with $\operatorname{uN}_w(y) \neq \varnothing$ will satisfy $y \in \operatorname{uN}_w(x_t)$.
Note that $\operatorname{uN}_w(x_t)=\Set{y_1,\dots,y_{d_t}}$. By Lemma \ref{inclusion}, we may assume that
\begin{equation}
\label{uN-2} \tag{\ddag}
\operatorname{uN}_w(y_1)\supseteq \cdots \supseteq \operatorname{uN}_w(y_{d_t}).
\end{equation}
If we denote the upward degree of $y_i$ with respect to $w$ by $d_i'$, then obviously
$d_1'\ge \cdots \ge d_{d_t}'\ge d_{d_t+1}'=\cdots=d_{d_1}'=0$.
Following from the containment in \eqref{uN-2}, there exists a total order $z_1,\dots,z_{d_1'}$ of vertices in $\operatorname{uN}_w(y_1)$, such that $z_j\in \operatorname{uN}_w(y_i)$ whenever $j\le d_i'$. Similar to the previous argument, we will have $D(w,3)=\operatorname{uN}_w(y_1)$. Set $V(w, 3)=\operatorname{uN}_w(y_1)$.
Since the diameter of $G$ is at most $3$, we have
\begin{align*}
V(G)=& \{w\} \sqcup D(w, 1) \sqcup D(w, 2) \sqcup D(w, 3) \\
= & \{w\} \sqcup V(w, 1) \sqcup V(w, 2) \sqcup V(w, 3).
\end{align*}
By the above discussion, $G$ is constructed from $w$ by upward degree sequences.
\ref{ssbg=cbuds-2}$\Rightarrow$\ref{ssbg=cbuds-3} is clear.
\ref{ssbg=cbuds-3}$\Rightarrow$\ref{ssbg=cbuds-1}: Let $G$ be the graph constructed by Construction \ref{ESS bipartite graph}. It is easy to see that $G$ is a bipartite graph with no isolated vertex. In the following, we will show that $G$ is ESS. Let's assign an total order $\succ$ on $V(G)$:
\[
w \succ x_1 \succ \cdots \succ x_t \succ y_1 \succ \cdots \succ y_{d_1} \succ z_1 \succ \cdots \succ z_{d'_1}.
\]
For simplicity, for each edge $\{a_1, a_2\}$ in $G$, we always assume that $a_1 \succ a_2$. We will consider the lexicographic order $\succ_{lex}$ on the edge set of $G$ with respect to $\succ$, i.e., for every pair of edges $\{a_1, a_2\}, \{b_1, b_2\} \in \mathcal{E}(G)$,
\[
\text{$\{a_1, a_2\} \succ_{lex} \{b_1, b_2\}$ if and only if $a_1 \succ b_1$, or $a_1 = b_1$ and $a_2 \succ b_2$.}
\]
We claim that the lexicographic order $\succ_{lex}$ on $\mathcal{E}(G)$ is a strong shelling order.
Take two distinct edges $\{a_1,a_2\}\succ_{lex}\{b_1,b_2\}$. We may assume that these two edges are disjoint. Thus, it suffices to consider the following cases:
\begin{enumerate}[i]
\item Suppose that $a_1$ and $b_1$ belong to the same set $V(w, i)$ for some $i$. As $a_1\succ b_1$, $\operatorname{uN}_w(a_1)\supseteq \operatorname{uN}_w(b_1)$. Thus, we have the connecting edge $\{a_1, b_2\} \in \mathcal{E}(G)$. It is obvious that $\{a_1,b_2\}\succ_{lex} \{b_1,b_2\}$.
\item Suppose that $a_1=w$ and $b_1 \in V(w,1)$. Then we have the connecting edge $\{a_1, b_1\} \in \mathcal{E}(G)$. It is obvious that $\{a_1,b_1\}\succ_{lex} \{b_1,b_2\}$.
\item Suppose that $a_1=w$ and $b_1 \in V(w,2)$. As $b_2\in \operatorname{uN}_w(b_1)\ne \varnothing$, $\operatorname{dN}_w(b_1)=V(w,1)$ by Lemma \ref{D(w, 2)}. Hence we have the connecting edge $\{a_2, b_1\} \in \mathcal{E}(G)$. It is obvious that $\{a_2,b_1\}\succ_{lex} \{b_1,b_2\}$.
\item Suppose that $a_1 \in V(w,1)$ and $b_1 \in V(w,2)$. As the previous case, $\operatorname{dN}_w(b_1)=V(w,1)$. Hence we have the connecting edge $\{a_1, b_1\} \in \mathcal{E}(G)$. It is obvious that $\{a_1,b_1\}\succ_{lex} \{b_1,b_2\}$.
\end{enumerate}
Thus $\succ_{lex}$ is a strong shelling order on $\mathcal{E}(G)$.
\end{proof}
\begin{corollary}
\label{distance 2}
Let $G$ be an ESS bipartite graph which has no isolated vertex. Then there exists a vertex $w'$, such that the distance between $w'$ and any vertex of $G$ is at most 2.
\end{corollary}
\begin{proof}
As a consequence of Theorem \ref{ssbg=cbuds}, we will assume that $G$ is constructed from the vertex $w$ by the associated upward degree sequences, as in Construction \ref{ESS bipartite graph}. Consider the following cases:
\begin{enumerate}[1]
\item If $d_t=0$, by Remark \ref{explain ssbg}, we will have $V(w, 3)=\varnothing$. Hence there exists no vertex in $G$ which has distance 3 from $w$.
\item If $d_t \neq 0$, we claim that $w'=y_1$ will be sufficient. Apparently, $\operatorname{dis}_G(w, y_1)=2$ and $y_1$ is adjacent to any vertex in $V(w, 1) \cup V(w, 3)$. For any distinct vertex $y_i \in V(w, 2)$, it is clear that $\{x_1,y_i\}, \{x_1, y_1\} \in \mathcal{E}(G)$. Hence $\operatorname{dis}_G(y_i, y_1)=2$ for each $2 \leq i \leq d_1$. \qedhere
\end{enumerate}
\end{proof}
\begin{remark}
By Corollary \ref{distance 2}, if $G$ is an ESS bipartite graph with no isolated vertex, we can choose a proper vertex $w$, such that $V(G) = \{w\} \sqcup D(w, 1) \sqcup D(w, 2)$. Assume that $D(w, 1) = \{x_1, x_2, \dots, x_t\}$ and $D(w, 2) = \{y_1, y_2, \dots, y_m\}$ as in Construction \ref{ESS bipartite graph}. If we set $y_0=w$, then the two disjoint parts $\{x_1, x_2, \dots, x_t\}$ and $\{y_0, y_1, \dots, y_m\}$ satisfy:
\[
\text{if $\{x_i,y_j\} \in \mathcal{E}(G)$, then $\{x_t,y_s\} \in \mathcal{E}(G)$ for all $t \leq i$ and $s \leq j$.}
\]
This shows that $G$ is a Ferrers graph.
\end{remark}
\begin{bibdiv}
\begin{biblist}
\bib{MR1251956}{book}{
author={Bruns, Winfried},
author={Herzog, J{\"u}rgen},
title={Cohen-{M}acaulay rings},
series={Cambridge Studies in Advanced Mathematics},
publisher={Cambridge University Press},
address={Cambridge},
date={1993},
volume={39},
ISBN={0-521-41068-1},
}
\bib{MR1341789}{article}{
author={Bruns, Winfried},
author={Herzog, J{\"u}rgen},
title={On multigraded resolutions},
date={1995},
ISSN={0305-0041},
journal={Math. Proc. Cambridge Philos. Soc.},
volume={118},
pages={245\ndash 257},
}
\bib{MR2472389}{book}{
author={Bang-Jensen, J{\o}rgen},
author={Gutin, Gregory},
title={Digraphs: theory, algorithms and applications.},
edition={Second},
series={Springer Monographs in Mathematics},
publisher={Springer-Verlag London Ltd.},
address={London},
date={2009},
ISBN={978-1-84800-997-4},
}
\bib{arXiv:1508.03799}{article}{
author={Bigdeli, Mina},
author={Yazdan~Pour, Ali~Akbar},
author={Zaare-Nahandi, Rashid},
title={Stability of betti numbers under reduction processes: towards
chordality of clutters},
date={2015},
eprint={arXiv:1508.03799},
}
\bib{MR2457403}{article}{
author={Corso, Alberto},
author={Nagel, Uwe},
title={Monomial and toric ideals associated to {F}errers graphs},
date={2009},
ISSN={0002-9947},
journal={Trans. Amer. Math. Soc.},
volume={361},
pages={1371\ndash 1395},
url={http://dx.doi.org/10.1090/S0002-9947-08-04636-9},
}
\bib{MR0130190}{article}{
author={Dirac, Gabriel~Andrew},
title={On rigid circuit graphs},
date={1961},
ISSN={0025-5858},
journal={Abh. Math. Sem. Univ. Hamburg},
volume={25},
pages={71\ndash 76},
}
\bib{MR2853077}{article}{
author={Emtander, Eric},
author={Mohammadi, Fatemeh},
author={Moradi, Somayeh},
title={Some algebraic properties of hypergraphs},
date={2011},
ISSN={0011-4642},
journal={Czechoslovak Math. J.},
volume={61(136)},
pages={577\ndash 607},
url={http://dx.doi.org/10.1007/s10587-011-0031-0},
}
\bib{MR2603461}{article}{
author={Emtander, Eric},
title={A class of hypergraphs that generalizes chordal graphs},
date={2010},
ISSN={0025-5521},
journal={Math. Scand.},
volume={106},
pages={50\ndash 66},
}
\bib{MR1633767}{article}{
author={Eagon, John~A.},
author={Reiner, Victor},
title={Resolutions of {S}tanley-{R}eisner rings and {A}lexander
duality},
date={1998},
ISSN={0022-4049},
journal={J. Pure Appl. Algebra},
volume={130},
pages={265\ndash 275},
}
\bib{MR0186421}{article}{
author={Fulkerson, D.~R.},
author={Gross, O.~A.},
title={Incidence matrices and interval graphs},
date={1965},
ISSN={0030-8730},
journal={Pacific J. Math.},
volume={15},
pages={835\ndash 855},
}
\bib{MR1171260}{incollection}{
author={Fr{\"o}berg, Ralf},
title={On {S}tanley-{R}eisner rings},
date={1990},
booktitle={Topics in algebra, {P}art 2 ({W}arsaw, 1988)},
series={Banach Center Publ.},
volume={26},
publisher={PWN},
address={Warsaw},
pages={57\ndash 70},
}
\bib{SSC}{unpublished}{
author={Guo, Jin},
author={Shen, Yi-Huang},
author={Wu, Tongsuo},
title={Strong shellability of pure simplicial complexes},
note={preprint},
}
\bib{MR2724673}{book}{
author={Herzog, J{\"u}rgen},
author={Hibi, Takayuki},
title={Monomial ideals},
series={Graduate Texts in Mathematics},
publisher={Springer-Verlag London Ltd.},
address={London},
date={2011},
volume={260},
ISBN={978-0-85729-105-9},
}
\bib{arXiv:1508.07119}{article}{
author={{Herzog}, J\"urgen},
author={{Rahimi}, Ahad},
title={{Bi-Cohen-Macaulay graphs.}},
language={English},
date={2016},
ISSN={1077-8926/e},
journal={{Electron. J. Comb.}},
volume={23},
pages={research paper p1.1, 14},
}
\bib{MR1918513}{article}{
author={Herzog, J{\"u}rgen},
author={Takayama, Yukihide},
title={Resolutions by mapping cones},
date={2002},
ISSN={1512-0139},
journal={Homology Homotopy Appl.},
volume={4},
pages={277\ndash 294},
note={The Roos Festschrift volume, 2},
}
\bib{arXiv:1601.00456}{article}{
author={Moradi, Somayeh},
author={Khosh-Ahang, Fahimeh},
title={Expansion of a simplicial complex},
date={2016},
ISSN={0219-4988},
journal={J. Algebra Appl.},
volume={15},
pages={1650004},
url={http://dx.doi.org/10.1142/S0219498816500043},
}
\bib{MR2457194}{article}{
author={Naeem, Muhammad},
title={Cohen-{M}acaulay monomial ideals of codimension 2},
date={2008},
ISSN={0025-2611},
journal={Manuscripta Math.},
volume={127},
pages={533\ndash 545},
url={http://dx.doi.org/10.1007/s00229-008-0217-4},
}
\bib{arXiv:1601.03207}{article}{
author={Nikseresht, Ashkan},
author={Zaare-Nahandi, Rashid},
title={On generalizations of cycles and chordality to hypergraphs},
eprint={arXiv:1601.03207},
}
\bib{arXiv:1511.04676}{article}{
author={Rahmati-Asghar, Rahim},
author={Moradi, Somayeh},
title={On the stanley--reisner ideal of an expanded simplicial complex},
date={2016},
ISSN={1432-1785},
journal={Manuscripta Mathematica},
pages={1\ndash 13},
url={http://dx.doi.org/10.1007/s00229-016-0822-6},
}
\bib{MR0270957}{article}{
author={Rose, Donald~J.},
title={Triangulated graphs and the elimination process},
date={1970},
ISSN={0022-247x},
journal={J. Math. Anal. Appl.},
volume={32},
pages={597\ndash 609},
}
\bib{MR1453579}{book}{
author={Stanley, Richard~P.},
title={Combinatorics and commutative algebra},
edition={Second},
series={Progress in Mathematics},
publisher={Birkh\"auser Boston Inc.},
address={Boston, MA},
date={1996},
volume={41},
ISBN={0-8176-3836-9},
}
\bib{MR2853065}{article}{
author={Woodroofe, Russ},
title={Chordal and sequentially {C}ohen-{M}acaulay clutters},
date={2011},
ISSN={1077-8926},
journal={Electron. J. Combin.},
volume={18},
pages={Paper 208, 20},
}
\end{biblist}
\end{bibdiv}
\end{document}
|
\section{Introduction}
\label{sec:intro}
In secure multiparty computation (MPC), mutually distrusting users wish to communicate with each other in such a way that, at the end of the communication, each user can compute a function of the distributed private inputs without learning any more than what the function output and the private input reveal about other users' inputs and outputs. Applications such as voting, auctions and data-mining, amongst several others \cite{CramDamNiel} illustrate the need for secure MPC in real life. It is well known that information-theoretically (unconditionally) secure computation between two users is not possible in general, when the users have only private randomness and noiseless communication as a resource to enable the computation. A combinatorial characterization of functions that \emph{can} be securely computed was derived in \cite{kushilevitz1992}. However, additional stochastic resources, such as a noisy channel \cite{CrepKilian1988} or distributed sources, can be used to enable two users to compute a function unconditionally securely.
Oblivious Transfer (OT) is a secure two-user computation which has been shown to be a primitive for all two-user secure computation \cite{jkilian1988},\cite{jkilian2000}. That is, if the two users can obtain OT using the resources available to them, then they can securely compute any function of their inputs. In particular, OT can be achieved if the two users have access to a noisy channel. A $1$-of-$2$ string OT is a two-party computation where user Alice's private inputs are two equal-length strings and user Bob's private input is a choice bit. Bob obtains exactly one string of his choice from Alice's strings, without Alice finding out the identity of the string chosen by Bob. If a discrete memoryless channel (DMC) is used as a resource to enable such OT, then the OT capacity of the DMC is the largest rate, i.e. string-length per channel use, that can be obliviously transferred to Bob. Nascimento and Winter \cite{NascWinter2008} characterized source distributions and channels from which non-zero $1$-of-$2$ string OT rates can be obtained. When Alice and Bob are \emph{honest-but-curious}, Ahlswede and Csisz\'ar \cite{ot2007} derived upper bounds on the $1$-of-$2$ string OT capacity both for DMCs and distributed sources. Users are honest-but-curious if they do not deviate from the given protocol but, from whatever they learn during the protocol, they will infer all they can about forbidden information. In contrast, \emph{malicious} users may deviate arbitrarily from the given protocol. When the DMC is a binary erasure channel (BEC) and users are honest-but-curious, Ahlswede and Csisz\'ar \cite{ot2007} presented a protocol which they showed was capacity achieving, establishing that $\min \{ \epsilon, 1 - \epsilon \}$ is the $1$-of-$2$ string OT capacity of a BEC($\epsilon$), where $\epsilon$ is the erasure probability of the channel. They extended these results for a generalized erasure channel (GEC). A GEC is a channel $p_{Y|X}$, with input alphabet $\mathcal{X}$ and output alphabet $\mathcal{Y}$, where $\mathcal{Y}$ can be partitioned as $\mathcal{Y}_e \cup \mathcal{Y}_{\overline{e}}$ such that $p_{Y|X}(y|x)$ does not depend on the input $x \in \mathcal{X}$ whenever $y \in \mathcal{Y}_e$. Specifically, Ahlswede and Csisz\'ar \cite{ot2007} derived lower bounds on $1$-of-$2$ string OT capacity for a GEC and showed that the bounds are tight when the erasure probability of the GEC is at least $1/2$. In a surprising result, Pinto et al. \cite{PintoDowsMorozNasc2011} proved that using a GEC with erasure probability at least $1/2$, any $1$-of-$2$ string OT rate achieved when Alice and Bob are honest-but-curious can also be achieved even if Alice and Bob behave maliciously. This result characterized the $1$-of-$2$ string OT capacity of a GEC, with erasure probability is atleast $1/2$, for malicious users. The achievable scheme presented by Pinto et al. \cite{PintoDowsMorozNasc2011} for establishing this result is a generalization of the scheme presented by Savvides \cite{savvides_thesis}, that uses a BEC($1/2$) and uses the cryptographic primitive of \emph{interactive hashing} (see Appendix~\ref{appndx:interactive_hashing} for the properties and a protocol for interactive hashing) to establish checks that detect malicious behavior. More recently, Dowsley and Nascimento proved \cite{DowsNasc2014-arxiv} that even when the GEC's erasure probability is less than $1/2$, the rate that was shown to be achievable in \cite{ot2007} for honest-but-curious Alice and Bob is also achievable when Alice and Bob are malicious. To the best of our knowledge, characterizing the $1$-of-$2$ string OT capacity for other natural channels such as a binary symmetric channel (BSC) remains open in the two-party setting, even with honest-but-curious users.
In this paper we study a natural extension of the OT setup when there is an eavesdropper Eve, who may wiretap the noisy channel between Alice and Bob. In this case, Eve, who receives partial information about the transmissions, can use it to deduce the private data or outputs of Alice and Bob. The noisy wiretapped channel we consider is a binary erasure broadcast channel whose inputs come from Alice and whose outputs are available to Bob and Eve. For the most part, we consider a binary erasure broadcast channel which provides independent erasure patterns to Bob and Eve. We also consider the physically degraded binary erasure broadcast channel. In our $3$-party setups, we define two privacy regimes. Privacy against individual parties is referred to as \emph{$1$-privacy}, whereas privacy against any set of $2$ colluding parties is referred to as \emph{$2$-privacy}.
\subsection{Contributions and organization of the paper}
\begin{itemize}
\item When the noisy broadcast channel is made up of two independent BECs (see Figure~\ref{fig:ot_hbc_wtap}) and the users are honest-but-curious, we characterize the $1$-of-$2$ string OT capacity both for $2$-privacy and $1$-privacy (Theorem~\ref{thm:result_2p_1p_hbc_wtap}). We extend these capacity results to $1$-of-$N$ string OT (Theorem~\ref{thm:result_N_hbc_wtap}). Our protocols are natural extensions of the two-party protocols of Ahlswede and Csisz\'ar \cite{ot2007} where we use secret keys between Alice and Bob, secret from Eve, to provide rate-optimal schemes for both privacy regimes. Our converse arguments generalize the converse of Ahlswede and Csisz\'ar \cite{ot2007}.
\item We consider the setup of Figure~\ref{fig:ot_hbc_wtap}, where Alice and Bob may act maliciously during the OT protocol. We derive an expression for an achievable rate under $2$-privacy constraints (Theorem~\ref{thm:result_2p_malicious_wtap}) for this setup. The achievable rate is optimal when $\epsilon_1 \leq 1/2$ and is no more than a factor of $\epsilon_1$ away from the optimal rate when $\epsilon_1 > 1/2$. In a departure from previous protocols \cite{PintoDowsMorozNasc2011},\cite{DowsNasc2014-arxiv} which used interactive hashing primarily to detect the malicious behavior of a user, our protocol uses interactive hashing to generate the secret keys used by Alice and Bob, secret from Eve, to achieve $2$-privacy even with malicious users (for $\epsilon_1 > 1/2$). Using interactive hashing only for checks to detect malicious behavior will not work when $\epsilon_1 > 1/2$, since it is possible for Bob, in collusion with Eve, to pass any such check for uncountably many values of $\epsilon_1, \epsilon_2$.
\item In a generalization of the setup of Figure~\ref{fig:ot_hbc_wtap}, we consider the setup of Figure~\ref{fig:ot_hbc_indep}, where instead of the eavesdropper, we have a legitimate user Cathy. All users are honest-but-curious. Independent $1$-of-$2$ string OTs are required between Alice-Bob and Alice-Cathy, with $2$-privacy. We derive inner and outer bounds on the rate-region (Theorem~\ref{thm:result_2p_hbc_indep}) for this setup. These bounds match except when $\epsilon_1,\epsilon_2 > 1/2$.
\item When the channel is a physically degraded broadcast channel made up of a cascade of two independent BECs (see Figure~\ref{fig:ot_hbc_degraded}), a BEC($\epsilon_1$) connecting Alice-Bob followed by a BEC($\epsilon_2$) connecting Bob-Eve, we derive upper and lower bounds on the $1$-of-$2$ string OT capacity under $1$-privacy (Theorem~\ref{thm:result_1p_hbc_degraded}), for honest-but-curious users. These bounds match when $\epsilon_1 \leq (1/3) \cdot \epsilon_2(1 - \epsilon_1)$. Unlike the secret key agreement problem, which has a simpler optimal scheme when the broadcast channel is degraded, the scheme for OT turns out to be more complicated than when Bob's and Eve's erasure patterns are independent. This happens because Eve knows more about the legitimate channel's noise process when the channel is degraded. Hiding Bob's choice bit from a more informed Eve is the main novelty of this protocol, compared to the independent erasures case.
\end{itemize}
The main system model we consider is for obtaining OT between honest-but-curious Alice and Bob, in the presence of an eavesdropper Eve. This model is introduced in Section~\ref{sec:prob_statement_wtap}. We consider several variants of this model. Section~\ref{sec:prob_statement_malicious_wtap} defines a variant of the main model, where OT is required when Alice and Bob may be malicious. In Section~\ref{sec:prob_statement_indep}, we generalize the main model by introducing the user Cathy instead of the eavesdropper and requiring independent OTs between Alice-Bob and Alice-Cathy. Section~\ref{sec:prob_statement_degraded} is a variant of the main model where a physically degraded broadcast channel is used as the resource for OT, instead of a broadcast channel providing independent erasure patterns to Bob and Eve considered in all previous models. The problem statement for each model is followed by a statement of the result we derive for that model. These results are proved in Sections~\ref{sec:proofs_0},~\ref{sec:proofs_1},~\ref{sec:proofs_2} and~\ref{sec:proofs_3}. In Section~\ref{sec:conclusions}, we summarize the work presented in this paper. Section~\ref{sec:open_problems} contains a discussion of the open problems related to the present work. The Appendices at the end consist of the supporting results referenced in the main proofs.
\section{Problem Statement and Results}
\label{sec:model_and_problem_statement}
\subsection{Notation}
We will use the capital letter $X$ to denote a random variable, whose alphabet will be specified in the context where $X$ is used. The small letter $x$ will denote a specific realization of $X$. The bold, small letter $\boldsymbol{x}$ will denote a $k$-tuple, where $k$ will be clear from the context in which $\boldsymbol{x}$ is used. The small, indexed letter $x_i$, $i=1,2,\ldots,k$ will denote the $i$th element of $\boldsymbol{x}$. The bold, capital $\boldsymbol{X}$ will denote a random $k$-tuple. Furthermore,
\begin{itemize}
\item $\boldsymbol{x}^i := (x_1, x_2, \ldots, x_i)$
\item Suppose $\boldsymbol{a} \in \{1,2,\ldots,k\}^m$. Then,
\begin{itemize}
\item $\boldsymbol{x}|_{\boldsymbol{a}} := (x_{a_i} : i=1,2,\ldots,m)$.
\end{itemize}
\item $\{\boldsymbol{x}\} := \{ x_i : i=1,2,\ldots,k\}$.
\item Let $A \subset \mathbb{N}$. Then, $(A)$ is the tuple formed by arranging the elements of $A$ in increasing order. That is,
\begin{itemize}
\item $(A) := (a_i \in A, i=1,2,\ldots,|A| : \forall i > 1, a_{i-1} < a_i)$
\end{itemize}
For example, if $A = \{1,7,3,9,5\}$, then $(A) = (1,3,5,7,9)$.
\item Let $A \subset \{1,2,\ldots,k\}$. Then,
\begin{itemize}
\item $\boldsymbol{x}|_A := \boldsymbol{x}|_{(A)}$
\end{itemize}
For example, if $\boldsymbol{x} = (a,b,c,d,e,f,g)$ and $A = \{7,2,5\}$, then $\boldsymbol{x}|_A = (b,e,g)$.
\item Suppose $\boldsymbol{y} \in \{ 0,1, \bot \}^k$, where $\bot$ represents an erasure. Then,
\begin{itemize}
\item $\#_e(\boldsymbol{y}) := | \{i \in \{1,2,\ldots,k\} : y_i = \bot \}|$.
\item $\#_{\overline{e}}(\boldsymbol{y}) := | \{i \in \{1,2,\ldots,k\} : y_i \neq \bot \}|$.
\end{itemize}
\end{itemize}
For $a \in \mathbb{R}$, $b \in \mathbb{R}^{+}$, we define:
\begin{itemize}
\item $<a> := |a| - \lfloor |a| \rfloor$
\item $\mathcal{N}_{b}(a) := \{\alpha \in \mathbb{R} : |a - \alpha| \leq b\}$
\end{itemize}
\subsection{Oblivious Transfer over a Wiretapped Channel: Honest-but-Curious Model}
\label{sec:prob_statement_wtap}
\begin{figure}[h]
\setlength{\unitlength}{1cm}
\centering
\begin{tikzpicture}[trim left, scale=1]
\draw (1,3) rectangle (2,3.5);
\draw (3.5,3) rectangle (5,3.5);
\draw (6.5,1) rectangle (7.5,1.5);
\draw (6.5,3) rectangle (7.5,3.5);
\draw [->] (2,3.25) -- (3.5,3.25);
\draw [->] (5,3.35) -- (6.5,3.35);
\draw [<->] (1.5,3.5) -- (1.5,4) -- (7,4) -- (7,3.5);
\draw [->] (7.5,3.25) -- (8,3.25);
\draw [->] (5,3.15) -- (5.5,3.15) -- (5.5,1.15) -- (6.5,1.15);
\draw [->, dotted] (6,4) |- (6.5,1.35);
\node at (1.5,3.25) {\small{Alice}};
\node at (7,3.25) {\small{Bob}};
\node at (7,1.25) {\small{Eve}};
\node at (4.25, 3.25) {\small{$p_{YZ|X}$}};
\node [below] at (1.5,3) {\small{$\boldsymbol{K}_0,\boldsymbol{K}_1$}};
\node [below] at (7,3) {\small{$U$}};
\node [right] at (8,3.25) {\small{$\hat{K}_U$}};
\node [above] at (2.75,3.25) {\small{$\boldsymbol{X}$}};
\node [above] at (5.75,3.35) {\small{$\boldsymbol{Y}$}};
\node [above] at (5.75,1.15) {\small{$\boldsymbol{Z}$}};
\node [above] at (4.25,4) {\small{Public channel (noiseless)}};
\end{tikzpicture}
\caption{$1$-of-$2$ string OT in presence of an eavesdropper}
\label{fig:ot_hbc_wtap_bcast}
\end{figure}
The setup of Figure~\ref{fig:ot_hbc_wtap_bcast} has two users Alice and Bob and an eavesdropper Eve. Alice and Bob are honest-but-curious. Alice's private data consists of two $m$-bit strings $\boldsymbol{K}_0,\boldsymbol{K}_1$. Bob's private data is his choice bit $U$. The random variables $\boldsymbol{K}_0,\boldsymbol{K}_1,U$ are independent and chosen uniformly at random over their respective alphabets. Alice can communicate with Bob and Eve over a broadcast channel $p_{YZ|X}$, with the output $Y$ available to Bob and the output $Z$ available to Eve. Additionally, Alice and Bob can send messages over a noiseless public channel, with each such message becoming available to Eve as well.
\begin{definition}
\label{defn:protocol_hbc_wtap}
Let $m,n \in \mathbb{N}$. An \emph{$(m,n)$-protocol} is an exchange of messages between Alice and Bob in the setup of Figure~\ref{fig:ot_hbc_wtap_bcast}. Alice's private strings $\boldsymbol{K}_0, \boldsymbol{K}_1$ are $m$-bits each. Alice transmits a bit $X_t$ over the channel at each time instant $t = 1,2,\ldots,n$. Also, before each channel transmission and after the last channel transmission, Alice and Bob take turns to send messages (arbitrarily many but finite number) over the public channel. Any transmission by a user is a function of the user's input, private randomness and all the public messages, channel inputs or channel outputs the user has seen. The rate of the protocol is $r_n := m/n$. Let $\boldsymbol{\Lambda}$ denote the transcript of the public channel at the end of an $(m,n)$-protocol.
\end{definition}
Let the \emph{final views} of Alice, Bob and Eve be, respectively, $V_A$, $V_B$ and $V_E$, where the \emph{final view} of a user is the set of all random variables received and generated by that user over the duration of the protocol. For the present setup:
\begin{align}
V_A & := \{\boldsymbol{K}_0, \boldsymbol{K}_1, \boldsymbol{X}, \boldsymbol{\Lambda}\} \\
V_B & := \{U, \boldsymbol{Y}, \boldsymbol{\Lambda}\} \\
V_E & := \{\boldsymbol{Z}, \boldsymbol{\Lambda}\}
\end{align}
where $\boldsymbol{X} := (X_1,X_2,\ldots,X_n)$, $\boldsymbol{Y} := (Y_1,Y_2,\ldots,Y_n)$ and $\boldsymbol{Z} := (Z_1,Z_2,\ldots,Z_n)$. Bob computes the estimate $\hat{\boldsymbol{K}}_U$ (of the string $\boldsymbol{K}_U$) as a function of its final view $V_B$.
\begin{definition}
\label{defn:ach_rate_2p_hbc_wtap}
$R_{2P}$ is an \emph{achievable $2$-private rate for honest-but-curious users} if there exists a sequence of $(m,n)$-protocols such that $m/n \longrightarrow R_{2P}$ as $n \longrightarrow \infty$ and
\begin{align}
P[\hat{\boldsymbol{K}}_U \neq \boldsymbol{K}_U] & \longrightarrow 0 \label{eqn:ach_2p_wtap_0} \\
I(\boldsymbol{K}_{\overline{U}} ; V_B,V_E) & \longrightarrow 0 \label{eqn:ach_2p_wtap_1} \\
I(U ; V_A,V_E) & \longrightarrow 0 \label{eqn:ach_2p_wtap_2} \\
I(\boldsymbol{K}_0,\boldsymbol{K}_1,U ; V_E) & \longrightarrow 0 \label{eqn:ach_2p_wtap_3}
\end{align}
as $n \longrightarrow \infty$, where $\overline{U} = U \oplus 1$ and $\oplus$ is the sum modulo-$2$.
\end{definition}
\begin{definition}
\label{defn:ach_rate_1p_hbc_wtap}
$R_{1P}$ is an \emph{achievable $1$-private rate for honest-but-curious users} if there exists a sequence of $(m,n)$-protocols such that $m/n \longrightarrow R_{1P}$ as $n \longrightarrow \infty$ and
\begin{align}
P[\hat{\boldsymbol{K}}_U \neq \boldsymbol{K}_U] & \longrightarrow 0 \label{eqn:ach_1p_wtap_0} \\
I(\boldsymbol{K}_{\overline{U}} ; V_B) & \longrightarrow 0 \label{eqn:ach_1p_wtap_1} \\
I(U ; V_A) & \longrightarrow 0 \label{eqn:ach_1p_wtap_2} \\
I(\boldsymbol{K}_0,\boldsymbol{K}_1,U ; V_E) & \longrightarrow 0 \label{eqn:ach_1p_wtap_3}
\end{align}
\end{definition}
The \emph{$2$-private capacity} $C_{2P}$ is the supremum of all achievable $2$-private rates for honest-but-curious users and the \emph{$1$-private capacity} $C_{1P}$ is the supremum of all achievable $1$-private rates for honest-but-curious users.
The main result in this section is a characterization of $C_{2P}$ and $C_{1P}$ for the setup of Figure~\ref{fig:ot_hbc_wtap}. The setup of Figure~\ref{fig:ot_hbc_wtap} is a specific case of the setup of Figure~\ref{fig:ot_hbc_wtap_bcast}, where the broadcast channel is made up of two independent binary erasure channels (BECs), namely, BEC($\epsilon_1$) which is a BEC with erasure probability $\epsilon_1$ connecting Alice to Bob and BEC($\epsilon_2$) connecting Alice to Eve.
\begin{figure}[h]
\setlength{\unitlength}{1cm}
\centering
\begin{tikzpicture}[trim left, scale=1]
\draw (1,3) rectangle (2,3.5);
\draw (3.5,3) rectangle (5,3.5);
\draw (6.5,3) rectangle (7.5,3.5);
\draw (3.5,1) rectangle (5,1.5);
\draw (6.5,1) rectangle (7.5,1.5);
\draw [->] (5,3.25) -- (6.5,3.25);
\draw [->] (2,3.25) -- (3.5,3.25);
\draw [<->] (1.5,3.5) -- (1.5,4) -- (7,4) -- (7,3.5);
\draw [->] (7.5,3.25) -- (8,3.25);
\draw [->] (2.75,3.25) |- (3.5,1.25);
\draw [->] (5,1.25) -- (6.5,1.25);
\draw [->, dotted] (5.75,4) |- (6.5,1.4);
\node at (1.5,3.25) {\small{Alice}};
\node at (7,3.25) {\small{Bob}};
\node at (7,1.25) {\small{Eve}};
\node at (4.25, 3.25) {\small{BEC($\epsilon_1$)}};
\node at (4.25, 1.25) {\small{BEC($\epsilon_2$)}};
\node [above] at (2.75,3.25) {\small{$\boldsymbol{X}$}};
\node [above] at (5.5,3.25) {\small{$\boldsymbol{Y}$}};
\node [above] at (5.5,1.25) {\small{$\boldsymbol{Z}$}};
\node [below] at (1.5,3) {\small{$\boldsymbol{K}_0,\boldsymbol{K}_1$}};
\node [below] at (7,3) {\small{$U$}};
\node [right] at (8,3.25) {\small{$\hat{\boldsymbol{K}}_U$}};
\node [above] at (4.25,4) {\small{Public channel (noiseless)}};
\end{tikzpicture}
\caption{$1$-of-$2$ string OT using a binary erasure broadcast channel}
\label{fig:ot_hbc_wtap}
\end{figure}
\begin{theorem}[OT capacity for erasure broadcast channel]
\label{thm:result_2p_1p_hbc_wtap}
The $1$-of-$2$ string OT capacity, with $2$-privacy, for honest-but-curious users in the setup of Figure~\ref{fig:ot_hbc_wtap} is
\[ C_{2P} = \epsilon_2 \cdot \min \{\epsilon_1, 1 - \epsilon_1 \}.\]
The $1$-of-$2$ string OT capacity, with $1$-privacy, for honest-but-curious users in the setup of Figure~\ref{fig:ot_hbc_wtap} is
\[C_{1P} = \left\{ \begin{array}{ll} \epsilon_1, & \epsilon_1 < \frac{\epsilon_2}{2} \\ \frac{\epsilon_2}{2}, & \frac{\epsilon_2}{2} \leq \epsilon_1 < \frac{1}{2} \\ \epsilon_2(1 - \epsilon_1), & \frac{1}{2} \leq \epsilon_1 \end{array} \right.\]
\end{theorem}
This result is proved in Section~\ref{sec:proofs_0}.
The above results extend easily to the setup of $1$-of-$N$ ($N \geq 2$) string OT, with honest-but-curious users, in the presence of an eavesdropper (see Figure~\ref{fig:ot_hbc_wtap_N}). The difference with the setup of Figure~\ref{fig:ot_hbc_wtap} is that Alice now has $N$ private strings $\boldsymbol{K}_0,\boldsymbol{K}_1,\ldots,\boldsymbol{K}_{N-1}$ and Bob's choice variable $U$ can take values in $\{ 0,1,\ldots, N-1 \}$. Definition~\ref{defn:protocol_hbc_wtap} still defines a protocol and it is straightforward to extend Definition~\ref{defn:ach_rate_2p_hbc_wtap} and Definition~\ref{defn:ach_rate_1p_hbc_wtap} to define the achievable rates, for the setup of Figure~\ref{fig:ot_hbc_wtap_N}. The following theorem characterizes $C_{2P}$ and $C_{1P}$ for this setup:
\begin{theorem}[1-of-N OT capacity for erasure broadcast channel]
\label{thm:result_N_hbc_wtap}
The $1$-of-$N$ string OT capacity, with $2$-privacy and with $1$-privacy, for honest-but-curious users in the setup of Figure~\ref{fig:ot_hbc_wtap_N} is, respectively,
\begin{align*}
C^N_{2P} & = \epsilon_2 \cdot \min \left\{ \frac{\epsilon_1}{N-1}, 1 - \epsilon_1 \right\} \\
C^N_{1P} & = \left\{ \begin{array}{ll} \frac{\epsilon_1}{N-1}, & \frac{\epsilon_1}{N-1} < \frac{\epsilon_2}{N} \\ \frac{\epsilon_2}{N}, & \frac{\epsilon_2}{N} \leq \frac{\epsilon_1}{N-1} < \frac{1}{N} \\ \epsilon_2(1 - \epsilon_1), & \frac{1}{N} \leq \frac{\epsilon_1}{N-1} \end{array} \right.
\end{align*}
\end{theorem}
\begin{figure}[h]
\setlength{\unitlength}{1cm}
\centering
\begin{tikzpicture}[trim left, scale=1]
\draw (1,3) rectangle (2,3.5);
\draw (3.5,3) rectangle (5,3.5);
\draw (6.5,3) rectangle (7.5,3.5);
\draw (3.5,1) rectangle (5,1.5);
\draw (6.5,1) rectangle (7.5,1.5);
\draw [->] (5,3.25) -- (6.5,3.25);
\draw [->] (2,3.25) -- (3.5,3.25);
\draw [<->] (1.5,3.5) -- (1.5,4) -- (7,4) -- (7,3.5);
\draw [->] (7.5,3.25) -- (8,3.25);
\draw [->] (2.75,3.25) |- (3.5,1.25);
\draw [->] (5,1.25) -- (6.5,1.25);
\draw [->, dotted] (5.75,4) |- (6.5,1.4);
\node at (1.5,3.25) {\small{Alice}};
\node at (7,3.25) {\small{Bob}};
\node at (7,1.25) {\small{Eve}};
\node at (4.25, 3.25) {\small{BEC($\epsilon_1$)}};
\node at (4.25, 1.25) {\small{BEC($\epsilon_2$)}};
\node [above] at (2.75,3.25) {\small{$\boldsymbol{X}$}};
\node [above] at (5.5,3.25) {\small{$\boldsymbol{Y}$}};
\node [above] at (5.5,1.25) {\small{$\boldsymbol{Z}$}};
\node [below] at (1.2,3) {\small{$\boldsymbol{K}_0,\boldsymbol{K}_1,\ldots,\boldsymbol{K}_{N-1}$}};
\node [below] at (7,3) {\small{$U$}};
\node [right] at (8,3.25) {\small{$\hat{\boldsymbol{K}}_U$}};
\node [above] at (4.25,4) {\small{Public channel (noiseless)}};
\end{tikzpicture}
\caption{$1$-of-$N$ string OT using a binary erasure broadcast channel}
\label{fig:ot_hbc_wtap_N}
\end{figure}
Theorems~\ref{thm:result_2p_1p_hbc_wtap} and~\ref{thm:result_N_hbc_wtap} show that the presence of an eavesdropper reduces the OT capacity by a factor of $\epsilon_2$ for $2$-privacy, compared to the results of Ahlswede and Csisz\'ar \cite{ot2007}. Intuitively, this means that Alice and Bob can get OT with $2$-privacy only over the segment of Alice's transmissions that were erased for Eve. Also, note that for $\epsilon_1 \geq 1/2$, $C_{1P} = C_{2P}$ while for $\epsilon_1 < 1/2$, $C_{1P} > C_{2P}$. By putting $\epsilon_2 = 1$, as one would expect, these capacity results reduce to the $2$-party OT capacity results of Ahlswede and Csisz\'ar \cite{ot2007}.
\subsection{Oblivious Transfer over a Wiretapped Channel: Malicious Model}
\label{sec:prob_statement_malicious_wtap}
The setup is the same as that shown in Figure~\ref{fig:ot_hbc_wtap}. The main difference with the problem definition of Section~\ref{sec:prob_statement_wtap} is that Alice an Bob can be malicious. That is, they can deviate arbitrarily from the protocol. We consider only $2$-privacy in this setup\footnote{A protocol for achieving $1$-privacy in this setup is obtained by only a minor modification (greater privacy amplification) to the two-party protocols presented in \cite{PintoDowsMorozNasc2011}, \cite{DowsNasc2014-arxiv} and is, therefore, being omitted from this work.}. Definition~\ref{defn:protocol_hbc_wtap} defines a protocol and the rate of the protocol for this setup.
\begin{definition}
\label{defn:ach_rate_2p_malicious_wtap}
$R$ is an \emph{achievable $2$-private rate for malicious users} if there exists a sequence of $(m,n)$-protocols such that $m/n \longrightarrow R$ and:
\begin{enumerate}
\item If Alice and Bob are both honest, then the protocol aborts with vanishing probability and (\ref{eqn:ach_2p_wtap_0})-(\ref{eqn:ach_2p_wtap_3}) are satisfied, as $n \longrightarrow \infty$.
\item If Alice is malicious and colludes with Eve and Bob is honest, let $V_n$ be the view of a malicious Alice colluding with Eve at the end of the protocol. Then, $I(U ; V_n) \longrightarrow 0$ as $n \longrightarrow \infty$.
\item If Alice is honest and Bob is malicious and colludes with Eve, let $V_n$ be the view of a malicious Bob colluding with Eve at the end of the protocol. Then, $\min \{ I(\boldsymbol{K}_0 ; V_n), I(\boldsymbol{K}_1 ; V_n)\} \longrightarrow 0$ as $n \longrightarrow \infty$.
\end{enumerate}
\end{definition}
\begin{theorem}[An achievable OT rate with malicious users]
\label{thm:result_2p_malicious_wtap}
Any $R < \left\{ \begin{array}{lr} C_{2P}, & \epsilon_1 \leq \frac{1}{2}\\ \epsilon_1 \cdot C_{2P}, & \epsilon_1 > \frac{1}{2} \end{array} \right\}$, where $C_{2P} = \epsilon_2 \cdot \min \{\epsilon_1, 1 - \epsilon_1\}$, is an achievable $2$-private $1$-of-$2$ string OT rate for malicious users in the setup of Figure~\ref{fig:ot_hbc_wtap}.
\end{theorem}
This result is proved in Section~\ref{sec:proofs_1}. Note that $C_{2P}$ is the $2$-private OT capacity when users are honest-but-curious in this setup. Hence, the result shows that the achievable scheme we present is rate-optimal when $\epsilon_1 \leq 1/2$ and no more than a fraction $\epsilon_1$ away from the optimal rate otherwise. The compromise in rate when $\epsilon_1 > 1/2$ happens for the following reason. Our protocol (for the regime where $\epsilon_1 > 1/2$) uses interactive hashing to obtain two subsets of Alice's transmissions over the broadcast channel. Alice converts the non-overlapping parts of these subsets into two secret keys using standard techniques.\footnote{Alice will use these keys to encrypt her strings. For obtaining $2$-privacy, our protocol ensures that one of the keys is secret from Bob and both the keys are secret from Eve.} Losing the overlapping part of both the subsets in this process gives us shorter secret keys, which in turn results in the rate loss by a factor of $\epsilon_1$.
\subsection{Independent Oblivious Transfers over a broadcast channel}
\label{sec:prob_statement_indep}
\begin{figure}[h]
\setlength{\unitlength}{1cm}
\centering
\begin{tikzpicture}[trim left, scale=1]
\draw (1,3) rectangle (2,3.5);
\draw (3.5,3) rectangle (5,3.5);
\draw (6.5,3) rectangle (7.5,3.5);
\draw (3.5,1) rectangle (5,1.5);
\draw (6.5,1) rectangle (7.5,1.5);
\draw [->] (5,3.25) -- (6.5,3.25);
\draw [->] (2,3.25) -- (3.5,3.25);
\draw [<->] (1.5,3.5) -- (1.5,4) -- (7,4) -- (7,3.5);
\draw [->] (7.5,3.25) -- (8,3.25);
\draw [->] (7.5,1.25) -- (8,1.25);
\draw [->] (2.75,3.25) |- (3.5,1.25);
\draw [->] (5,1.25) -- (6.5,1.25);
\draw [<->] (5.75,4) |- (6.5,1.4);
\node at (1.5,3.25) {\small{Alice}};
\node at (7,3.25) {\small{Bob}};
\node at (7,1.25) {\small{Cathy}};
\node at (4.25, 3.25) {\small{BEC($\epsilon_1$)}};
\node at (4.25, 1.25) {\small{BEC($\epsilon_2$)}};
\node [above] at (2.75,3.25) {\small{$\boldsymbol{X}$}};
\node [above] at (5.5,3.25) {\small{$\boldsymbol{Y}$}};
\node [above] at (5.5,1.25) {\small{$\boldsymbol{Z}$}};
\node [below] at (1.5,3) {\small{$\begin{array}{c} \boldsymbol{K}_0,\boldsymbol{K}_1 \\ \boldsymbol{J}_0, \boldsymbol{J}_1 \end{array} $}};
\node [below] at (7,3) {\small{$U$}};
\node [below] at (7,1) {\small{$W$}};
\node [right] at (8,3.25) {\small{$\hat{\boldsymbol{K}}_U$}};
\node [right] at (8,1.25) {\small{$\hat{\boldsymbol{J}}_W$}};
\node [above] at (4.25,4) {\small{Public channel (noiseless)}};
\end{tikzpicture}
\caption{Independent OTs using a binary erasure broadcast channel}
\label{fig:ot_hbc_indep}
\end{figure}
In the setup of Figure~\ref{fig:ot_hbc_indep}, we have three users Alice, Bob and Cathy. Alice is connected to Bob and Cathy by a broadcast channel made up of two independent BECs, a BEC($\epsilon_1$) connecting Alice to Bob and a BEC($\epsilon_2$) connecting Alice to Cathy. In addition, there is a noiseless public channel of unlimited capacity over which the three users can take turns to send messages. Each such public message is received by all the users. Alice's private data consists of two pairs of strings $\boldsymbol{K}_0, \boldsymbol{K}_1$ and $\boldsymbol{J}_0, \boldsymbol{J}_1$. Bob's and Cathy's private data are the choice bits $U$ and $W$ respectively. $\boldsymbol{K}_0, \boldsymbol{K}_1, \boldsymbol{J}_0, \boldsymbol{J}_1, U, W $ are independent and uniform over their respective alphabets. The goal is for Bob to obtain $\boldsymbol{K}_U$ with $2$-privacy and for Cathy to obtain $\boldsymbol{J}_W$ with $2$-privacy\footnote{
The BGW algorithm \cite{BGW88} gives a mechanism to achieve $1$-private computations in any $3$-user setting when each user is allowed to use private randomness and there are private links between each pair of users. But achieving a $2$-private computation in a $3$-user setting is, in general, not feasible even with honest-but-curious users.}
\begin{definition}
Let $n,m_B,m_C \in \mathbb{N}$. An $(n,m_B,m_C)$-\emph{protocol} is an exchange of messages between Alice, Bob and Cathy over the setup of Figure~\ref{fig:ot_hbc_indep}. Alice's private data consists of strings $\boldsymbol{K}_0,\boldsymbol{K}_1$ which are $m_B$-bits each and strings $\boldsymbol{J}_0,\boldsymbol{J}_1$ which are $m_C$-bits each. Alice transmits a bit $X_t$ over the broadcast channel at each time instant $t = 1,2,\ldots,n$. In addition, before each such transmission and after the last transmission ($t=n$), the users take turns to send messages on the noiseless public channel over several rounds. The number of rounds maybe random, but finite with probability one. Any transmission by a user is a function of the user's input, private randomness and all the public messages, channel inputs or channel outputs the user has seen. The \emph{rate-pair} $(r_{B,n},r_{C,n})$ of an $(n,m_B,m_C)$-protocol is given by $r_{B,n} := m_B/n$ and $r_{C,n} := m_C/n$. Let $\boldsymbol{\Lambda}$ denote the transcript of the public channel at the end of an $(n,m_B,m_C)$-protocol.
\end{definition}
The \emph{final view} of a user is the collection of all random variables available to the user at the end of the execution of the $(n,m_B,m_C)$-protocol. We denote these for Alice, Bob, and Cathy by $V_A$, $V_B$, and $V_C$, respectively. At the end of an $(n,m_B,m_C)$-protocol, Bob generates an estimate $\hat{\boldsymbol{K}}_U$ of $\boldsymbol{K}_U$ as a function of its final view $V_B$. Similarly, Cathy generates an estimate $\hat{\boldsymbol{J}}_W$ of $\boldsymbol{J}_W$ as a function of its final view $V_C$.
\begin{definition}
\label{defn:ach_rate_2p_indep}
$(R_B,R_C)$ $\in \mathbb{R}^2$ is an \emph{achievable 2-private rate-pair for honest-but-curious users} in the setup of Figure~\ref{fig:ot_hbc_indep} if there exists a sequence of $(n,m_B,m_C)$-protocols with $(r_{B,n},r_{C,n}) \longrightarrow (R_B,R_C)$ as $n \longrightarrow \infty$, such that
\begin{eqnarray}
P[\hat{\boldsymbol{K}}_U \neq \boldsymbol{K}_U] & \longrightarrow 0 \label{eqn:ach_2p_indep_0}\\
P[\hat{\boldsymbol{J}}_W \neq \boldsymbol{J}_W] & \longrightarrow 0 \label{eqn:ach_2p_indep_1}\\
I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; V_B,V_C) & \longrightarrow 0 \label{eqn:ach_2p_indep_2}\\
I(U ; V_A,V_C) & \longrightarrow 0 \label{eqn:ach_2p_indep_3} \\
I(W ; V_A,V_B) & \longrightarrow 0 \label{eqn:ach_2p_indep_4} \\
I(U,W ; V_A) & \longrightarrow 0 \label{eqn:ach_2p_indep_5} \\
I(\boldsymbol{K}_0,\boldsymbol{K}_1,U, \boldsymbol{J}_{\overline{W}} ; V_C) & \longrightarrow 0 \label{eqn:ach_2p_indep_6}\\
I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_0,\boldsymbol{J}_1,W ; V_B) & \longrightarrow 0 \label{eqn:ach_2p_indep_7}
\end{eqnarray}
as $n \longrightarrow \infty$.
\end{definition}
\begin{definition}
The 2-private rate-region $\mathcal{R} \subset \mathbb{R}^2$ for the setup of Figure~\ref{fig:ot_hbc_indep} is
the closure of the set of all achievable $2$-private rate pairs for honest-but-curious users.
\end{definition}
The main results in this section are inner and outer bounds for the $2$-private rate region $\mathcal{R}$, for the setup of Figure~\ref{fig:ot_hbc_indep}, when the users are honest-but-curious\footnote{See Section~\ref{sec:open_problems} for a discussion on considering malicious users in this setup.}.
\begin{theorem}[OT rate-region for erasure broadcast channel]
\label{thm:result_2p_hbc_indep}
The rate-region $\mathcal{R}$ of independent pairs of $1$-of-$2$ string OTs, with $2$-privacy, for honest-but-curious users in the setup of Figure~\ref{fig:ot_hbc_indep} is such that
\[ \mathcal{R}_{\text{inner}} \subseteq \mathcal{R} \subseteq \mathcal{R}_{\text{outer}} \]
\end{theorem}
where
\begin{align*}
\mathcal{R}_{\text{inner}} = \Big\{ (R_B , R_C ) \in \mathbb{R}_+^2 : R_B & \leq \epsilon_2 \min \{ \epsilon_1, 1 - \epsilon_1\},\\
R_C &\leq \epsilon_1 \min \{ \epsilon_2, 1 - \epsilon_2\}, \\
R_B + R_C &\leq \epsilon_2\cdot \min\{\epsilon_1, 1 - \epsilon_1\} + \epsilon_1\cdot \min\{\epsilon_2, 1 - \epsilon_2\} \\
& \quad - \min\{\epsilon_1, 1 - \epsilon_1\} \cdot \min\{\epsilon_2, 1 - \epsilon_2\} \Big\}
\end{align*}
and
\begin{align*}
\mathcal{R}_{\text{outer}} = \Big\{
(R_B,R_C) \in \mathbb{R}_+^2 : R_B &\leq \epsilon_2 \cdot \min \{ \epsilon_1, 1 - \epsilon_1\}, \\
R_C &\leq \epsilon_1 \cdot \min \{ \epsilon_2, 1 - \epsilon_2\}, \\
R_B + R_C &\leq \epsilon_1 \cdot \epsilon_2 \Big\}.
\end{align*}
Theorem~\ref{thm:result_2p_hbc_indep} is proved in Section~\ref{sec:proofs_2}. The regions $\mathcal{R}, \mathcal{R}_{\text{inner}}, \mathcal{R}_{\text{outer}}$ are illustrated for different regimes of $\epsilon_1, \epsilon_2$ in Figure~\ref{fig:rate_region_indep_lt_half}, Figure~\ref{fig:rate_region_indep_bet_half_1} and Figure~\ref{fig:rate_region_indep_gt_half}. The inner and outer bounds match except when $\epsilon_1,\epsilon_2 > 1/2$. The upper bounds on $R_B$ and $R_C$ in the expressions above are the $2$-private OT capacities for Bob and Cathy, respectively, obtained as a consequence of Theorem~\ref{thm:result_2p_1p_hbc_wtap}. The upper bound on the sum-rate is the fraction of Alice's transmissions that are erased for both Bob and Cathy.
\begin{figure*}
\setlength{\unitlength}{1cm}
\centering
\subfigure[Rate region $\mathcal{R}$ when $\epsilon_1,\epsilon_2 \leq 1/2$]{
\centering
\begin{tikzpicture}[scale=0.73]
\draw [<->] (1,5) |- (6,1);
\node [right] at (6,1) {$R_B$};
\node [above] at (1,5) {$R_C$};
\draw [thick] (1,4.5) -- (5.5,1);
\node at (1,4.5) {\textbullet};
\node at (5.5,1) {\textbullet};
\node [left] at (1,4.5) { \tiny{$\epsilon_1 \cdot \epsilon_2$} };
\node [below] at (5.5,1) { \tiny{$\epsilon_1 \cdot \epsilon_2$} };
\end{tikzpicture}
\label{fig:rate_region_indep_lt_half}
}%
\subfigure[Rate region $\mathcal{R}$ when $\epsilon_1 \leq 1/2 < \epsilon_2$]{
\centering
\hspace{-5pt}
\begin{tikzpicture}[scale=0.73]
\draw [<->] (1,5) |- (6,1);
\node [right] at (6,1) {$R_B$};
\node [above] at (1,5) {$R_C$};
\draw [thick] (1,4.5) -- (3,4.5) -- (5.5,1);
\node at (1,4.5) {\textbullet};
\node at (3,4.5) {\textbullet};
\draw [thin, dashed] (3,4.5) -- (3,0.8);
\node at (5.5,1) {\textbullet};
\node [left] at (1,4.5) { \tiny{$\epsilon_1 \cdot (1 - \epsilon_2)$} };
\node [below] at (3,1) { \tiny{$\epsilon_1 \cdot (2 \epsilon_2 - 1)$} };
\node [below] at (5.5,1) { \tiny{$\epsilon_1 \cdot \epsilon_2$} };
\end{tikzpicture}
\label{fig:rate_region_indep_bet_half_1}
}%
\subfigure[Regions $\mathcal{R}_{\text{inner}}$ and $\mathcal{R}_{\text{outer}}$ when $1/2 < \epsilon_1,\epsilon_2$]{
\centering
\hspace{-10pt}
\begin{tikzpicture}[scale=0.73]
\draw [<->] (1,5) |- (6,1);
\node [right] at (6,1) {$R_B$};
\node [above] at (1,5) {$R_C$};
\draw [thick, color=blue] (1,4.5) -- (3,4.5) -- (5.5,3) -- (5.5,1);
\draw [thick, color=red] (3,4.5) -- (3.8,4.5) -- (5.5,3.5) -- (5.5,3);
\node at (1,4.5) {\textbullet};
\node at (3,4.5) {\textbullet};
\draw [thin, dashed] (3,4.5) -- (3,0.8);
\node at (5.5,3) {\textbullet};
\draw [thin, dashed] (5.5,3) -- (0.8,3);
\node at (5.5,1) {\textbullet};
\node [left] at (1,4.5) { \tiny{$\epsilon_1 \cdot (1 - \epsilon_2)$} };
\node [left] at (1,3) { \tiny{$(1 - \epsilon_2) \cdot (2\epsilon_1 - 1)$} };
\node [below] at (3,1) { \tiny{$(1 - \epsilon_1) \cdot (2 \epsilon_2 - 1)$} };
\node [below] at (5.5,1) { \tiny{$\epsilon_2 \cdot (1 - \epsilon_1)$} };
\node [right] at (4.8,4.2) {\color{red}{$R_{\text{outer}}$}};
\node at (3,2.5) {\color{blue}{$R_{\text{inner}}$}};
\end{tikzpicture}
\label{fig:rate_region_indep_gt_half}
}
\caption{ $\mathcal{R}$, $\mathcal{R}_{\text{inner}}$, $\mathcal{R}_{\text{outer}}$ for all regimes of $\epsilon_1, \epsilon_2$}
\end{figure*}
\subsection{Oblivious Transfer Over a Degraded Wiretapped Channel}
\label{sec:prob_statement_degraded}
\begin{figure}[h]
\setlength{\unitlength}{1cm}
\centering
\begin{tikzpicture}[scale=1]
\draw (1,3) rectangle (2,3.5);
\draw (3.5,3) rectangle (5,3.5);
\draw (6.5,3) rectangle (8,3.5);
\draw (5.25,1) rectangle (6.25,1.5);
\draw (8.25,1) rectangle (9.25,1.5);
\draw [->] (2,3.25) -- (3.5,3.25);
\draw [->] (5,3.25) -- (6.5,3.25);
\draw [->] (5.5,3.25) -- (5.5,1.5);
\draw [->] (8,3.25) -| (8.5,1.5);
\draw [<-](1.5,3.5) |- (6,4);
\draw [->] (6,4) -- (6,1.5);
\draw [->, dotted, line width=0.3mm] (6,4) -| (9,1.5);
\draw [->] (6.25,1.25) -- (6.75,1.25);
\node at (1.5,3.25) {\small{Alice}};
\node at (5.75,1.25) {\small{Bob}};
\node at (8.75,1.25) {\small{Eve}};
\node at (4.25, 3.25) {\small{BEC($\epsilon_1$)}};
\node at (7.25, 3.25) {\small{BEC($\epsilon_2$)}};
\node [above] at (5.25,4) {\small{Public channel (noiseless)}};
\node [below] at (1.5,3) {\small{$\boldsymbol{K}_0,\boldsymbol{K}_1$}};
\node [below] at (5.75,1) {$U$};
\node [right] at (6.75,1.25) {$\hat{\boldsymbol{K}}_U$};
\node [above] at (2.75,3.25) {$\boldsymbol{X}$};
\node [above] at (5.5,3.25) {$\boldsymbol{Y}$};
\node [above] at (8.35,3.25) {$\boldsymbol{Z}$};
\end{tikzpicture}
\caption{$1$-of-$2$ string OT over a degraded binary erasure broadcast channel}
\label{fig:ot_hbc_degraded}
\end{figure}
In the setup of Figure~\ref{fig:ot_hbc_degraded}, Alice is connected to Bob and Eve by a broadcast channel made up of a cascade of two independent BECs, a BEC($\epsilon_1$) followed by a BEC($\epsilon_2$). Alice and Bob are honest-but-curious. A $1$-of-$2$ string OT is desired between Alice and Bob, with $1$-privacy\footnote{We suspect that no positive $2$-private OT rate can be achieved in this setup, though our brief attempt to prove this has not been successful. The problem of obtaining OT when users can behave maliciously in this setup appears to require newer techniques and has been deferred to a future study.}. Definition~\ref{defn:protocol_hbc_wtap} and Definition~\ref{defn:ach_rate_1p_hbc_wtap} define a protocol and an achievable rate, respectively, for this setup.
\begin{theorem}[OT capacity bounds for degraded erasure broadcast channel]
\label{thm:result_1p_hbc_degraded}
The $1$-of-$2$ string OT capacity with $1$-privacy, $C_{1P}$, for honest-but-curious users in the setup of Figure~\ref{fig:ot_hbc_degraded}, is such that
\begin{equation*}
\min \left\{\frac{1}{3}\epsilon_2(1 - \epsilon_1), \epsilon_1 \right\} \leq C_{1P} \leq \min\{\epsilon_2(1 - \epsilon_1), \epsilon_1 \}.
\end{equation*}
\end{theorem}
This result is proved in Section~\ref{sec:proofs_3}. The upper and lower bounds in this result match when $\epsilon_1 \leq \frac{1}{3}\epsilon_2(1 - \epsilon_1)$. Unlike the previous setups where Bob and Eve/Cathy receive independent erasure patterns, Eve here has more knowledge of the noise process in the channel connecting Alice and Bob. Specifically, Eve knows that Bob's erasure pattern is a subset of the erasure pattern she observes. This makes it harder to guarantee privacy for Bob against Eve.
\section{Oblivious transfer over a wiretapped channel in the honest-but-curious model : Proof of Theorem~\ref{thm:result_2p_1p_hbc_wtap}}
\label{sec:proofs_0}
\subsection{2-privacy : Achievability}
For the achievability part of our proof, we describe a protocol (Protocol~\ref{protocol:C2P}) which is a natural extension of the two-party protocol of Ahlswede and Csisz\'ar \cite{ot2007} for achieving OT between Alice and Bob using a BEC($\epsilon_1$). Our extension is designed to achieve OT in the presence of Eve (see Figure~\ref{fig:ot_hbc_wtap}), with $2$-privacy. For a sequence of Protocol~\ref{protocol:C2P} instances of rate $r < C_{2P}$, we show that (\ref{eqn:ach_2p_wtap_0})-(\ref{eqn:ach_2p_wtap_3}) hold. This establishes that any $r < C_{2P}$ is an achievable $2$-private rate in the setup of Figure~\ref{fig:ot_hbc_wtap}. We begin by introducing the two-party OT protocol of Ahlswede and Csisz\'ar \cite{ot2007}.
\subsubsection{Two-party OT protocol \cite{ot2007}}
\label{sec:two_party_ot_protocol}
\begin{figure}[h]
\setlength{\unitlength}{1cm}
\centering
\begin{tikzpicture}[trim left, scale=1]
\draw (1,3) rectangle (2,3.5);
\draw (6.5,3) rectangle (7.5,3.5);
\draw [->] (1.5,4) -- (1.5,3.5);
\draw [->] (1.5,4) -| (7,3.5);
\draw [->] (7.5,3.25) -- (8,3.25);
\draw (3.5,3) rectangle (5,3.5);
\draw [->] (2,3.25) -- (3.5,3.25 );
\draw [->] (5,3.25) -- (6.5, 3.25);
\node at (4.25, 3.25) {BEC($\epsilon_1$)};
\node at (1.5,3.25) {Alice};
\node at (7,3.25) {Bob};
\node [below] at (1.5,3) {$\boldsymbol{K}_0,\boldsymbol{K}_1$};
\node [below] at (7,3) {$U$};
\node [above] at (4.25,4) {\small{noiseless channel}};
\node [above] at (2.75, 3.25) {$\boldsymbol{X}$};
\node [above] at (5.75, 3.25) {$\boldsymbol{Y}$};
\node [right] at (8,3.25) {$\hat{\boldsymbol{K}}_U$};
\end{tikzpicture}
\caption{Setup for two-party OT using a BEC($\epsilon_1$)}
\label{fig:ot_twoparty_dmc}
\end{figure}
Consider the two-party setup of Figure~\ref{fig:ot_twoparty_dmc}. The OT capacity in this setup is $\min\{\epsilon_1, 1 - \epsilon_1\}$ \cite{ot2007}. Let $r < \min\{\epsilon_1, 1 - \epsilon_1\}$. Ahlswede and Csisz\'ar's \cite{ot2007} protocol begins with Alice transmitting a sequence $\boldsymbol{X}$ of $n$ i.i.d., Bernoulli($1/2$) bits over the channel. Bob receives the channel output $\boldsymbol{Y}$. Let $E$ be the set of all indices at which $\boldsymbol{Y}$ is erased and $\overline{E}$ that of all indices at which $\boldsymbol{Y}$ is unerased. If $|E| < nr$ or $|\overline{E}| < nr$, Bob aborts the protocol since he does not have sufficient erasures or non-erasures to run the protocol. From $\overline{E}$, Bob picks a subset $L_U$ of cardinality $nr$, uniformly at random. From $E$, Bob picks a subset $L_{\overline{U}}$ of the same cardinality as $L_U$, also uniformly at random and then sends the sets $L_0,L_1$ over the public channel. Alice cannot infer which of the sets $L_0,L_1$ consists of indices at which $\boldsymbol{Y}$ was erased, since the channel acts independently on each input bit. As a result, Alice does not learn $U$ when it receives $L_0,L_1$ from Bob. Alice uses $\boldsymbol{X}|_{L_0}, \boldsymbol{X}|_{L_1}$ as the keys to encrypt its strings and send these encrypted strings to Bob. That is, Alice sends $\boldsymbol{K}_0 \oplus \boldsymbol{X}|_{L_0}, \boldsymbol{K}_1 \oplus \boldsymbol{X}|_{L_1}$ to Bob over the public channel. Bob knows only the key $\boldsymbol{X}|_{L_U}$ (since $\boldsymbol{Y}|_{L_U}$ is unerased) and knows nothing about the key $\boldsymbol{X}|_{L_{\overline{U}}}$ (since $\boldsymbol{Y}|_{L_{\overline{U}}}$ is erased). As a result, Bob learns $\boldsymbol{K}_U$ but learns nothing about $\boldsymbol{K}_{\overline{U}}$.
\subsubsection{Protocol for $2$-privacy in the wiretapped model}
\label{sec:2p_ot_protocol}
The above two-party protocol, as is, is insufficient for privacy against Eve in our wiretapped channel model (see Figure~\ref{fig:ot_hbc_wtap}). This is because the keys $\boldsymbol{X}|_{L_0}, \boldsymbol{X}|_{L_1}$ that Alice uses in the two-party protocol are both partially known to Eve, since Eve knows an independently erased version $\boldsymbol{Z}$ of $\boldsymbol{X}$. As a result, when Alice sends $\boldsymbol{K}_0 \oplus \boldsymbol{X}|_{L_0}, \boldsymbol{K}_1 \oplus \boldsymbol{X}|_{L_1}$ to Bob over the public channel, Eve learns approximately a fraction $(1 - \epsilon_2)$ of both of Alice's strings, violating (\ref{eqn:ach_2p_wtap_3}).
The key idea in our protocol (Protocol~\ref{protocol:C2P}) is that Alice converts the strings $\boldsymbol{X}|_{L_0}, \boldsymbol{X}|_{L_1}$ into independent secret keys $\boldsymbol{S}_0,\boldsymbol{S}_1$ respectively. Only one of these keys will be known to Bob and none of these keys will be known to Eve. Alice now sends $\boldsymbol{K}_0 \oplus \boldsymbol{S}_0, \boldsymbol{K}_1 \oplus \boldsymbol{S}_1$ to Bob over the public channel. In order to have $\boldsymbol{S}_0$ and $\boldsymbol{S}_1$ of length about $nr$ bits each, our protocol requires $|L_0| = |L_1| = nr/\epsilon_2$ approximately. Clearly, Bob knows $\boldsymbol{S}_U$ since he knows $\boldsymbol{X}|_{L_U}$ and can, thus, recover $\boldsymbol{K}_U$ from Alice's public message. As we prove later, $\boldsymbol{S}_{\overline{U}}$ remains unknown to a colluding Bob and Eve and so these colluding parties do not learn $\boldsymbol{K}_{\overline{U}}$, a key requirement for $2$-privacy. Since $\boldsymbol{S}_0, \boldsymbol{S}_1$ were independent and secret from Eve, clearly, Eve does not learn anything about Alice's strings from $\boldsymbol{K}_0 \oplus \boldsymbol{S}_0, \boldsymbol{K}_1 \oplus \boldsymbol{S}_1$. In order to convert $\boldsymbol{X}|_{L_0}, \boldsymbol{X}|_{L_1}$ into independent secret keys $\boldsymbol{S}_0, \boldsymbol{S}_1$ respectively, Alice selects two functions $F_0,F_1$ randomly and independently from a class $\mathcal{F}$ of \emph{universal}$_2$ hash functions \cite{carter_wegman_1979, carter_wegman_1981} (see Appendix~\ref{appndx:privacy_amplification} for details). The inputs of $F_0,F_1$ are about $nr/\epsilon_2$ bits long and their outputs are about $nr$ bits long. The required keys are $\boldsymbol{S}_0 = F_0(\boldsymbol{X}|_{L_0})$ and $\boldsymbol{S}_1 = F_1(\boldsymbol{X}|_{L_1})$. The main property of universal$_2$ hash functions used here is \emph{privacy amplification} \cite[Corollary 4]{generalized_privacy_ampl_1995}. In the present case, privacy amplification by the chosen universal$_2$ hash functions guarantees that the function output appears nearly random to any eavesdropper (e.g. colluding Bob and Eve) who does not know approximately a fraction $\epsilon_2$ (or more) of the function input. Alice sends $F_0,F_1$ to Bob alongwith $\boldsymbol{K}_0 \oplus \boldsymbol{S}_0, \boldsymbol{K}_1 \oplus \boldsymbol{S}_1$ over the public channel.
\begin{algorithm*}
\floatname{algorithm}{Protocol}
\caption{Protocol for achieving any $r < C_{2P}$}
\label{protocol:C2P}
Parameters : \begin{minipage}[t]{0.8\linewidth}
\begin{itemize}
\item $\delta \in (0,1)$ such that $r < (\epsilon_2 - \delta)(\min \{\epsilon_1, 1 - \epsilon_1\} - \delta)$ and $(\epsilon_2 - \delta) \in \mathbb{Q}$
\item $0 < \tilde{\delta} < r$, $\tilde{\delta} \in \mathbb{Q}$
\item $\beta = \frac{r}{\epsilon_2 - \delta}$
\item $\beta n, n(r - \tilde{\delta}) \in \mathbb{N}$
\item The rate\footnotemark of the protocol is $(r - \tilde{\delta})$
\end{itemize}
\end{minipage}
\begin{multicols}{2}
\begin{algorithmic}[1]
\STATE Alice transmits an $n$-tuple $\boldsymbol{X}$ of i.i.d. Bernoulli($1/2$) bits over the channel.
\STATE \label{step:2p_wtap_abort0} Bob receives the $n$-tuple $\boldsymbol{Y}$ from BEC($\epsilon_1$). Bob forms the sets
\begin{align*}
\overline{E} & := \{ i \in \{1,2,\ldots,n\}: Y_i \neq \bot\} \\
E & := \{ i \in \{1,2,\ldots,n\}: Y_i = \bot\}
\end{align*}
If $|\overline{E}| < \beta n$ or $|E| < \beta n$, Bob aborts the protocol.
\STATE Bob creates the following sets:
\begin{align*}
L_U & \thicksim \text{Unif}\{A \subset \overline{E} : |A| = \beta n\} \\
L_{\overline{U}} & \thicksim \text{Unif}\{A \subset E : |A| = \beta n\} \\
\end{align*}
Bob reveals $L_0,L_1$ to Alice over the public channel.
\STATE Alice randomly and independently chooses functions $F_0,F_1$ from a family $\mathcal{F}$ of universal$_2$ hash functions:
\[ F_0,F_1 : \{0,1\}^{\beta n} \longrightarrow \{0,1\}^{n(r - \tilde{\delta})} \]
Alice finally sends the following information to Bob on the public channel:
\[ F_0, \; F_1, \; \boldsymbol{K}_0 \oplus F_0(\boldsymbol{X}|_{L_0}), \; \boldsymbol{K}_1 \oplus F_1(\boldsymbol{X}|_{L_1}) \]
\STATE Bob knows $F_U,\boldsymbol{X}|_{L_U}$ and can, therefore, recover $\boldsymbol{K}_U$.
\end{algorithmic}
\end{multicols}
\end{algorithm*}
\footnotetext{The parameters $\delta, \tilde{\delta}$ can be chosen to be arbitrarily small so that this rate takes any desired value less than $C_{2P}$.}
\begin{lemma}
\label{lem:c2p_ach_wtap}
Any $r < C_{2P}$ is an achievable $2$-private rate in the setup of Figure~\ref{fig:ot_hbc_wtap} when users are honest-but-curious.
\end{lemma}
A formal proof of this lemma is deferred to Appendix~\ref{appndx:proof_ach_2p_hbc_wtap}. A sketch of this proof is as follows. It suffices to prove this lemma only for rational values of $r < C_{2P}$ due to the denseness of $\mathbb{Q}$ in $\mathbb{R}$. Let $(\mathcal{P}_n)_{\{n \in \mathbb{N}\}}$ be a sequence of Protocol~\ref{protocol:C2P} instances, of rate $r - \tilde{\delta}$. With high probability, $\mathcal{P}_n$ does not abort. In that case, Bob knows the key $\boldsymbol{S}_U = F_U(\boldsymbol{X}|_{L_U})$ and can recover $\boldsymbol{K}_U$ from $\boldsymbol{K}_0 \oplus \boldsymbol{S}_0, \boldsymbol{K}_1 \oplus \boldsymbol{S}_1$ that Alice sends. As a result, (\ref{eqn:ach_2p_wtap_0}) holds for $(\mathcal{P}_n)_{\{n \in \mathbb{N}\}}$. For the key $\boldsymbol{S}_{\overline{U}} = F_{\overline{U}}(\boldsymbol{X}|_{L_{\overline{U}}})$, the privacy amplification by $F_{\overline{U}}$ on its input ensures that the amount of information that colluding Bob and Eve learn about $\boldsymbol{S}_{\overline{U}}$ falls exponentially in $n$. As a result, colluding Bob and Eve learn only a vanishingly small amount of information about $\boldsymbol{K}_{\overline{U}}$ and, thus, (\ref{eqn:ach_2p_wtap_1}) holds for $(\mathcal{P}_n)_{\{n \in \mathbb{N}\}}$. The only way that colluding Alice and Eve can learn $U$ is when Bob sends $L_0,L_1$. But since the channel acts independently on each input bit, the composition of $L_0,L_1$ does not reveal $U$. Thus, (\ref{eqn:ach_2p_wtap_2}) holds for the protocol sequence. Finally, conditioned on knowing $U$, Eve still does not learn anything about Alice's strings. This is because in the keys $\boldsymbol{S}_0 = F_0(\boldsymbol{X}|_{L_0}), \boldsymbol{S}_1 = F_1(\boldsymbol{X}|_{L_1})$, the privacy amplification by $F_0,F_1$ on their respective inputs ensures that the amount of information Eve learns about $\boldsymbol{S}_0, \boldsymbol{S}_1$ falls exponentially in $n$. As a result, Eve gains only a vanishingly small amount of information about $\boldsymbol{K}_0, \boldsymbol{K}_1$ from Alice's public message. This guarantees that (\ref{eqn:ach_2p_wtap_3}) holds for $(\mathcal{P}_n)_{\{n \in \mathbb{N}\}}$.
\subsection{1-privacy : Achievability}
\label{sec:1p_ot_protocol}
Our protocol (Protocol~\ref{protocol:C1P}) for achieving OT in the presence of Eve, with $1$-privacy in our setup (see Figure~\ref{fig:ot_hbc_wtap}), is an extension of Ahlswede and Csisz\'ar's two-party OT protocol \cite{ot2007}. For a sequence of Protocol~\ref{protocol:C1P} instances of rate $r < C_{1P}$, we show that (\ref{eqn:ach_1p_wtap_0})-(\ref{eqn:ach_1p_wtap_3}) hold. This establishes that any $r < C_{1P}$ is an achievable $1$-private rate in the setup of Figure~\ref{fig:ot_hbc_wtap}.
For achieving $1$-privacy, recall that privacy for Alice's strings is required only individually against Bob and against Eve, not against colluding Bob and Eve. As a result, the main change in Protocol~\ref{protocol:C1P}, compared to Protocol~\ref{protocol:C2P}, is that the requirement of $L_{\overline{U}}$ coming entirely from $E$ is relaxed. Protocol~\ref{protocol:C1P} requires that $nr$ indices in $L_{\overline{U}}$ have to come from $E$. The remaining about $(nr/\epsilon_2) - nr$ indices in $L_{\overline{U}}$ can come from an arbitrary combination of leftover indices of $E$ and $\overline{E}$. Since the key $\boldsymbol{S}_{\overline{U}} = F_{\overline{U}}(\boldsymbol{X}|_{L_{\overline{U}}})$ is about $nr$ bits long, privacy amplification by $F_{\overline{U}}$ on its input $\boldsymbol{X}|_{L_{\overline{U}}}$ ensures that $\boldsymbol{S}_{\overline{U}}$ is unknown to Bob. Since $|L_{\overline{U}}|$ is about $nr/\epsilon_2$, the privacy amplification also guarantees that $\boldsymbol{S}_{\overline{U}}$ is unknown to Eve as well. Thus, the key $\boldsymbol{S}_{\overline{U}}$ remains hidden individually from Bob and from Eve and that suffices to achieve $1$-privacy in the setup. Furthermore, note that when $\epsilon_1 < 1/2$, Protocol~\ref{protocol:C2P} had unused indices from $\overline{E}$ which Protocol~\ref{protocol:C1P} can use in constructing a larger $L_{\overline{U}}$. This results in higher achievable $1$-private rates compared to achievable $2$-private rates when $\epsilon_1 < 1/2$.
\begin{algorithm*}
\floatname{algorithm}{Protocol}
\caption{Protocol for achieving any $r < C_{1P}$}
\label{protocol:C1P}
Parameters : \begin{minipage}[t]{0.8\linewidth}
\begin{itemize}
\item $\delta \in (0,1)$ such that $r < \min\{ (\epsilon_1 - \delta), \frac{1}{2}(\epsilon_2 - \delta), (\epsilon_2 - \delta)(1 - \epsilon_1 - \delta) \}$ and $(\epsilon_2 - \delta) \in \mathbb{Q}$
\item $0 < \tilde{\delta} < r$, $\tilde{\delta} \in \mathbb{Q}$
\item $\beta = \frac{r}{\epsilon_2 - \delta}$
\item $\beta n, nr, n(r - \tilde{\delta}) \in \mathbb{N}$
\item The rate\footnotemark of the protocol is $(r - \tilde{\delta})$
\end{itemize}
\end{minipage}
\begin{multicols}{2}
\begin{algorithmic}[1]
\STATE Alice transmits an $n$-tuple $\boldsymbol{X}$ of i.i.d. Bernoulli($1/2$) bits over the channel.
\STATE \label{step:1p_wtap_abort0} Bob receives the $n$-tuple $\boldsymbol{Y}$ from BEC($\epsilon_1$). Bob forms the sets
\begin{align*}
\overline{E} & := \{ i \in \{1,2,\ldots,n\}: Y_i \neq \bot\} \\
E & := \{ i \in \{1,2,\ldots,n\}: Y_i = \bot\}
\end{align*}
If $|\overline{E}| < \beta n$ or $|E| < nr$, Bob aborts the protocol.
\STATE Bob creates the following sets:
\begin{align*}
L & \thicksim \text{Unif}\{ A \subset E : |A| = nr \} \\
L_U & \thicksim \text{Unif}\{A \subset \overline{E} : |A| = \beta n\} \\
L_{\overline{U}} & \thicksim L \cup \text{Unif}\{A \subset \overline{E} \backslash L_U \; \cup E \backslash L : |A| = (\beta - r)n\}
\end{align*}
Bob reveals $L_0,L_1$ to Alice over the public channel.
\STATE Alice randomly and independently chooses functions $F_0,F_1$ from a family $\mathcal{F}$ of universal$_2$ hash functions:
\[ F_0,F_1 : \{0,1\}^{\beta n} \longrightarrow \{0,1\}^{n(r - \tilde{\delta})} \]
Alice finally sends the following information on the public channel:
\[ F_0, \; F_1, \; \boldsymbol{K}_0 \oplus F_0(\boldsymbol{X}|_{L_0}), \; \boldsymbol{K}_1 \oplus F_1(\boldsymbol{X}|_{L_1}) \]
\STATE Bob knows $F_U,\boldsymbol{X}|_{L_U}$ and can, therefore, recover $\boldsymbol{K}_U$.
\end{algorithmic}
\end{multicols}
\end{algorithm*}
\begin{lemma}
\label{lem:c1p_ach_wtap}
Any $r < C_{1P}$ is an achievable $1$-private rate in the setup of Figure~\ref{fig:ot_hbc_wtap} when users are honest-but-curious.
\end{lemma}
This lemma is formally proved in Appendix~\ref{appndx:proof_ach_1p_hbc_wtap}. A sketch of its proof now follows. Let $(\mathcal{P}_n)_{\{n \in \mathbb{N}\}}$ be a sequence of Protocol~\ref{protocol:C1P} instances, of rate $r - \tilde{\delta}$. If the protocol does not abort, then (\ref{eqn:ach_1p_wtap_0}), (\ref{eqn:ach_1p_wtap_2}) and (\ref{eqn:ach_1p_wtap_3}) hold for $(\mathcal{P}_n)_{\{n \in \mathbb{N}\}}$ for the same reasons that (\ref{eqn:ach_2p_wtap_0}), (\ref{eqn:ach_2p_wtap_2}) and (\ref{eqn:ach_2p_wtap_3}) respectively hold for a sequence of Protocol~\ref{protocol:C2P} instances. To see that (\ref{eqn:ach_1p_wtap_1}) holds for $(\mathcal{P}_n)_{\{n \in \mathbb{N}\}}$, note that $L_{\overline{U}}$ consists of at least $nr$ indices at which $\boldsymbol{Y}$ is erased. Also, the key $\boldsymbol{S}_{\overline{U}} = F_{\overline{U}}(\boldsymbol{X}|_{L_{\overline{U}}})$ is about $nr$ bits long and privacy amplification by $F_{\overline{U}}$ on its input $\boldsymbol{X}|_{L_{\overline{U}}}$ ensures that the amount of information Bob learns about $\boldsymbol{S}_{\overline{U}}$ falls exponentially with $n$. Hence, Bob learns only a vanishingly small amount of information about the string $\boldsymbol{K}_{\overline{U}}$ from $\boldsymbol{K}_0 \oplus \boldsymbol{S}_0, \boldsymbol{K}_1 \oplus \boldsymbol{S}_1$.
\footnotetext{The parameters $\delta, \tilde{\delta}$ can be chosen to be arbitrarily small so that this rate takes any desired value less than $C_{1P}$.}
\subsection{$2$-privacy : Converse}
We only require a weaker secrecy condition to prove our converse. Specifically, we only need (\ref{eqn:ach_2p_wtap_1}) and (\ref{eqn:ach_2p_wtap_3}) to hold with a $1/n$ multiplied to their left-hand-sides.
\begin{lemma}
\label{lem:upper_bound_2p_wtap}
If $r_{2P}$ is an achievable $2$-private rate in the setup of Figure~\ref{fig:ot_hbc_wtap} when users are honest-but-curious, then
\[ r_{2P} \leq C_{2P}. \]
\end{lemma}
\begin{proof}
We first show a general upper bound on $r_{2P}$. For the setup in Figure~\ref{fig:ot_hbc_wtap_bcast},
\[ r_{2P} \leq \min\left \{ \max_{p_X} I(X ; Y | Z), \max_{p_X} H(X | Y, Z) \right \}. \]
It is straightforward to verify that any OT protocol for the setup in Figure~\ref{fig:ot_hbc_wtap_bcast} is a two-party OT protocol between Alice and Bob-Eve combined. Using an outerbound for OT capacity in \cite{ot2007}, we have
\[ r_{2P} \leq \max_{p_X} H(X | Y, Z). \]
To see that $\max_{p_X} I(X ; Y | Z)$ is an upper bound on $r_{2P}$, we argue that using an OT protocol, Alice and Bob can agree on a secret key, secret from Eve, at the same rate as the OT. Suppose we modify the OT protocol so that at the end of it, Bob reveals $U$ over the public channel. As a result, Alice learns $\boldsymbol{K}_U$. We show that this string $\boldsymbol{K}_U$ is a secret key between Alice and Bob, which Eve knows nothing about. Since Alice learns $\boldsymbol{K}_U$ and (\ref{eqn:ach_2p_wtap_0}) holds, both Alice and Bob learn $\boldsymbol{K}_U$. Further, (\ref{eqn:ach_2p_wtap_3}) implies that $(1/n) \cdot I(\boldsymbol{K}_0,\boldsymbol{K}_1,U,\boldsymbol{K}_U ; V_E) \longrightarrow 0$. This, in turn, implies that $(1/n) \cdot I(\boldsymbol{K}_U ; V_E | U) \longrightarrow 0$. Now:
\begin{align*}
\frac{1}{n}I(\boldsymbol{K}_U ; V_E | U) & = \frac{1}{n}(I(\boldsymbol{K}_U ; V_E, U) - I(\boldsymbol{K}_U ; U)) \\
& \geq \frac{1}{n}I(\boldsymbol{K}_U ; V_E, U) - \frac{1}{n}.
\end{align*}
Hence, $(1/n) \cdot I(\boldsymbol{K}_U ; V_E, U) \longrightarrow 0$ as $n \longrightarrow \infty$. This shows that in the modified protocol, after Bob reveals $U$ at the end, Alice and Bob learn $\boldsymbol{K}_U$ and Eve learns only a vanishingly small amount of information about $\boldsymbol{K}_U$. Hence, $\boldsymbol{K}_U$ becomes a secret key between Alice and Bob, against Eve. Since $\max_{p_X} I(X ; Y | Z)$ is an upperbound on secret key capacity for the setup of Figure~\ref{fig:ot_hbc_wtap_bcast} \cite{sec-key1993}, we get:
\[ r_{2P} \leq \max_{p_X} I(X ; Y | Z). \]
Evaluating the upper bound for the setup of Figure~\ref{fig:ot_hbc_wtap}, we get:
\begin{align*}
r_{2P} & \leq \max_{p_X} I(X ; Y | Z) = \epsilon_2 (1 - \epsilon_1) \\
r_{2P} & \leq \max_{p_X} H(X | (Y, Z)) = \epsilon_2 \epsilon_1.
\end{align*}
As a result, $r_{2P} \leq C_{2P}$.
\end{proof}
\subsection{$1$-privacy : Converse}
As before, we show that the upper bounds hold even under weakened security conditions, where (\ref{eqn:ach_1p_wtap_1}) and (\ref{eqn:ach_1p_wtap_3}) hold with a $1/n$ multiplied to their left-hand-sides.
\begin{lemma}
If $r_{1P}$ is an achievable $1$-private rate, with honest-but-curious users, for the setup of Figure~\ref{fig:ot_hbc_wtap}, then
\[ r_{1P} \leq C_{1P}. \]
\end{lemma}
\begin{proof}
We first show that $r_{1P} \leq \min \left\{ \epsilon_1, \epsilon_2 (1 - \epsilon_1) \right\}$ by means of the following more general statement: For the setup of Figure~\ref{fig:ot_hbc_wtap_bcast},
\begin{equation}
\label{eqn:c1p_general_outer}
r_{1P} \leq \left \{ \max_{p_X} I(X ; Y | Z), \max_{p_X} H(X | Y) \right \}.
\end{equation}
Proof for $r_{1P} \leq \max_{p_X} I(X ; Y | Z)$ is identical to the proof for $r_{2P} \leq \max_{p_X} I(X ; Y | Z)$ (in the proof of Lemma~\ref{lem:upper_bound_2p_wtap}).
$r_{1P} \leq \max_{p_X} H(X | Y)$ follows from the observation that any OT protocol achieving $1$-privacy in the setup of Figure~\ref{fig:ot_hbc_wtap_bcast}, is also a two-party OT protocol between two users connected by the channel $p_{Y|X}$. As a result, $\max_{p_X} H(X | Y)$, which is an upper bound on two-party OT rate \cite{ot2007}, is also an upper bound on $r_{1P}$. Evaluated for the setup of Figure~\ref{fig:ot_hbc_wtap}, these upperbounds are:
\begin{align*}
r_{1P} & \leq \max_{p_X} H(X | Y) = \epsilon_1 \\
r_{1P} & \leq \max_{p_X} I(X ; Y | Z) = \epsilon_2(1 - \epsilon_1).
\end{align*}
We now prove that $r_{1P} \leq \epsilon_2/2$ for setup of Figure~\ref{fig:ot_hbc_wtap}, which will complete the proof of the converse. We use the following lemma (proved in Appendix \ref{appndx:proof_small_quant_1p_hbc_wtap}) which shows that both $\boldsymbol{K_0},\boldsymbol{K}_1$ can be decoded from $\boldsymbol{X}, \boldsymbol{\Lambda}$.
\begin{lemma}
\label{lem:small_quant_1p_hbc_wtap}
\[ \frac{1}{n}H(\boldsymbol{K_0},\boldsymbol{K}_1 | \boldsymbol{X}, \boldsymbol{\Lambda} ) \longrightarrow 0 \text{ as } n \longrightarrow \infty \]
\end{lemma}
Intuitively, this lemma holds for the following reason: Alice cannot learn which of its two strings Bob requires (cf.(\ref{eqn:ach_1p_wtap_2})). Thus, anyone observing the cut separating Alice from the system, i.e. $\boldsymbol{X},\boldsymbol{\Lambda}$, must be able to decode both $\boldsymbol{K_0},\boldsymbol{K}_1$. If this were not the case and, say, $\boldsymbol{K}_0$ could not be decoded from $\boldsymbol{X},\boldsymbol{\Lambda}$, then Alice can infer that Bob wanted $\boldsymbol{K}_1$ which violates (\ref{eqn:ach_1p_wtap_2}).
We can convert this lemma into an upperbound as follows: Knowing $\boldsymbol{X},\boldsymbol{\Lambda}$, one can decode $\boldsymbol{K_0},\boldsymbol{K}_1$. Eve has access to almost all of $\boldsymbol{X},\boldsymbol{\Lambda}$, except about an $\epsilon_2$ fraction of $\boldsymbol{X}$ which was erased by the channel. It is required that Eve learns no information about both $\boldsymbol{K_0},\boldsymbol{K}_1$. As a result, each string's length cannot exceed $n \epsilon_2/2$. More formally, let $\tilde{E} := \{ i \in \{1,2,\ldots,n\} : Z_i = \bot \}$. Let $\tilde{e}$ denote a realization of $\tilde{E}$ and let $\overline{\tilde{e}} = \{1,2,\ldots,n\} \backslash \tilde{e}$ be the complement of $\tilde{e}$. Then,
\begin{align*}
2m & = H(\boldsymbol{K}_0,\boldsymbol{K}_1) \\
& = I(\boldsymbol{K}_0,\boldsymbol{K}_1 ; \boldsymbol{X},\boldsymbol{\Lambda}) + H(\boldsymbol{K}_0,\boldsymbol{K}_1 | \boldsymbol{X},\boldsymbol{\Lambda}) \\
& \stackrel{\text{(a)}}{=} I(\boldsymbol{K}_0,\boldsymbol{K}_1 ; \boldsymbol{X},\boldsymbol{\Lambda}) + o(n) \\
& \stackrel{\text{(b)}}{=} I(\boldsymbol{K}_0,\boldsymbol{K}_1 ; \boldsymbol{X},\boldsymbol{\Lambda} | \tilde{E}) + o(n) \\
& = \sum_{\tilde{e} \subseteq \{1,2,\ldots,n\} } p_{\tilde{E}}(\tilde{e}) I(\boldsymbol{K}_0,\boldsymbol{K}_1 ; \boldsymbol{X},\boldsymbol{\Lambda} | \tilde{E} = \tilde{e}) + o(n) \\
& = \sum_{\tilde{e} \subseteq \{1,2,\ldots,n\} } p_{\tilde{E}}(\tilde{e}) I(\boldsymbol{K}_0,\boldsymbol{K}_1 ; \boldsymbol{X}|_{\overline{\tilde{e}}}, \boldsymbol{\Lambda} \; \mathlarger{\mid} \; \tilde{E} = \tilde{e}) +\sum_{\tilde{e} \subseteq \{1,2,\ldots,n\} } p_{\tilde{E}}(\tilde{e}) I(\boldsymbol{K}_0,\boldsymbol{K}_1 ; \boldsymbol{X}|_{\tilde{e}} \; \mathlarger{\mid} \; \boldsymbol{X}|_{\overline{\tilde{e}}}, \boldsymbol{\Lambda}, \tilde{E} = \tilde{e}) + o(n) \\
& \leq \sum_{\tilde{e} \subseteq \{1,2,\ldots,n\} } p_{\tilde{E}}(\tilde{e}) I(\boldsymbol{K}_0,\boldsymbol{K}_1 ; \boldsymbol{X}|_{\overline{\tilde{e}}}, \boldsymbol{\Lambda} \; \mathlarger{\mid} \; \tilde{E} = \tilde{e}) + \sum_{\tilde{e} \subseteq \{1,2,\ldots,n\} } p_{\tilde{E}}(\tilde{e}) H(\boldsymbol{X}|_{\tilde{e}} \; \mathlarger{\mid} \; \tilde{E} = \tilde{e}) + o(n) \\
& \leq I(\boldsymbol{K}_0,\boldsymbol{K}_1 ; \boldsymbol{Z}, \boldsymbol{\Lambda}) + \sum_{\tilde{e} \subseteq \{1,2,\ldots,n\} } p_{\tilde{E}}(\tilde{e}) |\tilde{e}| + o(n) \\
& = I(\boldsymbol{K}_0,\boldsymbol{K}_1 ; \boldsymbol{Z}, \boldsymbol{\Lambda}) + n\epsilon_2 + o(n) \\
& \stackrel{\text{(c)}}{=} n\epsilon_2 + o(n)
\end{align*}
where (a) follows from Lemma~\ref{lem:small_quant_1p_hbc_wtap}, (b) from the independence of Eve's channel, and (c) from (\ref{eqn:ach_1p_wtap_3}). Therefore,
\begin{align*}
r_{1P} & = \frac{m}{n} \\
& \leq \frac{\epsilon_2}{2} + \frac{o(n)}{n}
\end{align*}
\end{proof}
\section{Oblivious transfer over a wiretapped channel in the malicious model : Proof of Theorem~\ref{thm:result_2p_malicious_wtap}}
\label{sec:proofs_1}
In this setup (see Figure~\ref{fig:ot_hbc_wtap}), Alice and Bob are required to achieve OT, with $2$-privacy, in the presence of Eve when both Alice and Bob can be malicious. We show that for this problem, any
\[ R < \left\{ \begin{array}{lr} \epsilon_1 \epsilon_2, & \epsilon_1 \leq \frac{1}{2}\\ \epsilon_1 \epsilon_2 (1 - \epsilon_1), & \epsilon_1 > \frac{1}{2} \end{array} \right. \]
is an achievable $2$-private rate. The protocol we give for proving the achievability of $R$ is described separately for the regimes $\epsilon_1 \leq 1/2$ and $\epsilon_1 > 1/2$, since the protocol differs substantially in these two regimes.
\subsection{Protocol when $\epsilon_1 \leq 1/2$}
\label{sec:protocol_malicious_lt}
In this regime, our protocol (Protocol~\ref{protocol:malicious_lt}) is an adaptation of the protocol described for two-party OT with malicious users in \cite{savvides_thesis}, \cite{PintoDowsMorozNasc2011} and \cite{DowsNasc2014-arxiv}. Bob forms the \emph{tuples} of indices $\boldsymbol{L}_0, \boldsymbol{L}_1$ and communicates these tuples to Alice. In contrast, recall that in the honest-but-curious case Bob communicated \emph{sets} $L_0,L_1$ to Alice. Also, unlike the honest-but-curious case, a small fraction of both tuples is now allocated for use in checks that Alice performs to detect possible malicious behavior by Bob. These checks are based on interactive hashing \cite{savvides_thesis}, which also provides a mechanism for Bob to detect possible malicious behavior by Alice. Interactive hashing is an interactive protocol between two users over a noiseless channel, one acting as a sender and the other acting as a receiver. The input to the protocol is a bit-string held by the sender. The output of the protocol are two bit-strings of the same lengths as the input bit-string, both available to the sender as well as the receiver. Of the two output strings, one is the same as the input string but the receiver cannot make out which one of the two it is. The sender, of course, knows which of the output strings was the input for the protocol but it cannot influence the choice of the other string being output by the protocol. Appendix~\ref{appndx:interactive_hashing} states the properties and describes a protocol for interactive hashing, as given in \cite{savvides_thesis}. While using interactive hashing in our protocol, Bob acts as the sender and Alice acts as the receiver.
The following explains our protocol in more detail.
Alice initiates the protocol by transmitting a sequence $\boldsymbol{X}$ of $n$ i.i.d. Bernoulli($1/2$) bits over the channel. Bob and Eve receive the channel outputs $\boldsymbol{Y}$ and $\boldsymbol{Z}$ respectively. Let $E$ be the set of all the indices at which $\boldsymbol{Y}$ is erased and $\overline{E}$ that of all the indices at which $\boldsymbol{Y}$ is unerased. If $|E|$ or $|\overline{E}|$ are not sufficiently close to their respective expected values, Bob aborts the protocol since he does not have enough of either erasures or non-erasures to run the protocol. Bob now has to form two equal-sized, disjoint tuples of indices, $\boldsymbol{L}_U$ and $\boldsymbol{L}_{\overline{U}}$, each tuple consisting of about $n/2$ indices. The \emph{good tuple} $\boldsymbol{L}_U$ is picked uniformly at random from $\overline{E}$. To form the \emph{bad tuple} $\boldsymbol{L}_{\overline{U}}$, Bob first uniformly at random selects a subset $J \subset \{1,2,\ldots,|\{\boldsymbol{L}_{\overline{U}}\}|\}$, with $|J|$ being about $(1/2 - \epsilon_1)n$. The elements $\boldsymbol{L}_{\overline{U}}|_J$ are chosen uniformly at random from elements of $\overline{E} \backslash \{\boldsymbol{L}_U\}$ while the elements $\boldsymbol{L}_{\overline{U}}|_{J^c}$ are chosen uniformly at random from elements of $E$. Here, $J^c$ is the set $\{1,2,\ldots,|\{\boldsymbol{L}_{\overline{U}}\}|\} \backslash J$. Note that $|\overline{E}|$ will be nearly equal to $|\{\boldsymbol{L}_U\}| + |J|$. Bob reveals $\boldsymbol{L}_0,\boldsymbol{L}_1$ to Alice. Conditioned on Alice's view, $\boldsymbol{L}_0,\boldsymbol{L}_1$ are uniformly distributed tuples of indices. This uniform distribution prevents leakage of any information about $J$, and thereby $U$, to Alice, when Alice sees $\boldsymbol{L}_0,\boldsymbol{L}_1$. Thereafter, Bob and Alice initiate interactive hashing, with a bit-string $\boldsymbol{S}$ representing $J$ being the input to interactive hashing. As the output of interactive hashing, both Alice and Bob receive some pair of strings $\boldsymbol{S}_0, \boldsymbol{S}_1$ which represent some subsets $J_0,J_1$ respectively. Suppose $J_{\Phi} = J$ where the random variable $\Phi \in \{0,1\}$. In a crucial step designed to catch a malicious Bob, Bob is now required to reveal the bits of $\boldsymbol{X}$ at indices $\boldsymbol{L}_U|_{J_{\overline{\Phi}}}$ and at indices $\boldsymbol{L}_{\overline{U}}|_{J_{\Phi}}$. An honest Bob knows these bits fully. And we prove later that if Bob cheats by populating $\boldsymbol{L}_{\overline{U}}$ with more than the designated number of elements from $\overline{E}$, Bob will fail to reveal all the bits of $\boldsymbol{X}$ at indices $\boldsymbol{L}_U|_{J_{\overline{\Phi}}}$ with high probability. As in the honest-but-curious setup, Alice forms two keys to encrypt her strings, where both the keys are secret from Eve. Towards this goal, Alice randomly and independently selects two functions $F_0,F_1$ from a universal$_2$ class of functions $\mathcal{F}$ (see Appendix~\ref{appndx:privacy_amplification} for its definition). The required keys are $F_0(\boldsymbol{X}|_{\boldsymbol{L}_0})$ and $F_1(\boldsymbol{X}|_{\boldsymbol{L}_1})$. Alice now sends $F_0, F_1, \boldsymbol{K}_0 \oplus F_0(\boldsymbol{X}|_{\boldsymbol{L}_0}), \boldsymbol{K}_1 \oplus F_1(\boldsymbol{X}|_{\boldsymbol{L}_1})$ to Bob over the public channel. An honest Bob knows $\boldsymbol{X}|_{\boldsymbol{L}_U}$ and can obtain $\boldsymbol{K}_U$. As we will show, a malicious Bob colluding with Eve, if not caught already, learns a vanishingly small amount of information about at least one of the two keys and, as a result, can learn only a vanishing amount of information about the corresponding string.
\begin{algorithm*}
\floatname{algorithm}{Protocol}
\caption{Malicious Users, $\epsilon_1 \leq 1/2$}
\label{protocol:malicious_lt}
Parameters : \begin{minipage}[t]{0.8\linewidth}
\begin{itemize}
\item $\gamma = (\frac{1}{2} - \epsilon_1 - \tilde{\delta})$, $\tilde{\delta} \in (-1,1)$ such that $\gamma > 0, \gamma \in \mathbb{Q}$
\item $\beta = (\frac{1}{2} - \delta - \tilde{\delta})$, $\delta \in (0,1)$ such that $\beta > 0, \beta \in \mathbb{Q}$
\item $\delta' \in (0,1)$ such that $(\epsilon_1 \epsilon_2 - 5\delta - 2\tilde{\delta} - \delta') > 0, (\epsilon_1 \epsilon_2 - 5\delta - 2\tilde{\delta} - \delta') \in \mathbb{Q}$
\item $\beta n, \gamma n, (\epsilon_1 \epsilon_2 - 5\delta - 2\tilde{\delta} - \delta')n \in \mathbb{N}$
\item The rate\footnotemark of the protocol is $(\epsilon_1 \epsilon_2 - 5\delta - 2\tilde{\delta} - \delta')$
\item $\mathcal{I} = \{1,2,\ldots,\beta n\}$
\item $m = \left \lceil \log (\comb{\beta n}{\gamma n}) \right \rceil$
\item $\mathcal{T} = \{ (A) : A \subset \mathcal{I}, |A| = \gamma n\}$
\item $Q : \{0,1\}^m \longrightarrow\mathcal{T}$ is an onto map
\end{itemize}
\end{minipage}
\begin{multicols}{2}
\begin{algorithmic}[1]
\STATE Alice transmits an $n$-tuple $\boldsymbol{X}$ of i.i.d. Bernoulli($1/2$) bits over the channel.
\STATE \label{step:abort0_0} Bob receives the $n$-tuple $\boldsymbol{Y}$ from BEC($\epsilon_1$). Bob forms the sets
\begin{align*}
\overline{E} & := \{ i \in \{1,2,\ldots,n\}: Y_i \neq \bot\} \\
E & := \{ i \in \{1,2,\ldots,n\}: Y_i = \bot\}
\end{align*}
If $|\overline{E}| < (\beta + \gamma)n$ or $|E| < (\beta - \gamma)n$, Bob aborts the protocol.
\STATE Bob chooses a bit-string $\boldsymbol{S} \thicksim \text{Unif}(\{0,1\}^m)$. Let $\boldsymbol{J} = Q(\boldsymbol{S})$ and $\boldsymbol{J}^c = (\mathcal{I} \backslash \{\boldsymbol{J}\})$.
Bob forms the tuples $\boldsymbol{L}_U, \boldsymbol{L}_{\overline{U}} \in \{1,2,\ldots,n\}^{\beta n}$ as follows:
\begin{align*}
L_{U,i} & \thicksim \text{Unif}\{ \overline{E} \backslash \{\boldsymbol{L}^{i-1}_U\} \} \\
L_{\overline{U},J_i} & \thicksim \text{Unif}\{ \overline{E} \backslash \{ \{\boldsymbol{L}_U\} \cup \{ \boldsymbol{L}_{\overline{U}}|_{\boldsymbol{J}^{i-1}} \} \} \} \\ L_{\overline{U},J^c_i} & \thicksim \text{Unif}\{ E \backslash \{ \boldsymbol{L}_{\overline{U}}|_{\boldsymbol{J}^{c,i-1}} \} \}
\end{align*}
Bob reveals the tuples $\boldsymbol{L}_0,\boldsymbol{L}_1$ over the public channel.
\STATE \label{step:abort0_1} Alice checks to see that $\{ \boldsymbol{L}_0\} \cap \{\boldsymbol{L}_1\} = \emptyset$, otherwise Alice aborts the protocol.
\STATE Bob and Alice initiate interactive hashing, with the input to interactive hashing being the string $\boldsymbol{S}$ held by Bob. Interactive hashing returns strings $\boldsymbol{S}_0, \boldsymbol{S}_1 \in \{0,1\}^m$, which are available to both Alice and Bob. Let $\Phi \in \{0,1\}$ such that $\boldsymbol{S}_{\Phi} = \boldsymbol{S}$. Let
\begin{align*}
\boldsymbol{J}_0 & = Q(\boldsymbol{S}_0) \\
\boldsymbol{J}_1 & = Q(\boldsymbol{S}_1)
\end{align*}
\STATE Bob now sends the following to Alice over the public channel: $\Theta = \Phi \oplus U$, $\boldsymbol{Y}|_{\boldsymbol{L}_0|_{ \boldsymbol{J}_{\overline{\Theta}} } }$, $\boldsymbol{Y}|_{\boldsymbol{L}_1|_{ \boldsymbol{J}_{\Theta} } }$.
\STATE \label{step:abort0_2} Alice checks that $\boldsymbol{Y}|_{\boldsymbol{L}_0|_{ \boldsymbol{J}_{\overline{\Theta}} } }$ completely matches $\boldsymbol{X}|_{\boldsymbol{L}_0|_{ \boldsymbol{J}_{\overline{\Theta}} } }$ and $\boldsymbol{Y}|_{\boldsymbol{L}_1|_{ \boldsymbol{J}_{\Theta} } }$ completely matches $\boldsymbol{X}|_{\boldsymbol{L}_1|_{ \boldsymbol{J}_{\Theta} } }$, otherwise Alice aborts the protocol.
\STATE Alice chooses functions $F_0,F_1$, randomly and independently, from a family $\mathcal{F}$ of universal$_2$ hash functions :
\[ F_0,F_1: \{0,1\}^{\beta n} \longrightarrow \{0,1\}^{(\epsilon_1 \epsilon_2 - 5\delta - 2\tilde{\delta} - \delta')n } \]
Alice finally send the following to Bob over the public channel:
\[ F_0, \; F_1, \; \boldsymbol{K}_0 \oplus F_0(\boldsymbol{X}|_{\boldsymbol{L}_0}), \; \boldsymbol{K}_1 \oplus F_1(\boldsymbol{X}|_{\boldsymbol{L}_1}) \]
\STATE Bob knows $F_U$ and $\boldsymbol{Y}|_{\boldsymbol{L}_U}$ and can, therefore, recover $\boldsymbol{K}_U$.
\end{algorithmic}
\end{multicols}
\end{algorithm*}
\footnotetext{The parameters $\delta, |\tilde{\delta}|, \delta'$ can be chosen to be arbitrarily small so that this rate can take any desired value less than $\epsilon_1 \epsilon_2$. Note that when $\epsilon_1 = 1/2$, we need $\tilde{\delta} < 0$ and we can choose $\delta = -2 \tilde{\delta}$. For $\epsilon_1 < 1/2$, we choose $\tilde{\delta} > 0$.}
\subsection{Protocol when $\epsilon_1 > 1/2$}
\label{sec:protocol_malicious_geq}
Our protocol for this regime (Protocol~\ref{protocol:malicious_gt}) is the main novelty in this section. The above approach, where Bob gets to choose both the tuples of indices $\boldsymbol{L}_0,\boldsymbol{L}_1$, does not work in this regime. To see why this is the case, consider the setup with $\epsilon_1 = 2/3, \epsilon_2 = 1/2$. In this setup, $\boldsymbol{Y}$ is unerased at about $n/3$ indices. An honest Bob, therefore, will construct the tuples $\boldsymbol{L}_0, \boldsymbol{L}_1$ with each tuple consisting of about $n/3$ indices approximately. The good tuple $\boldsymbol{L}_U$ will have nearly all the unerased indices in $\boldsymbol{Y}$. A malicious Bob who wishes to remain undetected by Alice will also, hence, form tuples having about $n/3$ indices each. However, a malicious Bob colluding with Eve has access to about $2n/3$ indices at which he knows the bits transmitted by Alice. As a result, malicious Bob can form the two tuples $\boldsymbol{L}_0, \boldsymbol{L}_1$ consisting only of those indices at which he knows the bits transmitted by Alice. In such a situation, Bob will pass any check that Alice may impose, without getting caught, and will get to learn both of Alice's strings. At the root of this problem is Bob's ability to choose both tuples $\boldsymbol{L}_0,\boldsymbol{L}_1$. Our protocol takes away this ability from Bob, allowing Bob to form only one of the tuples, \emph{with the other tuple being provided to Bob by interactive hashing}. Thus, interactive hashing is used to output tuples using which the keys that encrypt Alice's strings are derived. We describe the protocol in more detail below.
The steps in this protocol are the same as for the protocol in the regime $\epsilon_1 \leq 1/2$, upto and including the formation of sets $E, \overline{E}$ by Bob. There are two main differences thereafter. Firstly, $L_0, L_1$ are now random sets, not random tuples. Secondly, Bob is allowed to construct only the \emph{good set} $L_U$, not the \emph{bad set} $L_{\overline{U}}$. The set $L_{\overline{U}}$ is obtained as an output of interactive hashing when interactive hashing is invoked with the bit-string representing $L_U$ as its input. Specifically, suppose the sets $L_U, L_{\overline{U}}$ are required to be of cardinality $\beta n$, where $0 < \beta < 1/2$. Let $m$ be the smallest integer required so that each $\beta n$-sized subset of $\{1,2,\ldots,n\}$ can be represented with a unique $m$-bit string. Bob selects one of these $m$-bit strings, say $\boldsymbol{S}$, to represent its choice of $L_U$. Of course, the choice of the string $\boldsymbol{S}$ should be such that $L_U \subset \overline{E}$. Alice and Bob now initiate interactive hashing. Bob holds $\boldsymbol{S}$ as the input to interactive hashing and both Alice and Bob receive as outputs some strings $\boldsymbol{S}_0, \boldsymbol{S}_1$, one of which is the same as $\boldsymbol{S}$. The strings $\boldsymbol{S}_0, \boldsymbol{S}_1$ identify subsets $L_0,L_1$ one of which is $L_U$ and the other is used as $L_{\overline{U}}$. The key property used to guarantee privacy against malicious Bob is the following: The sets $L_0,L_1$ cannot simultaneously have more than a threshold number each of indices at which either $\boldsymbol{Y}$ or $\boldsymbol{Z}$ or both are unerased. That is, at least one of $L_0, L_1$ has fewer than this threshold number of such indices. And our protocol \emph{effectively removes} that threshold number of such indices each from $L_0,L_1$. This \emph{removal} happens in two steps: in the first step, Bob is asked to reveal bits $\boldsymbol{X}|_{L_0 \cap L_1}$ as a check by Alice and indices $L_0 \cap L_1$ are not used thereafter. In the second step, sufficient privacy amplification is used over the bits $\boldsymbol{X}|_{L_0 \backslash L_0 \cap L_1}$ and $\boldsymbol{X}|_{L_1 \backslash L_0 \cap L_1}$, with the outputs of privacy amplification used as the keys to encrypt Alice's strings. This two-step process guarantees that a malicious Bob, colluding with Eve, can gain only a vanishingly small amount of information about at least one of the keys. Privacy against a malicious Alice, colluding with Eve, is based on the fact that Alice cannot make out which of the strings $\boldsymbol{S}_0,\boldsymbol{S}_1$ was the input string $\boldsymbol{S}$. Specifically, suppose $\Phi$ is a binary random variable such that $\boldsymbol{S}_{\Phi} = \boldsymbol{S}$. Then, conditioned on the combined views of Alice and Eve, $\Phi$ is uniformly distributed. Bob, who knows $\Phi$, uses $\Phi$ to mask any leakage of information about $U$ to a malicious Alice. Note that unlike Protocol~\ref{protocol:malicious_lt}, there is no $J$ used in the current protocol. Thus, only random sets of indices $L_0,L_1$, as opposed to random tuples of indices, suffice to help prevent leaking $U$ to Alice.
\begin{algorithm*}
\floatname{algorithm}{Protocol}
\caption{Malicious Users, $\epsilon_1 > 1/2$}
\label{protocol:malicious_gt}
Parameters : \begin{minipage}[t]{0.8\linewidth}
\begin{itemize}
\item $\beta \in [0, 1-\epsilon_1) \cap \mathbb{Q}$, $H(\beta) \in \mathbb{R} \backslash \mathbb{Q}$. Such a $\beta$ value, arbitrarily close to $(1 - \epsilon_1)$, exists as a consequence of Lemma~\ref{lem:desired_beta_hbeta}.
\item $\delta = (1 - \epsilon_1 - \beta)$
\item $\delta' \in (0,1)$ is such that $(\epsilon_1\epsilon_2 - 3 \delta - \delta') > 0$, $(\epsilon_1\epsilon_2 - 3 \delta - \delta') \in \mathbb{Q}$
\item $\beta n, \beta n(\epsilon_1\epsilon_2 - 3 \delta - \delta') \in \mathbb{N}$, $<\log \comb{n}{\beta n}> \; \longrightarrow 1$ as $n \longrightarrow \infty$. Such a sequence of natural numbers is possible using Lemma~\ref{lem:log_dense}
\item The rate\footnotemark of the protocol is $\beta (\epsilon_1\epsilon_2 - 3 \delta - \delta')$
\item $\mathcal{I} = \{1,2,\ldots,n\}$
\item $m = \lceil \log (\comb{n}{\beta n}) \rceil$
\item $\mathcal{T} = \{A \subset \mathcal{I}: |A| = \beta n\}$
\item $\mathcal{B} \subset \{0,1\}^m$ such that $|\mathcal{B}| = |\mathcal{T}|$, $\mathcal{B}^c = \{0,1\}^m \backslash \mathcal{B}$
\item $Q : \mathcal{B} \longrightarrow \mathcal{T}$ is a bijective map
\end{itemize}
\end{minipage}
\begin{multicols}{2}
\begin{algorithmic}[1]
\STATE Alice transmits an $n$-tuple $\boldsymbol{X}$ of i.i.d. Bernoulli($1/2$) bits over the channel.
\STATE \label{step:abort1_0} Bob receives the $n$-tuple $\boldsymbol{Y}$ from BEC($\epsilon_1$). Bob forms the sets
\begin{align*}
\overline{E} & := \{ i \in \{1,2,\ldots,n\}: Y_i \neq \bot\} \\
E & := \{ i \in \{1,2,\ldots,n\}: Y_i = \bot\}
\end{align*}
If $|\overline{E}| < \beta n$, Bob aborts the protocol.
\STATE Bob defines the collection of \emph{good} sets as:
\[ \mathcal{T}_G := \{ G \subset \overline{E} : |G| = \beta n \} \]
Let $\mathcal{B}_G = Q^{-1}(\mathcal{T}_G)$, where
\[ Q^{-1}(\mathcal{T}_G) := \{ b \in \mathcal{B}: Q(b) \in \mathcal{T}_G \} \]
\STATE Bob picks a $m$-bit string $\boldsymbol{S} \in \mathcal{B}_G \cup \mathcal{B}^c$ as follows:
\[ P[\boldsymbol{S} = \boldsymbol{s}] = \left\{ \begin{array}{ll} \frac{1}{|\mathcal{B}_G|} \cdot \frac{|\mathcal{B}|}{2^m}, & \boldsymbol{s} \in \mathcal{B}_G \\ \frac{1}{|\mathcal{B}^c|} \cdot \left(1 - \frac{|\mathcal{B}|}{2^m} \right), & \boldsymbol{s} \in \mathcal{B}^c \\ 0, & \text{otherwise} \end{array} \right. \]
Note that the channel acts independently on each bit transmitted by Alice and Alice does not know the erasure pattern seen by Bob. Thus, conditioned on Alice's view, $\boldsymbol{S}$ is uniform over all $m$-bit strings.
\STATE \label{step:abort1_1} Bob and Alice initiate interactive hashing with the input to interactive hashing being the string $\boldsymbol{S}$ held by Bob. As a result, both Alice and Bob receive $\boldsymbol{S}_0,\boldsymbol{S}_1 \in \{0,1\}^m$ as the output of interactive hashing. If either $\bold{S}_0 \in \mathcal{B}^c$ or $\boldsymbol{S}_1 \in \mathcal{B}^c$, then Alice and Bob abort the protocol. Otherwise, let $\Phi \in \{0,1\}$ such that $\boldsymbol{S}_{\Phi} = \boldsymbol{S}$ and let
\begin{align*}
L_0 & = Q(\boldsymbol{S}_0) \\
L_1 & = Q(\boldsymbol{S}_1)
\end{align*}
\STATE \label{step:abort1_2} If we have
\[ \beta - \delta \leq \frac{1}{\beta n}|L_0 \cap L_1| \leq \beta + \delta \]
then the protocol moves to the next step. Otherwise, Alice and Bob abort the protocol.
\STATE \label{step:reveal_common_part1} Bob reveals $\Theta=\Phi \oplus U$ and $\boldsymbol{Y}|_{L_0 \cap L_1}$ over the public channel.
\STATE \label{step:abort1_3} Alice checks to see that $\boldsymbol{Y}|_{L_0 \cap L_1}$ exactly matches $\boldsymbol{X}|_{L_0 \cap L_1}$, otherwise Alice aborts the protocol.
\STATE Alice randomly and independently selects functions $F_0,F_1$ from a family $\mathcal{F}$ of universal$_2$ hash functions:
\[ F_0,F_1: \{0,1\}^{\beta n - |L_0 \cap L_1|} \longrightarrow \{0,1\}^{\beta n (\epsilon_1\epsilon_2 - 3 \delta - \delta')} \]
Alice finally sends the following information over the public channel:
\[ F_0, \; F_1, \; \boldsymbol{K}_0 \oplus F_0(\boldsymbol{X}|_{L_{\Theta} \backslash L_0 \cap L_1}), \; \boldsymbol{K}_1 \oplus F_1(\boldsymbol{X}|_{L_{\overline{\Theta}} \backslash L_0 \cap L_1}) \]
\STATE Bob knows $F_U$ and $\boldsymbol{Y}|_{L_{\Phi} \backslash L_0 \cap L_1}$ and can, therefore, recover $\boldsymbol{K}_U$.
\end{algorithmic}
\end{multicols}
\end{algorithm*}
\footnotetext{The $\beta$ can be chosen arbitrarily close to $(1 - \epsilon_1)$ and the $\delta'$ can be chosen to be arbitrarily small so that this rate can take any desired value less than $\epsilon_1 \epsilon_2 (1 - \epsilon_1)$.}
We prove the following lemma which, essentially, proves Theorem~\ref{thm:result_2p_malicious_wtap}.
\begin{lemma}
\label{lem:ach_rate_malicious_wtap}
Let $R < \left\{ \begin{array}{lr} \epsilon_1 \epsilon_2, & \epsilon_1 \leq \frac{1}{2}\\ \epsilon_1 \epsilon_2 (1 - \epsilon_1), & \epsilon_1 > \frac{1}{2} \end{array} \right\}$. Then, there exists a sequence of protocols $(\mathcal{P}_n)_{n \in \mathbb{N}}$, with corresponding rates $(r_n)_{n \in \mathbb{N}}$ such that $r_n \longrightarrow R$ and:
\begin{enumerate}[(a)]
\item When Alice and Bob are both honest, $\mathcal{P}_n$ aborts with vanishing probability and (\ref{eqn:ach_2p_wtap_0})-(\ref{eqn:ach_2p_wtap_3}) are satisfied for $(\mathcal{P}_n)_{n \in \mathbb{N}}$, as $n \longrightarrow \infty$. \label{lem:honest_rate_malicious_wtap}
\item When Alice is malicious and colludes with Eve and Bob is honest, let $V_n$ be the final view of a malicious Alice colluding with Eve at the end of $\mathcal{P}_n$. Then, $I(U ; V_n) \longrightarrow 0$ for $(\mathcal{P}_n)_{n \in \mathbb{N}}$, as $n \longrightarrow \infty$. \label{lem:malicious_alice_lemma}
\item When Alice is honest and Bob is malicious and colludes with Eve, let $V_n$ be the final view of a malicious Bob colluding with Eve at the end of $\mathcal{P}_n$. Then, $\min \{ I(\boldsymbol{K}_0 ; V_n), I(\boldsymbol{K}_1 ; V_n)\} \longrightarrow 0$ as $n \longrightarrow \infty$. \label{lem:malicious_bob_lemma}
\end{enumerate}
\end{lemma}
This lemma is proved in Appendix~\ref{appndx:malicious_wtap_all_proofs}. A short sketch of its proof now follows. The protocol sequence $(\mathcal{P}_n)_{n \in \mathbb{N}}$ we consider is a sequence of Protocol~\ref{protocol:malicious_lt} instances when $\epsilon_1 \leq 1/2$ and of Protocol~\ref{protocol:malicious_gt} instances otherwise.
\begin{itemize}
\item In the statement of Lemma~\ref{lem:ach_rate_malicious_wtap}(\ref{lem:honest_rate_malicious_wtap}), Alice and Bob are assumed to be honest. When that is the case, we show that the numerous checks in $\mathcal{P}_n$ pass with high probability. The arguments showing that the checks pass w.h.p. use the Chernoff's bound, properties of interactive hashing or disjoint construction of sets/tuples depending on the particular check. Since all checks pass with high probability, effectively, these checks cease to matter in $\mathcal{P}_n$. We argue that in this case, $\mathcal{P}_n$ is essentially the same as Protocol~\ref{protocol:C2P} and $r_n \longrightarrow R$ as $n \longrightarrow \infty$. Specifically, in $\mathcal{P}_n$, just like in Protocol~\ref{protocol:C2P}, Alice creates two keys both secret from Eve and only one known to Bob. Alice uses these keys to encrypt her strings. As shown previously for Protocol~\ref{protocol:C2P}, such keys are sufficient for the protocol sequence to satisfy (\ref{eqn:ach_2p_wtap_0})-(\ref{eqn:ach_2p_wtap_3}) in this setup with honest-but-curious users.
\item In the statement of Lemma~\ref{lem:ach_rate_malicious_wtap}(\ref{lem:malicious_alice_lemma}), it is assumed that Bob is honest and Alice is malicious and possibly colludes with Eve. The goal in $\mathcal{P}_n$ is to prevent such an Alice from learning $U$. In $\mathcal{P}_n$, Bob and Alice initiate interactive hashing where Bob holds an input for interactive hashing and the two outputs of interactive hashing are received by both Alice and Bob. One of these outputs is the same as the input held by Bob. The guarantee is that Alice cannot make out which of the two outputs is the one Bob held as input to interactive hashing. Specifically, suppose $\Phi$ is a binary random variable indicating which of the two outputs was the input to interactive hashing. Then, we show that conditioned on the combined views of Alice and Eve, $\Phi$ is uniformly distributed. Bob, of course, knows $\Phi$ and uses it to mask any leakage of information about $U$. As a result, Alice and Eve together cannot learn anything about $U$.
\item In the statement of Lemma~\ref{lem:ach_rate_malicious_wtap}(\ref{lem:malicious_bob_lemma}), it is assumed that Alice is honest and Bob is malicious and possibly colludes with Eve. The goal in $\mathcal{P}_n$ is to prevent such a Bob from learning a non-negligible amount of information about both of Alice's strings. When $\epsilon_1 \leq 1/2$, a malicious Bob may swap some of the \emph{good} indices (unerased in $\boldsymbol{Y}$ or $\boldsymbol{Z}$ or both) from $\boldsymbol{L}_U$ with the \emph{bad} indices (erased in both $\boldsymbol{Y}$ and $\boldsymbol{Z}$) of $\boldsymbol{L}_{\overline{U}}$, to gain information about both of Alice's strings. This leaves both $\boldsymbol{L}_U, \boldsymbol{L}_{\overline{U}}$ with a large number of \emph{bad} indices. After Bob and Alice complete the interactive hashing, both of them receive as outputs some subsets $J_{\Phi}, J_{\overline{\Phi}}$ where $J_{\Phi}$ is the same as the subset Bob held as the input to interactive hashing. In a check imposed by Alice, Bob is asked to reveal the bits of $\boldsymbol{X}$ at indices $\boldsymbol{L}_U|_{J_{\overline{\Phi}}}, \boldsymbol{L}_{\overline{U}}|_{J_{\Phi}}$. An honest Bob knows the required bits, by design in $\mathcal{P}_n$. However, this check creates a problem for malicious Bob for the following reason. By a property of interactive hashing, Bob cannot influence the choice of $J_{\overline{\Phi}}$. If Bob has behaved maliciously, we show that w.h.p several of the indices in $\boldsymbol{L}_U|_{J_{\overline{\Phi}}}$ will be the \emph{bad} indices of $\boldsymbol{L}_U$. As a result, w.h.p. malicious Bob cannot reveal all the bits sent by Alice at the indices $\boldsymbol{L}_U|_{J_{\overline{\Phi}}}$ and, therefore, fails this check. When $\epsilon_1 > 1/2$, both Alice and Bob receive the sets $L_0, L_1$ as the output of interactive hashing. Interactive hashing guarantees that w.h.p. at least one of the sets $L_0,L_1$ has fewer than a threshold number of \emph{good} indices. Through a two-step process, this threshold number of \emph{good} indices are effectively removed from both $L_0,L_1$. As a result, at least one out of $L_0,L_1$ has, effectively, no \emph{good} indices left at the end. Thus, at least one of keys created by Alice will be unknown to a malicious Bob. Consequently, malicious Bob cannot gain any information about at least one of Alice's strings.
\end{itemize}
\section{Independent Oblivious Transfers over a broadcast channel : Proof of Theorem~\ref{thm:result_2p_hbc_indep}}
\label{sec:proofs_2}
There are three users Alice, Bob and Cathy in this setup (see Figure~\ref{fig:ot_hbc_indep}). The goal is to achieve independent OTs, with $2$-privacy, between Alice-Bob and Alice-Cathy. Specifically, we show that the rate-region $\mathcal{R}$ of independent pairs of OTs, with $2$-privacy, for honest-but-curious Alice, Bob and Cathy is such that
\[ \mathcal{R}_{\text{inner}} \subseteq \mathcal{R} \subseteq \mathcal{R}_{\text{outer}} \]
where
\begin{align*}
\mathcal{R}_{\text{inner}} = \Big\{ (R_B , R_C ) & \in \mathbb{R}_+^2 :
R_B \leq \epsilon_2 \min \{ \epsilon_1, 1 - \epsilon_1\},\\
R_C &\leq \epsilon_1 \min \{ \epsilon_2, 1 - \epsilon_2\}, \\
R_B + R_C &\leq \epsilon_2\cdot \min\{\epsilon_1, 1 - \epsilon_1\} \\ & \quad + \epsilon_1\cdot \min\{\epsilon_2, 1 - \epsilon_2\} \\
& \quad - \min\{\epsilon_1, 1 - \epsilon_1\} \cdot \min\{\epsilon_2, 1 - \epsilon_2\} \Big\}.
\end{align*}
and
\begin{align*}
\mathcal{R}_{\text{outer}} = \Big\{
(R_B,R_C) \in \mathbb{R}_+^2 : R_B &\leq \epsilon_2 \cdot \min \{ \epsilon_1, 1 - \epsilon_1\}, \\
R_C &\leq \epsilon_1 \cdot \min \{ \epsilon_2, 1 - \epsilon_2\}, \\
R_B + R_C &\leq \epsilon_1 \cdot \epsilon_2 \Big\}.
\end{align*}
\subsection{Proof of inner bound : $\mathcal{R}_{\text{inner}} \subseteq \mathcal{R}$}
It suffices to show that any rate pair $(r_B,r_C)$, with $r_B < C_{2P}$ and $r_C < \max\{0, (2\epsilon_1 - 1) \cdot \min\{\epsilon_2, 1 - \epsilon_2\} \}$, is an achievable $2$-private rate-pair. An analogous argument, with the roles of Bob and Cathy reversed, will show that any rate-pair $(r_B,r_C)$, with $r_B < \max\{0, (2\epsilon_2 - 1) \cdot \min\{\epsilon_1, 1 - \epsilon_1\} \}$ and $r_C < C_{2P}$, is also an achievable $2$-private rate-pair. Coupled with a time-sharing argument, this proves the inner bound $\mathcal{R}_{\text{inner}} \subseteq \mathcal{R}$. Consequently, we describe a protocol (Protocol~\ref{protocol:C2P_symmetric}) for achieving any rate-pair $(r_B,r_C)$ when $r_B < C_{2P}, r_C < \max\{0, (2\epsilon_1 - 1) \cdot \min\{\epsilon_2, 1 - \epsilon_2\} \}$, in the setup of Figure~\ref{fig:ot_hbc_indep}. A sequence of Protocol~\ref{protocol:C2P_symmetric} instances, with rate-pair approaching $(r_B,r_C)$, is shown to satisfy (\ref{eqn:ach_2p_indep_0})-(\ref{eqn:ach_2p_indep_7}). This establishes that $(r_B,r_C)$ is an achievable $2$-private rate.
Our protocol has two distinct phases. The first phase is the same as Protocol~\ref{protocol:C2P}, achieving a rate $r_B < C_{2P}$ of OT for Bob with $2$-privacy. If $\epsilon_1 > 1/2$, a second phase begins after the first phase ends. This second phase is the two-party OT protocol of \cite{ot2007} (the two users being Alice and Cathy), which runs over the segment of Alice's transmissions that remained unused during the first phase. Note that this unused segment of Alice's transmissions is completely erased for Bob and is about $(2\epsilon_1 - 1)n$ bits long. This second phase, thus, achieves an OT rate of $r_C < \max\{0, (2\epsilon_1 - 1) \cdot \min\{\epsilon_2, 1 - \epsilon_2\} \}$, with $2$-privacy, for Cathy.
\begin{algorithm*}
\floatname{algorithm}{Protocol}
\caption{Protocol for achieving any rate pair $(r_B,r_C)$ such that $r_B < C_{2P}, r_C < \max\{0, (2\epsilon_1 - 1)\min\{\epsilon_2, 1 - \epsilon_2\}\}$}
\label{protocol:C2P_symmetric}
Parameters : \begin{minipage}[t]{0.8\linewidth}
\begin{itemize}
\item $\delta \in (0,1) $ such that $r_B < (\epsilon_2 - \delta)(\min \{\epsilon_1, 1 - \epsilon_1\} - \delta)$ and $(\epsilon_2 - \delta) \in \mathbb{Q}$
\item $0 < \tilde{\delta} < r_B$, $\tilde{\delta} \in \mathbb{Q}$
\item $\beta = \frac{r_B}{\epsilon_2 - \delta}$
\item $\beta n, n(r_B - \tilde{\delta}) \in \mathbb{N}$
\item Bob's rate\footnotemark in the Protocol is $(r_B - \tilde{\delta})$
\end{itemize}
\end{minipage}
\begin{multicols}{2}
\begin{algorithmic}[1]
\STATE Alice transmits an $n$-tuple $\boldsymbol{X}$ of i.i.d. Bernoulli($1/2$) bits over the channel.
\STATE \label{step:2p_indep_abort0} Bob receives the $n$-tuple $\boldsymbol{Y}$ from BEC($\epsilon_1$). Bob forms the sets
\begin{align*}
\overline{E} & := \{ i \in \{1,2,\ldots,n\}: Y_i \neq \bot\} \\
E & := \{ i \in \{1,2,\ldots,n\}: Y_i = \bot\}
\end{align*}
If $|\overline{E}| < \beta n$ or $|E| < \beta n$, Bob aborts the protocol.
\STATE Bob creates the following sets:
\begin{align*}
& L_U \thicksim \text{Unif}\{A \subset \overline{E} : |A| = \beta n\} \\
& L_{\overline{U}} \thicksim \text{Unif}\{A \subset E : |A| = \beta n\} \\
\text{If } & \epsilon_1 > \frac{1}{2} \\
& L \thicksim \text{Unif}\{ A \subset E \backslash L_{\overline{U}} : |A| = (\epsilon_1 - \delta - \beta)n \} \\
\text{Else } & \\
& L = \emptyset
\end{align*}
Bob reveals $L_0,L_1,L$ to Alice over the public channel.
\STATE Alice randomly and independently chooses functions $F_0,F_1$ from a family $\mathcal{F}$ of universal$_2$ hash functions:
\[ F_0,F_1 : \{0,1\}^{\beta n} \longrightarrow \{0,1\}^{n(r_B - \tilde{\delta})} \]
Alice finally sends the following information on the public channel:
\[ F_0, \; F_1, \; \boldsymbol{K}_0 \oplus F_0(\boldsymbol{X}|_{L_0}), \; \boldsymbol{K}_1 \oplus F_1(\boldsymbol{X}|_{L_1}) \]
\STATE Bob knows $F_U,\boldsymbol{X}|_{L_U}$ and can, therefore, recover $\boldsymbol{K}_U$.
\STATE If $L \neq \emptyset$, Alice and Cathy follow the two-party OT protocol \cite{ot2007} over $\boldsymbol{X}|_L$, to obtain OT for Cathy at rate $r_C$.
\end{algorithmic}
\end{multicols}
\end{algorithm*}
\footnotetext{The parameters $\delta, \tilde{\delta}$ can be chosen to be arbitrarily small so that Bob's rate can take any desired value less than $C_{2P}$. The two-party OT protocol ensures that Cathy's rate $r_C$ can take any desired value less than $\max\{0, (2\epsilon_1 - 1)\min\{\epsilon_2, 1 - \epsilon_2\}\}$.}
\begin{lemma}
\label{lem:c2p_ach_indep}
Any rate-pair $(r_B,r_C)$, such that $r_B < C_{2P}, r_C < \max\{0, (2\epsilon_1 - 1)\min\{\epsilon_2, 1 - \epsilon_2\}\}$, is an achievable $2$-private rate-pair, with honest-but-curious users, for the setup of Figure~\ref{fig:ot_hbc_indep}
\end{lemma}
This lemma is proved in Appendix~\ref{appndx:proof_ach_2p_hbc_indep}.
\subsection{Proof of outer bound : $\mathcal{R} \subseteq \mathcal{R}_{\text{outer}}$}
We show that our outer-bound holds under a weaker privacy requirement, wherein the left-hand-sides of (\ref{eqn:ach_2p_indep_2}), (\ref{eqn:ach_2p_indep_6}) and (\ref{eqn:ach_2p_indep_7}) are multiplied by $1/n$. Let $(r_B,r_C)$ be an achievable $2$-private rate pair, for the setup in Figure~\ref{fig:ot_hbc_indep}. Then, the following are straightforward upperbounds as a consequence of Theorem~\ref{thm:result_2p_1p_hbc_wtap}:
\begin{align*}
r_B & \leq \epsilon_2 \cdot \min \{\epsilon_1, 1 - \epsilon_1\} \\
r_C & \leq \epsilon_1 \cdot \min \{\epsilon_2, 1 - \epsilon_2\}
\end{align*}
To prove that $r_B + r_C \leq \epsilon_1 \epsilon_2$, we use the following lemma (proved in Appendix \ref{appndx:proof_small_quant_2p_hbc_indep}):
\begin{lemma}
\label{lem:small_quant_2p_hbc_indep}
\[
\frac{1}{n}H(\boldsymbol{K}_0,\boldsymbol{K}_1,\boldsymbol{J}_0,\boldsymbol{J}_1 | \boldsymbol{X},\boldsymbol{\Lambda}) \longrightarrow 0 \text{ as } n \longrightarrow \infty
\]
\end{lemma}
Intuitively, this lemma says that anyone observing Alice's interface to the rest of the system, namely signals $\boldsymbol{X},\boldsymbol{\Lambda}$, should be able to recover all the four strings $\boldsymbol{K}_0,\boldsymbol{K}_1,\boldsymbol{J}_0,\boldsymbol{J}_1$. Suppose this was not true and, say, $\boldsymbol{K}_0$ cannot be decoded from $\boldsymbol{X},\boldsymbol{\Lambda}$. In this case, Alice will infer that Bob wanted $\boldsymbol{K}_1$, that is $U = 1$, which violates (\ref{eqn:ach_2p_indep_3}). Similarly, if $\boldsymbol{J}_1$ cannot be decoded from $\boldsymbol{X},\boldsymbol{\Lambda}$, Alice will infer that Cathy wanted $\boldsymbol{J}_0$, that is $W = 0$, which violates (\ref{eqn:ach_2p_indep_4}).
Let $\tilde{E} := \{ i \in \{1,2,\ldots,n\}: Y_i = \bot \text{ and } Z_i = \bot \}$. Let $\tilde{e}$ denote a realization of $\tilde{E}$ and let $\overline{\tilde{e}} = \{1,2,\ldots,n\} \backslash \tilde{e}$. Now,
\begin{align*}
m_B + m_C & = H(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}}) \\
& = I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; \boldsymbol{X},\boldsymbol{\Lambda},U,W) + H(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} \mid \boldsymbol{X},\boldsymbol{\Lambda},U,W) \\
& \leq I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; \boldsymbol{X},\boldsymbol{\Lambda},U,W) + H(\boldsymbol{K}_U, \boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_W, \boldsymbol{J}_{\overline{W}} \mid \boldsymbol{X},\boldsymbol{\Lambda},U,W) \\
& = I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; \boldsymbol{X},\boldsymbol{\Lambda},U,W) + H(\boldsymbol{K}_0, \boldsymbol{K}_1, \boldsymbol{J}_0, \boldsymbol{J}_1 \mid \boldsymbol{X},\boldsymbol{\Lambda},U,W) \\
& \leq I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; \boldsymbol{X},\boldsymbol{\Lambda},U,W) + H(\boldsymbol{K}_0, \boldsymbol{K}_1, \boldsymbol{J}_0, \boldsymbol{J}_1 \mid \boldsymbol{X},\boldsymbol{\Lambda}) \\
& \stackrel{\text{(a)}}{=} I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; \boldsymbol{X},\boldsymbol{\Lambda},U,W) + o(n) \\
& \leq I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; \boldsymbol{X},\boldsymbol{\Lambda},U,W, \tilde{E}) + o(n) \\
& \stackrel{\text{(b)}}{=} I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; \boldsymbol{X},\boldsymbol{\Lambda},U,W \mid \tilde{E}) + o(n) \\
& = \sum_{\tilde{e} \subseteq \{1,2, \ldots,n\} } p_{\tilde{E}}(\tilde{e}) I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; \boldsymbol{X},\boldsymbol{\Lambda}, U, W \mid \tilde{E} = \tilde{e}) + o(n) \\
& = \sum_{\tilde{e} \subseteq \{1,2, \ldots,n\} } p_{\tilde{E}}(\tilde{e}) I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; \boldsymbol{X}|_{\overline{\tilde{e}}},\boldsymbol{\Lambda}, U, W \; \mathlarger{\mid} \; \tilde{E} = \tilde{e}) + \sum_{\tilde{e} \subseteq \{1,2,\ldots,n\} } p_{\tilde{E}}(\tilde{e}) I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; \boldsymbol{X}|_{\tilde{e}} \;\; \mathlarger{\mid} \; \; \boldsymbol{X}|_{\overline{\tilde{e}}}, \boldsymbol{\Lambda}, U, W, \tilde{E} = \tilde{e}) \\ & \quad + o(n) \\
& \leq \sum_{\tilde{e} \subseteq \{1,2,\ldots,n\} } p_{\tilde{E}}(\tilde{e}) I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; \boldsymbol{X}|_{\overline{\tilde{e}}},\boldsymbol{\Lambda}, U, W \; \mathlarger{\mid} \; \tilde{E} = \tilde{e}) + \sum_{\tilde{e} \subseteq \{1,2,\ldots,n\} } p_{\tilde{E}}(\tilde{e}) H(\boldsymbol{X}|_{\tilde{e}} \; \mathlarger{\mid} \; \tilde{E} = \tilde{e}) + o(n) \\
& \leq I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; \boldsymbol{Y},\boldsymbol{Z}, \boldsymbol{\Lambda}, U,W \mid \tilde{E}) + \sum_{\tilde{e} \subseteq \{1,2,\ldots,n\} } p_{\tilde{E}}(\tilde{e}) |\tilde{e}| + o(n) \\
& \stackrel{\text{(c)}}{=} I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; \boldsymbol{Y},\boldsymbol{Z}, \boldsymbol{\Lambda}, U,W, \tilde{E}) + n\epsilon_1\epsilon_2 + o(n) \\
& \stackrel{\text{(d)}}{=} I(\boldsymbol{K}_{\overline{U}}, \boldsymbol{J}_{\overline{W}} ; \boldsymbol{Y},\boldsymbol{Z}, \boldsymbol{\Lambda}, U,W) + n\epsilon_1\epsilon_2 + o(n) \\
& \stackrel{\text{(e)}}{=} n\epsilon_1\epsilon_2 + o(n)
\end{align*}
where (a) follows from Lemma~\ref{lem:small_quant_2p_hbc_indep}, (b) and (c) follow since $\tilde{E}$ is independent of $(\boldsymbol{K}_0,\boldsymbol{K}_1,\boldsymbol{J}_0,\boldsymbol{J}_1,U,W)$, (d) follows since $\tilde{E}$ is a function of $(\boldsymbol{Y},\boldsymbol{Z})$ and (e) follows from a weakened version (multiplication by $1/n$) of (\ref{eqn:ach_2p_indep_2}). As a result,
\begin{align*}
r_B + r_C & = \frac{m_B}{n} + \frac{m_C}{n} \\
& \leq \epsilon_1 \epsilon_2 + \frac{o(n)}{n}
\end{align*}
\section{Oblivious Transfer Over a Degraded Wiretapped Channel : Proof of Theorem~\ref{thm:result_1p_hbc_degraded}}
\label{sec:proofs_3}
In this setup (see Figure~\ref{fig:ot_hbc_degraded}), Alice is connected to Bob and Eve by a broadcast channel made up of a cascade of two independent BECs. There is a BEC($\epsilon_1$) connecting Alice to Bob and a BEC($\epsilon_2$) connecting Bob to Eve. The goal is to achieve OT between Alice and Bob, with $1$-privacy. For the $1$-private OT capacity $C_{1P}$, we show that :
\[ \min \left\{\frac{1}{3}\epsilon_2(1 - \epsilon_1), \epsilon_1 \right\} \leq C_{1P} \leq \min\{\epsilon_2(1 - \epsilon_1), \epsilon_1 \} \]
\subsection{Proof of lower bound: $\min \left\{(1/3) \cdot \epsilon_2(1 - \epsilon_1), \epsilon_1 \right\}$}
We describe a protocol (Protocol~\ref{protocol:C1P_degraded}) for achieving any $1$-private rate $r < \min \left\{(1/3) \cdot \epsilon_2(1 - \epsilon_1), \epsilon_1 \right\}$, with honest-but-curious users, in the setup of Figure~\ref{fig:ot_hbc_degraded}. For a sequence of Protocol~\ref{protocol:C1P_degraded} instances of rate $r < \min \left\{(1/3) \cdot \epsilon_2(1 - \epsilon_1), \epsilon_1 \right\}$, we show that (\ref{eqn:ach_1p_wtap_0})-(\ref{eqn:ach_1p_wtap_3}) hold. This establishes that any $r < \min \left\{(1/3) \cdot \epsilon_2(1 - \epsilon_1), \epsilon_1 \right\}$ is an achievable $1$-private rate. All the protocols seen thus far for honest-but-curious users critically depended on the fact that the erasure patterns received by Bob and Eve (or Cathy) were independent. This is the reason why Bob could send the sets $L_0,L_1$ over the public channel and Eve (or Cathy) could not deduce $U$ from these sets. However, the present setup has a physically degraded channel, degraded in favor of Bob. If Bob sends sets $L_0,L_1$ as in previous protocols, then Eve will see that one of the sets of indices corresponds entirely to erasures in $\boldsymbol{Z}$ (the \emph{bad} set $L_{\overline{U}}$) while the other set corresponds only partially to erasures in $\boldsymbol{Z}$ (the \emph{good} set $L_U$). As a result, Eve will learn $U$ as soon as Bob sends $L_0,L_1$ over the public channel. Our protocol overcomes this problem by having Bob efficiently encrypt the sets $L_0,L_1$, using a long secret key shared with Alice and secret from Eve, before transmitting the sets on the public channel. Furthermore, one of these sets of indices corresponds entirely to erasures both in $\boldsymbol{Y}$ and $\boldsymbol{Z}$, something that was not true when Bob and Eve received independent erasure patterns. Our protocol makes use of this feature to reduce the length of the secret key it needs to encrypt Alice's strings before transmitting them to Bob over the public channel. A more detailed description of the protocol now follows.
\begin{algorithm*}
\floatname{algorithm}{Protocol}
\caption{Protocol for achieving any $r < \min \left\{(1/3) \cdot \epsilon_2(1 - \epsilon_1), \epsilon_1 \right\}$}
\label{protocol:C1P_degraded}
Parameters : \begin{minipage}[t]{0.8\linewidth}
\begin{itemize}
\item $\delta \in (0,1) $ such that $r < \min \{ \frac{1}{3}(\epsilon_2 - \delta)(1 - \epsilon_1 - \delta), (\epsilon_1 - \delta) \}$, $(\epsilon_2 - \delta) \in \mathbb{Q}$
\item $0 < \tilde{\delta} < r$, $\tilde{\delta} \in \mathbb{Q}$
\item $\beta = \frac{r - \tilde{\delta}}{\epsilon_2 - \delta}$
\item $\beta n, \beta n(\epsilon_2 - \delta), 2 \beta n \left( \frac{r}{r - \tilde{\delta}} \right), \beta n (1 - (\epsilon_2 - \delta)), n(r - 2 \tilde{\delta}) \in \mathbb{N}$
\item The rate\footnotemark of the protocol is $(r - 2\tilde{\delta})$
\end{itemize}
\end{minipage}
\begin{multicols}{2}
\begin{algorithmic}[1]
\STATE Alice transmits an $n$-tuple $\boldsymbol{X}$ of i.i.d. Bernoulli($1/2$) bits over the channel.
\STATE \label{step:1p_degraded_abort0} Bob receives the $n$-tuple $\boldsymbol{Y}$ from BEC($\epsilon_1$). Bob forms the sets
\begin{align*}
\overline{E} & := \{ i \in \{1,2,\ldots,n\}: Y_i \neq \bot\} \\
E & := \{ i \in \{1,2,\ldots,n\}: Y_i = \bot\}
\end{align*}
If $|\overline{E}| < (1 - \epsilon_1 - \delta) n$ or $|E| < (\epsilon_1 - \delta) n$, Bob aborts the protocol.
\STATE Bob creates the following sets:
\begin{align*}
&L_U \thicksim \text{Unif}\{A \subset \overline{E} : |A| = \beta n (\epsilon_2 - \delta) \} \\
&L_{\overline{U}} \thicksim \text{Unif}\{A \subset E : |A| = \beta n (\epsilon_2 - \delta)\} \\
&\tilde{G} := \overline{E} \backslash L_U \\
&\tilde{B} := E \backslash L_{\overline{U}}
\end{align*}
Bob reveals $\tilde{G},\tilde{B}$ to Alice over the public channel.
\STATE Let $\tilde{\boldsymbol{L}} = (L_0 \cup L_1)$. Bob forms the tuple $\boldsymbol{Q} \in \{0,1\}^{2 \beta n (\epsilon_2 - \delta) }$ such that :
\begin{equation*}
Q_i = \left\{ \begin{array}{ll} 0, & \tilde{L}_i \in L_0 \\ 1, & \tilde{L}_i \in L_1 \end{array} \right.
\end{equation*}
\STATE Bob forms the set $\tilde{G}_L$ consisting of the first $ 2\beta n \cdot r/(r - \tilde{\delta})$ elements from $(\tilde{G})$. Bob forms the set $\tilde{G}_S$ consisting of the next $\beta n (1 - (\epsilon_2 - \delta))$ elements from $(\tilde{G})$.
\STATE Bob randomly selects a function $F_L$ from a family $\mathcal{F}_L$ of universal$_2$ hash functions, given as:
\[ F_L : \{0,1\}^{ \left( \frac{r}{r - \tilde{\delta}} \right) 2\beta n} \longrightarrow \{0,1\}^{2 \beta n (\epsilon_2 - \delta) } \]
Bob now sends the following to Alice over the public channel : $F_L, \boldsymbol{Q} \oplus F_L(\boldsymbol{X}|_{\tilde{G}_L})$.
\STATE Alice recovers $\boldsymbol{Q}$ from $F_L, \boldsymbol{Q} \oplus F_L(\boldsymbol{X}|_{\tilde{G}_L})$. Using $\boldsymbol{Q}, \tilde{G}$ and $\tilde{B}$, Alice recovers $L_0,L_1$. Alice now randomly and independently chooses functions $F_0,F_1$ from a family $\mathcal{F}$ of universal$_2$ hash functions, given as:
\[ F_0,F_1 : \{0,1\}^{\beta n} \longrightarrow \{0,1\}^{n(r - 2 \tilde{\delta})} \]
Alice finally sends the following information on the public channel:
\[ F_0, \; F_1, \; \boldsymbol{K}_0 \oplus F_0(\boldsymbol{X}|_{L_0 \cup \tilde{G}_S}), \; \boldsymbol{K}_1 \oplus F_1(\boldsymbol{X}|_{L_1 \cup \tilde{G}_S}) \]
\STATE Bob knows $F_U,\boldsymbol{X}|_{L_U \cup \tilde{G}_S}$ and can, therefore, recover $\boldsymbol{K}_U$.
\end{algorithmic}
\end{multicols}
\end{algorithm*}
\footnotetext{The parameters $\delta, \tilde{\delta}$ can be chosen to be arbitrarily small so that this rate can take any desired value less than $\min \left\{(1/3) \cdot \epsilon_2(1 - \epsilon_1), \epsilon_1 \right\}$.}
Alice initiates the protocol by transmitting a sequence $\boldsymbol{X}$ of $n$ i.i.d. uniform bits over the channel. Bob and Eve receive the channel outputs $\boldsymbol{Y}$ and $\boldsymbol{Z}$ respectively, where $\boldsymbol{Z}$ is an erased version of $\boldsymbol{Y}$. Bob denotes by $E$ the set of indices at which $\boldsymbol{Y}$ was erased and by $\overline{E}$ the complement of $E$. Out of $\overline{E}$, Bob uniformly at random picks up a \emph{good set} $L_U$ of cardinality about $nr$. In a similar manner, Bob picks the \emph{bad set} $L_{\overline{U}}$ out of $E$, with $|L_{\overline{U}}| = |L_U|$. Let $\tilde{G} = \overline{E} \backslash L_U$ and $\tilde{B} = E \backslash L_{\overline{U}}$. Note that $|\tilde{G}|$ is about $n(1 - \epsilon_1 - r)$. Bob reveals the set of indices $\tilde{G}$ and $\tilde{B}$ to Alice over the public channel. Out of an ordered version of the set of indices $\tilde{G}$, Bob takes the first approximately $|L_0 \cup L_1|/\epsilon_2$ elements and calls it the set $\tilde{G}_L$ and takes the next approximately $|L_0|(1 - \epsilon_2)/\epsilon_2$ elements and calls it the set $\tilde{G}_S$. For $r < \min \left\{(1/3) \cdot \epsilon_2(1 - \epsilon_1), \epsilon_1 \right\}$, $|\tilde{G}_L| + |\tilde{G}_S| \leq |\tilde{G}|$ and so the sets $\tilde{G}_L, \tilde{G}_S$ of the required sizes can be derived from the set $\tilde{G}$. The purpose of forming $\tilde{G}_L$ and $\tilde{G}_S$ is to use them to form two different secret keys, known to Alice and Bob but secret from Eve.
Bob's goal now is to transmit $L_0,L_1$ to Alice without revealing them to Eve. Towards this goal, Bob does two things: Firstly, Bob considers the ordered version $\boldsymbol{L}$ of $L_0 \cup L_1$ and forms the binary $|L_0 \cup L_1|$-tuple $\boldsymbol{Q}$ such that $Q_i = 0$ when $L_i \in L_0$ and $Q_i = 1$ when $L_i \in L_1$, $i=1,2,\ldots, |L_0 \cup L_1|$. Secondly, Bob forms a secret key using $\tilde{G}_L$ that is $|L_0 \cup L_1|$ bits long, which Alice knows and Eve does not know, as follows. Bob randomly selects a function $F_L$ from a universal$_2$ class $\mathcal{F}_L$, whose input is about $|L_0 \cup L_1|/\epsilon_2$ bits long and whose output is $|L_0 \cup L_1|$ bits long. Then, $F_L(\boldsymbol{X}|_{\tilde{G}_L})$ is the secret key Bob is looking for. Bob sends $F_L, \boldsymbol{Q} \oplus F(\boldsymbol{X}|_{\tilde{G}_L})$ to Alice over the public channel. Alice recovers $L_0,L_1$ from this message while Eve cannot separate out $L_0,L_1$ from $L_0 \cup L_1$.
Alice now forms two independent keys to encrypt its strings and send these encrypted strings to Bob. One of these keys is known to Bob and none of the keys is known to Eve. For this, Alice randomly selects two functions $F_0,F_1$ from a family $\mathcal{F}$ of universal$_2$ hash functions, whose input is about $(|L_0| + |\tilde{G}_S|)/\epsilon_2$ bits long and whose output is about $|L_0|$ bits long. Then, $F_0(\boldsymbol{X}|_{L_0 \cup \tilde{G}_S})$ and $F_1(\boldsymbol{X}|_{L_1 \cup \tilde{G}_S})$ are the keys Alice wants. Note that Bob does not know the key $F_{\overline{U}}(\boldsymbol{X}|_{L_{\overline{U}} \cup \tilde{G}_S})$ even though Bob knows $\boldsymbol{X}|_{\tilde{G}_S}$. This is a direct consequence of privacy amplification on $\boldsymbol{X}|_{L_{\overline{U}} \cup \tilde{G}_S}$ by $F_{\overline{U}}$, coupled with the facts that $\boldsymbol{X}|_{L_{\overline{U}}}$ is erased for Bob and the key $F_{\overline{U}}(\boldsymbol{X}|_{L_{\overline{U}} \cup \tilde{G}_S})$ is about the same length as $|L_{\overline{U}}|$. Alice finally sends $F_0,F_1, \boldsymbol{K}_0 \oplus F_0(\boldsymbol{X}|_{L_0 \cup \tilde{G}_S}), \boldsymbol{K}_1 \oplus F_1(\boldsymbol{X}|_{L_1 \cup \tilde{G}_S})$ to Bob over the public channel. Bob knows $\boldsymbol{X}|_{L_U \cup \tilde{G}_S}$ and can recover $\boldsymbol{K}_U$ from Alice's message.
\begin{lemma}
\label{lem:c1p_ach_degraded}
Any rate $r < \min \left\{(1/3) \cdot \epsilon_2(1 - \epsilon_1), \epsilon_1 \right\}$ is an achievable $1$-private rate, with honest-but-curious users, for the setup of Figure~\ref{fig:ot_hbc_degraded}.
\end{lemma}
This lemma is proved in Appendix~\ref{appndx:proof_c1p_ach_degraded}. Here we give a sketch of this proof. Let $(\mathcal{P}_n)_{\{n \in \mathbb{N}\}}$ be a sequence of Protocol~\ref{protocol:C1P_degraded} instances, of rate $r - 2 \tilde{\delta}$. If the protocol does not abort, then Bob knows the key $\boldsymbol{S}_U = F_U(\boldsymbol{X}|_{L_U \cup \tilde{G}_S})$. This is because Bob knows $F_U,L_U,\tilde{G}_S,\boldsymbol{X}|_{L_U},\boldsymbol{X}|_{\tilde{G}_S}$. As a result, Bob can recover the string $\boldsymbol{K}_U$ from Alice's public message and so (\ref{eqn:ach_1p_wtap_0}) holds for $(\mathcal{P}_n)_{\{n \in \mathbb{N}\}}$. Bob does not know the key $\boldsymbol{S}_{\overline{U}} = F_{\overline{U}}(\boldsymbol{X}|_{L_{\overline{U}} \cup \tilde{G}_S})$, despite knowing $\boldsymbol{X}|_{\tilde{G}_S}$. This is because, by design, $|\boldsymbol{S}_{\overline{U}}| = |L_{\overline{U}}|$ and Bob does not know $\boldsymbol{X}|_{L_{\overline{U}}}$. Hence, privacy amplification (Lemma~\ref{lem:privacy_amplification}) by $F_{\overline{U}}$ on $\boldsymbol{X}|_{L_{\overline{U}} \cup \tilde{G}_S}$ ensures that $\boldsymbol{S}_{\overline{U}}$ appears nearly uniformly distributed to Bob. Thus, Bob does not learn anything about $\boldsymbol{K}_{\overline{U}}$ from Alice's message and so (\ref{eqn:ach_1p_wtap_1}) holds for $(\mathcal{P}_n)_{\{n \in \mathbb{N}\}}$. (\ref{eqn:ach_1p_wtap_2}) holds for $(\mathcal{P}_n)_{\{n \in \mathbb{N}\}}$ since Alice cannot learn $U$ upon receiving $L_0,L_1$ from Bob, as in previous protocols. Finally, note that the keys $\boldsymbol{S}_U, \boldsymbol{S}_{\overline{U}}$ are independent, despite $\boldsymbol{X}|_{\tilde{G}_S}$ being a common part of the inputs to functions $F_U,F_{\overline{U}}$ that generate these keys. Furthermore, privacy amplification by $F_U,F_{\overline{U}}$ ensures that Eve knows nothing about $\boldsymbol{S}_U, \boldsymbol{S}_{\overline{U}}$. Thus, for the same reasons as in previous protocols, (\ref{eqn:ach_1p_wtap_3}) holds for $(\mathcal{P}_n)_{\{n \in \mathbb{N}\}}$.
\subsection{Proof of upper bound: $C_{1P} \leq \min\{\epsilon_2(1 - \epsilon_1), \epsilon_1 \}$}
The upper bound follows by evaluating the upper bound in (\ref{eqn:c1p_general_outer}) for the setup of Figure~\ref{fig:ot_hbc_degraded}. Intuitively, the upper bound of $\epsilon_2(1 - \epsilon_1)$ follows from the fact that OT capacity is upper bounded by the secret key capacity of the wiretapped channel. This is because if Bob runs the protocol with the choice bit set deterministically to say 0, then $\boldsymbol{K}_0$ is a secret key between Alice and Bob. The upper bound follows from the fact that $\epsilon_2(1-\epsilon_1)$ is the secret key capacity of this wiretapped channel with public discussion~\cite{sec-key1993}. The upper bound of $\epsilon_1$ follows from the fact that this is an upper bound for two-party OT capacity of the binary erasure channel with erasure probability $\epsilon_1$~\cite{ot2007}.
\section{Summary}
\label{sec:conclusions}
In this work, we formulated and studied the problem of obtaining $1$-of-$2$ string OT between two users Alice and Bob in the presence of an eavesdropper Eve. The resource for OT is a broadcast channel from Alice to Bob and Eve. Apart from the usual OT constraints between the users, we additionally require that the eavesdropper learn nothing about any users' private data. The wiretapped channel model we introduced in this study (see Figure~\ref{fig:ot_hbc_wtap_bcast}) is a generalization of the two-pary OT model studied previously \cite{ot2007}, \cite{PintoDowsMorozNasc2011}. We studied the privacy requirements in our OT problem under two distinct privacy regimes : $2$-privacy, where Eve may collude with either user and $1$-privacy where no such collusion is allowed. When the broadcast channel in the model consists of two independent and parallel BECs (see Figure~\ref{fig:ot_hbc_wtap}), we derived the OT capacity both under $2$-privacy and under $1$-privacy for honest-but-curious users. These capacity results easily generalize for $1$-of-$N$ string OT. Our protocols were extensions of the scheme presented by Ahlswede and Csisz{\'a}r \cite{ot2007}, designed to additionally guarantee privacy against Eve. The corresponding converses were generalizations of the converse arguments in \cite{ot2007}. In the same model, we studied the problem of obtaining OT when Alice and Bob can behave maliciously and the malicious user can additionally collude with Eve. For this problem, we obtained an achievable rate which is optimal when $\epsilon_1 \leq 1/2$ and is no more than a fraction $\epsilon_1$ away from optimal when $\epsilon_1 > 1/2$. Our protocol for the regime $\epsilon_1 > 1/2$ makes novel use of interactive hashing to directly obtain the keys that encrypt Alice's strings. For $\epsilon_1 \leq 1/2$, our protocol is an extension of the protocol presented in \cite{savvides_thesis}, \cite{PintoDowsMorozNasc2011}, \cite{DowsNasc2014-arxiv} and is designed to maintain privacy against the malicious user colluding with Eve. We studied a generalization of the wiretapped OT model of Figure~\ref{fig:ot_hbc_wtap}, where the eavesdropper is replaced by a legitimate user Cathy (see Figure~\ref{fig:ot_hbc_indep}). Independent OT is required between Alice-Bob and Alice-Cathy. We derived inner and outer bounds for the region of achievable rate-pairs. These bounds match except when $\epsilon_1, \epsilon_2 > 1/2$. The final OT problem we studied considers a physically degraded broadcast channel as the OT resource (see Figure~\ref{fig:ot_hbc_degraded}). OT is required between Alice and Bob with $1$-privacy. Due to the degraded nature of the channel, Eve has more information about the noise process in the legitimate users' channel compared to previous models (where Bob, Eve got independent erasure patterns). This makes it harder to guarantee privacy for Bob but also presents an opportunity for reducing the amount of secret keys needed to encrypt Alice's strings. We obtain upper and lower bounds for the OT capacity for this problem. The bounds match when $\epsilon_1 \leq (1/3) \cdot \epsilon_2 (1 - \epsilon_1)$, otherwise the lower bound is within a factor of $1/3$ of the upper bound.
\section{Discussion and open problems}
\label{sec:open_problems}
\begin{itemize}
\item In the problem of obtaining OT over a wiretapped channel with malicious users (see Section~\ref{sec:prob_statement_malicious_wtap}), our achievable $2$-private rate is $\epsilon_1 \cdot C_{2P}$ when $\epsilon_1 > 1/2$. Here, $C_{2P}$ is the $2$-private OT capacity in the same setup when users are honest-but-curious. The main reason we loose rate in our protocol is that the sets $L_0,L_1$ obtained out of interactive hashing are not disjoint. In order to obtain disjoint sets, we never use the indices $L_0 \cap L_1$. This is quite a sizeable number of indices for an honest Bob to loose out of the good set $L_U$, leading to a rate loss. If we could get interactive hashing to provide us with disjoint $L_0,L_1$, then the achievable rate can be improved. Specifically, a useful version of interactive hashing would have a subset of $\{1,2,\ldots,n\}$ as its input and would provide two disjoint subsets of $\{1,2,\ldots,n\}$ as outputs. If that is possible without loosing any property of interactive hashing, we will only have to do the required privacy amplification on $L_0,L_1$ and a higher rate for our problem will become possible.
\item In the problem of obtaining independent OTs over a broadcast erasure channel (see Section~\ref{sec:prob_statement_indep}), there is a gap between the achievable rate and the outer bound when $\epsilon_1,\epsilon_2 > 1/2$. Our converse technique of evaluating how much information must remain hidden from any user during OT, which is applicable to any broadcast channel, does not close this gap. We believe that a more channel-specific insight on the impossibility of meeting one of the OT requirements can tighten the converse. This kind of a channel-specific converse argument was successfully employed in characterizing the $1$-private OT capacity in the presence of Eve (see Section~\ref{sec:prob_statement_wtap}) in the regime $\epsilon_2/2 \leq \epsilon_1 < 1/2$. In the independent OTs problem itself, when all three users are malicious, it is quite tempting to consider a protocol where Alice invokes two independent interactive hashing based checks. One of the checks is for Bob and the other for Cathy, to catch malicious Bob or Cathy. This is unlike the wiretapper model (Alice and Bob can act maliciously, Eve remains passive) where Alice cannot get Eve to respond to such checks. This difference is what makes the problem of catching a malicious Bob, colluding with Eve, in the wiretapper model much harder to solve. However, the two-checks approach cannot prevent attacks such as a denial-of-service attack by Bob to prevent Cathy from getting any OT, or vice-versa. Evolving a technique to prevent such attacks in our setup has been deferred to a future study.
\item A single-server private information retrieval (PIR) problem, closely related to the independent OTs problem of this paper, was formulated and studied in \cite{MishraSDPisit15}. This problem has the same setup as the independent OTs problem, except that Alice holds only a single database of $N$ strings in the PIR problem. Bob and Cathy want a string of their respective choice from this single database, with $2$-privacy. For $N=2$, the data transfer capacity for this PIR problem was derived in \cite{MishraSDPisit15}. The result uses a novel achievable scheme which is quite different from the achievable scheme used in the independent OTs problem in this paper. In fact, the achievable scheme used in the independent OTs problem of this paper turns out to be sub-optimal for the PIR problem. However, for $N > 2$, it remains open to characterize the data transfer capacity for the PIR problem.
\item Considering OT using a physically degraded channel (see Section~\ref{sec:prob_statement_degraded}) presents several open problems. We do not know the $1$-private OT capacity, with honest-but-curious users, when $(1/3) \cdot \epsilon_2(1 - \epsilon_1) < \epsilon_1$. Characterizing the OT capacity in this regime seems to require a tighter converse, based on a more channel-specific impossibility argument. We suspect that the $2$-private OT capacity in this setup is zero. However, our brief attempt at showing this has not been successful. It would be quite interesting to devise a scheme for OT with $2$-privacy here. Finally, obtaining OT when users can behave maliciously in this setup appears to require newer techniques and this problem has been deferred to a future study.
\item In all the problems studied in this work, we have assumed unlimited public discussion. It would be interesting to study these problems when the public discussion rate is also constrained.
\end{itemize}
\section{Acknowledgements}
\label{sec:acknowledgements}
M.~Mishra gratefully acknowledges the help received from Amitava Bhattacharya, Department of Mathematics, Tata Institute of Fundamental Research (TIFR) in proving Lemma~\ref{lem:dense}.
|
\section{Introduction}
\cite{Fermi49} introduced a fundamental stochastic process to solve the problem of particle energization (heating and/or acceleration) in space and astrophysical plasmas. His goal was to resolve the mystery of the stable energy distribution of Cosmic Rays (CR) \citep[see details in][]{Longair11}. The core of his idea had a larger impact on non-linear processes in general and has been the driving force behind all subsequent theories on charged particle energization. He assumed that high energy particles with speed close to the speed of light collide with {\b magnetic clouds} which move in random directions with speed $V$ close to the local Alfv\'en speed. The reflections of the charged particles at the magnetic clouds, heat or accelerate the particles to substantial energies. The rate of the energy gain for the charged particles is proportional to the square of the ratio of the magnetic cloud speed to the speed of light $(V/c)^2$. A more realistic proposal was put forward initially by \cite{Kulsrud71}. The magnetic clouds were replaced by a Kolmogoroff spectrum of {\bf low amplitude MHD waves} and the energization processes was called {\bf ``stochastic heating and acceleration by (weak) turbulence''}.
Research on reconnecting magnetic fields has undergone a dramatic evolution recently due mostly to the development of the numerical simulation techniques. Long current sheets or multiple interacting current sheets will form, on a short time scale, a turbulent environment, consisting of a collection of current sheets \citep{Matthaeus86,Galsgaard96,Drake06,Onofri06}, \citep[see also the recent reviews][]{Cargill12,Lazarian12}. On the other hand, Alfv\'en waves and large scale disturbances traveling along complex magnetic topologies will drive magnetic discontinuities by reinforcing existing current sheets or form new unstable current sheets \citep[see][]{Biskamp89,Lazarian99,Dmitruk04,Arzner04}.
The goals of this article are to introduce
three new and important elements
in the current discussion of turbulent reconnection in
{\bf large scale systems}: (a) the study of the
characteristics of the energy gain of individual particles, (b) the use of the same framework of global and statistical analysis for two types of scatterers, (i) magnetic clouds, which are representative of stochastic energy gain, (ii) {\bf Unstable Current Sheets (UCS)}, which are representative of systematic energy gain, (c) the development of a new method to estimate the {\bf transport coefficients from the dynamics of the interaction of the particles with the scatterers}.
\section{Fermi type energization of particles}
\cite{Fermi49} based his estimates for the proposed acceleration mechanism on several assumptions \citep[see][]{Longair11}.
The particles move with relativistic velocity $u$ and the scatterers (``magnetic clouds'') move with mean speed $V$ much smaller than the speed of light. The energy gain or loss of the particles interacting with the scatterers is
\begin{equation}\label{energyF}
\frac{\Delta W}{W}\approx\frac{2}{c^2}(V^2-\vec{V} \cdot \vec{u}) ,
\end{equation}
where for head on collisions $\vec V\cdot \vec u < 0$ and the particles gain energy, for overtaking collisions
$\vec V\cdot \vec u > 0$ and the particles lose energy. The rate of energy gain in Eq. (1) includes both,
a first and a second order term. For relativistic particles the first order term dominates the
energy gain. For non-relativistic particles both terms are second order.
The rate of energy gain for relativistic particles is estimated as
$dW/dt=W/t_{acc},$
where $t_{acc}=(3\lambda c)/(4V^2)$
and $\lambda$ is the mean free path the particles travel between the scatterers. Assuming that the distribution of the scatterers is uniform inside the acceleration volume and their density is $n_{sc}$, the mean free path will be
$\lambda \approx (\sqrt[3]{n_{sc}})^{-1}.$
The particles are not trapped inside the scatterers, {\bf their interaction is instantaneous} and the temporal evolution of the mean energy is
\begin{equation}\label{Energy}
\aver{W(t)} = W_0e^{t/t_{acc}} .
\end{equation}
\cite{Fermi49} used the FP equation in order to estimate the change of the energy distribution $n(W,t)$ of the accelerated particles. In order to simplify the diffusion equation, he assumed that spatial diffusion is not important and the particles diffuse only in energy space,
\begin{equation} \label{diff}
\frac{\partial n}{\partial t}+\frac{\partial }{\partial W} \left [ F n -\frac{\partial [D n] }{\partial W} \right ]=
-\frac{n}{t_{esc}}+Q ,
\end{equation}
where $t_{esc}$ is the escape time from an acceleration region with characteristic length $L$, $Q$ is the injection rate,
$D$ is the energy diffusion coefficient
\begin{equation}
D(W,t) =\frac{\aver{\left(W(t+\Delta t)- W(t)\right)^2}_W}{2\Delta t},
\label{eq:DWW}
\end{equation}
and
\begin{equation}
F(W,t) =\frac{\aver{W(t+\Delta t)- W(t)}_W}{\Delta t},
\label{eq:FW}
\end{equation}
is the energy convection coefficient representing the systematic
acceleration, which, as mentioned, here takes the form
$F(W,t)=W/t_{acc}$.
With $\aver{...}_W$ we denote the conditional average that $W(t)=W$
(see e.g.\ \cite{Ragwitz2001}).
Fermi reached his famous result by assuming that: (a) the particles reach a steady state before escaping from the acceleration volume and (b) the energy diffusion coefficient approaches zero asymptotically for the relativistic particles and the acceleration is mainly due to the systematic acceleration term ($F$).
Based on these assumptions, the stationary solution of Eq.~(\ref{diff}) simply is $n(W)\sim W^{-k}$,
where
$k = 1+t_{acc}/t_{esc}.$
The index $k$ approaches 2 (which is close to the observed value for the CR) only if $t_{acc} \approx t_{esc}.$ In most recent theoretical studies of the second order Fermi acceleration the escape time (which is so crucial for the estimate of $k$) is difficult to estimate quantitatively.
We will expand the initial Fermi model in this article, by replacing the scatterers by randomly distributed UCS, which represents the environment present in turbulent reconnection in a fragmented large scale system.
In several recent articles the 3D evolution and the fragmented UCS
has been analysed (see \cite{Guo15, Dahlin15}), using Particle in Cell numerical codes, and it has been found that the curvature drift competes with the electric field in the efficiency of particle acceleration inside the UCS.
It will be a natural continuation of the work presented here to study also the curvature
drift case,
here we focus
on the acceleration by the electric fields.
The particle dynamics inside the UCS is complex since internally the UCS are also fragmented and the particles that interact with the fragments of the UCS can lose and gain energy on the microscopic level of description.
Yet, on the average and over the entire simulation domain, the particles gain energy systematically before exiting the UCS, see
Fig.\ 6(c) of \cite{Guo15} and the related discussion.
The energy gain is a weak function of energy in the
case of electric field acceleration and proportional to the energy in the case of curvature
drift.
In this article we estimate the {\bf macroscopic} energy gain by the simple formula
\begin{equation}\label{e:dW_cs}
\Delta W = |q| E_\textrm{eff}\ \ell_\textrm{eff} ,
\end{equation}
where $E_\textrm{eff} \approx (V/c) \; \delta B$ is the measure of the effective electric field of the UCS, and $\delta B$ is the fluctuating magnetic field encountered by the particle, which is of stochastic nature, as related to the stochastic fluctuations induced by reconnection. $\ell_\textrm{eff}$ is the characteristic length of the interaction of the particle with the UCS and should be proportional to $E_{eff}$, since small $E_{eff}$ will be related to small scale UCS.
The scenario of the method used here is: particles approach the scatterers with an initial energy $W_0$ and depart with a energy $W=W_0+ \Delta W$, where $\Delta W$ {\bf on the macroscopic level} always is positive and follows the statistical properties of the fluctuations $\delta B$.
\section{A Fermi lattice gas model for turbulent reconnection}
We constructed a 2D grid $(N \times N),$ with linear size $L$. Each grid point is set as either \emph{active} or \emph{inactive}, i.e.~scatterer or not. Only a small fraction R $(1-15\%)$ of the grid points are active. The mean free path of the particles moving inside the grid with minimum distance $\ell=L/(N-1)$ is $\lambda_{sc}=\ell/R.$ When a particle encounters an active grid point it is renewing its energy state depending on the physical characteristic of the scatterer (magnetic cloud or UCS).
At time, $t=0$ all particles are located at random positions on the grid. The injected distribution $n(W, t=0)$ is Maxwellian with temperature $T$. The initial direction of motion of every particle is selected randomly. The particles' individual time $t_i$ is also adjusted between scatterings as $t_{i+1}=t_{i}+ \Delta t, \;\; \Delta t= l_i/u_i,$ with $u_i$ the particle velocity and $l_i$ the distance the particle travels between scatterings. The particles move in a random direction after interaction with the scatterers, being always confined to follow the grid-lines.
It is to
note that the consequent large angle scattering takes place in position space, and not in
velocity space, the large angle scattering is unrelated with the particle energy, and its role
is to implement a spatial random walk process on a grid that basically is influencing only
the timing of the energization process.
We mainly consider electrons and will just briefly comment on the energization of ions.
\paragraph{Random ``scattering'' by magnetic clouds }
We start our analysis using the standard stochastic Fermi accelerator,
Eq.\ (\ref{energyF}), in order to validate our method for the estimate
of the transport coefficients and the solution of the Fokker Planck equation, since this
accelerator has been already discussed in the literature using many different approaches.
The parameters used in this article are related to the plasma parameters in the low solar corona. We choose the strength of the magnetic field to be $B=100\ G,$ the density of the plasma $n_0= 10^9\ cm^{-3}$ and the ambient temperature around $10\ eV.$ The Alfv\'{e}n speed is $V_A \approx 7\times 10^8\ cm/sec$, so $V_A$ is comparable with the thermal speed of the electrons. The energy increment is $(\Delta W/W) \sim (V_A/c)^2\approx 5 \times 10^{-4}$ and the length of the simulation box is $10^{10}\ cm$. We consider an open grid, so particles escape from the accelerator when they reach any boundary of the grid, at $t_i = t_{esc,i}.$ We assume in this set-up that only $R=10\%$ of the $601\times 601$ grid points are active.
The temporal evolution of the mean kinetic energy of the particles and the kinetic energy evolution of typical particles are shown in Fig.~(\ref{f:distr_sof:mW}). The motion of the particles is typical for a stochastic system with random-walk like gain and loss of energy before exiting the simulation box. The mean energy increases exponentially (after a brief initial period of a few seconds), as is expected from the analysis presented by Fermi (see Eq.~(\ref{Energy})). The mean free path
is given as $\lambda_{sc}=\ell/R \approx 1.67\times 10^8\ cm$,
and, using the analytical expression derived by Fermi, we find $t_{acc_{th}}=(3\lambda_{sc} c)/(4V_A^2) \approx 8\ sec$. We can also estimate the acceleration time from our simulation (see Fig.~(\ref{f:distr_sof:mW})), by fitting the asymptotic exponential form to the mean kinetic energy, as predicted by Eq.~(\ref{Energy}), which
yields
$t_{acc_{num}}\approx 10\ sec$, a value close to the analytically determined one. Fig.~(\ref{f:distr_sof:tdistr}) presents the escape time, which is different
for each particle, and we use the median value $(\approx 8\ sec)$ as
an estimate of a characteristic escape time.
In Fig. (\ref{f:distr_sof:Wdistr}) we show the energy distribution function of the particles remaining inside the box after 15 sec. The distribution is a synthesis of a hot plasma and a power law tail, which is extended to $100 MeV$, with slope $k \approx 2.3$. If we use the estimates of $t_{acc}$ and $t_{esc}$ reported, we can estimate the index of the power law tail $k=1+t_{acc}/t_{esc} \approx 2.3.$ So the slope of the accelerated particles agrees with the estimates provided by the theory of the stochastic Fermi process.
\begin{figure}[ht]
\sidesubfloat[]{\includegraphics[width=0.45\columnwidth]{f1a}%
\label{f:distr_sof:mW}}
\sidesubfloat[]{\includegraphics[width=0.45\columnwidth]{f1b}%
\label{f:distr_sof:tdistr}}\hfill\\
\sidesubfloat[]{\includegraphics[width=0.45\columnwidth]{f1c}%
\label{f:distr_sof:DF_W}}
\sidesubfloat[]{\includegraphics[width=0.45\columnwidth]{f1d}%
\label{f:distr_sof:Wdistr}}
\caption{\textit{\protect\subref{f:distr_sof:mW} Mean energy increase as a function of time and the energy evolution of typical particles. \protect\subref{f:distr_sof:tdistr} The escape time distribution of particles. \protect\subref{f:distr_sof:DF_W} The energy diffusion and convection coefficients as functions of the kinetic energy. \protect\subref{f:distr_sof:Wdistr} Energy distribution at $t=0$ and $t=15\ sec$ for particles remaining inside the box, together with the solution of the FP equation at final time.
}}\label{f:distr_sof}
\end{figure}
In Fig.~(\ref{f:distr_sof:DF_W}), the diffusion and convection coefficients at
$ t = 15\ sec$, as functions of the energy, are presented. The estimate of the coefficients is based on Eqs.\ (\ref{eq:DWW}) and (\ref{eq:FW}), with $\Delta t$ small, whereto we monitor the energy
of the particles at a number of regularly spaced monitoring times $t^{(M)}_k$,
$k=0,1,...,K$, with $K$ typically chosen as $200$, and we use
$t=t^{(M)}_{K-1}$, $\Delta t = t^{(M)}_{K} - t^{(M)}_{K-1}$ in the
estimates. Also, in order to account for the conditional averaging in
Eqs.\ (\ref{eq:DWW}) and (\ref{eq:FW}), we divide the energies
$W\left(t^{(M)}_{K-1}\right)_i$ of the particles into a number of logarithmically
equi-spaced bins and perform the requested averages separately
for the particles in each bin.
As Fig.~(\ref{f:distr_sof:DF_W}) shows,
both transport coefficients exhibit a power-law shape, with indexes $a_D = 1.57$ and $a_F = 0.70$, for energies above $1\ keV$,
$
F(W) = A W^{0.70}, \ \ \ \ \ D(W) = B W^{1.57}.$
These estimates clearly depart from the assumptions made initially by Fermi.
In order to verify the estimates of the transport coefficients,
we insert them in the form of the fit into the FP equation (Eq.\ (\ref{diff})) and
solve the FP equation numerically (including the escape term, and with $Q=0$).
For the integration of the FP equation on the semi-infinite
energy interval $[0,\infty)$, we use the pseudospectral
method, based on the expansion in terms of rational Chebyshev polynomials
in energy space, combined with the implicit backward Euler method
for the time-stepping (see e.g.\ \cite{Boyd2001}). The resulting energy distribution at final time
is also shown in Fig.~(\ref{f:distr_sof:Wdistr}), and it turns out to
coincide very well with the distribution from the particle simulation
in the intermediate energy range that corresponds to the heating of the
population, the power-law tail can though not be reproduced by the
FP solution. The differences below energies of about $10 \; eV$ are of less importance
and can most likely be attributed to the fact that for simplicity we just assumed the transport coefficients to be constant at low energies.
Varying the density of the scatterers in a parametric
study in the range $0.01 < R < 0.2$
and keeping the characteristic length of the acceleration volume constant,
we find that the main characteristics of the distribution remain the same but the heating and the slope of the accelerated particles vary.
The ions in the asymptotic stage do not appear to have significant differences from the evolution of the electrons. We can then conclude that stochastic Fermi processes can heat and accelerate both ions and electrons in the solar corona, yet on different time scales.
\paragraph{A model for turbulent reconnection}
We now use the lattice gas model to estimate the heating and
acceleration of particles inside a large scale turbulent
reconnection environment, where a fragmented distribution of UCS
is present. The setup is $R=0.1$, $N=601$, $V=V_A$ and
the simulation box has length $10^8\ cm$ and is open.
The energy change of a particle that encounters an UCS is now given by
Eq.~(\ref{e:dW_cs}), and we assume that $\delta B$ takes random values
following a power-law distribution with index $5/3$
(Kolmogorov spectrum), and $\delta B \in [10^{-5} G, 100G].$
We also assume the effective length $\ell_\textrm{eff}$ to be a linear function of $E_{eff}$, $\ell_\textrm{eff} =a E_{eff}+b$, and by restricting the size of $\ell_\textrm{eff}$ to $\ell_{eff} \in [10^3 cm, 10^5 cm]$, we determine the constants $a,b.$
Combining all the above we find that the effective electric filed lies approximately in
$E_\textrm{eff} \in [10^{-7} E_D,
E_D]$, where $E_D$ is the Dreicer field, $E_D\approx 1.6\cdot
10^{-7}\ statV/cm$.
\begin{figure}[ht]
\sidesubfloat[]{\includegraphics[width=0.43\columnwidth]{f2a}%
\label{f:distr_cs:mW}}\hfill%
\sidesubfloat[]{\includegraphics[width=0.43\columnwidth]{f2b}%
\label{f:distr_cs:tesc}}\\%
\sidesubfloat[]{\includegraphics[width=0.43\columnwidth]{f2c}%
\label{f:distr_cs:F_W}}\hfill%
\sidesubfloat[]{\includegraphics[width=0.43\columnwidth]{f2d}%
\label{f:distr_cs:Wdistr}}%
\caption{\textit{\protect\subref{f:distr_cs:mW} The mean
energy increase as a function of time and the energy evolution of
some typical particles are shown.
\protect\subref{f:distr_cs:tesc} The escape time distribution of
particles. \protect\subref{f:distr_cs:F_W} The energy convection
coefficient as a function of the kinetic energy at $t = 1\ sec$.
\protect\subref{f:distr_cs:Wdistr} Initial and asymptotic (here $t
= 1 \ sec$) kinetic energy distribution.}}\label{f:distr_cs}
\end{figure}
We initiate the simulation with a Maxwellian distribution with
temperature $10\ eV$. Fig.~(\ref{f:distr_cs:mW}) shows the mean energy and
the energy of
some typical particles as a function of time, up to final time or
untill they
escape from the simulation box. The rate at which the particles on the
average gain
energy is exponential, so $\ln\left< W \right> \approx t/t_{acc}$,
and we estimate the asymptotic value of the acceleration time to be $\approx 0.3\; sec$.
The acceleration is systematic and the particles
feel a rapid increase of their energy any time they cross an UCS
with variable strength of the effective electric field (see the similar
behaviour observed in \cite{Dahlin15,Guo15}). The energy
distribution reaches an asymptotic state (see
Fig.~(\ref{f:distr_cs:Wdistr})) in s fraction of a second. It is obvious that
particles are very efficiently accelerated inside the turbulent
reconnecting volume and form a power law tail with index $\approx
1.7$.
Fig.~(\ref{f:distr_cs:tesc}) presents the escape time, which is
different for each particle, and we use the median value $(\approx
0.5\ sec)$ as an estimate of a characteristic escape time. If we
use the estimates of $t_{acc}$ and $t_{esc}$ reported, we can
estimate the index of the power law tail
$k=1+t_{acc}/t_{esc} \approx 1.6$, which is close to the slope of the
distribution of the accelerated particles in the simulation.
In Fig.~(\ref{f:distr_cs:F_W}) the convection coefficient $F$ at $t
= 1\ sec$ is presented as function of the energy, and it exhibits
a power-law shape, with index $a_F = 0.76$ for energies above
$100\,$eV, an index close to the one found above in Fermi's
original scenario. For the diffusion coefficient, the estimate $D$
based on Eq.~(\ref{eq:DWW}) yields a power-law, applying though
the finite time correction of \cite{Ragwitz2001}, $D_{true} = D -
0.5 \Delta t F^2$, we find that $D_{true} \approx 0$, the
energization process is purely convective in nature, the non-zero
$D$ is an artifact resulting from the finite time contribution of
$F$ to $D$ (we just note that in the Fermi case the finite
time correction
was negligible).
Using $F$ and $D_{true}$ in the numerical solution of the FP
equation, we find only heating, on time-scales though of the order
of tens of seconds, much larger than the time of 1 sec considered
here. This result is in accordance with and a generalization of
the result in \cite{Guo2014, Guo15}, who also find only heating
when analytically solving the FP equation (for $D=0$ and $F\sim W$
in their case). On the other hand, the asymptotic distribution can
be calculated from Eq.~(\ref{diff}) (assuming $\partial n/\partial
t =0$) as $n\sim W^{-0.76}$. The reason for the discrepancy
between the FP solution and the asymptotic solution must be
attributed to the fact that the asymptotic solution, determined as
a stationary solution, cannot be reached with the initial
condition being a Maxwellian (in analogy to the case in
\cite{Guo2014} with $F\sim W$).
Concerning the difference between the FP solution and the lattice
model, we find that the sample of energy differences
$W_i(t+\Delta t)- W_i(t)$ in Eq.~(\ref{eq:FW})
(with $i$ the particle index),
on which the estimate of $F$ is
based, follows actually a power law distribution, and as a
consequence the particles occasionally perform very large jumps in
energy space (Levy flights), as illustrated in
Fig.~(\ref{f:distr_cs:mW}), in contrast to the second order Fermi
process (see Fig.~(\ref{f:distr_sof:mW})). The fact that the energy
increments have a power-law distribution with the specific index
has several consequences: (1) The estimate of $F$ as a mean value
theoretically is finite, yet it is very noisy. (2) Both the mean
(or the median, as used here) are not representative of a
scale-free power-law distribution. (3) The variance of the
distribution of energy-increments tends to infinity. After all, in
the case at hand, the applicability of the classical random walk
theory (classical Langevin and FP equation) breaks down, as it is
manifested in the inability of the FP equation to reproduce the
test-particles' energy distribution, and in the practical
difficulties of the expressions for $F$ and $D$ in
Eqs.~(\ref{eq:FW}) and (\ref{eq:DWW}) to yield meaningful
transport coefficients. Thus, modeling tools like the Fractional
FP equation become appropriate here. Similar cases of Levy flights
have been observed by \cite{Arzner04} and \cite{Bian08}, without
further analyzing the consequences for the transport coefficients
and the FP equation.
We also have explored the role of collisions and they are
important for impulsive energization longer than the collision
time of the system, they though play a crucial role only for the
bulk of the energized plasma and just slightly modify the slope of
the tail.
\section{Summary and Discussion}
Turbulent reconnection is a new type of accelerator which can be modelled with the use of tools borrowed from Fermi type accelerators, namely by replacing the ``magnetic clouds" with a new type of ``scatterers'', the UCS. This generalization can handle large scale astrophysical systems composed from local accelerators like current sheets appearing randomly in reconnecting turbulence. We developed a 2D lattice gas model where a number of active points act as ``scatterers" in order to model the new accelerator. Our main contribution in this article is the estimate of the transport coefficients from the particle dynamics and their use in solving the FP equation. Our main results from this study are: (a) Stochastic Fermi accelerators can reproduce a well known energy distribution in laboratory and astrophysical plasmas, where heating of the bulk and acceleration of the run away tail co-exist. The density of the scatterers plays a crucial role in controlling the heating and the acceleration of particles. (b) The transport coefficients show a general power-law scaling
with energy.
(c) The replacement of the scatterers with UCS has several effects on the energization of the particles: (i) The acceleration time is an order of magnitude faster than in the stochastic Fermi process. (ii) Estimating the transport coefficients from the dynamic particle orbits, we have shown that the final energy distribution cannot be a solution of the FP equation, since the orbits of the energetic particles in energy space depart radically from
Brownian motion, showing characteristics of Levy flights. (iii) The asymptotic distribution of the accelerated particles is similar to the ones obtained in different simulations (see \cite{Arzner04,Dmitruk04,Onofri06, Drake06, Drake13,Dahlin15}), where turbulent reconnection is established.
We can conclude that the stochastic Fermi acceleration and turbulent reconnection processes can play a crucial role in many astrophysical plasmas and their role depends strongly on their physical properties, such as
the nature of the scatterers (e.g.\ large amplitude Alfv\'en waves or UCS), their spatio-temporal statistical properties (e.g.\ their spatial density),
and the time evolution of the driver of the explosions.
\begin{acknowledgements}
We thank the referee, whose comments helped to improve substantily the article.
The authors acknowledge support by European Union (European Social Fund -ESF) and Greek national funds through the Operational Program Education and Lifelong Learning of the National Strategic Reference Framework (NSRF) -Research Funding Program: THALES: Investing in knowledge society through the European Social Fund.
\end{acknowledgements}
\bibliographystyle{aasjournal}
|
\section{Introduction}
The main objects of studies in quantum field theory are the Green's functions. They can be naturally
expressed in terms of the path integral. However, the path integral itself
gives only a formal solution and for the practical computations one has to find
some efficient method of its evaluation. One of the possibility is to use a finite lattice approximation
of the physical space and then investigate the truncated system using the Monte Carlo
method. Such approach was successfully applied in many areas of statistical, condensed matter
and elementary particle physics for a wide range of physical parameters, {\it e.g.} coupling constants.
The Monte Carlo method is based on the probabilistic
interpretation of the lattice integrals measure and, consequently, it can not be applied, when the action of the
system is complex. For instance, this complex action problem, or in other words sign problem, impedes the
the computations in lattice QCD at finite chemical potentials \cite{deForcrand}.
Another traditional way of the path and lattice integrals computations is the utilization of the
standard perturbation theory with the Gaussian initial approximation (SPT).
Usually, the series of SPT are asymptotic \cite{Dyson, Lipatov} and applicable
only for the small coupling constants (parameters of the expansion). For example,
the most precise results within the standard perturbation theory were obtained in QED \cite{Laporta1996, Aoyama2012},
where the expansion parameter is extremely small: $\alpha \simeq 1/137$.
At the same time SPT fails to describe the low energy physics of graphene, which is effectively
determined by QED with large coupling constant \cite{Kolomeisky2015}.
The SPT series are asymptotic because of the incorrect interchange of the summation and
integration during the construction of the perturbative expansion.
Nevertheless, the problem of the interchanging can be avoided.
For instance, it can be done by an appropriate regularization of the original integral. The regularization
by cutting off the large fluctuations of the fields in the lattice models was suggested in \cite{Meurice2004, Meurice20052}.
A more sophisticated and delicate regularization method providing
the construction of the convergent perturbation theory for the lattice models and path integrals
with the measure defined by the trace-class operators was developed in works
\cite{Belokurov1, Belokurov2, Belokurov3, BelSolSha97, BelSolSha99}.
The method, based on the modification of the interaction power due to the application of the intermediate field representation
and on the consequent utilization of the forests/trees formula \cite{Brydges, TreesForests} was developed in works
\cite{tears, ZeroDimLVE, phi2k, HowToResum, correctedPhi42}.
Alas, the computations with all these methods are highly complicated.
An alternative approach to the construction of the convergent perturbative series in scalar field theories,
based on changing of the initial Gaussian approximation to a certain interacting theory,
was proposed in \cite{Ushveridze1983, Shaverdyan1983, UshveridzeSuper}. Later, independently developed and similar ideas become
a basis of the variational perturbation theory methods \cite{Feynman}.
In \cite{Turbiner} the approach \cite{Ushveridze1983, Shaverdyan1983, UshveridzeSuper} was extended
to the construction of the strong coupling expansion for the anharmonic oscillator.
In \cite{Nalimov} the RG-equations consistent with the method \cite{Ushveridze1983} were derived.
The critical indices of the $\varphi^4$-model obtained within the latter RG-equations
are in close agreement with the experimental and numerical results. However, a rigorous
mathematical proof of the convergence of expansions \cite{Ushveridze1983, Shaverdyan1983, UshveridzeSuper, Nalimov}
is still missing.
A non detailed version of the rigorous construction of the convergent
series similar to \cite{Shaverdyan1983, UshveridzeSuper}
for the one-dimensional lattice $\phi^4$-model was presented in \cite{IvanovProc}.
The numerical computations within the convergent series in \cite{IvanovProc}
revealed a perfect agreement with the results obtained by the Monte Carlo simulations for the lattice
with the volume $V = 2$ and demonstrated slow convergence to the correct answers even for
the slightly bigger lattices (with $V = 4$ and $V = 8$ lattice sites).
Here we continue the investigation of the convergent series method, carrying out the main derivations on the example of the lattice $\phi^4$-model
and performing generalizations, when it is necessary.
We prove, that the convergent series (CS) can be rigorously constructed
for any finite lattice model with the polynomial interaction of even degree
and that the series is expressed as a re-summation of SPT. We show,
that up to all loops of the standard perturbation theory the convergent series method
has an internal symmetry, providing the possibility to introduce a variational parameter.
The freedom in a choice of the variational parameter allows one to obtain numerical results,
which are in agreement with the Monte Carlo data.
Though, the convergence and non-perturbative correctness of CS, modified by the the variational
parameter, is not {\it a priori} evident. In the following we denote the latter series as variational (VS).
To investigate the convergence of the variational series,
we consider two regularizations of the lattice $\phi^4$.
The first one, $\eta$-regularization, is a natural extension of the variational series construction and it
gives suggestive arguments about the convergence of VS.
The second, $\gamma$-regularization, is also based on the mathematical structures, used in VS.
We proof, that $\gamma$-regularized model approximates original $\phi^4$-model with any arbitrary
precision and that the Green's functions of the $\gamma$-regularized model can be calculated with
the variational series, which is convergent in this case.
We demonstrate the non-perturbative independence on the variational parameter of VS, when the
$\gamma$-regularization is removed. Using this independence property, we propose a way for the computations
in the infinite volume limit.
Summarizing the properties of CS and VS with regularizations, we conjecture the convergence of the variational series.
We study the applicability of the CS and VS for different lattice volumes
and investigate the dependence on the variational and regularization
parameters, computing the operator $\langle\phi_n^2\rangle$ of the lattice $\phi^4$-model.
The results are compared with the Monte Carlo simulations and Borel re-summation.
The paper is organized as follows. In Section \ref{constr} the convergent series
for lattice models with polynomial interactions is constructed.
We introduce variational series and discuss its perturbative properties in Section \ref{impr}.
To investigate non-perturbative aspects of VS we study regularized lattice models in Section \ref{conv}.
The results of the numerical computations are presented in Section \ref{numer}.
We conclude in Section \ref{concl}.
\section{Construction of the convergent series}
\label{constr}
We start with the construction of the convergent series for the lattice $\phi^4$-model. The model is defined by the action
\begin{eqnarray}
S[\phi] = \frac{1}{2} \sum_{m,n = 0}^{V-1} \phi_m K_{mn} \phi_n + \frac{\lambda}{4!} \sum_{n = 0} ^ {V-1} \phi _ {n} ^ 4,
\label{Sphi4}
\end{eqnarray}
\begin{eqnarray}
\frac{1}{2} \sum_{m,n = 0}^{V-1} \phi_m K_{mn} \phi_n =
\sum_{n = 0}^{V - 1}\Big[\frac{1}{2} M^2 \phi_{n}^2
-\frac{1}{2}\sum_{\mu = 1}^d \big(\phi_{n + \hat\mu} + \phi_{n - \hat\mu} - 2 \phi_{n}\big)\phi_{n}\Big]\,,
\label{Kmn}
\end{eqnarray}
where $M$ is a mass parameter, $\lambda$ is a coupling constant, $V$ is the volume of the lattice,
indices $m$ and $n$ label the lattice sites, $d = 1,2$ is a dimension of the lattice,
index $\mu$ runs over all spatial dimensions and $\hat\mu$ stands for the unit vector in the corresponding direction.
The periodical boundary conditions in all possible directions are assumed.
Without loss of generality, as an example of an arbitrary Green's function, we consider the two point Green's function (propagator).
The normalized to the free theory propagator is defined as
\begin{eqnarray}
\langle\phi_i \phi_j\rangle = \int\, [d\phi]\, \phi_i \phi_j\, \exp\{-S[\phi]\}\,,
\label{correl}
\end{eqnarray}
where $\int [d\phi] = \frac{1}{Z_0} \prod_{n} \int\, d\phi_n$ and
\begin{eqnarray}
Z_0 = \prod_{n} \int\, d\phi_n\, e^{-\frac{1}{2} \sum_{l,m} \phi_l K_{lm} \phi_m}
\end{eqnarray}
is the partition function of the free theory.
Following \cite{Shaverdyan1983, UshveridzeSuper}, we split the action into the
new non-perturbed part $N[\phi]$ and perturbation: $S[\phi] = N[\phi] + (S[\phi] - N[\phi])$.
For the following it is convenient to modify the latter expression as
\begin{eqnarray}
S_\eta[\phi] = N[\phi] + \eta (S[\phi] - N[\phi])\,,
\label{split}
\end{eqnarray}
where $\eta \leq 1$ is a parameter labeling the order of the new perturbative expansion.
The parameter $\eta$ will be also used in Section \ref{etaReg} for the regularization.
In the current section we derive formulas containing $\eta$, keeping in mind, that the initial model corresponds to $\eta = 1$.
Then, the propagator (\ref{correl}) can be written as
\begin{eqnarray}
\langle\phi_i \phi_j\rangle = \int\, [d\phi]\, \phi_i \phi_j\, e^{-N[\phi]}
\sum_{l = 0}^\infty
\frac{\eta^l (N[\phi] - S[\phi])^l}{l!}\,.
\label{correl2}
\end{eqnarray}
When
\begin{eqnarray}
N[\phi] \geq S[\phi]\,,
\label{NgS}
\end{eqnarray}
the interchanging of the summation and integration in (\ref{correl2})
leads to an absolutely convergent series
\begin{eqnarray}
\langle\phi_i \phi_j\rangle = \sum_{l = 0}^\infty \langle\phi_i \phi_j\rangle_l
\label{sum}
\end{eqnarray}
with terms given by
\begin{eqnarray}
\langle\phi_i \phi_j\rangle_l = \frac{\eta^l}{l!} \int\, [d\phi]\, \phi_i \phi_j\, \big(N[\phi] - S[\phi]\big)^l\,e^{-N[\phi]}\,.
\label{lf}
\end{eqnarray}
Indeed, it is easy to see, that
\begin{eqnarray}
\nonumber
\Big| \sum_{l = 0}^\infty \langle\phi_i \phi_j\rangle_l\Big| \leq \sum_{l = 0}^\infty |\langle\phi_i \phi_j\rangle_l|\, \leq
\sum_{l = 0}^\infty \frac{\eta^l}{l!} \int\, [d\phi]\, |\phi_i \phi_j|\,
\big(N[\phi] - S[\phi]\big)^l\,e^{-N[\phi]}\\
= \int\, [d\phi]\, |\phi_i \phi_j|\, e^{-S_\eta[\phi]} < \infty\,,~~\text{for}~~ \eta \leq 1\,.
\label{est10}
\end{eqnarray}
There are many possibilities to choose the new initial approximation $N[\phi]$, satisfying inequality~(\ref{NgS}),
however it should correspond to a solvable model.
Here we take
\begin{eqnarray}
N[\phi] = \sum_{n, m} \frac{1}{2} \phi_n K_{n m} \phi_m + \sigma \Big(\sum_{n, m} \frac{1}{2} \phi_n K_{n m} \phi_m\Big)^2\,,
\label{N}
\end{eqnarray}
where $\sigma$ is an unknown positive parameter, which is determined by the
substitution of (\ref{N}) into (\ref{NgS}):
\begin{eqnarray}
\sigma \geq \frac{\lambda}{6 M^4}\,.
\end{eqnarray}
The functions (\ref{lf}) can be calculated in the following way. Introducing an
auxiliary integration, we change $\lVert\phi\rVert \equiv \Big(\frac{1}{2} \phi_n K_{n m} \phi_m\Big)^{\frac{1}{2}}$
to the one-dimensional variable $t$
\begin{eqnarray}
\langle\phi_i \phi_j\rangle_l = \frac{\eta^l}{l!}
\int\, [d\phi]\,
\phi_i \phi_j\, \int_{0}^\infty dt\, e^{-t^2 - \sigma t^4}\,\delta(t - \lVert\phi\rVert)
\Big(\sigma t^4 - \frac{\lambda}{4!} \sum_n \phi_n^4 \Big)^l\,.
\label{t0}
\end{eqnarray}
Rescaling the field variables as $\phi_n^{old} = t \phi_n$, we get
\begin{eqnarray}
\langle\phi_i \phi_j\rangle_l = J_\eta(V, l) \int\, [d\phi]\, \phi_i \phi_j\,\delta(1 - \lVert\phi\rVert)
\Big(\sigma - \frac{\lambda}{4!} \sum_n \phi_n^4 \Big)^l\,,
\label{t1}
\end{eqnarray}
where
\begin{equation}
J_\eta(V, l) = \frac{\eta^l}{l!} \int_{0}^\infty dt\, e^{-t^2 - \sigma t^4} t^{V + 4l + 1}\,.
\end{equation}
The factor $t^{V + 4l - 1}$ in the integrand in $J_\eta(V, l)$ is obtained by rescaling of the fields measure, fields and
delta function.
Now the multi-dimensional (lattice) part of the integral is factorized from the auxiliary integration.
Applying the binomial expansion to the brackets $(...)^l$, we rewrite (\ref{t1}) as
\begin{eqnarray}
\langle\phi_i \phi_j\rangle_l = J_\eta(V, l)
\int\, [d\phi]\, \phi_i \phi_j\,\delta(1 - \lVert\phi\rVert)
\sum_{k = 0}^{l} C_l^k \sigma^{l - k} \Big(-\frac{\lambda}{4!} \sum_n \phi_n^4 \Big)^k\,.
\label{fle}
\end{eqnarray}
To solve (\ref{fle}), we use the following equality
\footnote{The r.h.s. of the identity (\ref{ident}) is obtained from the left one by the transformations analogous to (\ref{t0}, \ref{t1}).}
\begin{eqnarray}
\int\, [d\phi]\, \phi_{n_1}...\phi_{n_Q}\,e^{-\lVert\phi\rVert^2} =
\frac{1}{2}\Gamma\Big(\frac{V + Q}{2}\Big) \int\, [d\phi]\, \phi_{n_1}...\phi_{n_Q}\, \delta(1 - \lVert\phi\rVert) \,.
\label{ident}
\end{eqnarray}
By substituting (\ref{ident}) in (\ref{fle}), we obtain
\begin{eqnarray}
\langle\phi_i \phi_j\rangle_l = J_\eta(V, l)
\sum_{k = 0}^{l} C_l^k \sigma^{l - k} \frac{2}{\Gamma\Big(\frac{V + 4 k + 2}{2}\Big)}
\int\, [d\phi]\, \phi_i \phi_j\,
e^{-\lVert\phi\rVert^2}
\Big(-\frac{\lambda}{4!} \sum_n \phi_n^4 \Big)^k\,.
\label{main0}
\end{eqnarray}
Denoting the $k$-th order of the standard perturbation theory as $f_k$, we rewrite (\ref{main0}) as
\begin{eqnarray}
\langle\phi_i \phi_j\rangle_l = J_\eta(V, l)
\Bigg[\sum_{k = 0}^{l} C_l^k \sigma^{l - k} \frac{2\,k!\, f_k}{\Gamma\Big(\frac{V + 4 k + 2}{2}\Big)}\Bigg]\,.
\label{main}
\end{eqnarray}
Therefore, each certain order $l$ of the convergent series is expressed as a linear combination of first $l$
orders of SPT
with coefficients given by the one-dimensional analytically calculable $t$-depending integrals.
However, the latter fact does not mean that the convergent series looses non-perturbative contributions
from non-analytical functions such as $e^{-\frac{1}{\lambda}}$. Being an expansion with the non-Gaussian initial
approximation, it automatically takes non-perturbative contributions into account in a similar way,
as the function $e^{-\frac{1}{\lambda}}$ for positive $\lambda$ can be reproduced by its Taylor series around $\lambda = 1$.
The lattice $\phi^4$ is a Borel summable model, however, it is possible to generalize the results of the current section
to a wider class of models, which include Borel non-summable cases.
\begin{theorem}
Consider a model on the finite lattice, determined by the polynomial action $S[\phi] = P[\phi]$ with
an even $deg(P)$, then it is always possible to construct a convergent series for this model
with the terms which can be expressed as a linear combinations of terms of the standard perturbation theory.
\end{theorem}
The proof follows from the construction presented above and from the fact, that each polynomial
can be bounded as
\begin{equation}
|P[\phi]| \leq const \,(1 + \lVert\phi\rVert^{deg(P)})\,.
\end{equation}
Moreover, it is possible to show, that convergent series is a re-summation of the standard perturbation theory,
for details see Section \ref{impr}.
The latter proposition demonstrates, that the whole non-perturbative physics of the lattice models with the polynomial actions
can be encoded by the coefficients of the standard perturbation theory. However, it is important to note, that this
does not mean, that the non-perturbative information can be obtained only from the standard perturbative expansion.
An additional input, needed for the construction of the convergent series is received from the model itself.
In some sense it is similar to the resurgence program \cite{Dorigoni}, where for the recovering of the non-perturbative contributions
from the perturbative series, it is assumed that the solution is a resurgent function.
\section{Variational series}
\label{impr}
The previous studies of the convergent series application to the lattice $\phi^4$-model
\cite{IvanovProc} demonstrated a critical slow down of the convergence rate with the increasing of the lattice volume $V$
(see Section \ref{numer}).
However, this problem can be resolved by the following observation.
When $\eta = 1$, the explicit dependence on the lattice volume $V$ in the sum (\ref{sum}) of functions (\ref{main})
can be substituted by $\tau = V + \alpha$, {\it i.e.},
\begin{eqnarray}
\langle\phi_i \phi_j\rangle =
\sum_{l = 0}^\infty J_{\eta = 1}(\tau, l)
\Bigg[\sum_{k = 0}^{l} C_l^k \sigma^{l - k} \frac{2\, k!\, f_k}{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)}\Bigg]\,,~
\label{main2o}
\end{eqnarray}
where $\tau > -2$, not to generate singularities in the integrals $J_\eta(\tau, l)$.
The latter inequality is special for the propagator, for an arbitrary $n$-fields Green's function
it has to be substituted by $\tau > -n$.
Let us first consider only a perturbative proof of (\ref{main2o}) (the non-perturbative aspects are considered in the Section \ref{conv}).
It can be obtained by changing the order of summations in~(\ref{main2o})
\begin{eqnarray}
\langle\phi_i \phi_j\rangle \approx \sum_{k = 0}^\infty\sum_{l = 0}^\infty J_{\eta = 1}(\tau, l)
C_l^k \sigma^{l - k} \frac{2\, k!\, f_k}{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)}
\,,
\label{proof1}
\end{eqnarray}
where the sign '$\approx$' stands to indicate only perturbative equivalence between left and right parts of the expression.
The summands in the latter expression are equal to zero, when $l < k$. Changing the summation index to $y = l - k$,
we obtain
\begin{eqnarray}
\nonumber
\langle\phi_i \phi_j\rangle \approx \sum_{k = 0}^\infty \frac{2\,f_k\, \int_{0}^\infty dt\, t^{\tau + 4 k + 1} e^{-t^2 - \sigma t^4}
\sum_{y = 0}^\infty \frac{C_{(y+k)}^k\, k!\, \sigma^{y} t^{4y}}{(y + k)!}}
{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)} \\ \nonumber
= \sum_{k = 0}^\infty \frac{2\,f_k\, \int_{0}^\infty dt\, t^{\tau + 4 k + 1} e^{-t^2 - \sigma t^4}
\sum_{y = 0}^\infty
\frac{
\sigma^{y} t^{4y}}{y!
}
}{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)}
\\
= \sum_{k = 0}^\infty \frac{2\,f_k\, \int_{0}^\infty dt\, t^{\tau + 4 k + 1}
e^{-t^2}}{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)} = \sum_{k = 0}^\infty f_k\,.
\label{proof2}
\end{eqnarray}
We end up with the series of the standard perturbation theory.
There are two important consequences from this fact (the non-perturbative analogues of these statements are derived in the following sections).
\begin{itemize}
\item The whole sum of the series over $l$ in (\ref{main2o}) does not depend on $\tau$.
Therefore, $\tau$ is a variational parameter and can be taken arbitrary to optimize the convergence of the series.
\item According to (\ref{proof2}), the convergent series is a re-summation method. Thus,
for the computation of the connected Green's functions (including the normalized to the full partition sum propagator,
which is a subject of our numerical studies) one can use the fact, that in the standard perturbation theory
connected functions are obtained from the full Green's functions by throwing away disconnected Feynman diagrams from the expansions.
\end{itemize}
\section{Convergence of the variational series}
\label{conv}
In the last section we have introduced a variational parameter $\tau$, to improve the convergence
rate of CS (see Section \ref{numer}). However, the derivations of the Section \ref{constr}
are not applicable when $\tau \neq V$. The proof of the convergence of the series (\ref{sum}) is based on the positivity
of the brackets $(N[\phi] - S[\phi])^l$. When $\tau \neq V$, each summand of the binomial expansion of
$(N[\phi] - S[\phi])^l$ transforms differently under the change of $\tau$ and
the positivity of the brackets $(N[\phi] - S[\phi])^l$ can be lost. For instance, it is the case
for the one-site lattice $\phi^4$-integral at $\tau = 0$.
In Section \ref{impr} we have proved the perturbative independence on $\tau$ of the total sum of the series (\ref{main2o}).
One can not {\it a priori} exclude the possibility, that some non-analytical dependence on $\tau$ at $\eta = 1$, which gives zero contribution to the SPT series, still
persist in~(\ref{main2o}). The prescription for the evaluation of the connected Green's functions, suggested in the previous section, is based also
only on the standard perturbation theory arguments.
Here we study all these issues from the non-perturbative point of view.
For this we investigate the convergence properties of the variational expansions constructed for the lattice $\phi^4$
with two different regularizations. The first one is the $\eta$-regularization and it is achieved by considering $0 < \eta < 1$
in (\ref{split}). The second, $\gamma$-regularization, is defined in Section~\ref{gammaReg} by introducing
an additional term proportional to $\|\phi\|^6$ into the action (\ref{Sphi4}).
\subsection{Convergence of the variational series depending on $\eta$ and $\tau$}
\label{etaReg}
Let us study the convergence of the series for the full propagator, obtained from (\ref{main2o}), extending it to $\eta \leq 1$
\begin{eqnarray}
\langle\phi_i \phi_j\rangle =
\sum_{l = 0}^\infty J_{\eta}(\tau, l)
\Bigg[\sum_{k = 0}^{l} C_l^k \sigma^{l - k} \frac{2\, k!\, f_k}{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)}\Bigg]\,.
\label{main2}
\end{eqnarray}
The asymptotic of large orders of the perturbation theory
in quantum field theories and lattice models for the connected and full correlation functions
have similar form \cite{Lipatov, Spencer, ParisiScQED}
\begin{equation}
f_k\, \sim\, (-1)^k\, \sqrt{2\pi}\, e\, \Big(\frac{a}{e}\Big)^k\, k^{k +b_0 + 1/2}\,,
\label{asymp2}
\end{equation}
where $a, b_0 \in \mathbb{R}$ are some constants and $e$ is the Euler's number.
The upper bound for the series
(\ref{main2}) can be obtained as
\begin{eqnarray}
\nonumber
|\langle\phi_i \phi_j\rangle|
\leq
\sum_{l = 0}^\infty \big|J_\eta(\tau, l)\big|
\Big[\sum_{k = 0}^{l} C_l^k \sigma^{l - k} \frac{2\, k!\, |f_k|}{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)}\Big] \\
= \sum_{k = 0}^\infty \frac{2 \int_{0}^\infty dt\, t^{\tau + 4 k + 1} e^{-t^2 - \sigma (1 - |\eta|) t^4}}{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)}
|f_k| |\eta|^k
\,.~~~~
\label{main3}
\end{eqnarray}
The coefficients in front of $|f_k|$ in (\ref{main3}) at large $k$ behave as
\begin{equation}
2^{1/2 - 2\beta} \sigma_\eta^{-\beta} k^{-k} \Big(\frac{e |\eta|}{4 \sigma_\eta}\Big)^k\,,
\label{asymp3}
\end{equation}
where $\beta = (\tau + 2) / 4$ and $\sigma_\eta = \sigma (1 - |\eta|)$.
Consequently, the bound (\ref{main3}) is convergent, when
$|\eta| < \eta_* = \frac{4 \sigma}{|a| + 4\sigma}$, independently on the value of $\tau$.
When $\tau = V$, the series (\ref{main2}) converges for $\eta \leq 1$ due to the estimate (\ref{est10}).
The bound
(\ref{main3}) has finite radius of the convergence in terms of $\eta$ for any $\tau > -2$,
including, for instance $\tau = 0$.
In Fig. \ref{epsalph} we show the area of the parameters $\tau$ and $\eta$ for which the convergence
of the series (\ref{main2}) is guaranteed by (\ref{main3}) and~(\ref{est10}).
\begin{figure}[H]
\begin{center}
\includegraphics[width=0.5\linewidth, angle = 0]{epsilon_alpha.pdf}
\caption{The convergence of the series (\ref{main2}) in the band from $-\eta_*$ to $\eta_*$ is provided by the bound~(\ref{main3}).
The convergence at $\tau = V$ and $\eta \leq 1$ follows from the estimate (\ref{est10}).}
\label{epsalph}
\end{center}
\end{figure}
The convergence of the series (\ref{main2}) is better
than the convergence of (\ref{main3}), because of the cancellations in the internal sums over $k$ in (\ref{main2}).
Therefore, it might be, that the series (\ref{main2}) is convergent for $\tau > -2$ and $\eta = 1$.
To support such possibility, let us consider an example of the series with an asymptotic of the type (\ref{asymp2})
\begin{equation}
h_k = (-1)^k \frac{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)}{2 \Gamma(k + 1)} u^k\,,~~~u > 0\,.
\label{hk}
\end{equation}
At $\eta = 1$ the substitution of these coefficients into the expansion (\ref{main3}) produces a divergent series.
In opposite, the expansion (\ref{main2}) in this case can be bounded by
\begin{eqnarray}
\int_{0}^\infty dt\, t^{\tau + 1} e^{-t^2 - \sigma t^4 + |\sigma - u|t^4} < \infty\,.
\label{main4}
\end{eqnarray}
Therefore, the series (\ref{hk}), re-summed in accordance to (\ref{main2}), is convergent.
\subsection{$\gamma$-Regularization}
\label{gammaReg}
The $\eta$-regularization enforce an additional decay of the lattice Boltzmann weight for the large fluctuations
of the fields $\phi_n$. This results in the dumping of the coefficients of the standard perturbation theory
and in the consequent convergence of the series (\ref{main2}) for $|\eta| < \eta_*$.
However, the additional decay is not sufficiently sharp to provide convergence for $\eta_* \leq \eta < 1$,
which is desired, since $\eta = 1$ corresponds to the original theory.
Here we introduce alternative regularization, giving sharper vanishing of the large fluctuations of fields.
We consider the regularized lattice $\phi^4$-model, defined by the action
\begin{equation}
S_\gamma[\phi] = S[\phi] + \gamma \lVert\phi\rVert^6\,.
\label{vS}
\end{equation}
When $\gamma = 0$ the action $S_\gamma$ coincides with the action of the $\phi^4$-model (\ref{Sphi4}).
For the model defined by (\ref{vS}) one can construct two related expansions.
As always, we demonstrate them on the example of the propagator.
The first one is similar to the standard perturbation theory
and is obtained by expanding the interaction part of the original $\phi^4$-model
into the Taylor series
\begin{equation}
\langle\phi_i \phi_j\rangle_\gamma = \sum_k \int [d\phi]\, \phi_i\phi_j e^{-\lVert\phi\rVert^2 - \gamma\lVert\phi\rVert^6}
\frac{\big(-\frac{\lambda}{4!}\sum_n \phi_n^4\big)^k}{k!}\,.
\label{gammaS}
\end{equation}
Rewriting (\ref{gammaS}) in terms of Gaussian integrals analogously to Section \ref{constr} and
introducing the dependence on $\tau$, we get
\begin{eqnarray}
\langle\phi_i \phi_j\rangle_\gamma
= \sum_{k = 0}^\infty \frac{2 \int_{0}^\infty dt\, t^{\tau + 4 k + 1} e^{-t^2 - \gamma t^6}}{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)}
f_k
\,.
\label{gammaS2}
\end{eqnarray}
The second expansion is the variational series similar to (\ref{main2}).
To derive it, we split the action as
\begin{equation}
S_\gamma[\phi] = (N[\phi] + \gamma \lVert\phi\rVert^6) + (S[\phi] - N[\phi])\,,
\end{equation}
where $(N[\phi] + \gamma \lVert\phi\rVert^6)$ is treated as the initial approximation.
Then, analogous to previous derivations, we have
\begin{eqnarray}
\langle\phi_i \phi_j\rangle_\gamma =
\sum_{l = 0}^\infty J_\gamma(\tau, l)
\Bigg[\sum_{k = 0}^{l} C_l^k \sigma^{l - k} \frac{2\, k!\, f_k}{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)}\Bigg]\,,~
\label{vmain}
\end{eqnarray}
where
\begin{eqnarray}
J_\gamma(\tau, l) = \frac{1}{l!} \int_{0}^\infty dt\, e^{-t^2 - \sigma t^4 - \gamma t^6} t^{\tau + 4l - 1}\,.
\end{eqnarray}
The series (\ref{gammaS2}) can be obtained from the series (\ref{vmain})
by changing the order of summations. Consequently, if both of these series
converge absolutely, they converge to the same sum.
The series (\ref{gammaS2}) and (\ref{vmain}) can be bounded by
\begin{eqnarray}
\nonumber
|\langle\phi_i \phi_j\rangle_\gamma|
\leq
\sum_{l = 0}^\infty \big|J_\gamma(\tau, l)\big|
\Big[\sum_{k = 0}^{l} C_l^k \sigma^{l - k} \frac{2\, k!\, |f_k|}{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)}\Big] \\
= \sum_{k = 0}^\infty \frac{2 \int_{0}^\infty dt\, t^{\tau + 4 k + 1} e^{-t^2 - \gamma t^6}}{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)}
|f_k|
\,.~~~~
\label{vbound}
\end{eqnarray}
At large $k$ the coefficients in front $|f_k|$ in the leading order are determined
by
\begin{equation}
3 (2\sqrt{3})^{-1-4\beta/3} \gamma^{-2\beta/3} k^{-4\beta/3} (12 e^2 \gamma)^{-2 k/3} k^{-4 k/3}
\label{vasymp}
\end{equation}
with $\beta = (\tau + 2) / 4$.
The bound (\ref{vbound}) converges for any $\tau > -2$, when $\gamma > 0$.
In Fig. \ref{gamalph} we present the area of parameters
$\gamma$ and $\tau$ for which the series (\ref{gammaS2}) and (\ref{vmain}) are convergent.
\begin{figure}[H]
\begin{center}
\includegraphics[width=0.5\linewidth, angle = 0]{gamma_alpha.pdf}
\caption{In the marked area the convergence of both series (\ref{gammaS2}) and (\ref{vmain}) is obtained due to the non-zero $\gamma$.
At $\gamma = 0$ and $\tau = V$, as it follows from the estimate (\ref{est10}), only the series (\ref{vmain}) is convergent.}
\label{gamalph}
\end{center}
\end{figure}
Similar to the $\eta$-regularization case the convergence of (\ref{vmain})
is better than of the series (\ref{gammaS2}) and bound (\ref{vbound}).
\subsection{Non-perturbative independence on $\tau$ and continuity of the $\gamma$-regularization}
\label{NPInd}
Here we show, that for any $\tau > -2$, there are such $\gamma_* \in \mathbb{R}_+$ and $K_* \in \mathbb{N}$, that
for each $0 < \gamma < \gamma_*$, it is possible to construct convergent series
(\ref{gammaS2}), which approximates the propagator of the lattice $\phi^4$-model
with an arbitrary precision $\delta > 0$:
\begin{equation}
\Big|
\sum_{k = 0}^{K_*} \frac{2 \int_{0}^\infty dt\, t^{\tau + 4 k + 1} e^{-t^2 - \gamma t^6}}{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)}
f_k
- \langle\phi_i \phi_j\rangle
\Big| < \delta\,.
\label{delta}
\end{equation}
The proof of (\ref{delta}) contains the demonstration of the fact, that in the limit $\gamma \rightarrow 0$ the sum of the
series (\ref{gammaS2}) is independent on $\tau$ non-perturbatively, {\it i.e.}, including all possible non-analytical
contributions.
Since for $\gamma > 0$ the series (\ref{gammaS2}) is absolutely convergent one can interchange in it the summation
and integration (the SPT-coefficients $f_k$ are integrals), this gives
\begin{equation}
\langle\phi_i \phi_j\rangle_\gamma = \int [d\phi]\, \phi_i\phi_j e^{-\lVert\phi\rVert^2} \sum_{k = 0}^\infty h_k(\phi_n, \gamma, \tau)\,,
\label{gammaSD}
\end{equation}
where
\begin{equation}
h_k(\phi_n, \gamma, \tau) = \frac{\big(-\frac{\lambda}{4!}\sum_n \phi_n^4\big)^k}{k!} \frac{2 \int_{0}^\infty dt\, t^{\tau + 4 k + 1} e^{-t^2 - \gamma t^6}}{\Gamma\Big(\frac{\tau + 4 k + 2}{2}\Big)} \,.
\label{gammaSD2}
\end{equation}
The series $\sum_{k = 0}^\infty h_k(\phi_n, \gamma, \tau)$ converges faster than the series for the exponent and, consequently, is uniformly
convergent for each compact subset of the region of parameters $\bar{\cal A} = \{\phi_n \in \mathbb{R}, \gamma \geq 0, \tau > -2\}$.
In region $\bar{\cal A}$ the functions $h_k(\phi_n, \gamma, \tau)$ are continuous in all parameters, therefore the sum of them is also
continuous. At $\gamma = 0$ each function $h_k(\phi_n, \gamma, \tau)$ is independent on $\tau$ and the propagator (\ref{gammaSD}) coincides
with $\langle\phi_i \phi_j\rangle$, defined by~(\ref{correl}). Hence, (\ref{gammaSD}) is finite at $\gamma = 0$.
The finiteness of (\ref{gammaSD}) for $\gamma > 0$, $\tau > -2$ follows from the convergence of the series
(\ref{gammaS2}). Then, because $\sum_{k = 0}^\infty h_k(\phi_n, \gamma, \tau)$ is continuous in $\bar{\cal A}$
and (\ref{gammaSD}) is finite for $\gamma \geq 0$, $\tau > -2$, it follows, that for any $\widetilde\delta > 0$
there is such $\widetilde\gamma$, that
for each $0 < \gamma < \widetilde\gamma$
\begin{equation}
\Big|
\langle\phi_i \phi_j\rangle_{\gamma} - \langle\phi_i \phi_j\rangle
\Big| < \widetilde\delta\,.
\label{delta2}
\end{equation}
From the latter inequality and from the convergence of the series (\ref{gammaSD}) we obtain (\ref{delta}).
As it was discussed above the series (\ref{gammaS2}) and (\ref{vmain}) converge to the same quantities, therefore,
all stated here is valid also for (\ref{vmain}).
\subsection{Evaluation of the connected Green's functions}
\label{NPConnect}
In previous parts of the paper we predominantly discussed constructions
of the convergent series for the full Green's functions on the example of the propagator.
The generating functional of the full functions is the partition function $Z[A]$, which is a functional of the external
field $A$. However, the thermodynamical quantities are naturally expressed in terms of the connected
Green's functions, given by derivatives of the $\log(Z[A])$ with respect to the external field $A$.
Within the framework of the standard perturbation theory it is shown, that connected functions are obtained
from the full functions by throwing away all disconnected diagrams of the perturbative expansion,
see, for instance, \cite{Vasilev}. As it is known from the theory of the combinatorial species
\cite{Leroux} this relation is much more general. If the weights of a generating function
for a combinatorial weighted species factorize among the connected components of the species,
then the logarithm of that function is given by the sum over the connected associated species.
In the convergent series (\ref{gammaS2}) as in the standard perturbation theory
the disconnected diagrams are the products of the connected ones, consequently,
for the computation of the connected functions using the convergent series one has
to substitute the contributions $f_k$ of all diagrams in each order of SPT by the contributions
only from connected diagrams $\widetilde f_k$. The resulting series is convergent, since the asymptotic of the high orders
of the standard perturbation theory has similar form (\ref{asymp2}) for both full and connected Green's functions.
Let us change $f_k$ by $\widetilde f_k$ in (\ref{vmain}).
Analogously to the relation between (\ref{gammaS2}) and (\ref{vmain}), the interchange of the summations in
the series (\ref{vmain}) with $\widetilde f_k$ gives the series (\ref{gammaS2}) with $f_k$, changed by $\widetilde f_k$.
Therefore, the series (\ref{vmain}) with $\widetilde f_k$ instead of $f_k$ is also convergent.
\section{Computations and numerical results}
\label{numer}
Here we present the results of the $\langle\phi_n^2\rangle$ operator computations
within the convergent and variational series and compare them with the Borel re-summation and Monte Carlo simulations.
We show the numerical dependences on the variational and regularization parameters $\tau$ and $\gamma$.
The propagator between all lattice cites $\langle\phi_i\phi_j\rangle$ is computed, but we present only the part of the resulting data
representing $\langle\phi_n^2\rangle$, for greater clarity.
All calculations are performed at unit mass $M = 1$ and for the coupling constants $\lambda$ in the region $[0, 10]$.
The computations within the convergent/variational series methods contain two main steps.
The first one is the evaluation of the coefficients of the standard perturbation theory for the propagator $\langle\phi_i\phi_j\rangle$.
For this the connected diagrams of the $\phi^4$-theory are generated using the system 'GRACE' \cite{GRACE}.
The free propagator in diagrams is obtained by the numerical inversion of the $K_{mn}$ matrix (\ref{Kmn}).
The best current results within the $\epsilon$-expansion in the continuum $\phi^4$-theory are obtained in the $6$-loops approximation \cite{Kompaniets}.
We also compute $6$ orders of the lattice SPT,
since it is reasonable to test the efficiency of the convergent series within the same order of the perturbation theory.
The second step of the calculations using the CS/VS methods is the re-summation of
the perturbative results in accordance to the formulas (\ref{sum}), (\ref{main}), (\ref{main2}), (\ref{vmain}).
To perform the Borel re-summation procedure, we use the conformal
mapping for the analytical continuation in the Borel plane.
The conformal mapping can be done if the parameter $a$ from the asymptotic of the high orders of the perturbation
theory (\ref{asymp2}) is known.
We estimate $a$ using the values presented in \cite{Zinn}
for the continuous one and two-dimensional $\phi^4$-model
\begin{eqnarray}
d = 1 \, , \text{ }~ a = 1 / 8,
\end{eqnarray}
\begin{eqnarray}
d = 2 \, , \text{ }~ a = 1 / 35.102\dots\,\,.
\label{ad2}
\end{eqnarray}
The results obtained on the lattice with $V = 4$ sites are the following.
In Figs. $\ref{N4l01}$ and $\ref{N4l10}$ we present the operator
$\langle \phi_n^2 \rangle$ computed with CS and other methods depending on the number of known orders of the
perturbation theory (from $0$ to $6$ loops) at coupling constants $\lambda = 0.1$ and $\lambda = 10$ respectively.
At small value of the coupling constant $\lambda = 0.1$ one observes an agreement between all methods including the standard perturbation theory.
When $\lambda = 10$, the result is qualitatively different. The convergent series is out of the Monte Carlo error bars, but
the Borel re-summation method is in the agreement with the Monte Carlo data.
The values of the standard perturbation theory series are omitted because of the strong divergence.
In Figs. $\ref{N4N0l01}$ and $\ref{N4N0l10}$ we show the results obtained with the variational
series and other methods at coupling constants $\lambda = 0.1$ and $\lambda = 10$ respectively.
The variational series exhibits remarkable agreement with the Monte Carlo data and converges
even faster than the Borel re-summation.
In Figs. $\ref{N4l0-10}$ and $\ref{N4N0l0-10}$ we demonstrate the dependence of $\langle \phi_n^2 \rangle$
on the coupling constant $\lambda$ for different methods with $V = 4$. The computations carried according to
VS agree with the Monte Carlo results with the precision of the one standard deviation.
The results obtained on the one-dimensional lattice with $V = 64$ are qualitatively similar.
In Fig. $\ref{N64l0-10}$
we show the computations performed with the convergent series method in comparison with other methods.
Even at small coupling constants the convergent series does not agree with the Monte Carlo.
The Borel re-summation is in agreement with the Monte Carlo data in the whole region $\lambda \in [0, 10]$.
However, the results obtained within VS are significantly different from the
results of the simple convergent series. Corresponding computations are presented in Fig.
$\ref{N64N0l0-10}$. The variational series matches the Monte Carlo data with the precision of
the one standard deviation again!
\begin{figure}[H]
\begin{center}
\begin{tabular}{@{}ccc@{}}
\begin{minipage}[h]{0.5\linewidth}
\includegraphics[width=\linewidth, angle = 0]{N4l01.pdf}
\caption{Dependence of $\langle \phi_n^2 \rangle$ on the order of the perturbation theory for the lattice volume $V = 4$ at $\lambda = 0.1$.}
\label{N4l01}
\end{minipage}
~~~~&
\begin{minipage}[h]{0.5\linewidth}
\includegraphics[width=\linewidth, angle = 0]{N04l01.pdf}
\caption{Dependence of $\langle \phi_n^2 \rangle$ on the order of the perturbation theory for the lattice volume $V = 4$, $\tau = 0$ at $\lambda = 0.1$.}
\label{N4N0l01}
\end{minipage}
\end{tabular}
\end{center}
\end{figure}
\begin{figure}[H]
\begin{center}
\begin{tabular}{@{}ccc@{}}
\begin{minipage}[h]{0.5\linewidth}
\includegraphics[width=\linewidth, angle = 0]{N4l10.pdf}
\caption{Dependence of $\langle \phi_n^2 \rangle$ on the order of the perturbation theory for the lattice volume $V = 4$ at $\lambda = 10$.}
\label{N4l10}
\end{minipage}
~~~~&
\begin{minipage}[h]{0.5\linewidth}
\includegraphics[width=\linewidth, angle = 0]{N04l10.pdf}
\caption{Dependence of $\langle \phi_n^2 \rangle$ on the order of the perturbation theory for the lattice volume $V = 4$, $\tau = 0$ at $\lambda = 10$.}
\label{N4N0l10}
\end{minipage}
\end{tabular}
\end{center}
\end{figure}
\begin{figure}[H]
\begin{center}
\begin{tabular}{@{}ccc@{}}
\begin{minipage}[h]{0.5\linewidth}
\includegraphics[width=\linewidth, angle = 0]{N4l0-10.pdf}
\caption{Dependence of the operator $\langle \phi_n^2 \rangle$ on coupling constant for the lattice volume $V = 4$.}
\label{N4l0-10}
\end{minipage}
~~~~&
\begin{minipage}[h]{0.5\linewidth}
\includegraphics[width=\linewidth, angle = 0]{N04l0-10.pdf}
\caption{Dependence of the operator $\langle \phi_n^2 \rangle$ on coupling constant for the lattice volume $V = 4$, $\tau = 0$.}
\label{N4N0l0-10}
\end{minipage}
\end{tabular}
\end{center}
\end{figure}
\begin{figure}[H]
\begin{center}
\begin{tabular}{@{}ccc@{}}
\begin{minipage}[h]{0.5\linewidth}
\includegraphics[width=\linewidth, angle = 0]{N64l0-10.pdf}
\caption{Dependence of the operator $\langle \phi_n^2 \rangle$ on coupling constant for the lattice volume $V = 64$.}
\label{N64l0-10}
\end{minipage}
~~~~&
\begin{minipage}[h]{0.5\linewidth}
\includegraphics[width=\linewidth, angle = 0]{N064l0-10.pdf}
\caption{Dependence of the operator $\langle \phi_n^2 \rangle$ on coupling constant for the lattice volume $V = 64$, $\tau = 0$.}
\label{N64N0l0-10}
\end{minipage}
\end{tabular}
\end{center}
\end{figure}
In Fig. $\ref{N8x8N0l0-10}$ we present the dependence of $\langle \phi_n^2 \rangle$ on $\lambda$
for the two-dimensional lattice with $V = 8 \times 8$, calculated with the VS method, $\tau = 0$.
The VS method gives the results which are close to the Monte Carlo simulations. The strong deviation
of the Borel re-summation can be caused by the not precise estimate of the parameter $a$ in the asymptotic
of the high orders of the perturbation theory (\ref{ad2}).
\begin{figure}[H]
\noindent\centering{\includegraphics[width=0.55\linewidth, angle = 0]{N08x8l0-10.pdf}}
\caption{Dependence of the operator $\langle \phi_n^2 \rangle$ on coupling constant in the two-dimensional case $V = 8\times 8$, $\tau = 0$.}
\label{N8x8N0l0-10}
\end{figure}
In Section \ref{NPInd} we have proved the continuity of the series (\ref{vmain}) with respect
to the parameter $\gamma \geq 0$, in Fig. \ref{N0l1gamma} we demonstrate it for $\lambda = 1$.
\begin{figure}[H]
\noindent\centering{\includegraphics[width=0.55\linewidth, angle = 0]{N0l1gamma.pdf}}
\caption{Dependence of the operator $\langle \phi_n^2 \rangle$, computed by the variational series,
on the regularization parameter $\gamma$, $\lambda = 1$, $V = 64$, $\tau = 0$.}
\label{N0l1gamma}
\end{figure}
In the limit $\gamma \rightarrow 0$ the dependence on $\tau$ of the sum (\ref{vmain})
has to disappear. In the real calculations one always has only a finite amount
of terms of (\ref{vmain}). In Figs. \ref{NXl1} and \ref{NXl5} we present the dependence
on $\tau$ of the $6$-th order approximation of the variational series (\ref{main2}) for the
coupling constants $\lambda = 1$ and $\lambda = 5$ respectively. The optimal values of the parameter $\tau$,
giving the matching with the Monte Carlo mean value,
are $\tau_{\lambda = 1} \simeq -0.1$,
$\tau_{\lambda = 5} \simeq \{-1.62; -0.38\}$. Without comparison with the Monte Carlo simulations one can apply
the principle of the smallest contribution of the last term of the series, it
gives uniform optimal $\tau_\lambda \simeq -0.086$. In the main part of our computations we use $\tau = 0$,
what corresponds in the continuum limit to the utilization of the dimensional regularization \cite{Leibbrandt}.
\begin{figure}[H]
\begin{center}
\begin{tabular}{@{}ccc@{}}
\begin{minipage}[h]{0.5\linewidth}
\includegraphics[width=\linewidth, angle = 0]{NXl1.pdf}
\caption{Dependence of the operator $\langle \phi_n^2 \rangle$ on the variational parameter $\tau$, $\lambda = 1$ for the lattice volume $V = 64$.}
\label{NXl1}
\end{minipage}
~~~~&
\begin{minipage}[h]{0.5\linewidth}
\includegraphics[width=\linewidth, angle = 0]{NXl5.pdf}
\caption{Dependence of the operator $\langle \phi_n^2 \rangle$ on the variational parameter $\tau$, $\lambda = 5$ for the lattice volume $V = 64$.}
\label{NXl5}
\end{minipage}
\end{tabular}
\end{center}
\end{figure}
\section{Conclusions}
\label{concl}
We have presented the construction of the convergent series for the lattice models with the even degree
polynomial interaction and investigated it in details on the example of the lattice $\phi^4$-model.
We have proved, that CS is a re-summation method. The latter fact supports the resurgence idea, that the
non-perturbative physics can be expressed via the coefficients of the standard perturbation theory.
The initial approximation
of the convergent series is a non-Gaussian interacting non-local model, hence, CS automatically
takes into account such non-analytical contributions as $e^{-\frac{1}{\lambda}}$.
We have observed an internal symmetry of the CS method and, using it, developed the variational
series.
The numerical values of the operator $\langle \phi_n^2 \rangle$ calculated using the CS and VS methods
with $6$ orders of the standard perturbation theory
were compared with the Borel re-summation and Monte Carlo method.
The comparison revealed, that for the small lattices and for the small coupling constants
the convergent series exhibits the agreement with the Monte Carlo and Borel re-summation, but deviates
from them for larger lattice volumes and/or for larger coupling constants.
The variational series method, applied to the one- and two-dimensional cases, agrees
with other methods for the wide range of the lattice
volumes and coupling constants and converges even faster to the Monte Carlo results than the Borel re-summation.
To study the convergence and correctness of the variational series from the analytical point of view,
we have considered two regularizations of the lattice $\phi^4$-model. In both cases we have constructed for the variational series
the upper bounds with finite radii of convergence in terms of the regularization parameters.
For the $\gamma$-regularization the border of the convergence region approaches $\gamma = 0$, which corresponds to the
non-regularized model.
We also have shown, that original model can be approximated by the
the $\gamma$-regularization with any arbitrary precision and
it is always possible to construct two related convergent expansions for this regularization.
One of them is precisely the variational series, derived for the regularized model.
The convergence properties of VS, depending on the regularization parameters are summarized in Figs. \ref{epsalph}
and \ref{gamalph}. Using this information and the fact, that the convergence of the series (\ref{vmain}) and (\ref{main2}) should be better,
than the convergence of their bounds, we conjecture, that the series (\ref{main2}) is convergent
for any $\tau > -2$.
The convergence of (\ref{main2}) independently on the values of $\tau$ and the independence on $\tau$ of its sum at $\gamma \rightarrow 0$ allows
to consider any finite $\tau > -2$ even for very large (infinite) volumes $V$. The diagrams of the standard perturbation theory
can be easily computed at infinite volume. This provides a way for taking the infinite volume limit within the CS/VS methods.
The VS computations at $\tau = 0$ work equally well for the lattice volumes more than $10$ times different, see Fig. \ref{N4N0l0-10}
and \ref{N64N0l0-10}, it gives a numerical evidence of the possibility to perform the infinite volume limit.
It is important to note, that the applicability of the convergent/variational series is not based on any
criteria of the kind of the Borel summability of the original perturbation theory.
The presented construction can be generalized to the fermionic lattice models by employing bosonization.
For instance, an application of the method \cite{Belokurov1, Belokurov2, Belokurov3, BelSolSha97, BelSolSha99}
to the bosonized fermionic model, a model of lattice QED, was proposed in \cite{Sazonov2014}.
The problem of the bosonizations of the complex actions has been recently solved in \cite{nonHBos}.
Therefore, the convergent series, which is based only on the perturbative computations, can provide a way for the
bypassing the sign problem in bosonic and fermionic models.
{\bf Acknowledgements}
We acknowledge Vladimir V. Belokurov, Eugeny T. Shavgulidze, Vincent Rivasseau,
Vladimir Yu. Lotoreychik for the discussions and Nikolay M. Gulitskiy for reading
the manuscript.
The work of A.S. Ivanov was supported by the Russian Science
Foundation grant 14-22-00161. V.K. Sazonov acknowledges the Austrian Science
Fund FWF, Grant. Nr. I 1452-N27.
\label{Bibliography}
\bibliographystyle{unsrt}
|
\section{Introduction}
We study the problem of predicting the results of computations that are too large to evaluate, given observation of the results of running many smaller computations. For example, we might have a physics simulator and want to predict the final location of a ball in a large environment, after observing many simulated runs of small environments.
When predicting the outputs of computations so large that they cannot be evaluated, generating training data requires a bit of creativity. Intuitively, one potential solution is this: Given enough computing resources to evaluate ``medium-sized" computations, we could train a learner by showing it many runs of small computations, and having it learn to predict the medium-sized ones, in a way that generalizes well. Then we could feed it runs of many medium-sized computations and have it predict large ones. This is an online learning problem, where the learner observes the results of more and more expensive computations, and predicts the behavior of computations that are much more difficult to evaluate than anything it has observed so far.
The standard online learning setting, in which the learner predicts an outcome in a sequence after observing all previous outcomes, does not capture this problem, because delays between prediction and observation are the key feature. \citet{Dudik:2011}, \citet{Joulani:2013}, and others have studied online learning with delayed feedback, but they assume that delays are bounded, whereas in our setting the delays necessarily grow ever-larger. In this paper, we propose an algorithm \EvOp for online learning with unbounded delays. \EvOp not a practical algorithm; it is only a first step towards modeling the problem of predicting large computations as an online learning problem.
Predicting a sequence generated by arbitrary computations is intractable in general. Consider, for instance, the bitstring that tells which Turing machines halt. However, the problem is not hopeless, either: Consider the bitstring where the $n$th digit is a 1 if and only if the $10^n$th digit in the decimal expansion of $\pi$ is a 7. This is an online learning problem with ever-growing delays where a learner should be able to perform quite well. A learner that attempts to predict the behavior of computations in full generality will encounter some subsequences that it cannot predict, but it will encounter others that are highly regular, and it should be able to identify those and predict them well.
Consider, for instance, the bitstring that interleaves information about which Turing machines halt with the $10^n$th digits of $\pi$. Intuitively, a good predictor should identify the second subsequence, and assign extreme probabilities whenever it has the computing resources to compute the digit, and roughly 10\% probability otherwise, in lieu of other information about the digit. However, it's not clear how to formalize this intuition: What does it mean for a forecaster to have no relevant information about a digit of $\pi$ that it knows how to compute? What are the ``correct" probabilities a bounded reasoner should assign to deterministic facts that it lacks the resources to compute?
In this paper, we sidestep those questions, by analyzing the problem in a stochastic setting. This lets us study the problem of picking out patterns in subsequences in the face of unbounded delays, in a setting where the ``correct" probabilities that a predictor should be assigning are well-defined. In \Sec{deterministic} we relate our findings back to the deterministic setting, making use of ``algorithmic randomness" as described by, e.g., \citet{Downey:2010}.
We propose an algorithm \EvOp with the property that, on any subsequence for which an expert that it consults predicts the true probabilities, it converges to optimal behavior on that subsequence. We show that regret and average regret are poor measures of performance in this setting, by demonstrating that in environments with unbounded delays between prediction and feedback, optimal predictors can fail to have average regret going to zero. \EvOp works around these difficulties by comparing forecasters on sparse subsequences of their predictions; this means that, while we can put bounds on how long it takes \EvOp to converge, the bounds are very, very weak. Furthermore, \EvOp is only guaranteed to converge to good behavior on subsequences when it has access to optimal experts; we leave it to future work to give a variant that can match the behavior of the best available expert even if it is non-optimal.
In \Sec{setup} we define the problem of online learning with unbounded delays. In \Sec{problem} we show that consistency is impossible and discuss other difficulties. In \Sec{solution} we define \EvOp, prove that it converges to Bayes-optimal behavior on any subsequence for which some expert makes Bayes-optimal predictions, and provide very weak bounds on how long convergence takes. In \Sec{deterministic} we relate these results back to the deterministic setting. \Sec{conclusions} concludes.
\subsection{Related Work}
An early example of online sequence learning using expert advice is \citet{Littlestone:1994}; much work has been done since then to understand how to perform well relative to a given set of forecasters~\citep{Vovk:1990,Cesa:1998,Haussler:1995}. \citet{Rakhlin:2012}~improve performance of online learning algorithms assuming some structure in the environment, while maintaining worst-case guarantees. \citet{Gofer:2013}~study the case with a potentially unbounded number of experts.
Most work in online learning has focused on the case where feedback is immediate. \citet{Piccolboni:2001}~study online prediction with less rigid feedback schemes, proving only weak performance bounds. \citet{Weinberger:2002}~show that running experts on sub-sampled sequences can give better bounds, for the case with bounded feedback delay. In the widely studied bandit setting~\citep{Auer:2002}, some attention has been given to learning with bounded delays~\citep{Neu:2010,Dudik:2011}. There have been some attempts to work with unbounded feedback delays \citep{Mesterharm:2005,Mesterharm:2007,Desautels:2014}, with either strong assumptions on the target function or with weak performance bounds. \citet{Quanrud:2015} achieve reasonable regret bounds in an adversarial setting; our work achieves asymptotic convergence in a stochastic setting. A review, and a very general framework for online learning with arbitrary (but bounded) feedback delay is given by \citet{Joulani:2013}.
Online learning with delayed feedback has applications in domains such as webpage prefetching, since the prediction algorithm has to make some prefetching decisions before learning whether a previously fetched page ended up being requested by the user \citep{Padmanabhan:1996}. The idea of learning from computations with delay has seen some use in parallel computation, e.g., distributed stochastic optimization where computations of gradients may take longer in some nodes \citep{Zinkevich:2009,Agarwal:2011}.
Outside the field of online learning, our work has interesting parallels in the field of mathematical logic. \citet{Hutter:2013} and \citet{Demski:2012a} study the problem of assigning probabilities to sentences in logic while respecting certain relationships between them, a practice that dates back to \citet{Gaifman:1964}. Because sentences in mathematical logic are expressive enough to make claims about the behavior of computations (such as ``this computation will use less memory than that one"), their work can be seen as a different approach to the problems we discuss in this paper.
\section{The Unbounded Delay Model} \label{sec:setup}
Let \ensuremath{\mathcal X}\xspace be a set of possible outcomes and \ensuremath{\mathcal Y}\xspace be a set of possible predictions, where \ensuremath{\mathcal Y}\xspace is a convex subset of $\RR^n$ for some $n$. Let $\ensuremath{\mathcal L}\xspace : \ensuremath{\mathcal X}\xspace \times \ensuremath{\mathcal Y}\xspace \to \RR$ be a loss function measuring the difference between them, which is strongly convex (with strong convexity constant $\rho$) and Lipschitz (with Lipschitz constant $\kappa$). Roughly speaking, the environment will stochastically produce an infinite sequence of outcomes~\x[i], and an infinite sequence of observations~\obs[i], where each~\obs[i] contains information about finitely many~\x[n]. Formally, for each $i = 1, 2, \ldots,$ let $\obs[i] : \NN \to \ensuremath{\mathcal X}\xspace$ be a finite-domain partial function from indices to outcomes; in other words, $\obs[i]$ is a set of $(n, \x[])$ ``feedback" pairs such that each $n$ appears in at most one pair. We write $\obs[i](n)$ for the value of $x$ associated with $n$, which is feedback about the outcome $\x[n]$, and which may be undefined. If $\obs[i](n)$ is defined, we say that $\obs[i]$ reveals $\x[n]$.
Formally, we write $\Xv[i]$ for the random variable representing the $i$th output and $\Ov[i]$ for the random variable representing the $i$th observation. We define the \emph{true environment} $P$ to be a joint distribution over the $\Xv[i]$ and the $\Ov[i]$, such that if $\obs[i](n) = \x[n]$ then $P(\Ov[i]=\obs[i] \land \Xv[n]\neq\x[n]) = 0$, which means that all $\obs[i](n)$ which are defined agree on the value of $\x[n]$. We omit the random variables if we can do so unambiguously, writing, e.g., $P(\x[n] \mid \obs[i]).$
Note that there may exist~$n$ such that $\obs[i](n)$ is not defined for any $i$, in which case the forecaster will never observe $\x[n]$. We write $\allobs[i]$ for the list of observations up to time $i$, and $\allobs[i](n)$ for the value of $\x[n]$ if any observation in $\allobs[i]$ reveals it.
We consider learning algorithms that make use of some set \ensuremath{\mathcal F}\xspace of forecasters.
\begin{definition} \label{def:forecaster}
A \textbf{forecaster} is a partial function $f$ which takes as input $n$ observations \allobs[n] and might produce a prediction $\y[n] \in \ensuremath{\mathcal Y}\xspace$, interpreted as a prediction of $\x[n]$.
\end{definition}
Because some outcomes may never be observed, and because forecasters are partial (and so may abstain from making predictions on certain subsequences of the outcomes), we will compare forecasters only on subsequences on which both are defined.
\begin{definition} \label{def:defon}
A \textbf{subsequence} $s$ of the outcomes is a monotonic strictly increasing list of natural numbers $s_1s_2\ldots.$ We write $|s|$ for the length of $s$, which may be $\infty$. A forecaster $f$ is \textbf{defined on} $s$ if it outputs a prediction for all elements $s_i$ of $s$, i.e., if, for all $i \le |s|$, $\y[s_i] \coloneqq f(\allobs[s_i])$ is defined.
\end{definition}
We assume that at least one $f \in \ensuremath{\mathcal F}\xspace$ is defined everywhere. It may seem prohibitively expensive to evaluate $f(\allobs[s_i])$ if $s_i$ is large. For example, consider the subsequence $s = 1, 10, 100, \ldots$; $f$ only predicts $\x[10^{10}]$ after making $10^{10}$ observations, despite the fact that $\x[10^{10}]$ is the eleventh element in the subsequence. However, there is no requirement that observations contain lots of feedback: $\allobs[s_i]$ might not reveal very much, even if $s_i$ is large.
The goal of a forecaster is to minimize its loss $\sum_{i=1}^n \ensuremath{\mathcal L}\xspace(\x[s_i], \y[s_i])$, for $n \ge 1$. Two forecasters can be compared by comparing their total loss.
\begin{definition} \label{def:regret}
Given a forecaster $f$ defined on a subsequence $s$ of length at least $n$, let \begin{equation}\ensuremath{\mathcal F}\xspace_s \coloneqq \{f^\prime \in \ensuremath{\mathcal F}\xspace \mid \text{$f^\prime$ is defined on $s$}\}.\end{equation} Then the \textbf{regret} of $f$ (on $s$, through $n$) is \begin{equation}\Regret(f) \coloneqq \max_{f^\prime \in \ensuremath{\mathcal F}\xspace_s} \sum_{t=i}^n \ensuremath{\mathcal L}\xspace\left(\x[s_i], f(\allobs[s_i])\right) - \sum_{i=1}^n \ensuremath{\mathcal L}\xspace\left(\x[s_i], f^\prime(\allobs[s_i])\right).\end{equation}
$f$ is \textbf{consistent} (with respect to $\ensuremath{\mathcal F}\xspace_s$) if its average expected regret goes to zero, that is, if \begin{equation}\lim_{n \to \infty} \sfrac{\EE[\Regret(f)]}{n}=0.\end{equation}
\end{definition}
In our setting, consistency is too strong a guarantee to ask for, as we will see in \Sec{problem}. Instead, we present an algorithm \EvOp with the property that, whenever there is a forecaster $f \in \ensuremath{\mathcal F}\xspace$ that is Bayes-optimal on some subsequence, \EvOp eventually learns to predict optimally on that subsequence.
\begin{definition} \label{def:optimal}
A forecaster $f$ is \textbf{Bayes-optimal} (for the true environment, in its domain) if:
\begin{enumerate}
\item Everything $f$ predicts is almost surely eventually revealed. That is, if $f(\allobs[n])$ is defined, then with probability~1 there is some $N$ such that $\obs[N](n)$ is defined.
\item $f$ minimizes expected loss against the true environment whenever it makes a prediction. That is, if $\y[n] \coloneqq f(\allobs[n])$ is defined, then $\y[n] = \argmin_{\y} \EE[\ensuremath{\mathcal L}\xspace(\x[n],\y)\mid \allobs[n]].$
\end{enumerate}
\end{definition}
We will occasionally refer to a Bayes-optimal $f$ as simply ``optimal".
The main result of our paper is this: Whenever there is an optimal forecaster $f \in F$ defined on $s$, our algorithm \EvOp converges to optimal behavior on $s$.
\begin{restatable}{theorem}{thmevop} \label{thm:evop}
For any Bayes-optimal $f^s \in \ensuremath{\mathcal F}\xspace$ defined on $s$,
\begin{equation}\lim_{n \to \infty} |\ensuremath{\mathcal L}\xspace\left(\x[s_n], \EvOp[{\allobs[s_n]}]\right) - \ensuremath{\mathcal L}\xspace\left(\x[s_n], f^s(\allobs[s_n])\right)| = 0.\end{equation}
\end{restatable}
\noindent We call algorithms with this property \emph{eventually optimal}.
We will define \EvOp in \Sec{solution}, and prove \Thm{evop} in \Sec{proof}. Weak bounds on how long it takes \EvOp to converge to Bayes-optimal behavior on any individual subsequence are given in \Sec{bounds}.
Eventual optimality is a very strong condition, and only yields guarantees if \ensuremath{\mathcal F}\xspace contains Bayes-optimal forecasters. In this paper we focus on showing that an eventually optimal predictor exists, and providing weak bounds on how long it takes it to converge to optimal behavior on a subsequence (and how much loss can be accumulated in the meantime). As we will see in \Sec{problem}, this is non-trivial. We leave the problem of converging on the best available forecaster of a subsequence (even if it is not optimal) to future research.
\section{Difficulties in this Setting} \label{sec:problem}
Total regret and average regret are poor measures of forecaster performance in this setting, and consistency (as defined by \Def{regret}) is impossible in general. To show this, we will describe an environment \ensuremath{P^\#}\xspace which exploits the long delays to make learning difficult.
\ensuremath{P^\#}\xspace generates outcomes as follows. It flips a fair coin and reveals it once, and then flips another and reveals it ten times, then flips a third and reveals it one hundred times, and so on, always revealing the $k$th coin $10^{k-1}$ times. The forecasters spend one timestep predicting the first coin, ten timesteps predicting the second coin, one hundred timesteps predicting the third coin, and so on. The observations are set up such that they contain no information about the coin currently being predicted: The forecasters must predict the $k$th coin all $10^{k-1}$ times before it is revealed.
Formally, let $\ensuremath{\mathcal X}\xspace \coloneqq \Set{\textsc{h}, \textsc{t}}$ corresponding to ``heads" and ``tails" respectively. Let \ensuremath{\mathcal Y}\xspace be the set of probability distributions over \ensuremath{\mathcal X}\xspace, which can be represented as real number ${p \in [0, 1]}$. \ensuremath{P^\#}\xspace~is a Markov chain, where each \x[i+1] is conditionally independent from all other outcomes given \x[i]. ${\ensuremath{P^\#}\xspace(\Xv[1]=\textsc{h})=0.5}.$ For ${i = 2, 12, 112, 1112, \ldots}$, $\x[i]$ ``reveals a new coin" and is independent of $\x[i-1]$: ${\ensuremath{P^\#}\xspace(\Xv[i]=\textsc{h}\mid\Xv[i-1]=\cdot\;)=0.5}$. For all other $i$, $\x[i]$ ``reveals the same coin again:" $\x[i]=\x[i-1]$. Each \Ov[n] is a deterministic function of $\Xv[1]\ldots\Xv[n]$ which reveals the first $\ceil{\log_{10} \left(n \cdot \sfrac{9}{10}\right)}$ outcomes. Let \ensuremath{\mathcal L}\xspace be squared error; that is, let $\ensuremath{\mathcal L}\xspace(\textsc{h}, p) = (1-p)^2$ and $\ensuremath{\mathcal L}\xspace(\textsc{t}, p) = p^2$.
Clearly, the best prediction of \x[n] that a forecaster can make given \allobs[n] is $0.5$, because \allobs[n] does not contain any information about the coin revealed by \x[n], which is fair. Thus, the simple forecaster $f^*(\allobs[n]) = 0.5$ is Bayes-optimal. However, the regret of $f^*$ may be very high! To see this, consider a forecaster $f^1$, the ``gambler," defined $f^1(\allobs[n]) = 1.$ In expectation, $f^1$ will receive higher total loss on any subsequence of the true outcomes. However, $f^1$ will spend about half the time with a lower total loss than $f^*$, because each time a new coin begins being predicted, it has the opportunity to recoup all its losses.
$f^*$ accumulates loss at a rate of $\sfrac{1}{4}$ units per prediction, which means that, after the $k$th coin has been predicted all $10^{k-1}$ times, its aggregate loss is $\sfrac{1}{4} \cdot \sum_{i=1}^k 10^{i-1}$. $f^1$ accumulates either $0$ or $1$ unit of loss in each step according to whether the coin comes up heads or tails, so in the worst case, it will have $\sum_{i=1}^k 10^{i-1}$ total loss after the $k$th coin. If the $k+1$ coin comes up heads, then $f^*$ gains an additional $\sfrac{1}{4} 10^k$ loss while $f^1$'s loss remains unchanged. $10^k$ accounts for more than nine tenths of $\sum_{i=1}^k 10^i$, so if the coin came up heads then $f^1$'s total loss is at most a tenth of $\sum_{i=1}^k 10^i$, whereas $f^*$'s total loss is a quarter of $\sum_{i=1}^k 10^i$. In fact, any predictor that assigns average probability $\le 0.5$ across all $10^{k-1}$ reveals of the $k$th coin will have at least 15\% more loss than $f^1$ after the \smash{$\sum_{i=1}^k$}th step, if that coin comes up heads.
By a similar logic, whenever the $k$th coin comes up tails, $f^1$'s loss shoots up above that of $f^*$, no matter how lucky it was previously. Thus we see that if $f^1 \in \ensuremath{\mathcal F}\xspace$, the regret of $f^*$ will swing wildly back and forth. Any predictor which is maintaining a mixture of forecasters and weighting them according to their regret will have trouble singling out $f^*$.
Indeed, if the environment is \ensuremath{P^\#}\xspace, and if $\ensuremath{\mathcal F}\xspace$ contains both $f^1$ and the opposite gambler $f^0$ defined as $f^0(\allobs[n])=0$, then it is impossible for a forecaster to be consistent in the sense of \Def{regret}. If the average probability a forecaster assigns to the $k$th coin is $\le 0.5$ and the coin comes up heads, it gets very high regret relative to $f^1$, whereas if it's $\ge 0.5$ and the coin comes up tails, it gets very high regret relative to $f^0$. The only way for a forecaster to avoid high regret against both gamblers is for it to place higher probability on the true result of the coin every single time. With probability~1 it must slip up infinitely often (because the coins are fair), so each forecaster's regret will be high infinitely often. And the amount of regret---at least 15\% of all possible loss---is proportional to~$n$, so $\lim_{n\to\infty} \sfrac{\EE[\Regret[][n](f)]}{n}$ cannot go to zero.
Lest this seem like a peculiarity of the stochastic setting, observe that a similar problem could easily occur in the deterministic setting, when a learner is predicting the behavior of large computations. For example, imagine that the ``coins" are chaotic subsystems inside a physics simulation, such that large environments have many correlated subsystems. In this case, some experts might start ``gambling" by making extreme predictions about those subsystems, and it may become difficult to distinguish the accurate forecasters from the gamblers, while looking at total or average regret.
The first fix that comes to mind is to design a predictor with a learning rate that decays over time. For example, if the learner weights the loss on $\x[n]$ by $\sfrac{1}{10n}$ then it will assign each cluster of $10^{k-1}$ predictions roughly equal weight, thereby neutralizing the gamblers. However, this fix is highly unsatisfactory: It runs into exactly the failures described above on the environment $\ensuremath{P^\#}\xspace_2$ which reveals the $k$th coin \smash{$10^{10^k}$} times instead. It might be the case that for each specific environment one could tailor a learning rate to that environment that allows a predictor to successfully distinguish the optimal forecasters from the gamblers using regret, but this would be an ad-hockery tantamount to hardcoding the optimal forecaster in from the beginning. This motivates the study of how a predictor can successfully identify optimal experts at all in this setting.
\section{The \texorpdfstring{\EvOp}{EvOp} Algorithm} \label{sec:solution}
\Sec{problem} showed that in this setting, it is possible for gamblers to take advantage of correlated outputs and unbounded delays to achieve drastic swings in their total loss, which makes total and average regret bad measures of a forecaster. We can address this problem by comparing forecasters only on \emph{independent} subsequences of outcomes on which they are both defined.
Intuitively, the gamblers are abusing the fact that they can correlate many predictions before any feedback on those predictions is received, so we can foil the gamblers by assessing them only on a subsequence of predictions where each prediction in the subsequence was made only after receiving feedback on the previous prediction in the subsequence. \EvOp is an algorithm which makes use of this intuition, and \Thm{evop} shows that it is sufficient to allow \EvOp to zero in on Bayes-optimal predictors regardless of what strategies other forecasters in \ensuremath{\mathcal F}\xspace use.
\begin{definition} \label{def:independent}
A sequence $s$ is \textbf{independent} if, for all $i > 1$, $\obs[s_i](s_{i-1})$ is defined.
\end{definition}
\begin{algorithm2e}
\caption{\EvOp, an eventually optimal predictor. \norm{\cdot} is the $l^2$ norm, and $1/0 = \infty$.\label{alg:evop}}
\SetKwData{Waiting}{waiting}
\KwIn{$\allobs[n]$, the first $n$ observations}
\KwData{$\varepsilon$, an arbitrary constant $< 1$}
\BlankLine
\tcp{Computes an independent subsequence on which $f_i$ and $f_j$ disagree.}
\Fn{\TestSeq[$i$, $j$, $m$]}{
$t \leftarrow 0$\;
$\Waiting \leftarrow false$\;
\For{$k$ in $1, 2, \ldots, n$}{
\uIf{\Waiting and $t \in \Dom{\obs[k]}$}{
\Output{$k$}\;
$\Waiting \leftarrow false$\;
}
\ElseIf{$\y[k]^i \coloneqq f_i(\allobs[k])$ and $\y[k]^j \coloneqq f_j(\allobs[k])$ are defined, and $\norm{\y[k]^i - \y[k]^j} > 1/m$}{
$t \leftarrow k$\;
$\Waiting \leftarrow true$\;
}
}
}
\BlankLine
\tcp{Computes the difference between the scores of $f_i$ and $f_j$ on an independent subsequence on which they disagree.}
\Fn{\RelScore[$i$, $j$, $m$]}{
$s \leftarrow \TestSeq[$i$, $j$, $m$]$\;
\KwRet{$\sum_{k=1}^{|s|} \left(\ensuremath{\mathcal L}\xspace(\x[s_k], \y[s_k]^i) - \ensuremath{\mathcal L}\xspace(\x[s_k], \y[s_k]^j) - \dfrac{\rho\varepsilon}{2 m^2}\right)$}\;
}
\BlankLine
\Fn{\MaxScore[$i$]}{
\KwRet{$\max_{j \in \mathbb{N}_{\geq 1}, m \in \mathbb{N}_{\geq0}} i - j - m + \RelScore[$i$, $j$, $m$]$}\;
}
\BlankLine
$f \leftarrow \min_{i \in \mathbb{N}_{\geq 1} \text{ such that } \allobs[n] \in \Dom{f_i}} \,\MaxScore[$i$]$\;
\KwRet{$f(\allobs[n])$}\;
\end{algorithm2e}
\EvOp works as follows. Fix an enumeration $f_1, f_2, \ldots$ of \ensuremath{\mathcal F}\xspace, which must be countable but need not be finite; we can assume without loss of generality that this enumeration is countably infinite. \EvOp compares $f_i$ to $f_j$ by giving it a relative score, which is dependent on the difference between their loss measured only on an independent subsequence of predictions on which they are both defined, constructed greedily. Lower scores are better for $f_i$. The score is also dependent on $\rho$, the strong convexity constant for \ensuremath{\mathcal L}\xspace, and an arbitrary positive $\varepsilon < 1$, which we use to ensure that if $f_i$ and $f_j$ make different predictions infinitely often then their scores actually diverge. \EvOp follows the prediction of the $f_i$ chosen by minimaxing this score, i.e., it copies the $f_i$ that has the smallest worst-case score relative to any other $f_j$. Pseudocode for \EvOp is given by \Alg{evop}.
To see that the $\max$ step terminates, note that it can be computed by checking only finitely many $j$ and $m$: \RelScore[$i$, $j$, $m$] is bounded above by \smash{$\sum_{k=1}^{|s|} \ensuremath{\mathcal L}\xspace(\x[k], \y[k]^i)$}, so all $(j, m)$ pairs such that $j+m$ is greater than this value may be discarded. To see that the $\min$ step terminates, note that it can be computed by checking only finitely many $i$ (assuming that at least one $f$ is defined on $\allobs[n]$), because when $m=0$, \TestSeq[$i$, $j$, $m$] is empty; thus when $j=1$ and $m=0$, \MaxScore[$i$, $j$, $m$] is at least $i - 1$. Therefore, after finding the smallest $k$ such that $f_k$ is defined on \allobs[n], the $\min$ step need only continue searching up through $i = \MaxScore[$k$] + 1.$
\EvOp gets around the problems of \Sec{problem} by comparing forecasters only on greedily-constructed independent subsequences of the outcomes. Note that if the delay between prediction and feedback grows quickly, these subsequences might be very sparse. For example, in the environment \ensuremath{P^\#}\xspace of \Sec{problem}, the independent subsequence will have at least $10^i$ timesteps between the $i-1$st element in the subsequence and the next. This technique allows \EvOp to converge on Bayes-optimal behavior, but it also means that it may do so very slowly (if the subsequence is very sparse). Under certain assumptions about the speed with which delays grow and the frequency with which forecasters disagree, it is possible to put bounds on how quickly \EvOp converges on Bayes-optimal behavior, as discussed in \Sec{bounds}. However, these bounds are quite weak.
\subsection{Proof of \Thm{evop}} \label{sec:proof}
To prove \Thm{evop} we need two lemmas, which, roughly speaking, say that (1) if $f_z$ is Bayes-optimal then \MaxScore[$z$] is bounded; and (2) if $f_j$ is not Bayes-optimal and some $f_z \in \ensuremath{\mathcal F}\xspace$ is, then \MaxScore[$j$] goes to infinity. From there, the proof is easy.
In what follows, let $f_z$ be a Bayes-optimal forecaster (as per \Def{optimal}) that makes infinitely many predictions all of which are almost surely eventually revealed---that is, such that $f_z(\allobs[n])$ is almost surely defined infinitely often, and whenever it is defined, $\obs[i](n)$ is almost surely defined for some $i$. Let $z$ be the index of $f_z$ in the enumeration over \ensuremath{\mathcal F}\xspace. In general, we will write $\y[n]^i$ for $f_i(\allobs[n])$ when it is defined.
\begin{lemma} \label{lem:bounded}
If $f_z$ is Bayes-optimal and makes infinitely many predictions all of which are almost surely eventually revealed, then with probability~1, \MaxScore[z] is bounded.
\end{lemma}
\begin{proof} For all $j$, $\RelScore[$z$, $j$, $0$]=0$, because \TestSeq[$z$, $j$, $0$] never outputs. Thus, \MaxScore[$z$] is bounded below by $z-1$ (consider the case where $j=1$ and $m=0$) and bounded above by $z-j-m+\RelScore[$z$, $j$, $m$]$. When $m=0$ this is bounded above by $z-j$, so it suffices to show that there is almost surely some bound B such that $\RelScore[$z$, $j$, $m$]-j-m$ is bounded above by B for every $j$ and $m \ge 1$.
Intuitively, in expectation, \RelScore[$z$, $j$, $m$] should either be finite or diverge to $-\infty$, because $f_z$ is Bayes-optimal and is only being compared to other forecasters on independent subsequences. We will prove not only that it's bounded above in expectation, but that it is bounded above with probability~1. To do this we use \Lem{jessica} in \App{jessica}, which (roughly speaking) says that something which is zero in expectation, and which has ``not too much" variance in expectation, can't get too far from zero in fact.
Fix $j$, $m \geq 1$, and $\lambda$; we will bound the probability that $\RelScore[$z$, $j$, $m$] \ge \lambda.$ Let $s=s_1s_2\ldots$ be the outputs of \TestSeq[$x$, $j$, $m$][\infty], that is, the entire greedily-generated sparse independent subsequence of outputs on which both $f_z$ and $f_j$ make predictions that differ by at least $\sfrac{1}{m}$ (which could be generated by running \TestSeq[$x$,$j$,$m$] on larger and larger $n$). $s$ may or may not be finite.
Because \ensuremath{\mathcal L}\xspace is strongly convex,
\begin{equation}
\ensuremath{\mathcal L}\xspace(\x[k], \y[k]^j) \ge \ensuremath{\mathcal L}\xspace(\x[k], \y[k]^z)
+ \ensuremath{\mathop{\nabla}}_{\y} \ensuremath{\mathcal L}\xspace(\x[k], \y[k]^z) \cdot (\y[k]^j - \y[k]^z)
+ \frac{\rho}{2} \norm{\y[k]^j - \y[k]^z}^2,
\end{equation}
where $\ensuremath{\mathop{\nabla}}_{\y}$ takes the gradient of \ensuremath{\mathcal L}\xspace with respect to the prediction, $\rho$ is the strong convexity constant of \ensuremath{\mathcal L}\xspace, and $\norm{\cdot}$ is the $l^2$ norm. In other words, the loss of $f_j$ in any given round is at least that of $f_z$ plus a linear term (which, note, is related to the Lipschitz constant of \ensuremath{\mathcal L}\xspace) plus a quadratic term. Rearranging this inequality,
\begin{equation}\label{eq:l}
\ensuremath{\mathcal L}\xspace(\x[k], \y[k]^z) - \ensuremath{\mathcal L}\xspace(\x[k], \y[k]^j) \le - \ensuremath{\mathop{\nabla}}_{\y} \ensuremath{\mathcal L}\xspace(\x[k], \y[k]^z) \cdot (\y[k]^j - \y[k]^z) - \frac{\rho}{2} \norm{\y[k]^j - \y[k]^z}^2.
\end{equation}
We will show that the sum of the right-hand side for $k=1,2,\ldots,n$ is bounded, using \Lem{jessica}.
\Lem{jessica} requires a sequence of random variables $G_1H_1G_2H_2\ldots$ that form a Markov chain, and two real-valued functions $v$ and $r$ defined on the $G_i$ and the $H_i$ respectively, such that ${\EE[r(H_i)\mid v(G_i)]=0},$ and $|r(H_i)| \leq a\sqrt{v(G_i)}$ for some constant $a$. Intuitively, these constraints say that $r$ is zero in expectation, and that its absolute value is bounded by $v$. \Lem{jessica} then gives us a bound on the probability that $\sum_{i=1}^n r(H_i)-v(G_i) \ge \lambda.$ We use it with $r$ as the first term on the right-hand side of \Eqn{l}, and $v$ as the negative of the second. Roughly, $r$ can be thought of as a first-order approximation to the amount by which $f_j$ did better than expected (a ``residual"), and $v$ as a bound on how wildly $r$ can swing (a ``variance").
Let $G_i$ be $\allobs[s_i]$\footnote{This is somewhat ill-defined, since $s_i$ is itself a random variable. We can make this more precise by defining $G_i = (s_i, \allobs[s_i])$ and noting that $s_i$ can be determined from knowing only $\allobs[s_i]$} and $H_i$ be \allobs[k] where $k$ is the least time after $s_i$ such that $s_i \in \Dom{\obs[k]}$. $k$~exists, because $f_z$ only makes predictions that, with probability~1, are eventually revealed. Intuitively, our Markov chain alternates between elements of $s$ and the times when those elements were revealed. For~$i > |s|$, let $G_i=H_i=\allobs[\infty]$, the (infinite) combination of all observations.
Define $r$ to be the function $r(H_i) = - \ensuremath{\mathop{\nabla}}_{\y} \ensuremath{\mathcal L}\xspace(\x[s_i], \y[s_i]^z) \cdot (\y[s_i]^j - \y[s_i]^z)$ when $i\leq|s|$, and 0 otherwise. Observe that this value can be calculated from $H_i$, $f_z$, and $f_j$, because $H_i=\allobs[k]$, with $k > s_i$ and $\x[s_i]\coloneqq\allobs[k](s_i)$ defined.
Define $v$ to be the function $v(G_i) = \frac{\rho}{2} \norm{\y[s_i]^j - \y[s_i]^z}^2$ when $i\leq |s|$, and $\sfrac{\rho}{2m^2}$ otherwise, which can be calculated from~$G_i$,~$f_z$, and~$f_j$, because $G_i$ is just $\allobs[s_i]$. Note that ${\EE[r(H_k) \mid G_k]=0},$ because $f_z$ is a Bayes-optimal predictor, which means it minimizes expected loss, making the gradient in $r(H_i)$ zero in expectation for all $i$. Note also that because~\ensuremath{\mathcal L}\xspace is Lipschitz, ${|r(H_k)| \leq \kappa \norm{\y[n]^j - \y[n]^z}}$ where~$\kappa$ is the Lipschitz constant of~\ensuremath{\mathcal L}\xspace. Thus, with $a=\frac{\kappa\sqrt{2}}{\sqrt{\rho}}$, $|r(H_k)| \leq a\sqrt{v(G_k)}.$ Therefore, $r$ and $v$ meet the conditions of \Lem{jessica}, so for all~$M,$
\begin{equation} \label{eq:lambda}
\PP\left(\sum_{i=1}^n r(H_i)-v(G_i)\geq M\right)\leq\exp \left(-\rho\kappa^{-2}M\right),
\end{equation}
which goes to $0$ as $M$ goes to infinity. We need a bound that forces it to $0$ as $n \to \infty$. In what follows, we write $b=\rho\kappa^{-2}$ for conciseness.
Observe that $\RelScore[$z$,$j$,$m$]\leq\sum_{i=1}^{t_n} \left(r(H_i)-v(G_i)-\sfrac{\rho\varepsilon}{2m^2}\right)$, where $t_n$ is the number of times $\TestSeq[$z$, $j$, $m$]$ outputs. Thus, the probability that $\RelScore[$z$,$j$,$m$]\geq\Lambda$ for any $\Lambda$ is upper-bounded by the probability that, for some $n$,
\begin{equation}\left(\sum_{i=1}^{t_n} r(H_i)-v(G_i)\right)-t_n\frac{\rho\varepsilon}{2m^2}\geq\Lambda.\end{equation}
For any given $n$ and $t$, applying inequality~\eq{lambda} with $\Lambda+t\frac{\rho\varepsilon}{2m^2}$ for $M,$
\begin{equation} \label{eq:tbound}
\PP\left(\sum_{i=1}^{t_n} r(H_i)-v(G_i)\ge\Lambda + t\frac{\rho\varepsilon}{2m^2}\right)\leq \exp\left({-b\left(\Lambda+\frac{t\rho\varepsilon}{2m^2} \right)}\right).
\end{equation}
We now see the function of the $\sfrac{\rho\varepsilon}{2m^2}$ term in \RelScore[][]: it adds a tiny bias in favor of the forecaster being judged, such that the longer a contender waits to prove itself, the more it has to prove. Equation~\eq{tbound} says that, because $f_j$ never proves itself too much in expectation, the probability that $f_z$'s score relative to $f_j$ goes strongly in $f_j$'s favor gets lower as $t_n$ gets larger.
Note that $\RelScore[$z$,$j$,$m$]$ only depends on $n$ through $t_n$: If $t_{n_1}=t_{n_2}$ for some $n_1$ and $n_2$ then $\RelScore[$z$,$j$,$m$][n_1]=\RelScore[$z$,$j$,$m$][n_2].$ Thus, $\PP\left(\exists n \colon \RelScore[$z$,$j$,$m$] > \Lambda\right)$ can be bounded by summing only over the possible values $t$ of $t_n$.
\begin{equation}\sum_{t=0}^\infty \exp\left({-b\Lambda}+t\left(-\frac{b\rho\varepsilon}{2 m^{2}}\right)\right)=\frac{\exp(-b\Lambda)}{1-\exp\left(-\frac{b\rho\varepsilon}{2m^{2}}\right)},\end{equation}
and $m\geq 1$, so
\begin{equation} \label{eq:relbound}
\PP\big(\exists n \colon \RelScore[$z$,$j$,$m$]\ge \Lambda\big) \le \frac{\exp(-b\Lambda)}{1-\exp(-b\rho\varepsilon/2)}.
\end{equation}
Applying inequality~\eq{relbound} with $\lambda + m + j$ for $\Lambda$, we see that the probability $\RelScore[$z$,$j$,$m$]\geq \lambda+m+j$ is at most
\begin{equation}
\sum_{m=1}^\infty\sum_{j=1}^\infty\frac{\exp(-b(\lambda+m+j))}{1-\exp(-b\rho\varepsilon/2)}=\frac{\exp(-b(\lambda+2))}{(1-\exp(-b\rho\varepsilon/2))(1-\exp(-b))^2}.
\end{equation}
This goes to 0 as $\lambda$ goes to $\infty$. Therefore, with probability~1, there exists some bound $B$ such that $\RelScore[$z$,$j$,$m$]-m-j < B$ for all $j$ and $m \ge 1$. Thus, \MaxScore[$z$] is almost surely bounded.
\end{proof}
\begin{restatable}{lemma}{leminf}\label{lem:infinite}
If $f_z$ is Bayes-optimal and makes infinitely many predictions all of which are almost surely eventually revealed, then for any $f_j$, with probability 1, if $\y[i]^z \coloneqq f_z(\allobs[i])$ and $\y[i]^j \coloneqq f_j(\allobs[i])$ are both defined on the same $t$ infinitely often, and if $\norm{\y[i]^z - \y[i]^j} \ge \delta$ infinitely often for some $\delta > 0$, \begin{equation}\lim_{n \to \infty} \MaxScore[$j$] = \infty.\end{equation}
\end{restatable}
\noindent Roughly speaking, the proof runs as follows. Choose $m$ such that $\sfrac{1}{m} < \delta$. It suffices to show that $\RelScore[$j$,$z$,$m$] \to \infty$ as $n \to \infty$. The $\sum (\ensuremath{\mathcal L}\xspace(\x[k], \y[k]^j) - \ensuremath{\mathcal L}\xspace(\x[k], \y[k]^z))$ portion goes to infinity in expectation, and also goes to infinity with probability~1 by \Lem{jessica}. It remains to show that the $\sum\sfrac{\rho\varepsilon}{2m^2}$ terms working in $f_j$'s favor are not sufficient to prevent the total from going to infinity, which can be done by showing that the differences between \smash{$\ensuremath{\mathcal L}\xspace(\x[k],\y[k]^j)$ and $\ensuremath{\mathcal L}\xspace(\x[k],\y[k]^j)$} are at least $\sfrac{\rho}{2m^2} > \sfrac{\rho\varepsilon}{2m^2}$ in expectation, and appealing again to \Lem{jessica}. The proof proceeds similarly to the proof of \Lem{bounded}, so we leave the details to \App{infinite}.
With these lemmas in place, we now prove that \EvOp is eventually optimal. Recall \Thm{evop}:
\thmevop*
\begin{proof}
Let $f_z$ be Bayes-optimal and defined infinitely often, such that everything it predicts is almost surely eventually revealed. It suffices to show that, with probability~1, if $f_z(\allobs[n])$ is defined then \begin{equation}\lim_{n \to \infty} \norm{\EvOp[{\allobs[n]}]-f_z(\allobs[n])} = 0.\end{equation}
By \Lem{bounded}, \MaxScore[$z$] is bounded with probability~1. Let $B$ be this bound. Note that there are only finitely many~$i$ such that $\MaxScore[$i$] \le B$, for the same reason that the $\min$ step always terminates. For each of those $i$, either $f_i$ and $f_z$ converge to the same prediction, or they only make finitely many predictions in common, or (by \Lem{infinite}) $\MaxScore[$i$] \to \infty.$ The latter contradicts the assumption that $\MaxScore[$i$] \le B.$ If $f_i$ and $f_z$ only make finitely many predictions in common, then for sufficiently large $n$, $f_i$ is not defined and so will not be selected. Thus, we need only consider the case where $f_i$ and $f_z$ converge to the same predictions whenever they both make predictions. In this case, \EvOp[{\allobs[n]}] is choosing among finitely many forecasters all of which converge to $f_z(\allobs[n])$, so \EvOp[{\allobs[n]}] must converge to $f_z(\allobs[n])$.
\end{proof}
\subsection{Bounds} \label{sec:bounds}
The speed with which \EvOp converges to optimal behavior on a subsequence depends on both (1) the sparseness of independent subsequences in the outcomes; and (2) the frequency with which forecasters make claims that differ.
Specifically, assume that all forecasters are defined everywhere and disagree infinitely often, and that $\ensuremath{\mathcal F}\xspace$ is finite. (The first two constraints imply the third.) We can show that, given a (potentially fast-growing) function $h$ bounding how long it takes before predictors disagree with each other, and given another (potentially fast-growing) function $g$ bounding the delay in feedback, and given a probability $p$, the time it takes before $\EvOp$ has converged on $f_z$ with probability $p$ is proportional to $h\circ g$ iterated a number of times proportional to $\log p.$ (Note that $h$ and $g$ are not uniform bounds; $g(n)$ is the maximum delay between the $n$th prediction and feedback on the $n$th prediction, and delays may grow ever larger as $n$ increases.)
\begin{restatable}{theorem}{thmbounds} \label{thm:bounds}
Given $h$, $g$, a Bayes-optimal $f_z$, and a probability $p$, there is an $N \propto (h \circ g)^{\log p}(1)$ such that, with probability at least $1-p$, for all $n \ge N$, \begin{equation}\EvOp[{\allobs[n]}] = f_z(\allobs[n]).\end{equation}
\end{restatable}
\noindent We prove \Thm{bounds} in \App{bounds}.
To call these bounds ``weak" is an understatement. In the case where the outcomes are generated by running a universal Turing machine $U$ on different inputs, $g$ is infinite, because $U$ will sometimes fail to output. It is possible to achieve \emph{much} better bounds given certain simplifying assumptions, such as delays that are finite in expectation \citep{Joulani:2013}. However, it is not yet clear which simplifying assumptions to use, or what bounds to ask for, in the setting with ever-growing delays.
\section{The Deterministic Setting} \label{sec:deterministic}
Our motivation for studying online learning with unbounded delays in a stochastic setting is that this gives us a simplified model of the problem of predicting large computations from observations of smaller ones. We have already seen one instance of an issue in the stochastic setting which looks likely to have an analog in the deterministic setting. In \Sec{problem} we gave the example of a deterministic ``coin" that appears more and more often in larger and larger computations, which might (for instance) be a common subsystem in the environment of a physical simulation. Intuitively, if there are many correlated subsystems that appear ``sufficiently random" to all forecasters, then forecasters might follow the strategies of $f^1$ and $f^0$ in \Sec{problem} and achieve regular large swings in their total loss. Intuitively, the techniques used in \Alg{evop} to handle the problem in the stochastic case should well carry over to the deterministic case, but any attempt to formalize this intuition depends on what it means for a deterministic sequence to be ``sufficiently random."
For that we turn to algorithmic information theory, a field founded by \citet{Martin:1966} which studies the degree and extent to which fixed bitstrings can be called ``random." In their canonical text, \citet{Downey:2010} give three different definitions of algorithmic randomness and show them all to be equivalent. The oldest of the three, given by \citet{Martin:1966}, is rooted in the idea that an algorithmically random sequence should satisfy all computably verifiable properties that hold with probability~1 on randomly generated sequences.
It is with this definition in mind that we note that \Lem{bounded} and \Lem{infinite} are both stated as properties that are true of randomly generated sequences with probability~1. \Lem{bounded} says that if the outputs of the environment are generated randomly, then with probability~1, the score of a Bayes-optimal predictor does not go to infinity. \Lem{infinite} says that if the outputs of the environment are generated randomly, then with probability~1, a predictor that disagrees by $\delta > 0$ with a Bayes-optimal predictor infinitely many times has its score going to infinity. Both these computable properties hold for random sequences with probability~1, so they hold for Martin-L\"{o}f-random sequences.
This means that if $\ensuremath{\mathcal F}\xspace$ is the class of all Turing machines, and \EvOp is predicting an algorithmically random sequence (such as Chaitin's $\Omega$, the fraction of Turing machines which halt), then \Thm{evop} holds and \EvOp will converge on optimal predictions on subsequences of that sequence. However, this does us no good: There are no computable patterns in Chaitin's $\Omega$; computable forecasters won't be able to do any better than predicting a 50\% chance of a 1. Besides, the goal is not to predict uncomputable sequences by running all Turing machines. The goal is to predict large computations using efficient (e.g., polynomial-time) experts.
What we need is a notion of algorithmic randomness \emph{with respect to a restricted class of experts}. For example, if $\ensuremath{\mathcal F}\xspace$ is the class of polynomial-time forecasters, we would like a notion of sequences which are algorithmically random with respect to polynomial-time forecasters.
The authors do not yet know of a satisfactory definition of algorithmic randomness with respect to resource constraints. However, the obvious analog of Martin-L\"{o}f's original definition \citep{Martin:1966} is that a sequence should be defined as algorithmically random with respect to a class of bounded experts if, and only if, it satisfies all properties that hold of randomly generated sequences with probability~1 \emph{and that can be checked by one of those experts}. On sequences that are algorithmically random with respect to $\ensuremath{\mathcal F}\xspace$ in this sense, \Lem{bounded} and \Lem{infinite} must apply: Assume $f_z$ is a Bayes-optimal predictor on a subsequence that is algorithmically random with respect to $\ensuremath{\mathcal F}\xspace$; any forecaster $f_j \in \ensuremath{\mathcal F}\xspace$ that outperforms $f_z$ infinitely often would be identifying a way in which the sequence fails to satisfy a property that randomly generated sequences satisfy with probability~1, which contradicts the assumption. This gives strong reason to expect that \EvOp would be eventually optimal when predicting sequences that are algorithmically random with respect to $\ensuremath{\mathcal F}\xspace$, even though formalizing such a notion remains an open problem.
Even so, this does not mean that \EvOp would perform \emph{well} at the actual task of predicting large computations from the observation of small ones. Eventual optimality provides no guarantees about the ability of the algorithm to converge on good but non-optimal predictors, and the bounds that we have on how long it takes \EvOp to converge on good behavior are weak (to say the least).
Furthermore, there are other notions of what it means to ``predict computations well" that are not captured by eventual optimality. For example, \citet{Demski:2012a} discusses the problem of computably assigning probabilities to the outputs of computations and refining them in such a way that they are ``coherent," drawing on inspiration from the field of mathematical logic that dates at least back to \citet{Gaifman:1964}. The intuition is that given two statements ``this computation will halt and output~1" and ``this computation will fail to halt or output something besides~1," a good reasoner should assign those claims probabilities that sum to roughly 1. We have no reason to expect that \EvOp has any such property.
\section{Conclusions} \label{sec:conclusions}
We have studied online learning in a setting where delays between prediction and observation may be unbounded, in attempts to explore the general problem of predicting the behavior of large computations from observations of many small ones. We found that, in the stochastic setting, the unbounded delays give rise to difficulties: Total regret and average regret are not good measures of forecaster success, and consistency is not possible to achieve in general. However, it is possible to converge on good predictions by comparing forecasters according to their performance only on sparse and independent subsequences of the observations, and we have reason to expect that some of the techniques used to achieve good performance in the stochastic setting will carry over into the deterministic setting. We have proposed an algorithm \EvOp that converges to optimal behavior. It is not a practical algorithm, but it does give a preliminary model of online learning in the setting where the delay between prediction and feedback is ever-growing.
Our results suggest a few different paths for future research. \EvOp handles the problem of learning in the face of potentially unbounded delays by comparing forecasters only on subsequences that are potentially very sparse, and this means that it converges to optimal behavior quite slowly. Speeding up convergence without falling prey to the problems described in \Sec{problem} might prove difficult. Furthermore, \EvOp only guarantees convergence on forecasters that are Bayes-optimal; it is not yet clear how to converge on the best available forecaster (even if it is non-optimal) in the face of unbounded delays. As mentioned in \Sec{deterministic}, a formal notion of algorithmic randomness with respect to a bounded class of experts would make it easier to study the problem of using online learning to predict the behavior of large computations in a deterministic setting. \EvOp is only a first step towards a predictor that can learn to predict the behavior of large computations from the observation of small ones, and the problem seems ripe for further study.
|
\subsection{VCN Deployment}
\textcolor{red}{VC: needs complete overhaul}
\begin{figure}
\centering
\includegraphics[scale=0.2]{PowerGraph.pdf}
\caption{State of battery attached to solar panels, corresponding to weather conditions while running the base station over a week}
\label{powergraph}
\end{figure}
\begin{figure}
\centering
\includegraphics[scale=0.2]{picture.pdf}
\caption{The picture of deployment, showing the directional backhaul antenna, omni-directional base station antenna and solar panels}
\label{deployment}
\end{figure}
\textcolor{red}{i don't understand how these measurements are made - are we going radially from a central point for both Airtel and MTN?; there is also some additional information provided regarding the measurements made for the deployment - should be separate para}
Kumawu is a small neighborhood 2 hours away from Kumasi, one of the largest cities in Ghana. The two major cellular providers in Kumawu are MTN and Airtel. MTN has reasonable coverage in most parts of the Kumawu but not beyond. Airtel had 3G coverage only till the mid town \textcolor{red}{VC: need to know how you were measuring - radially or otherwise}, only 2.5G services were available from Airtel beyond that point. Our site was located around 500 meters away from the Airtel's 3G coverage boundary. Our base station unit had a 1 Watt transmission power and was manufactured by Range Wireless\cite{range}. The coverage range of base station is dependent on several environmental factors. Our unit had an advertised coverage radius of 1 to 7 kilometers. Our area of deployment was hilly and we mounted the antenna relatively low, therefore in our experiments we measured coverage diameter was over 1 kilometer.
In spite of having a coverage range comparable to cellular base stations in metropolitan areas, our base station had reduced power consumption. The low power profile of the apparatus used enabled us to power the base station using solar panels of capacity 1 KW.
Figure~\ref{powergraph} shows the state of battery attached to solar panels and the corresponding weather conditions across one week while the base station was running on solar power. \textcolor{red}{As expected, the battery's current capacity is highly dependent on the availability of sunlight but is still able to provide decent charge in cloudy and overcast conditions.} Though failures are expected if the overcast conditions persist, intermittent grid power can be used that to recharge the battery in such cases. Note that the grid power was not used to charge batteries in the week shown in Figure~\ref{powergraph}. The power consumption of the base station itself is a few Watts \textcolor{red}{how many exactly?}, while the complete setup, consisting of signal booster, local server and base stations never exceeded 300 Watts.
We built a cheap and low-cost backhaul for the VCN and used a directional receiving antenna to catch the weak 3G signal which was available 500 meters away and send signal to an analogue signal repeater to in order to enhance the weak signal. We then pass the weak signal to an indoor antenna where a phone is used to receive the signal and provide tethered internet to the local server who is responsible for conducting all of the communication with the cloud controller and other VCNs. The directional antenna can be seen in Figure~\ref{deployment}, showing various components of our deployment in Ghana. We present the evaluation numbers for the signal booster based backhaul and show that this kind of a backhaul can be effectively used by millions of people living in areas at the edge of cellular coverage which are often neglected by commercial telcos due to low user base.
It is worth mentioning that the biggest part of our deployment were the solar panels and the omni-directional base station antenna. It can be seen in Figure~\ref{deployment} that the antenna and solar panels are still not excessively large unlike some of the conventional base station sites. Although not visible the solar panels were mounted on a trolley that had wheels and extensions so that they could be connected to a vehicle. In essense this kind of a deployment can easily be taken far into rural areas and can be deployed in an extremely fast manner. This can also be very useful in case of natural disasters wiping infrastructures and can be used for deployment of disaster recovery platform~\cite{rescue_base_station}.
\section{Related Work}
{\bf Software-based microcells:} Universal service obligations have been pushed by many countries to facilitate the expansion of communication into rural areas.
In parallel recent advances in hardware and open-source software has made available inexpensive cellular equipment broadly accessible. For example, OpenBTS is an open-source GSM base transceiver station (BTS) implementation which has enabled a wide range of projects aimed towards building small-scale VCNs. Heimerl et al.\cite{kurtis_ictd} demonstrated the viability of independently run, locally operated cellular networks. Similarly, Rhizomatica\cite{rhizo} has deployed several community-run cellular networks in Oaxaca, Mexico with a short-term experimental spectrum license. Zheleva et al.~\cite{zheleva} deployed a similar system for purely local communications in Zambia.
\textbf{Backhauls and rural mesh networks:} The design of VC-ISP builds upon a large body of work across rural wireless networks including Fractel~\cite{fractel}, Digital Gangetic Plains~\cite{inside_out,gangetic,2P}, WiLDNet~\cite{wildnet,beyond}. There has been immense around design of various different Line of Sight(LOS) and Non Line of Sight Cellular(NLOS) backhauls~\cite{tarana,kumu}.
\textbf{Cognitive Radio and GSM whitespaces:} The literature on cognitive radio, whitespaces, and dynamic spectrum sharing is vast; while most work in the space focuses on TV whitespaces (TVWS), our work is more closely related to work on re-use of cellular spectrum. Sankaranarayanan et al.~\cite{sankaranarayanan2005bandwidth} propose reusing timeslots in a GSM cell for adhoc networks during periods when the GSM cell is lightly utilized. Buddhikot et al.~\cite{buddhikot2009ultra} describe a system for indoor femtocells to dynamically share spectrum with incumbent carriers by operating over ultra wide bands. Yin et al.~\cite{yin_beijing} proposes a similar system and provides measurement results which indicate that unused spectrum (i.e., whitespace) exists even in a dense, urban environment (Beijing). The assumption in the community, however, seems to be that cellular spectrum is efficiently used and that finding GSM whitespace is challenging. In contrast to these, we focus on reusing GSM whitespaces to provide GSM service by means of macrocells. The only work that recycles GSM whitespaces for reuse by a VCN is NGSM~\cite{gsmws}. We have already highlighted how our approach for doing GSM whitespaces builds on top of NGSM and performs better.
\textbf{Intermittency aware networks:} VC-ISP also significantly benefits from prior work on Delay Tolerant Networks~\cite{dtn_routing,seth2006lcc}. One of the first real world DTN deployments was DakNet which provides low-cost digital
communication to rural areas using physical transportation
links~\cite{pentland2004daknet}. There have been several routing
DTN-based routing algorithms like Encounter based
routing~\cite{nelson2009encounter} and MobySpace~\cite{leguay2005evaluating}. \cite{burgess2006maxprop, juang2002energy, chaintreau2007impact} are other works that use DTN centric ``store and forward'' algorithms to progressively forward
messages until they reach their destination.
The intermittency awareness abstraction of VC-ISP is fundamentally
different from the traditional DTN abstractions since VC-ISP is
primarily tailored and designed for the cellular network context and primarily focuses on higher application-centric ``store and forward'' abstractions; the DTN routes for VC-ISP messages are preset by the network structure which changes infrequently.
\section{Our GSM Whitespaces Solution}
\section{Detecting Whitespaces}
\label{sec:gsm}
Wireless spectrum is auctioned on a regular basis to large telecommunication organizations. Commercial networks deploy multiple cells covering large, contiguous areas. Though they purchase slivers of the available spectrum, majority of these slivers remain unused in developing regions. These unused bands of spectrum are collectively called GSM whitespaces. The existence of these whitespaces has been proved for a remote area in Indonesia and a system has been built to operate without interfering with the licensed providers \cite{gsmws}. Thus, VCNs largely operate using these whitespaces, without spectrum licenses in localized communities where cellular connectivity is limited.
{\em Nomadic GSM:} Proposed by Hassan et al. \cite{gsmws}, this scheme uses handsets to continuously measure spectrum occupancy and report measurements back to their serving cell. The authors claim that their system safely uses unused licensed spectrum without requiring cooperation or participation from existing license holders. NGSM takes advantage of the fact that GSM handsets continually measure spectrum occupancy in their proximity and report these measurements to their serving cell, ergo mitigating the practical impact of the hidden node problem caused by client side interference. However, NGSM has the following limitations:
\begin{enumerate}
\itemsep-0.23em
\item The secondary base station begins to transmit at full power on a randomly chosen Absolute Radio Frequency channel Number (ARFCN) before any sensing is done. This can lead to interference with a primary base station operating in that ARFCN.
\item In the scenario where there is no call or SMS between users, the measurement reports to the serving cell become infrequent. This is often the case in low population density regions. This can lead to delayed readings, which can further lead to wrongfully using a channel that interferes with a primary license holder.
\item The system requires two base stations in the same location, so that active calls in the primary can be moved to the secondary when the primary is collapsed. This requirement of a secondary is often cumbersome and financially unfeasible.
\end{enumerate}
The GSM whitespaces detection mechanism we use is a hybrid of sensing and database approaches, similar to NGSM, addressing the aforementioned concerns. The first limitation of NGSM is mitigated by increasing transmission power periodically to slowly expand coverage. This is done while simultaneously sensing for used channels among a list of safe channels. In this manner, there is no need to have any prior knowledge of ARFCN usage. Thus, a small software-defined base station can be installed at any location without examining the spectrum prior, because any interference caused will be at a much smaller radius than compared to a base station transmitting at full power. The second limitation is addressed using a mobile application that periodically makes calls and sends messages to the base station. This ensures periodicity, ergo frequency in measurement reports. \textcolor{red}{what about the economic feasibility of this aspect? if each call costs x dollars, what will the cost be of making 100 such calls?} If a few volunteers in the community run this application, the cost associated with it can be divided across all community members to ensure a nominal increase in their payments. Finally, we do not expect the presence of two different base stations, and instead wait for the connected calls to complete in case it is time to shift to a different safe channel. \textcolor{red}{what is the difference in latency between their approach and yours? i.e is there any user perceived delay in your method which is avoided in theirs? if so, we need to write about it here for completeness.}
\section{Conclusion}
\section{Naming \& Addressing}
\label{sec:idmanage}
\textcolor{red}{Talal: There is a need for subsection before 5.1 that highlights why do we even need a new identity management framework. This section should go into details of how identities are handled in conventional cellular networks and how mobility and handovers are handled. Then we need to go into our solution and how we provide flexibility and uniqueness and mobility across the VCNs close by and when users go to a different VCN and why do we make the choices that we make and how it is better. This has to lay some groundwork for the VCE and GCE error graphs that we create. }
To successfully utilize the various services of cellular networks, even from outside the network, it is imperative to have an efficient scheme for device naming and addressing. We wish to achieve three goals using our identity management service, namely (a) flexibility in identities held, (b) seamless user experience, and (c) uniqueness.
\subsection{Flexibility}
\label{subsec:flex}
A user can have an identity which authenticates her to use applications offered by the VC-ISP. However, this identity should not facilitate communication with external users (outside the VC-ISP). Similarly, a user can have another identity whose sole purpose is to enable communication with the outside world. To this end, the VC-ISP issues two types of identities: {\em (a) Local identities} that are only usable/valid inside the VC-ISP framework, and {\em (b) Global identities} which make it possible for devices outside the framework to connect with those inside. It is the duty of the identity management service to multiplex the functionalities accordingly based on the nature of the identity.
Apart from being enabled to utilize application support within the VC-ISP, users with local identities can communicate with others within the same VCN or in the same VC-ISP. In contrast, global identities provide all the functionalities supported by local identities and enable connection both to and from outside the VC-ISP. The importance of this form of flexibility stems from the fact that providing access to an identity outside the network has an associated cost. Globally identifiable names need to be purchased (or leased on a monthly basis) from organizations selling VoIP services, like Nexmo \cite{nexmo}. Users must be given a choice to be reachable by those outside as they are required to bear the cost associated with the leasing or subsequent purchase of the corresponding identifier. This flexibility in choice is currently unavailable in any conventional cellular network.
\subsubsection{Generation \& Dissemination}
\label{subsubsec:gnd}
Unique identifiers are maintained, regulated and generated (sequentially, in the order in which requests are received) by a centralized server different from the controller, henceforth referred to as a name server. These identifiers (or names) are flat and carry no location information. The flexibility offered in naming can best be utilized when the architecture is optimally designed. To achieve the required performance, we have two different implementations, namely:
{\bf 1. Server-Client Model:} A single, centralized name server issues both global and local identities as requested. If a new users enter any node, the registration requests are routed to this name server in the order of entrance. In the case of a cellular device that connects through the OpenBTS interface, the request to generate a name comprises of the IMSI number (which is globally unique and non-mutable). This information is then used in the standard GSM challenge-response protocol, when the phone associates with the network. The response from the central name server is a unique identifier. This server keeps track of each identity issued (name) and its current location (address), maintaining consistent state information. This information is required to route calls and messages correctly. In addition, it records the IMSI number of the SIM card to which the identity was issued. If the user moves to a different node, the server still knows that an identity has been issued and only the location of the user needs to be updated. To reduce communication latency, this information is replicated at the local servers at a nodal level and updated on occurrence of a cache-miss. It is easy to envision a hierarchical model where a centralized name server branches into several sub-name servers which are independently responsible for naming and addressing disjoint nodes. However, this approach does not scale if the distribution of users is uneven among the nodes.
{\bf 2. DHT-based Model:} Nodes obtain an identity from a centralized name server as discussed in the previous approach. However, all other functionality required by the node are provided by a cloud controller chosen based on a predefined hash function. These cloud controllers are located in data centers nearest to them ensuring the presence of high bandwidth links between each other. Combined with a central name server, these cloud controllers collectively form a DHT for managing identities and application level data storage. This DHT-based model used by several authors \cite{wire,seattle} deals with failures and provides faster access even when there is a skew in users between different nodes by evenly dividing storage and processing.
{\em Intermittency aware lookup:} As explained earlier, the VC-ISP architecture provides an eventually consistent view of the entire name space to the local server at a nodal level. If a client requires information of another, it first contacts the local server of the node it currently is in. On occurrence of a cache-miss at this node, the required information is retrieved using suitable cache-update protocols \cite{puzak1985analysis} in a lazy manner. In the absence of a backhaul to the central name server, information at the local server at the nodal level is zonally consistent. As with the name server hierarchy, we define a {\em zone} to be a set of smaller nodes that are downstream a larger node, including the larger node. This suggests the existence of a functional communication link between the larger node and all its downstream peers despite the intermittence, a feature possible because of support provided by OpenBTS and the geographic proximity of various nodes in the zone. One can imagine a zone to comprise of smaller villages where each village has a node of its own.
\subsection{Seamless User Experience}
\label{subsec:seamless}
In both of the above discussed models, naming and addressing information is cached at the local servers at each node. Though not complete, caching ensures a reduction in communication latency in the case of lookups, ergo improving the end-user experience.
{\em Interoperability:} It is crucial for the architecture to support the following: (a) communication within the VC-ISP, (b) communication across VC-ISPs, and (c) communication between VC-ISP and non-member networks (in both directions). Communication with the architecture is explained in previous sections, where information obtain from the combination cache hits and misses on local servers and the centralized name server suffice to locate a given identity and ensue communication. Communication across VC-ISPs necessitate a federation manager, an entity responsible for aggregating both name and addressing information across all VC-ISPs. At the expense of a lookup to this manager, members of a particular VC-ISP can locate those at another VC-ISP. In our current hierarchy, the federation manager is at a level above the cloud controller and central name server so as to provide it a better view of the organization below. To better understand the third case, consider a scenario where a client with a global identity wishes to contact someone outside the node who is not part of the VC-ISP i.e a contact in a non-member network. On entering the contact's information, the identity management system in the local server generates a cache miss. A subsequent check at the central name server also results in a miss as the contact's naming and addressing information belongs to a third party telecommunication organization. On observing both misses, the local server redirects the communication request to the cloud server, which further forwards this request to the VoIP service provider from whom the global identity was purchased. It is now the responsibility of the service provider to appropriately route the communication request. Thus, any client with a global identity can communicate with a contact outside the VC-ISP architecture without entering any additional information and vice-versa. It is important to note that clients with local identities can effectively communicate with other clients within the VC-ISP using a similar mechanism of cache and central name server lookup to locate the address of an identity. The key difference is that the calls are routed within the VC-ISP architecture using OpenBTS and not a VoIP service provider.
{\em Mobility:} The entire VC-ISP architecture is designed to extend coverage at the existing boundaries; we do not anticipate mobility in great frequency and displacement. Thus, the zonally consistent view of the name (and addressing) space and facilitates moderate mobility within the zone without the expense of dropped communication. However, larger amounts of displacement coupled with lazy synchronization (eventual consistency) require communication buffer at a nodal level to ensure correctness.
\subsection{Uniqueness}
\label{subsec:unique}
Though local servers at the nodal level have some degree of administrative autonomy, only the centralized name server issues identities to all nodal clients to avoid naming conflicts. The central name server produces identities sequentially in the order at which it receives the requests. Though the generation of an identity comes at the expense of an additional hop to the central name server, this cost is amortized as the information is eventually replicated and cached in the local server at the nodal level, subsequently minimizing communication latency as well. Standard cache population algorithms are used to ensure the freshness and efficiency of the local cache. This uniqueness in naming is essential to ensure calls and messages are routed to the correct destination.
\section{Implementation}
\label{sec:implementation}
In this section, we describe in greater detail how we implement different parts to evaluate performance of the VC-ISP system.
\subsection{Cellular And VC-ISP Simulator}
\label{subsec:cvsvc}
We simulated a 3-level VC-ISP hierarchy in Python, to compare and contrast performance with conventional cellular networks in the case of random failure events. The first level in our hierarchy was the cloud controller, which is assumed to never fail. The second and third levels are regular nodes (VCNs).
{\em Simulation Procedure:} The nodes at second level contribute 60\% of the simulated traffic, while the nodes at third level makeup the remaining 40\%. At periodic time intervals, random failure events occur, comprising of link failures between the two nodal levels or link failures between a node and the cloud. Thus, we are able to estimate the traffic that is dropped because of the corresponding failure event and the component it affects. Using Monte Carlo simulations, we are able to plot the average amount of failed/dropped traffic. This experiment is repeated after varying the number of nodes in various levels of the hierarchy. In the case of conventional cellular networks, it is assumed that the serving gateways and packet gateways are located in the cloud, and that the traffic is a value proportional to the total number of nodes.
In addition to this simulator, we also implemented the two identity management models to compare them across the time taken to converge in issuing identities with different volumes of user activity. We have created a 10-node AWS deployment with nodes in different geographic localities to simulate multiple cloud controllers. The locations of the AWS datacenters include California, Oregon, Virginia, Singapore, Frankfurt, Sydney, Tokyo, Ireland and Sao Paulo. Each of the nodes run a Python-based HTTP server, and HTTP \texttt{GET} requests are used to simulate inter-node communication.
\subsection{Three Node VC-ISP}
\label{subsec:3node}
We built and evaluated a VC-ISP with three nodes, located in Kumawu (Ghana), New York City (USA ) and Abu Dhabi (UAE). Furthermore we also built a relatively stable backhaul for the node in Ghana using signal boosters. The cloud component of all applications was implemented on an AWS node located in Frankfurt (Germany). The implementation details of each of the aforementioned components is given in greater detail below.
\noindent{\bf 1. BTS Nodes:} We used two hardware platforms as Base Transceiver Station (BTS) nodes. The first was a 1 Watt RapidCell from Range Networks \cite{range}, and the second was a 10 mWatt USRP B100 from Ettus Research. We positioned one USRP B100 BTS in Abu Dhabi, another in New York, and finally positioned the RapidCell in Kumawu. We modified the OpenBTS software, specifically the peering module to enable our implementation of white space detection and usage. This modified version of OpenBTS was run on all the BTSs along with smqueue and sipauthserve which deal with SMS and user authentication respectively. Freeswitch PBX was used for routing calls, messages and data.
We placed a PC next to the BTS setup and refer to it as the local server. This PC hosted the local component of all the applications we support. It is important to note that even without this PC, the OpenBTS combined with smqueue, sipauthserve and Freeswitch is able to provide the functionality of a VCN. As a local component of the IVR application, we deployed an Asterisk PBX on local server to which all the calls coming on IVR system were routed. The local server was also running an HTTP-based marketplace and the mapping server, the respective local components of the corresponding applications. All these applications were written in Python.
\noindent{\bf 2. Cloud Controller:} We use an AWS EC2 instance hosted in Frankfurt as the location is roughly equidistant from New York, Abu Dhabi and Kumawu. The instance had a memory of 1 GiB and was allocated a single vCPU. Our EC2 instance was running Ubuntu 14.04, and all application support on the cloud is written using Python. The specs of the instance suffice for application support as the require minimal processing. The instance is primarily used as a persistent store.
\noindent{\bf 3. Applications:} We conducted experiments with our three applications running simultaneously to ensure simultaneous liveliness in primitive functionality. For the purposes of discussion, let us focus on the marketplace application. To test its local and cloud component, we built an Android application that enables phones to automatically \texttt{SELL} and \texttt{BUY} items in a periodic manner. We had 4 phones sending \texttt{SELL} messages and 3 phones sending \texttt{BUY} and \texttt{SEARCH} messages. 5 of the 7 phones were connected to the BTS in Ghana and the others were connected to the BTS in New York. Calls made manually and script generated data were both routed to the server to increase its processing.
\noindent{\bf 4. Directional Cellular Backhaul:} We built and evaluated a directional cellular backhaul in Ghana and used that to connect the Ghana VCN to the IP network. We used Phonetone K3B0918217CLB kit which comprised of a 10 db directional receiving antenna, 9db indoor panel antenna and 70db analogue booster able to work in 900/1800/2100 MHz GSM bands. In New York, we used a zBoost ZB545X signal booster and a zBoost CANT-0042 wide band directional receiving antenna.
\subsection{White Spaces-Based Deployment}
We modified the peering component of OpenBTS to add duplicate IPs as neighbors. We then intercept the messages being sent to the peers and bypass the checks to update the neighbors database with fake neighboring base stations. We read the channels to scan from a file on disk that has been populated by our Measurement Report scanner. Once the fake neighbors are successfully set, we wait for the base station to send the new neighbor list out to the phones. Once the phones get the neighbor list they start reporting the energy on the fake neighbor channels. We constantly run \texttt{tcpdump} on the GSMTAP port and intercept all the packets being exchanged between phones and the base stations. For this we modify the code base~\cite{gsmws_code} available by the developers of gsmws~\cite{gsmws}. We present the detected white spaces over the period of one week in the 120 channels in the GSM-900 band and present the results in the next section. We also developed an android application that was given to some volunteer users. This application helped us gather reports frequently by sending SMS between volunteers and the base station. More communication by phones means regular reports are exchanged between phones. We extrapolate from data that our solution of having volunteers outperforms NGSM in the next section.
\section{Deployment}
\label{sec:deployment}
Before delving into a greater depth of technicality, we first describe our real-world VC-ISP deployment. This deployment utilized 3 VCNs, located in New York (USA), Kumawu (Ghana) and Abu Dhabi (UAE). All nodes run a modified version of OpenBTS \textcolor{red}{modified to reflect what?}. The node in Ghana had transmission power of 1 Watt, while the nodes in New York and Abu Dhabi where much smaller. Our VC-ISP supported primitives for deploying SMS, call and data based applications. These include an SMS-based marketplace, an interactive voice response (IVR) based social network application, and a data sensing application. All the applications were hosted at the edge i.e. at node + local servers, and nodes communicated with each other using a smart bandwidth management layer to effectively utilize the available capacity. We describe the VCN setup in Kumawu in greater detail.
\subsection{VCN At Kumawu}
\begin{figure}
\centering
\includegraphics[scale=0.2]{PowerGraph.pdf}
\caption{State of battery attached to solar panels, corresponding to weather conditions while running the base station over a week}
\label{powergraph}
\end{figure}
\begin{figure}
\centering
\includegraphics[scale=0.2]{picture.pdf}
\caption{The picture of deployment, showing the directional backhaul antenna, omni-directional base station antenna and solar panels}
\label{deployment}
\end{figure}
{\bf Background:} Kumawu is a small neighborhood 2 hours away from Kumasi, one of the largest cities in Ghana. The two major cellular providers in Kumawu are MTN and Airtel. Based on our measurements, we concluded that MTN had reasonable coverage in most parts of Kumawu, but not in the peripheries. On the other hand, Airtel had coverage (including 3G) only till the mid town, only 2.5G services were available from Airtel beyond that point.
{\bf Deployment Specifications:} The node at Kumawu was deployed at the edge of existing coverage i.e. approximately 500 meters away from Airtel's 3G coverage boundary. We constructed a cheap and low-cost backhaul for our VCN using an omni-directional receiving antenna. This enabled us to catch the weak 3G signal available 500 meters away, and redirect this weak signal to an analogue signal repeater to amplify. We then pass the signal to an indoor antenna where a phone is used to receive the signal and provide tethered internet to the earlier defined local server. This server is responsible for communicating with the cloud controller and other VCNs. Figure~\ref{deployment} shows various components of our deployment in Ghana, including the directional antenna. In \S , we present evaluation of our DIY backhaul.
Our base station unit had a 1 Watt transmission power and was manufactured by Range Wireless \cite{range}. The coverage range of base station is dependent on several environmental factors, with the advertised coverage radius of 1 to 7 kilometers. Our area of deployment was hilly and we mounted the antenna relatively low, therefore in our experiments we measured coverage diameter was over 1 kilometer.
{\bf Preliminary Observations:} We made the following assumptions with regards to the power consumption and mobility of our deployment.
\begin{itemize}
\itemsep-0.23em
\item In spite of having a coverage range comparable to cellular base stations in metropolitan areas, our base station had reduced power consumption. The low power profile of the apparatus used enabled us to power the base station using solar panels of capacity 1 KW. Figure~\ref{powergraph} shows the state of battery attached to solar panels and the corresponding weather conditions across that week.
As expected, the rate at which the battery charges is highly dependent on the availability of sunlight. This rate, however, is moderate even in cloudy and overcast conditions. Though failures are expected if the overcast conditions persist, the intermittent grid power can be used that to recharge the battery in such cases. The power consumption of the base station itself is a few Watts \textcolor{red}{how many exactly?}, while the complete setup, consisting of signal booster, local server and base stations never exceeded 300 Watts.
\item It can be seen in Figure~\ref{deployment} that the omni-directional antenna and solar panels are not excessively large, unlike those at a few conventional base station sites. Additionally, these solar panels are mounted atop a trolley to provide mobility. Thus, these deployments can easily be taken to rural areas and quickly deployed. These portable, mobile deployments can also be very useful in case of natural disasters \cite{rescue_base_station}.
\end{itemize}
\section{Evaluation}
\label{sec:eval}
\begin{figure}
\centering
\includegraphics[scale=0.3]{figures/call-gca-cca-constant-failure-rate}
\caption{VCISP vs Conventional Cellular}
\label{vcisp_vs_cellular}
\end{figure}
\begin{table}
\centering
\begin{tabular}{|c|c|}
\hline
Metric & Definition \\
\hline
VCE & VC-ISP Call Error \\
CCE & Cellular Call Error \\
VSE & VC-ISP SMS Error \\
CSE & Cellular SMS Error \\
VDE & VC-ISP Data Error \\
CDE & Cellular Data Error \\
\hline
\end{tabular}
\caption{Metrics used in Figure~\ref{vcisp_vs_cellular} and their definitions. }
\label{tab1}
\end{table}
In this section we evaluate the performance of VC-ISP along four dimensions, namely: (a) performance of the naming and addressing subsystem in comparison with conventional cellular, (b) application quality and reliability, (c) performance of the white spaces detection subsystem, and (d) performance of the signal booster based backhaul.
\subsection{VC-ISP vs Cellular}
\begin{figure}
\centering
\includegraphics[scale=0.3]{figures/box_combined}
\caption{Latency for issuing identities: Single server vs 10-node DHT}
\label{server_client}
\end{figure}
We discuss the results of the implementation in \S \ref{subsec:cvsvc}, where figure~\ref{vcisp_vs_cellular} contrasts VC-ISP and conventional cellular networks. The latter have serving gateways and packet gateways far from the actual base stations. Once the link to the base station is down, they become useless. In the analogous case, while the link between the cloud controller and the node is down, the node continues to provide local access. Therefore VCE, VSE and VDE values are always lower than their corresponding cellular counterparts. This general trend suggests that lower error rates are a consequence of a larger number of sites and users. This increases the total calls, ergo reducing the impact of a single failure (simulated within each time interval).
\noindent{\bf Identity Management:} The box and whisker plot in figure~\ref{server_client} compares the client-server model to the DHT-based model in terms of issuing a new global identity to a user. Issuing a new global identity entails issuing a serialized HTTP query to Nexmo. In the DHT-based model, the requests were generated by multiple processes in the node at Frankfurt while other nodes were responsible for processing the request and forwarding it to Nexmo. A synthetic hash function evenly divides the requests to the corresponding nodes that process it, without any location bias. In the client-server model, similarly generated requests were both initiated and responded to by the local host server on the Frankfurt node. It can be seen that the DHT outperforms the single server, even when the number of users is low. This is true as the cumulative processing power in a 10-node DHT exceeds that of a single node server.
\subsection{Service Quality and Reliability}
\begin{figure}
\centering
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.16]{figures/cdf_sms_times_rapid}
\caption{Ghana}
\label{ghana_cdf}
\end{subfigure}
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.16]{figures/cdf_sms_times_lappy}
\caption{New York}
\label{ny_cdf}
\end{subfigure}
\caption{CDF of time it takes for the different functions in the Marketplace application}
\label{cdf}
\end{figure}
\begin{figure}
\centering
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.16]{figures/cdf_sms_vs_file_post_times_lappy}
\caption{}
\label{_cdf}
\end{subfigure}
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.16]{figures/post_complete_times_rapid}
\caption{}
\label{_queue}
\end{subfigure}
\caption{CDF of time taken for the different functions in the marketplace application}
\label{smsvsfile}
\end{figure}
We report the performance of the marketplace application in Figure~\ref{cdf}. The graph above shows the end-to-end latency between the local server and cloud controller for the \texttt{BUY},\texttt{SELL} and \texttt{SEARCH} operations. It is important to recall that the \texttt{SELL} operation translates to the \texttt{SLOWPUT} primitive, while \texttt{BUY} and \texttt{SEARCH} translate to \texttt{FASTGET} and \texttt{FASTSEARCH} primitives respectively. It can be observed in Figure~\ref{ghana_cdf} that \texttt{BUY},\texttt{SELL} and \texttt{SEARCH} operations cause nearly the same end-to-end latency. However in Figure~\ref{ny_cdf}, there is a clear distinction between the performance of \texttt{SELL}, compared to \texttt{BUY} and \texttt{SEARCH}. This is expected because \texttt{SELL} requests are queued and processed in a lazy manner. This distinction is not visible in Figure~\ref{ghana_cdf} as that the bandwidth between cloud and local server is low, consequently increasing latency for both \texttt{SELL} and \texttt{BUY}.
\noindent{\em SMS or File?} Files are typically produced by voice-based or sensing-based applications. Figure~\ref{_cdf} shows the CDF of time it takes for different \texttt{SLOWPUT} requests on the New York-based VCN. Figure~\ref{_queue} shows the queue and how requests are processed for the \texttt{SLOWPUT} primitive for the VCN in Ghana. Figure~\ref{smsvsfile} shows that SMS-based applications will work faster than the file based applications as they are smaller than files. It also shows that file based applications can slow down the SMS-based applications. This is true as both are placed in a common queue for processing, and servicing larger files is more time consuming than servicing smaller SMSs.
\noindent{\em Backhaul Performance:} Using the boosted backhaul, we are able to produce a signal gain of approximately 20 Db in New York. In Ghana, we were able to capture the 3G signal and improve bandwidth significantly. In Figure~\ref{airtel} and Figure~\ref{att} we present the performance of the signal booster based backhaul in New York and Ghana, where the bandwidth gain in TCP and packet loss and jitter improvement in the case of UDP (both measured using \texttt{iperf}) is plotted against trial numbers. The bracket next to each point in the graph shows the average measured \texttt{RSSI} value. This value was measured using Android phones that utilized the boosted backhaul to the BTS node.
\begin{figure}
\centering
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.22]{figures/airtel_udp_graph}
\caption{UDP}
\label{bandwidth_udp}
\end{subfigure}
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.22]{figures/airtel_tcp_graph}
\caption{TCP}
\label{bandwidth_tcp}
\end{subfigure}
\caption{Performance of Airtel connection with and without boosted backhaul}
\label{airtel}
\end{figure}
The effect of signal boosting Airtel is evident in Figure~\ref{airtel}; we were able to change the transmission rates from EDGE (denoted by E in graph) to that of HSDPA (denoted by H in graph) by capturing the weak 3G signal available in the area. By upgrading, we were able to get significantly more bandwidth as reported by Figure \ref{bandwidth_tcp}. We also reduced the packet loss rate and jitter in UDP as reported by Figure~\ref{bandwidth_udp}. For the New York signal booster results reported in Figure~\ref{att} we observe a significant increase the bandwidth in TCP due to the signal boosters and we also observe a decrease in packet drop rate in UDP. However UDP jitter increases with the use of a signal booster but the overall gains observed for UDP and TCP flows are significant.
\begin{figure}
\centering
\includegraphics[scale=0.3]{figures/Whitespaces_1st_week}
\caption{Used and unused channels over one week in Kumawu Ghana.}
\label{spectrum}
\end{figure}
\subsection{Whitespaces Performence}
\begin{figure}
\centering
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.22]{figures/aa45}
\caption{Energy reported}
\label{channel_value}
\end{subfigure}
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.23]{figures/ab45}
\caption{Frequency of reports}
\label{channel_frequency}
\end{subfigure}
\caption{Channel energy as reported by various measurement reports and frequency of reports at a 5 min granularity.}
\label{channel_info}
\end{figure}
We implemented our whitespaces solution as mentioned above. In Figure~\ref{spectrum} we show the results of our measurements. We show the unused and used channels in the P-GSM-900 spectrum which is made up of 124 channels starting from arfcn 1 and ending at arfcn 124. We choose this spectrum because this was the spectrum in which our device was operating. The results highlight a few important finding: GSM whitespaces are indeed available in rural areas and can be exploited by using the mechanism we explained above.
\begin{figure}
\centering
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.22]{figures/ngsm_simulation_0point1}
\caption{}
\label{0point1}
\end{subfigure}
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.22]{figures/ngsm_simulation_0point2}
\caption{}
\label{0point2}
\end{subfigure}
\caption{CDF of time it takes for the different functions in the Marketplace application}
\label{ngsm_vs_us}
\end{figure}
Figure~\ref{channel_value} shows in chronological order the various readings over the period of approximately 4 hours. Figure~\ref{channel_frequency} shows for the same channel the plot of how many reports were received every 5 minutes. These two graphs highlight the fact that there is a constant need for sensing the channel because even for such channels which are clearly being used by a neighboring base station there are a significant number of reports telling that the energy on channel is zero (the horizontal line at y=0 in Figure~\ref{channel_value}. While analyzing other channels we observed that it can take hundreds of zero energy packets and several minutes before a packet reporting a positive energy on a channel is received. There can be many possible reasons for this. One possible reason is that the overlap radius is very small and the mobile device is only able to see energy on a channel for very small amount of time. Because of this we argue for having some phones as volunteers in the area who install our android based application in them. The application keeps sending sms in the background to other volunteers and the base station. This results in a rather constant stream of Measurement Report packets. Similarly we increase the radius of coverage (transmission power) of our base station slowly if we have no knowledge of the available channels in the area. So that we can get some time to sense the channel and identify even the most weak interfering signals.
Based on the reports data we collected with and without the volunteers we estimated the rates at which measurement reports are received at the base station with and without volunteers. We then also calculated the number of packets it takes in the worst case to identify the energy of the channel based on our data points. This is important because users(phones) are constantly moving and can take some time to report the channels back. This can result in several packets reporting zero energy on a channel that is potentially being used by someone else. We then use this knowledge to simulate how long it takes NGSM~\cite{gsmws} to discover whitespaces among a particular set of channels as compared to how much time our solution takes with the help of volunteers. We present the results for this in Figure~\ref{ngsm_vs_us}. The x-axis of Figure~\ref{0point1} and Figure~\ref{0point2} show the number of active users. The number of channels scanned at each data point is the same as the number of users. The y-axis shows the number of minutes it takes for us to scan the channels. It can be seen that our volunteer based method performs better than NGSM where there are no volunteers. The volunteer to user is 0.1 in Figure~\ref{0point1} and 0.2 in Figure~\ref{0point2}.
\section{Applications}
\label{sec:app}
\textcolor{red}{Talal: I am largely satisfied with this section's contents. The only problem for me is that it has not been properly motivated. We need to probably motivate for it a little bit. To me this section needs to be articulated as an advantage we get for choosing VC-ISP architecture over conventional cellular. Also to answer the question how does a VC-ISP work for applications. }
In this section, we highlight the application primitives we built that enable distributed and highly available applications atop the VC-ISP. However, supporting such applications in a conventional cellular network requires deployment of application level code after the packet gateways (P-Gateways). This is intractable as the latency between a mobile phone and packet gateway can be 100 ms or more. In our architecture, each application leverages the software processing capability at the extreme edge (local servers), consequently dividing it into a local component and cloud component. With the help of our application primitives layer and packet routing ability at the base station we are able to deploy applications very close to the users. We encapsulate network management in application level primitives to help facilitate intermittency awareness. This can help reduce the latency and better manage the backhaul.
\subsection{Primitives}
\label{subsec:prim}
The main focus of primitives is to enable the applications to choose between consistency and availability. Since most VCNs are located in low-BDR regions we achieve partial availability by dividing each application into a larger local component and a smaller cloud component. The local component of the application ensures that significant processing is achieved locally. This ensures partial application responsiveness by keeping local communication and interaction functional even in the absence of the low-BDR backhaul link (\S \ref{subsec:ft}). The cloud component is mainly responsible for saving application data and facilitating interaction amidst local components across VCNs. The lack of programmability in conventional cellular networks forces application deployment extensively in the cloud. This means that failure of a backhaul link between the base station and cloud inhibits access to even basic applications like calls and SMS. These primitives we designed hide the internal implementation of the components discussed in \S \ref{sec:opp}, and include:
\noindent{\texttt{1. SLOWPUT(Identity i, Type t, Data d)}}:
\noindent{This primitive is used by the local component for {\em lazy} communication with the cloud component. Particulars include a user \texttt{i} communicating marshalled data \texttt{d} for application \texttt{t}. This operation is lazy because data may not be immediately sent after the primitive is executed; the local server determines the right order to send the data based on bandwidth availability and priority (based on \texttt{t}) of the other requests in the queue. The \texttt{SLOWPUT} primitive is used by applications for which the local component can provide availability at the expense of strong consistency. For example if someone is just try to send an e-mail from VCN $A$ to a user connected to VCN $B$, any inconsistency in the ordering of e-mails at receiver is tolerable.}
\noindent{\texttt{2. FASTGET(Identity i, Type t, Data d)}}:
\noindent{This primitive is used by the local component of any application to send and receive data from the cloud component in an {\em active} manner. The particulars include a user \texttt{i} communicating data \texttt{d} for application \texttt{t}. This primitive is usually called as a result of an application function when consistency and response time can not be compromised. The communication is not queued, as in \texttt{SLOWPUT} primitive. Instead, this primitive is executed instantaneously, provided the the backhaul link is active. For example, any inconsistencies in the case of a banking transaction are grave, and an interactive response is required almost immediately. Such applications require the \texttt{FASTGET} primitive and marshall the transaction in the data parameter, forwarding it to the central component of the banking application.}
\noindent{\texttt{3. FASTSEARCH(Identity i, Type t, Data d)}}:
\noindent{This primitive is used by the user \texttt{i} to search for data \texttt{d} of a particular application type \texttt{t}, and returns one or more data points based on search from the cloud component's data store. The communication encapsulated by the \texttt{FASTSEARCH} primitive occurs instantaneously. The \texttt{FASTSEARCH} primitive executes a read operation on the persistent storage of the cloud component, therefore it can be performed even if a \texttt{FASTGET} operation has a write lock. An example use-case of the \texttt{FASTSEARCH} primitive can be to search in the data store of cloud component while a user is on hold with an IVR-based application, and is expecting a response on a read query.}
\subsection{Examples}
\label{subsec:example}
In this subsection, we give the examples of applications that we built for developing regions using the primitives discussed above. In particular, we highlight how a functional division is made to identify the functions that require consistency to those that require availability.
\subsubsection{P2P Transactions}
The application provides a text-based interface (running on top of the SMS service) and enables traders to provide customers the price and quantity of a commodity (usually crops) they wish to sell. It also enables customers to search for a particular commodity, the price at which various traders are selling, and to place a \texttt{BUY} request. The \texttt{BUY} request leads to exchange of contact information between transacting parties, and is logged as a \texttt{SELL}. The text-based interface requires small phrases to commence transactions.
The heart of the application's local component is the \texttt{ReceiveHandler}, which uses the above defined primitives to communicate with the cloud component. The lazy \texttt{SLOWPUT} is used send the data to the server, on sale of a commodity. In case the user is interested in purchasing a commodity, \texttt{FASTSEARCH} is used, and the data returned is sent to the user over one or more text messages.Relevant data is marshalled by the local component into the \texttt{info} variable. The cloud component is responsible for any subsequent unmarshalling.
\subsubsection{IVR-Based Social Media}
This application enables users to interact with the system by pressing numbers on the phone's keypad. It enables users to leave a message, or to listen to a message left by others. For the Ghana VCN, the application provided an option to either use English or Twi, the local language in the region. The key function is thel \texttt{ReceiveHandler} at the local component, which is invoked using a HTTP request on entering the IVR extension. After the initial HTTP request, the call is bridged from base station to the Asterisk IVR server running as the local component of application. The Asterisk server logs each input of user as entered. If the user is recording a message, the \texttt{ReceiveHandler} is executed after its completion. The \texttt{ReceiveHandler} uses the lazy \texttt{SLOWPUT} primitive to send the recorded file to the cloud component. In case a person wants to listen to a message, the function first checks if the validity of the session. If the session is valid the message is played locally. Otherwise \texttt{FASTSEARCH} and \texttt{FASTGET} primitives are used to search and fetch the most recent message from the cloud component, while the user is on hold.
\subsubsection{Distributed Data Gathering \& Sensing}
The purpose of the application was to collect data on farms and crops grown. The application provides an interface to create the map of any farm by walking along its edge. This data is sent to the local application component, an HTTP server next to the base station. The local component then uses \texttt{SLOWPUT} to upload this data to the cloud component. Our choice in primitive is valid as the application does not require strong consistency and we can afford to have unordered data at the cloud component. This application is relatively simple because data only needs to be uploaded to the cloud component of the application, and there is no need for downloading data.
\section{Motivation}
\label{sec:motiv}
\textcolor{red}{Talal: This text probably needs to go away because we need the space we are wasting on this and intro is covering this stuff. We can probably move the useful figures above if we want}
In this section, we try to explain the plethora of problems faced by developing countries when it comes to connectivity. We focus on 4 problems in particular which motivate our design decisions.
\subsection{Latency And Bandwidth}
Web access in developing countries is slower when compared to the rest of the world \cite{akamai}. One would believe that these issues persist due to the growing disparity between infrastructural support and page complexities where the latter far outgrows the former \cite{klotski}. However, Accra the capital city of Ghana which is well connected by undersea cables~\cite{cable} continues to experience high latency~\cite{yasir_imc}, suggesting the problem lies elsewhere. A recent study \cite{yasir_imc} shows that for various traces from different locations in Ghana, DNS lookup is one of the major factors (nearly 37-47\% ) for high user-perceived latency. Similar findings have been made by other studies in developing countries \cite{koradia2013first,chetty2013measuring}. This high DNS lookup time has been attributed to the uneven distribution of DNS name servers around the world. This highlights the fact that the location (and quality) of resources and services can have a huge impact on user perceived latency.
\subsection{Cellular Coverage}
As mentioned earlier in \S 1, an estimated 1 billion people live without cellular coverage worldwide. This lack of coverage is primarily due to low population densities in these areas which translates to lower profit margins for commercial providers. Data indicates that the cellular coverage of regions in Panama directly correlate to its population density.
This absence of cellular connectivity plagues regions with further economic recession \cite{jensen2007digital,aker2010mobile}.
\subsection{Application Diversity \& Support}
In recent years, deployment of small scale community based VCNs \cite{kurtis_ictd,anand,zheleva,rhizo} have come to prominence. These deployments stemmed from the growth of interest around new software \cite{openbts} and hardware \cite{range,endaga}. Though they assuage the connectivity issues, they only focus on providing the very basic cellular functionality. Additionally, Internet access in most of the rural areas is mostly through mobile phones connected to conventional networks. Studies have shown that people are cautious of data usage because of the cost associated with it \cite{blah}. Naturally, mobile applications that are both cost-efficient and beneficial to the daily needs of the inhabitants are more preferred \cite{dalvitdata}. Thus, the needs of such community members are twofold: (a) reduced bandwidth consumption and (b) the need for useful, relevant applications.
For routing and fine-grained packet processing, conventional cellular providers rely on specialized and proprietary devices for extensive processing at the core. This also implies that they don't have a chance to choose between different capabilities from different providers to mix and match hardware~\cite{chiosi2012network,jin2013softcell}. Thus, the brittle architecture of commercial cellular networks adds several overheads which come at high financial and temporal costs. To elaborate, if a community wants a small sensor application to collect mapping data related to farms, the application server has to be deployed within a data center inside the cellular network or somewhere in the cloud. This will additionally increase the latency (temporal costs) and create a routing overhead between the small community to the server. More often than not, this mammoth infrastructure (and associated financial costs) is not required to service such trivial applications.
\subsection{Power Infrastructure}
\begin{table}[h]
\begin{center}
\begin{tabular}{|l|l|}
\hline
Grid Power not available (hrs) & Percentage of sites \\ \hline
$0 < x < 2$ & 11.2\% \\
$2\leq x < 5$ & 22.0\% \\
$5 \leq x < 10$ & 48.0\% \\
$x\geq 10$ & 18.8\% \\ \hline
\end{tabular}
\end{center}
\caption{The distribution of power outage across sites. $x$ denotes the number of hours grid electricity was not available.}
\label{tab:poweroutages}
\end{table}
The 2014 Africa energy outlook report states that 620 million people live without electricity in sub-Saharan Africa \cite{outlook}. This leads to unrest among conventional cellular network providers who have to additionally invest to provide the required power infrastructure for even trivial operation. A single GSM base station could consume anywhere between $5-10$ kW in urban areas with lower power levels and $10-20$ kW with higher power levels \cite{basestationpower}. Even when available, the grid electricity is highly unstable. According to a cellular provider in South India, the voltage can fluctuate between -1000 V and +1000 V causing device failures \cite{blah}. Table~\ref{tab:poweroutages} reflects the power availability based on data obtained from a cellular provider in South Asia. This data is from over $1000$ sites within a region for a single day in $2014$. The first column in the table is the duration of grid failure and the second column is the percentage of sites that faced it. It is worth noting that nearly $19$\% of the sites faced over $10$ hours of grid failure related issues. To compound issues, these failures can sometimes last across days. This leads to a heavy dependence on Diesel powered generators to provide {\em reliable} cellular services in developing countries \cite{ahmad2015solar}.
\subsection{Usable Spectrum}
All wireless communication signals travel over the air via radio frequency (or spectrum). Government agencies such as the Federal Communications Commission (FCC) license (or allocate for usage) specific slivers of the available spectrum to conventional carriers. GSM Whitespaces are defined as the licensed spectrum that is unused in a particular geographic area by these conventional carriers \cite{gsmws}. Though licensing happens at a fine-grained level, whitespaces are common as the entire chunk of allocated spectrum is not required for providing the required functionality. Thus, any under served area is guaranteed to have an excess of unused spectrum in all GSM bands.
\section{Introduction}
Cellular networks have achieved significant penetration levels in developing regions in the past decade. However, much of this growth has been predominantly urban-centric with relatively low rural presence~\cite{wildnet,2P,litmac,delaycheck,beyond,heimerl}. The existing cellular connectivity model is not economically viable for rural settings due to a multitude of fundamental challenges in rural contexts:
{\bf Power:} Rural regions lack stable and reliable grid power. Cellular networks are inherently power hungry in rural settings (to blanket large areas) and often rely on diesel-powered generators for power, which is a highly expensive proposition~\cite{ahmad:ictd15}. Staggeringly, the second largest consumer of oil in India is the telecommunications industry~\cite{trai}.
{\bf Lack of Financial Incentives:} While cellular networks incur high capital and operational expenses, the demand often does not match the
cost due to low user-densities and low purchasing power. For years, low demand and high usage costs have been locked in a vicious cycle.
Recently, Bharti Airtel and Reliance Communications, two of the largest cellular service providers in India, announced their interest to pull out of rural markets due to unfavorable economics~\cite{bhartiairtel}.
{\bf Lack of reliable backhauls and data services:} Data connectivity is largely absent in rural settings; where connectivity is available, options are generally restricted to voice and SMS messages~\cite{hermes, smarttrack}. Backhaul This has been a roadblock to the introduction of new data-driven services.
{\bf Reliability:} Maintenance of rural wireless networks is very hard due to a myriad of reliability problems, power-related problems and lack of local expertise to fix them. Lack of clean power is known to trigger frequent device failures in rural networks~\cite{beyond}.
\textcolor{red}{Talal: It is pertinent to mention the rigidity of the cellular architecture here. In particular we need to focus on the identity management in conventional cellular networks so that we can make a strong case of our new identity management (we have a whole section on this). Also we need to mention the architecture of cellular network because we have to talk how our services are deployed close to the edge.}
In this paper, we present the design, implementation and deployment of {\em Virtual Cellular ISPs (VC-ISP)}, a new ground-up cellular network
architecture that enables third-party vendors to offer cellular coverage and mobile services in rural areas in an extensible manner. The basic building of the VC-ISP network architecture is a Virtual Cellular Node (VCN) which are open, programmable cellular base station platforms~\cite{range, openbts, openradio, softcell} that enable easy deployment of low-power software defined base stations that function effectively over an IP backplane. Given that VC-ISPs are designed for areas with limited cellular coverage, the second building block of the VC-ISP model is the use of highly directional backhauls to extend backhaul connectivity to the VCNs; here, we show how one can easily design such backhauls to achieve reliable, high bandwidth IP connectivity to VCNs even in areas with relatively negligible coverage.
The VC-ISP network architecture builds upon on existing work on community cellular networks\cite{kurtis_ictd,zheleva,anand,rhizo} which can be viewed as stand-alone installations of virtual cellular nodes. In the VC-ISP architecture, we aim to address the following question: {\em How do we enable a distributed and potentially disjoint collection of open, programmable cellular base stations to act in unison as a single virtual cellular ISP?}. Given the lack of incentives for conventional cellular providers to provide rural connectivity, the VC-ISP model empowers third-party providers to act as cellular providers and offer the entire gamut of conventional cellular services including voice, messaging and data. In addition,
due to the programmable nature of individual VCNs, we show how VC-ISPs can provide new forms of distributed mobile edge services where
computation, storage and application state can be moved to the mobile edge.
The design of VC-ISP addresses the following key research challenges:
{\em 1. White Spaces:} VC-ISPs reuses spectrum allocated to cellular operators using a participatory sensing white spaces approach to determine channels and detect conflicts from conventional cellular operators. The white spaces approach also enables co-existence across competing VC-ISPs in a region.\textcolor{red}{Talal: if we claim that VC-ISPs compete we have to provide \\a) an algorithm and workable logistics with sharing of sensing data in a database and \\b) supported evaluation for this. \\ we currently don't have both these things. This is potentially one area we can go deeper into. }
{\em 2. Reliable Backhauls:} In areas which are at the boundaries of conventional cellular coverage (where signals are negligible but existent),VC-ISPs can establish reliable backhauls that can provide several Mbps cellular backhaul bandwidth in areas with near-zero coverage using parallel directionally boosted data links to conventional cell towers. \textcolor{red}{Talal: We don't have any eval to support this particular aspect. I can remember we boosted two links at the same time. The numbers we have eval for a gain in single link. What can we realistically do to prove this? I don't think simulations will be useful at all. We can try to get a multi path tcp thing running, but that requires compiling the multi path tcp kernel and then showing the real throughput. Will this make it a worthy contribution? Part of me tells me people will dismiss it as just a proof of concept because hardware and software are both already there and we don't do anything.}
{\em 3. Identity Management:} To provide Internet and conventional cellular services, VC-ISP supports an identity management layer that {\st{allows different types of authorized end-devices (mobile phones, WiFi devices) to join the network while using their conventional names (mobile phone numbers, WiFi-network user identities) without requiring any modifications to the end-hosts}}. Given that most rural users are not highly mobile, VC-ISP identity management supports limited mobility within a set of neighboring VCNs in a graceful manner but is not designed to support super high mobility users. This layer also allow users and services to discover other entities within the network using their conventional names. We note that the identity management layer of VC-ISP replaces many of the conventional lookup and resolution protocols used in conventional 3G and 4G cellular networks.\textcolor{red}{Talal: We can not connect just wifi devices to our network and not with their names, we can only connect GSM devices. Without a sim card, even the GSM device won't connect. So I don't think we can claim that we allow all wifi devices to connect. We should pitch this as a parallel software based naming addressing instead of a hardware based naming addressing, we have to say that this naming and addressing is fundamentally different from the way identities are in conventional network. We have to argue why this is more faster, fault tolerant, distributed and not dependent on proprietary hardware compared with conventional cellular design. Follow up question again is: is this going to be fundamental enough a contribution to get this paper in. }
{\em 4. Distributed Mobile Edge Services:} Given the edge programmability, VC-ISP provides new application primitives to enable new forms of \st{intermittency-aware}, cloud-controlled, distributed, mobile edge services where every VCN maintains critical application state to enable mobile services to function in an intermittency aware manner in the face of unreliable backhauls and network failures. These services are also {\em distributed} in the sense that users across VCNs can cooperate and run different types of peer-peer applications and community-specific applications. We demonstrate a spectrum of applications that we have built on top of the VC-ISP primitives including P2P transactions, voice-based social media applications, P2P messaging and distributed mobile sensing applications. \textcolor{red}{Talal: What eval should we have for intermittency awareness? And more importantly, what do we claim when we say intermittency-aware applications? Is it the same as in case of failures we perform better... in that case the VCF, CCF eval we have should be enough for this. Although it is all simulation based. I need some clarity on this. I mean above is the only thing that comes to my mind with respect to intermittency awareness }
We demonstrate the effectiveness of the VC-ISP model using a real-world 3-node VC-ISP deployment including a solar-powered cell tower installation in rural Ghana. Our Ghana installation also supports different types of distributed mobile services (as outlined earlier) that have been used by rural users within the community. In addition, we evaluate the effectiveness of specific aspects of the VC-ISP architecture using emulation and simulation experiments. In summary, we believe that VC-ISP represents a radical departure from the conventional thinking of how we design cellular networks and could enable ground-up innovation where several budding rural entrepreneurs could launch competing cellular network services in rural localities while seamlessly co-existing with existing operators.
\section{VC-ISP Architecture}
\begin{figure}
\centering
{
\includegraphics[scale=0.4]{figures/SystemArchitecture6.pdf}
}
\caption{VC-ISP Architecture}
\label{fig:systemArch}
\end{figure}
The VC-ISP is a new model for designing and rethinking the evolution of cellular network providers. The network architecture comprises of a distributed collection of software-defined VCNs powered by emerging open-source cellular base-station platforms that together provide the abstraction of a single virtual network with the entire gamut of features offered by a traditional cellular provider. Using this architecture, we wish to extend coverage beyond existing boundaries, moving a wide variety of services to the extreme edge. The VC-ISP network architecture aims to enable third-party vendors to offer cellular ISP services in a decentralized manner without making any modifications to mobile devices and in cooperation with traditional cellular networks.
{\S \ref{sec:motiv} discusses several motivational factors that influenced the design of the VC-ISP architecture. These factors are relevant to the architecture as it is directly inspired by VCNs. We refer to a single VCN in a VC-ISP as a {\em node} - a programmable, software-defined, local cellular network which can provide the basic suite of cellular services ranging from voice, data and messaging capabilities to connected clients. Conventional cellular networks continue to use highly inflexible and expensive platforms with complex control-plane protocols making the network nearly impossible to configure or manage. On the contrary, programmable platforms such as OpenBTS \cite{openbts} enable us to program and easily integrate a wide range of other middlebox services and functionalities. The strawman architecture is illustrated in Figure~\ref{fig:systemArch}; a distribution of nodes provide access to a geographically disjoint set of regions and collectively provide the abstraction of an unified VC-ISP. We envision all the nodes to be connected to the Internet using various types of backhaul technologies such as wireless backhauls, satellite links, balloons \cite{loon}, leased lines, telephony, fiber etc. Owned by a single party, a centralized cloud controller interconnects all nodes and is in charge of administering this cohesive network. This controller resides at an appropriately placed geographic location to normalize communication latency. To achieve such an architecture, we discuss design specifications and the high level goals we wish to achieve. To summarize, the architecture should be able to:
\begin{itemize}
\itemsep-0.23em
\item {\em Goal 1:} Operate in regions where there is high latency, low bandwidth and intermittency.
\item {\em Goal 2:} Operate in regions where conventional cellular is inaccessible or sparsely available.
\item {\em Goal 3:} Reduce processing at the core and migrate relevant application processing to the edge to further reduce latency.
\item {\em Goal 4:} Avoid placing heavy reliance on conventional sources of power (including fossil fuels).
\end{itemize}
Addressing these goals would require us to tackle several research challenges. The first and foremost challenge involves the exploration of a variety of operational conditions. These introduce research challenges both for handling competition and cooperation between providers. Cellular spectrum is a resource under contention and VC-ISP needs to operate in white spaces not overlapping with the spectrum of traditional providers.
Additionally, majority of developing regions have poor cloud infrastructure and a weak backhaul, resulting in low Bandwidth-Delay Ratio (BDR) regimes. Traditionally designed applications running in these regimes face several issues including frequent timeouts, operational bandwidth insufficiency and various other inconsistencies. Dealing with these issues and obtaining {\em Goal 1} requires rethinking application requirements. Mobile clients are henceforth connected to a {\em local} server placed in the proximity of the base station. This local server has complete autonomy in making decisions for a certain class of events but also abide to directives from the central controller. Therefore, the local server ensures greater responsiveness to the clients. Inconsistencies are avoided by relaxing the consistency guarantees and providing lazy synchronization with the cloud. The VC-ISP will provide a separate intermittency-aware substrate where all messages are tagged with session and communication group specific identifiers that enable nodes to store and deliver messages to the corresponding recipients in a delay-tolerant manner; mobile applications in VC-ISP can also leverage this substrate to specify how to handle application specific messages in an intermittency condition.
Every node in the VC-ISP runs the OpenBTS platform which offers a software-defined cellular abstraction. Being equipped with a software-PBX allows the node to continue offering basic communication services despite the weak backhaul. This is not possible in conventional cellular networks which require multiple components (often located at different locations) to enable a call between users connected to the same base station. However, to improve performance, operate in the extension of existing coverage, and to obtain {\em Goal 2}, we are required to amplify the available signal. Aggregated bandwidth is achieved through the use of directional antennae and parallel boosted links.
A centralized cloud infrastructure provides mechanisms for the now unified (nodal) network to communicate with the non-member networks. This infrastructure comprises of has 2 key components:
\begin{itemize}
\itemsep-0.23em
\item {\em Egress nodes}, which are responsible for forwarding traffic either between VCNs or between VCNs and the conventional cellular network.
\item {\em Lookup and messaging servers}, which play a critical role in enabling the VC-ISP to offer connectivity and a variety of cellular services across nodes.
\end{itemize}
Each node in the network operates independently and communicates with other VCNs using the egress nodes, and the lookup and messaging servers. We partially obtain {\em Goal 3} as the local servers help facilitate this process in most cases because they have a cached version of the naming and addressing table. As these servers also have administrative autonomy, they are able to act on the behest of the centralized controller providing additional services for applications at the extreme edge. Different types of edge services will be explained in subsequent sections.
The modular nature of the various components required to build the VC-ISP ensures minimal power consumption. Therefore, we obtain {\em Goal 4} by predominantly powering the nodes using solar panels. By building a compact, mobile base station unit, we are able to the reliance on the unstable grid power in these regions.
\section{VCN building block}
\label{sec:opp}
\textcolor{red}{
Talal: Rewrite white spaces. Only focus on our solution. And then we need to say why it is different from just a participatory sensory framework adding the database detailed algorithm and how competing VC-ISPs collaborate/compete in the same area will provide coverage. In reliable back haul talk about the sigcomm demo in a little more detail. If the key contribution is that we can aggregate multiple parallel links Operating in areas where there is no signal we have to show aggregation. I don't know how to do that at this point and what is feasable in Ghana. Designed for extended backhaul. One is a boosted backhaul and the other is just a wireless link. When it comes to backhaul. 4.3 in my view is useless and needs to go. }
The two most basic building blocks required for any VCN are a back haul and a mechanism to operate without interfering with the incumbent providers.
\subsection{Detecting White Spaces}
\label{sec:gsm}
Wireless spectrum is auctioned on a regular basis to telecommunication organizations. Though licensed in its entirety, majority of these slivers remain unused in developing regions. The existence of these unused bands of spectrum, collectively called GSM white spaces, has been proved for a remote area in Indonesia, and a system has been built to operate without interfering with the licensed providers \cite{gsmws}. Proposed by Hassan et al., Nomadic GSM (NGSM) \cite{gsmws} safely uses unused licensed spectrum without requiring cooperation or participation from existing license holders. NGSM takes advantage of the fact that GSM handsets continually measure spectrum occupancy in their proximity and report these measurements to their serving cell to aggregate, ergo mitigating the practical impact of the hidden node problem caused by client side interference. However, NGSM has the following limitations:
\begin{enumerate}
\itemsep-0.23em
\item The design necessitates two base stations in the same location, so that active calls in the primary can be moved to the secondary when the primary is collapsed.
\item The secondary base station begins to transmit at full power on a randomly chosen Absolute Radio Frequency channel Number (ARFCN) even before any sensing is done. This can lead to interference with a primary operating in that ARFCN.
\item Often, the status quo in developing regions is the reduced frequency in call or SMS between users. This results in the measurement reports to the serving cell become infrequent. A major consequence is delayed readings, which can further lead to wrongfully using a channel that interferes with a primary license holder.
\end{enumerate}
To alleviate the above limitations, we created a GSM white spaces detection mechanism similar to NGSM. We use is a hybrid of participatory sensing and database approaches where mobile devices measure spectrum occupancy over a larger area in a distributed manner, and share these reports with the serving cell to aggregate. We remediate NGSM's first limitation by not necessitating the presence of two different base stations. Instead, we wait for the connected calls to complete in case it is time to shift to a different channel. Though weaker, this solution is more pragmatic and economically feasible. The second limitation is mitigated by increasing transmission power periodically to slowly expand coverage. This is done while simultaneously sensing for used channels among a list of safe channels. Thus, a small software-defined base station can be installed at any location without examining the spectrum prior, because any interference caused will be at a much smaller radius than compared to a base station transmitting at full power. The final limitation is addressed using a custom mobile application that periodically makes calls and sends messages to the base station. This ensures periodicity, ergo frequency in measurement reports. If a few volunteers in the community run this application, the cost associated with additional calls and messages can be divided across all community members to ensure only a nominal increase in their payments.
\subsection{Reliable Backhauls}
\label{sec:backhaul}
In a hierarchical telecommunications network, the backhaul comprises of the intermediate links between the core network and smaller subnetworks. Cell phones communicating with a single base station constitute a local subnetwork; the connection between the cell tower and the rest of the world begins with a backhaul link to the core of the ISP's network. However, a significant percentage of cellular users suffer from poor signal strength due to a weakened backhaul and the problem is exacerbated in peri-urban areas in developing regions. In the VC-ISP architecture, our focus in on end-users in such small localities who can benefit from increased bandwidth cellular connectivity, especially when the area receives relatively poor cellular signal strength. We devise a strategy such that with minimal effort, one can build effective directional cellular backhauls by aggregating independent cellular connections amplified using signal boosters.
Our solution for signal amplification is orthogonal to the design of various Line of Sight (LOS) and Non Line of Sight Cellular (NLOS) backhauls \cite{tarana,kumu,wildnet}. It involves the usage of a directional cellular backhaul comprising of a directional outdoor antenna, signal booster, and an indoor antenna to provide the amplified signal within a highly constrained area. Specifications for the directional antenna include a set up height of at least 10 feet above the repeater and indoor antenna to minimize interference. The indoor setup aggregates multiple, independent cellular connections powered by their own SIM into a single boosted backhaul. For the results reported in \S \ref{}, we used an zBoost CANT-0042 outdoor directional antenna, connected to a signal booster to a 30-foot long coaxial cable connecting to an indoor antenna. To effectively combine multiple cellular connections into a single directional backhaul link, we use Ubuntu Bonding module \cite{bonding} which provides a method for aggregating multiple Network Interface Controllers (NICs) into a single logical bonded interface of two or more NIC slaves. We discuss the efficacy of this approach in \S \ref{}.
\subsection{Fault Tolerance}
\label{subsec:ft}
Coupled with standard failure scenarios that arise due to the distributed nature of the architecture, failures can exist due to the extreme operational environments. Unlike standard distributed systems where the network is not considered the bottleneck, our network is often unreliable, has high latency and limited bandwidth, and often heterogeneous. Added to the standard failures of hardware and software, these network uncertainties can result in failures of (a) links between the nodes and the cloud, and (b) either local servers, cloud servers, or both. Though unimplemented, we believe that commonly used solutions such as heartbeating \cite{hayashibara2002failure} can be used to check for partitions, whilst weaker forms of consistency provide a fix during reconciliation for the first failure scenario. A suitable transport layer protocol with an adequate TTL period is required in the deliberation of availability against reliability. In case of the second scenario, typically used solutions involve content replication of the local/cloud server to a secondary, the use of a replicated state machine, a Paxos group or any distributed consensus protocol. Naive approaches involving a dedicated log server are not popular as extensive monitoring can cause delays, occupy additional space and potentially interfere with normal operations.
\subsection{VCN Deployment}
\textcolor{red}{VC: needs complete overhaul}
\begin{figure}
\centering
\includegraphics[scale=0.2]{PowerGraph.pdf}
\caption{State of battery attached to solar panels, corresponding to weather conditions while running the base station over a week}
\label{powergraph}
\end{figure}
\begin{figure}
\centering
\includegraphics[scale=0.2]{picture.pdf}
\caption{The picture of deployment, showing the directional backhaul antenna, omni-directional base station antenna and solar panels}
\label{deployment}
\end{figure}
\textcolor{red}{i don't understand how these measurements are made - are we going radially from a central point for both Airtel and MTN?; there is also some additional information provided regarding the measurements made for the deployment - should be separate para}
Kumawu is a small neighborhood 2 hours away from Kumasi, one of the largest cities in Ghana. The two major cellular providers in Kumawu are MTN and Airtel. MTN has reasonable coverage in most parts of the Kumawu but not beyond. Airtel had 3G coverage only till the mid town \textcolor{red}{VC: need to know how you were measuring - radially or otherwise}, only 2.5G services were available from Airtel beyond that point. Our site was located around 500 meters away from the Airtel's 3G coverage boundary. Our base station unit had a 1 Watt transmission power and was manufactured by Range Wireless\cite{range}. The coverage range of base station is dependent on several environmental factors. Our unit had an advertised coverage radius of 1 to 7 kilometers. Our area of deployment was hilly and we mounted the antenna relatively low, therefore in our experiments we measured coverage diameter was over 1 kilometer.
In spite of having a coverage range comparable to cellular base stations in metropolitan areas, our base station had reduced power consumption. The low power profile of the apparatus used enabled us to power the base station using solar panels of capacity 1 KW.
Figure~\ref{powergraph} shows the state of battery attached to solar panels and the corresponding weather conditions across one week while the base station was running on solar power. \textcolor{red}{As expected, the battery's current capacity is highly dependent on the availability of sunlight but is still able to provide decent charge in cloudy and overcast conditions.} Though failures are expected if the overcast conditions persist, intermittent grid power can be used that to recharge the battery in such cases. Note that the grid power was not used to charge batteries in the week shown in Figure~\ref{powergraph}. The power consumption of the base station itself is a few Watts \textcolor{red}{how many exactly?}, while the complete setup, consisting of signal booster, local server and base stations never exceeded 300 Watts.
We built a cheap and low-cost backhaul for the VCN and used a directional receiving antenna to catch the weak 3G signal which was available 500 meters away and send signal to an analogue signal repeater to in order to enhance the weak signal. We then pass the weak signal to an indoor antenna where a phone is used to receive the signal and provide tethered internet to the local server who is responsible for conducting all of the communication with the cloud controller and other VCNs. The directional antenna can be seen in Figure~\ref{deployment}, showing various components of our deployment in Ghana. We present the evaluation numbers for the signal booster based backhaul and show that this kind of a backhaul can be effectively used by millions of people living in areas at the edge of cellular coverage which are often neglected by commercial telcos due to low user base.
It is worth mentioning that the biggest part of our deployment were the solar panels and the omni-directional base station antenna. It can be seen in Figure~\ref{deployment} that the antenna and solar panels are still not excessively large unlike some of the conventional base station sites. Although not visible the solar panels were mounted on a trolley that had wheels and extensions so that they could be connected to a vehicle. In essense this kind of a deployment can easily be taken far into rural areas and can be deployed in an extremely fast manner. This can also be very useful in case of natural disasters wiping infrastructures and can be used for deployment of disaster recovery platform~\cite{rescue_base_station}.
\section{Related Work}
{\bf Software-based microcells:}
Recent advances in hardware and open-source software has made available inexpensive cellular equipment broadly accessible. For example, OpenBTS is an open-source GSM base transceiver station (BTS) implementation which has enabled a wide range of projects aimed towards building small-scale VCNs. Heimerl et al.\cite{kurtis_ictd} demonstrated the viability of independently run, locally operated cellular networks. Similarly, Rhizomatica\cite{rhizo} has deployed several community-run cellular networks in Oaxaca, Mexico with a short-term experimental spectrum license. Zheleva et al.~\cite{zheleva} deployed a similar system for purely local communications in Zambia.
\textbf{Backhauls and rural mesh networks:} The design of GreenLinks builds upon a large body of work across rural wireless networks including Fractel~\cite{fractel}, Digital Gangetic Plains~\cite{inside_out,gangetic,2P}, WiLDNet~\cite{wildnet,beyond}. There has been immense around design of various different Line of Sight(LOS) and Non Line of Sight Cellular(NLOS) backhauls~\cite{tarana,kumu}.
\textbf{Cognitive Radio and GSM whitespaces:} Most of the literature on whitespaces is in the space focuses on TV spectrum, our work is more closely related to work on re-use of cellular spectrum. Sankaranarayanan et al.~\cite{sankaranarayanan2005bandwidth} propose reusing timeslots in a GSM cell for adhoc networks during periods when the GSM cell is lightly utilized. Buddhikot et al.~\cite{buddhikot2009ultra} describe a system for indoor femtocells to dynamically share spectrum with incumbent carriers by operating over ultra wide bands. Yin et al.~\cite{yin_beijing} proposes a similar system and provides measurement results which indicate that unused spectrum (i.e., whitespace) exists even in a dense, urban environment (Beijing). In contrast to these, we focus on reusing GSM whitespaces to provide GSM service by means of macrocells. The only work that recycles GSM whitespaces for reuse by a VCN is NGSM~\cite{gsmws}. Later in this paper we highlight how our approach for doing GSM whitespaces builds on top of NGSM and performs better.
\textbf{Intermittency-aware networks:} Dealing with intermittent failures has been studied in the context of Delay Tolerant Networks~\cite{dtn_routing,seth2006lcc}. One of the first real world DTN deployments was DakNet which provides low-cost digital communication to rural areas using physical transportation links~\cite{pentland2004daknet}. There have been several routing DTN-based routing algorithms like Encounter based
routing~\cite{nelson2009encounter} and MobySpace~\cite{leguay2005evaluating}. \cite{burgess2006maxprop, juang2002energy, chaintreau2007impact} are other works that use DTN centric ``store and forward'' algorithms to progressively forward
messages until they reach their destination.
The intermittency-awareness abstraction of our solution is fundamentally different from the traditional DTN abstractions since GreenLinks is primarily tailored and designed for the cellular network context and primarily focuses on higher application-centric ``store and forward'' abstractions; the DTN routes for messages are preset by the network structure which changes infrequently.
\section{Conclusions}
This paper presents our experience in the design, implementation and
deployment of GreenLinks, a new ground-up platform that enables
intermittency-aware, reliable and available cellular services and
application support in rural contexts under extreme operational
environments with limited power. Greenlinks provides new primitives
for identity management and building new distributed applications to
operate effectively in highly intermittent environments. We present
our experiences building three example intermittency-aware distributed
applications and have used these applications on the ground in a rural
context in Ghana. In addition, to address operational challenges in
Ghana, our implementation supports mechanisms for building incrementally
deployable reliable backhauls and easy detection of whitespaces using
participatory sensing.
\section{Introduction}
Cellular networks have achieved significant penetration levels in developing regions in the past decade. However, much of this growth has been predominantly centered in urban regions, with relatively low rural presence~\cite{wildnet,2P,litmac,delaycheck,beyond,kurtis_ictd}. The existing cellular connectivity model is not economically viable for rural settings due to the following fundamental challenges in rural contexts:
\noindent{\bf Power:} Rural regions lack stable and reliable grid power. Cellular networks are inherently power hungry in rural settings (to blanket large areas) and often rely on diesel-powered generators for power, which is a highly expensive proposition~\cite{ahmad2015solar}.
\noindent{\bf Lack of reliable backhauls and data services:} Data connectivity is largely absent in rural settings; where connectivity is available, options are generally restricted to voice and SMS messages~\cite{hermes, smarttrack}. Backhaul has been a roadblock to the introduction of new data-driven services.
{\bf Reliability:} Maintenance of rural wireless networks is very hard due to a myriad of reliability problems, power-related problems and lack of local expertise to fix them. Lack of clean power is known to trigger frequent device failures in rural networks~\cite{beyond}.
In this paper, we present the design, implementation and deployment of {\em GreenLinks}, a new ground-up cellular network that enables basic communication and provides support for intermittency-aware edge based services in rural contexts. The basic building of the GreenLinks
network is a Virtual Cellular Node (VCN) which are open, programmable cellular base station platforms~\cite{range, openbts, openradio, softcell} that enable easy deployment of low-power software defined base stations that function effectively over an IP backplane. In addition, each VCN requires access to a backhaul link and needs to operate in licensed spectrum band without owning any spectrum. GreenLinks enables a distributed collection of VCNs to inter-operate
as a single cellular network that can offer reliable, available and intermittency-aware cellular edge services to mobile devices. GreenLinks provides a set of identity management and distributed mobile service primitives that enables conventional cellular services and new forms of distributed edge services and mobile applications. This paper makes the following contributions:
{\em 1. Whitespaces detection:} GreenLinks reuses spectrum allocated to cellular operators using a participatory sensing whitespaces approach to determine unused channels in order to work without interference with conventional cellular operators.
{\em 2. Reliable Backhauls:} In areas which are at the boundaries of conventional cellular coverage (where signals are negligible, but existent), we demonstrate how one can use a simple directional signal booster to build a reliable backhaul abstraction using parallel boosted data links between a VCN and a conventional cellular tower.
{\em 3. Identity Management:} To provide Internet and conventional cellular services, GreenLinks supports an identity management layer that different users across VCNs to join the network without requiring any modifications to the end-hosts.
{\em 4. Distributed Mobile Edge Services:} Given the edge programmability, GreenLinks provides application primitives to enable new forms of intermittency-aware, cloud-controlled, distributed, mobile edge services where every VCN maintains critical application state to enable mobile services to function in an intermittency-aware manner in the face of unreliable backhauls and network failures. These services are also {\em distributed} in the sense that users across VCNs can cooperate and run different types of peer-to-peer applications and community-specific applications.
We demonstrate the effectiveness of the GreenLinks model using a real-world 3-VCN deployment including a solar-powered cell tower installation in rural Ghana. Our Ghana installation also supports different types of distributed mobile services (as outlined earlier) that have been used by rural users within the community. In summary, we believe that GreenLinks represents a change in paradigm in how we design cellular networks, and could enable ground-up innovation where several budding rural entrepreneurs could launch competing cellular network services in rural localities while seamlessly co-existing with existing operators.
\section{Application Experiences}
\label{sec:implementation}
All the three distributed applications we developed have been deployed
and tested in the local rural community in Kumawu, Ghana. We outline
some of the technical experiences in running these applications on the
wild. Due to space considerations, we primarily focus on the
marketplace P2P transaction application.
{\bf Marketplace application:} To test the local and cloud
component of the Marketplace application, we built an Android
application that enables phones to automatically \texttt{SELL} and
\texttt{BUY} items in a periodic manner. We had 4 phones sending
\texttt{SELL} messages and 3 phones sending \texttt{BUY} and
\texttt{SEARCH} messages. 5 of the 7 phones were connected to the BTS
in Ghana and the others were connected to the BTS in New
York. Simultaneous with the above application we made calls manually
and a script running at local server generated data to simulate the
marketplace server receiving data. The node in UAE did not participate
in these measurements.
\begin{figure}
\centering
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.16]{figures/cdf_sms_times_rapid}
\caption{Ghana}
\label{ghana_cdf}
\end{subfigure}
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.16]{figures/cdf_sms_times_lappy}
\caption{New York}
\label{ny_cdf}
\end{subfigure}
\caption{CDF of time it takes for the different functions in the P2P Marketplace application}
\label{cdf}
\end{figure}
\begin{figure}
\centering
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.16]{figures/cdf_sms_vs_file_post_times_lappy}
\caption{}
\label{_cdf}
\end{subfigure}
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.16]{figures/post_complete_times_rapid}
\caption{}
\label{_queue}
\end{subfigure}
\caption{CDF of time taken for the \texttt{SLOWPUT} of file vs SMS and a view of the queue in the P2P Marketplace application}
\label{smsvsfile}
\end{figure}
We report the performance of the P2P transactions application in
Figure~\ref{cdf}. The graph above shows the end-to-end latency between
the local server and cloud controller for the
\texttt{BUY},\texttt{SELL} and \texttt{SEARCH} operations. It is
important to recall that the \texttt{SELL} operation translates to the
\texttt{SLOWPUT} primitive, while \texttt{BUY} and \texttt{SEARCH}
translate to \texttt{FASTGET} and \texttt{FASTSEARCH} primitives
respectively. It can be observed in Figure~\ref{ghana_cdf} that
\texttt{BUY},\texttt{SELL} and \texttt{SEARCH} operations cause nearly
the same end-to-end latency. However in Figure~\ref{ny_cdf}, there is
a clear distinction between the time it takes for \texttt{SELL},
compared to \texttt{BUY} and \texttt{SEARCH}. This is expected because
\texttt{SELL} requests are queued and processed in a lazy manner. This
distinction is not visible in Figure~\ref{ghana_cdf} as that the
bandwidth between cloud and local server is low while the New York VCN
was connected to the cloud over a high bandwidth Ethernet link. This
results in similar latency measurements for all three operations. It
is important to note that no failures were experienced and all
messages sent from both nodes were received at the server despite the
fact that Ghana node was using a signal booster based backhaul. At a
user level user got SMS back for all the functions they
performed. They got SMS for \texttt{SELL} immediately because the
local component of the application gives the response immediately and
then executes the \texttt{SLOWPUT} operation while the response for \texttt{BUY} operation is sent only after response from cloud to maintain consistency. It is important to
note that even though there were no failures the users in Ghana
experienced high latency as is evident from the time given on x-axis
in Figure~\ref{ghana_cdf} and Figure~\ref{ny_cdf}
{\bf Sensing and Voice Applications:} File upload is a common
operation of the voice-based or sensing-based
applications. Figure~\ref{_cdf} shows the CDF of time it takes for
different \texttt{SLOWPUT} requests on the New York-based
VCN. Figure~\ref{_queue} shows the queue and how requests are
processed for the \texttt{SLOWPUT} primitive for the VCN in
Ghana. Figure~\ref{smsvsfile} shows that SMS-based applications will
work faster than the file based applications as they are smaller than
files. It also shows that file based applications can slow down the
SMS-based applications. This is true as both are placed in a common
queue for processing, and servicing larger files is more time
consuming than servicing smaller SMSs.
{\bf Summary of User Experiences:} The P2P marketplace application has
been tested with cohorts of farmers and traders from the local
community to perform BUY/SELL transactions. The distributed sensing
application has been used extensively to map farming boundaries and
collect meta-data about farms in the rural region. Using this
application, we have successfully built GIS agricultural maps of
different agricultural produce in the locality. The IVR based social
media application was inspired by the success of voice based citizen
journalism platforms like Polly~\cite{polly} and shows how one can
build such voice based applications to function effectively in rural
contexts using intermittency-aware VCNs.
\section{GreenLinks}
\begin{figure}
\centering
{
\includegraphics[scale=0.4]{figures/experiences-arch.pdf}
}
\caption{GreenLinks System Architecture}
\label{fig:systemArch}
\end{figure}
In this section, we describe the GreenLinks architecture and how it
enables new forms of intermittency-aware, distributed cellular edge
services. The GreenLinks architecture is shown in
Figure~\ref{fig:systemArch}. The basic building block of GreenLinks
are Virtual Cellular Nodes (VCNs) which leverage open, programmable
cellular basestations with local compute capabilities. GreenLinks aims
to connect multiple VCNs which can be located in different geographic
localities to cohesively behave as a single cellular
provider. GreenLinks is specifically designed for rural contexts with
limited or no existing cellular coverage and we assume that each VCN
operates with a backhaul link with highly constrained bandwidth and high latency. We define such backhaul links as low
Bandwidth-Delay Ratio (BDR) links. Examples of such backhaul links
are: existing 3G coverage with weak signals, low bandwidth satellite
links, microwave links and long distance Wi-Fi links. The backhauls
can fail arbitrarily due to loss in power or other exogenous
factors.
GreenLinks offers a combination of conventional cellular services
(voice calls, messaging, voice messages and data services) and new
forms of intermittency aware distributed applications. Despite constant
power failures and network failures which may be common in rural
contexts, GreenLinks aims to provide high availability of basic
services and high interactivity for distributed applications. To
achieve this, GreenLinks offers an intermittency aware service
abstraction where every cloud service or application offered to mobile
users has a cloud instance and several edge instances (also referred
as local instance). The local instance of each application runs at
the compute server attached to the base station, while the cloud
instance runs in a data center. We partition each application in such
a way that most of the application processing is done at the local
component. In addition, each application needs an intermittency-aware
synchronization mechanism between the local instances running across
VCNs and the cloud instance to ensure the consistency or availability
guarantees required for various functions within the application.
Figure~\ref{fig:systemArch} outlines three different example
distributed applications that we have built on top of the GreenLinks
service abstraction: (a) a Marketplace application for supporting P2P
transactions across users; (b) an IVR based social media application;
(c) distributed data gathering and sensing. We describe these
applications in greater detail in the paper. We also have an {\em Egress server} which is responsible for communication between VCNs and the conventional cellular networks.
\subsection{Our VCN deployment}
\label{ghana}
Our deployment consisted of three VCNs located in the USA, Ghana and
UAE respectively, with one centralized controller located in
Germany. Figure~\ref{fig:ghanaVCN} shows the deployment we have in
Ghana, at the edge of existing cellular coverage by commercial
telcos. Pictured on the left side of Figure~\ref{fig:ghanaVCN} is the
cellular base station hardware used, a RapidCell manufactured by Range
Networks\cite{range}. To the right side of Figure~\ref{fig:ghanaVCN}
is the backhaul and base station antennae, and the solar panels used
to power the complete setup. We used this VCN to extend coverage
beyond the existing coverage area, with the backhaul comprising of
analog signal booster with a directional antenna (facing the 3G base
station) to boost the weak 3G signal to create a backhaul for the
VCN. We also deployed a whitespaces solution to make sure that we do
not interfere with the primary operators in the area while we try to
use the bands in spectrum no one else was using. We also deployed 3
applications on top of the Ghana VCN and used synchronization
primitives to enable applications to run across Ghana and US VCNs.
We used two hardware platforms as Base Transceiver Station (BTS) nodes. While in Ghana we used a 1 Watt RapidCell from Range Networks~\cite{range}, in USA and UAE we used the 10 mWatt USRP B100 from Ettus Research. Freeswitch PBX was used for routing calls and messages in all VCNs. As the local component of the IVR application, we deployed an Asterisk PBX on compute node to handle IVR calls. The local server was also running an HTTP server for the SMS based and data sensing applications.
\begin{figure}
\centering
{
\includegraphics[scale=0.07]{figures/combine_images.jpg}
}
\caption{Our VCN setup in Kumawu, Ghana}
\label{fig:ghanaVCN}
\end{figure}
\subsection{Identity Management}
A key building block for supporting different forms of services in
GreenLinks is an intermittency aware identity management
layer. GreenLinks supports three basic types of identities: network
identities, user identities and application identities. In GreenLinks,
the common user identity is the the International Mobile Subscriber
Identity (IMSI) which is physically written on a SIM card and the
network identity is the identity issued by Network against the IMSI,
this is commonly referred to as the phone number of the user.
GreenLinks supports a generalization of the definition of these
network and user identities, in that user identities can encompass
other broad notions of identities and network identities additionally
encompass IP addresses. Given the basic network setup of a disjoint
collection of VCNs inter-connected over an IP backplane, the cloud
instance of GreenLinks is publicly reachable (with a public IP
address) while each VCN may be positioned behind a NAT. GreenLinks
assumes a flat 2-level hierarchy where each VCN independently
maintains a connection with the cloud and all synchronization and
information routing is performed through the cloud instance.
The basic identity lookup process translates a user identity to
determine the network identity within the GreenLinks network.
GreenLinks has a lookup server instance within each VCN and cloud
instances. The traditional lookup would typically involve a local
lookup within the VCN and if locally unavailable, a cloud lookup for
the same user identity. The link between the VCN and the cloud has a
low BDR and is typically intermittent. This raises four challenges:
availability, consistency,external names and mobility.
First, to ensure high availability of identity lookup, GreenLinks
supports quick local authentication of user identities, for
pre-registered users and two users within the same VCN can communicate
with each other without the need for backhaul connectivity to the
cloud. A user is pre-registered if the user identity has been
authenticated by the cloud instance and the identity is active in the
local cache. Second, to ensure consistency of identities, local
servers at the VCN cannot assign global user identities but only the
centralized name server (co-located with the cloud controller) issues
identities to all VCNs to avoid naming conflicts.
Third, the GreenLinks network can operate on two types of names:
unique user identities assigned by GreenLinks or unique user
identities assigned by external trusted entities (cellular identities,
etc.). In the former case, the central name server has complete
control over the user identity space and controls the uniqueness of
GreenLinks assigned names. To enhance availability of names, the
central server can partition the name space and also provide local
VCNs autonomy to assign locally unique user identities. GreenLinks
assigned names have no semantic meaning outside the GreenLinks
network. In the case of user identities assigned by external trusted
identities, the GreenLinks cloud name server needs to communicate with
the appropriate external entities to verify their authenticity.
Finally, given the intermittency aware lookup process, GreenLinks is
not best suited to support rapid mobility of user identities across
VCNs. In specific cases, where neighboring VCNs can directly communicate
with each other using a local backhaul, then GreenLinks can support limited
forms of local mobility across VCNs.
GreenLinks also supports distributed applications to define
application specific identities, which refer to unique information
state of the application that may be tied with one or a group of user
identities. For example, consider the case where two users wish to
perform a BUY/SELL transaction over GreenLinks across multiple VCNs;
each item transacted is associated with a unique application identity
and each buy/sell bid is a mapping between application identities and
user identities. Applications can specify their own consistency,
availability and intermittency-aware tradeoffs across their
application defined identities. This state is used by the local
instances of the application running at each VCN to selectively
synchronize state with the cloud instance of an application.
GreenLinks also supports intermittency-aware forwarding of state for
applications and user-directed messages. As a simple example, the
messaging application in GreenLinks enables users to leave voice
messages or text messages with a user identity (this can be a
GreenLinks issued identity or even a globally unique mobile number),
which can be locally stored in a VCN and lazily synchronized with the
cloud instance.
\subsection{Distributed Application Primitives}
\label{subsec:prim}
GreenLinks supports a collection of basic application primitives that
enables developers to easily translate existing distributed
applications with minimal changes to operate in intermittency-aware
conditions. The key focus of primitives is to enable an
intermittency-aware key-value store abstraction over the application
identity space that enables applications to specify the right tradeoff
between consistency and availability. Since most VCNs are located in
low-BDR regions, we achieve partial availability by dividing each
application into a larger local component and a smaller cloud
component. The local component of the application is to ensure
significant local processing. This ensures responsiveness (or
application liveness) by keeping local communication and interaction
functional even in the absence of the low-BDR backhaul link. The cloud
component is mainly responsible for saving application data and
facilitating interaction between the local components of various
VCNs. The lack of programmability in conventional cellular networks
forces application deployment extensively in the cloud. This means
that failure of a backhaul link between the base station and core
network inhibits access to even basic applications like calls and
SMS. We discuss some of the primitives we designed and implemented:
\vspace{1mm}
\noindent{\texttt{1. SLOWPUT(Identity i, Type t, Data d)}}:
\noindent{User \texttt{i} communicates marshalled data \texttt{d} for application \texttt{t}. This primitive is used by the local component for {\em lazy} communication with the cloud component. This operation is lazy because data may not be immediately sent after the primitive is executed; the local server determines the right order to send the data based on bandwidth availability and priority (based on \texttt{t}) of the other requests in the queue. The \texttt{SLOWPUT} primitive is used by applications for which the local component can provide availability at the expense of strong consistency. For example if someone is just try to send an e-mail from VCN $A$ to a user connected to VCN $B$, any inconsistency in the ordering of e-mails at receiver is tolerable.}
\noindent{\texttt{2. FASTGET(Identity i, Type t, Data d)}}:
\noindent{This primitive is used by the local component of any application to send and receive data from the cloud component in an {\em active} manner. The particulars include a user \texttt{i} communicating data \texttt{d} for application \texttt{t}. This primitive is usually called as a result of an application function when consistency and response time can not be compromised. The communication is not queued, as in \texttt{SLOWPUT} primitive. Instead, this primitive is executed instantaneously, provided the the backhaul link is available. For example, any inconsistencies in the case of a banking transaction are grave, and an strong consistency has to be ensured even if the user does not get a response immediately. Such applications use the \texttt{FASTGET} primitive and marshall the transaction in the data parameter, forwarding it to the central component of the banking application.}
\noindent{\texttt{3. FASTSEARCH(Identity i, Type t, Data d)}}:
\noindent{This primitive is used by the user \texttt{i} to search for data \texttt{d} of a particular application type \texttt{t}, and returns one or more data points based on search from the cloud component's data store. The communication encapsulated by the \texttt{FASTSEARCH} primitive occurs instantaneously. The \texttt{FASTSEARCH} primitive executes a read operation on the persistent storage of the cloud component, therefore it can be performed even if a \texttt{FASTGET} operation has a write lock. An example use-case of the \texttt{FASTSEARCH} primitive can be to search in the data store of cloud component while a user is on hold with an IVR-based application, and is expecting a response quickly. }
\subsection{Example Applications}
\label{subsec:example}
In this subsection, we give the examples of distributed applications
that we built using the primitives discussed above. In particular, we
highlight how a functional division is made to identify the functions
that require consistency to those that require availability.
\subsubsection{P2P Transactions}
The application provides a text-based interface (running on top of the SMS service) and enables traders to provide customers the price and quantity of a commodity (usually crops) they wish to sell. It also enables customers to search for a particular commodity, the price at which various traders are selling, and to place a \texttt{BUY} request. The \texttt{BUY} request leads to exchange of contact information between transacting parties, and is logged as a \texttt{SELL}. The text-based interface requires small phrases to commence transactions.
The lazy \texttt{SLOWPUT} is used send the data to the server on sale of a commodity. This is because the order in which \texttt{SELL} request is updated at the cloud does not require strong consistency, but requires availability. Therefore when a user tries to sell, we acknowledge the sell has been received locally(by sending a message back to user) and transfer the sell to cloud in a lazy manner. In case the user is interested in purchasing a commodity, \texttt{FASTSEARCH} is used, and the data returned is sent to the user over one or more text messages. This is because we want strong consistency and do not want to give user a response immediately without ensuring that we are actually able to update the record in the cloud.
\subsubsection{IVR-Based Social Media}
This application enables users to interact with the system by pressing numbers on the phone's keypad. It enables users to leave a message, or to listen to a message left by others. For the Ghana VCN, the application provided an option to either use English or Twi, the local language in the region. The key function is the \texttt{ReceiveHandler} at the local component, which is invoked using a HTTP request on entering the IVR extension. After the initial HTTP request, the call is bridged from base station to the Asterisk IVR server running as the local component of application. The Asterisk server logs each input of user as entered. If the user is recording a message, the \texttt{ReceiveHandler} is executed after its completion. The \texttt{ReceiveHandler} uses the lazy \texttt{SLOWPUT} primitive to send the recorded file to the cloud component because a strong consistency in the ordering of messages received is not required. In case a person wants to listen to a message, the function first checks if the validity of the session. If the session is valid the message is played locally. Otherwise \texttt{FASTSEARCH} and \texttt{FASTGET} primitives are used to search and fetch the most recent message from the cloud component, while the user is on hold. We use these operations because user is on hold and we want to respond to the user quickly.
\subsubsection{Distributed Data Gathering \& Sensing}
The purpose of the application was to collect data on farms and crops grown. The application provides an interface to create the map of any farm by walking along its edge. This data is sent to the local application component, an HTTP server next to the base station. The local component then uses \texttt{SLOWPUT} to upload this data to the cloud component. Our choice in primitive is valid as the application does not require strong consistency and we can afford to have unordered data at the cloud component. This application is relatively simple because data only needs to be uploaded to the cloud component of the application, and there is no need for downloading data.
\section{VCN building block}
\section{Operational Challenges}
\subsection{Detecting Whitespaces}
\label{sec:gsm}
GSM spectrum license is required for operating in a particular area. Most countries issue licenses to a handful of national carriers and have no regulatory framework for smaller providers. For our VCN, we had no spectrum allocated to operate. This is true for most community based cellular deployments \cite{gsmws,rhizo}. Though licensed in its entirety to primary operators, majority of the cellular channels remain unused in rural localities. These unused bands of spectrum are called GSM whitespaces. In order to identify and reuse these whitespaces without any collaboration from primary providers, we build a sensing-based participatory model for collecting channel energy information in the locality.
\begin{figure}
\centering
\includegraphics[scale=0.22]{figures/Whitespaces_1st_week}
\caption{Used and unused channels over one week in Kumawu Ghana.}
\label{spectrum}
\end{figure}
Our solution takes advantage of the fact that GSM handsets continually measure spectrum occupancy in their proximity and report these measurements to their serving cell. Phones do this to enable the serving cell to negotiate a hand-over with a cell tower that has a stronger signal. We utilize this functionality and provide cellular devices with channels to scan. To phones, these are the channels on which neighboring base stations (of our cellular network) are operating - so they look for energy on those channels and report it. Although this approach is similar to NGSM~\cite{gsmws}, we make the following improvements: (i) We do not necessitate two different base stations. Instead, we wait for the connected calls to complete in case it is time to shift to a different channel, (ii) We increase transmission power periodically based on sensory feedback from phones to slowly expand coverage, unlike NGSM which starts at full power on a random channel and has a greater possibility of interfering with primary, and (iii) We have a voluntary model where we incentivize volunteers to install an application that periodically makes calls and sends messages to the base station thus ensuring periodic stream of measurement reports even in low activity periods (discussed later in the section).
\begin{figure}
\centering
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.22]{figures/aa45}
\caption{Channel 45 energy}
\label{channel_value45}
\end{subfigure}
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.23]{figures/ab45}
\caption{Channel 45 frequency}
\label{channel_frequency45}
\end{subfigure}
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.22]{figures/aa48}
\caption{Channel 48 energy}
\label{channel_value48}
\end{subfigure}
\begin{subfigure}[b]{0.23\textwidth}
\includegraphics[scale=0.23]{figures/ab48}
\caption{Channel 48 frequency}
\label{channel_frequency48}
\end{subfigure}
\caption{Channel energy as reported by various measurement reports and frequency of reports at a 5 minute granularity.}
\label{channel_info}
\end{figure}
We modified the peering component of OpenBTS to add fake neighbors, and add the corresponding channel that we intend to scan to each fake neighbor. We stop OpenBTS from validating the fake neighbors using an IP-based protocol. Once the fake neighbors are successfully set, we wait for the base station to send the new {\em neighbor list} out to the phones. Once the phones get the neighbor list, they start reporting the energy on the fake neighbor channels. We constantly run \texttt{tcpdump} to collect \texttt{MeasurementReport} packets being exchanged between phones and the base stations. For this, we modify the code base~\cite{gsmws_code} made available by the developers of NGSM. In Figure~\ref{spectrum}, we present the detected whitespaces over the period of one week in 124 channels of the P-GSM-900 band. It can be observed that only 9 channels out of 120 were being used, while the rest of the channels were unoccupied.
Apart from this we also developed an Android application that was given to a few volunteers. This application helped us gather reports frequently by sending SMS between volunteers and the base station. More communication by phones guarantees that regular reports are exchanged. Figure~\ref{channel_value45} shows, in chronological order, the various readings over a period of approximately 4 hours. Figure~\ref{channel_frequency45} shows, for the same channel, the plot of how many reports were received every 5 minutes. These two graphs highlight the fact that there is a constant need for sensing the channel because even for channels clearly being used by a neighboring base station, there are a significant number of reports suggesting that the energy is zero (the horizontal line at y=0 in Figure~\ref{channel_value45}). Taking a closer look at reports pertaining to channel 48 in Figure~\ref{channel_value48} and Figure~\ref{channel_frequency48}, we observed that it can take thousands of zero energy packets and several minutes before a packet reporting a positive energy on a channel is received. One possible reason explaining this phenomenon is that the overlap radius is very small and only a few mobile devices (maybe single device) were able to see energy on a channel and for a very small amount of time. Because of this, we argue for having some phones as volunteers in the area who have our application which keeps sending SMS in the background to other volunteers and the base station and produces regular report. In the case of channel 45, we have a relatively constant stream of packets across time as seen in Figure~\ref{channel_frequency45} but while in case of channel 48 in Figure~\ref{channel_frequency48} there are several minute gaps where no report is received about the channel. This highlights the need for having more volunteers; we add multiple fake neighbors and there is no way of controlling a single channel from which we receive reports.
\subsection{Boosted Cellular Backhaul}
\label{sec:backhaul}
\begin{figure}
\centering
{
\includegraphics[scale=0.15]{figures/Kumawu.pdf}
}
\caption{Location of the Ghana VCN and nearby conventional tower}
\label{fig:ghanaVCN_location}
\end{figure}
\begin{figure}
\centering
\begin{subfigure}[b]{0.25\textwidth}
\includegraphics[scale=0.22]{figures/airtel_udp_graph}
\caption{UDP}
\label{bandwidth_udp}
\end{subfigure}
\begin{subfigure}[b]{0.22\textwidth}
\includegraphics[scale=0.22]{figures/airtel_tcp_graph}
\caption{TCP}
\label{bandwidth_tcp}
\end{subfigure}
\caption{Performance of Airtel connection with and without boosted backhaul}
\label{airtel}
\end{figure}
Designing reliable backhauls in rural contexts is a challenging proposition. We outline a simple and potentially powerful approach for building reliable backhauls using directional signal boosters coupled with parallel cellular connections. Specifically in areas which are at the edge of cellular connectivity, we believe that the parallel boosted links represents an easy-to-deploy solution for building reliable backhauls.
In Figure~\ref{fig:ghanaVCN}, we have pointed out the backhaul's antenna, which is a high gain directional receiving antenna pointing towards the 3G base station. The rest of the backhaul setup consists of a signal repeater attached to an indoor omni-directional antenna. The weak signal is received at the directional antenna and is fed to the repeater using coaxial cables. The output from the repeater is transferred to the indoor antenna, again using coaxial cables. The key challenge stems from the fact that the Ghana-VCN was located at the edge of coverage as shown in Figure~\ref{fig:ghanaVCN_location}. By mounting the receiving antenna high enough, we were able to get a decent boosted 3G signal. We had multiple phones containing SIM cards belonging to the Airtel Network next to the indoor antenna. We tethered these phones to our setup and had multiple parallel boosted links as backhauls. It is important to note that we were able to obtain 3 boosted links with a single signal booster.
We then used approaches like Ubuntu Bonding~\cite{bonding} to use the multiple backhauls together in various configurations like active backup (where one link is used and the other is backup) and load balancing (where outgoing traffic is divided into the available links equally). However, the major limitation of Ubuntu Bonding is its inability to divide a single flow into multiple subflows. Multi-path TCP~\cite{raiciu2012hard} is another option that can help aggregate multiple links, but it requires changes to the Linux kernel and some support from middleboxes.
We used Phonetone K3B0918217CLB kit which comprised of a 10 db directional receiving antenna, 9db indoor panel antenna, and 70db analogue booster capable of working in 900/1800/2100 MHz GSM bands. We were able to capture the 3G signal from Airtel which was not available earlier in the vicinity of VCN. In Figure~\ref{airtel}, we present the performance of the signal booster based backhaul in Ghana, where the bandwidth gain in TCP, and packet loss and jitter improvement in the case of UDP (both measured using \texttt{iperf}) is plotted for a single boosted link against trials. The parentheses next to each point in the graph contains the average measured \texttt{RSSI} value. This value was measured using Android phones that utilized the boosted backhaul to the BTS node. The effect of signal boosting of the Airtel network is evident in Figure~\ref{airtel}; we were able to change the transmission rates from EDGE (denoted by E in graph) to that of HSDPA (denoted by H in graph). Consequently, we were able to get significantly more bandwidth as reported by Figure \ref{bandwidth_tcp}. We also reduced the packet loss rate and jitter in UDP, as reported by Figure~\ref{bandwidth_udp}.
\section{VC-ISP Architecture}
\begin{figure*}
\centering
\includegraphics[width=0.8\textwidth]{figures/SystemArch.jpg}
\caption{Architecture of VC-ISP}
\label{fig:systemArch}
\end{figure*}
Figure~\ref{fig:systemArch} illustrates the elaborate network structure and the system architecture of a VC-ISP. A VC-ISP should be viewed a cellular network that extends coverage to previously uncovered area(s). As mentioned earlier, VC-ISP builds upon two key technological ingredients: (a) software defined cellular network nodes; (b) stable backhauls for reliable backwards communication. The rural areas don't have many stable options for connecting with the rest of the world. The more isolated areas have no way to connect other then satellite communication or long range wifi. While many areas have weak cellular signals that are sometimes leveraged by using repeaters~\cite{http://vimeo.com/78562876}. This is often considered a cheapest solution for the residents of hundreds of square Kilometres who are at the border of connectivity corridor. We see our VC-ISP implementation as working using one or multiple non-homogeneous backhaul connectivity solutions available in the region, which can be fiber connectivity, telephone or power lines or can leverage recent advances in high speed mobile backhaul connectivity~\cite{kumunetworks,tarana}.
The basic building block of VC-ISP is a {\em node} which represents a software-defined cell tower which is low power and completely programmable. The node is connected to the internet by means of synthetic stable link which can leverage multiple low-bandwidth links. Any node that is not connected to the IP backbone has a backhaul link to other nodes in the network and can eventually connect to one or more {\em gateway} nodes. A {\em zone} represents a collection of
inter-connected nodes with backhaul links within a geographic locality with one or more gateway nodes.
As shown in Figure~\ref{fig:systemArch}, the VC-ISP network is composed of multiple {\em zones} each with its own gateway nodes and a cloud based infrastructure that aids in interconnecting the nodes into a cohesive virtual cell architecture. The cloud infrastructure of
VC-ISP has 3 key components: (a) forwarding nodes; (b) lookup and messaging servers; (c) PBX endpoints. Gateway nodes that are not behind NATs can act as forwarding nodes for their zones and gateway
nodes that are behind NATs require a cloud-based forwarding node with
a public IP address. These nodes are responsible for forwarding
traffic either between zones or between zones and the conventional
cellular network through PBX servers, which help in interfacing with
the cellular network. The lookup and messaging servers play a critical
role in enabling VC-ISP to offer a variety of intermittency-aware
services across zones and also provide compatibility with the same
services offered by a traditional cellular network.
\subsection{BTS Nodes} Every node in VC-ISP runs the OpenBTS platform
which offers a software-defined cellular services. The BTS nodes are attached to a local machine which we refer to as a \textit{local server} which runs the local component of various services. Each BTS node is responsible for providing basic cellular services(calls, sms and data) and other interactive services built on top of cellular services to users directly connected to them. While the local server next to the BTS node makes sure that they can work independently in the face of failures to provide local services while also having the capability to store messages to later sync up with gateway node and the rest of the nodes after recovery from intermittent node failures.
It is important to mention that every node has a low energy profile which makes it a suitable candidate for use with low cost renewable energy solutions. The core part of each node is the software platform that enables us to provide an array of services in a distributed manner where there is very less dependency between the devices located at different geographic locations in the network. This helps us build a highly available local network because in case of a partition, the
connected nodes form a network among them that enables mobile devices within a connected region to lookup and reach each other. As shown in Zone B in Figure~\ref{fig:systemArch}; VC-ISP provides intermittency-aware messaging services to devices which are not in the connected region. This is vital for enhancing availability of services in lieu of intermittent failures.
\subsection{Zones, Devices, Lookup and Routing} Each zone is maintained as a private network that provides coverage to a geographic locality where each BTS
node is allocated a sub-prefix in the private network range. Each zone
operates independently and communicates with other zones using the
forwarding nodes and the lookup and messaging servers. Different
devices can connect the GreenLinks system. Each device needs to have a
unique identifier and a unique secret associated with that identifier
to authenticate to GreenLinks, upon which each device is associated
with an address that is directly reachable within a zone. When a
device joins GreenLinks, it registers with the local BTS node within a
zone and its identity and its allocated address (by the local BTS) are
disseminated to the lookup system both within the zone and the lookup
servers in the cloud. GreenLinks uses a distributed naming/addressing
protocol to resolve device names into zone-level addresses. An address
of a device in GreenLinks refer to a (zone, private IP address)
mapping. When a device initiates a lookup for a name, the name is
first resolved at the intra-zone level, then at the inter-zone level
(if intra-zone is unsuccessful) and finally using the conventional
cellular level (if inter-zone is unsuccessful).
GreenLinks supports three types of routes: intra-zone routes,
inter-zone routes, zone-PBX routes. Within each
zone, GreenLinks uses an energy aware routing protocol that enables
every BTS node to reach a gateway node and other BTS nodes within the
zone. Since each BTS operates a separate sub-prefix, the address to
BTS mapping is straight-forward. An inter-zone routing path is a
simple amalgamation of 2 intra-zone paths from/to the gateway nodes
and a direct IP path between the forwarding nodes of the zones. The
gateway/forwarding nodes also act as NAT address translators for
internal IP addresses. The zone-PBX routes are for routing voice calls to the
cellular network using the closest PBX server.
\section{Programmable Platform and service primitives}
\begin{figure}
\centering
\includegraphics[scale=0.25]{dht.pdf}
\caption{Architecture picture for a more scalable VCN architecture with multiple nodes connected to multiple cloud servers that form a DHT based mechanism for storage and satisfying other requests}
\label{dht}
\end{figure}
In this section we try to highlight the routing mechanism and primitives that enable us to leverage the hardware platform to provide a programmable framework for edge services. To our knowledge this is the first paper evaluates deploying an array of services next to a cellular base station using high level primitives on a programmable platform.
Our first guiding principle was introducing a clear separation in the server
side functionality and moving most of the computation part of the applications
to a local server while leave the long term storage and facilitation
part in the cloud.
Our next guiding principle was to develop high level abstraction for
low level routing, for this we tried to build a simple application
independent API to handle low level routing between different software
components of OpenBTS, PBX, local and cloud servers.
The software platform of Ubuntu provides ease of doing content
interception and routing of all the traffic in an online manner
to the appropriate content handling component.
Having a fully customizable operating systems we had the flexibility to
use new ways to do various tasks which are best in small packet regimes.
We start by describing Identity management in our system. Which is the
bases of device to device communication. We describe two different architectures
for identity management, namely client-server model and dht-model. For naming and addressing in our 3-node deployment we used the client-server model while we
envision using the dht-model for scalability when the number of nodes and number
of users in the network increases. We evaluate DHT model using large scale
simulators.
\subsection{Identity Management}
The goal of identity management is to issue new identities to new users who join the network and to diseminate the information in network so that communication
can be enabled between devices inside and outside our network.
VC-ISP issues two kinds of identities: namely locally accessable and globally accessable identities. As the name suggests, local identities are only available
inside the network while global identities make it possible for devices
from outside the network to connect with the devices inside the network.
Local identities in the network are quite flexible and we can accommodate commonly used identities like skype names and google talk ids.
This is because we use OpenBTS software, which is open-source and modular.
Identity management layer enables applications to route messages in a
seamless manner.
As mentioned earlier we design and test two different identity management models.
In the simulation environment implementation we use the DHT-based model,
while for our practical 3-node deployment we use a simple server-client model.
The reason for this distinction is that a DHT-based approach is not required at a 3-node scale,
while simulation environment tries to evaluate scalability of VC-ISP.
We explain how both these models of naming/addressing work.
\subsubsection{Server-Client Model}
In the server-client identity model, there is a central entity that issues global and local identity. If a new user comes to any node, the request is routed to the central server and the identity of that user is issued by the server. The server keeps record of each identity that was issued to each node. In addition it records the IMSI number of the SIM card to which the identity was issued. Hence if the user moves to a different node, the server still knows that an identity has been issued and only the address of the user needs to be updated.
User is allowed to choose its own identity, which can be its skype number or some other number that he likes. But that identity will only be accessible directly from another users on the VC-ISP network. In order to enable outside users(that do not belong to VC-ISP) to reach this device a second identity is required which is reachable from any node. For this we issue global identities using a VOIP service which sends the calls and messages from outside users to our cloud server which in turn sends them to the node where user exists.
This server-client model can have a hierarchy where a server keeps track of all the identities of its children. Each zone(geographic locality) has its own server which issues and keeps track of all the users in that particular zone. As it can be imagined this gives rise to a 3 layer system. The first layer consists of the one central root server and the second layer consists of all the zone level servers while the third layer is comprised of all the nodes in the zones. This kind of a setup is simple and easy to incrementally build but it is not very scalable. If the number of users are oddly distributed among zones the zone servers can become a bottleneck for the zone. If the number of users is evenly distributed, even then the root server can become a bottleneck for users trying to connect with users in other zones.
\subsubsection{DHT Model}
To overcome the scalability limitations of client-server model we propose usage of a DHT based naming model. We envision a more scalable architecture if there are multiple sites in different regions around the world. Figure~\ref{dht} shows the architecture we envision where a BTS nodes connects to the cloud controller physically closer to it and thus there are multiple cloud servers. All the cloud controllers are located in data centers and have high bandwidth links to other cloud controllers. These cloud controllers form a distributed hash table for managing identities and application level processing among them in order to deal with failures and to provide faster access even when there is a skew in users between different nodes. Having multiple distributed central servers helps evenly divide the storage and processing duties of the cloud controllers that are dealing with too much traffic. The model is inspired from the DHT based design of WiRE~\cite{wire} and SEATTLE\cite{seattle}.
Given an arbitrary client initially connects with a BTS node $b$ which
is connected to a cloud server $k$ (the cloud server that is nearest) the client.
The local server sends the IMSI number(identifier of SIM card) to the cloud
server $k$. Depending on if user wants a global identity or local identity,
an identity is issued by the cloud server $k$.
While a response is sent back to the client telling him
his identity, the next step is to identify the \textit{resolver} node for
the identity pertaining to this client. The resolver is the cloud server that
is responsible for storing any data related to this identity. This includes all
data related to identity and applcations being used by the identity.
Let $m$ be the mobile device identity issued and let $G$ be the list
of all cloud server nodes. Then for every node $x \in G$, $k$ calculates $H(x)-H(m)$ where H is the hash function. Resolver is defined as the node $x^*$ that minimizes $H(x)-H(m)$. The resolver node is the node which maintains the information about gateway node of the zone in which $m$ is present. This DHT based approach solves the problem of uneven distribution of users across geographic localities discussed in the last section but there is extra overhead for lookup for each query.
\begin{comment}
\subsection{Interoperability}
A big part of VC-ISP identity management is interoperability among different zones of the VC-ISP. The VC-ISP naming and addressing layer facilitates interoperability of identities between zones because of the way identities are issued. The identity issuing in both the models discussed above is done by a single server. Therefore it is easy to see if an identity has been issued to a particular user before or not. In our system we assume that each user connects with a single SIM card when he moves accross zones. Therefore if an old IMSI asks for a new ID or simply joins the network, the network can know from the identity issuing server can identify it as an old user.
Interoperability within a particular zone is as important as interoperability between the different zones of a VC-ISP. For interoperability between nodes that share range we use the mechanism for handover used in OpenBTS\cite{http://wush.net/trac/rangepublic/wiki/Handover-quickstart} based base stations and it suffices to achieve interoperability in the area with a uniform coverage by VC-ISP having multiple base stations with overlapping ranges. However if nodes in a zone do not overlap with each other and user appears in a second base station in the zone then the identity issuing authority has to be updated and the address of the identity changed and new address disseminated using the naming/addressing model that is being used.
We provide two different mechanism for validating the user at a new address. The first method is triggered by the system itself. A base station upon seeing an unauthorized user making a call or SMS executes the procedure for discovering if the user is already registered from a different base station. In case a user exists, the user is validated and its address is updated in the address lookup tables. If there are any messages for him that were not able to reach him because of his absence from his previous known address, they are delivered to him. In the second method we provide a sms short code where user sends a free sms to validate itself and this way the system updates its lookup tables.
\end{comment}
\subsection{Service Primitives}
We build a few application independent service primitives by leveraging the identity management layer defined in the last section. These primitives are used to manage and develop several applications discussed in future sections. It is important to highlight that these primitives are very generic and were developed keeping in mind the architecture of applications required by developing countries.
First primitive is \texttt{POST(Identity i, Type t, Data d)} is the abstraction that is used to send data from local server to cloud server is a \textit{lazy} manner. This means that the data may not be immediately sent after the primitive is executed but the server determines the right order to send the data from local to cloud server based on bandwidth availability and other requests in the queue. Depending on the application type t, data can be prioritized. Second primitive is \texttt{GET(Identity i)} which is used by the local server to fetch data pertaining addressed to a particular identity. For instance if a user x left a message for user i, the local server for user i will fetch that message using the GET(i) request given above. This primitive is important in getting messages left by others for a particular device. This primitive is not executed in a lazy manner. Third primitive is \texttt{Search(Type t, Data d)} which is used by the local server to search for data of a particular application type t. This command is similar to GET and returns one or more data points based on search from the cloud data store. Fourth primitive is \texttt{Send(Type t, Data d, To j)} and is used to send data directly from the cloud server to a user j on one of the local servers, this operation is done in a \textit{lazy} manner.
These primitives hide the data the internal implementation of naming and addressing and enable complex applications to be built on top. For example if we want to build a voice messaging application, it can be built using the three primitives given above. An IVR system running on the local server enables recording of messages, in the next step user gives the identity of the user it wants to send the voice message to. On the backend the application uses the POST and SEND primitives to send the message from the sender to receiver. These primitives are extremely similar to a distributed file system and in some sense this is a distributed file system but what is novel about this is the queuing mechanism in place to work with the limited bandwidth between local and cloud server.
\section{Implimentation and Deployment}
\section{Programmable Platform}
In this section we try to highlight the guiding principles that enabled us to leverage the hardware platform to provide a programmable framework for edge services. To our knowledge this is the first paper evaluates deploying an array of services next to a cellular base station.
Our first guiding principle was introducing a clear separation in the server side functionality and moving most of the computation part of the applications to a local server while leave the long term storage part in the cloud. Our next guiding principle was to develop high level abstraction for low level routing, for this we tried to build a simple application based API to handle low level routing between different software components of OpenBTS, PBX and local cluster. We also did content interception and routed all the traffic in an online manner to the appropriate content handling component. Having a fully customizable operating systems we had the flexibility to device new ways to do various tasks which are best in small packet regimes.
\subsection{Heavier local server, lazy cloud synchronization}
The server side of most of the applications are located in the cloud component and most of the cloud infrastructure is hosted in developing countries. In our platform one of the most important contributions is that we reduce the amount of cloud component and increase the size of local component. In particular we try to move the processing(computation-intensive) part of the server functionality to a local server connected to a base station. This helps reduce latency in server response and also helps in reducing the bandwidth consumption between the server and client resulting is saving revenue because bandwidth is expensive in developing countries.
It can be argued that this migration will lead to other problems like scalability and ease of management that comes with having the complete application in cloud. But we show that the applications at a base station level don't scale to millions of users and are able to work with a lazy data synchronization with the light weight cloud component. Furthermore this approach leads to limited need of data transmission between the local server and cloud, which can be easily upper bounded and thus the cost can more predictable and manageable.
Having a heavier local server has a major advantage in view of unstable backhauls available in the rural areas of developing world. Most of the commercial cellular towers need to connect to the service gateways for simple tasks like validating users and local calls. But with having a local server, a cell tower can not only continue to perform these basic tasks but advanced tasks like IVR based applications and even web surfing of cached webpages in the eventuality of a broken backhaul link.
It can be argued that having a server at each base station will be an overkill because in lower load timings the server will not be performing any tasks but will be idle. While this is true the cellular towers in the rural areas are mostly not required in night times and are shut down to save power. In addition to this, a local server at a base station will have a lower energy profile as compared to supporting the full application in the cloud in terms of cooling apparatus required. We show in the deployment and evaluation we were able to support the base station and the associated server with a 1KW solar setup in rural Ghana.
\subsection{High level abstraction for low level routing}
Routing between different components of OpenBTS, Freeswitch and the local server is critical for any framework to build applications. There is a wide variety of packet traffic that is routed, for example the traffic between PBX and local server can be HTTP, TCP, SIP or FTP depending on the application. We build an abstraction on top of iptables to install appropriate rules depending on a configuration file. This mechanism helps the user in generating and managing the kernel routing tables using a high level substrate.
The design of the software platform is very modular. The components providing different services can be replaced by efficient components while the underlying routing remains the same because the routing management layer is independent of components and gives the users an abstraction for interception.
For example any sms based application requires the sms directed to a particular short code to be routed to a server running on a particular port in the server machine. The application expects to know the identity of the user who sent that sms and a callback URL where it can post the message back after processing. Instead of configuring the PBX, POST parameters and callback URL manually, all the details are given in the form of a one line instruction in the configuration file. \texttt{sms(shortCode,protocol,portNumber,dataMethod)} which suggests that a protocol(e.g. TCP, HTTP) is running on \texttt{port=portNumber} and it expects data of type \texttt{dataMethod}(e.g. POST, GET, CSV, JSON) data.
In a similar manner the web caching, IVR and sensing applications can be implemented with one line instructions. We built the routing API on top of iptables and freeswitch PBX to provide an array of different services. The framework helps us deploy sms based, IVR based, caching based and sensor apps(mobile data collection) apps in an easy manner. To our knowledge this is the first framework that allows building applications so close to the base station.
It is pertinent to realize that users are kept unaware of the backend functionality that is being employed. So in the example of a web caching server Instead of asking the users to each configure their mobile devices to access web through the cache, we isolate all the web request and route it through a caching server using iptable rules. Similarly in case of sms and IVR applications users are only exposed a mobile short code of a service. In case of IVR users can be given a SIP identity of the IVR application to directly call that application but we hide that detail and use content interception to identify the appropriate destination based on the configuration file.
\subsection{Flexibility for newer solution}
This section gives a comparison with conventional cellular networks. For routing and fine-grained packet processing, conventional cellular providers rely on specialized and proprietary devices, namely: Serving Gateways (S-GWs) and Packet data network Gateways (P-GWs). S-GWs are responsible for providing seamless mobility while P-GWs centralize most network functions like content filtering, traffic optimization, firewalls, and lawful intercept [4]. P-GWs sit at the boundary of the cellular network and the Internet. In our case our local server becomes the P-GW and does all the packet processing and routing required.
In commercial cellular networks centralizing nearly all important functionalities in the P-GWs makes cellular core networks remarkably inefficient, complex, and inflexible \cite{elby2012carrier,kim} for two major reasons. First, cellular core networks must forward all traffic through the P-GWs—including device-to-device traffic and local content distribution network services. This increases the network latency and congestion and makes a single base station dependent on an array of different hardware to provide simple functionalities. Second, since P-GWs are not modular, carriers have to take what is available from hardware providers and they don't have a chance to choose between different capabilities from different providers to mix and match; when a function is not available, carriers have no choice but to replace the P-GWs—even if they are sufficient for most purposes~\cite{chiosi2012network,jin2013softcell}.
In case of an OpenBTS based cell, various components are brought together at the cell. All of the P-GW functionality is performed by the server next to the base station. This gives us a unique opportunity to impliment newer methods for different tasks in the mini network between the base station and local server. For example, we can have our own alternative to FTP for sensor applications because FTP connections timeout in small packet regimes and our base station only supports GPRS connections.
|
\section{Introduction}\label{sect-intro}
Evolved stars are primary producers of dust in galaxies. They are sources of both carbonaceous dust, originating mainly from carbon-rich asymptotic giant branch (AGB) stars, and inorganic dust, formed in oxygen-rich environments of M-type AGB stars and their massive analogs -- red supergiants. Despite the important role of dust in a broad range of astrophysical phenomena, the formation of stardust is poorly understood. In general, dust formation proceeds along a chain of chemical reactions starting from small gas-phase molecules which form successively larger species \citep{cherchneff2013}. These large molecules grow, form clusters, and end as macroscopic complexes. The formation of inorganic (silicate and alumina) dust is likely to start from oxides. Because the nucleation occurs at rather high temperatures ($\sim$1100--1700\,K), these oxides must be refractory. After ruling out more abundant elements (Si, Fe, and Mg) and under the assumption of thermodynamic equilibrium (TE), it was proposed that oxides of titanium (TiO, TiO$_2$) and of aluminum (AlO) are the gas-phase species that can potentially initiate the formation of critical clusters (seeds) in O-rich environments \citep{GS98,jeong}. The widely known ``silicates'', which determine the observed properties of warm and cold dust in circumstellar shells, are important for grain growth at lower temperatures (a few hundred K) and condense on the seeds formed at higher temperatures. This TE prediction, however, is challenged by strong non-equilibrium effects characterizing the dynamic atmospheres of AGB stars where the condensation takes place \citep{cherchneff2006}. The importance of Ti and Al oxides in grain formation is reinforced by meteorite studies, which show that these oxides are present in presolar grains \citep[i.e. grains thought to represent pristine stardust,][]{Nittler2008}. The meteoritic studies demonstrate that aluminum oxides are at the core of a few silicate grains originating from AGB stars, but it is definitely not a common feature among those grains \cite[e.g.][]{Alcore,presolar2016}.
Most theoretical studies of the dust condensation in circumstellar material assumed chemical equilibrium in the gas \citep[e.g.][]{sharp}. Some alternative chemical studies of the circumstellar envelopes went beyond this assumption and more realistic non-equilibrium models paved the way toward a better understanding of circumstellar chemistry. They include the presence of shocks which substantially change our view of the chemistry in the envelopes of pulsating giants \citep[e.g.][]{WC,cherchneff2006}. Recent models highlight the chief role of Al oxides as a separate form of warm dust in AGB stars \citep{gobrecht}. An observational verification of the nucleation and chemical reactions leading to the formation of critical clusters is still very much desired. With modern instruments and by combining data from different wavelength regimes, such a verification is now possible \citep[e.g.][]{kami_alo,kami_tio}.
Here, we make an attempt to trace Al-bearing species in the gas phase around Mira in different phases and different pulsation cycles. Using techniques of mainly optical and submillimeter-wave (submm) spectroscopy, we investigate the link between these species and the formation of metal-oxide grains. Mira was chosen because of ({\it i}) the wealth of optical data that was collected over a long period of time and ({\it ii}) relatively high brightness of spectral lines at millimeter (mm) and submm wavelengths. Because in many respects Mira is the prototypical M-type AGB star, understanding Mira has direct implications for understanding the entire class it represents. The numerous studies of dust formation of Mira provide a basis and a rich context for our study, thereby allowing more conclusive interpretations. In this paper -- being the first of a series -- we focus on aluminum-bearing species and their role in the formation of dust in innermost parts of the Mira's envelope. The forthcoming papers will investigate the impact of titanium-, silicon-, and iron-bearing species on the nucleation process using similar methods as those presented here.
The paper is organized as follows. In the remainder of Sect.\,\ref{sect-intro}, we provide further introductory material on $o$\,Ceti, structure, chemistry, and dust formation in the envelopes of Mira variables. Next, we present and analyze the observational material in two parts. Sections \ref{sec-obs-submm}--\ref{sect-mm-results} focus on mm/submm and far-infrared (FIR) data, mainly of AlO and AlOH. Section\,\ref{opt} presents visual spectroscopy of $o$\,Ceti which yields information primarily on \ion{Al}{I}, AlO, and AlH. In Sect.\,\ref{discussion}, results are discussed within the context of the circumstellar chemistry and dust formation.
\subsection{$o$\,Ceti}\label{sect-intro-mira}
Mira has a well documented history of light variations. The visual magnitude changes by up to 8$^{\rm mag}$, i.e. in some maxima Mira is $\sim$1600 times brighter than the minima. These light variations are partially caused by changes in the effective temperature of the pulsating photosphere but, even more importantly, the fluxes change owing to variable opacity caused by metal oxides which have strong bands at optical wavelengths \citep{reid02}. The variable temperature and dynamical processes lead to non-equilibrium chemistry and variable abundances of these oxides \citep[e.g.][]{cherchneff2006}. Complex dynamics and chemistry are heavily contributing to the spectacular light changes in Miras.
Mira's companion, Mira\,B, is likely a white dwarf \citep[but a main-sequence star was also postulated by several authors; see][and references therein]{disk,SokoloskiBildsten}. At an orbit of radius $\sim$90\,AU (projected distance 0\farcs5) and a period of $\sim$600\,yr \citep{disk}, the companion is accreting material from the wind of Mira\,A \citep{mohamed}. The accretion process gives rise to ultraviolet (UV) and X-ray radiation, including emission in highly-ionized species, e.g. of \ion{N}{V} \citep{Reimers1985}. Because Mira\,B is embedded in the dusty wind which absorbs most of the energetic photons in the direction of the cool giant \citep{disk}, the harsh radiation does not affect the inner wind of Mira\,A (within, say, 10\,AU) but may be responsible for dissociation of molecules in the immediate vicinity of Mira\,B \citep[cf.][]{nhung}. Also, Mira\,B is not expected to have a significant dynamic influence on the inner wind of Mira\,A \citep{lynn}.
An important parameter for our analysis is the radius of $o$\,Ceti. The size of the photosphere of a Mira variable varies considerably with wavelength owing to different dominant sources of opacity \citep[cf.][]{stewart2013}. Also, the size changes with phase mainly owing to pulsations in the fundamental mode which change the physical extent of the atmosphere \citep[e.g.][]{woodruff,ireland2011}. Furthermore, the temperature changes as a combined result of expansion/contraction and the propagation of shock waves, influencing the gas excitation and thus the opacity. Photospheric sizes have been derived by different authors using a myriad of observational techniques. The smallest radius we found in the literature, 12.19$\pm$0.02\,mas, was determined near the maximum visual light at $\sim$2\,$\mu$m \citep{perrin}. From $K$-band IR data, a radius of 14.8$\pm$0.6\,mas was found \citep{stewart2013} which is similar to 14.3--14.4\,mas observed at 0.94\,$\mu$m \citep{woodruff,wittkowski2015}; at shorter wavelengths, near 0.701\,$\mu$m and 0.45\,$\mu$m, the continuum source was measured to be a disk of a radius of 26--28\,mas \citep{haniff} and 35$\pm$10\,mas \citep{specle}, respectively. All these values are considerably smaller than the radius of 47$\pm$7\,mas determined at 4.93\,$\mu$m and at $\varphi$=0.2--0.3 \citep{stewart2013}. Most recently, also the millimeter photosphere of Mira has been resolved giving a radius of R$_{\rm mm,ph}$=23\,mas near visual phase 0.5 (i.e. when the atmosphere is more extended than at maximum) \citep{vlemmings,lynn,wong}. \citet{RM07} measured a radius of the radio photosphere at 43\,GHz of 26\,mas at phase 0.05. Throughout this paper, we adopt $R_{\star}\!\equiv$14.4\,mas as the stellar radius and the characteristic distance scale. This is equivalent to 2.4$\times$10$^{13}$\,cm or 331\,R$_{\sun}$\ at the distance of 107\,pc to the star \citep{distance}. The temperature of the star changes within about\footnote{\citet{arkharov} suggest a range 2200--3000\,K.} 2900--3200\,K and its bolometric luminosity is of about 9000\,L$_{\sun}$ \citep{woodruff,perrin}.
\subsection{The atmosphere and circumstellar envelope of Mira}\label{sect-intro-structure}
The complex kinematic and dynamical structure of the atmosphere and circumstellar envelope of Mira has a crucial bearing on the analysis and discussion in this work. The complex velocity fields of Mira variables have been studied observationally at optical and infrared wavelengths but the greatest successes were achieved by observations of the infrared ro-vibrational lines of CO \citep[e.g.][]{Hinkle-COI,IRveloCO,Nowotny2010}. Theoretical effort has also been done to understand the structure of Mira variables and a number of models have satisfactorily reproduced some observational data \citep[e.g.][]{ireland2011,hofner2008,gobrecht}. The deepest parts of the atmosphere are dynamically most influenced by the stellar pulsation and the associated shock wave that is created in each cycle. The shock is radiative and ionizing, so that in its wake intense emission lines of high excitation, such as hydrogen recombination lines, are formed. The temperatures within the shock are elevated to 35\,000\,K \citep{fox}. The shock propagates outward and eventually reaches the upper atmosphere. Because a large part of the shock's energy is radiated away and because of the expansion, the shock slows down in progressively higher parts of the atmosphere. Its influence on the velocity field can be traced up to approximately 3--4\,R$_{\star}$, where its velocity is a few km\,s$^{-1}$. This region, which we call hereafter the {\it extended atmosphere}, shows the highest temporal variations in the kinematics of gas. The radial velocity of high-excitation lines, such as those of the $\Delta\varv = 3$ band of CO, vary with a full amplitude of 20--30\,km\,s$^{-1}$\ in $o$\,Ceti. The motions include infall with velocities of up to 13\,km\,s$^{-1}$. Alumina dust is observed in Mira stars at $\sim$2\,R$_{\star}$, i.e. within this dynamically active region. The part of the extended atmosphere up to $\sim$2\,R$_{\star}$ is known for a high-opacity molecular layer of CO and H$_2$O which has been resolved in NIR interferometric observations \citep[e.g.][]{perrin,wittkowski2015}. It is also the region where the variable SiO masers are observed. In Mira, the maser rings are of radii of 2.0--2.8\,R$_{\star}$ \citep{cotton,RM07}.
Above the extended atmosphere, starting at about 4\,R$_{\star}$, is the zone of silicate-dust formation that is probably somewhat affected by the outward and inward movements. Once (silicate) dust of high opacity is formed, the radiation pressure from the star can accelerate the envelope to form a steady wind. It is often assumed that above 10\,R$_{\star}$ the outflow is fully accelerated. No short-term velocity changes are expected for features arising in the wind.
These three regions are characterized by kinetic gas temperatures of about 2000--4500\,K (photosphere and just above it), 800--1200\,K (the silicate dust formation zone), and $\lesssim$500\,K in the extended wind \citep[cf.][]{Nowotny2010}. At these temperatures, the two inner regions are warm enough to cool down radiatively through electronic transitions of neutral atoms and ions and through electronic and rovibrational bands of refractory molecules. The material in the wind is expected to cool down through low-excitation emission lines in the optical, especially in resonance lines of alkali metals and pure rotational lines of molecules.
\emph{Absorption} lines in $o$\,Ceti change their radial velocity by up to 12\,km\,s$^{-1}$\ in the optical \citep{joy2}\footnote{\citet{joy} first suggested an amplitude of 12\,km\,s$^{-1}$\ which however was revoked in his later paper in favor of an amplitude of 4.5\,km\,s$^{-1}$. Measurement presented later in our work, however, support amplitudes above 4.5\,km\,s$^{-1}$.}, and are displaced symmetrically around the stellar (center-of-mass) velocity by 24\,km\,s$^{-1}$\ in the infrared \citep{IRveloCO}. Optical lines are thought to generally trace higher parts of the stellar atmosphere compared to infrared lines of similar excitation, an effect caused by increased continuum opacity at optical wavelengths \citep[through the Rayleigh scattering;][]{willson1982}. \emph{Emission} lines, mainly optical ones, vary in position as well but they are always shifted toward the blue, by as much as 16--18\,km\,s$^{-1}$\ \citep{joy,joy2}. They are thought to be excited by and located close to a shock front \citep{willson1982,richter2001,richter2003}. Because the front always moves outwards, the lines appear only at negative (or zero) velocities with respect to the star, i.e. they are always blueshifted. The shock is directly responsible for a temperature inversion which allows us to see emission features even when the gas is seen against the stellar disk.
The wind of Mira has been extensively observed in the classical pure rotational lines of CO \citep[e.g.][]{mira_co,ramstedt,nhung}. The terminal velocity of the wind, $\varv_{\infty}$, is usually quoted as about 5\,km\,s$^{-1}$, but velocities as low as 2.5\,km\,s$^{-1}$\ have been suggested in the literature \citep{mira_co}. From observations of multiple lines of CO up to $J_{\rm up}$=16, we constructed a model of the Mira's wind which strongly disfavors the low terminal velocity and here we adopt $\varv_{\infty}$=5\,km\,s$^{-1}$, equivalent to 1.5\,R$_{\star}$\,yr$^{-1}$. On the basis of the same model and literature data \citep[e.g.][]{GerardBeougois1993}, we also adopt the stellar center-of-mass velocity of $V_{\rm LSR,sys}$=46.8$\pm$0.5\,km\,s$^{-1}$\ in the local standard of rest, which is equivalent to $V_{h,\rm sys}$=57.0\,km\,s$^{-1}$\ in the heliocentric rest frame.
The mass-loss rate of $o$\,Ceti, $\sim$2$\times$10$^{-7}$\,M$_{\sun}$\,yr$^{-1}$ \citep{mira_co,taco}, is typical for Mira stars but the distribution of rates has a large scatter so that some sources can differ by more than one order of magnitude above and below the value derived for $o$\,Ceti \citep{taco}.
\subsection{Dust formation in $o$\,Ceti and other Mira variables}
A relation between dust formation and pulsation cycle of Mira stars is not well established -- it is unclear whether dust formation occurs within certain phases of a given cycle or takes place independent of it. In general, individual cycles are characterized by somewhat different amplitude and shape of the light curve and there is a possibility that the rate of dust production may change from cycle to cycle. Temporal variations in the emission of the innermost dust shells have been reported in the infrared for some objects, including $o$\,Ceti \citep[see e.g.][]{lopez,lobel}. They suggest that dust production itself may indeed be variable. For the Mira variable IK\,Tau, theoretical models show that dust formation is time-dependent and occurs at specific pulsation phases in the shocked upper atmosphere, i.e. $\varphi$=0.8--1.0 for alumina and $\varphi$=0.5--1.0 for silicates \citep{gobrecht}.
Mira variables have been categorized depending on the type of spectral features observed at mid-infrared (MIR) wavelengths. These include: (I) a broad feature of Al$_2$O$_3$ (corundum), (II) a mix of alumina and silicate features, or (III) a dominant silicate feature \citep{lorenz,little}. These three types are thought to be an evolutionary sequence, where objects with alumina-dominated dust are less evolved stars with dust production initiated recently, and group III has a long history of dust production. [More recent studies suggest that the three groups reflect different regimes of mass-loss rates, with group I representing very low rates \citep[e.g.][]{karovicova}.] $o$-Ceti's MIR spectrum is dominated by the silicate feature \citep[e.g.][]{lobel}, placing it in the third group, i.e. among the most evolved objects in the sequence. It is thought that this group of stars, including Mira, forms alumina dust at high temperatures close to the star \citep[2--3.5\,R$_{\star}$, $\sim$30--50\,mas in $o$\,Ceti,][]{bester,degiacomi,lopez} but most of the mass of dust is built up farther from the photosphere, in the form of silicate grains ($\geq$200\,mas in $o$\,Ceti); the silicate dust may partially form on the seeds provided by the Al$_2$O$_3$ clusters. Therefore, although their MIR spectra are dominated by the silicate feature, Mira variables are still thought to be efficient producers of alumina-based solids. This is also consistent with popular hypotheses on the dust-nucleation sequence in evolved stars. It has been confirmed observationally by infrared interferometric techniques that the alumina dust forms closer to the photosphere than silicates \citep[e.g.][]{zhao,karovicova}. Recent theoretical models agree with those observational findings and show that alumina dust forms at radii $\lesssim$2\,R$_{\star}$ and the silicate dust is present at radii $\geq$4\,R$_{\star}$ \citep{gobrecht}.
\subsection{Which Al-bearing species are important?}
In order to trace the species containing Al in the envelope of Mira, we first identify the most likely carriers on the basis of previous observations of cool circumstellar envelopes and chemical models. \citet{gobrecht} consider Al, AlH, AlO, AlOH, AlO$_2$, AlCl, Al$_2$, and Al$_2$O to be important species for Al gas-phase chemistry. In addition, AlF and AlNC were observed in the carbon star IRC+10216 \citep{AlF,AlNC}, and AlS and AlCN are potentially interesting carriers as well \citep[cf.][]{ref-AlOH}. Of these, homonuclear Al$_2$ is not easily observable. Similarly, the main isomers of AlO$_2$ and Al$_2$O are linear and their rotational lines are not observable. We found no high-resolution spectroscopic studies of gas-phase forms of higher Al oxides that would allow us to identify their spectral features. This poses a serious shortcoming for our current study. Other molecules listed here have been observed at visual (AlH, AlO) or mm/submm (AlO, AlOH, AlCl, AlF, AlNC) wavelengths around cool evolved stars. From these, only the optical electronic bands of AlO have been reported to date in Mira.
Atomic aluminum is present mainly in the stellar photosphere where thermal equilibrium holds. For an effective temperature of 2200--3000\,K of Mira, equilibrium calculations indicate that atomic aluminum is mainly in the neutral and singly-ionized forms \citep[cf.][]{ref-AlOH}.
Because Mira is thought to be a low-mass star \citep[$\sim$1\,M$_{\sun}$,][]{ireland2011}, one does not expect the rare unstable isotope of $^{26}$Al to be present in its atmosphere and circumstellar environment \citep{26Al}. Therefore, no rare isotopologues were targeted in this study.
\section{Millimeter to FIR observations}\label{sec-obs-submm}
In search for the Al-bearing species, we observed Mira in a broad wavelength range, from mm to FIR wavelengths. Additionally, optical observations are presented in Sect.\,\ref{opt}.
\subsection{APEX/FLASH}
Mira was observed in 13--14 August 2013 and 30 June--8 July 2014 using the dual-band FLASH+ receiver at APEX. Multiple frequency setups were used with the primary aim to detect rotational transitions of AlO (and lines of CO in the first excited vibrational state). FLASH+ has two frequency units (covering the 345 and 460\,GHz atmospheric bands) and separates the upper and lower side bands (USB and LSB), what produces four spectra in a single observation. This allowed us to observe ten different frequency ranges within the 345\,GHz and 460\,GHz atmospheric windows, each 4\,GHz wide, at the spectral resolution of 38\,kHz (in the 345\,GHz band) and 76\,kHz (in the 460\,GHz band). Observational details including central frequencies, integration times, rms-noise levels, and exact dates of observations are given in Table\,\ref{tab-log} (Appendix\,\ref{appendix-log}).
All observations were performed with a wobbler which was switched by 1\arcmin. The data were calibrated with the default APEX pipeline \citep{APEXcalib} and are here presented in the antenna brightness temperature ($T_A^*$) or converted to main-beam brightness temperature ($T_{\rm mb}$), as indicated in each case. Baselines of low order were subtracted from the spectra. All spectra presented here were smoothed to resolutions which allow more readily presentation.
\subsection{APEX/HET230}
Spectra were also acquired in the 1-mm band with the SHeFI (HET230) instrument at APEX. These observations were obtained between 3 and 23 December 2013 in two setups and were intended to detect ({\it i}) two lines of TiO centered at 222.7\,GHz (in LSB), and ({\it ii}) lines of AlO and vibrationally excited CO, with the band centered at 229.8\,GHz (in USB). The second setup was re-observed in 9--12 June 2015. The HET230 instrument produces one single-sideband spectrum. The XFFTS spectrometer produced spectra at a resolution of 76\,kHz.
Two frequency ranges, centered on 229.800\,GHz and 344.454\,GHz, were each observed twice, 20 and 11 months apart with APEX (cf. Table\,\ref{tab-log}). A detailed technical analysis of the data, summarized in Appendix\,\ref{sect-var-apex}, have shown that some of the AlO lines covered are variable.
\paragraph{Herschel/HIFI}
In the search for the Al-bearing species, we browsed the archives of the Herschel Space Observatory ({\it Herschel}) for observations of Mira obtained with the HIFI instrument. Publicly available observations were mostly performed within the {\small HIFISTARS} project (PI: V. Bujarrabal), but some additional data were acquired within the Performance-Verification (PV) of HIFI. We used the processed data from the {\small HIFISTARS}' User Provided Data Products Release\footnote{\url{http://herschel.esac.esa.int/UserProvidedDataProducts.shtml}} or -- in the case of the PV data -- the pipeline-processed spectra which were corrected for baseline and converted to $T_{\rm mb}$ units. Here, we analyze only one spectrum which covers the $N$=29--28 line of AlO
\begin{table*}[!ht]
\caption{Transitions of AlO and AlOH covered by APEX, {\it Herschel}, and ALMA observations.}\label{tab-alo}
\centering
\begin{tabular}{cc cc cc cc cc}
\hline\hline
Transition&$\langle\nu\rangle$\tablefootmark{a}&$\Sigma S_i\mu^2$&$E_u$&Date of&Vis.&Telesc.&Beam\tablefootmark{b}& $I(T_{\rm mb})$\tablefootmark{c}&Flux$\pm$1$\sigma$\\
$N_{\rm up}\!-\!N_{\rm low}$ & (GHz) &(D$^2$)&(K) &observations& phase& &(\arcsec)&(K\,km\,s$^{-1}$)&(Jy\,km\,s$^{-1}$)\\
\hline\hline\\[-7pt]
\multicolumn{10}{c}{AlO}\\
\hline\hline
6--5 & 229.67025503& 1522.89& 38.65& 6--23 Dec. 2013 & 0.5 & APEX &27.2 & $<$0.035 &$<$1.02\\
6--5 & 229.67025503& 1522.89& 38.65&29\,Oct./1\,Nov.\,2014 & 0.5 & ALMA &0.029& 24591.6\tablefootmark{d} &0.89$\pm$0.02\\
6--5 & 229.67025503& 1522.89& 38.65& 9--12 Jun. 2015 & 0.1 & APEX &27.2 & 0.076 &2.21$\pm$0.72\\[3pt]
8--7 & 306.19734234& 2030.60& 66.20& 7--8 Jul. 2014 & 0.1 & APEX &20.4 & 0.079 &2.34$\pm$0.65\\[3pt]
9--8 & 344.45177512& 2284.46& 82.73& Feb. 2014 & 0.7 & ALMA &0.88 & 16.79\tablefootmark{d} &1.25$\pm$0.09\\
9--8 & 344.45177512& 2284.46& 82.73& May 2014 & 0.9 & ALMA &0.43 & 119.28\tablefootmark{d} &2.16$\pm$0.29\\
9--8 & 344.45177512& 2284.46& 82.73&12--15 June 2014 & 1.0 & ALMA &0.33 & 291.31\tablefootmark{d} &3.05$\pm$0.03\\
9--8 & 344.45177512& 2284.46& 82.73& Aug.2013/Jul.2014&0.1/0.1& APEX &18.1 & 0.114 &3.41$\pm$0.81\\
9--8 & 344.45177512& 2284.46& 82.73& 21 July 2015 & 0.2 & ALMA &0.15 & 1838.58\tablefootmark{d} &3.84$\pm$0.02\\[3pt]
11--10 & 420.93832496& 2792.05& 121.30& 13--14 Aug. 2013 & 0.1 & APEX &14.8 & 0.408 &11.8$\pm$3.0\\
12--11 & 459.16920150& 3040.87& 143.33& 14 Aug. 2013 & 0.1 & APEX &13.6 & $<$0.140 &$<$4.03\\
13--12 & 497.38987615& 3300.05& 167.20& 1--8 Jul. 2014 & 0.1 & APEX &12.5 & 0.413 &11.9$\pm$2.3\\
29--28 &1106.98018793& 7362.47& 798.08& 20 Jul. 2010 & 0.7 & HSO &19.2 & 0.160 &57.1$\pm$19.0\\
\hline\hline\\[-7pt]
\multicolumn{10}{c}{AlOH}\\
\hline\hline
11--10 & 346.15555028 & 71.39 & 99.69 & Aug. 2013/Jul. 2014&0.1/0.1&APEX& 18.0 & 0.059 &1.77$\pm$0.49 \\
13--12 & 409.03103805 & 84.36 & 137.45 & 13--14 Aug. 2013 & 0.1&APEX& 15.3 & 0.105 &3.02$\pm$0.97 \\
15--14 & 471.87557840 & 97.35 & 181.23 & 14 Aug. 2013 & 0.1&APEX& 13.2 & 0.180 &5.18$\pm$1.54 \\
18--17 & 566.07395655 & 116.81 & 258.21 & 19 Feb. 2010 & 0.3& HSO& 38.3 & $<$0.072 &$<$22.48 \\
21--20 & 660.17593148 & 136.28 & 348.75 & 20 Jul. 2010&0.7& HSO& 32.4 & $<$0.074 &$<$23.10 \\
22--21 & 691.51905756 & 142.77 & 381.93 & 20 Jul. 2010&0.7& HSO& 31.1 & $<$0.128 &$<$39.96 \\
33--32 &1035.29846577 & 214.16 & 846.08 & 3 Feb. 2010&0.2& HSO& 20.6 & $<$0.275 &$<$85.93 \\
35--34 &1097.57173239 & 227.13 & 949.93 & 20 Jul. 2010&0.7& HSO& 19.4 & 0.315 &98.4$\pm$22.9 \\
\hline
\end{tabular}
\tablefoot{
\tablefoottext{a}{Weighted mean frequency of the hyperfine components, i.e. $\langle\nu\rangle=\Sigma\nu_i S_i/\Sigma S_i$, where $S_i$ is the component strength.}
\tablefoottext{b}{For non-circular beams a geometric mean of the minor and major axes is given.}
\tablefoottext{c}{Integrated intensity of the line or 3$\sigma$ upper limit in $T_{\rm mb}$ or $T_b$ units.}
\tablefoottext{d}{Brightness temperature calculated from flux within the Rayleigh-Jeans approximation.}
}
\end{table*}
\begin{figure*}
\sidecaption
\begin{minipage}{12cm}
\includegraphics[angle=270,width=12cm]{plot_AlO_APEXHerchel_p1_2015.ps}\\[3pt]
\includegraphics[angle=270,width=12cm]{plot_AlO_APEXHerchel_p2_2015.ps}\\[3pt]
\includegraphics[angle=270,width=12cm]{plot_AlO_APEXHerchel_p3_2015.ps}
\end{minipage}
\caption{{\bf Top and middle panels:} Five lines of AlO observed in the submillimeter-wave, single sideband spectra of Mira obtained in 2013--2015 with APEX. The features of AlO are broader (FWHM) than most other lines owing to unresolved hyperfine splitting (the components are shown as red bars). {\bf Bottom:} An archival spectrum of Mira obtained with {\it Herschel} in July 2010, where one other transition of AlO was observed. This double side-band spectrum contains a large number of emission lines from different species in two overlapping frequency ranges. This spectrum is smoothed to a lower resolution than in the APEX spectra shown in the upper panels.}\label{fig-alospec}
\end{figure*}
\subsection{ALMA}
The most sensitive submm observations of Mira to date are those obtained by ALMA at multiple epochs in 2014 and 2015.
The earliest ALMA data for Mira were obtained within the ALMA 2014 Long Baseline Campaign Science Verification (hereafter, SV data) \citep{alma}. The data are described in detail in \citet{wong}\footnote{see also \url{https://casaguides.nrao.edu/index.php?title=ALMA2014_LBC_SVDATA}}. One spectrum which covers the AlO $N$=6$\to$5 line was observed on 29 October and 1 November 2014 in the ``continuum mode'', i.e. with a poor spectral resolution of 20.5\,km\,s$^{-1}$. These high angular-resolution observations with a beam of about 34$\times$24\,mas are the most detailed observations of Mira to date.
The first ALMA observations at submm frequencies were reported in \citet{ramstedt}. They covered two frequency ranges within ALMA Band\,7 at about 330.25--334.00 and 342.35--346.09\,GHz that included the $N$=9$\to$8 line of AlO. From the ALMA archive, we extracted the raw data obtained with the 12-m array only and reduced them with the standard pipeline. The observations were obtained twice, on 24 Feb. 2014 and 3 May 2014, in nearly the same frequency setup but with different array configurations resulting in spatial resolutions (synthesized beams) of 1\farcs59$\times$0\farcs48 and 0\farcs51$\times$0\farcs37, respectively, at the frequency of the AlO line. Unlike in \citet{ramstedt}, we imaged the data from different dates separately. The flux levels of continuum and line emission differ in both datasets indicating variability at a level above the flux calibration uncertainties. The first dataset was calibrated using observations of the primary flux calibrator, Ganymede, with a model flux accurate to $<$5\%, while the second used the secondary calibrator J0334-401 whose flux is monitored at about 15\% accuracy. The calibration of phase and amplitude in the data used for the analysis here were further improved by a self-calibration procedure performed on the cumulative continuum emission. The spectra were recorded at a resolution equivalent to about 0.43\,km\,s$^{-1}$.
ALMA observed Mira again in Band\,7 on 12, 14, and 15 June 2014 in the same antenna configuration reaching an angular resolution of 0\farcs34$\times$0\farcs32 in the combined data. The observations are described in \citet{planesas}. Four spectral ranges were observed: 330.4--330.7 and 345.6--345.9\,GHz -- at a velocity resolution of 0.1\,km\,s$^{-1}$\ -- and 331.1--332.8 and 343.7--345.5\,GHz, at a velocity resolution of about 13.6\,km\,s$^{-1}$. One of the latter ranges -- observed with the low spectral resolution -- covers the $N$=9$\to$8 line of AlO. We imaged the data combining visibilities from the three dates. The data were calibrated in flux using observations of J0334-401, J0238+166, and J2258-279, whose fluxes are known to within 15\%. Further flux equalization between the three datasets was performed by setting the flux of the phase calibrator, J0217+0144, to the same average level.
Mira was observed by ALMA again in Band\,7 on 21 July 2015 reaching the best resolution and sensitivity so far at these wavelengths. Because these data were originally collected for the purpose of our study here, they are described in greater detail than the earlier ALMA observations. The spectra cover four ranges, 342.1--344.0, 344.1--346.0, 354.2--356.1, and 356.1--358.0\,GHz at a resolution of 0.98\,km\,s$^{-1}$. The spectrum covers the $N$=9$\to$8 line of AlO. The observations with 42 antennas of the 12-m array arranged on baselines between 15 and 1574\,m resulted in an angular resolution of about 0\farcs158$\times$0\farcs127 near the line of AlO. The observations were arranged into two consecutive execution blocks, each $\sim$1.1-h long. The calibrators were J0224+0659 for bandpass, J0217+0144 for phase, and J0238+166 for flux calibration. For the second execution, the flux-calibration scan failed and the bandpass calibrator was used for flux calibration instead. Its fluxes were assumed to be the same as in the first execution calibrated with J0238+166. We checked that the flux calibration in the two blocks was consistent and the data were combined. In order to improve the complex gain calibration of Mira images, we performed extra optimization of phase and amplitude using an iterative self-calibration procedure performed on channels dominated by continuum emission. The procedure increased the signal-to-noise of the data by a factor of a few.
All the ALMA data were imaged with Briggs weighting with the robust parameter set to 0.5. However, for reference, we also produced images with uniform and natural weighting to increase the nominal angular resolution or sensitivity, respectively.
\section{Results of submm/FIR observations}\label{sect-mm-results}
\subsection{Identification of AlO}
Most of the APEX spectral ranges were arranged to cover lines of AlO resulting in observations of six different transitions. Three transitions were also covered by ALMA and {\it Herschel}, most of them serendipitously. Two lines were observed in multiple epochs each. All the covered lines of AlO, with their spectroscopic parameters and measured intensities, are listed in Table\,\ref{tab-alo}. The line frequencies were taken from \citet{YamadaAlO}.
The $N$=6$\to$5 line was first covered in 2013 by APEX spectra but was not detected. When the observation was repeated with APEX in 2015, the line was detected and the emission peak was significantly above the corresponding rms noise levels of the earlier APEX attempt. As argued in Sect.\,\ref{sect-var}, the `emergence' of the line must be due to intrinsic variability of the source. The line was also observed in 2014 with ALMA within the SV observations at the high angular resolution but at the poor spectral resolution. Table\,\ref{tab-alo} presents the line intensities corresponding to a region where the \emph{absolute} intensity was above the 3$\times$rms noise level in the profile-integrated map.
The rotational transitions from $N_{up}$=8, 9, 11, 12, 13 were observed with APEX in several runs between 2013 and 2014. All but 12$\to$11 were firmly detected. The 9$\to$8 line was observed twice in that period, 11 months apart, and showed identical intensity in both APEX spectra (and they were combined, Sect.\,\ref{sect-var-apex}). The same 9$\to$8 transition was observed with ALMA at four different epochs and showed clear changes in the integrated flux (Table\,\ref{tab-alo}). The variability is discussed in later sections.
One extra transition of AlO, $N$=29$\to$28, was covered close to the edge of a spectrum from {\it Herschel}/HIFI. This line was detected using the same instrumental setup as in VY\,CMa \citep{vy_hifi}. The AlO emission is detected in Mira at a level of about 3$\sigma$ and is clearly apparent after smoothing the spectrum to a resolution of a few km\,s$^{-1}$. The position of the feature agrees very well with that of the stellar radial velocity.
Most of the detected lines are shown in Figs.\,\ref{fig-alospec} and \ref{fig-AlO-profile}. Because the rotational lines of AlO have considerable hyperfine splitting their FWHMs are broader (typically $\Delta\nu$=60\,MHz in the submm region) than those of other thermal lines originating from the same region of the envelope. This is clearly observed in our submm spectra of Mira (Fig.\,\ref{fig-alospec}). The $N$=29$\to$28 line in the FIR \emph{appears} narrower than those at lower frequencies owing to smaller hyperfine splitting of this high-frequency line. The positions and widths of lines leave little doubt that they belong to AlO. Our APEX observations covered a substantial range of frequencies within the available 345 and 460\,GHz atmospheric windows, which combined with the {\it Herschel} FIR spectra allowed us to perform a comprehensive identification of spectral features. As a result we can confidently state that none of the detected transitions assigned to AlO is significantly contaminated by other species observed in Mira.
With the observations in hand, in the following sections we attempt to characterize the AlO-containing gas that gives rise to the rotational emission.
\begin{figure}
\centering
\includegraphics[width=0.99\columnwidth]{plotprofileAlO_FluxTemp.ps}
\caption{
{\bf Top:} The AlO $N$=9--8 spectrum observed with ALMA on 12 July 2015 (red line). This is the best-quality (S/N and spectral resolution) spectrum of this transition to date. It was extracted from a region where profile-integrated flux is above the 3$\times$rms noise level. Our simulation of the profile is drawn in blue (see text for details). The green vertical bars mark individual hyperfine components with the height of the bars corresponding to the relative line strength, $S_i$, at $V_{\rm LSR}$ of 46.9\,km\,s$^{-1}$.
{\bf Bottom:} The profiles of the same line in the APEX (magenta) and ALMA data from Feb. and May 2014 (black). Both spectra were smoothed for clarity. The APEX spectrum is scaled in intensity units.}\label{fig-AlO-profile}
\end{figure}
\subsection{Location and extent of the AlO emission}\label{AlOmap}
The high angular resolution of the ALMA SV observations of the $N$=6$\to$5 line provide the most detailed view of the AlO spatial structure. Figure\,\ref{fig-mom0AlO65} presents a map of the continuum-subtracted and profile-integrated flux in the line (the appearance of the region depends on the details of data processing as explained in Appendix\,\ref{appendix-clean}). These observations resolved the stellar radio photosphere \citep{lynn,wong} and we definitely observe AlO absorption toward the resolved stellar disk. It is represented by the negative signal in Fig.\,\ref{fig-mom0AlO65}. The absorption against the stellar disk must be formed in gas with an excitation temperature lower than that of the mm-wave photosphere, i.e. below 2600\,K \citep{wong}.
The absorption region is surrounded by patchy emission with the strongest discrete components located approximately 63\,mas east and 42\,mas north from the stellar center, i.e. very near the edge of the mm-wave photosphere (2\,R$_{\rm mm,ph}$=51.2$\times$41.0\,mas or 2.9--4.4\,R$_{\star}$). Toward the southwest, we see only weak AlO emission, if at all. The S/N of the map is not good enough to state precisely how far from the stellar disk the AlO emission spreads out but all emission above three times the map rms noise level is encompassed by a circle of a $\sim$100\,mas radius.
In order to increase the dynamic range of the observations and infer the overall distribution of the AlO gas, we created a radial profile of the AlO region by averaging the map in the full azimuthal angle around the position of the continuum peak. The profile, shown in Fig.\,\ref{fig-profile}, demonstrates that the brightness nearly follows a power-law distribution and rises just next to the edge of the radio photosphere (the effect is smeared by the restoring beam). It can be traced as far as 150\,mas (10\,R$_{\star}$) from the star center. Some bumps seen at larger radii are unlikely to be real.
The minimum and maximum fluxes of the AlO(6$\to$5) emission are --73.4 and +153.8\,mJy/beam\,km\,s$^{-1}$. The emission above the 3$\sigma$ noise level occupies a solid angle about 27 times larger than that of absorption below the --3$\sigma$ level. This dominance of emission over absorption should produce a net pure emission feature if the source was not spatially resolved. Indeed, the $N$=9$\to$8 transition of AlO when observed with ALMA at $\sim$5 times lower angular resolution than the SV data appears as an emission region, i.e. no negative component is apparent (Fig.\,\ref{fig-mom0AlO98}). A Gaussian fit to the profile-integrated map of AlO(9--8) gives a source size of 123$\times$74\,mas ($\pm$6\,mas) at PA=95\fdg1$\pm$5\fdg3. As can be seen in Fig.\,\ref{fig-mom0AlO98}, the emission center is offset from the center of the submm-wave continuum by 40.2$\pm$2.3\,mas (2.8\,R$_{\star}$) toward the northeast (PA=45\degr$\pm$3\degr). What we observe in $N$=9$\to$8 is likely a combination of emission and absorption similar to that seen in $N$=6$\to$5. Indeed, the SV $N$=6$\to$5 data smoothed to the resolution of the $N$=9$\to$8 data from 2015 show almost exactly the same morphology and relative offset of the net AlO emission with respect to continuum. The AlO peak in the smoothed data is at an offset of 33.2$\pm$0.9\,mas (2.3\,R$_{\star}$) along a PA of 42\degr$\pm2$\degr. This comparison suggests that the overall distribution of the emission clumps did not change considerably over the nine months between the observations and at the different phases (0.5 vs. 0.2). We also note that the emission area of the 6$\to$5 line is equivalent to a Gaussian source with a FWHM of 107\,mas which is very close to the geometric mean of the size we determined for the 9$\to$8 line, FWHM=95\,mas. The latter line is observed at a S/N of 140 so we recover essentially all of its emission. That they cover the same effective area implies that we recover most of the emission in $N$=6$\to$5, even though it is observed at a lower S/N of 20 (when smoothed to the same angular resolution). The two transitions have $E_u$ values that differ by only about 44\,K and thus should not show drastically different morphologies.
\begin{figure}
\centering
\includegraphics[angle=0, trim=50 110 0 90, clip=true, width=0.99\columnwidth]{plot_paperfigure_AlOmap65_projections_200dpi.eps}
\caption{The integrated-intensity map of AlO emission in the $N$=6$\to$5 transition as observed with ALMA with a beam of 34$\times$24\,mas, shown as a white ellipse. White contours are drawn at --3 (dashed), 3, 4, 5, 6 times the map rms noise level of 15\,mJy/beam\,km\,s$^{-1}$. For comparison, the continuum emission is shown with a gray contour at 50\% of its peak emission which represents the extend of the beam-smeared radio photosphere. The dashed lines (magenta) show the directions of spatial cuts which are presented in Fig.\,\ref{fig-projections}. The map was produced by using data processed in CLEAN after continuum subtraction.}
\label{fig-mom0AlO65}
\end{figure}
\begin{figure*}
\centering
\includegraphics[angle=0, width=0.75\textwidth]{plotProfileAlO65_x2.eps}
\caption{The gray points are brightness measurements, $S$=$\int S_{\nu}$d$\nu$, of the AlO(6$\to$5) line with ALMA plotted against the distance from the continuum peak. (They represent values of each pixel of the integrated-intensity map plotted against the radial distance of the pixel with respect to the star.) The red line is a binned average of those measurements mirrored around zero. The cyan dash-dot horizontal line marks the 3$\times$rms level measured beyond 0\farcs6. The AlO emission can be traced above this 3$\times$rms level up to about 400\,mas and the overall profile is well reproduced by a power law, with an example drawn with a dashed curve. Drawn with a black line is the azimuthally averaged dirty beam which was scaled and inverted in intensity to show the errorbeam structures corresponding to the strongest observed component of the profile. At the bottom of the plot, in green, are shown some characteristic locations within the envelope: the region closest to the star where hot dust has been observed in minimum (inner edge) and maximum light (outer edge) \citep{degiacomi}; the range of SiO maser rings \citep{cotton}; the innermost radius where silicate dust is observed in Mira stars marked as ``silicates'' \citep{karovicova,wong}; the radius at which the wind arrives after 23 cycles (or 20.8 yr) at the terminal wind speed of 5\,km\,s$^{-1}$; and the projected location of Mira\,B.}
\label{fig-profile}
\end{figure*}
In the ALMA data for the $N$=9$\to$8 line from February, May, and June 2014, the angular resolution is not good enough to fully resolve the binary and the location of AlO emission with respect to Mira\,A alone cannot be investigated in detail. Nevertheless, simple single-component fits to AlO emission and to the combined continuum of Mira\,A and B\footnote{The cumulative continuum flux is largely dominated by the A component as their submm flux ratio is 13.5 \citep{planesas}.} imply that the AlO emission in June 2014 was located 30$\pm$4\,mas northeast (PA=44\fdg5$\pm$7\fdg2) off the continuum peak. The size of the AlO emission in this dataset is 149.9($\pm$9.7)$\times$117.5($\pm$12.5)\,mas and the source is elongated along a PA of 129\degr$\pm$7\degr.
In the data from May 2014, at an even poorer angular resolution, the offset is also present and is measured to be 51$\pm$28\,mas at PA=14\degr$\pm$23\degr. The source size is 176($\pm$22)$\times$85($\pm$29)\,mas at PA=94\degr$\pm$12\degr. The angular resolution and S/N of the data from February are too poor to put any reliable constraints on the size and location of AlO.
It can be concluded that the general distribution of the AlO gas around the stellar disk did not change considerably over the entire period of the ALMA observations discussed here (29 Oct. 2014--21 July 2015) with the net emission being strongest at 30--50\,mas (2.0--3.5\,R$_{\star}$) northeast from the star and with its longer axis extending approximately along a PA of 90\degr--130\degr. The typical size of the emission region is (120--175)$\times$(75--120)\,mas.
Among all the species observed with ALMA longest baselines so far \citep{wong}, only one weak line of SO ($^3\Sigma^-$ $7_8-7_7$ with $E_u$=81\,K near 214.33\,GHz) exhibits a morphology similar to that of AlO. The similarity of AlO emission to the spatial distribution of SO might suggest a similar excitation mechanism.
\begin{figure}
\centering
\includegraphics[angle=0,trim=40 55 0 10, clip=true, width=0.99\columnwidth]{plot_paperfigure_AlOmap98_thick_relative_300dpi_label.eps}
\caption{The same as Fig.\,\ref{fig-mom0AlO65}, but for the $N$=9$\to$8 transition of AlO observed with a lower angular resolution of 163$\times$132\,mas. Note that the map shows a region of the sky $\sim$4 times larger than in Fig.\,\ref{fig-mom0AlO65} and also encompases Mira\,B (left continnum source). Gray contours show continuum emission of the binary at levels of 2.5, 5, 10, 30, 60, and 90\% of the maximum. The center of the AlO emission, marked with a black cross, does not coincide with that of the continuum of Mira\,A.}\label{fig-mom0AlO98}
\end{figure}
\subsection{Analysis of the spectral profiles of AlO}\label{sect-AlOprof}
The spectral resolution of the ALMA SV data of the $N$=6$\to$5 line is rather poor and the entire line is only covered by seven resolution elements. Nonetheless, it still reveals interesting information about AlO around Mira\,A. We extracted spectra from the continuum-subtracted cube within three apertures with the size of the synthesized beam centered at ({\it i}) the absorption minimum, ({\it ii}) maximum emission east from the stellar disk and ({\it iii}) north from it. The absorption trough and eastern emission reach their extrema at exactly the same velocity of 53.4$\pm$0.5\,km\,s$^{-1}$, while the northern emission peaks at 42.4$\pm$0.4\,km\,s$^{-1}$. We next find that in a net spectrum averaged over the entire AlO(6--5) region, i.e. including emission and absorption, the profile is centered at the same velocity as the northern emission, 42.0$\pm$0.5\,km\,s$^{-1}$\ (the errors given here are 1$\sigma$ uncertainties of a Gaussian fit). The shift between the bulk of emission and the northern emission with respect to absorption and eastern emission of 11\,km\,s$^{-1}$\ is much smaller than one resolution element of 20.4\,km\,s$^{-1}$. With such a coarse binning and our modest S/N, these results are tentative, but we believe that there is an actual shift.
Our highest-quality spectrum of the $N$=9$\to$8 line is the one acquired with ALMA on 12 July 2015 and is shown in the top panel of Fig.\,\ref{fig-AlO-profile}. The spectral resolution and S/N ratio are sufficient to observe a multi-peak structure of the AlO profile imposed by the numerous overlapping hyperfine components. The hyperfine structure and intrinsic broadening form a profile with FWHM of 45\,km\,s$^{-1}$. We performed a simple simulation of the profile where each hyperfine component was represented by a Gaussian of intensity proportional to the component's strength, $S_i$. The central velocity was derived by cross-correlating the spectrum with the simulation in the {\tt rv.fxor} task of IRAF and additional $\chi^2$ model testing was performed in CASSIS\footnote{\url{http://cassis.irap.omp.eu/}}. This yielded a radial velocity $V_{\rm LSR}$=46.9$\pm$0.1\,km\,s$^{-1}$\ and intrinsic line width (FWHM) in the range 8--14\,km\,s$^{-1}$. The simulation reproduces the observed profile satisfactorily as shown in Fig.\,\ref{fig-AlO-profile}. The central velocity of $N$=9$\to$8 is consistent to within the uncertainties with the center-of-mass velocity of Mira of $V_{\rm LSR,sys}$=46.8$\pm$0.5\,km\,s$^{-1}$.
All other ALMA and APEX spectra of the $N$=9$\to$8 transition have too poor spectral resolution or S/N for a detailed analysis. Nevertheless, their positions and widths are generally consistent with what we have derived from the ALMA 2015 data. Two of the profiles are shown in Fig.\,\ref{fig-AlO-profile}. The shape of the profile from combined ALMA observations from February and May 2014 displays sub-peaks that appear sharper than in 2015. This may indicate that the intrinsic broadening was smaller in 2014.
\subsection{Interpretation}
The AlO observations can all be understood in a scenario in which inhomogeneously distributed AlO gas is infalling on the star: the strong northern emission component of $N$=6$\to$5 has nearly the same radial velocity as the star because it is located primarily in the plane of the sky and its motions are dominated by the tangential component. The redshifted absorption must be in front of the stellar disk and provides the strongest support for the infall interpretation; the eastern emission of AlO 6$\to$5, which also seems to be redshifted, must then be located closer to us than the star. However, we cannot entirely exclude here, that the velocity field may show an irregular pattern and that the individual clumps move randomly, with some moving out from the star while others fall on it. Then, the location of the emitting regions along the line of sight cannot be defined by the radial motions alone. (The redshifted absorption would, invariably, indicate infall motions in the part of the envelope seen against the stellar photosphere.)
The large broadening of 8--14\,km\,s$^{-1}$\ is likely related to the projected velocity dispersion within the AlO envelope. The maximum radial velocity probed by the emission in a spherically symmetric infalling (or outflowing) envelope of a radius $r$ seen partially against a stellar disk of a radius $R_{\star}$ is $V_{\rm r,max}=V_{\max} \sqrt{1 - \sin^2(R_{\star}/r)}$. The expected projected velocity dispersion is twice that figure. We observe the AlO emission at radii of 3--5.5\,$R_{\star}$ (Sect.\,\ref{AlOmap}) for which the velocity dispersion simplifies to $V_{\rm r,max}\approx V_{\rm max}$. This means that the observed maximum radial velocity is already a good measure of the maximum deprojected velocity. From this, we imply that the AlO gas captured by the observations is most likely infalling on Mira with a typical velocity of about 4--7\,km\,s$^{-1}$. If we are only seeing random clumps which do not reach the maximum possible velocity allowed by the dynamic process responsible for the motion, then the range of 4--7\,km\,s$^{-1}$\ is only a lower limit on the maximum velocity. We note, however, that the detailed model of Mira's envelope of \citet{wong}, constrained by high-quality ALMA data, also includes infall motions with an amplitude of 7\,km\,s$^{-1}$.
\subsection{Excitation analysis and abundance determinations}\label{sect-excitation}
The physical conditions of the AlO-bearing gas were constrained by using a population-diagram \citep{popdiagr}. All our measurements, corrected for the beam filling factor, are shown in Fig.\,\ref{fig-rotdiagr}. The scatter in point positions is large even for a single transition which was measured several times. We interpret this scatter as a consequence of true variability of the emission and discuss it in more detail in Sect.\,\ref{sect-var}. First, we treat the upper limits and the two measurements of $N$=9$\to$8 with the lowest fluxes, both from the Ramstedt et al. dataset, as outliers and will ignore them for now. We obtain a linear fit to the remaining points using a weighted least-square regression procedure. This yielded the excitation temperature of $T_{\rm ex}$=329$\pm$51\,K and a column density of $N$(AlO)=(4.0$\pm$0.6)$\times$10$^{15}$\,cm$^{-2}$. The linear fit is shown in Fig.\,\ref{fig-rotdiagr}.
The derived $T_{\rm ex}$ and $N$(AlO) are subject to many uncertainties \citep[cf.][]{mangum}. In our simple excitation analysis, it was assumed that the lines are optically thin and arise in isothermal gas under local thermodynamic equilibrium (LTE) conditions. To correct the measurements for beam filling factors, we assumed a source size equal to a circular Gaussian of 0\farcs12 FWHM. This is the typical size we found in Sect.\,\ref{AlOmap}.
\begin{figure
\centering
\includegraphics[angle=0,width=0.99\columnwidth]{rotDiagr_paper.ps}
\caption{Population diagram for AlO. Circles and pentagons respresent detected lines, while triangles mark upper limits. The dashed blue line is the LTE linear fit to most of the detected lines (see text). The dotted magenta line is a fit to the two points with $\varphi$=0.7. Black filled circles correspond to a non-LTE RADEX model with nearly the same parameters as constrained in the LTE fit and with H$_2$ density of 10$^9$\,cm$^{-3}$. Numbers in green show the visual phase corresponding to the datapoints.}\label{fig-rotdiagr}
\end{figure}
An important difficulty in analyzing the AlO data is a possible violation of the Boltzmann distribution in level populations. Even if only the APEX data collected before 2015 are taken into account, it is clear that under thermal equilibrium the $N$=12$\to$11 line ($E_u$=143.3\,K) should have been detected significantly above the noise level. We can reject any possibility that this line was not detected owing to instrumental or data-reduction problems.
Because the observation of $N$=12$\to$11 was nearly simultaneous with the observation of the 11$\to$10 line, which has a similar value of $E_u$ and which was detected with the same instrument, the only explanation of the observations is that the excitation of the AlO gas violates the assumption of LTE. The population of rotational levels may be strongly influenced by optical/IR excitation. This scenario is supported by the presence of AlO bands in optical spectra of Mira and their irregular variability (Sect.\,\ref{opt}). In the face of these arguments, the excitation temperature we obtain is ill-defined and does not have to be equal to the local kinetic temperature. Indeed, for the bulk of AlO gas located within a radius of $\sim$70\,mas (Sect.\,\ref{AlOmap}), models of Mira's envelope predict a kinetic temperature above about 900\,K \citep[][{\tt o54} models ]{ireland2011} or above 570\,K \citep{wong}.
We tested some of the assumptions of our population-diagram analysis by performing additional calculations with the radiative-transfer code RADEX \citep{radex} which applies the escape-probability formulation to solve the radiative transfer problem in one dimension under non-LTE conditions (statistical equilibrium is assumed). It still assumes a homogeneous and isothermal medium, but takes into account the line opacity effects. We used it in a mode that is equivalent to the large-velocity-gradient (LVG) method for a spherical envelope. To account for collisions of AlO with molecular hydrogen, we used the scaled collision-rate coefficients derived for SiO and He \citep{collRates} in the form in which they appear in the LAMDA database\footnote{\url{http://home.strw.leidenuniv.nl/~moldata/}}. All the observed AlO lines become thermalized for hydrogen densities exceeding $\log(n/{\rm cm}^3)$=8. At higher H$_2$ densities and at the kinetic temperature and column density derived from the population-diagram analysis, we find that all the observed lines are optically thin with an optical depth of $\tau$=0.1--0.4.
In Fig.\,\ref{fig-rotdiagr}, we present a RADEX model with a slightly higher column density, $N$(AlO)=6$\cdot$10$^{15}$\,cm$^{-2}$, which fits the fluxes of our best ALMA measurements very well.
A severe shortcoming of the rotational-diagram analysis is the sparse coverage of $E_u$, especially for higher rotational transitions. Our temperature fit relies strongly on the {\it Herschel} measurement at the high-energy end. Without this single observational point, the excitation temperature would be poorly constrained (194$\pm$143\,K) for the selected measurements. Furthermore, if we assume that the line fluxes change regularly with phase, the {\it Herschel} measurement at $\varphi$=0.7 does not match most of the other considered points collected mainly close to the visual maximum. There is only one other measurement of AlO emission at $\varphi$=0.7 which was obtained with ALMA in February 2014 and was discarded in our earlier analysis because its fluxes were significantly below all other measurements. Combining the two measurements yielded an excitation temperature of 857\,K and a column density of 2$\cdot$10$^{15}$\,cm$^{-2}$. While the column density is practically the same as that obtained in our earlier approach, the excitation temperature is significantly higher and is closer to the kinetic temperature expected in a region near radii of 3\,R$_{\star}$. If we now naively assume this is the actual excitation temperature at phase 0.7 and the temperature does not change significantly with phase, one needs two orders of magnitude higher column density of AlO to explain most of the measurements obtained near maximum light in the mm and submm range. This interpretation of our data would indicate significant changes in the amount of AlO with phase. We, however, disfavor this scenario because the line variability is not correlated with phase (see below) and hydrodynamic models predict drastic changes in gas temperature close to the star \citep[e.g.][]{ireland2011}.
\paragraph{Abundance} The derived AlO column density should be corrected for the effect from absorption (less than 5\% of the derived $N$(AlO)) and increased by AlO residing behind the radio photosphere (at most 10\%). These corrections are much smaller than the uncertainties in the estimated value of $N$(AlO). We use the value of $N$(AlO)=5$\cdot$10$^{15}$\,cm$^{-2}$, as the most representative, i.e. time- and area\footnote{Meaning the area in which $S_{\nu}$ is above the 3$\sigma$ noise level.}-averaged column density. Its full uncertainty -- including that of the source size, actual temperature, radiative transfer details, data processing -- is at least an order of magnitude. A calculation of a realistic abundance of AlO from this figure requires knowing the distribution and density of hydrogen. This information is not available from observations. It is even unknown whether hydrogen is mainly in the molecular or atomic form \citep[see discussion in][]{wong}. One can attempt to calculate the abundance using the density profiles of theoretical and semi-empirical models of Mira's environment but those usually assume spherical symmetry and differ in the absolute density scales at a given radius by orders of magnitude. For instance, for the hydrodynamic CODEX models of the {\tt o54} series\footnote{This series was constructed to fit the physical parameters of $o$\,Ceti. We converted the mass densities to number densities assuming a composition of 30\% He and 70\% of H$_2$. The H$_2$ column density was calculated for twice the distance from the radio photosphere to 90\,mas.} of \citet{ireland2011}, we get average H$_2$ column densities of the order of 10$^{22}$--10$^{24}$\,cm$^{-2}$ which give an AlO abundance of the order of 10$^{-7}$--10$^{-9}$. Referring to the semi-empirical model of \citet{wong}, we obtain an AlO abundance of 5$\cdot$10$^{-10}$. These values are significantly lower than the cosmic elemental abundance of aluminum with respect to hydrogen of 3$\times$ 10$^{-6}$ (or twice that value with respect to molecular hydrogen). If our calculations are correct, a significant fraction of Al, at least $\sim$90\%, is locked in species other than AlO.
\subsection{AlO variability at submm wavelengths}\label{sect-var}
It should be noted that our excitation analysis has the complication that we combined data from different epochs but we have provided proof that the emission is likely variable at least in some of the lines. The current data suggest that the emission region does not change much in shape and size on a timescale of years, but the absolute flux in some lines vary considerably. This is best illustrated in the population diagram in Fig.\,\ref{fig-rotdiagr}. The magnitude of the variability indicated by the spread in the measurements of each of the $N$=6$\to$5 and 9$\to$8 transitions is a factor a few or more, which can strongly influence the temperature determination. It is not known whether the variability is due to changes in the excitation temperature or the column density of AlO.
The variability of AlO lines may be a phenomenon related to that observed in SiO masers in Mira variables. The two lowest rotational lines of SiO $\varv$=1 and $\varv$=2 near 43 and 86\,GHz show variability that correlates closely with phase. The maximum maser emission occurs near visual phases 0.05--0.2 (0.13 for $o$\,Ceti) and thus coincides with the maximum of infrared light curves \citep{Pardo}. This correlation is likely to be related to radiative pumping through vibrational bands of SiO in the near-infrared \citep{masers1,masers2,Pardo}. The SiO amplitude changes from cycle to cycle, in particular for $o$\,Ceti. Higher rotational lines of SiO at mm and submm wavelengths vary strongly with phase too. In the first systematic study of this phenomenon, \citet{SiOvar} found some lines to disappear completely for phases in a range 0.4--0.7. Interestingly and contrary to SiO masers, radio maser emission of OH seems to show variability that anti-correlates with optical light variations \citep{GerardBeougois1993} so there may be different phenomena driving variable line emission.
Our submm observations of AlO provide poor coverage of the stellar variability phase (see Table\,\ref{tab-alo}) because most of the observations were conducted near optical maxima, i.e. near visual phase 0.1. All but one spectrum obtained near this phase resulted in an AlO detection, but the two single-dish observations obtained at a later phase near 0.5 did not show AlO emission. At still later phases of 0.7 and 0.9, the very sensitive ALMA observations showed lower intensity than measurements at phases 0.1--0.2. One can claim that there is a general trend of AlO intensity decreasing with phase which would correspond to what is observed for the mm/submm masers of SiO. However, the pattern of AlO variability in Mira seems very erratic. There are multiple exceptions that differ from the above trend: ({\it i}) the $N$=29$\to$28 line observed with {\it Herschel} was detected at a very late phase of 0.7 (visual light minimum); ({\it ii}) the $N$=12$\to$11 line was not detected although it was observed near infrared maximum (phase 0.1) simultaneously with other AlO lines which were detected; and ({\it iii}) the $N$=6$\to$5 line observed with ALMA and APEX shows very consistent intensities although probed at phases of 0.1 and 0.5. Also, the 9$\to$8 line observed in August 2014 ($\varphi$=0.1), June 2014 ($\varphi$=0.0), and July 2014 ($\varphi$=0.1) shows excellent agreement although it was measured in different cycles. For comparison, the SiO maser lines hardly ever have the same flux in different cycles.
Although we took every precaution to use the best possible data, our picture of the variability in AlO transitions may be slightly distorted by instrumental and calibration issues. Better phase coverage and observations in multiple cycles are needed to obtain more conclusive variability studies of submm AlO lines in Mira. However, erratic variability is also observed in the optical bands of AlO discussed in Sect.\,\ref{sect-optAlO-var}.
\subsection{Identification and analysis of AlOH}\label{sect-aloh}
Rotational lines of AlOH were measured accurately in the laboratory \citep{AlOHlab} but it has only been identified in the circumstellar envelope of the red supergiant VY\,CMa \citep{ref-AlOH,kami_surv}. Our APEX observations covered three transitions of AlOH ($J$=11$\to$10, 13$\to$12, 15$\to$14) and the collected {\it Herschel}/HIFI spectra covered five more transitions (18$\to$17, 21$\to$20, 22$\to$21, 33$\to$32, and 35$\to$34). Only three were found, $J$=13$\to$12, 15$\to$14, and 35$\to$34, at an integrated intensity 3$\sigma$--5$\sigma$ above the corresponding noise levels. The hyperfine splitting in the rotational lines of AlOH is smaller than that of AlO, and the width of the lines does not provide additional support for the identification as it was the case for AlO. Nevertheless, the identification is likely correct as there are no other good candidate carriers that would explain these features in a consistent manner. All AlOH observations are summarized in Table\,\ref{tab-alo}. Unfortunately, none of the sensitive ALMA observations covered AlOH.
Combined into a rotational diagram, the emission features imply a temperature of 1960$\pm$170\,K (assuming a source size of 0\farcs2). Upper limits on the non-detected lines are consistent with this fit. The derived excitation temperature is high but is plausible in this source if the gas is located close to the pulsating photosphere of Mira. The drastically different temperatures for AlO and AlOH gas (330\,K vs. 1960\,K) are rather surprising. In the models of IK\,Tau of \citet{gobrecht}, AlO is converted in AlOH at late pulsation phases close to the star, making then AlOH the prevalent Al-bearing species at large radii. The bulk of gas containing AlOH should therefore appear cooler than the gas abundant in AlO. Our results suggest this is not the case in $o$\,Ceti but non-thermal level population and line variability may influence our analysis of AlOH, just as discussed for AlO in Sect.\,\ref{sect-excitation}.
Because of the many uncertainties in the AlOH excitation and the unknown spatial origin of its emission, we did not derive the molecular abundances. It is important for Al chemistry in Mira, but a quantitative analysis will require more observations.
\subsection{Other Al-bearing species in submm spectra}
We searched for other Al-bearing species in the submm spectra of Mira using the standard spectral line catalogs \citep{jpl,cdms2}. The only other Al-bearing molecules observed so far in circumstellar environments are AlCl and AlF. Multiple transitions with $E_u\!>$162\,K of AlCl and $E_u\!>$44\,K of AlF were covered by the most sensitive APEX, ALMA, and {\it Herschel} observations, but none was firmly detected. We also covered but did not detect lines of AlCN, AlNC, and AlS. In Sect.\,\ref{sect-AlH}, we report that AlH was observed in Mira at optical wavelengths, but no pure rotational transitions were covered \citep{AlH}. An observation of this molecule at submillimeter wavelengths is challenging, because the lowest transition near 387\,GHz is within a deep telluric water band. In the current data, AlO and AlOH are the most prominent mm/submm tracers of Al in $o$\,Ceti.
\section{Optical spectroscopy of Al-bearing species}\label{opt}
The optical spectra of material surrounding cool evolved stars contain useful information about gas-phase species thought to be important for dust condensation, as has been shown in \citet{kami_alo} and \citet{kami_tio} for VY\,CMa. In the following, we present results of our search of those species in multiepoch spectra of Mira.
Of primary interest is AlO because it is the direct gas-phase precursor of alumina dust, Al$_2$O$_3$ \citep{sarangi,gobrecht}. The electronic $^2\Sigma^+ B-^2\Sigma^+ X$ system of AlO has been reported to show anomalous behavior in optical spectra of Mira variables. Not only do the strengths of the absorption bands change with phase and from cycle to cycle, but the absorption bands were observed to turn into emission features in several sources, including Mira \citep[][and references therein]{keenan,garrison}.
Here, we investigate the behavior of the optical bands of AlO in Mira using long-term spectroscopic data with the aim of identifying patterns which would allow us to establish the origin of AlO.
We then used the same observational material to investigate the presence of spectral signatures of other interesting species, including AlOH, AlH, and \ion{Al}{I--II}.
\subsection{Optical observations}
In order to investigate the time variation of the optical bands of AlO in the spectrum of Mira, we performed an extensive search for archival spectra and literature data. We searched through all major public archives for optical spectra covering any sequence of the $B$--$X$ system. Only spectra at high and intermediate resolutions turned out to be useful in our analysis.
A resolution better than $R\!\approx$5000 was needed to disentangle the bandheads from nearby spectral features of other species and to investigate the shape of the rotational profile of the bands. Consequently, most of the collected data are from echelle spectrographs. The high-resolution spectra we have collected are listed in Table\,\ref{tab-obslog-opt}. A major portion was acquired in spectropolarimetric mode and in these cases the total-power (Stokes $I$) data were analyzed. Whenever possible, we used reduced (`pipelined') data products offered by some of the archives, while in the remaining cases the data reduction was performed manually with IRAF using standard reduction techniques \citep[e.g.][]{echellereduction}. Particular care was taken to obtain good wavelength calibration. Exposures from the same night were averaged. Most of the spectra in our sample are not calibrated in flux. Although most of the echelle spectra were corrected for a blaze response function, the slope of the pseudo-continuum in most of the spectra is unknown at wavelength ranges covering multiple orders. Visual magnitudes for each observed spectrum are available from the densely-spaced observations of the American Association of Variable Star Observers (AAVSO). The nearest measurement for the given date is included in Table\,\ref{tab-obslog-opt}, as well as information on the spectral coverage (ignoring gaps in some of the echelle spectra) and resolution, references to papers describing the observing run or the name of the principal investigator of the observing project if no literature reference could be identified.
\begin{sidewaystable*}
\caption{High-resolution optical spectra of Mira collected from archives.}\label{tab-obslog-opt}
\centering
\begin{tabular}{cc cc cc cc cc cc}
\hline\hline
Instrument &Telescope/observatory & Date & JD &Nominal& \multicolumn{2}{c}{Spectral coverage}&Vis. & Vis. & Reference & Notes\\
& & & & $R$ & start (\AA)& end (\AA)& phase & mag & or project PI& \\
\hline\hline
McKellar Spectrograph &Dominion Obs. 1.2m & 1965-12-14 & 2439108.7 & 21000& 3900 & 5100 & 0.94 & 3.5 & PI: E. Griffin & \tablefootmark{a}\\
ELODIE &OHP & 1998-11-07 & 2451124.0 & 42000& 4000 & 6800 & 0.89 & 7.0 & 1 & \tablefootmark{b}\\
Echelle Hi-Res Spectrogr. &Mt. Ekar 182 cm, Asiago& 1999-02-11 & 2451221.2 & 20000& 4600 & 9470 & 0.18 & 6.0 & 2 & \tablefootmark{c}\\
ELODIE &OHP & 1999-09-29 & 2451450.0 & 42000& 4000 & 6800 & 0.86 & 7.0 & 1 & \tablefootmark{b}\\
ELODIE &OHP & 1999-12-16 & 2451528.9 & 42000& 4000 & 6800 & 0.10 & 3.4 & 1 & \tablefootmark{b}\\
HIDES &Okayama-NAOJ 188cm & 2001-08-29 & 2452151.3 & 95000& 4620 & 5820 & 0.97 & 3.2 & 3 & \\
FEROS &ESO MPI 2.2 m & 2004-10-02 & 2453280.3 & 48000& 3600 & 9200 & 0.36 & 7.2 & 4 & \tablefootmark{d}\\
SARG &TNG & 2005-12-11 & 2453716.4 & 11800& 5000 & 8000 & 0.67 & 9.0 & PI: E. Verdugo & \tablefootmark{e}\\
ESPaDOnS &CFHT 3.6m & 2006-08-14 & 2453962.1 & 68000& 3690 & 10480 & 0.41 & 7.2 & PI: Dinh-V.-Trung & \tablefootmark{f}\\
SOPHIE &OHP 1.93m & 2007-01-12 & 2454113.3 & 75000& 3870 & 6940 & 0.86 & 5.6 & PI: D. Gillet & \tablefootmark{b}\\
SOPHIE &OHP 1.93m & 2007-01-20 & 2454121.2 & 75000& 3870 & 6940 & 0.89 & 4.3 & PI: D. Gillet & \tablefootmark{b}\\
SOPHIE &OHP 1.93m & 2007-01-30 & 2454131.2 & 75000& 3870 & 6940 & 0.92 & 3.3 & PI: D. Gillet & \tablefootmark{b}\\
ISIS &WHT, INT la Palma & 2007-07-31 & 2454312.7 & 4500& 3650-4560 & 6630-7300 & 0.46 & 8.5 & PI: F. Leone &\tablefootmark{f}\\
MMCS &ZEISS-2000, Terskol Astr. Obs.& 2007-08-15 & 2454327.5 & 13000& 3970 & 7485 & 0.51 & 8.3 & PI: O. Andriyenko & \\[5pt]
NARVAL &2m TBL, Pic du Midi & 2007-09-04 & 2454348.7 & 65000& 3700 & 10480 & 0.57 & 8.8 & 5 & \tablefootmark{f}\\
& & 2008-01-20 & 2454486.3 & & & & 0.98 & 3.6 & \\
& & 2008-02-10 & 2454507.3 & & & & 0.05 & 4.2 & \\
& & 2008-08-29 & 2454708.7 & & & & 0.65 & 9.2 & \\
& & 2009-02-26 & 2454889.3 & & & & 0.19 & 5.1 & \\
& & 2009-07-24 & 2455037.6 & & & & 0.64 & 9.2 & \\
& & 2009-09-23 & 2455098.5 & & & & 0.82 & 8.8 & \\
& & 2009-10-03 & 2455107.4 & & & & 0.85 & 8.0 & \\
& & 2009-10-25 & 2455130.5 & & & & 0.92 & 4.7 & \\
& & 2009-11-24 & 2455160.3 & & & & 0.01 & 3.5 & \\
& & 2009-12-10 & 2455176.3 & & & & 0.05 & 4.0 & \\
& & 2009-12-20 & 2455186.3 & & & & 0.08 & 4.2 & \\
& & 2010-01-06 & 2455203.4 & & & & 0.14 & 4.6 & \\
& & 2010-01-18 & 2455215.3 & & & & 0.17 & 4.7 & \\
& & 2010-02-10 & 2455238.3 & & & & 0.24 & 5.4 & \\[5pt]
HARPS &ESO 3.6m & 2012-08-09 & 2456148.4 & 115000& 3780-5300 &5340-6910 & 0.97 & 3.7 & PI: F. Leone & \tablefootmark{f}\\
\hline
\end{tabular}
\tablebib{
(1)~\citet{elodieobs};
(2)~\citet{Asiago};
(3)~\citet{hides};
(4)~\citet{ferosobs};
(5)~\citet{narval}.
}
\tablefoot{
\tablefoottext{a}{Scanned plate.}
\tablefoottext{b}{Archive product.}
\tablefoottext{c}{Interorder gaps above 6880\AA.}
\tablefoottext{d}{Interorder gaps above 8530\AA.}
\tablefoottext{e}{Underexposed in blue part.}
\tablefoottext{f}{Spectropolarimetric observation.}
}
\end{sidewaystable*}
The oldest spectra we were able to access in digitized form are scanned spectral plates from the Dominion Astronomical Observatory. In addition to these, we found reproductions (scanned GIF files of paper copies) of Mira spectra covering the AlO band in \citet{joy} (later reproduced in \citet{bax} and \citet{merrill62}) and \citet{keenan}, which show two-dimensional plates. Additionally, \citet{garrison} showed an extracted one-dimensional spectrum. Further useful information on the appearance of AlO bands in Mira is found in \citet{keenan}, \citet{kipper}, and \citet{garrisonAbstract}.
Table\,\ref{tab-obslog-opt} also lists the phase corresponding to the given observing date. Although the shape of the Mira's visual light curve deviates strongly from a sinusoidal pattern and its period is known to change by a few days on time scales of years \citep{period}, we use a simple sine function to define the phase for data since 1999, with a period of 333 days \citep[cf.][]{period} and date of maximum on JD=2452161.0. The date of maximum was measured for the 2001 cycle which showed a very well defined maximum. Such a parametrization of the stellar periodicity is also consistent with our sinusoidal fit to the AAVSO visual data for 1999--2013. The shape of the phased light curve within that time span together with the markings representing the coverage of the collected visual spectroscopy (Table\,\ref{tab-obslog-opt}), are shown in Fig.\,\ref{fig-phase}. The maxima occur close to phase $\varphi$=0, while -- due to an asymmetry of the actual light curve -- the minima occur at $\varphi\!\approx\!-0.33$=0.67. Using $JHKL$ photometry from \citet{shenavrin} and \citet{whitelock}, we found that the near-infrared fluxes ($JHKL$) peak at $\varphi=0.17\pm0.05$ on our periodicity scale.
\begin{figure}
\centering
\includegraphics[angle=270,width=0.99\columnwidth]{pap_phasedCurveLowHigh.ps}
\caption{Phased AAVSO light curve of Mira in 1999--2013. The faint-maximum cycle of 1999 and the two recent cycles with bright maxima (2007 and 2011) are shown with blue, green, and cyan symbols, respectively. The dates of spectroscopic observations (Table\,\ref{tab-obslog-opt}) are marked with verical bars. For some dates, the corresponding bars appear twice in the graph, i.e. at $\varphi$ and $\varphi \pm 1$.}\label{fig-phase}
\end{figure}
We also searched through the archives for near-infrared spectra of Mira that covered the $A$--$X$ band of AlO \citep[cf.][]{kami_v1309,baner}. We found only one spectrum with a sufficient spectral resolution, $R$=37\,600, that was obtained on 26 August 2001 ($\varphi$=0.96) with the NIRSPEC instrument on Keck by A. Nelson. A simulation of the $A$--$X$ system by a similar method as in \citet{kami_v1309} revealed that the (4,0) band with heads at 1225 and 1243\,nm is the strongest near-infrared band for a broad range of excitation temperatures. We reduced and inspected only the part of the Keck spectrum that covers the (4,0) band. We found no signatures of the electronic system of AlO. However, it should be noted that the spectrum was acquired only three days before optical observations with HIDES in which the AlO bands of the $B$--$X$ system were very strong. This leads us to a conclusion that the NIR system is not particularly useful for studies of AlO in $o$\,Cet. Indeed, the NIR band is expected to be much weaker than the optical bands \citep{exomolAlO}.
\subsubsection{Observed variations in the B-X band of AlO}\label{sect-optAlO-var}
We were able to identify features in the AlO $B$--$X$ system involving the vibrational levels up to at least $\varv_{\rm up}$=3 in the upper electronic state in all the collected high- and mid-resolution spectra of Mira. The main bandheads appear in absorption, occasionally in emission, and as a combination of absorption and emission features. Examples of emission- and absorption-dominated spectra are shown in Fig.\,\ref{fig-AlOband}. Independent of whether they appear in emission or in absorption, the bandheads are rather weak, but the characteristic shape of the band is readily recognizable in the spectra.
\begin{figure*}
\centering
\includegraphics[angle=270,width=0.79\textwidth]{plot_AlOem_pap.ps}
\caption{Sample optical spectra of AlO in two epochs (red and blue), covering the heads of the (0,0) and (1,1) bands and their rotational combs. Simple simulations (green) illustrate the location of the emission and absorption components. Many spectral features are of atomic origin. The reason for the poor correspondance of the observation and simulation at the (0,0) bandhead of AlO is the lack of an underlying absorption feature in the similation and a limited correction for optical thickness, which is highest near the head. All spectra covering these and other bands of AlO at different dates are shown in Figs.\,\ref{fig-AlOp2}--\ref{fig-AlOm1}.}\label{fig-AlOband}
\end{figure*}
The collected spectra are sufficient to study the long-term variability within the bands which is not feasible with the current mm and submm data. Results of this analysis are presented separately for spectra dominated by absorption and emission in Sects.\,\ref{sect-opt-abs} and \ref{sect-opt-abs}. All spectra covering the AlO sequences $\Delta\varv$=2, 1, 0, --1 are shown in the spectral atlas in Figs.\,\ref{fig-AlOp2}--\ref{fig-AlOm1}.
\subsubsection{Absorption in AlO}\label{sect-opt-abs}
The $\Delta\varv$=$-2$ sequence, located near 5340\,\AA, and all negative sequences at longer wavelengths -- although covered by many of our spectra -- are too weak for variability studies. The $\Delta\varv$=$-1$ sequence near 5080\,\AA\ is dominated by absorption features which show definite variability. Episodes when AlO absorption becomes weaker than normal were identified. The weakest absorption band was observed on 2012-08-09. The weakening of those bands is not correlated with phase or time. The apparent weakening of those absorption features may be due to an overlying AlO emission component of variable intensity. A presence of such a component is evident in the higher progressions, $\Delta\varv$=0 and 1. Bands within the $\Delta\varv$=0 sequence are weak but still definitely present.
We used the spectra of the $\Delta\varv$=--1 sequence, which is longward of 5080\,\AA\ and is not contaminated or just weakly so by emission, to measure the representative velocities of the absorbing AlO gas. First, we measured the velocity of the spectrum from 2010-02-10 by cross-correlating it with a simulated spectrum of the absorption. The cross-correlation algorithm {\tt rv.fxcor} implemented in IRAF was used \citep[e.g.][]{fxcor} and the simulated spectrum was calculated in an analogous way as in \citet{kami_alo}.
The typical velocity for our sample of spectra is 57.5\,km\,s$^{-1}$\
with the highest measured deviations from this value of +2.0 and --1.4\,km\,s$^{-1}$, and a standard deviation of 1.0\,km\,s$^{-1}$. The phases corresponding to the spectra densely cover the full pulsation cycle and hence $V_h$=57.5$\pm$2.0\,km\,s$^{-1}$\ characterizes the full dispersion well. The central velocity is consistent with the center-of-mass velocity of Mira ($V_{h,\rm sys}$=57.0$\pm$0.5\,km\,s$^{-1}$) and the central velocity of the submm emission of AlO in pure rotational lines ($V_{h,\rm sys}$=57.1\,km\,s$^{-1}$, Sect.\,\ref{sect-AlOprof}). The variations in velocity that we measured are small but greater than our uncertainties.
A rare event recorded in the AlO spectra is the appearance of extra absorption components that are strongly redshifted. This is observed in the (1,0) and (2,1) heads of $\Delta\varv$=+1 in 24 July, 23 September, and 3 October 2009 (but not 23 days later) -- see Fig.\,\ref{fig-AlOp1}. In the same spectra, the (0,0) band is unusually broad, the (0,1) bands are slightly broader than usual, and there are no unusual changes in the other sequences. The extra absorption components therefore involve only $\varv_{\rm low}$=0 and 1 levels, suggesting that they arise in material cooler than that producing usual absorption bands of AlO and observed in progressions involving higher-$\varv_{\rm low}$. Similar apparent broadening or splitting of spectral features is simultaneously observed for other species, including \ion{Al}{I} (Sect.\,\ref{sect-al}). In the profile of the AlO\,(2,1) band, we measured that, in addition to the usual component very close to stellar center-of-mass velocity, there are extra components at heliocentric velocities of about +95\,km\,s$^{-1}$\ and possibly at +140\,km\,s$^{-1}$. Such high velocities reaching 80\,km\,s$^{-1}$\ with respect to the star are surprising, but not impossible in this source. The motions are likely not associated directly with the usual pulsation-driven shock wave, because they are absent in most of the cycles covered by our spectra.
The usual absorption profiles of AlO also show considerable variability in their widths. We infer the intrinsic Doppler broadening as the kernel width that we used to convolve our simulated spectrum to fit the observed features. When the bands are strong, their half-width is nearly 30\,km\,s$^{-1}$, as in 2001-08-29 ($\varphi$=0.97). Such a high velocity dispersion in Mira can only be explained as arising in the shock wake. Macroturbulence is expected to be greatly enhanced behind a shock \citep[cf.][]{macroturbulance}, however, the broad profile may also be an opacity effect which we were not able to simulate with our simple tools. In a great majority of our spectra the absorption is narrower, often comparable to the instrumental profile of a few km\,s$^{-1}$. (It cannot be measured accurately owing to a much lower S/N of these narrow and weak features.) This may indicate that the AlO absorbing gas is present both in the shocked gas and in material that had time to dissipate the shock energy.
We could not constrain precisely the rotational temperature of the gas from the shapes of the bands. The major difficulty is how to define the level of the local pseudocontinuum underlying the bands. Another obstacle is the presence of numerous atomic absorption features that distort the band shape. Our simulation of the bandheads are nevertheless consistent with the observations within a broad range of rotational temperatures from a few hundred to $\sim$1500\,K. The vibrational temperature, although variable, is likely equal to a few hundred K.
\paragraph{Spatial origin of AlO absorption}
Because of the complex behavior of the AlO features, we shall consider several locations of the absorbing AlO gas. If the absorption was produced in the accelerated wind seen in front of the stellar disk, the features would be blueshifted by the magnitude of the wind terminal velocity, i.e. by --5\,km\,s$^{-1}$\ from the stellar velocity (Sect.\,\ref{sect-intro-structure}). Such a large offset is not observed. In addition, features arising in a homogeneous, stationary wind would not show temporal velocity variations contrary to what we have measured. Therefore, the AlO absorption features do not come from the fully-accelerated wind, and must arise closer to the star at radii $\lesssim$5\,R$_{\star}$\ \citep[cf.][]{Nowotny2010}.
We also exclude the possibility that the AlO absorption is formed in the photosphere on the basis of the low amplitude of the velocity variations in the AlO features. Rovibrational lines $\Delta\varv$=3 of CO which are observed in absorption in Mira are believed to be formed in the stellar photosphere. They show velocity variations with an amplitude of 24\,km\,s$^{-1}$\ \citep{IRveloCO} which are much higher than what we have measured for the AlO absorption bands. Similarly, high-excitation atomic lines show considerable shifts with phase. By cross-correlating the spectra in the region between 4035 and 4095\,\AA, that is dominated by numerous sharp absorption lines, we determined that the relative displacements between different dates reach 9.4\,km\,s$^{-1}$. (This value is higher than the maximal displacements found by \citet{joy2}, but is smaller than those in \citet{joy}). The amplitude of velocity changes for atomic lines is known to be correlated with the brightness of the cycle's maximum \citep{joy2} and since we covered cycles with very bright maxima (e.g. 2007) as well as faint minima (1998/99), the low amplitude of AlO displacements indicates that the AlO gas is nearly stationary, independent of this inter-cycle effect. The AlO-bearing gas therefore must be located high enough above the pulsating atmosphere to not be influenced by the regular high-amplitude motions, say at $>$2.5\,R$_{\star}$.
We conclude that the visual absorption features must arise between the photosphere and the fully accelerated wind, or roughly between 2.5 and 5\,R$_{\star}$. The kinetic temperature in this region is $\sim$1000\,K (as in the CODEX models of \citealp{ireland2011}) which is consistent with our rough constraints on the rotational temperature of AlO as traced by the $B$--$X$ band. It is very likely that the electronic bands are formed in the same AlO gas as that observed in pure rotational transitions at mm and submm wavelengths. The variable nature of the electronic absorption is consistent with the observation that the AlO gas is clumpy, as seen in the $N$=6$\to$5 line with ALMA. The observed variability can arise as clumps of different opacity pass in front of the stellar disk.
\subsubsection{Emission in AlO}\label{sect-opt-em}
Our spectroscopic records contain two episodes of emission-dominated profiles of AlO on: ({\it i}) 1998-11-06 with strong emission in the $\Delta\varv$=0 and +1 sequences, and ({\it ii}) 2007-09-04 with the strongest emission signatures in the $\Delta\varv$=1 band. Much weaker, but still easily recognizable emission was seen in a sequence of spectra registered immediately after the 1998-11-06 ($\varphi$=0.9) flare, i.e. on 1999-02-11 ($\varphi$=0.2) and 1999-09-28 ($\varphi$=0.9). Chronologically the next spectrum, from 1999-12-16, shows very weak absorption bands, but the absorption profile is definitive only in the spectrum from 2001-08-29 ($\varphi$=1.0). For the AlO flaring event which was most evident on 2007-09-04 ($\varphi$=0.6), the emission was observed mainly in the $\Delta\varv$=+1 sequence, and was preceded and followed by spectra with emission nearly filling the absorption bands. From these two events, we conclude that bright, easily observable emission in AlO bands may appear at any phase, may last for at least one year, and is not necessarily limited to a single cycle. This behavior is different than that observed in most atomic/ionic lines which show regular changes in intensity with peaks near $\varphi$=0.9--0.1 and minima near $\varphi$=0.6 \citep{richter2001}. The two strong emission episodes took place at phases 0.9 and 0.6, i.e. near maximum and minimum visual light. This erratic variability resembles that of pure rotational lines of AlO observed at mm and submm wavelengths (Sect.\,\ref{sect-var}).
The central velocities of the AlO emission component could only be measured for the 1998-11-06 and 2007-09-04 spectra. On the earlier date, not only the bandheads are useful for velocity measurements but also the individual features of the rotational comb far from the head are very well reproduced by our simulation and constrain the radial velocity (Fig.\,\ref{fig-AlOband}). The velocity of the band is $V_h$=53.8$\pm$0.5\,km\,s$^{-1}$. The central velocity of the emission seen on 2007-09-04 is less certain but our best estimate is 56$\pm$2\,km\,s$^{-1}$. The AlO emission therefore appears stationary or blueshifted by at least 3\,km\,s$^{-1}$\ with respect to the stellar velocity (57.0$\pm$0.5\,km\,s$^{-1}$). We believe that the underlying absorption is too weak to influence the position measurements we have performed. Although the AlO-emission episodes are too rare to form definitive statements, the kinematical characteristics resemble that observed in most atomic/ionic optical emission lines which also always appear blueshifted \citep{richter2001}. The atomic features are thought to be associated with a shock propagating outward in the stellar atmosphere. Low-excitation atomic lines show low velocity displacements of a few km\,s$^{-1}$, while emission features requiring high excitation can be shifted by as much as 20\,km\,s$^{-1}$. We conclude that the visual emission of AlO arises when the shock front reaches the higher parts of the stellar atmosphere where the shock-imposed gas motions are small, thereby explaining the small shift of only 3\,km\,s$^{-1}$.
The intrinsic broadening of the emission features is small. To reproduce the rotational comb of the AlO emission observed on 06-11-1998, we convolved the simulated spectrum with a Gaussian of FWHM of 8\,km\,s$^{-1}$, a value that is comparable to the resolution of the spectrum. The measured width is also consistent with that derived for the submm lines of AlO (Sect.\,\ref{sect-AlOprof}).
\subsubsection{Excitation mechanism of electronic AlO bands in Mira}
The upper electronic state of the $^2\Sigma^+ B-^2\!\Sigma^+ X$ system of AlO is 28\,800\,K above the ground and therefore is most likely excited by shocks. Excitation temperatures of the order of 10$^4$\,K are definitely possible in Miras since strong emission in recombination lines of hydrogen are observed on every cycle. \citet{richter2003} were able to model weak and episodic emission of \ion{Fe}{II} ($E_u$=32\,570\,K) and [\ion{Fe}{II}] (63\,950\,K) on the assumption that the upper levels are excited in the shock at a radius $\sim$1.5\,R$_{\star}$. The gas giving rise to the AlO emission might be excited in a similar way, but probably at slightly higher distances from the star. Also, if AlO emission is associated with the shock, then its presence for more than one cycle, as in 1998/1999, may indicate that the emission arises in gas of very low density that is not able to efficiently cool down only through radiation in a single period \citep[cf.][]{richter2003}.
Analogous to the shock-excited lines of \ion{Fe}{II}, AlO emission is sporadic. One may speculate that the AlO bands show an emission component only when the shock reaches the AlO material that is usually seen in Mira only in the absorption bands. It is unclear why this occurs only occasionally. The episodic emission in \ion{Fe}{II} and [\ion{Fe}{II}] lines was linked to a shock wave that is stronger than typical and is associated with cycles that show bright maxima \citep{richter2003}. However, as we discuss in Sect.\,\ref{sect-AlO-brightMax}, it is doubtful whether there is a link between the occurrence of AlO emission and bright-maxima cycles. Hydrodynamic pulsation models calculated for long time series show, however, that the positions of shock fronts and the extend of shocked gas change chaotically in Mira stars \citep{irelandErratic}.
The absorption by AlO is most likely a result of resonant scattering of stellar light off the circumstellar gas. The gas is clumpy (Sect.\,\ref{AlOmap}) and the observed variability may be explained by different clumps passing in front of the stellar disk. Most of the time, however, the gas is stationary with respect to the center-of-mass velocity what suggests it may be located in a region sometimes referred to as a MOLsphere \citep{molsphere} or may correspond to the "warm molecular layer" the existence of which was proposed before e.g. by \citet{WC} and \citet{woitke}. Interferometric observations in the infrared support the existence of such a molecular layer \citep[][and references therein]{wittkowski2015}. The vibrational temperature derived from the AlO bands in \emph{absorption} of a few hundred K is in agreement with such a location. The \emph{emission} episodes would then be associated with events when, for some reason, the volume of AlO gas gets larger than usual so its apparent size is bigger than the stellar disk and scattered emission dominates the band appearance. This scenario is more speculative than direct shock excitation, but if it is correct it would still indicate that AlO is located in the upper atmosphere of Mira.
There must be a difference in the vibrational temperature that characterizes the absorbing and emitting gas because we observe discrepancies in the relative strengths of emission and absorption in different sequences and bands. It is also evident that the excitation conditions of the emitting gas change with time. For instance, on 2007-09-04 when the $\Delta\varv$=+1 bandheads appeared as strong emission features, the corresponding $\Delta\varv$=0, +2 bands showed cancel-out bands. On 1998-11-06, in turn, AlO flared in the $\Delta\varv$=0 and +1 sequences but this time the $\Delta\varv$=0 sequence was by far the stronger one. In other words, the $\varv_{\rm up}$=0--$\varv_{\rm low}$ progression of the emission system peaked for $\varv_{\rm low}$=0 on 1998-11-06, and for $\varv_{\rm low}$=1 on 2007-09-04, suggesting a higher vibrational temperature of the emitting gas in 2007.
We conclude that the most likely excitation mechanism of the gas that leads to the emission episodes is shocks which occasionally reach the AlO gas which we usually see only in absorption and in the mm/submm rotational lines, and which resides at a few stellar radii from the star. We interpret the appearance of AlO emission as a result of changes in excitation, but changes in abundance (either due to formation or destruction of AlO) and relocation of gas within the envelope cannot be excluded.
\subsection{Electronic systems of other Al-bearing molecules}\label{sect-AlH}
\paragraph{AlOH} The submm detection of AlOH in Mira (Sect.\,\ref{sect-aloh}) encouraged us to look for electronic transitions of this molecule. We could not find in the literature the spectroscopic constants nor even approximate positions of electronic bands of AlOH in the optical. However, a few electronic systems of AlOH are known in the ultraviolet, i.e. close to 2395\,\AA\ and 2495\,\AA\ \citep{Pilgrim,Li}. Spectra of Mira\,B acquired by the International Ultraviolet Explorer (IUE) between 1979 and 1983 and by the Hubble Space Telescope (HST) in 1995 \citep{Reimers1985,HSTspec} covered this wavelength range and show broad absorption features at the expected location of the AlOH bands. The absorption structures are not identified in the original studies and are too broad to belong to atomic transitions. Moreover, they are unlikely to be blends of known atomic lines as most strong multiplets were identified in the spectra. Furthermore, we find the same wide features in some of the archival UV spectra obtained by HST/STIS (1999 and 2004) and Galaxy Evolution Explorer (GALEX; 2006), available through the MAST archive\footnote{\url{http://archive.stsci.edu}}. Although both Mira A and B were located in the instruments apertures, it is the B component that was thought to be the major source of the continuum at these wavelengths. If AlOH is the carrier of the broad features, the gas would have to be located between us and Mira\,B so at least 0\farcs48 or 8$\times$10$^{14}$\,cm away from Mira\,A. This would indicate that some aluminum is locked into AlOH at quite large distances from the pulsating atmosphere. To verify this finding will require a dedicated study of the electronic bands of AlOH in Mira.
\paragraph{AlH} We were surprised to see an identification of an AlH band near 4242\,\AA\ in the historical spectral plates of Mira presented in \citet[][their Figs.\,9 and 10]{merrill62}, because hydrides are generally thought to be rare in spectra of giants. However, AlH has been reported in emission in another Mira variable, $\chi$\,Cyg, near minimum light \citep{AlH-Herbig,AlH-Herbig2}. The emission in the spectral region between 3066\,\AA\ and 4412\,\AA\ in $\chi$\,Cyg was limited to a specific range of rotational lines belonging to the (0,0), (1,0) and (1,1) bands of the $A^1\Pi-X^1\Sigma$ system.
Many of our spectra of $o$\,Ceti cover these three bands and there is a great number of absorption lines in this spectral region which coincide with the positions of AlH lines in \citet{AlHzawiejaAX}. A detailed simulation of the $A$--$X$ band was obtained in {\tt pgopher} \citep{pgopher} using the spectroscopic constants from \citet{AlHzawiejaAX}. Each band consists of well separated rotational lines and the shapes of individual lines are nearly indistinguishable from atomic features in the observed spectra. The density of lines in this spectral region is very high and, in principle, chance coincidences may occur for many of the lines. We found, however, that for each strong transition of AlH there is a corresponding absorption feature in the spectra of Mira with a perfectly matching radial velocity, leaving little doubt that AlH is present in $o$\,Ceti. The AlH bands appear in absorption in all our spectra and the features seem to be slightly stronger with respect to the local continua near minimum visual light. The AlH bands were not found to turn into emission features in the 19 spectra we examined, indicating that Mira is unlikely to undergo AlH-flaring episodes such as those reported for $\chi$\,Cyg.
The line positions of AlH vary slightly with time. We investigated the temporal variations quantitatively using cross-correlation techniques and band simulations at different excitation temperatures. The most blueshifted spectrum of the (1,0) band was observed on 2009-07-24 ($\varphi$=0.6) with $V_h$=55.2$\pm$0.7\,km\,s$^{-1}$\ and the highest velocity of 59.2\,km\,s$^{-1}$\ was measured in the spectrum from 2009-10-03 ($\varphi$=0.9). Such low variations of the radial motions of $\pm$2\,km\,s$^{-1}$\ with respect to the center-of-mass velocity, signify that the absorbing gas must be located in the parts of Mira's atmosphere that do not participate in the high-amplitude pulsation motions such as those observed in CO $\Delta \varv$=3 lines \citep{IRveloCO}. The AlH gas may be partially placed in the same layer where we observe AlO in absorption.
We were not able to constrain precisely the rotational temperature of AlH, because ({\it i}) the line ratios are greatly affected by the shape of the local pseudo-continua and ({\it ii}) of the presence of other unidentified lines in these spectral regions. However, our rough estimates suggest a few hundred K, consistent with AlH being located in the outer atmosphere of Mira, i.e. 2.5--4\,R$_{\star}$.
Another known electronic system of AlH, $C^1\Pi-X^1\Sigma$, is located in the UV range near 2240\,\AA\ \citep{zachwiejaCX}, but we found no evidence for it in the UV spectra of Mira from IUE, HST, and GALEX.
\subsection{Atomic aluminum}\label{sect-al}
\paragraph{\ion{Al}{I} absorption:}
We examined the behavior of the resonance doublet $3p^2P$--$4s^2S$ of \ion{Al}{I} at 3944.01 and 3961.5\,\AA\ (i.e. in between the two strong H\&K lines of \ion{Ca}{II}) which is covered by many of our spectra. These are shown in a time sequence in Fig.\,\ref{fig-AlI}. Unlike most lines of neutral atoms in Mira's spectrum, lines of \ion{Al}{I} show strong and very broad absorption profiles. The large width of these lines in $o$\,Ceti and other Mira variables was noticed previously by \citet{joy2} and \citet{merrill62}. The profiles change dramatically in shape and depth over time. Typically, they are triangular in shape and considerably sharper than a Lorentzian profile; the full base-widths are $<$2.5\,\AA, but the actual width is likely higher as the observed pseudocontinuum is below the true continuum level. Often, close to minimum light ($\varphi\!\sim$0.6), the lines turn into parabolic features which can be as broad as 10\,\AA\ (full width in the stronger $\lambda$3961 line). On occasion (e.g. on 2009-07-24 \& 2009-09-23), they appear as multicomponent irregular absorption features. The blue and red wings show strong asymmetries independent of the overall shape of the \ion{Al}{I} profile whether parabolic or sharp.
In stars of spectral types G--K, the blue resonance lines of \ion{Al}{I} are formed just above the photosphere \citep{Mauas}. No detailed models exist for stars of later spectral types but one might expect that in M-type stars the lines form very close to the photosphere as well. The large apparent width of the lines support this expectation. The \ion{Al}{I} lines are broadened mainly by the radiative and van der Waals effects \citep[cf.][]{Mauas}, where the latter is dependent on the local density. The large width of the observed \ion{Al}{I} lines in Mira requires high local densities such as those expected close to the photosphere. The observed absorption is therefore a signature of photospheric \ion{Al}{I}. The occasional broadening and reshaping of these spectral features may be associated with a shock passing the photosphere. We were able to reproduce the observed shape of the \ion{Al}{I} features with stationary model atmospheres of MARCS \citep{MARCS} after increasing the continuum opacity in the spectral range investigated\footnote{The extra opacity was introduced to explain the profiles of the H\&K lines of \ion{Ca}{II}. The problem of missing opacity around the lines in G and K giants was identified by \citet{short1,short2}.}, thus assuring us that the \ion{Al}{I} features form close to the photosphere. Although we attempted to derive the \ion{Al}{I} abundances with model atmospheres, we encountered problems in the definition of the true continuum level and all opacity sources in this spectral region. As a result, we were unable to determine a reliable quantitative estimate of the Al abundance.
\paragraph{\ion{Al}{I} emission:} In at least six out of the 23 spectra that covered the \ion{Al}{I} lines, weak emission components in the cores of the absorption profiles were identified. The emission is blueshifted with respect to the center of the absorption profile. On dates when the absorption profiles are very narrow, a separate emission line is not seen, but an emission component that partially fills the core of the absorption profile is implied from the asymmetry of the feature. We measured the location of the emission peaks for three dates when the emission component was well separated from the absorption wings, but did not correct for the underlying and highly asymmetric absorption profile: $V_h$=+37\,km\,s$^{-1}$\ on 2007-01-30 ($\varphi=0.92$); +57\,km\,s$^{-1}$\ on 2007-09-04 ($\varphi=0.57$); and +47\,km\,s$^{-1}$\ on 2008-08-29 ($\varphi=0.65$), where the formal uncertainties in the centroid positions are less than 1\,km\,s$^{-1}$. The measurements may be affected by a shift caused by the underlying absorption core. To show displacements of up to 20\,km\,s$^{-1}$\ from the center-of-mass velocity, the blueshifted emission must arise next to the shock when it is still deep in the stellar atmosphere. The displacements are comparable to or even higher than the blueshift observed in CO $\Delta\varv$=3 lines ($\Delta V_{\rm blue}\!\approx$13\,km\,s$^{-1}$) which is usually associated with the deepest observable layers of the star \citep{IRveloCO,Nowotny2010}. Because the details of the excitation mechanism that gives rise to the emission is not known, we are unable to assess the amount of material responsible for the emission.
We did not identify either absorption or emission features that might suggest there is a substantial amount of atomic Al in the outer atmosphere and wind of Mira, implying that Al is locked in molecules (and dust) above the photosphere.
\paragraph{\ion{Al}{II} and \ion{Al}{III}} We also searched in the optical spectra for ionic forms of Al. The lowest-excitation line of \ion{Al}{II} covered by our spectra has $E_{\rm low}$=83\,800\,K. A very weak absorption line is found at the expected wavelength $\lambda_{\rm lab}$=4663.05\,\AA\ but shifted to the stellar radial velocity. This line is expected to be weak owing to a small Einstein coefficient, $A_{\rm up,low}\!\approx$10$^5$\,s$^{-1}$, and very large excitation potential. With the local spectral line density, it is very likely that the observed feature belongs to another atomic ion. Indeed, in the atlas of Arcturus \citep{atlasArcturus}, the line is identified as belonging to \ion{Fe}{II}. The feature changes its velocity systematically with a highest excursion toward the blue of $\Delta V$=--7\,km\,s$^{-1}$\ near $\varphi$=0.6. The next lowest-excitation line of \ion{Al}{II} covered in our spectra has $E_{\rm low}$=120\,000\,K and $A_{\rm up,low}$ that is two orders of magnitude larger. Despite the much larger $A_{\rm up,low}$, there is nothing conspicuous near its location ($\lambda_{\rm lab}$=4663.05\,\AA). The line may require too high an excitation to be effectively populated. The best test for the presence of \ion{Al}{II} would be an observation of the resonance line with the rest wavelength of 2669.1\,\AA. Although it was covered in several UV spectra in the literature or available in the archives, the line does not seem to be present. \citet{Reimers1985} identified one weak emission feature of the resonance doublet of \ion{Al}{III}, at 1854.7/1862.6\,\AA, in their IUE spectra. Whether this feature arises near Mira A or B is questionable and so is the identification. We conclude that our observational material and the literature data are not suitable to trace the ionic forms of Al in Mira, and their contribution to the total aluminum content are likely insignificant.
\section{Summary and discussion}\label{discussion}
\subsection{Currently accessible Al-bearing species}
In the previous sections, we have attempted to identify the main gas-phase carriers of Al in the circumstellar environment of Mira. We found neutral atomic aluminum, \ion{Al}{I}, in the photosphere and occasionally being excited above the photosphere. The molecules AlH, AlO, and AlOH are present mostly above the photosphere, in a region where the formation of alumina dust is thought to take place ($\gtrsim$2\,R$_{\star}$). There is a tentative indication that AlOH may extend farther from the star and is present in the wind seen against the UV continuum of the companion. Of all these species, we were able to derive quantitative information on the amount of AlO. The observed features are variable in intensity and show modest changes in their Doppler shifts. We excluded the possibility that other simple Al-bearing species are easily accessible for mm-wave observations, such as AlF, AlCl, AlCN, AlNC, and AlS. The contribution of gas-phase Al$_2$, AlO$_2$, and Al$_2$O to the total content of Al in the envelope of Mira remains unknown.
The observability of a given species alone does not directly imply that it has a high abundance, especially with data obtained at different sensitivities. Our observations show, however, that AlH, AlO, AlOH, and \ion{Al}{I} are viable species for tracing gas-phase aluminum in circumstellar envelopes. Their relative emission distributions and time variability provide important observational constraints that can be directly compared to chemical models. For example, the role of AlH was omitted in some earlier chemical studies \citep[e.g.][]{GS98}, although it is an important observable species. The most recent models of \citet{gobrecht} include AlH in the reaction network and our observations confirm that it is an important tracer of Al.
\subsection{Circumstellar chemistry: observations vs. models}
We derive an average AlO abundance of 10$^{-9}$--10$^{-7}$ with a high uncertainty owing to the unknown content and form of hydrogen. \citet{kami_alo} obtained a similar abundance of $\sim\!10^{-8}$ for AlO in the envelope of the red supergiant VY\,CMa that was derived from optical emission bands. The agreement between the two sources suggests that the processes governing aluminum chemistry in the envelopes of evolved late-type stars of different masses and different mass-loss rates may be similar.
The non-equilibrium model with condensation of IK\,Tau \citep{gobrecht} show that the abundances of Al-bearing species vary with the stellar pulsation phase. Our observations of $o$\,Ceti show that the lines are variable but we are unable to distinguish between the variable excitation conditions and the change in the column of gas. Also, the variability we observe is not well correlated with phase, contrary to the key assumption in the model. The model gives an AlO abundance of $10^{-6}$ in the shocked photosphere which decreases to $10^{-10}$--$10^{-8}$ between 2 and 5\,R$_{\star}$ for IK\,Tau (Cherchneff, priv. comm.). The latter abundance is close to $10^{-9}$--$10^{-7}$ we derived for the extended atmosphere of $o$\,Ceti (Sect.\,\ref{sect-excitation}). A physico-chemical model of $o$\,Ceti is required to better reproduce the observed characteristics of Al-bearing species in this object.
The chemical models predict that most Al-bearing molecules are destroyed above the photosphere by the pulsation shock and then reformed higher up in the atmosphere \citep{gobrecht}. Therefore, one would expect to see in our best-resolution data a gap (depletion zone) in the AlO distribution just above the pulsation shock if the discontinuity is thick enough. The region from 1\,R$_{\star}$ to $\sim$3\,R$_{\star}$, where one would expect such a discontinuity, is very difficult to interpret in our data. The presence of absorption toward the stellar photosphere complicates the picture at angular scales comparable to the ALMA restoring beam, because emission and absorption are indistinctly convolved and mutually affect the image reconstruction of each other (Appendix\,\,\ref{appendix-clean}). Another complication is the patchy structure of the emission at angular scales comparable to the stellar size. Our data do not allow us to verify the presence of such a gap and it may well be that this region is within the radio photosphere, at $r\!<$1.6\,R$_{\star}$, where we had no access with the current ALMA observations. Since the ALMA observations were obtained at a visual phase of about 0.5, near minimum light when the star is expected to be largest, corresponding observations closer to maximum light would peer deeper into the material surrounding the star.
Much more astronomical spectroscopic observations (preferably taken with a high angular resolution), more physically realistic models, and supporting laboratory spectroscopic measurements are needed to advance our understanding of the complex chemistry of AGB stars.
\subsection{AlO and alumina dust formation in Mira}
AlO is the a crucial gas-phase Al-bearing species for alumina dust formation, because the dimerisation of AlO followed by the oxygenation of the AlO dimers produce Al$_2$O$_3$, which in turn forms dimers and small alumina clusters \citep{sarangi}. Therefore, the chemical production of AlO determines the efficiency of alumina-dust formation and, consequently, is also linked to the gas-to-dust mass ratio. The formation of alumina dust is expected mainly at very high \emph{dust} temperatures of about 1700\,K. Interferometric observations in the MIR show that the alumina dust indeed forms very close to the photospheres of AGB stars, i.e. at $r\!\approx$2\,R$_{\star}$ \citep[e.g.][]{karovicova}. In $o$\,Ceti, the hottest dust is observed as close as 30\,mas=2\,R$_{\star}$ \citep{lopez,degiacomi}, but it has not been definitely established whether it is alumina or silicate dust. Here we assume that at such close proximity to the star the hot dust is Al$_2$O$_3$. Silicates are unlikely to condense there because \citet{wong} have recently shown that considerable depletion of SiO takes place in Mira at radii above 4\,$R_{\star}$. It is important to note here that 2\,R$_{\star}$ is only the inner radius at which the alumina condensation and AlO depletion starts and that the process may continue farther from the star.
Our high-resolution ALMA data provide a view of the AlO distribution in unprecedented detail with the beam corresponding to approximately 2\,R$_{\star}$. Here we discuss how these observations can be understood within the context of alumina dust formation.
\paragraph{Average AlO abundance as a function of radius for $r\!\gtrsim$3\,R$_{\star}$} %
As mentioned in Sect.\,\ref{AlOmap}, the azimuthally-averaged brightness of AlO emission follows approximately a power law at radii $\gtrsim$2\,R$_{\rm ph,mm}$ or $\gtrsim$3\,R$_{\star}$ (Fig.\,\ref{fig-AlO-profile}). The observed brightness profile reflects the total density changes, excitation conditions, and possible abundance variations of AlO. The emission brightness changes only slowly with temperature because the brightness is proportional to $\exp(-1/T_{\rm ex})$ and the temperature changes approximately as $r^{-0.3}$ \citep{wong}. Although the envelope is inhomogeneous and the velocity field is complicated, to a first approximation one might expect that the total density decreases as $r^{-2}$. The models of Mira's envelope suggest even steeper power laws of $r^{-3}$ \citep{wong,ireland2011} while NIR observations of dust in $o$\,Ceti require the dust density to decrease as $r^{-1.5}$ \citep{lopez}. The data can be reproduced by all these power laws equally well owing to the large scatter caused by local inhomogenities (Fig.\,\ref{fig-profile}). As a result, the average profile suggests that no significant AlO depletion takes place at radii $\gtrsim$3\,R$_{\star}$.
\begin{figure}
\centering
\includegraphics[angle=0,width=0.99\columnwidth]{projections.eps}
\caption{Spatial cuts of the AlO 6$\to$5 emission imaged by ALMA. The radial profiles extend from the center of the star and represent three position angles: 54\degr\ (nearly northeast), 133\degr\ (south-east), and $-90$\degr\ (west), shown in Fig.\,\ref{fig-mom0AlO65}. Marked in green are characteristic locations within the envelope: the region closest to the star where hot dust has been observed in minimum/maximum light (inner/outer edge) (light green); the range of SiO maser rings (dark green); and the innermost radius where silicate dust is thought to condense in Mira stars (marked as "silicates").}\label{fig-projections}
\end{figure}
\paragraph{AlO radial profiles in specific directions--a proof for depletion?} If we ignore the brightest emission clumps east and north/north-west from the star in Fig.\,\ref{fig-mom0AlO65}, the AlO emission is limited to a horseshoe-shaped ring of radius 2\,R$_{\star}$. The emitting material is likely located in the plane of the sky. In Fig.\,\ref{fig-projections}, we show three spatial cuts through this structure along three position angles of 54\degr\ (nearly northeast), 133\degr\ (south-east), and --90\degr\ (west) and extending from the absorption center (Fig.\,\ref{fig-mom0AlO65}). While two of those spatial cuts are in qualitative agreement with the average radial profile, the southeast cut shows distinctively a narrow feature with the line flux that practically disappears at a radius of 3.5\,R$_{\star}$, i.e. exactly in the region where hot dust has been observed in Mira. If we interpret the emission intensity as corresponding directly to the column density of AlO (i.e. the excitation conditions do not change much with radius), then this profile is exactly what one would expect if substantial depletion of AlO began at about 2\,R$_{\star}$. It is tempting to interpret this AlO deficit as depletion onto dust. It would be interesting to verify this depletion scenario by checking whether there is a dust-rich clump at the radial extension of this spatial cut beyond 3\,R$_{\star}$, but it is not possible to perform this test with the currently available data. Although there is no strong proof in our data for global AlO depletion, it may be that the gas-phase AlO is consumed by other species only in particular directions.
\paragraph{AlO variability and clumpiness vs. episodic dust production} %
The ALMA maps of the $N$=6$\to$5 transition (Fig.\,\ref{fig-mom0AlO65}) provide a detailed glimpse of the clumpy distribution of AlO gas very close to the photosphere. Together with data presented in \citet{wong}, they provide the first direct view of the inhomogenities in the cool molecular layer at about 2\,R$_{\star}$. The existence of such inhomogenities has been implied in $o$\,Ceti before \citep[e.g.][and references therein]{wittkowski2015} and in other oxygen-rich AGB stars \citep[e.g.][]{xavier,ohnaka}. The clumps are close to the star and are likely to be transient, which is strongly supported by the variability of AlO observed in the rotational and electronic lines reported here.
The question which naturally arises is whether the complex spatial and temporal characteristics of AlO can influence the dust production. The dust produced around Mira has a very inhomogeneous distribution and its spectral features change with time \citep{lopez,lobel}. Mira's flux variability in the range 8--11\,$\mu$m cannot be explained by the light changes of the star alone, rather some variations of the dust density must also occur \citep{lopez}. It has been suggested in the literature that the dust production in AGB stars is in fact episodic and may occur during some phases or only in some cycles \citep[cf.][and references therein]{lopez}. Because the production of alumina dust is chemically directly linked to the production of AlO, the clumpy distribution and time variability of AlO emission presented here may be the direct cause of the observed spatial and temporal characteristics of dust. Identifying the process that makes the molecular emission clumpy is beyond the scope of this paper but it is very likely linked to phenomena in the stellar photosphere. Localized shocks related to convection \citep{schwarzschild} are good candidates to explain the observational features of some AGB stars \citep[e.g.][]{ohnaka,xavier} and red supergiants \citep[e.g.][]{betelgeuse}. The episodic appearance of visual emission bands of AlO requiring shock excitation supports such an interpretation.
\paragraph{Link of the AlO emission to faint-maxima cycles?}\label{sect-AlO-brightMax}
The occurrence of emission in electronic bands of AlO in Mira is very rare. It was reported for the first time in 1924. The first identification of AlO bands was made by \citet{bax}, who used spectra of \citet{joy} (these authors assigned the features to Al$_2$O$_3$). Emission was also reported for the 1964 maximum of Mira by \citet{keenan}. The search for AlO emission in Mira was continued by \citet{kipper}, but their observation of the $\Delta\varv$=0 sequence in 1978 did not reveal any emission\footnote{Their spectral resolutions (dispersions of 24 and 12\,\AA/mm) might have been too low to detect weak emission, especially when mixed with an absorption profile.}. Our observational data add two more episodes of AlO emission to the record.
The occurrences of AlO bands in emission were reported to proceed cycles with fainter-than-average visual maxima (cf. Fig.\,\ref{fig-phase}) which are rare. In the last century, maxima with Vis.$\gtrsim$4\,mag occurred only 5--8 times: in 1924, 1976, 1978, 1984, 1998/99, and possibly also in 1912, 1913, and 1931 (the photometric coverage is incomplete near these maxima). Emission was observed in 1924 over a few weeks \citep{keenan}. \citet{garrison} observed Mira during most maxima in 1916--1997 and noticed that AlO emission appears in weak cycles. Our 1998/1999 observation of the AlO emission also coincided with a faint maximum. However, the 2007 observation of the AlO emission event proceeded a normal cycle. This raises the question as to whether there is a direct correspondence between AlO emission and faint maxima.
The existence of such a correlation would be very intriguing in the context of metal-oxide formation and variable dust production of Mira. One possibility is that faint maxima occur owing to enhanced dust production which would increase the extinction and reduce the optical fluxes of the star. Alternatively, some cycles may be dimmer due to increased production of TiO and other metal oxides which constitute the main opacity source in Miras and are directly responsible for their high-amplitude light variations in the visual \citep{reid02}. However the literature and our observations of AlO (and TiO) emission show that there is no established direct link between the occurrences of molecular emission and faint maxima.
Here, we prefer an interpretation in which the emission episodes in the electronic features of AlO and \ion{Al}{I} are associated with shocks which are stronger than average and were also proposed to explain other inter-cycle phenomena in Mira variables \citep[e.g.][]{richter2003,lopez}.
\subsection{Final words and prospects}
The challenges in tracing gas-phase species important for dust formation are identified in the current study. We have demonstrated that the complex excitation of gas very near the stellar photosphere -- influenced strongly by repetitive, irregular, and merging shocks -- is the main obstacle in deriving abundances and more sophisticated analysis tools are necessary to interpret the data. A conclusive test of dust nucleation in stellar envelopes is possible but it will require a substantial observing effort. In particular, the most fruitful would be observations of a multitude of spectral lines with the highest angular resolution (as afforded primarily with the most extended ALMA configurations) conducted nearly simultaneously with IR/MIR interferometric observations of dust features.
\input{biblioAlO.tex}
\begin{acknowledgements}
We thank T. Kipper (Tartu Observatory) for sending us a copy of his article. We are also grateful to O. Anriyenko (Terskol Observatory) for providing us with his spectra and E. Griffin (NRC-Herzberg) for her efforts to digitalize the DAO spectroscopical plates.
The Submillimeter Array is a joint project between the Smithsonian Astrophysical Observatory and the Academia Sinica Institute of Astronomy and Astrophysics and is funded by the Smithsonian Institution and the Academia Sinica.
We acknowledge with thanks the variable star observations from the AAVSO International Database contributed by observers worldwide and used in this research.
Based on data obtained from the ESO Science Archive Facility and made with ESO Telescopes at the La Silla Paranal Observatory under programme IDs 074.D-0114(A) and 089.D-0383(A).
Based on observations obtained at the Canada-France-Hawaii Telescope (CFHT) which is operated by the National Research Council of Canada, the Institut National des Sciences de l'Univers of the Centre National de la Recherche Scientique of France, and the University of Hawaii.
Based on observations obtained at the Dominion Astrophysical Observatory, NRC Herzberg, Programs in Astronomy and Astrophysics, National Research Council of Canada.
Herschel is an ESA space observatory with science instruments provided by European-led Principal Investigator consortia and with important participation from NASA.
This research has made use of the Keck Observatory Archive (KOA), which is operated by the W. M. Keck Observatory and the NASA Exoplanet Science Institute (NExScI), under contract with the National Aeronautics and Space Administration.
Based on analysis carried out with the CASSIS software and JPL spectroscopic database. CASSIS has been developed by IRAP-UPS/CNRS (\url{http://cassis.irap.omp.eu}).
This paper makes use of the following ALMA data: ADS/JAO.ALMA\#2011.0.00014.SV, 2013.1.00047.S, 2012.1.00524.S, 2013.1.00156.S. ALMA is a partnership of ESO (representing its member states), NSF (USA) and NINS (Japan), together with NRC (Canada), NSC and ASIAA (Taiwan), and KASI (Republic of Korea), in cooperation with the Republic of Chile. The Joint ALMA Observatory is operated by ESO, AUI/NRAO and NAOJ.
\end{acknowledgements}
\begin{appendix}
\section{Details of the APEX observations}
\subsection{The spectral setups}\label{appendix-log}
The spectral setups used in the APEX observations are listed in Table\,\ref{tab-log}.
\begin{table*}
\centering
\caption{Log of APEX observations of Mira.}\label{tab-log}
\begin{tabular}{lcccc}
\hline\hline
Frequency & Central & Noise rms & Integr. & Observation\\
setup & frequency& per 3.8\,MHz & time ON & dates\\
& (MHz) & ($T_A^*$ mK) & (min) & \\
\hline\hline
\multicolumn{5}{c}{HET230}\\
\hline
TiO-222L & 222700.000 & 1.3 &203.4 & 03,17,18,19,20-12-2013\\
vCO21-AlO & 229800.000 & 1.3 &186.9 & 06,15,16,18,23-10-2013\\
vCO21-AlO & 229800.000 & 1.2 &213.9 & 09,10,11,12-06-2015\\
\hline
\multicolumn{5}{c}{FLASH+}\\
\hline
AlO306\_OSB & 294698.830 & 1.4 & ~99.2 & 07,08-07-2014\\
AlO306 & 306700.000 & 1.4 & ~99.2 & 07,08-07-2014\\
AlO344\_OSB & 332452.819 & 1.9 & ~78.9 & 13,14-08-2013\\
AlO344 & 344454.000 & 1.8 & ~80.4 & 13,14-08-2013\\
AlO344TiO & 344454.000 & 1.7 & ~84.8 & 30-06-2014; 01,02,06-07-2014\\
AlO344TiO\_OSB& 356455.219 & 2.0 & ~84.8 & 30-06-2014; 01,02,06-07-2014\\[5pt]
AlO420\_OSB & 408898.804 & 4.2 & ~51.7 & 13,14-08-2013\\
AlO420 & 420900.000 &10.5 & ~51.7 & 13,14-08-2013\\
AlOvCO458 & 458020.000 & 5.1 & ~27.3 & 14-08-2013\\
AlOvCO458\_OSB& 470021.181 & 6.2 & ~27.3 & 14-08-2013\\
AlO497\_OSB & 485398.793 &24.0 & 168.7 & 01,02,06,07,08-07-2014\\
AlO497 & 497400.000 & 4.3 & 168.7 & 01,02,06,07,08-07-2014\\
\hline
\end{tabular}
\end{table*}
\subsection{Spectral variability in the APEX data}\label{sect-var-apex}
\emph{Spectral} variability of stellar sources at submillimeter wavelengths has been rarely reported in the literature. It has been convincingly shown for O-rich Mira variables, including $o$\,Ceti, but only for maser species such as SiO \citep[e.g.][]{SiOvar} and OH \citep{GerardBeougois1993} and no convincing evidence has been presented so far for other molecules. This is partially so, because investigation of variability, especially at submm wavelengths, is challenging for technical reasons. In particular, apparent intensity changes can often be explained by imperfect focus, pointing, and flux calibrations, uncertainties of which are usually difficult to assess quantitatively. Our APEX observations do not have those usual shortcomings. All the observations presented here were obtained after applying focus calibration which was performed on $o$\,Ceti using its bright CO emission. Similarly, pointing was calibrated on the Mira's CO lines and it did not show deviations from the source position greater than 2\arcsec (usually much less), which is insignificant compared to the telescope beam of 18\arcsec or 27\arcsec at our frequencies. Overall, the pointing model and tracking performance at APEX was excellent in the years covered by our observations. We are confident these basic calibrations do not affect the derived intensity of the spectral features.
The flux calibration can be tested directly in our observations. It can be safely assumed that the rotational transitions of CO at $\varv$=0, $J$=2--1 and 3--2, covered in two different epochs do not vary on the time scales of years \citep{pepe}. Taking the large size of the envelope producing these lines of $r\!\sim\!10^{16}$\,cm and the corresponding wind crossing time of the order of 10$^5$\,yr, any short-scale change in Mira's wind, e.g. due to a potentially variable mass-loss rate, cannot effectively influence the total flux of those lines. Additionally, the lines arise in gas that is collisionally excited and none of the main gas heating terms can be significantly affected by stellar light variability for these low-$J$ lines. We can therefore use them as a benchmark for relative-intensity calibration of the instrument at different dates.
The band centered at 229.8\,GHz was observed in 2013 and 2015 using exactly the same configuration. The same sensitivity levels were reached. This band covers the CO(2--1) line which was observed at a signal-to-noise ratio (S/N) of 4700 (line peak to rms noise level). The line profiles are identical in both spectra and the line flux is consistent to within 1.12\% on both dates. Other lines covered in the spectrum were the CO(2--1) line at $\varv$=1 and AlO $N$=6$\to$5. The two lines were not detected in 2013 but are definitely present in 2015. On the basis the excellent consistency in the observations of the CO(2--1) line, the change in the appearance of the CO $\varv$=1 and AlO features in 2015 must be due to the intrinsic source variability in those lines, where both are expected to arise in the innermost envelope.
The band centered at 344.454\,GHz was observed in the USB in August 2013 and in the LSB in July 2014. The strongest line covered by these spectra, CO(3--2), has a measured flux 1.07 times higher on the earlier date. Two other strong lines covered, $^{29}$SiO(8--7) and SO(8$_8$--7$_7$), show very similar intensity ratios, i.e. consistent to within 1\% with what was measured for the CO(3--2) line. The effect is therefore systematic and we corrected the later spectrum by the calculated factor. (The most likely source of this slight inconsistency is an error in the sideband rejection factors of FLASH+, as the sideband was the only different aspect in the instrumental configuration. A few \% uncertainty in the sideband ratio is well within the performance specifications of FLASH+.) In the corrected spectra, the flux of the maser emission of the SiO(8--7) $\varv$=1 line decreases by a factor of 2.1 from 2013 to 2014. This decrease is physical \citep[cf.][]{SiOvar}. For other weaker lines covered, including the species of our interest, CO(3--2) at $\varv$=1 and AlO $N$=9$\to$8, the fluxes are consistent with the rms noise levels on the two dates. We therefore combined the data to increase the S/N for these weak lines.
\section{Processing of the interferometric data for the AlO 6$\to$5 line}\label{appendix-clean}
While processing the ALMA data for the AlO 6$\to$5 transition, we encountered a similar problem with the CLEAN procedure as that described in detail in \citet{wong} (their Appendix\,B). That is, we found significant differences in the depth and shape of absorption features when processed in CLEAN with continuum and after continuum subtraction. This data-processing problem is closely related to the relative distribution of the emission and absorption regions and their relative strengths. In our work, we present only the data processed in CLEAN after continuum subtraction which have a better S/N and all absorption features are \emph{deeper} than in the data processed with the alternative method. The emission regions one beam size away and farther from the strongest absorption feature appear exactly the same after applying each of the processing schemes. Unlike in \citet{wong}, where data of much higher S/N are analyzed and the processing procedure does not influence the data interpretation, we do not analyze in detail the region within 2\,R$_{\star}$ because the two processing schemes may lead to different interpretations.
\section{Optical spectra of Mira}
\input{AppendixPlotsAl.tex}
\input{AppendixPlotsAlOp2.tex}
\input{AppendixPlotsAlOp1.tex}
\input{AppendixPlotsAlOdv0.tex}
\input{AppendixPlotsAlOm1.tex}
\end{appendix}
\end{document}
|
\section{Introduction}
We are interested in the following 1D system of pressureless Euler-Poisson equations with non-local interaction forces and damping:
\begin{align}\label{main_eq}
\begin{aligned}
&\partial_t \rho + \partial_x (\rho u) = 0, \cr
&\partial_t (\rho u) + \partial_x (\rho u^2) = -\rho u -(\partial W \star \rho)\rho, \qquad W(x) = - |x| + \frac{|x|^2}{2},
\end{aligned}
\end{align}
for $ (t,x) \in \mathbb R_+ \times \Omega(t)$. Here, $\rho$ is extended by 0 outside $\Omega(t)$ and $\Omega(t)$ denotes the interior of the support of the density $\rho$, i.e., $\Omega(t) := \{x \in \mathbb R : \rho(x,t) >0\}$. System \eqref{main_eq} is supplemented by the initial values of the density and the velocity
\begin{equation}\label{ini_main_eq}
(\rho(t,\cdot), u(t,\cdot))|_{t=0} = (\rho_0,u_0)\in H^2(\Omega_0)\times H^3(\Omega_0),
\end{equation}
where $H^s(\Omega_0)$ stands for the standard Sobolev space of index $s>0$ and $$\Omega_0:=\Omega(0)=(a_0,b_0)$$ is an open bounded interval. It follows from \eqref{ini_main_eq} that the initial mass and momentum are finite; we denote them by
$$
0<M_0 := \int_{\Omega_0}\rho_0(x) dx \qquad\mbox{and}
\qquad
M_1:=\int_{\Omega_0} \rho_0(x)u_0(x)\,dx \,.
$$
The hydrodynamic system \eqref{main_eq} has been formally derived from interacting particle systems in collective dynamics. Different authors developed several approaches involving moment methods either for particle descriptions directly \cite{CDMBC} or at the kinetic level together with monokinetic closures for the pressure term \cite{CDP}. Kinetic equations for collective behavior can be derived rigorously from particle systems via the mean-field limit, see \cite{CCR,review} and the references therein. Although the monokinetic closure of the moment system is not entirely justified, these pressuless hydrodynamic models as \eqref{main_eq} give qualitative numerical results comparable to the particle simulations of interacting agents, see \cite{CKMT,AP,KT} and the references therein.
Critical threshold phenomena for the one-dimensional Euler or Euler-Poisson system are studied in \cite{ELT, TW}. In particular, the damped Euler-Poisson system with a positive background state is considered in \cite{ELT} and sharp critical thresholds are obtained. For certain restricted multi-dimensional Euler-Poisson systems, we refer to \cite{LT1, LT2}. In \cite{TT}, the critical thresholds were analysed for the so-called {\it Euler-alignemt system} which has a non-local velocity alignment force $F[\rho,u] = \psi \star (\rho u) - u (\psi \star \rho)$ with $\psi \geq 0$ instead of the linear damping and interaction force in \eqref{main_eq}. Note that if $\psi \equiv 1$, then the alignment force $F[\rho,u]$ becomes the linear damping under the assumption that the initial momentum is zero, i.e., $M_1 = 0$. These results were further improved in \cite{CCTT} by closing the gap between lower and upper thresholds. Other interaction forces, such as attractive/repulsive Poisson forces or general-type forces, are also taken into account in the Euler-alignment system in \cite{CCTT}. However, the critical thresholds with interaction forces were not sharp. In this work, we solve the problem with linear damping and Newtonian attractive forces by observing that the system \eqref{main_eq} has a very nice Lagrangian formulation allowing for explicit computations of the classical solutions.
Associated to the fluid velocity $u(t,x)$, we define the characteristic flow $\eta(t,x)$ as
\begin{equation}\label{eq_tra}
\frac{d \eta(t,x)}{dt} = u(t,\eta(t,x)) \quad \mbox{with} \quad \eta(0,x) = x \in \Omega_0\,.
\end{equation}
We first define a classical solution for our system \eqref{main_eq} with the initial data \eqref{ini_main_eq}. We say that $(\rho(t,x),u(t,x))$ is a classical local-in-time solution to \eqref{main_eq} with the initial data \eqref{ini_main_eq}, if there exists time $T>0$ such that $\rho$ and $u$ are $\mathcal C^1$ and $\mathcal C^2$ respectively in the set $\{(t,x)\in [0,T) \times \Omega(t)\}$, the characteristics $\eta(t,x)$ associated to $u$ defined by \eqref{eq_tra} are diffeomorphisms for all $t\in [0,T)$ with $\Omega(t)=\eta(t, \Omega_0)$, and $\rho$ and $u$ satisfy pointwisely the equations \eqref{main_eq} in $\{(t,x)\in [0,T) \times \Omega(t)\}$ with initial data \eqref{ini_main_eq}. Here the time derivative at $t=0$ has to be understood as a one-side derivative. It is not difficult to see that that this definition ensures the equivalence between the classical solution of the system \eqref{main_eq} and the classical solutions to its Lagrangian formulation \eqref{lag_eq}, given below. We will elaborate more about it in the next section.
We now explain our strategy to find classical solutions to the system \eqref{main_eq}. In Section 2, we assume that $(\rho(t,x),u(t,x))$ is a classical local-in-time solution to \eqref{main_eq} with initial data \eqref{ini_main_eq} in order to find some explicit expression for the solution on the whole time interval of existence $[0,T)$. Then, in Section 3, we analyse the maximal time interval of existence of the classical solution based on its explicit expression.
We show that these solutions are in fact global-in-time classical solutions under certain hypotheses on the initial data, and that otherwise they blow up in a finite time. In the end of Section 3, we state our main theorem, Theorem \ref{Th:main}, which gives sharp critical thresholds for the system \eqref{main_eq}. Further, in Section 4, we describe the long time asymptotic behaviour of the classical global-in-time solutions. We show that the limit profile for the density is a sharp discontinuous function:
$$
\rho_\infty(x)= \frac{M_0}2 \quad \mbox{ and } \quad u_\infty(x)=0 \quad \mbox{for }\quad x\in \Omega_\infty:= ( \Gamma- 1,\Gamma + 1)
$$
with
\begin{equation}\label{newintro}
\Gamma:= \frac{1}{M_0}\left(\int_\mathbb R x\rho_0(x)\,dx + \int_\mathbb R \rho_0(x) u_0(x)\,dx \right)\,.
\end{equation}
Let us point out that Theorem \ref{Th:main} also holds in the whole space for positive integrable initial density with finite initial center of mass and finite initial mean momentum. However, we cannot ensure that their long time asymptotic behavior is given by $\rho_\infty$.
In Appendix A, for the sake of completeness, we provide a local-in-time existence and uniqueness result of classical solutions in the sense used in this paper.
Let us emphasize, that the explicit solutions constructed in our paper are proven to be the only classical solutions of the system \eqref{main_eq}. The local-in-time existence and uniqueness of classical solutions to the Euler-Poisson system is known for the initial data being a small perturbation of the stationary state, see \cite{M,MP}. There, the authors assume that the density is positive on the whole line $\mathbb R$ and that it tends to zero as $x\to \pm\infty$. We are not aware of any result for local-in-time well-posedness of the pressureless Euler-Poisson system neither for a Cauchy problem, nor for a bounded interval. Therefore, our local-in-time existence and uniqueness result for classical solutions to \eqref{main_eq} makes the construction of solutions from Sections 2 and 3 complete and justifiable. Strictly speaking, they are the only classical solutions in their maximal time interval of existence. Let us also observe that, in contrast to \cite{M,MP,ELT}, our results hold for the case of compactly supported initial data.
\section{Explicit expressions of classical solutions} \label{Sec:2}
Let us denote $f(t,x) := \rho(t,\eta(t,x))$ and $v(t,x) := u(t,\eta(t,x))$. Using the characteristic flow, it is easy to check that $(\rho,u)$ is a local-in-time classical solution of the system \eqref{main_eq} with initial data \eqref{ini_main_eq} if and only if $(f,v)$ is a classical solution of the system
\begin{subequations}\label{lag_eq}
\begin{align}\label{lag_eq1}
f(t,x)\frac{\partial \eta(t,x)}{\partial x} &= \rho_0(x), \\
v'(t,x) + v(t,x) &=-\int_{\Omega(t)} \partial W(\eta(t,x) - y) \rho(t,y)dy \nonumber\\
&= -\int_{\Omega_0} \partial W(\eta(t,x) - \eta(t,y))\rho_0(y)\,dy, \label{lag_eq2}
\end{align}
\end{subequations}
for $(t,x) \in (0,\infty) \times \Omega_0$,
where we used the conservation of mass $\eqref{lag_eq1}$ to fix the domain of integration in the right hand side of the equation $\eqref{lag_eq2}$. Here $\{ \}'$ denotes the time derivative along the characteristic flow $\eta$. The system \eqref{lag_eq} is supplemented with the initial data
\eqv{\label{ini_lag_eq}
f_0 := f(0,x) = \rho_0(x),\quad v_0:=v(0,x) = u_0(x).}
Since $(\rho_0,u_0)\in H^2(\Omega_0)\times H^3(\Omega_0)$ and we are in one dimension, the initial data $\rho_0$ and $u_0$ are continuous functions up to the boundary of the domain, i.e., $\rho_0,u_0\in \mathcal C([a_0,b_0])$.
The problem \eqref{lag_eq}-\eqref{ini_lag_eq} has a unique local-in-time classical solution according to Theorem \ref{thm_local} in Appendix A. This solution can be extended to a maximal time of existence of the classical solution $[0,T)$. Since the characteristic flow $\eta(t,x)$ is a diffeomorphism for all $t\in[0,T)$ such that $\Omega(t)=\eta(t, \Omega_0)$, the Lagrangian change of variables can be inverted and the corresponding $(\rho,u)$ are a local-in-time classical solution of \eqref{main_eq}-\eqref{ini_main_eq} in the sense given in the introduction. As mentioned above, we will now obtain explicitly the formulas for the classical solutions of the system \eqref{main_eq} in Lagrangian variables.
Observe that the equation for the density $f(t,x)$ is decoupled from the equation of the velocity variable $v(t,x)$. We first with the equation for $v(t,x)$, and come back to the expression for the deformation of the mass density $\partial_x\eta(t,x)$ later on. Since the second derivative of the potential $\partial_x^2 W(x) = -2 \delta_0(x) + 1$ and $v\in\mathcal C^2$, we find
$$\begin{aligned}
v''(t,x) + v'(t,x) &= -\int_{\Omega_0} \partial^2 W(\eta(t,x) - \eta(t,y))\left( v(t,x) - v(t,y) \right) \rho_0(y)\,dy \cr
&= - v M_0 + \int_{\Omega_0} v(t,y) \rho_0(y)\,dy.
\end{aligned}$$
To evaluate the second term on the right hand side of the above equation, we multiply $\eqref{lag_eq2}$ by $\rho_0$ and integrate with respect to $x$ to get
\[
\frac{d}{dt}\int_{\Omega_0} v(t,x) \rho_0(x)\,dx = - \int_{\Omega_0} v(t,x) \rho_0(x)\,dx,
\]
due to $\partial_x W(-x) = -\partial_x W(x)$, thus, using the initial condition \eqref{ini_main_eq} we conclude
\eqv{\label{mom}
\int_{\Omega_0} v(t,x) \rho_0(x)\,dx = e^{-t}\int_{\Omega_0} \rho_0(x)u_0(x)\,dx.
}
Set $M_1 := \int_{\Omega_0} \rho_0(x)u_0(x)\,dx$. Then we obtain that $v$ satisfies the following nonhomogeneous linear second-order differential equation:
\begin{equation}\label{eq_diff}
v'' + v' + M_0 v = M_1 e^{-t}, \quad t > 0, \quad v_0 = u_0.
\end{equation}
We notice that the initial data $v'(0,x)=v'_0(x)$ are given through the equation $\eqref{lag_eq2}$ by
\eqv{\label{vt0}
v_0'(x) &= - v_0(x) - \int_{\Omega_0} \partial W(x-y) \rho_0(y)\,dy\cr
&= -u_0(x) - \int_{\Omega_0} (x-y) \rho_0(y)\,dy + \int_{\Omega_0} sgn(x-y) \rho_0(y)\,dy\cr
&= -u_0(x) - (x+1) M_0 + \int_{\Omega_0} y \rho_0(y)\,dy + 2\int_{-\infty}^x \rho_0(y)\,dy \quad \mbox{for} \quad x \in \Omega_0.
}
Depending on the size of the initial mass $M_0$, as long as the solution exists, it satisfies:\\
$\bullet$ {\bf Case A} ($1 > 4M_0$):
\eqv{\label{sol_formA}
v(t,x) = C_1 e^{\lambda_1 t} + C_2 e^{\lambda_2 t} + \frac{M_1}{M_0} e^{-t} ,}
$\bullet$ {\bf Case B} ($1 =4M_0$):
\eqv{\label{sol_formB}
v(t,x) =C_3 e^{-t/2} + C_4 t \,e^{-t/2} + \frac{M_1}{M_0} e^{-t},}
$\bullet$ {\bf Case C} ($1 <4M_0$):
\eqv{\label{sol_formC}
v(t,x) =C_5 e^{-t/2} \cos\left( \frac{\sqrt{4M_0 - 1}}{2}t\right) + C_6 e^{-t/2} \sin\left( \frac{\sqrt{4M_0 - 1}}{2}t\right) + \frac{M_1}{M_0} e^{-t},}
where $\lambda_1$, $\lambda_2$, and $C_i,i=1,\cdots,6$ are given by
\begin{subequations}\label{coeff}
\begin{align}
\lambda_1 &:= \frac{-1 + \sqrt{1 - 4M_0}}{2}, \quad \lambda_2 := \frac{-1 - \sqrt{1 - 4M_0}}{2}, \label{coeff_l}\\
C_1 &:= \frac{1}{\lambda_2 - \lambda_1}\left( \lambda_2 v_0 - v_0' + \lambda_1\frac{M_1}{M_0}\right), \quad
C_2 := \frac{1}{\lambda_2 - \lambda_1}\left( -\lambda_1 v_0 + v_0' - \lambda_2\frac{M_1}{M_0}\right), \label{coeff_12}\\
C_3 &:= v_0 - \frac{M_1}{M_0}, \quad C_4:= \frac{v_0}{2} + v_0' + \frac{M_1}{2M_0},\label{coeff_34}\\
C_5&:= v_0 - \frac{M_1}{M_0}, \quad \mbox{and} \quad C_6 = \frac{2}{\sqrt{4M_0 - 1}}\left(v_0' + \frac{v_0}{2} + \frac{M_1}{2M_0}\right).\label{coeff_56}
\end{align}
\end{subequations}
For abbreviation, we set
$$
\Xi := 1 - 4M_0\qquad \mbox{and} \qquad \square := -\Xi \,.
$$
Our aim now is to compute an explicit form of $\partial_x v$, in each of the above cases. Note that for any of these cases, it follows from \eqref{eq_tra} that
\begin{equation}\label{epe}
\eta(t,x) = x + \int_0^t v(s,x)\,ds \quad \mbox{and} \quad \partial_x \eta(t,x) = 1 + \int_0^t \partial_x v(s,x)\,ds.
\end{equation}
$\bullet$ {\bf Case A }($1 - 4M_0 > 0$): A straightforward computation for \eqref{sol_formA} yields
\begin{equation}\label{case1}
\partial_x v = \partial_x C_1 e^{\lambda_1 t} + \partial_x C_2 e^{\lambda_2 t},
\end{equation}
and thus
\[
\partial_x v_0 = \partial_x C_1 + \partial_x C_2 \quad \mbox{and} \quad \partial_x v_0' = \partial_x C_1 \lambda_1 + \partial_x C_2 \lambda_2.
\]
On the other hand, it follows from \eqref{ini_lag_eq} and \eqref{vt0} that
\[
\partial_x v_0 = \partial_x u_0 \quad \mbox{and} \quad \partial_x v_0' = -\partial_x u_0 - M_0 + 2 \rho_0,
\]
which implies
\eqv{\label{case1_est1}
\partial_x C_1 = \frac{1}{\sqrt{\Xi}} \left( \lambda_1 \partial_x u_0 - M_0 + 2\rho_0\right) \quad \mbox{and} \quad \partial_x C_2 = \frac{1}{\sqrt{\Xi}} \left( M_0 - 2\rho_0 - \lambda_2 \partial_x u_0\right).
}
Combining \eqref{epe} with \eqref{case1}, we get
\begin{equation}\label{lt_etaA}
\partial_x \eta = 1 + \frac{\partial_x C_1}{\lambda_1}\left( e^{\lambda_1 t} - 1 \right) + \frac{\partial_x C_2}{\lambda_2}\left(e^{\lambda_2 t} - 1 \right) = \frac{2\rho_0}{M_0} + \frac{\partial_x C_1}{\lambda_1}e^{\lambda_1 t} + \frac{\partial_x C_2}{\lambda_2}e^{\lambda_2 t},
\end{equation}
\begin{equation}\label{etaA}
\eta= x+\frac{C_1}{\lambda_1}(e^{\lambda_1 t}-1)+\frac{C_2}{\lambda_2}(e^{\lambda_2 t}-1)-\frac{M_1}{M_0}(e^{-t}-1),
\end{equation}
with $C_1, C_2$ are given by \eqref{coeff_12} whose derivatives are computed in \eqref{case1_est1} and $\lambda_1,\lambda_2$ given by \eqref{coeff_l}.
\medskip
\noindent$\bullet$ {\bf Case B} ($1 = 4M_0$): We use again the solution to \eqref{eq_diff} given in \eqref{sol_formB} together with the initial conditions to get
\eqv{\label{case2}
\quad \partial_x v = \partial_x C_3 e^{-t/2} + \partial_x C_4 t \,e^{-t/2},
}
where $\partial_x C_3,\ \partial_x C_4$ satisfy
\begin{equation}\label{case2_est1}
\partial_x C_3 = \partial_x u_0 \quad \mbox{and} \quad \partial_x C_4 = -\frac12 \partial_x u_0 - \frac14 + 2\rho_0\,,
\end{equation}
and so, by \eqref{epe}, we find
\begin{equation}\label{lt_etaB}
\partial_x \eta = 8\rho_0 - \left(2\partial_x C_3 + 4\partial_x C_4 \right)e^{-t/2} - 2\partial_x C_4 t \,e^{-t/2}
\end{equation}
and
\begin{equation}\label{etaB}
\eta =x+2C_3(1-e^{t/2})-2 C_4 t e^{-t/2}+4C_4(1-e^{-t/2})+\frac{M_1}{M_0}(1-e^{-t}).
\end{equation}
\medskip
\noindent$\bullet$ {\bf Case C} ($1 - 4M_0 < 0$): It follows analogously from \eqref{sol_formC} that
\eqv{\label{case3}
\partial_x v(t,x) = \partial_x C_5(x) e^{-t/2} \cos\lt( \frac{\sqrt\square}{2} t\rt) + \partial_xC_6(x) e^{-t/2} \sin\lt( \frac{\sqrt\square}{2} t\rt),
}
where $\partial_x C_5,\ \partial_x C_6$ satisfy
\eqv{\label{case3_est1}
\partial_x C_5 = \partial_x u_0 \quad \mbox{and} \quad \partial_x C_6=\frac{2}{\sqrt\square} \left(-\frac12 \partial_x u_0 - M_0 + 2\rho_0\right).
}
This yields
\eqv{\label{lt_etaC}
\partial_x \eta &= \frac{2\rho_0}{M_0} + \left( \frac{2\square}{1 + \square}\right)\left(\frac{\partial_x C_5}{\sqrt\square} - \frac{\partial_x C_6}{\square}\right)e^{-t/2}\sin\lt( \frac{\sqrt\square}{2} t\rt) \cr
&\quad - \left( \frac{2\square}{1 + \square}\right)\left(\frac{\partial_x C_5}{\square} + \frac{\partial_x C_6}{\sqrt\square}\right)e^{-t/2}\cos\lt( \frac{\sqrt\square}{2} t\rt),
}
and
\eqv{\label{etaC}
\eta &=x+ \frac{2(\sqrt\square C_5-C_6)}{1+\square} e^{-t/2}\sin\lt( \frac{\sqrt\square}{2} t\rt)+
\frac{C_5+\sqrt\square C_6}{1+\square}\lr{2-2e^{-t/2}\cos\lt( \frac{\sqrt\square}{2} t\rt)}\cr
&\quad+\frac{M_1}{M_0}(1-e^{-t}).
}
Let us summarize our results up to this point. We have derived the explicit forms of velocity field being a local-in-time classical solution to \eqref{main_eq}. We have also obtained the expressions for the deformation of the mass density $\partial_x \eta$ leading to positive values of the Lagrangian density $f(t,x)$ for small enough time, since $\partial_x \eta(0,x)=1$, for $x\in \Omega_0$. Moreover, we have derived the explicit expression of the characteristic flow $\eta(t,x)$. We next want to find the maximal time of existence of these explicit solutions.
\section{Sharp critical thresholds} In this section, we study the critical thresholds leading to a sharp condition for the dichotomy between global-in-time existence and finite-time blow-up of classical solutions to \eqref{main_eq}. The argument is based on the observation that the local-in-time classical solution found in the previous section can be extended in time as long as the characteristics can be defined, i.e., there is no crossing of characteristics, or equivalently, the flow map $\eta(t,x)$ is a diffeomorphism, so $\partial_x\eta>0$. We will thus study the explicit forms of $\partial_x\eta$ obtained in cases A, B and C above. The form of the time derivative of $\partial_x\eta$ will enable to estimate the critical thresholds in the system \eqref{lag_eq} depending on the size of the initial mass $M_0$.
We first notice that for all cases A, B, and C, the global-in-time classical solution, if it exists, satisfies
$$
\partial_x \eta(0,x) = 1 \quad \mbox{and} \quad \lim_{t \to \infty}\partial_x \eta(t,x) = \frac{2\rho_0(x)}{M_0}>0 \mbox{ for all } x\in \Omega_0.
$$
Thus, if the infimum of $\partial_x \eta(t,x)$ is nonpositive, then it should be attained at $0<t^*<\infty$. Let us assume that there exist $t^*>0$ and $x^*\in \Omega_0$ satisfying
\begin{equation}\label{inf}
\partial_x \eta(t^*, x^*) = \inf_{t >0, \, x \in \Omega_0}\partial_x \eta(t,x)\leq 0.
\end{equation}
Then using \eqref{epe} we find the necessary condition
\[
\partial_t \partial_x \eta(t^*,x^*)= \partial_x v(t^*,x^*) = 0.
\]
\noindent $\bullet$ {\bf Case A} ($1 - 4M_0 > 0$): Since $\lambda_1,\lambda_2$ given by \eqref{coeff_l} are both negative, it is clear from \eqref{lt_etaA} that $\partial_x C_1(x^*) \partial_x C_2(x^*) \neq 0$ in order to have the infimum inside the time interval $(0,\infty)$. From \eqref{case1} we also get
\[
\partial_x v(t^*,x^*) = \partial_x C_1(x^*) e^{\lambda_1 t} \left( 1 + \frac{\partial_x C_2(x^*)}{\partial_x C_1(x^*)} e^{-\sqrt{\Xi} t^*}\right) = 0,
\]
for
\eqv{\label{tsA}
-\frac{\partial_x C_1(x^*)}{\partial_x C_2(x^*)} = e^{-\sqrt{\Xi} t^*}.
}
This implies
\begin{equation}\label{case1_est2}
0 < -\frac{\partial_x C_1(x^*)}{\partial_x C_2(x^*)} < 1.
\end{equation}
Further, from \eqref{lt_etaA} and \eqref{tsA} we obtain
\[
\partial_x \eta(t^*,x^*) = \frac{2\rho_0(x^*)}{M_0} + \frac{\partial_x C_1(x^*)}{\lambda_1}e^{\lambda_1 t^*} + \frac{\partial_x C_2(x^*)}{\lambda_2}e^{\lambda_2 t^*} = \frac{2\rho_0(x^*)}{M_0} + \frac{\sqrt{\Xi}}{M_0}\partial_x C_2(x^*) e^{\lambda_2 t^*},
\]
thus necessarily $\partial_x C_2(x^*) < 0$ due to \eqref{inf}. Further, if $\partial_x C_2(x^*) < 0$, then due to \eqref{case1_est2}, \eqref{case1_est1} and \eqref{coeff_12} we have $\partial_x u_0(x^*) < 0$ which is equivalent to $\partial_x C_1(x^*) + \partial_x C_2(x^*) < 0$. Thus we conclude that to have finite-time blow up there must exist $x^* \in \Omega_0$ such that
\[
\partial_x C_1(x^*) > 0, \quad \partial_x C_2(x^*) < 0, \quad \partial_x u_0(x^*) < 0,
\]
and
\begin{equation}\label{condii}
2\rho_0(x^*) + \sqrt{\Xi}\partial_x C_2(x^*)\left(-\frac{\partial_x C_1(x^*)}{\partial_x C_2(x^*)}\right)^{{\frac{\lambda_2}{-\sqrt{\Xi} }}} \leq 0.
\end{equation}
The above condition is not only necessary but also sufficient, more precisely we have the following proposition:
\begin{proposition}\label{prop_c1} Suppose $1 - 4M_0 > 0$. Then $\partial_x \eta(t,x)$ attains a non-positive value if and only if there exists a $x \in \Omega_0$ such that
\[
\partial_x u_0(x) < 0, \quad M_0 - 2\rho_0(x) < \lambda_1 \partial_x u_0(x),
\]
and
\[
2\rho_0(x) \leq (\lambda_1 \partial_x u_0(x) - M_0 + 2\rho_0(x))^{-\lambda_2/\sqrt{\Xi}}(\lambda_2 \partial_x u_0(x) - M_0 + 2\rho_0(x))^{\lambda_1/\sqrt{\Xi}}.
\]
\end{proposition}
\begin{proof} Note that $M_0 - 2\rho_0(x) < \lambda_1 \partial_x u_0(x)$ is equivalent to $\partial_x C_1(x) > 0$ and $\partial_x C_2(x) < 0$ due to $\partial_x u_0(x) < 0$. Finally, it follows from \eqref{case1_est1} and \eqref{condii} that
\[
2\rho_0(x) \leq (\lambda_1 \partial_x u_0(x) - M_0 + 2\rho_0(x))^{-\lambda_2/\sqrt{\Xi}}(\lambda_2 \partial_x u_0(x) - M_0 + 2\rho_0(x))^{\lambda_1/\sqrt{\Xi}}.
\]
\end{proof}
\noindent $\bullet$ {\bf Case B} ($1 = 4M_0$): In this case, $\partial_x\eta$ is given by \eqref{lt_etaB} and \eqref{case2_est1}.
We again want to find a point $x^*$ which makes $\partial_x \eta$ nonpositive at some time $t=t^*$. Let us look for the values $t^*, x^*$ satisfying $\partial_x v(t^*,x^*) = 0$, from \eqref{case2}, we have
\[
\partial_x v(t^*,x^*) = \partial_x C_3(x^*) e^{-t^*/2} + \partial_x C_4(x^*) t^* e^{-t^*/2}=0, \quad \mbox{i.e.,} \quad t^* = -\frac{\partial_x C_3(x^*)}{\partial_x C_4(x^*)}.
\]
Since we look for $t^*>0$ we must have $-\frac{\partial_x C_3(x^*)}{\partial_x C_4(x^*)} > 0$. On the other hand, by plugging $t^*$ and $x^*$ into \eqref{lt_etaB}, we get
\begin{equation}\label{neww}
\partial_x \eta(t^*,x^*) = 8\rho_0(x^*) - 4\partial_x C_4(x^*) e^{-t^*/2}.
\end{equation}
Thus $\partial_x \eta(t^*,x^*)$ can be nonpositive if and only if
\[
\partial_x C_4(x^*) > 0, \quad \partial_x C_3(x^*) < 0, \quad \mbox{and} \quad 2\ln \left(\frac{2\rho_0(x^*)}{\partial_x C_4(x^*)} \right) \leq \frac{\partial_x C_3(x^*)}{\partial_x C_4(x^*)}.
\]
Summarizing the above estimate together with \eqref{case2_est1}, we have the following proposition:
\begin{proposition} Suppose $1 = 4M_0$. Then $\partial_x \eta(t,x)$ attains a nonpositive value if and only if there exists a $x \in \Omega_0$ such that
\[
\partial_x u_0(x) < \min\left\{0, 4\rho_0(x) - \frac12\right\},
\]
and
\begin{equation}\label{condii2}
\ln \left(\frac{8\rho_0(x)}{8\rho_0(x) - 2\partial_x u_0(x) - 1}\right) \leq \frac{2\partial_x u_0(x)}{8\rho_0(x) - 2\partial_x u_0(x) - 1}.
\end{equation}
\end{proposition}
\begin{proof} Since $\partial_x C_3(x) =\partial_x u_0(x) < 0$ and $\partial_x C_4(x) > 0$, we infer
\[
\partial_x u_0(x) < \min\left\{0, 4\rho_0(x) - \frac12\right\}.
\]
The condition \eqref{condii2} just follows from \eqref{neww}, since $t^*>0$.
\end{proof}
\noindent $\bullet$ {\bf Case C} ($1 - 4M_0 < 0$): In this case, $\partial_x v$ is given by \eqref{case3}.
Let us look for the values $t^*,x^*$ satisfying $\partial_x v(t^*,x^*) = 0$, we have
\begin{equation}\label{est_c3_2}
\cos\lt( \frac{\sqrt\square}{2} t^*\rt) = -\frac{\partial_x C_6(x^*)}{\partial_x C_5(x^*)} \sin\lt( \frac{\sqrt\square}{2} t^*\rt), \quad \mbox{i.e.,} \quad -\frac{\partial_x C_5(x^*)}{\partial_x C_6(x^*)} = \tan\lt( \frac{\sqrt\square}{2} t^*\rt).
\end{equation}
This gives
\eqv{\label{est_c3_1}
&\partial_x \eta(t^*,x^*) \\
&\quad= \frac{2\rho_0(x^*)}{M_0} + \left( \frac{2\sqrt\square}{1 + \square}\right)\left(\frac{(\partial_x C_5(x^*))^2 + (\partial_x C_6(x^*))^2}{\partial_x C_5(x^*)}\right)e^{-t^*/2}\sin\lt( \frac{\sqrt\square}{2} t^*\rt),
}
due to \eqref{lt_etaC}. Note that the second term in the right hand side of the equality \eqref{est_c3_1} has a damped oscillatory behavior as a function of $t^*$. This implies that in order to get the minimum value of $\partial_x \eta(t^*,x^*)$, it is enough to find the point $x^* \in \Omega_0$ and the smallest time $t^* > 0$ satisfying \eqref{est_c3_2}, such that the sign of the second term in \eqref{est_c3_1} is negative, i.e. $\sin(\sqrt{\square}\, t^*/2) \partial_x C_5(x^*) < 0$. Observe that for each $x^*\in \Omega_0$, there is an increasing sequence of allowed positive $t^*$ due to condition \eqref{est_c3_2}. For this, we consider the following two cases:\\
\noindent {\bf Subcase C.1} $\partial_x C_5(x^*)\partial_x C_6(x^*)< 0$: It follows from \eqref{est_c3_2} that the first $t^* > 0$ satisfying \eqref{est_c3_2} appears in the interval $(0, \pi/\sqrt\square)$. This yields that $\sin(\sqrt{\square}\, t^*/2) > 0$, therefore we can further distinguish two different cases:\\
\noindent {\bf Subcase C.1.i} If in addition $\partial_x C_5 <0$, it is possible that the first $t^* > 0$ satisfying \eqref{est_c3_2} leads to a negative value of \eqref{est_c3_1}. We can write its form in an explicit way; due to \eqref{est_c3_2} we have
\[
\sin\left(\frac{\sqrt\square}{2} t^*\right) = - \frac{\partial_x C_5(x^*)}{\sqrt{(\partial_x C_5(x^*))^2 + (\partial_x C_6(x^*))^2}} > 0.
\]
Plugging this into \eqref{est_c3_1}, we get
\[
\partial_x \eta(t^*,x^*) = \frac{2\rho_0(x^*)}{M_0} - \left( \frac{2\sqrt\square}{1 + \square}\right)\sqrt{(\partial_x C_5(x^*))^2 + (\partial_x C_6(x^*))^2}\,e^{-t^*/2}.
\]
Then we again use the relation \eqref{est_c3_2} to find
\[
\partial_x \eta(t^*,x^*) = \frac{2\rho_0(x^*)}{M_0} - C_7(x^*)\exp\left( \frac{C_8(x^*)}{\sqrt\square}\right),
\
where $C_7$ and $C_8$ are given by
\begin{equation}\label{case3_c2}
C_7(x) := \left( \frac{2\sqrt\square}{1 + \square}\right)\sqrt{(\partial_x C_5(x))^2 + (\partial_x C_6(x))^2} \mbox{ and } C_8(x) := \arctan\left(\frac{\partial_x C_5(x)}{\partial_x C_6(x)}\right).
\end{equation}
\noindent {\bf Subcase C.1.ii} If in addition $\partial_x C_5 >0$, then the first $t^* > 0$ satisfying \eqref{est_c3_2} leads to a positive value of \eqref{est_c3_1}, but the next $t^*$ might lead to a negative value. This one occurs at
$$
t_1^*=t^*+\frac{2\pi}{\sqrt{\square}}\in ( 2\pi/\sqrt\square, 3\pi/\sqrt\square),
$$
for which $\sin(\sqrt{\square}\, t_1^*/2) <0$, however its form is still the same
\[
\sin\left(\frac{\sqrt\square}{2} t_1^*\right) = - \frac{\partial_x C_5(x^*)}{\sqrt{(\partial_x C_5(x^*))^2 + (\partial_x C_6(x^*))^2}} < 0,
\]
and thus
\
\partial_x \eta(t_1^*,x^*) = \frac{2\rho_0(x^*)}{M_0} - C_7(x^*) \exp\left( \frac{1}{\sqrt\square}\left(C_8(x^*) - \pi\right)\right).
\
{\bf Subcase C.2} $\partial_x C_5(x^*)\partial_x C_6(x^*) > 0$: In this case, the first $t^* > 0$ satisfying \eqref{est_c3_2} is later, namely $t^* \in ( \pi/\sqrt\square, 2\pi/\sqrt\square)$, however this gives again the positive value of $\sin(\sqrt{\square}\, t^*/2) >0$. Therefore, we can further distinguish similar two cases as in {\bf C.1}:\\
\noindent {\bf Subcase C.2.i} If in addition $\partial_x C_5 <0$, then the minimum value
$\partial_x \eta(t^*,x^*)$ can be written in the following way
\
\partial_x \eta(t^*,x^*) = \frac{2\rho_0(x^*)}{M_0} - C_7(x^*) \exp\left( \frac{1}{\sqrt\square}\left(C_8(x^*) - \pi\right)\right).
\
Note that since $C_8(x^*) > 0$ and $\frac{\sqrt{\square}}{2}t^*> 0$, one has to take $\frac{\sqrt{\square}}{2}t^*= -C_8(x^*)+\pi$.
\noindent {\bf Subcase C.2.ii} If in addition $\partial_x C_5 >0$, then the minimum value is attained in the next possible time according to \eqref{est_c3_2} given by
$$
t_1^*=t^*+\frac{2\pi}{\sqrt{\square}}\in ( 3\pi/\sqrt\square, 4\pi/\sqrt\square),
$$
so, the smallest value is given by
\
\partial_x \eta(t_1^*,x^*) = \frac{2\rho_0(x^*)}{M_0} - C_7(x^*) \exp\left( \frac{1}{\sqrt\square}\left(C_8(x^*) - 2\pi\right)\right).
\
All of these sub-cases for $1 - 4M_0 < 0$ can be summarized in the following result.
\begin{proposition}\label{prop_c3} Suppose $1 - 4M_0 < 0$. Then $\partial_x \eta(t,x)$ has a nonpositive value if and only if there exists a point $x \in \mathcal{S}_1 \cup \mathcal{S}_2\cup\mathcal{S}_3\cup\mathcal{S}_4$ where $\mathcal{S}_i,i=1,...,4$ are given by
\begin{align}\label{condi_c3}
\begin{aligned}
\mathcal{S}_1 \!\!&:=\!\! \left\{ x \in \Omega_0\!:\!\partial_x C_5(x) < 0, \partial_x C_6(x) >0, \frac{2\rho_0(x)}{M_0} - C_7(x)\exp\!\left( \frac{C_8(x)}{\sqrt\square}\right) \!\!\leq 0 \right\},\cr
\mathcal{S}_2 \!\!&:=\!\! \left\{ x \in \Omega_0\!:\! \partial_x C_5(x) > 0, \partial_x C_6(x) <0, \frac{2\rho_0(x)}{M_0} - C_7(x) \exp\!\left( \frac{C_8(x) - \pi}{\sqrt\square}\right) \!\!\leq 0 \right\},\cr
\mathcal{S}_3 \!\!&:= \!\!\left\{ x \in \Omega_0\!:\! \partial_x C_5(x) < 0, \partial_x C_6(x) <0, \frac{2\rho_0(x)}{M_0} - C_7(x) \exp\!\left( \frac{C_8(x) - \pi}{\sqrt\square}\right) \!\!\leq 0 \right\},\cr
\mathcal{S}_4 \!\!&:=\!\! \left\{ x \in \Omega_0\!:\! \partial_x C_5(x) > 0, \partial_x C_6(x) >0, \frac{2\rho_0(x)}{M_0} - C_7(x) \exp\!\left( \frac{C_8(x) - 2\pi}{\sqrt\square}\right) \!\!\leq 0 \right\}
\end{aligned}
\end{align}
respectively. Here $\partial_x C_i,i=5,6,7,8$ are given in \eqref{case3_est1} and \eqref{case3_c2}.
\end{proposition}
As a direct consequence of Propositions \ref{prop_c1} -- \ref{prop_c3}, we have the following sharp critical thresholds for the system \eqref{main_eq}.
\begin{theorem}\label{Th:main}
Assume that $(f,v)$ is a classical solution to the system \eqref{lag_eq} with initial data \eqref{ini_lag_eq}, then:
\noindent {\bf Case A:} If $1 - 4M_0 > 0$, the solution blows up in finite time if and only if there exists a $x^* \in \Omega_0$ such that
\[
\partial_x u_0(x) < 0, \quad M_0 - 2\rho_0(x) < \lambda_1 \partial_x u_0(x),
\]
and
\[
2\rho_0(x) \leq (\lambda_1 \partial_x u_0(x) - M_0 + 2\rho_0(x))^{-\lambda_2/\sqrt{\Xi}}(\lambda_2 \partial_x u_0(x) - M_0 + 2\rho_0(x))^{\lambda_1/\sqrt{\Xi}}.
\]
{\bf Case B:} If $1 - 4M_0 = 0$, the solution blows up in finite time if and only if there exists a $x^* \in \Omega_0$ such that
\[
\partial_x u_0(x) < \min\left\{0, 4\rho_0(x) - \frac12\right\},
\]
and
\[
\ln \left(\frac{8\rho_0(x^*)}{8\rho_0(x^*) - 2\partial_x u_0(x^*) - 1}\right) \leq \frac{2\partial_x u_0(x^*)}{8\rho_0(x^*) - 2\partial_x u_0(x^*) - 1}.
\]
{\bf Case C:} If $1 - 4M_0 < 0$, the solution blows up in finite time if and only if there exists a $x^* \in \mathcal{S}_1 \cup \mathcal{S}_2\cup\mathcal{S}_3\cup\mathcal{S}_4$ where $\mathcal{S}_i,i=1,...,4$ are given in \eqref{condi_c3} and with $C_i(x), i=5,\cdots,8$ given by
\[
\partial_x C_5(x) = \partial_x u_0(x), \quad \partial_x C_6(x) = \frac{2}{\sqrt\square} \left(-\frac12 \partial_x u_0(x) - M_0(x) + 2\rho_0(x)\right),
\]
\[
C_7(x) = \left( \frac{2\sqrt\square}{1 + \square}\right)\sqrt{\frac{1 + \square}{\square}(\partial_x u_0(x))^2 + \frac{4}{\square}\left(2\rho_0(x) - M_0\right)\left(2\rho_0(x) - M_0 - \partial_x u_0(x)\right)},
\]
and
\[
C_8(x) = \arctan \left( \frac{\sqrt{\square} \partial_x u_0(x)}{4\rho_0(x) - 2M_0 - \partial_x u_0(x)}\right).
\]
Moreover, for all cases, if there is no finite-time blow-up, then the classical solution $(f,v)$ exists globally in time.
\end{theorem}
\begin{proof}It follows from $\eqref{lag_eq1}$ that
\[
\rho(t,\eta(t,x)) = \rho_0(x) \left(\partial_x \eta(t,x)\right)^{-1}.
\]
Thus the density $\rho$ blows up if and only if $\inf_{x \in \Omega_0} \partial_x \eta(t,x) \leq 0$ for some finite time $t>0$. We finally use Propositions \ref{prop_c1} -- \ref{prop_c3} to conclude the desired result.
\end{proof}
\begin{remark}\label{rempos}
One can easily check that the previous theorem holds also for the case $\Omega_0=\mathbb R$, provided that the initial density is positive and integrable and that the following conditions are satisfied
\eqv{\label{Rem_31}
\int_\mathbb R |x| \rho_0(x)\,dx <\infty \qquad \mbox{and} \qquad \int_\mathbb R \rho_0(x) |u_0(x)|\,dx <\infty \,.
}
\end{remark}
\section{Asymptotic behaviour}
The purpose of this section is to investigate the large time asymptotic behaviour of the explicitly constructed classical solutions to system \eqref{lag_eq} ensured by Theorem \ref{Th:main}.
\begin{theorem}\label{thm_large} Let $(f,v)$ be a global-in-time classical solution to the system \eqref{lag_eq}-\eqref{ini_lag_eq} given by Theorem {\rm\ref{Th:main}}. Then it satisfies
\[
f_\infty(x):=\lim_{t\to\infty} f(t,x) = \frac{M_0}{2} \quad \mbox{and} \quad v_\infty(x):=\lim_{t\to\infty} v(t,x) = 0 \quad \mbox{for all } x\in\Omega_0,
\]
exponentially fast. Moreover, the characteristic flow satisfies
$$
\eta_\infty(x) := \lim_{t\to\infty} \eta(t,x) = \frac{1}{M_0}\left(\int_{\Omega_0}\!\! y\rho_0(y)\,dy +\!\! \int_{\Omega_0}\!\! \rho_0(y) \,u_0(y)\,dy + 2\int_{a_0}^x \!\!\rho_0(y)\,dy -M_0\right)
$$
for all $x\in\Omega_0$. In particular, $\Omega(t)=(a(t),b(t))$ and
$$
\lim_{t\to\infty} |a(t)-\Gamma+1|=0 \quad \mbox{ and } \quad \lim_{t\to\infty} |b(t) -\Gamma-1|=0\,,
$$
exponentially fast.
\end{theorem}
\begin{proof} We claim that if there is no blow-up
\[
\lim_{t \to \infty}\frac{\partial \eta(t,x)}{\partial x} \to \frac{2\rho_0(x)}{M_0} \quad \mbox{for all} \quad x \in \Omega_0.
\]
It simply follows from the explicit formulas for $\partial_x\eta$ obtained in Section \ref{Sec:2}, namely \eqref{lt_etaA}, \eqref{lt_etaB}, and \eqref{lt_etaC}. On account of $\eqref{lag_eq1}$, we therefore have
\[
\lim_{t \to \infty} f(t,x) = \frac{M_0}{2} \quad \mbox{for} \quad x \in \Omega_0.
\]
Finally, it is obvious due to \eqref{coeff} that all functions $\partial_x C_i$ are bounded due to $\rho_0, \partial_x u_0\in \mathcal C([a_0,b_0])$, and thus, there exists a constant $ C>0$ such that
\[
\max_{1 \leq i \leq 6}\|C_i(x)\|_{L^\infty(\Omega_0)} \leq C.
\]
This yields
$$
\|v(t,\cdot)\|_{L^\infty(\Omega_0)} \leq C e^{-\lambda t} \quad \mbox{for some} \quad \lambda > 0.
$$
Since there is no blow-up of solution, we know that $\partial_x\eta(t,x)>0$ for all $(t,x)\in [0,\infty)\times\Omega_0$. Thus, $\rho(t,\eta(t,x))>0$ for all $(t,x)\in [0,\infty)\times\Omega_0$, and so, $\Omega(t)$ is connected since $\eta(t,x)$ is a diffeomorphism from the connected set $\Omega_0$ onto $\Omega(t)$. We denote $\Omega(t)=(a(t),b(t))$, where
$$
a(t)=\lim_{x\to a_0 +} \eta(t,x) \qquad \mbox{and} \qquad b(t)=\lim_{x\to b_0 -} \eta(t,x)\,.
$$
Finally, we can compute based on the explicit formulas for $\eta(t,x)$ given in \eqref{etaA}, \eqref{etaB}, and \eqref{etaC} that
$$
\lim_{t\to\infty} \eta(t,x) = \frac{1}{M_0}\left(\int_{\Omega_0} y\rho_0(y)\,dy + \int_{\Omega_0} \rho_0(y) \,u_0(y)\,dy + 2\int_{a_0}^x \rho_0(y)\,dy -M_0\right),
$$
for all $x\in\Omega_0$ and we deduce again that there exists constants $\bar C>0$ and $\bar \lambda>0$ such that
\eqv{\label{ab1}
\lim_{t\to\infty} |a(t) -\Gamma+ 1|\leq \bar Ce^{-\bar\lambda t} \qquad \mbox{and} \qquad\lim_{t\to\infty} |b(t) -\Gamma- 1|\leq \bar Ce^{-\bar\lambda t}
}
with $\Gamma$ given in \eqref{newintro}.
\end{proof}
\begin{remark}
As a consequence of Theorem {\rm\ref{thm_large}}, we conclude
$$
\lim_{t\to\infty} \rho(t,\eta(t,x)) = \frac{M_0}{2} \quad \mbox{ and } \quad
\lim_{t\to\infty} u(t,\eta(t,x)) = 0
$$
for all $x\in\Omega_0$. We can also check that $\eta_\infty(x)$ is a diffeomorphism from $\Omega_0$ to $(\Gamma-1,\Gamma+1)$. The previous theorem and this remark also hold for positive initial density defined on the whole $\mathbb R$ under the assumptions {\rm\eqref{Rem_31}}.
\end{remark}
In order to understand the large time behaviour of $\rho(t,y)$ in the Eulerian variables, one should invert the characteristics $\eta(t,x)$. This would be a daunting task in view of complexity of the explicit formulas for $\eta$ given in\eqref{etaA}, \eqref{etaB}, and \eqref{etaC} and we do not intend to do it. However, one can estimate the error in $L^1$ norm between $\rho(t,y)$ and the expected asymptotic profile
$$
\rho_\infty (y) = \frac{M_0}2 \chi_{\Omega_\infty}(y) \mbox{ for } y\in\mathbb R\,,
$$
where $\chi_\Omega$ is the characteristic function of the interval $\Omega$, recall that $\Omega_\infty=(\Gamma-1,\Gamma+1)$. In order to estimate this difference, we define an intermediate function $\tilde\rho$ that will simplify our computations:
$$
\tilde\rho (t,y)=\frac{M_0}{2}\chi_{\Omega(t)}(y) \mbox{ for } y\in\mathbb R\,.
$$
By using the Lagrangian change of variables \eqref{lag_eq1}, we deduce
\eqv{\label{L1b}
\|\rho(t,\cdot)-\tilde\rho (t,\cdot)\|_{L^1(\mathbb R)} &=
\int_{\Omega_0} \left| f(t,x)-\frac{M_0}{2} \right| \partial_x \eta(t,x) \,dx \cr &=
\int_{\Omega_0} \left| \rho_0(x)-\frac{M_0}{2} \partial_x \eta(t,x)\right| \,dx \,.
}
Theorem \ref{thm_large} shows that
$$
\lim_{t\to\infty} \left[\rho_0(x)-\frac{M_0}{2} \partial_x \eta(t,x)\right] = 0\,, \quad \mbox{for all} \quad x \in \Omega_0
$$
due to $\partial_x \eta > 0$. Since $\rho_0,\partial_x u_0 \in H^2(\Omega_0)$, then by the Sobolev embeddings $\rho_0,\partial_x u_0 \in \mathcal C^1(\Omega_0)$, and thus by the explicit expressions of $\partial_x\eta$ in \eqref{lt_etaA}, \eqref{lt_etaB} and \eqref{lt_etaC} we easily get
$$
\|\partial_x\eta\|_{L^\infty((0,\infty)\times \Omega_0)}<\infty\,.
$$
Therefore the integrand in \eqref{L1b} is bounded by a constant and the dominated convergence theorem implies that
$$
\lim_{t\to\infty} \|\rho(t,\cdot)-\tilde\rho (t,\cdot)\|_{L^1(\mathbb R)}= 0\,.
$$
It is also true on account of \eqref{ab1} that
$$
\lim_{t\to\infty} \|\rho_\infty(\cdot)-\tilde\rho (t,\cdot)\|_{L^1(\mathbb R)}= 0\,.
$$
Putting together the above results, we have
$$
\lim_{t\to\infty} \|\rho (t,\cdot)-\rho_\infty(\cdot)\|_{L^1(\mathbb R)}= 0\,.
$$
We can even improve this result providing a rate of convergence.
\begin{corollary}\label{cor_large} Let $(\rho,u)$ be the global-in-time classical solution to the system \eqref{main_eq}-\eqref{ini_main_eq} given by Theorem {\rm\ref{Th:main}}. Then there exists $C>0$ depending on the $L^\infty$ bounds of $\rho_0$ and $\partial_x u_0$ in $\Omega_0$ and $\lambda>0$ depending on the initial mass $M_0$ such that
$$
\|\rho (t,\cdot)-\rho_\infty(\cdot)\|_{L^1(\mathbb R)}\leq C e^{-\lambda t}\,.
$$
\end{corollary}
\begin{proof}
Using the explicit expressions for $\partial_x\eta$ in \eqref{lt_etaA}, \eqref{lt_etaB}, and \eqref{lt_etaC}, we can write the integrand in \eqref{L1b} as
$$
\rho_0(x)-\frac{M_0}{2} \partial_x \eta(t,x)=-\frac{M_0}{2} \xi(t,x)\,
$$
where
$$
\xi(t,x):=
\begin{cases}
\frac{\partial_x C_1}{\lambda_1}e^{\lambda_1 t} + \frac{\partial_x C_2}{\lambda_2}e^{\lambda_2 t} & \mbox{in {\bf A}}\\[2mm]
- \left(2\partial_x C_3 + 4\partial_x C_4 \right)e^{-t/2} - 2\partial_x C_4 t \,e^{-t/2} & \mbox{in {\bf B}}\\[2mm]
\left( \frac{2\square}{1 + \square}\right)e^{-t/2}\left[\left(\frac{\partial_x C_5}{\sqrt\square} - \frac{\partial_x C_6}{\square}\right)\sin\lt( \frac{\sqrt\square}{2} t\rt)
- \left(\frac{\partial_x C_5}{\square} + \frac{\partial_x C_6}{\sqrt\square}\right)\cos\lt( \frac{\sqrt\square}{2} t\rt)\right] & \mbox{in {\bf C}}
\end{cases}\,.
$$
Therefore, it is easy to check due to \eqref{coeff} that all functions $\partial_x C_i$ are bounded due to $\rho_0, \partial_x u_0\in \mathcal C([a_0,b_0])$, and thus, there exists a constant $\tilde C>0$ such that
$$
\|\xi(t,\cdot)\|_{L^\infty(\Omega_0)}\leq \tilde C e^{-\tilde \lambda t}
$$
with
$$
\tilde \lambda:=
\begin{cases}
-\lambda_1 & \mbox{in {\bf A}}\\[2mm]
\tfrac12 -\epsilon & \mbox{in {\bf B}}\\[2mm]
\tfrac12 & \mbox{in {\bf C}}
\end{cases}\,,
$$
with $\epsilon>0$ arbitrarily small.
Using these estimates back in \eqref{L1b}, we get
\eqh{
\|\rho(t,\cdot)-\tilde\rho (t,\cdot)\|_{L^1(\mathbb R)} &\leq \frac{|\Omega_0|}{2}\|\xi(t,\cdot)\|_{L^\infty(\Omega_0)}M_0
\leq \frac{\tilde C M_0|\Omega_0|}{2} e^{- \tilde\lambda t}.
}
The remaining term is also straightforward to estimate, using \eqref{ab1} we have
\eqh{
\|\tilde\rho (t,\cdot)-\rho_\infty(\cdot)\|_{L^1(\mathbb R)}\leq \frac{M_0}2 \int_{\Omega_0} |\chi_{\Omega(t)}-\chi_{\Omega_\infty}| dx\leq \bar C e^{-\bar\lambda t}\,
}
and we conclude by taking
$$
C=\min\left\{\frac{\tilde C M_0|\Omega_0|}{2},\bar C\right\},\quad\mbox{and}\quad \lambda=\min\{\tilde\lambda,\bar \lambda\}.
$$
\end{proof}
\begin{remark}
Let us point out that one can give more qualitative estimate on the intermediate asymptotics of the solutions. Actually, one can prove as in Corollary {\rm\ref{cor_large}} that the $L^1$ difference between any solution and the density profile
$$
\bar\rho (t,y)=\frac{M_0}{|\Omega(t)|}\chi_{\Omega(t)}(y) \mbox{ for } y\in\mathbb R\,,
$$
converges exponentially fast to zero. Depending on the different time scales involved, one can have cases in which this tendency to adjust to $\bar\rho$ is faster initially before the solution finally relaxes to the global equilibrium $\rho_\infty$. Adapting the previous arguments for positive initial data under the assumptions in Remark {\rm\ref{rempos}} seems challenging. This needs a smart control of the tails of the solutions as $t\to\infty$ depending on decaying/growth conditions at $x=\pm\infty$ of the density and the velocity profiles.
\end{remark}
Let us illustrate the results of the last sections with some numerical experiments performed using a particle method to solve the Lagrangian equations \eqref{lag_eq}. We refer to \cite{CCP} for details on the numerical scheme, see also \cite{KT} for related numerical strategies. We use an initial uniform distribution of nodes given by
\[
\eta_i(0)=-0.75+\frac{1.5}{n-1}\left(i-1\right)\quad \mbox{for} \quad i=1,\cdots,n.
\]
\begin{figure}[ht!]
\quad\,\, \subfloat[]{
\protect\includegraphics[scale=0.32]{density_c06}
\llap{\shortstack{%
\includegraphics[scale=.09]{comparison}\\
\rule{0ex}{1.3in}%
}
\rule{1.31in}{0ex}}
}\subfloat[]{\protect\includegraphics[scale=0.32]{velocity_c06}
}\newline
\subfloat[]{
\protect\includegraphics[scale=0.32]{density_c1}
}\subfloat[]{\protect\includegraphics[scale=0.32]{velocity_c1}
\llap{\shortstack{%
\includegraphics[scale=.1]{velocity_c1_detail2179}\\
\rule{0ex}{0.23in}%
}
\rule{1.23in}{0ex}}
}\protect\caption{\label{fig:figure} Numerical simulation of the system \eqref{main_eq} in the Lagrangian variables.- (A), (B): Time behavior of the density and the velocity for a global existence case ($c=0.6$). (C), (D): Time behavior of the density and the velocity for a finite time blow-up case ($c=1$).}
\end{figure}
The initial density is chosen as
\[
\rho_{i}(0)=\frac{1}{\gamma}\cos\left(\pi\,\frac{x_{i}(0)}{1.5}\right),
\]
where the constant $\gamma$ is fixed so that the total mass $M_0 := \int_\mathbb R \rho_0\,dx=0.2$. Concerning the initial velocity, we choose
\[
u_{i}(0)=-c\text{\,}x_{i}(0)\quad\mbox{for each node } i=1,\cdots, n,
\]
where the two values of the parameter $c$ will be $0.6$ and $1$. For the case $c=0.6$ there is global classical solution and for the case $c=1$ there is finite-time blow-up according to Theorem \ref{Th:main}.
In Fig. \ref{fig:figure} (A) and (B), we observe the dynamics of the solution converging towards the asymptotic profile $\rho_\infty$ as $t$ gets larger while the velocity becomes zero everywhere in the support of $\rho$. The solution after $t=30$ is plotted against the asymptotic profile steady state $\rho_\infty$ in the inlet for further validation.
In Fig. \ref{fig:figure} (C) and (D), we show the dynamics of the solution in the blow-up case. In the density evolution, we observe how the density is squeezing towards the asymptotic profile up to certain time $t=2.1$, after which the density becomes larger and larger at the boundary. The blow-up is clearer in the velocity profile where we see that the derivative of the velocity becomes unbounded at the boundary at approximately $t=2.179$ as depicted in the inlet. At this time before several nodes have been removed for the density symmetrically near the boundary for visualization purposes, whose largest value is 27.94.
\begin{remark} Observe that the same asymptotic profile $\rho_\infty$ is obtained as the large time asymptotics of the first-order aggregation equation:
$$\begin{aligned}
& \partial_t \rho + \nabla_x \cdot (\rho u) = 0,\quad (t,x) \in \mathbb R_+ \times \mathbb R^d,\cr
& u = -\nabla_x W \star \rho,\quad W(x) = -\phi(x) + \frac{|x|^2}{2} \quad \mbox{where} \quad \Delta_x \phi = 2\delta_0.
\end{aligned}$$
Indeed, one can easily find the dynamics of $\rho$ along its characteristic flow. More precisely, we get
\[
f' = -f (\nabla_x \cdot u)(t,\eta(t,x)) = -f^2(2 - dM_0 f^{-1}).
\]
This and together with the Gronwall inequality yields
\[
f(t,x) = \frac{dM_0\rho_0 }{(dM_0 - 2\rho_0)e^{-dM_0t} + 2\rho_0} \to \frac{dM_0} {2} \quad \mbox{as} \quad t \to \infty,
\]
for some $x \in \Omega_0$. These facts were already analysed both theoretically and numerically in \cite{BLL} for the attractive and repulsive Newtonian potentials in any dimension. In fact, the aggregation equation can be formally understood as the large friction limit of \eqref{main_eq}, see \cite{LT} for related asymptotic limits. Let us also point out that this aggregation equation for Newtonian repulsive interaction can be obtained from particle dynamics \cite{BCDP}.
\end{remark}
\begin{remark}
Further extensions for potentials may be possible following the previous strategy. Let us consider a more repulsive force at the origin in our main system \eqref{main_eq} by defining the potential $W(x)$ to be
$$
W(x)=-\frac{|x|^\alpha}{\alpha}+\frac{x^2}{2},
$$
with $-1<\alpha<1$. Here, $\frac{|x|^0}{0}:=\log |x|$ by definition. It is well known that $\frac{|x|^\alpha}{\alpha}$ is the fundamental solution of the fractional operator $-(-\partial_{xx})^{(1+\alpha)/2}$ except a positive constant. More precisely, one can check that
$$
-(-\partial_{xx})^{(1+\alpha)/2} \left(\frac{|x|^\alpha}{\alpha}\right) = k\delta_0
$$
with $k>0$, see \cite{Landkof,Stein} and \cite{CFP,ledoux,CHSV} for the one dimensional case. These potentials have been used for first-order aggregations models as in previous remark in \cite{chafai} and they are related to the eigenvalue distribution of random matrices. In particular, the following relations hold for sufficiently smooth functions $\rho$
$$
W\ast\rho = -(-\partial_{xx})^{-(1+\alpha)/2}\rho + \frac{x^2}{2}\ast\rho\,, \quad\partial W\ast\rho = -\left[\partial_x(-\partial_{xx})^{-(1+\alpha)/2}\right]\rho+ x\ast \rho\,,
$$
and
\eqv{\label{lappot}
-(-\partial_{xx})^{(1+\alpha)/2} (W\ast\rho) = \rho - (-\partial_{xx})^{\alpha/2}( x\ast \rho)\,.
}
Note that in the case $\alpha =0$, the derivative of $W\ast\rho$ is given by the Hilbert transform. The fractional operator $\partial_x(-\partial_{xx})^{-(1+\alpha)/2}$ when $-1<\alpha\leq 0$ has to be understood in the Cauchy principal value sense.
With this information, we can now write the Euler-type equations for this potential in Lagrangian coordinates as
\begin{subequations}\label{lag_eq_f}
\begin{align}
f(t,x)\frac{\partial \eta(t,x)}{\partial x} &= \rho_0(x), \quad (t,x) \in \mathbb R_+ \times \Omega_0, \label{lag_eqf_1}\\
v'(t,x) + v(t,x) =&-\int_{\Omega(t)} \partial W(\eta(t,x) - y) \rho(t,y)dy \nonumber\\
=& \int_{\Omega_0} \left[\partial_x(-\partial_{xx})^{-(1+\alpha)/2} \left(\frac{|x|^\alpha}{\alpha}\right) \right](\eta(t,x)- \eta(t,y))\rho_0(y)\,dy\nonumber\\
& - \int_{\Omega_0} (\eta(t,x) - \eta(t,y))\rho_0(y)\,dy\,. \label{lag_eqf_2}
\end{align}
\end{subequations}
Now, we would like to proceed by formally applying the differential operator $\partial_t^\alpha$ to \eqref{lag_eqf_2} taking into account \eqref{lappot} to find
$$\begin{aligned}
\partial_t^\alpha(v') + \partial_t^\alpha(v)
=& \int_{\Omega_0} \delta(\eta(t,x)- \eta(t,y)) (v(t,x)- v(t,y))^\alpha\rho_0(y)\,dy\\
&-\partial_t^{\alpha}(\eta)M_0 + \partial_t^{\alpha}\left( \int_{\Omega_0} \eta(t,y)\rho_0(y)\,dy \right)\\
=& -\partial_t^{\alpha-1}(v)M_0 + \partial_t^{\alpha - 1}\left( \int_{\Omega_0} v(t,y)\rho_0(y)\,dy \right)\,,
\end{aligned}$$
in case we are able to use the following chain rule for fractional derivatives
$$
\partial_x^\alpha f(g(x)) = (\partial_g^\alpha f(g))\big|_{g = g(x)} \left( \partial_x g(x)\right)^\alpha.
$$
It is unclear though how to rigorously justify such chain rule, see \cite[Lemma 12]{Jum} for non-smooth settings. Assuming that $\partial_t^{\alpha - 1}$ is the inverse operator of $\partial_t^{1-\alpha}$, then we recover for $\alpha=1$ our core formula \eqref{eq_diff}. Using \eqref{mom} we can compute
$$
\partial_t^{\alpha - 1}\left( \int_{\Omega_0} v(t,y)\rho_0(y)\,dy \right) = \partial_t^{\alpha - 1}\left( e^{-t}\int_{\Omega_0} (\rho_0 u_0)(y)\,dy \right) = M_1 \partial_t^{\alpha - 1}\left(e^{-t}\right)\,,
$$
by setting $w = \partial_t^{\alpha - 1}(v)$, we finally have
\begin{equation}\label{eq_w}
w'' + w' + M_0 w = M_1 \partial_t^{\alpha - 1}\left(e^{-t}\right).
\end{equation}
Hence, we could try to solve the differential equation \eqref{eq_w} to get the explicit solution $w$. However, recovering $v$ and other quantities also needs a careful inversion of the involved fractional operators.
\end{remark}
\section{Blow-up phenomena of the system \eqref{main_eq} with pressure and viscosity}
In this section, we consider the barotropic compressible damped Navier-Stokes-Poisson equations with non-local interaction forces:
\begin{subequations}\label{eq2}
\begin{align}
&\partial_t \rho + \partial_x (\rho u) = 0, \qquad (t,x) \in \mathbb R_+ \times \Omega(t),\\
&\partial_t (\rho u) + \partial_x (\rho u^2) + \partial_x p(\rho) -\partial_x(\mu(\rho)\partial_x u)= -\rho u -(\partial W \star \rho)\rho,\label{eq2_2}
\end{align}
\end{subequations}
where $W(x) = - |x| + \frac{|x|^2}{2}$, subject to initial density and velocity
\begin{equation}\label{ini_eq2}
(\rho(t,\cdot)u(t,\cdot))|_{t=0} = (\rho_0,u_0).
\end{equation}
Here the pressure law $p$ and the viscosity coefficient $\mu$ are given by $p(\rho) = \rho^\gamma$ and $\mu(\rho) = \rho^\alpha$ with $\gamma, \alpha > 1$.
Note that the term $\rho^{-1}\partial_x p$ is well-defined for the possible vacuum states $\rho = 0$ if $\gamma > 1$. We also notice that the pressure term in the system \eqref{eq2} can be formally derived from part of the potential term $\rho(\partial_x W \star \rho)$ by localizing part of $W$ near the origin. In this formal derivation, we obtain the system \eqref{eq2} with $\gamma = 2$.
For the investigation of the finite-time blow-up, we assume that there exists a smooth $(\rho, u )\in \mathcal C^2 \times \mathcal C^3$ solutions in $\mathbb R \times [0,T^*)$ to the system \eqref{eq2} emanating from the initial data \eqref{ini_eq2} such that
\begin{equation}\label{add-conti-p}
\left(\sum_{0\leq k \leq 2}|\partial_x^k \rho_0(a_0)|\right)\left( \sum_{0\leq k \leq 2}|\partial_x^k \rho_0(b_0)| \right)= 0.
\end{equation}
By setting $d = \partial_x u$, we can easily verify that
\begin{align}\label{re-eq2}
\begin{aligned}
& \dot\rho = - \rho d,\cr
& \dot d = -d^2 - d - \partial_x(\rho^{-1}\partial_xp(\rho)) +\partial_x(\rho^{-1}\partial_x(\mu(\rho)\partial_x u)) + 2\rho - M_0,
\end{aligned}
\end{align}
where $\dot{\xi}$ denotes the material derivative of $\xi$.
Then it follows from $\eqref{eq2_2}$ as in \cite[Lemma 2.1]{CH} that
\begin{equation}\label{est-press-1}
\sum_{0 \leq k \leq 2}|\partial_x^k \rho(t,\eta(t,x))| \leq \sum_{0\leq k \leq 2}|\partial_x^k \rho_0(x)|\exp\left(C\sum_{1 \leq k \leq 3}\int_0^t |\partial_x^k u(s,\eta(s,x))|\,ds\right).
\end{equation}
We also notice that
\begin{equation}\label{est-press-2}
\partial_x(\rho^{-1}\partial_x \rho^\gamma) = \gamma(\gamma-2)\rho^{\gamma-3}(\partial_x\rho)^2 + \gamma \rho^{\gamma-2}\partial_x^2 \rho,
\end{equation}
and
\begin{align}\label{est-press-3}
\begin{aligned}
\partial_x(\rho^{-1}\partial_x(\mu(\rho)\partial_x u))&=\rho^{\alpha-1}\partial_x^3 u+
(2\alpha-1)\rho^{\alpha-2}\partial_x\rho\partial_x^2 u
+\alpha\rho^{\alpha-2}\partial_x^2\rho\partial_x u\cr
&\quad +\alpha(\alpha-2)\rho^{\alpha-3}(\partial_x\rho)^2\partial_x u.
\end{aligned}
\end{align}
Thus the right hand sides of the equalities \eqref{est-press-2} and \eqref{est-press-3} are bounded if $\gamma, \alpha \in \{2\} \cup [3,\infty)$, and $\sum_{0\leq k \leq 2}|\partial_x^k \rho|$ and $\sum_{1\leq k \leq 3}|\partial_x^k u|$ are bounded. Taking into account \eqref{est-press-1} and \eqref{add-conti-p}, we deduce
\[
\left(\sum_{0\leq k \leq 2}|\partial_x^k \rho_0(a(t))|\right)\left( \sum_{0\leq k \leq 2}|\partial_x^k \rho_0(b(t))| \right)= 0 \quad \mbox{for} \quad t \in [0,T^*).
\]
Moreover it follows from \eqref{est-press-2} and \eqref{est-press-3} that
\[
\partial_x(\rho^{-1}\partial_x p)(t,y) = 0 \quad \mbox{and} \quad\partial_x((\rho^{-1}\partial_x(\mu(\rho)\partial_x u))(t,y) = 0,
\]
either for $y=a(t)$ or $y=b(t)$ for all $t \in [0,T^*)$. This implies from $\eqref{re-eq2}_2$ that
\begin{equation}\label{est_fin}
\mbox{either} \quad (\dot d +d^2 + d + M_0)(a(t)) = 0 \quad \mbox{or} \quad (\dot d +d^2 + d + M_0)(b(t)) = 0,
\end{equation}
for all $t \in [0,T^*)$.
\begin{theorem}\label{Th_NS}
Let $(\rho,u)$ be a $\mathcal C^2 \times \mathcal C^3$ classical solution in $\mathbb R\times [0,T^*)$ to the system \eqref{eq2}-\eqref{ini_eq2} with $\gamma, \alpha \in \{2\} \cup [3,\infty)$. Assume that either $x=a_0$ or $x=b_0$ satisfies
\[
\sum_{0\leq k \leq 2}|\partial_x^k \rho_0(x)| = 0 \qquad \mbox{and} \qquad d_0(x) :=d(0)< d_- = \frac{-1 - \sqrt{1 - 4M_0}}{2}\,.
\]
Then $T^*$ is finite. Furthermore, we have
\[
T^* \leq \min_{x \in \{a_0,b_0\}} \frac{1}{d_- - d_0(x)}.
\]
\end{theorem}
\begin{proof}It follows from \eqref{est_fin} that for $1 - 4M_0 > 0$
\[
\dot d = -(d^2 + d + M_0) = -(d - d_+)(d-d_-), \quad \mbox{where} \quad d_\pm = \frac{-1 \pm \sqrt{1 - 4M_0}}{2}.
\]
If $d_0 < d_-$, then
\[
\dot d \leq -(d - d_-)^2 \quad \mbox{and} \quad d \leq \frac{d_0 - d_-}{1 + (d_0 - d_-)t} + d_-.
\]
Since $d_0 - d_- < 0$, thus $d(t,y) = \partial_x u(t,y)$ with $y=a(t)$ or $y=b(t)$ will blow up before the time $T^*$ which satisfies
\[
T^* \leq \min_{x \in \{a_0,b_0\}} \frac{1}{d_- - d_0(x)}.
\]
This completes the proof.
\end{proof}
\begin{remark}
Theorem {\rm\ref{Th_NS}} can be generalized to the case of compactly supported initial density with possible vacuum regions $\rho_0=0$.
\end{remark}
|
\section{INTRODUCTION}
Temperature ($T$) and baryon chemical potential ($\mu_{\rm B}$)
dependence of quantum chromodynamics (QCD)
is often described as the QCD phase diagram~\cite{bib1},
where $\mu_{\rm B}$ is related to quark chemical
potential $\mu_{\rm q}$ as $\mu_{\rm B}=3\mu_{\rm q}$.
Investigation of the truth about the QCD phase diagram
is quite important not only in
hadron physics but also in particle physics and astrophysics.
Lattice QCD (LQCD) simulation as the first principle calculation is
a powerful tool of studying the QCD phase diagram.
In fact, recent LQCD simulations provide reliable results in
$\mu_{\rm q}/T\lesssim 1$ with sophisticated methods
~\cite{bib2,bib3,bib4,bib5,bib6,bib7,bib8,bib9,bib10,bib11}.
However, these methods are considered not to work well
in $\mu_{\rm q}/T\gtrsim 1$ because of the severe sign problem.
To understand the QCD phase diagram there,
many effective models were proposed so far.
Among the effective models,
the entanglement Polyakov-loop extended Nambu--Jona-Lasinio (EPNJL) model
is one of the most useful effective models~\cite{bib17}.
The 2-flavor EPNJL model is successful in reproducing
LQCD data at zero and imaginary $\mu_{\rm q}/T$,
isospin chemical potential and small real $\mu_{\rm q}/T$~\cite{bib17,bib18}.
In addition, Ishii \textit{et.al.} showed very recently that
random-phase-approximation calculations based on the EPNJL model
well reproduce $T$ dependence of the meson screening masses
calculated by LQCD in both the 2- and 2+1-flavor cases~\cite{bib19,bib20}.
In spite of the success, the EPNJL model can not treat the
baryon degrees of freedom explicitly. This is a disadvantage
of the EPNJL model in describing the baryon sector in the QCD phase diagram.
Another way of describing all the region of QCD phase diagram
is the two phase model (TPM) in which
the hadron-quark phase transition is assumed to be the first order
and the phase boundary is determined by the Gibbs criterion~\cite{bib21,bib22}.
The TPM allows us to use different models for hadron and quark phases.
Various methods were proposed and developed so far
to describe the hadron phase; for example,
the Brueckner-Hartree-Fock method~\cite{bib23},
its relativistic version~\cite{bib24}, the variational method~\cite{bib25}
and the relativistic mean field (RMF) model~\cite{bib26}.
Among them, we use the RMF model in this paper since it is easy to treat
and successful in describing the saturation properties of the nuclear matter.
However, the equation of state (EoS) strongly
depend on the choice of parameters and are quite different,
especially above the normal nuclear density $\rho_{0}$.
Observations of neutron star (NS) may be a key to solve this problem.
Recently, two-solar-mass ($2M_{\rm sun}$) NSs
were discovered with high accuracy~\cite{bib27,bib28},
and Steiner \textit{et.al.} yielded the best
fitting against various observed mass-radius (MR) relations~\cite{bib29}.
Therefore, we can judge what version of the RMF model
is most reasonable above $\rho_{0}$
because MR relation is sensitive to the EoS taken.
In the core of heavy NSs,
it is possible that the hadron-quark phase transition takes place.
The occurrence of the transition depends on
stiffness of quark-phase EoS,
which is sensitive to the strength $G_{\rm v4}$ of the vector-type
four-quark interaction in the EPNJL model.
In our previous work~\cite{bib30}, the value of $G_{\rm v4}$ at
$\mu_{\rm q}/T=0$ was determined
from LQCD data on the quark number density $n_{\rm q}$
normalized by its Stefan-Boltzmann limit $n_{\rm SB}$;
note that $n_{\rm q}/n_{\rm SB}$ is $\mu_{\rm q}$-even
and has no finite-volume effect.
The value of $G_{\rm v4}$ obtained in the $\mu_{\rm q}/T=0$ limit
is called $G_{\rm v4}(0)$ in the present paper.
As for $n_{\rm q}/n_{\rm SB}$, new LQCD data on $n_{\rm q}$
was provided by using the extrapolation
from the imaginary $\mu_{\rm q}/T$ region
to the real one~\cite{bib11}.
Since LQCD simulations in the imaginary $\mu_{\rm q}/T$ region are free
from the sign problem,
the numerical errors of the new data are very small
compared with the previous one based on the Taylor expansion method at
real $\mu_{\rm q}/T$~\cite{bib4}.
This suggests that one can determine
the value of $G_{\rm v4}(0)$ more sharply.
If the strength $G_{\rm v4}$ is decreasing with increasing the $\mu_{\rm q}/T$,
the possibility that the quark phase exist in the core
of NS becomes higher.
However, at present, it is difficult to determine the density-dependence of $G_{\rm v}$ theoretically.
Hence, here, we consider an inverse problem.
When we assume the existence of the quark phase in the core of NS,
how does the existence constrain the density-dependence of
the strength $G_{\rm v4}$?
How much should the critical baryon chemical potential of
hadron-quark phase transition be?
In this paper, we first construct reasonable TPMs by
using LQCD data at $\mu_{\rm q}/T=0$ as a constraint
on quark-phase EoS and NS observations
as a constraint on both hadron- and quark-phase EoS.
As a quark part of TPM, we consider three types of EPNJL models;
(1) the model with no vector-type four-quark interaction,
(2) the model with vector-type four-quark interaction
in which the strength $G_{\rm v4}$ is assumed to be constant,
i.e., $G_{\rm v4}=G_{\rm v4}(0)$,
and
(3) the model with the vector-type four-quark interaction
in which the density-dependent strength $G_{\rm v4}(n_{\rm q})$
is introduced.
The value of $G_{\rm v4}(0)$ is determined from LQCD data
on $n_{\rm q}/n_{\rm SB}$ in the $\mu_{\rm q}/T=0$ limit.
The density dependence of $G_{\rm v4}(n_{\rm q})$ is
discussed by assuming that the quark phase takes place in
the core of NS.
As hadron phase models, we take three RMF models, i.e.,
TM1~\cite{bib31}, NL3~\cite{bib32} and the model proposed
by Maruyama, Tatsumi, Endo and Chiba (MTEC)~\cite{bib33}.
We determine which hadron-phase EoS
is consistent with $2M_{\rm sun}$ NS observations
and the statistically analyzed MR relation by Steiner
\textit{et.al.}~\cite{bib27,bib28,bib29}.
We focus our attention on the $2M_{\rm sun}$ region
on the statistically analyzed MR relation,
since our interest is whether the hadron-quark
phase transition takes place or not in the core of NS
and this possibility becomes higher for heavy NS.
We will find that MTEC EoS well reproduces
all the data on MR relation, particularly in the $2M_{\rm sun}$ region.
The second best is TM1 EoS.
We then pick up MTEC and TM1 as hadron-phase EoSs and
consider six types of TPMs, as shown in TABLE~\ref{tb:table1}.
These are classified with the hadron-phase EoS,
that is, MTEC EoS as a TPMa and TM1 EoS as a TPMb.
For each class, we take EPNJL of type (1)--(3)
for the quark-phase EoS.
By using TPMa1--TPMa3 and TPMb1--TPMb3,
we calculate the MR relation and
draw the hadron-quark phase transition line
in the $T$-$\mu_{\rm B}$ plane.
For TPMa3 and TPMb3,
varying $n_{\rm q}$ dependence of $G_{\rm v4}(n_{\rm q})$,
we determine the upper bound of the transition line
for the quark phase to appear in the core of NS.
The paper is organized as follow:
In Sec. \ref{sec2},
we formulate the EPNJL model
with vector-type four-quark interaction and the RMF model.
The prescription of the Gibbs criterion is also explained.
Sec. \ref{sec3} is devoted to show the numerical results.
We first determine the value of $G_{\rm v4}(0)$ by using
new LQCD data on $n_{\rm q}/n_{\rm SB}$ in the $\mu_{\rm q}/T=0$ limit.
Next, we select the RMF model through the comparison with
the data on MR relation.
Finally, we construct the TPMa1--TPMa3 and TPMb1--TPMb3.
From these models,
we draw the upper and lower bounds of
hadron-quark phase transition line from
the condition that the quark phase takes place in the core of NS.
The density-dependence of the vector-type four-quark interaction
is also discussed.
\begin{table}[t]
\begin{center}
\caption{TPMs taken in this paper.
The TPMs are combinations
of RMF model (MTEC or TM1) and three EPNJL models
of types (1)--(3).
See the text for the definition of RMF and EPNJL models.
}
\begin{tabular}{c|c|c|c}
\hline \hline
class & hadron-phase EoS & quark-phase EoS & label \\ \hline
& & EPNJL of type (1) & TPMa1 \\
TPMa & MTEC & EPNJL of type (2) & TPMa2 \\
& & EPNJL of type (3) & TPMa3 \\ \hline
& & EPNJL of type (1) & TPMb1 \\
TPMb & TM1 & EPNJL of type (2) & TPMb2 \\
& & EPNJL of type (3) & TPMb3 \\ \hline \hline
\end{tabular}
\label{tb:table1}
\end{center}
\end{table}
\section{MODEL SETTING}
\label{sec2}
\subsection{QUARK PHASE}
The Lagrangian of the EPNJL of type (1) is given by
\begin{align}
{\cal L}_{\textrm{EPNJL}}
= &{\bar q}(i\gamma^\mu D_\mu - m_0)q - {\cal U}(\Phi,{\Phi}^{\ast})
\notag \\
& + \tilde{G}_{\rm s4}[({\bar q}q )^2 + ({\bar q }i\gamma_5 {\vec \tau}q)^2]
- \tilde{G}_{\rm v4}(0)({\bar q \gamma_\mu q})^2
\label{eq:EPNJL_gv0}
\end{align}
where $q=(u,d)^{\textrm{T}}$ is u- and d- quark fields,
$m_{0}=\textrm{diag}(m_{\textrm{u}},m_{\textrm{d}})$
denotes a current quark mass matrix and $\vec{\tau}$ is an isospin-matrix.
In this paper, we set $m_{\textrm{u}}=m_{\textrm{d}}\equiv m_{0}$.
The quark and gluon interact through the covariant derivative
$D^\mu=\partial^\mu+iA^\mu$,
where $A^\mu=g\delta^{\mu}_{0}A^0_{a}{\lambda_a/2}
=-ig\delta^{\mu}_{0}(A_{4})_a{\lambda_a/2}$ with gauge field $A^\mu_a$,
Gell-Mann matrix $\lambda_a$ and the gauge coupling $g$.
$\tilde{G}_{\rm s4}$ and $\tilde{G}_{\rm v4}(0)$ are
the strength of scalar- and vector-type four-quark interactions
depending on the Polyakov loop $\Phi$ and its conjugate $\Phi^{\ast}$.
We parametrize the Polyakov-loop dependence of these interactions as
\begin{align*}
&\tilde{G}_{\rm s4} = G_{\rm s4}\left(1-\alpha_1\Phi{\Phi}^* -\alpha_2(\Phi^3 + {\Phi^*}^{3})\right)
\\
&\tilde{G}_{\rm v4}(0) = G_{\rm v4}(0)\left(1-\alpha_1\Phi{\Phi}^* -\alpha_2(\Phi^3 + {\Phi^*}^{3})\right)
\end{align*}
according to the previous works~\cite{bib17,bib30}.
Eventually, the NJL sector of Eq. (\ref{eq:EPNJL_gv0}) has five parameters
$(m_{0}, G_{\rm s4},G_{\rm v4}(0), \alpha_1, \alpha_2)$.
We take $G_{\rm s4}=5.498\ \rm{GeV}^{-2}$ and $\alpha_{1}=\alpha_{2}=0.2$
of Ref. \cite{bib17}.
The value of $G_{\rm v4}(0)$ will be determined from LQCD data
on $n_{\rm q}/n_{\rm SB}$~\cite{bib4,bib11}.
In the LQCD data we use, the corresponding
current quark mass $m_{0}$ was 130 MeV and
it is much heavier than the empirical value $\sim$ 5 MeV.
LQCD simulations were done
by the Taylor expansion method~\cite{bib4}
and the imaginary $\mu_{\rm q}/T$ method~\cite{bib11}.
The two kinds of simulations used
2-flavor clover-improved Wilson fermion along the line of
constant physics of $m_{\pi}/m_{\rho}=0.8$ for
$\pi$- and $\rho$-meson masses $m_{\pi}$ and $m_{\rho}$.
We also keep $m_{0}=130$ MeV for our EPNJL model analysis
to determine the value of $G_{\rm v4}(0)$ from the LQCD data.
In the EPNJL model, only the time component of
gluon field $A^{\mu}_{a}$ is treated as
a homogeneous and static background field.
We define $\Phi$ and $\Phi^{\ast}$ in the Polyakov gauge as
\begin{align}
\Phi = \frac{1}{3}{\rm Tr}_{\rm c}(L),\ \ \
\Phi^{\ast} = \frac{1}{3}{\rm Tr}_{\rm c}({L^\dag}) ,
\end{align}
where $L= \exp[i A_4/T]=\exp[i~{\rm diag}(A_4^{11},A_4^{22},A_4^{33})/T]$
for the classical variables $A_4^{ii}$
satisfying $A_4^{11}+A_4^{22}+A_4^{33}=0$.
Under the definition eq. (2),
we use the logarithm-type Polyakov potential $\mathcal{U}(\Phi,\Phi^{\ast})$
proposed in Ref.~\cite{bib34},
\begin{align}
&\mathcal{U}(\Phi,\Phi^{\ast})=T^4\left[-\frac{a(T)}{2}\Phi\Phi^{\ast}+b(T)\log H(\Phi,\Phi^{\ast})\right],
\end{align}
where
\begin{align*}
&a(T)=a_{0}+\left(\frac{T_{0}}{T}\right)+a_{2}\left(\frac{T_{0}}{T}\right)^2,\
\ b(T)=b_{3}\left(\frac{T_{0}}{T}\right)^3 \\
&H(\Phi,\Phi^{\ast})=1-6\Phi\Phi^{\ast}+4(\Phi^3+\Phi^{\ast 3})-3(\Phi\Phi^{\ast})^2.
\end{align*}
Usually, the parameter $T_{0}$ is 270 MeV so as to reproduce
LQCD data in the pure gauge limit~\cite{bib35}.
For this value of $T_{0}$, however,
the EPNJL model yields a larger value of
pseudo-critical temperature $T_\textrm{pc}$ for the deconfinement
transition than the full-LQCD prediction
171 MeV at $\mu_{\rm q}/T=0$~\cite{bib36,bib37,bib38}.
We then rescale $T_0$ to 190 MeV. By this rescale,
the EPNJL model reproduce $T_{\rm pc} = 171$ MeV.
Other parameters $(a_{0}, a_{1}, a_{2}, b_{3})$ are summarized in TABLE~\ref{tb:table2}.
\begin{table}[t]
\begin{center}
\caption{The parameter set in the Polyakov potential proposed in
Ref.~\cite{bib34}. All parameters are dimensionless.}
\begin{tabular}{c|c|c|c}
\hline \hline
$a_{0}$ & $a_{1}$ & $a_{2}$ & $b_{3}$ \\ \hline
\ \ \ \ \ 3.51\ \ \ \ \ & \ \ \ \ \ $-2.47$\ \ \ \ \ &
\ \ \ \ \ 15.2\ \ \ \ \ & \ \ \ \ \ $-1.75$\ \ \ \ \ \\ \hline \hline
\end{tabular}
\label{tb:table2}
\end{center}
\end{table}
After the mean field approximation to Eq. (\ref{eq:EPNJL_gv0}),
one can obtain the thermodynamic potential $\Omega_{\rm EPNJL}$ (per unit volume) as
\begin{align}
&\Omega_{\rm EPNJL}
= U_{\rm M}+{\cal U}-2 \sum_{i=\textrm{u, d}} \int \frac{d^3 \mathbf{p}}{(2\pi)^3}
\Bigl[ 3 E_{i} \notag \\
&+ \frac{1}{\beta}
\log \left(1 + 3(\Phi+{\Phi}^* e^{-\beta (E-\tilde{\mu}_i )})
e^{-\beta (E-\tilde{\mu}_{i})}+ e^{-3\beta (E-\tilde{\mu}_{i})}\right)
\notag\\
&+ \frac{1}{\beta}
\log \left(1 + 3({\Phi}^*+{\Phi e^{-\beta (E+\tilde{\mu}_{i})}})
e^{-\beta (E+\tilde{\mu}_{i})}+ e^{-3\beta (E+\tilde{\mu}_{i})}\right)
\Bigl],
\end{align}
where $\beta=1/T$, $U_{\rm M}=\tilde{G}_{\rm s4}\sigma^2-\tilde{G}_{\rm v4}(0)n^2_{\rm q}$,
$E=\sqrt{{\bf p}^2+M^2}$ with the constituent quark mass $M=m_0-2\tilde{G}_{\rm s4}\sigma$
and $\tilde{\mu}_{\rm i}=\mu_{\rm i}-2\tilde{G}_{\rm v4}(0)n_{\rm q}$
for $i=$ u, d.
The chiral condensate and the quark numbder density are defined by
$\sigma =\langle\bar{q}q\rangle$, $n_{\rm q}=\langle q^{\dag}q\rangle$.
We use the three-dimensional momentum cutoff $\Lambda=$ 631.5 MeV
to regularize the vacuum term.
The variables $X=\sigma, n_{\textrm{q}}, \Phi, \Phi^{\ast}$ are determined with
stationary condition ${\partial \Omega_{\textrm{EPNJL}}}/{\partial X}=0$.
In this paper, we employ the approximation $\Phi=\Phi^{\ast}$ since
it is known to be good approximation~\cite{bib17}.
In the EPNJL of type (3), the density-dependent
strength $G_{\rm v4}(n_{\rm q})$ of vector-type four-quark interaction is
introduced. The strength is assumed to be a Gaussian form of
\begin{eqnarray}
G_{\rm v4}(n_{\rm q})=\textrm{e}^{-b\left(\frac{n_{\rm q}}{\rho_{0}}\right)^2}G_{\rm v4}(0),
\label{eq:density-dependence}
\end{eqnarray}
where $b$ is a parameter and $\rho_{0}$ is a saturation density.
Note that the model with vanishing (constant) vector interaction coupling is obtained when
$b \to \infty$ ($b\to 0$).
The thermodynamic potential of EPNJL of type (3) can be obtained by
the replacement $G_{\rm v4}(0)\rightarrow G_{\rm v4}(n_{\rm q})$.
The detail will be discussed in Sec. \ref{sec3}.
\subsection{RELATIVISTIC MEAN FIELD MODEL}
\begin{table}[t]
\begin{center}
\caption{Three parameter sets used in the RMF models.
The saturation properties derived from three parameter sets are
also summarized.
Shown are the saturation density $\rho_{0}$, binding energy $E_{0}$,
incompressibility $K$, symmetry energy $S_{0}$, and ratio of the
effective nucleon mass $M_{\rm N}$ to nucleon mass $m_{\rm N}$.}
\begin{tabular}{cccc}
\hline \hline
parameter & MTEC & TM1 & NL3 \\ \hline
$m_{\textrm{N}}$ (MeV) & 938 & 938 & 939 \\
$m_{\varphi}$ (MeV) & 400 & 511.198 & 508.194 \\
$m_{\omega}$ (MeV) & 783 & 783 & 782.501 \\
$m_{\rho}$ (MeV) & 769 & 770 & 763 \\
$g_{\varphi}$ & 6.3935 & 10.0289 & 10.217 \\
$g_{\omega}$ & 8.7207 & 12.6139 & 12.868 \\
$g_{\rho}$ & 4.2696 & 4.6322 & 4.474 \\
$g_{2}$ ($\textrm{fm}^{-1}$) & $- 10.757$ & $- 7.2325$ & $- 10.431$ \\
$g_{3}$ & $- 4.0452$ & 0.6183 & $- 28.885$ \\
$c_{3}$ & 0 & 71.3075 & 0 \\ \hline \hline
saturation property & MTEC & TM1 & NL3 \\ \hline
$\rho_{0}$ ($\textrm{fm}^{-3}$) & 0.153 & 0.145 & 0.148 \\
$E_{0}$ (MeV) & $- 16.3$ & $- 16.3$ & $- 16.3$ \\
$K$ (MeV) & 240 & 281 & 271 \\
$S_{0}$ (MeV) & 32.5 & 36.9 & 37.4 \\
$M_{\rm N}/m_{\rm N}$ & 0.78 & 0.63 & 0.60 \\ \hline \hline
\end{tabular}
\label{tb:table3}
\end{center}
\end{table}
\begin{figure*}[
\begin{center}
\includegraphics[width=0.8\textwidth]{EoS_symmetric_neutron.eps}
\end{center}
\caption{
The equation of states of three parameter sets
for symmetric matter (left panel) and neutron matter (right panel).
In both panels, the results of MTEC, TM1 and NL3
are corresponding the solid, the dotted and
the dot-dashed lines, respectively.
In the left panel,
the open square indicates the empirical saturation point~\cite{bib23}.
}
\label{Fig1}
\end{figure*}
We treat the hadron phase by the RMF model.
In the RMF model,
the nucleon-nucleon interaction is mediated by scalar ($\varphi$),
vector ($\omega$) and isovector ($\rho$) mesons.
The Lagrangian of RMF model is written as
\begin{align}
\mathcal{L}_{\textrm{RMF}}=&\bar{\psi}(i\gamma^{\mu}\partial_{\mu}-m_{\textrm{N}}-g_{\varphi}\varphi
-g_{\omega}\gamma^{\mu}\omega_{\mu}-g_{\rho}\gamma^{\mu}\rho^{a}_{\mu}\tau_{a})\psi
\notag \\
&+\frac{1}{2}\partial^{\mu}\varphi\partial_{\mu}\varphi-\frac{1}{2}m^2_{\varphi}\varphi^2-\frac{1}{3}g_{2}\varphi^3
-\frac{1}{4}g_{3}\varphi^4
\notag \\
&-\frac{1}{4}\Omega^{\mu\nu}\Omega_{\mu\nu}+\frac{1}{2}m^2_{\omega}\omega^{\mu}\omega_{\mu}
+\frac{1}{4}c_{3}(\omega^{\mu}\omega_{\mu})^2
\notag \\
&-\frac{1}{4}R^{\mu\nu}_{a}R_{\mu\nu}^{a}+\frac{1}{2}m^2_{\rho}\rho^{\mu}_{a}\rho^{a}_{\mu},
\end{align}
where $\psi$ is the nucleon (N) field, and
$\Omega^{\mu\nu}$ ($R^{\mu\nu}_{a}$)
is the field strength of $\omega$ ($\rho$) meson.
Masses of the particles are denoted by $m_{\rm N}, m_{\varphi}, m_{\omega}, m_{\rho}$,
Yukawa-coupling constants of nucleon with mesons
are by $g_{\varphi}, g_{\omega}, g_{\rho}$ and
self-interactions of $\varphi$ and
$\omega$ mesons are by $g_{2}, g_{3}$ and $c_{3}$.
We take three RMF models of TM1~\cite{bib31}, NL3~\cite{bib32} and MTEC~\cite{bib33}.
The parameter sets of three models
are summarized in TABLE~\ref{tb:table3},
together with the saturation properties
calculated by the models.
Under the mean field approximation,
all the meson fields $\varphi$, $\omega$, $\rho$ are replaced by the mean values
$\langle \varphi \rangle$,
$\langle \omega^{0}\rangle\delta^{\mu 0}$,
$\langle \rho^{0}_{3}\rangle\delta^{\mu 0}\delta_{a 3}$, respectively.
For simplicity, these
mean values are denoted by $\varphi$, $\omega$, $\rho$.
The mean values are determined by the Euler-Lagrange equations,
\begin{align}
& m^2_{\varphi}\varphi+g_{2}\varphi^2+g_{3}\varphi^3=-g_{\varphi}\rho_{\textrm{s}},
\\
& m^2_{\omega}\omega+c_{3}\omega^3=g_{\omega}\rho_{\rm B},
\\
& \rho=\frac{g_{\rho}}{m^2_{\rho}}\rho_{\rm I},
\end{align}
where $\rho_{\textrm{s}}$, $\rho_{\textrm{B}}$, $\rho_{\textrm{I}}$
are scalar, baryon-number and isospin densities.
The thermodynamic potential of the RMF model $\Omega_{\rm RMF}$ (per unit volume) is
then obtained by
\begin{align}
&\Omega_{\rm RMF}=U_{\rm meson}-\frac{2}{\beta}\sum_{i=\textrm{p,n}}
\int \frac{d^3 \mathbf{p}}{(2\pi)^3}
\notag \\
&\times \Bigl[ \log(1+\textrm{e}^{-\beta(E-\tilde{\mu}_{i})})
+\log(1+\textrm{e}^{-\beta(E+\tilde{\mu}_{i})})
\Bigr],
\end{align}
where $E=\sqrt{\mathbf{p}^2+M^2_{\textrm{N}}}$ for the
nucleon effective mass $M_{\textrm{N}}= m_{\textrm{N}}+g_{\varphi}\varphi$, and
\begin{align*}
U_{\rm meson}=&
\frac{1}{2}m^2_{\varphi}\varphi^2+\frac{1}{3}g_{2}\varphi^3+\frac{1}{4}g_{3}\varphi^4 \\
&-\frac{1}{2}m^2_{\omega}\omega^2-\frac{1}{4}c_{3}\omega^4-\frac{1}{2}m^2_{\rho}\rho^2
\end{align*}
is the mesonic potential. The effective chemical potentials
for neutron (n) and proton (p) are defined by
$\tilde{\mu}_{\textrm{n,p}}=\mu_{\textrm{n,p}}-g_{\omega}\omega\pm
g_{\rho}\rho$.
Figure. 1 shows the EoSs of symmetric matter (left panel) and neutron matter
(right panel) calculated by TM1, NL3 and MTEC at $T=0$.
As for densities smaller than the saturation point (open square),
all the EoSs yield an universal line.
On the other hand,
there are remarkable differences among the EoSs
for densities higher than the saturation point.
MTEC EoS is softest, whereas NL3 EoS is stiffest.
TM1 EoS lies halfway between them.
The behavior of EoS in $\rho_{B}\gtrsim \rho_{0}$
largely affects the MR relation of NSs.
Therefore, we can select which EoS model
is preferable for the MR relation,
particularly in $2M_{\rm sun}$ region.
\subsection{TWO PHASE MODEL}
In $\mu_{\rm q}/T=0$, it is established by LQCD simulations
that the hadron-quark deconfinement transition is crossover~\cite{bib39}.
However, the pseudo-critical temperature is well estimated by the TPM~\cite{bib21}.
We thus use the TPM and the Gibbs criterion to determine the
phase boundary of the hadron-quark phase transition
for each set of $T$ and $\mu_{\textrm{B}}$.
Pressures of the EPNJL and the RMF models are obtained by
\begin{align}
& P_{\textrm{EPNJL}}(\mu_{\textrm{B}},T)
= - (\Omega_{\textrm{EPNJL}}(\mu_{\textrm{B}},T) - \Omega_{\textrm{EPNJL}}(0,0)) - B, \\
& P_{\textrm{RMF}}(\mu_{\textrm{B}},T) = - \Omega_{\textrm{RMF}}(\mu_{\textrm{B}},T),
\end{align}
where the bag constant $B$ is introduced
in $P_{\rm EPNJL}$
to describe the difference of vacuum between the hadron and quark phases.
According to the Gibbs criterion,
the quark phase (the hadron phase) takes place
for the condition $P_{\textrm{EPNJL}}>P_{\textrm{RMF}}\ (P_{\textrm{EPNJL}}<P_{\textrm{RMF}})$.
When $B$ is 100 $\textrm{MeV}^4$, our TPM can reproduce the LQCD prediction
of $T_{\textrm{pc}}=171$ MeV of the deconfinement transition at $\mu_{\textrm{q}}/T=0$.
\section{RESULTS}
\label{sec3}
We show our numerical results in this section.
We first determine the value of $G_{\rm v4}(0)$
from LQCD data on the ratio $n_{\rm q}/n_{\rm SB}$
in the $\mu_{\rm q}/T=0$ limit~\cite{bib4,bib11}.
As for the RMF model, it is shown that MTEC and TM1 are proper EoSs,
through the comparison with the NS observations~\cite{bib27,bib28,bib29}.
Next, from the combinations of the two hadron-phase EoSs and
EPNJL type (1)--(3),
we construct TPMa1 - TPMa3, TPMb1 - TPMb3.
In the TPMa3 and TPMb3,
the density-dependent strength $G_{\rm v4}(n_{\rm q})$
of vector-type four-quark interaction is introduced.
We parametrize the density dependence
with a Gaussian form having a single parameter $b$,
shown in Eq. (\ref{eq:density-dependence}).
We determine the lower bound of $b$
assuming that the hadron-quark phase transition takes place
in the core of NS.
By using six models, the MR relation and
the band of the hadron-quark phase transition line
that allows the quark phase to exist in the core of NS are calculated.
\subsection{DETERMINATION OF THE VALUE OF $G_{\rm v4}(0)$}
\begin{figure}[t
\begin{center}
\includegraphics[width=0.45\textwidth]{number_density_mass130.eps}
\end{center}
\caption{
Temperature dependence of $n_{\rm q}/n_{\rm SB}$
in the $\mu_{\rm q}/T=0$ limit.
The temperature is normalized by the $T_{\rm pc}=171$ [MeV].
The data are the LQCD results~\cite{bib4, bib11}.
The lines are the results of calculations for
the case with $\tilde{G}_{\rm v4}(0)$ (solid),
$G_{\rm v4}(0)$ (dashed)
and without vector-type four-quark interaction (dot-dashed).
The dotted line corresponds to
the results with $m_{0} = 5.5$ MeV.
}
\label{Fig2}
\end{figure}
In the $T>T_{\rm pc}$ region,
the chiral condensate $\sigma$ is nearly equal to zero,
that is, the chiral symmetry is restored.
Hence, the scalar-type four-quark interaction becomes negligible
and only the vector-type four-quark interaction contributes to
the ratio $n_{\rm q}/n_{\rm SB}$ that is $\mu_{\rm q}$-even and therefore
finite even in the $\mu_{\rm q}/T=0$ limit.
Thus, we determine the value $G_{\rm v4}(0)$ from LQCD data
on $n_{\rm q}/n_{\rm SB}$ at $T>T_{\rm pc}$.
Figure 2 shows $T$ dependence of $n_{\rm q}/n_{\rm SB}$.
Here, $T$ is normalized by $T_{\rm pc}=171$ MeV.
In EPNJL model calculations, $m_{0}$ is taken to be 130 MeV,
as already mentioned in Sec \ref{sec2}.
If the vector-type four-quark interaction is zero,
the EPNJL model largely overestimates the LQCD data.
Meanwhile, good agreement is seen
for the case of $G_{\rm v4}(0)=0.36G_{\rm s4}$
at high $T$ such as $T=2T_{\rm pc}$.
The comparison between the solid and dashed lines suggests that
the entanglement coupling in $G_{\rm v4}(0)$
is necessary to reproduce the LQCD data.
The result of $m_{0}=5.5$ MeV is also plotted.
Comparing the dotted line with the solid line,
we find that $m_{0}$ dependence is small at high $T$.
This means that the value of $G_{\rm v4}(0)$ can be determined at high $T$
even if $m_{0}$ is heavier than physical value.
\subsection{SELECTION OF RMF MODEL}
\begin{figure}[t
\begin{center}
\includegraphics[width=0.45\textwidth]{mrrelation_Maruyama_TM1_NL3.eps}
\end{center}
\caption{
The MR relation for three RMF EoSs.
The two horizontal boxes are the
$2M_{\rm sun}$ observational data~\cite{bib27,bib28}.
The two areas correspond to the 68\%
and 95\% confidence counters
estimated by Steiner \textit{et.al.}~\cite{bib29}.
}
\label{Fig3}
\end{figure}
Now, we select preferable RMF EoSs from the MR relation.
The MR relation has one-to-one correspondence to the EoS
through the Tolman-Oppenheimer-Volkov (TOV) equation~\cite{bib40}
\begin{align*}
&\frac{dP}{dr}=-G\frac{M\epsilon}{r^2}
\left(1+\frac{P}{\epsilon}\right)
\left(1+\frac{4\pi Pr^3}{M}\right)
\left(1-\frac{2GM}{r}\right)^{-1},
\\
&\frac{dM}{dr}=4\pi r^2\epsilon,
\end{align*}
where $G$ is a gravitational constant
and $\epsilon$ is an energy density.
The NS has a crust region at low densities.
As an EoS of the crust region,
we use that of Miyatsu \textit{et.al.}~\cite{bib41}.
In solving the TOV equation,
the electron and the muon should be taken into account
to satisfy the charge neutral condition.
We treat the electron as a massless free Fermion and
the muon as a massive free Fermion.
If the number densities, $n_{\textrm{e}}$ and $n_{\mu^{-}}$, of
electron and muon are known,
the charge neutral condition is given by
\begin{eqnarray}
n_{\textrm{p}}=n_{\textrm{e}}+n_{\mu^{-}}
\end{eqnarray}
for the proton number density $n_{\rm p}$.
In the inner of NS, the $\beta$-equilibrium condition
is also satisfied:
\begin{align}
\mu_{i}=b_{i}\mu_{\rm B}-q_{i}\mu_{\rm e}
\end{align}
for $i=$ p, n, e, $\mu^{-}$,
where $b_{i}$ ($q_{i}$) is the baryon number
(the electric charge) of particle $i$ and
$\mu_{\textrm{e}}$ is the electron chemical potential.
Solving the TOV equation numerically with the EoS that satisfies
Eqs. (9) and (10), we can get the MR relation.
Figure. 3 illustrates the MR relation calculated by MTEC EoS,
TM1 EoS and NL3 EoS.
The data on MR relation in Fig. 3
are taken from Refs~\cite{bib27, bib28, bib29}.
The maximum mass $M_{\textrm{max}}$ and radius $R_{\rm max}$
is tabulated in TABLE \ref{tb:table4}.
From Fig. 3, one can see that MTEC EoS is most consistent with
all the data, particularly in the $2M_{\rm sun}$ region.
TM1 EoS predicts a bit larger maximum radius,
but it considerably well reproduce the data of MR relation.
In NL3 EoS, the resulting $M_{\rm max}$ and $R_{\rm max}$
are inconsistent with the data of MR relation.
We therefore take MTEC and TM1 EoSs as the hadron-phase EoS
and construct the TPMa1--TPMa3, TPMb1--TPMb3.
\begin{table}[t]
\begin{center}
\caption{The maximum mass ($M_{\rm max}$) and radius ($R_{\rm max}$)
predicted from three RMF models.
The mass is normalized by the mass of sun $M_{\rm sun}$.
}
\begin{tabular}{c|c|c|c}
\hline \hline
& MTEC & TM1 & NL3 \\ \hline
$M_{\textrm{max}}/M_{\rm sun}$ & 2.02 & 2.18 & 2.77 \\
$R_{\textrm{max}}$ (km) & 10.8 & 12.3 & 13.2 \\ \hline \hline
\end{tabular}
\label{tb:table4}
\end{center}
\end{table}
\subsection{TRANSITON LINE OF TPMa1 AND TPMb1}
We first consider the possibility of the hadron-quark phase transition
in the core of NS by using TPMa1 and TPMb1.
If the quark phase appears in the core of NS,
Eqs. (9) and (10) should be also imposed on the quark-phase EoS:
\begin{align*}
& \frac{2}{3}n_{\rm u}-\frac{1}{3}n_{\rm d}=n_{\rm e}+n_{\mu^{-}},
\\
& \mu_{\rm u}=\frac{1}{3}\mu_{\rm B}-\frac{2}{3}\mu_{\rm e},
\\
& \mu_{\rm d}=\frac{1}{3}\mu_{\rm B}+\frac{1}{3}\mu_{\rm e},
\end{align*}
where $n_{\rm u}$ ($n_{\rm d}$) is the u-quark (d-quark) number density.
Which phase is realized is determined from the Gibbs criterion.
\begin{figure}[t
\begin{center}
\includegraphics[width=0.42\textwidth]{mrrelation_Maruyama_TM1_wo_vec.eps}
\includegraphics[width=0.42\textwidth]{phase_diagram_Maruyama_TM1_NJL000.eps}
\end{center}
\caption{The panel (a) shows the
MR relation calculated from the TPMa1 (solid), TPMb1 (dashed),
For comparison, the MR relation calculated from MTEC and TM1 EoSs
are also plotted.
In the panel (b), the hadron-quark phase transition lines
for TPMa1 and TPMb1 are drawn.
}
\label{Fig4a}
\end{figure}
\begin{figure}[t
\begin{center}
\includegraphics[width=0.42\textwidth]{phase_diagram_Maruyama_EPNJL.eps}
\end{center}
\caption{
The hadron-quark phase transition line for TPMa1 and TPMa2.
}
\label{Fig5}
\end{figure}
In Fig. 4, the panel (a) shows the MR relations calculated with TPMa1 and TPMb1.
For comparison, the results calculated from MTEC and TM1 EoSs
are plotted.
In TPMa1, the quark phase appears
at $M=1.97M_{\rm sun}$ before reaching $M_{\rm max}=2.02M_{\rm sun}$
and consistent with the data on MR relation.
Also in TPMb1,
the quark phase emerges
at $M=2.04M_{\rm sun}$ before reaching $M_{\rm max}=2.17M_{\rm sun}$.
The panel (b) of Fig. 4 shows the hadron-quark phase transition line
in the $T$-$\mu_{\rm B}$ plane for TPMa1 and TPMb1.
The critical baryon chemical potential $\mu^{\rm c}_{\rm B}$ of the transition
at $T=0$ is 1750 MeV for TPMa1 and 1560 MeV for TPMb1.
If the $G_{\rm v4}(0)$ is positive,
the quark-matter EoS becomes stiffer and thereby
the predicted values of NS mass and $\mu^{\rm c}_{\rm B}$
are increasing.
Therefore, TPMa1 and TPMb1 yield the lower bound of
$\mu^{\rm c}_{\rm B}$ for each class of TPM
for the quark phase to take place in the core of NS.
\begin{figure*}[t
\begin{center}
\includegraphics[width=0.45\textwidth]{mrrelation_Maruyama_NJL.eps}
\includegraphics[width=0.45\textwidth]{phase_diagram_Maruyama_EPNJL_density.eps}
\end{center}
\caption{
(Left panel) The MR relation calculated from TPMa3.
The results from TPMa1 and MTEC EoS are also plotted.
\\
(Right panel) The band of the hadron-quark phase transition line.
The upper (lower) bound of the band is calculated from
TPMa3 (TPMa1).
This region allows the quark phase appear in the core of NS.
}
\label{Fig6}
\end{figure*}
\begin{figure*}[t
\begin{center}
\includegraphics[width=0.45\textwidth]{mrrelation_TM1_NJL.eps}
\includegraphics[width=0.45\textwidth]{phase_diagram_TM1_EPNJL_density.eps}
\end{center}
\caption{
(Left panel) The MR relation calculated from TPMb3.
The results from TPMb1 and TM1 EoS are also plotted.
\\
(Right panel) The band of the hadron-quark phase transition line.
The upper (lower) bound of the band is calculated from
TPMb3 (TPMb1).
This region allows the quark phase appear in the core of NS.
}
\label{Fig7}
\end{figure*}
\subsection{TRANSITON LINE OF TPMa2 AND TPMb2}
Next, we consider TPMa2 and TPMb2
with $G_{\rm v4}(0)=0.36G_{\rm s4}$.
Figure. 5 illustrates the hadron-quark phase transition line
for TPMa1 and TPMa2.
One can see that the existence of $G_{\rm v4}(0)$
delays the transition toward higher $\mu_{\rm B}$.
The value of $\mu^{\rm c}_{\rm B}$ for TPMa2 is
2600 MeV and the corresponding density is 13$\rho_{0}$.
Such a density does not realize in the core of NS and
hence the quark phase does not appear in the core of NS for
TPMa2.
As for TPMb2, we find that
the hadron-quark phase transition line does not reach the $\mu_{\rm B}$ axis.
The reason is that the self interaction $(\omega^{\mu}\omega_{\mu})^2$
of $\omega$ meson more stabilizes
the hadron phase with respect to increasing $\mu_{\rm B}$,
while the vector-type four-quark interaction suppresses
the appearance of quark phase.
In fact, the quark phase is confirmed
to never appear in the core of NS for TPMb2.
\subsection{DENSITY DEPENDENCE OF $G_{\rm v4}$ AND
TRANSITON LINE OF TPMa3 AND TPMb3
}
Finally, we consider TPMa3 and TPMb3.
In TPMa3 and TPMb3, the quark phase is described by
the EPNJL of type (3), that is,
the strength of vector-type four-quark interaction
depends on the quark number density $n_{\rm q}$
(See Eq. (\ref{eq:density-dependence})).
For TPMa3 (TPMb3), $\rho_{0}=0.153\ (0.145)\ \textrm{fm}^{-3}$ is used.
The form Eq. (\ref{eq:density-dependence}) ensures that
the interaction is invariant under the charge conjugation and
$G_{\rm v4}(n_{\rm q})$ is positive for any $n_{\rm q}$.
When $G_{\rm v4}(n_{\rm q})$ is negative, there is possibility that
vector meson masses calculated with the random-phase-approximation
becomes negative. Consequently, the $G_{\rm v4}(n_{\rm q})$ varies
in a range $0\le G_{\rm v4}(n_{\rm q}) \le G_{\rm v4}(0)=0.36G_{\rm s4}$.
We discuss the lower bound of $b$ by assuming that
the quark phase takes place in the core of NS.
The left panel of Fig. 6 shows the MR relation calculated with TPMa3.
In TPMa3, the quark phase appears at $M_{\rm max}=2.02M_{\rm sun}$
and $n_{\rm q}=7.2\rho_{0}$,
when the value of $G_{\rm v4}(n_{\rm q})$ is equal to $0.12G_{\rm s4}$.
This means that $0.12G_{\rm s4}$ is
the maximum value of $G_{\rm v4}(n_{\rm q})$
for the quark phase to appear in the core of NS.
The corresponding value of $b$ is 0.001.
The right panel of Fig. 6 illustrates the hadron-quark phase transition line.
The lower bound of line is determined by the TPMa1 and
upper bound is the TPMa3 with $b=0.001$.
The values of $\mu^{\rm c}_{\rm B}$ lies in the
$1750 \textrm{MeV} \le \mu^{\rm c}_{\rm B}\le 1910$ MeV.
If the value of $\mu^{\rm c}_{\rm B}$ exists in this region,
the hadron-quark phase transition occurs in the core of NS.
Note that the maximum value $\mu^{\rm c}_{\rm B}=1910$MeV is much smaller than
$\mu^{\rm c}_{\rm B}=2600$MeV in TPMa2 shown in Fig.~\ref{Fig5}.
The left panel of Fig. 7 shows the MR relation calculated with TPMb3.
As for TPMb3, the quark phase appears at $M_{\rm max}=2.17M_{\rm sun}$
and $n_{\rm q}=6\rho_{0}$,
when the value of $G_{\rm v4}(n_{\rm q})$
is equal to $0.18G_{\rm s4}$, which is the maximum value of $G_{\rm v4}(n_{\rm q})$
for the quark phase appear in the core of NS in TPMb3.
The corresponding value of $b$ is 0.001 and
common between TPMa3 and TPMb3.
The right panel of Fig. 7 illustrates the hadron-quark phase transition line.
The lower bound of line is determined by the TPMb1 and
upper bound is the TPMb3 with $b=0.001$.
The values of $\mu^{\rm c}_{\rm B}$ lays in the
$1560 \textrm{MeV} \le \mu^{\rm c}_{\rm B}\le 1860$ MeV.
The lower bound of $\mu_{\rm B}^{\rm c}$ is not same between
TPMa1 and TPMb1, but upper value for TPMa3 and TPMb3 is nearly equal.
\section{SUMMARY}
In this paper, we constructed the TPM in which
the EPNJL model is used in the quark phase and
the RMF model is in the hadron phase.
To make the TPM reasonable,
we took LQCD data and NS observations as reliable constraints.
For the quark-phase model,
we determined the density-independent strength $G_{\rm v4}(0)$ of
vector-type four-quark interaction
from LQCD data on $n_{\rm q}/n_{\rm SB}$
in the $\mu_{\rm q}/T=0$ limit
with small error bars.
The obtained value is $G_{\rm v4}(0)=0.36G_{\rm s4}$ that
is a bit larger than our previous work.
For the hadron phase, we take
three RMF models; NL3, TM1 and MTEC.
We compared calculated MR relations with observed ones.
We found that MTEC is most consistent with the data
and TM1 is the second best, while NL3 is inconsistent.
We then take MTEC and TM1 for the hadron part of TPM and
considered six types of TPMs (TPMa1--a3 and TPMb1--b3)
that are combinations of the two types of hadron-phase EoS
and EPNJL of type (1)--(3).
For TPMa3 and TPMb3,
we introduced
the density-dependent strength $G_{\rm v4}(n_{\rm q})$ of
vector-type four-quark interaction and
assumed that the density-dependence is
described as a Gaussian form having the single parameter $b$.
The MR relation and hadron-quark phase transition line are
calculated for six TPMs.
As a result,
the hadron-quark phase transition occurs in the core of NS
when $1750 \textrm{MeV} \le \mu^{\rm c}_{\rm B} \le 1910$ MeV for
TPMa
and $1560 \textrm{MeV} \le \mu^{\rm c}_{\rm B} \le 1850$ MeV for
TPMb.
For both TPMa and TPMb, the corresponding minimum value of $b$ is
$b=0.001$.
\noindent
\begin{acknowledgements}
We thank G. M. Mathews, T. Kajino, J. Takahashi, and M. Ishii for useful discussions.
J. S., H. K., and M. Y. are supported
by Grant-in-Aid for Scientific Research (No. 27-7804, No. 26400279, and No. 26400278)
from the Japan Society for the Promotion of Science (JSPS).
\end{acknowledgements}
|
\section{Introduction}
Thermodynamics of black holes plays a central role in the attractive modern
method relating classical gravity and high energy physics namely
gauge/gravity duality. The issue was first taken under consideration by
Bekenstein \cite{Bek} and Hawking \cite{Haw} and encountered increasing
interests rapidly. Among different frameworks, the thermodynamics of black
solutions has been studied within, dilaton gravity possesses a significant
predominancy. This preference has at least two reasons. From one side, the
dilaton gravity which is one of the modified gravities, is able to justify
the accelerating expansion of the Universe confirmed from observations \cit
{ExpUni} {while Einstein gravity (General Relativity)}
requires exotic matter violating energy conditions to justify this phase of
universe.} From another side, the dilaton gravity appears in the low energy
limit of string theory \cite{Green} and therefore can provide a good
laboratory for testing this theory in the low energy limit through
gauge/gravity duality. Since string theory proposes higher than four
dimensions \cite{Green}, it is natural to consider higher-dimensional
solutions within the gravity theories come from string theory.
Exact asymptotically flat solutions of Einstein-Maxwell-dilaton gravity have
been constructed in the absence of dilaton potential in \cit
{Gibbons,Gar,Mig,Pol}. However, breaking of spacetime supersymmetry in ten
dimensions may cause one or more Liouville-type potentials in the action of
dilaton gravity. This type of dilaton potential change the asymptotic
behavior of solutions \cite{MW,Cai,yaz2,CHM,Clem}. In general, these
solutions are neither asymptotically flat nor (anti) de Sitter [(A)dS].
Thermodynamics of topological dilaton black holes in Einstein-Maxwell
gravity has been explored in \cite{Shey3}. Asymptotically non-flat and
non-(A)dS linearly charged rotating black branes was taken under
investigation in \cite{rotBB}. Slowly rotating charged black holes have been
studied from thermodynamics point of view as well \cite{Slrot}.
A natural interesting extension of such solutions is to change the
electrodynamics Lagrangian from linear Maxwell to nonlinear ones. Some
efforts have been done to construct exact solution in dilaton gravity with
nonlinear electrodynamics. For example, thermodynamics of static black hole
solutions in the presence of nonlinear power-law Maxwell (PLM) \cite{topPLM
, Born-Infeld (BI) \cite{topBI} and exponential \cite{HendiJHEP,BHExp}
electrodynamics have been investigated. As well, thermodynamic properties of
rotating black brane solutions have been studied in the presence of PLM \cit
{rotPLM}, BI \cite{rotBI} and exponential \cite{rotExp} nonlinear
electrodynamics. Any one of the above mentioned nonlinear electrodynamics
has its own importance and motivations. For instance, the PLM
electrodynamics extends the conformal invariance property of Linear Maxwell
Lagrangian in four dimensions to higher dimensional spacetimes, while BI
\cite{BI} electrodynamics, which comes from open string theory \cite{BI1,BI2
, solves the problem of infinite self-energy of charged point-particle that
appears in linear Maxwell case. The latter problem is also overcome by
logarithmic nonlinear electrodynamics proposed for the first time in \cit
{Soleng}. Although this type of nonlinear electrodynamics has no direct
relation with superstring theory, it can be motivated from different sides.
First, it can be regarded as a toy model showing that certain nonlinear
field theories can produce particle-like solutions that can realize the
limiting curvature hypothesis in cosmological theories \cite{Soleng}.
Second, the behavior of logarithmic electrodynamics and BI electrodynamics
Lagrangians are the same for large values of nonlinear parameter $\beta $.
Third, from gauge/gravity duality point of view, the ratio of holographic
viscosity to entropy density is not affected by nonlinear terms rise from a
nonlinear electrodynamics in contrast with gravitational corrections \cit
{vis}. Fourth, the values of important parameters of a holographic
superconductor system such as critical temperature and order parameter are
firmly sensitive to choice of electrodynamics \cite{ord,ord2}. Other studies
on the nonlinear electrodynamics have been carried out in \cit
{Frad,Cal,Hendi,HendiSlowly,SheyHaj,SheyKaz,Shey1,DHSR}.
The above pointed out motivations are convincingly enough to satisfy one to
seek for the effects of logarithmic electrodynamics on the solutions. Till
now, exact rotating solutions of logarithmic electrodynamics in the context
of dilaton gravity has not been constructed. In this paper, we would like to
construct the rotating dilaton black branes in the presence of logarithmic
nonlinear electrodynamics and investigate their thermodynamics as well as
their thermal stability.
The outline of this paper is as follows. In the next section, we present the
basic field equations. In section \ref{brane}, we construct the rotating
dilaton black branes with a complete set of rotation parameters in all
higher dimensions and investigate their properties. In section \ref{Therm},
we study thermodynamics of the spacetime, by calculating the conserved and
thermodynamic quantities. In section \ref{stab}, we perform a stability
analysis and show that the dilaton creates an unstable phase for the
solutions. The last section is devoted to conclusions and discussions.
\section{Basic Field Equations}
\label{Field} We consider an $n$-dimensional action in which gravity is
coupled to a dilaton and a nonlinear electrodynamic field
\begin{eqnarray}
I &=&-\frac{1}{16\pi }\int_{\mathcal{M}}d^{n}x\sqrt{-g}\left( \mathcal{\ R
\text{ }-\frac{4}{n-2}(\nabla \Phi )^{2}-V(\Phi )+L(F,\Phi )\right) \notag
\\
&&-\frac{1}{8\pi }\int_{\partial \mathcal{M}}d^{n-1}x\sqrt{-h}\Theta (h),
\label{Act}
\end{eqnarray
where the Lagrangian of the logarithmic nonlinear electrodynamics coupled to
the dilaton field (LNd) is chosen in the following form
\begin{equation}
L(F,\Phi )=-8\beta ^{2}e^{4\alpha \Phi /(n-2)}\ln \Bigg(1+\frac{e^{-8\alpha
\Phi /(n-2))}F^{2}}{8\beta ^{2}}\Bigg). \label{LLND}
\end{equation
In action (\ref{Act}), $\mathcal{R}$ is the Ricci scalar curvature, $\Phi $
is the dilaton field, and $V(\Phi )$ is a potential for $\Phi $. The dilaton
parameter $\alpha $ determines the strength of coupling of the scalar and
LNd fields, $F^{2}=F^{\mu \nu }F_{\mu \nu }$, where $F_{\mu \nu }=\partial
_{\mu }A_{\nu }-\partial _{\nu }A_{\mu }$ is the electromagnetic tensor
field,$\ A_{\mu }$ is the vector potential, and $\beta $ is the nonlinear
parameter with dimension of mass. The last term in Eq. (\ref{Act}) is the
Gibbons-Hawking boundary term which is chosen such that the variational
principle is well-defined. The manifold $\mathcal{M}$ has metric $g_{\mu \nu
}$ and covariant derivative $\nabla _{\mu }$. $\Theta $ is the trace of the
extrinsic curvature $\Theta ^{ab}$ of any boundary(ies) $\partial \mathcal{M}
$ of the manifold $\mathcal{M}$, with induced metric(s) $h_{ab}$. In this
paper, we consider the action (\ref{Act}) with a Liouville type potential,
\begin{equation}
V(\Phi )=2\Lambda e^{4\alpha \Phi /(n-2)}, \label{v1}
\end{equation
where $\Lambda $ is a constant which may be referred to as the cosmological
constant, since in the absence of the dilaton field ($\Phi =0$) the action
\ref{Act}) reduces to the action of Einstein gravity in the presence of
nonlinear electrodynamics with cosmological constant. For later convenience,
we redefine it as $\Lambda =-(n-1)(n-2)/2l^{2}$, where $l$ is a constant
with dimension of length. The series expansion of (\ref{LLND}) for large
\beta $, leads to
\begin{equation*}
L_{\mathrm{LNd}}(F,\Phi )=-e^{-4\alpha \Phi /(n-2)}F^{2}+\frac{e^{-12\alpha
\Phi /(n-2)}F^{4}}{16\beta ^{2}}-\frac{e^{-20\alpha \Phi /(n-2)}F^{6}}
192\beta ^{4}}+\mathcal{O}\Bigg (\frac{1}{\beta ^{6}}\Bigg).
\end{equation*
For latter convenience we rewrite
\begin{equation*}
L_{\mathrm{LNd}}(F,\Phi )=-8\beta ^{2}e^{4\alpha \Phi /(n-2)}\mathcal{L}(Y),
\end{equation*
where we have defined
\begin{equation*}
\mathcal{L}(Y)=\ln (1+Y)\mathrm{,}
\end{equation*
\begin{equation*}
Y=\frac{e^{-8\alpha \Phi /(n-2)}F^{2}}{8\beta ^{2}}.
\end{equation*
By varying the action (\ref{Act}) with respect to the gravitational field
g_{\mu \nu }$, the dilaton field $\Phi $ and the gauge field $A_{\mu }$. We
find
\begin{eqnarray}
\mathcal{R}_{\mu \nu } &=&\frac{4}{n-2}\left( \partial _{\mu }\Phi \partial
_{\nu }\Phi +\frac{1}{4}g_{\mu \nu }V(\Phi )\right) +2e^{-4\alpha \Phi
/(n-2)}\partial _{Y}{\mathcal{L}}(Y)F_{\mu \eta }F_{\nu }^{\text{ }\eta }
\notag \label{FE1} \\
&&-\frac{8\beta ^{2}}{n-2}e^{4\alpha \Phi /(n-2)}\left[ 2Y\partial _{Y}
\mathcal{L}}(Y)-{\mathcal{L}}(Y)\right] g_{\mu \nu },
\end{eqnarray
\begin{equation}
\nabla ^{2}\Phi =\frac{n-2}{8}\frac{\partial V}{\partial \Phi }-4\alpha
\beta ^{2}e^{4\alpha \Phi /(n-2)}\left[ 2{\ Y}\partial _{Y}{\mathcal{L}}(Y)
\mathcal{L}(Y)\right] , \label{FE2}
\end{equation
\begin{equation}
\nabla _{\mu }\left( e^{-4\alpha \Phi /(n-2)}\partial _{Y}{\mathcal{L}
(Y)F^{\mu \nu }\right) =0. \label{FE3}
\end{equation
In the limiting case where $\beta \rightarrow \infty $, we have $\mathcal{L
(Y)=Y$. In this case the system of field equations (\ref{FE1})-(\ref{FE3})
restore the well-known equations of EMd gravity \cit
{CHM,Shey3,Cai,yaz2,Clem}, as expected.
\subsection{FINITE ACTION IN CANONICAL AND GRAND-CANONICAL ENSEMBLES \labe
{Finite}}
In general, the total action $I$ given in Eq. (\ref{Act}) is divergent when
evaluated on a solution. One way of dealing with the divergences of the
action is adding some counterterms to the action (\ref{Act}). The
counterterms should contain a part which removes the divergence of the
gravity part of the action and a part for dealing with the divergence of the
matter action. Since the horizon of our solution is flat, the counterterm
which removes the divergence of the gravity part should be proportional to
\sqrt{-h}$. The counterterm for the matter part of the action in the
presence of the dilaton is given by
\begin{equation}
I_{\mathrm{ct}}=-\frac{1}{8\pi }\int_{\partial \mathcal{M}}\ d^{n-1}x \sqrt
-h}\left( \frac{n-2}{l_{ \mathrm{eff}}}\right)+I_{\mathrm{deriv}} ,
\end{equation}
where $l_{\mathrm{eff}}$ is given by (\ref{leff}) and $I_{\mathrm{deriv}}$
is a collection of terms involving derivatives of the boundary fields that
could involve the curvature tensor constructed from the boundary metric.
Since in our case the boundary is flat so $I_{\mathrm{deriv}}$ is zero on
the boundary. The variation of the total action $\left( I_{\mathrm{tot}}\
=I+I_{\mathrm{ct}}\right) $ about the solutions of the equations of motion
is
\begin{equation}
\delta I_{\mathrm{tot}}=\int d^{n-1}x S_{ab }\delta h^{ab }-\frac{1}{16\pi
\int d^{n-1}x\sqrt{-h} e^{-4\alpha \Phi/(n-2)} \partial_{Y}{\mathcal{L}}(Y)
n^{a }F_{ab }\delta A^{b}, \label{Ivar}
\end{equation
where
\begin{equation}
S_{ab }=\frac{\sqrt{-h}}{16\pi }\left\{\Theta _{ab}-\Theta h_{ab}+\frac{n-2}
l_{ \mathrm{eff}}}h_{ab} \right\}.
\end{equation
Equation (\ref{Ivar}) shows that the variation of the total action with
respect to $A^{a }$ will only give the equation of motion of the nonlinear
massless field $A^{a }$ provided the variation is at fixed nonlinear
massless gauge potential on the boundary. Thus, the total action, $I_
\mathrm{tot}}\ =I+I_{\mathrm{ct}}$, given in Eq. (\ref{Ivar}) is appropriate
for the grand-canonical ensemble, where $\delta A^{a }=0$ on the boundary.
But in the canonical ensemble, where the electric charge $\left[-e^{-4\alpha
\Phi/(n-2)} \partial_{Y}{\mathcal{L}}(Y) n^{a }F_{ab }\right]$ is fixed on
the boundary, the appropriate action is
\begin{equation}
I_{\mathrm{tot}}=I+I_{\mathrm{ct}}+\frac{1}{16\pi }\int_{\partial \mathcal{M
`}d^{n-1}x\ \sqrt[\ ]{-h}e^{-4\alpha \Phi/(n-2)} \partial_{Y}{\mathcal{L}
(Y) n^{a }F_{ab }\delta A^{b} . \label{I3term}
\end{equation}
The last term in Eq. (\ref{I3term}) is the generalization of the boundary
term introduced by Hawking for linear electromagnetic field \cite{S. W.
Hawking grand} and the results of \cite{DSV,mhd2} for the nonlinear Lifshitz
black holes to the exponential nonlinear gauge field coupled to the dilaton
field. Thus, both in canonical and grand-canonical ensemble, the variation
of total action about the solutions of the field equations is
\begin{equation}
\delta I_{\mathrm{tot}}=\int d^{n-1}x S_{ab }\delta h^{ab }.
\end{equation
That is, the nonlinear gauge field is absent in the variation of the total
action both in canonical and grand-canonical ensembles.
In order to obtain the conserved charges of the spacetime, we use the
counterterm method \cite{BY,Mal} inspired by (A)dS/CFT correspondence. For
asymptotically AdS solutions this method works very well \cite{Mal}.
However, in our paper we have the scalar dilaton field with a Liouville
potential. It was argued that the presence of Liouville-type dilaton
potential, which is regarded as the generalization of the cosmological
constant, changes the asymptotic behavior of the solutions to be neither
asymptotically flat nor (A)dS. It has been shown that no dilaton dS or AdS
black hole solution exists with the presence of only one Liouville-type
dilaton potential \cite{MW}. But, as in the case of asymptotically AdS
spacetimes, according to the domain-wall/QFT (quantum field theory)
correspondence \cite{Sken}, there may be a suitable counterterm for the
stress-energy tensor which removes the divergences. In this paper, we deal
with the spacetimes with zero curvature boundary [$R_{abcd}(h)=0$], and
therefore the counterterm for the stress-energy tensor should be
proportional to $h^{ab}$. We find the finite stress-energy tensor in $n
-dimensional Einstein-dilaton gravity with Liouville-type in the form \cit
{DHSR}
\begin{equation}
T^{ab}=\frac{1}{8\pi }\left[ \Theta ^{ab}-\Theta h^{ab}+\frac{n-2}{l_
\mathrm{eff}}}h^{ab}\right] , \label{Stres}
\end{equation
where $l_{\mathrm{eff}}$ is given by
\begin{equation}
l_{\mathrm{eff}}^{2}=\frac{(n-2)(\alpha ^{2}-n+1)}{2\Lambda }e^{-4\alpha
\Phi /(n-2)}. \label{leff}
\end{equation}
In the particular case $\alpha =0$, the effective $l_{\mathrm{eff}}^{2}$ of
Eq. (\ref{leff}) reduces to $l^{2}=-(n-1)(n-2)/2\Lambda $ of the AdS
spacetimes. The first two terms in Eq. (\ref{Stres}) is the variation of the
action (\ref{Act}) with respect to $h_{ab}$, and the last term is the
counterterm which removes the divergences. One may note that the counterterm
has the same form as in the case of asymptotically AdS solutions with zero
curvature boundary, where $l$ is replaced by $l_{\mathrm{eff}}$. If we
choose the Killing vector field $\mathcal{\xi }$ on spacelike surface
\mathcal{B}$ in $\partial \mathcal{M}$ with metric $\sigma _{ij}$, then the
quasilocal conserved quantities may be obtained from the following relation
\cite{DHSR}
\begin{equation}
Q(\mathcal{\xi )}=\int_{\mathcal{B}}d^{n-2}x\sqrt{\sigma }T_{ab}n^{a
\mathcal{\ \xi }^{b}, \label{charge}
\end{equation
where $\sigma $ is the determinant of the boundary metric $\sigma _{ij}$ and
$n^{a}$ is the unit normal vector on the boundary $\mathcal{B}$. In our
case, the boundary $\mathcal{B}$ has two Killing vector fields timelike (
\partial /\partial t$) and rotational ($\partial /\partial \varphi $). The
corresponding conserved charges are the quasilocal mass and angular momentum
may be obtained as
\begin{eqnarray}
M &=&\int_{\mathcal{B}}d^{n-2}x \sqrt{\sigma }T_{ab}n^{a}\xi ^{b},
\label{Mastot} \\
J &=&\int_{\mathcal{B}}d^{n-2}x \sqrt{\sigma }T_{ab}n^{a}\varsigma ^{b}.
\label{Angtot}
\end{eqnarray}
\section{Rotating dilaton black branes in higher dimensions}
\label{brane} In this section, we would like to construct the rotating black
brane solutions of the field equations (\ref{FE1})-(\ref{FE3}) with $k$
rotation parameters. The number of independent rotation parameters for an $n
-dimensional localized object is equal to the number of Casimir operators,
which is $[(n-1)/2]\equiv k$, where $[x]$ is the integer part of $x$ \cit
{SDRP}. The metric of $n$-dimensional rotating solution with cylindrical or
toroidal horizons and $k$ rotation parameters can be written as \cit
{Lemos,awad}
\begin{eqnarray}
ds^{2} &=&-f(r)\left( \Xi dt-{{\sum_{i=1}^{k}}}a_{i}d\phi _{i}\right) ^{2}
\frac{r^{2}}{l^{4}}R^{2}(r){{\sum_{i=1}^{k}}}\left( a_{i}dt-\Xi l^{2}d\phi
_{i}\right) ^{2} \notag \\
&&-\frac{r^{2}}{l^{2}}R^{2}(r){\sum_{i<j}^{k}}(a_{i}d\phi _{j}-a_{j}d\phi
_{i})^{2}+\frac{dr^{2}}{f(r)}+\frac{r^{2}}{l^{2}}R^{2}(r)dX^{2}, \notag \\
\Xi ^{2} &=&1+\sum_{i=1}^{k}\frac{a_{i}^{2}}{l^{2}}, \label{Met}
\end{eqnarray}
where $a_{i}$'s are $k$ rotation parameters. There are two unknown functions
$f(r)$ and $R(r)$ in the above metric which should be determined by solving
the field equations. The range of the angular coordinates are $0\leq \phi
_{i}\leq 2\pi $ and $dX^{2}$ is the Euclidean metric on the $(n-k-2)
-dimensional submanifold with volume $\Sigma _{n-k-2}$.
First of all, we integrate the electromagnetic field equation (\ref{FE3}).
The result is
\begin{eqnarray}
F_{{tr}} &=&\frac{2q\Xi e^{4\alpha \Phi /(n-2)}}{(rR(r))^{n-2}}\Bigg(1+\sqrt
1+\frac{q^{2}}{\beta ^{2}(rR(r))^{2n-4}}}\Bigg)^{-1}, \label{FtrE} \\
F_{\phi _{i}r} &=&-\frac{a_{i}}{\Xi }F_{tr}, \label{FprE}
\end{eqnarray
where $q$, is an integration constant related to the electric charge of the
brane. When $\beta \rightarrow \infty $, $F_{tr}$ reduces to the electric
field of $n$-dimensional black brane of Einstein-Maxwell-dilaton gravity
\cite{SDRP}
\begin{equation}
F_{tr}=\frac{q\Xi e^{4\alpha \Phi /(n-2)}}{(rR(r))^{n-2}}+O\left( \frac{1}
\beta ^{2}}\right) . \label{FtrM}
\end{equation
In order to solve the system of equations (\ref{FE1}) and
(\ref{FE2}) for three unknown functions $f(r)$, $R(r)$ and $\Phi
(r)$, we make the ansatz \cite{SDRP}
\begin{equation}
R(r)=e^{2\alpha \Phi /(n-2)}. \label{Rphi}
\end{equation
{In order to justify this choice for the metric function $R(r)$,
let us note that $R(r)$ is indeed added to the metric (\ref{Met})
in order to increase the degrees of freedom for obtaining
solutions in the presence of the dilaton field. Choosing $R(r)$ in
the form of Eq. (\ref{Rphi}), is an ansatz. However, it is chosen
such that in the absence of the dilaton field $\Phi=0$, we have
$R(r)=1$, as expected. With this ansatz, we are able to solve the
field equation, analytically.}
Substituting (\ref{Rphi}), the electromagnetic fields (\ref{FtrE})- (\re
{FprE}) and the metric (\ref{Met}) into the field equations (\ref{FE1}) and
\ref{FE2}), one can obtain the following solutions
\begin{eqnarray}
f(r) &=&\frac{2(\alpha ^{2}+1)^{2}(\Lambda -4\beta ^{2})b^{\gamma }}
(n-2)(\alpha ^{2}-n+1)}r^{2-\gamma }-\frac{m}{r^{n-3-(n-2)\gamma /2}} \notag
\\
&&-\frac{8\beta ^{2}(\alpha ^{2}+1)b^{\gamma }}{(n-2)r^{n-3-(n-2)\gamma /2}
\int r^{n(1-\frac{\gamma }{2})-2}\Bigg\{\sqrt{1+\eta }-\ln \bigg(\frac{\eta
}{2}\bigg)+\ln \Big(-1+\sqrt{1+\eta }\,\Big)\Bigg\}dr, \label{f1}
\end{eqnarray
\begin{equation}
\Phi (r)=\frac{(n-2)\alpha }{2(\alpha ^{2}+1)}\ln \left(
c+\frac{b}{r}\right) , \label{phi}
\end{equation
{where } $c$ and $b${\ are constant of integration. We find
that these solutions will fully satisfy the system of equations
(\ref{FE1}) and (\ref{FE2}) provided we choose $c=0$. Note that
$b$ has the dimension of [Length] to make the argument of
logarithmic function dimensionless}. In the above solutions
$\gamma =2\alpha ^{2}/(1+\alpha ^{2})$, and
\begin{equation}
\eta =\frac{q^{2}b^{(2-n)\gamma }}{\beta ^{2}r^{(n-2)(2-\gamma )}}.
\label{eta}
\end{equation
In the above expression, $m$ appears as an integration constant and is
related to the mass of the black hole. The integration of Eq. (\ref{f1}) can
be performed using the MATHEMATICA software. The resulting solution can be
writte
\begin{eqnarray}
f(r) &=&\frac{2(\Lambda -4\beta ^{2})(\alpha ^{2}+1)^{2}b^{\gamma }}
(n-2)(\alpha ^{2}-n+1)}r^{2-\gamma }-\frac{m}{r^{n-3-(n-2)\gamma /2}} \notag
\\
&&+\frac{8\beta ^{2}(\alpha ^{2}+1)^{2}}{(\alpha ^{2}-n+1)^{2}}b^{\gamma
}r^{2-\gamma }\Bigg\{1-{}_{2}F_{1}\Bigg(\Bigg[\frac{-1}{2}\,,\frac{\alpha
^{2}-n+1}{2n-4}\Bigg]\,,\Bigg[\frac{\alpha ^{2}+n-3}{2n-4}\Bigg]\,,-\eta
\Bigg)\Bigg\} \notag \\
&&+\frac{8\beta ^{2}(\alpha ^{2}+1)^{2}}{(n-2)(\alpha ^{2}-n+1)}\,b^{\gamma
}r^{2-\gamma }\Bigg\{\sqrt{1+\eta }-\ln \left( {\frac{\eta }{2}}\right) +\ln
\Big(-1+\sqrt{1+\eta }\,\Big)\Bigg\}, \label{f2}
\end{eqnarray
where ${}_{2}F_{1}([a,b],[c],z)$ is the hypergeometric function \cit
{Lambert}. It is worth mentioning that the solutions are ill-defined for
\alpha =\sqrt{n-1}$. We expect that for large $\beta $, the function $f(r)$
reduces to the $n$-dimensional charged rotating dilaton black brane
solutions given in Ref. \cite{SDRP}. Indeed, if we expand Eq. (\ref{f2}) for
large $\beta $, we arrive a
\begin{eqnarray}
f(r) &=&\frac{2\Lambda (\alpha ^{2}+1)^{2}}{(n-2)(\alpha ^{2}-n+1)}b^{\gamma
}r^{2-\gamma }-\frac{m}{r^{n-3-(n-2)\gamma /2}} \notag \label{f3} \\
&&+\frac{2q^{2}(\alpha ^{2}+1)^{2}b^{-(n-3)\gamma }}{(n-2)(\alpha
^{2}+n-3)r^{(n-3)(2-\gamma )}}-\frac{q^{4}(\alpha
^{2}+1)^{2}b^{-(2n-5)\gamma }}{4\beta ^{2}(n-2)(\alpha
^{2}+3n-7)r^{(2n-5)(2-\gamma )}}+\mathcal{O}\Bigg(\frac{1}{\beta ^{4}}\Bigg).
\end{eqnarray
Setting $\alpha =\gamma =0$ in (\ref{f3}), we reac
\begin{equation*}
f(r)=\frac{r^{2}}{l^{2}}-\frac{m}{r^{n-3}}+\frac{2q^{2}}{(n-2)(n-3)r^{2n-6}}
\frac{1}{4\beta ^{2}(n-2)(3n-7)}\frac{q^{4}}{r^{4n-10}}+\mathcal{O}\Bigg
\frac{1}{\beta ^{4}}\Bigg).
\end{equation*
The last term in the right hand side of the above expression is the leading
nonlinear correction to the AdS black brane with dilaton field. In the
absence of a nontrivial dilaton ($\alpha =\gamma =0$), the above solutions
reduce to the asymptotically AdS charged rotating black brane solutions of
Einstein gravity in the presence of EN electrodynamics \cite{Hendi}.
Finally, in the limit $\beta ^{2}\rightarrow \infty $ and $\alpha =0=\gamma
, the solution given by Eq. (\ref{f3}) has the form of the asymptotically
AdS black brane solutions \cite{awad,Deh4}. Figs. (\ref{fig1}) and (\re
{fig2}) depict the behavior of $f(r)$ given by Eq. (\ref{f2}) for different
\alpha $'s and $\beta $'s respectively.
\begin{figure}[t]
\epsfxsize=7cm \centerline{\epsffile{fig1.eps}}
\caption{The behavior of $f(r)$ versus $r$ with $l=b=1$, $q=0.5$, $\Xi =1.25
, $n=5$, $\protect\beta =2$ and $m=1.5$.}
\label{fig1}
\end{figure}
\begin{figure}[t]
\epsfxsize=7cm \centerline{\epsffile{fig2.eps}}
\caption{The behavior of $f(r)$ versus $r$ with $l=b=1$, $q=0.8$, $\Xi =1.25
, $n=5$, $\protect\alpha =0.2$ and $m=0.5$.}
\label{fig2}
\end{figure}
\subsection{Asymptotic behavior of the spacetime}
Next, we study the geometry of this spacetime. For this purpose, we first
seek for the curvature singularities in the presence of dilaton and
nonlinear electrodynamic fields. It is a matter of calculation to show that
the Ricci scalar and the Kretschmann invariant behave as
\begin{gather}
\lim_{r\longrightarrow 0^{+}}R=\infty , \label{Rorigin} \\
\lim_{r\longrightarrow 0^{+}}R_{\mu \nu \rho \sigma }R^{\mu \nu \rho \sigma
}=\infty , \label{RRorigin}
\end{gather
which indicate that there is an essential singularity at $r=0$. In order to
study the asymptotic behavior of the solutions, we expand the metric
function $f(r)$ for $r\rightarrow \infty $ limit. We find
\begin{equation}
\lim_{r\longrightarrow \infty }f(r)=\frac{2\Lambda (\alpha ^{2}+1)^{2}}
(n-2)(\alpha ^{2}-n+1)}b^{\gamma }r^{2-\gamma }. \label{fasymp}
\end{equation
Let us note that in the absence of the dilaton field ($\alpha =0=\gamma $),
the metric function becomes
\begin{equation}
\lim_{r\longrightarrow \infty }f(r)=-\frac{2\Lambda r^{2}}{(n-1)(n-2)},
\end{equation
which describes an asymptotically AdS ($\Lambda <0$) or dS ($\Lambda >0$)
spacetimes. However, as one can see from Eq. (\ref{fasymp}), in the presence
of the dilaton field, the asymptotic behavior is neither flat nor (A)dS. For
example, taking $\alpha =\sqrt{2}$, $n=6$ and $b=1$, we have
\begin{equation}
\lim_{r\longrightarrow \infty }f(r)=-\frac{3\Lambda }{2}r^{2/3}.
\label{fasymp3}
\end{equation
Clearly, the metric function (\ref{fasymp3}) is neither flat nor (A)dS. This
is consistent with the argument given in \cite{MW}, which states that no
dilaton dS or AdS black hole solution exists with the presence of only one
or two Liouville-type dilaton potential. It is important to note that this
asymptotic behavior is not due to the nonlinear nature of the electrodynamic
field, since as $r\rightarrow \infty $ the effects of the nonlinearity
disappear. Besides, from the dilaton field (\ref{phi}) we see that as
r\rightarrow \infty $, the dilaton field does not vanishes, while in case of
asymptotic flat or (A)dS we expect to have $\lim_{r\longrightarrow \infty
}\Phi (r)=0.$ Indeed, by solving the field equation (\ref{FE2}) we find
\begin{equation}
\Phi (r)=\frac{(n-2)\alpha }{2(\alpha ^{2}+1)}\ln \left( c+\frac{b}{r
\right) ,
\end{equation
however, the system of equation (\ref{FE1})-(\ref{FE3}) will be fully
satisfied provided we choose $c=0$. From the above arguments we conclude
that the asymptotic behavior of the obtained solutions is neither flat nor
(A)dS.
\section{Thermodynamics of black branes}
\label{Therm} It is easy to show that the metric given by (\ref{Met}) and
\ref{f2}) has both Killing and event horizons \cite{SDRP}. The Killing
horizon is a null surface whose null generators are tangent to a Killing
field. It is easy to see that the Killing vector
\begin{equation}
\chi =\partial _{t}+{{{\sum_{i=1}^{k}}}}\Omega _{i}\partial _{\phi _{i}},
\label{Kil}
\end{equation
is the null generator of the event horizon, where $\Omega _{i}$ is the $i$th
component of angular velocity of the outer horizon which may be obtained by
analytic continuation of the metric. The Hawking temperature and the angular
velocities of the outer event horizon can be obtained as
\begin{eqnarray}
T_{+} &=&\frac{f^{\text{ }^{\prime }}(r_{+})}{4\pi \Xi }=-\frac{\alpha ^{2}+
}{4\pi \Xi }r_{+}^{1-\gamma }\Bigg\{\frac{2(\Lambda -4\beta ^{2})b^{\gamma
}{(n-2)} \notag \label{Tem2} \\
&&+\frac{8\beta ^{2}b^{\gamma }}{n-2}\Bigg[\sqrt{1+\eta _{+}}-\ln \bigg
\frac{\eta _{+}}{2}\bigg)+\ln \Big(-1+\sqrt{1+\eta _{+}}\Big)\Bigg]\Bigg\},
\label{Temp} \\
\Omega _{i} &=&\frac{a_{i}}{\Xi l^{2}}, \label{Om1}
\end{eqnarray
where $\eta _{+}=\eta (r=r_{+})$ and we have used $f(r_{+})=0$ for deleting
m$. For large $\beta $, we can expand $T_{+}$ and arrive at the temperature
of the higher dimensional black branes in EMd gravity \cite{SDRP}
\begin{equation}
T_{+}=-\frac{\Lambda (\alpha ^{2}+1)b^{\gamma }}{2\pi \Xi (n-2)
r_{+}^{1-\gamma }-\frac{q^{2}(\alpha ^{2}+1)b^{-\gamma (n-3)}}{2\pi \Xi (n-2
}r_{+}^{5-2n-3\gamma +n\gamma }+\mathcal{O}\Bigg(\frac{1}{\beta ^{2}}\Bigg).
\label{Texp}
\end{equation}
The mass and angular momentum of the black branes ($\alpha <\sqrt{n-1}$) can
be calculated through the use of Eqs. (\ref{Mastot}) and (\ref{Angtot}).
Denoting the volume of the hypersurface boundary at constant $t$ and $r$ by
V_{n-2}=(2\pi )^{k}\Sigma _{n-k-2}$, the mass and angular momentum per unit
volume $V_{n-2}$ of the black branes can be obtained as
\begin{equation}
{M}=\frac{b^{(n-2)\gamma /2}}{16\pi l^{n-3}}\left\{ \frac{(n-1-\alpha
^{2})\Xi ^{2}+\alpha ^{2}-1}{1+\alpha ^{2}}\right\} m, \label{Mass}
\end{equation
\begin{equation}
J_{i}=\frac{b^{(n-2)\gamma /2}}{16\pi l^{n-3}}\left( \frac{n-1-\alpha ^{2}}
1+\alpha ^{2}}\right) \Xi ma_{i}. \label{Angmom}
\end{equation
{Note that, in order to avoid repeating the factor }$V_{n-2}$
, we calculate, in this paper, the mass }$M$ {and extensive quantities such as angular momentum }
J_{i}$, {entropy }$S$ and charge $Q${\ appearing in first law
of thermodynamics per unit volume. }For the static case where
a_{i}=0$ ($\Xi =1$), the angular momentum per unit volume vanishes, and
therefore $a_{i}$'s are the rotational parameters of the black branes.
Black hole entropy typically satisfies the so called area law of the entropy
\cite{Beck}. This near universal law applies to almost all kinds of black
holes and black branes in Einstein gravity \cite{hunt}. It is easy to show
that the entropy per unit volume $V_{n-2}$ of the black brane can be written
as
\begin{equation}
{S}=\frac{\Xi b^{(n-2)\gamma /2}r_{+}^{(n-2)(1-\gamma /2)}}{4l^{n-3}},
\label{Entropy}
\end{equation
The electric charge per unit volume $V_{n-1}$ can be found by calculating
the flux of the electric field at infinity, yielding
\begin{equation}
{Q}=-\frac{1}{4\pi V_{n-1}}\int_{\Sigma }\nabla _{\mu }\left( \partial _{Y}
\mathcal{L}}(Y)F^{\mu \nu }\right) dS_{\nu }=-\frac{1}{8\pi V_{n-1}
\oint_{\partial \Sigma }\partial _{Y}{\mathcal{L}}(Y)F^{\mu \nu }dS_{\mu \nu
}=\frac{\Xi q}{4\pi l^{n-3}}, \label{Charge}
\end{equation
where the volume is replaced by an arbitrary spacelike hypersurface $\Sigma $
(partial Cauchy surface) with boundary $\partial \Sigma $. In addition, the
volume element on $\Sigma $ is a non-spacelike covector ($1$-form) $dS_{\nu
} $ and $dS_{\mu \nu }$ is the area element of $\partial \Sigma $. We should
note that for linear Maxwell case ($\beta \longrightarrow \infty $), one
obtains $\partial _{Y}{\mathcal{L}}(Y)=-1$.
The electric potential $U$, measured at infinity with respect to the
horizon, is defined by
\begin{equation}
U=A_{\mu }\chi ^{\mu }\left\vert _{r\rightarrow \infty }-A_{\mu }\chi ^{\mu
}\right\vert _{r=r_{+}}, \label{Pot1}
\end{equation
where $\chi $ is the null generator of the horizon given by Eq. (\ref{Kil}).
One can easily show that the vector potential $A_{\mu }$ corresponding to
the electromagnetic tensor (\ref{FtrE}) and (\ref{FprE}) can be written as
\begin{eqnarray}
A_{\mu } &=&\left( \Xi \delta _{\mu }^{t}-a_{i}\delta _{\mu }^{i}\right)
\times \frac{q(\alpha ^{2}+1)b^{(4-n)\gamma /2}}{\alpha ^{2}+n-3
r^{3-n-(4-n)\gamma /2}{} \\
&&\times {}_{3}F_{2}\Bigg(\Bigg[\frac{1}{2}\,,1\,,\frac{3-n-\alpha ^{2}}{4-2
}\Bigg]\,,\Bigg[2\,,\frac{7-3n-\alpha ^{2}}{4-2n}\Bigg]\,,-\eta \Bigg),
\notag
\end{eqnarray
where ${}_{3}F_{2}$ is the hypergeometric function and we have set the
constant of integration equal to zero. Therefore, the electric potential may
be obtained as
\begin{eqnarray}
U &=&\frac{q(\alpha ^{2}+1)b^{(4-n)\gamma /2}}{\Xi (\alpha ^{2}+n-3)
r_{+}^{3-n-(4-n)\gamma /2}{} \\
&&\times {}_{3}F_{2}\Bigg(\Bigg[\frac{1}{2}\,,1\,,\frac{3-n-\alpha ^{2}}{4-2
}\Bigg]\,,\Bigg[2\,,\frac{7-3n-\alpha ^{2}}{4-2n}\Bigg]\,,-\eta _{+}\Bigg).
\notag \label{Pot}
\end{eqnarray
Now, we are in a position to verify the first law of thermodynamics. In
order to do this, we obtain the mass $M$ as a function of extensive
quantities $S$, $\mathbf{J}$ and $Q$. Using the expression for the mass, the
angular momenta, the entropy, and the charge given in Eqs. (\ref{Mass}),
\ref{Angmom}), (\ref{Entropy}), (\ref{Charge}) and the fact that $f(r_{+})=0
, one can obtain a Smarr-type formula as
\begin{equation}
M(S,\mathbf{J},Q)=\frac{\left[ (n-1-\alpha ^{2})Z+\alpha ^{2}-1\right]
\mathbf{J}}{l(n-1-\alpha ^{2})\sqrt{Z(Z-1)}}, \label{Smar}
\end{equation
where $\mathbf{J}=\sqrt{\sum_{i}^{k}{J_{i}}^{2}}$, and $Z=\Xi ^{2}$ is the
positive real root of the following equation
\begin{eqnarray}
&&\mathbf{J}+\frac{\beta ^{2}l^{4-n}(\alpha ^{2}+1)}{2\pi (n-2)(n-1-\alpha
^{2})}b^{\alpha ^{2}}\sqrt{Z(Z-1)}\left( \frac{4Sl^{n-3}}{\sqrt{Z}}\right) ^
\frac{n-1-\alpha ^{2}}{n-2}}\bigg\{(n-1-\alpha ^{2})\bigg [\ln \left( -1
\sqrt{1+\zeta }\right) -\ln \left( \frac{\zeta }{2}\right) +\sqrt{1+\zeta
\bigg] \notag \\
&&+(n-2)\ {}_{2}F_{1}\left( \left[ -\frac{1}{2}\,,\frac{\alpha ^{2}-n+1}{2n-
}\right] \,,\left[ \frac{\alpha ^{2}+n-3}{2n-4}\right] \,,-\zeta \right)
\frac{(n-1)(n-2)}{8l^{2}\beta ^{2}}(\alpha ^{2}-n+1)+\alpha ^{2}-2n+3\bigg\
=0.
\end{eqnarray
where $\zeta =\pi ^{2}Q^{2}/\left( S^{2}\beta ^{2}\right) $. We can regard
the parameters $S$, $\mathbf{J}$, and $Q$ as a complete set of extensive
parameters for the mass $M(S,\mathbf{J},Q)$ and define the intensive
parameters conjugate to $S$, $\mathbf{J}$ and $Q$. This parameters are,
respectively, the temperature, the angular velocities, and the electric
potential, which are defined as
\begin{equation}
T=\left( \frac{\partial M}{\partial S}\right) _{J,Q},\ \ \Omega _{i}=\left(
\frac{\partial M}{\partial J_{i}}\right) _{S,Q},\ \ U=\left( \frac{\partial
}{\partial Q}\right) _{S,\mathbf{J}}. \label{Dsmar}
\end{equation
Numerical calculations show that the intensive quantities calculated by Eq.
\ref{Dsmar}) coincide with Eqs. (\ref{Temp}), (\ref{Om1}) and (\ref{Pot}).
Thus, these thermodynamics quantities satisfy the first law of
thermodynamics
\begin{equation}
dM=TdS+{{{\sum_{i=1}^{k}}}}\Omega _{i}d{J}_{i}+Ud{Q}.
\end{equation}
\section{Thermal Stability of the black branes in canonical and
grand-canonical ensembles}
\label{stab}
\begin{figure}[t]
\epsfxsize=7cm \centerline{\epsffile{fig3.eps}}
\caption{The behavior of $(\partial ^{2}M/\partial S^{2})_{Q,\mathbf{J}}$
versus $\protect\alpha $ with $l=b=1$, $q=0.8$, $\Xi =1.25$, $n=5$ and
\protect\beta =2$.}
\label{fig3}
\end{figure}
\begin{figure}[t]
\epsfxsize=7cm \centerline{\epsffile{fig4.eps}}
\caption{The behavior of $\mathbf{H}_{SQ\mathbf{J}}^{M}$ versus $\protec
\alpha $ with $l=b=1$, $q=0.8$, $\Xi =1.25$, $n=5$ and $\protect\beta =2$.
Note that the curve corresponding to $r_{+}=1$ rescaled by a factor $10^{-1}
.}
\label{fig4}
\end{figure}
\begin{figure}[t]
\epsfxsize=7cm \centerline{\epsffile{fig5.eps}}
\caption{The behavior of $T$ versus $\protect\alpha $ with $l=b=1$, $q=0.8$,
$\Xi =1.25$, $n=5$ and $\protect\beta =2$.}
\label{fig5}
\end{figure}
\begin{figure}[t]
\epsfxsize=7cm \centerline{\epsffile{fig6.eps}}
\caption{The behavior of $(\partial ^{2}M/\partial S^{2})_{Q,\mathbf{J}}$
versus $\protect\alpha $ with $l=b=1$, $r_{+}=1.5$, $\Xi =1.25$, $n=5$ and
\protect\beta =2$.}
\label{fig6}
\end{figure}
\begin{figure}[t]
\epsfxsize=7cm \centerline{\epsffile{fig7.eps}}
\caption{The behavior of $\mathbf{H}_{SQ\mathbf{J}}^{M}$ versus $\protec
\alpha $ with $l=b=1$, $r_{+}=1.5$, $\Xi =1.25$, $n=5$ and $\protect\beta =2
.}
\label{fig7}
\end{figure}
\begin{figure}[t]
\epsfxsize=7cm \centerline{\epsffile{fig8.eps}}
\caption{The behavior of $T$ versus $\protect\alpha $ with $l=b=1$,
r_{+}=1.5$, $\Xi =1.25$, $n=5$ and $\protect\beta =2$.}
\label{fig8}
\end{figure}
\begin{figure}[t]
\epsfxsize=7cm \centerline{\epsffile{fig9.eps}}
\caption{The behaviors of $10^{-1}T$ and $(\partial ^{2}M/\partial S^{2})_{Q
\mathbf{J}}$ versus $r_{+}$ with $l=1$, $b=2$, $\protect\alpha =1.5$, $\Xi
=1.25$, $n=5$, $\protect\beta =5$ and $q=1.1$.}
\label{fig9}
\end{figure}
\begin{figure}[t]
\epsfxsize=7cm \centerline{\epsffile{fig10.eps}}
\caption{The behaviors of $T$ and $(\partial ^{2}M/\partial S^{2})_{Q
\mathbf{J}}$ versus $q$ with $l=b=1$, $\protect\alpha =1.5$, $\Xi =1.25$,
n=5$, $\protect\beta =5$ and $r_{+}=1.5$.}
\label{fig10}
\end{figure}
\begin{figure}[t]
\epsfxsize=7cm \centerline{\epsffile{fig11.eps}}
\caption{The behaviors of $T$ and $10^{-2}(\partial ^{2}M/\partial S^{2})_{Q
\mathbf{J}}$ versus $\protect\beta $ with $l=1$, $b=0.5$, $\protect\alpha =3
, $\Xi =1.25$, $n=6$, $q=10$ and $r_{+}=1$.}
\label{fig11}
\end{figure}
In this section, we intend to investigate thermal stability of our
nonlinearly charged rotating black brane solutions in both canonical and
grand-canonical ensembles. We know that the entropy of a thermally stable
system is at local maximum. The aim of thermal stability analysis is to find
the situations under which the system is stable thermally i.e. its entropy
is a local maximum. Therefore, the stability of charged rotating black brane
is studied in terms of entropy $S(M,Q,\mathbf{J})$. However, the thermal
stability can also be discussed in terms of internal energy. When the
entropy is at local maximum, the internal energy is at local minimum. Hence,
we can equivalently analyse thermal stability in terms of Legendre
transformation of entropy namely internal energy $M(S,Q,\mathbf{J})$. This
analysis is commonly done by studying the determinant of the Hessian matrix
of $M(S,Q,\mathbf{J})$\ with respect to its extensive variables $X_{i}$,
\mathbf{H}_{X_{i}X_{j}}^{M}=\left[ \partial ^{2}M/\partial X_{i}\partial
X_{j}\right] $\ \cite{Cal1,Gub}. The positivity of $\mathbf{H
_{X_{i}X_{j}}^{M}$ shows that the system is thermally stable. The number of
thermodynamic variables depends on the ensemble in which the system is
studied. For instance, in canonical ensemble where the charge and angular
momenta are fixed, the entropy is the only variable and consequently
\mathbf{H}_{X_{i}X_{j}}^{M}$ reduces to $(\partial ^{2}M/\partial S^{2})_{Q
\mathbf{J}}$. Thus, in this ensemble, the positivity of $(\partial
^{2}M/\partial S^{2})_{Q,\mathbf{J}}$ is sufficient to ensure the thermal
stability of course in the ranges the temperature $T$ is positive as well.
In grand-canonical ensemble $Q$\ and $\mathbf{J}$\ are no longer fixed.
Since the presence of charge does not change stable solutions to unstable
ones \cite{Deh4}, we first study thermal stability for uncharged case i.e.
q\rightarrow 0$. In this case
\begin{equation}
\left( \frac{\partial ^{2}M}{\partial S^{2}}\right) _{\mathbf{J}}=\frac
(n-1)\left( {\alpha }^{2}+1\right) \left[ ({\Xi }^{2}-1)(n-2{\alpha }^{2})+
\Xi }^{2}\left( 1-{\alpha }^{2}\right) \right] }{{\pi \Xi }^{2}{l}^{5-n}{b}^
{\left( n-4\right) \gamma /2}}\left[ ({\alpha }^{2}+n-3){\Xi }^{2}+1-{\alpha
}^{2}\right] }{r}_{+}^{{(3-n-{\alpha }^{2})/(\alpha }^{2}+1)}, \label{ddMS}
\end{equation
an
\begin{equation}
\mathbf{H}_{S\mathbf{J}}^{M}=\frac{16\left( 1-\,{\alpha }^{2}\right) {l
^{2(n-4)}{r}_{+}^{2{(2-\,n)/(\alpha }^{2}+1)}}{{b}^{{\left( n-2\right)
\gamma }}{\Xi }^{4}\left[ \left( {\Xi }^{2}-1\right) {\alpha }^{2}+1+\left(
n-3\right) {\Xi }^{2}\right] }. \label{HMQJ}
\end{equation
Since $\Xi ^{2}\geq 1$, both Eq. (\ref{ddMS}) and $\mathbf{H}_{S\mathbf{J
}^{M}$ are positive for $\alpha \leq 1$, therefore the uncharged rotating
solutions are stable in both canonical and grand-canonical ensembles
provided $\alpha \leq 1$. For this case, the temperature is also always
positive as one can see from (\ref{Texp}). As pointed out before, the charge
cannot change thermal stability and therefore we always have thermally
stable rotating black brane solutions for $\alpha \leq 1$. This fact is
illustrated in Figs. (\ref{fig3}) and (\ref{fig4}) for different values of
r_{+}$. The positivity of temperature for them is shown in Fig. (\ref{fig5
). For different $q$'s, Figs. (\ref{fig6}) and (\ref{fig7}) show that charge
does not affect the thermal stability and therefore charged solutions are
still stable for $\alpha \leq 1$. The positivity of $T$ for mentioned
parameters in Figs. (\ref{fig6}) and (\ref{fig7}) is shown in Fig. (\re
{fig8}).
Now, we discuss the stability for nonlinearly charged rotating black brane
solutions for $\alpha >1$. One can see from (\ref{HMQJ}) that $\alpha =1$ is
the root of $\mathbf{H}_{S\mathbf{J}}^{M}$. Numerical investigations show
that $\alpha =1$ is the root of determinant of Hessian matrix in charged
case too. Also, for $\alpha >1$, $\mathbf{H}_{SQ\mathbf{J}}^{M}$ is always
negative as $\mathbf{H}_{S\mathbf{J}}^{M}$ obviously is (see (\ref{HMQJ})).
Therefore, we have unstable solutions for $\alpha >1$ in grand-canonical
ensemble. Figs. (\ref{fig4}) and (\ref{fig7}) illustrate this fact. However,
in canonical ensemble we have both stable and unstable solutions for $\alpha
>1$. Figures (\ref{fig3}) and (\ref{fig6}) show that there is an $\alpha
_{\max }(>1)$ that we have stable solutions for values lower than it (note
that $\alpha <\sqrt{n-1}$; see sentences above (\ref{Mass})). There is also
a $r_{+\max }$ that for $r_{+}>r_{+\max }$ solutions are unstable (see Fig.
\ref{fig9})). The behavior of $(\partial ^{2}M/\partial S^{2})_{Q,\mathbf{J
} $ in terms of $q$ and $\beta $ are depicted in Figs. (\ref{fig10}) and
\ref{fig11}) respectively. These figures show that there are $q_{\min }$ and
$\beta _{\min }$ that for values greater than them black branes are
thermally stable.
\section{Conclusions and discussions}
In this paper, we studied the higher dimensional action in the context of
dilaton gravity and in the presence of the logarithmic nonlinear
electrodynamics. By varying the action, we found the field equations of this
theory. Then, we constructed a new class of charged, rotating black brane
solutions, with $k=[(n-1)/2]$ rotation parameters, in an arbitrary
dimension. We found that the presence of the dilaton field changes the
asymptotic behavior of the obtained solutions to be neither flat nor (A)dS.
We presented the suitable counterterm which remove the divergences of the
action in the presence of the dilaton field. In the absence of a non-trivial
dilaton ($\alpha =\gamma =0$), these solutions reduce to the asymptotically
AdS charged rotating black brane solutions of Einstein theory in the
presence of logarithmic nonlinear electrodynamics \cite{Hendi}. When $\beta
\longrightarrow \infty $, these solutions reduce to the charged rotating
dilaton black brane solutions given in Ref. \cite{SDRP}. We also calculated
the conserved and thermodynamic quantities of the spacetime such as mass,
angular momentum, temperature, entropy and electric potential and checked
that the first law of thermodynamics holds on the black brane horizon.
Then, we explored thermal stability of the nonlinearly charged
rotating black brane solutions in both canonical and
grand-canonical ensembles. We found that in both ensembles the
solutions are thermally stable for $\alpha \leq 1$, while for
$\alpha >1$ the solutions are always thermally unstable in the
grand-canonical ensemble {where }$\alpha $ {is the
dilaton-electromagnetic coupling constant.} In the canonical
ensemble, however, we can have both stable and unstable solutions
for $\alpha >1$. We found that, in this ensemble, there is an
$\alpha _{\max }>1$ for which the
solutions are thermally stable provided $\alpha <\alpha _{\max }$.
The pointed out results implies that the thermal stability is
ensemble-dependent and }$\alpha $ {influences the stability under
thermal perturbations. These results are expectable since
different ensembles allow different sets of quantities to be
variable and a thermally stable system is one which is stable
under varying variable quantities. On the other hand, values of
conserved and thermodynamic quantities depend on values of
parameters such as }$\alpha ${\ and therefore the fact that
dilaton-electromagnetic coupling has direct effect on thermal
stability of the system seems natural}.
It is notable to mention that in this paper, we only constructed the charged
rotating dilaton black branes of nonlinear electrodynamics with flat
horizon. One can try to construct the rotating dilaton black holes of this
theory with curved horizon. One can laso investigate the thermodynamic
geometry of these solutions. The latter issue is now under investigation and
the results will be presented elsewhere.
\textbf{Conflict of Interests}
The author declares no conflict of interests for the present paper.
\acknowledgments{We thank the Research Council of Shiraz
University. This work has been supported financially by Research
Institute for Astronomy \& Astrophysics of Maragha (RIAAM), Iran.}
|
\section{Approach for Empirical Study}
Today, when users post their photos to social media sites, they often mark the photo with text description, short expressions, classify the photos / album with keyword tags, such as ``sydney opera house'' or ``trip to sydney''. We assume such tagging mechanism, together with the data processing performed by the social media platform, helps to quickly locate similar contents for digital photos. The similarity, no matter in color, pattern, theme or a combination of them, should contribute to better compressibility using the aforementioned compression tools. We perform some evaluation work to assess the correlation between tags, similarity and compressibility.
To validate our hypothesis, we design a set of experiments on publicly available data sets to exploit the relationship of image similarity and the compression ratio of associated photo groups. We use an open source application programming interface (API) Flickr4Java ~\cite{flickr4java} to download photos from Flickr. To reduce the number of photos that are not relevant to the tags, we choose ``relevance'' as the sorting method. The results returned by the Flickr platform are sorted by the API in the descent mode by relevance to the tag theme.
\begin{figure}[h!]
\centering
\centerline{\includegraphics[width=0.5\textwidth, height=0.75in]{tag.png}}
\caption{Tag selection for photo groups}
\label{fig:tag}
\end{figure}
We select twelve tags for photo search and create photo groups according to their tags as listed in Fig.~\ref{fig:tag}. We also attempt to use multiple tags. The tags are delimited by a comma. When available, photos in original size are downloaded. If not, large, medium or small images are downloaded. So the size of the images vary, depending on the download authorization levels set by the image owners. We create subgroups consisting of 100, 50 and 20 most relevant photos for each tag/group respectively. And we create a comparison subgroup for SIFT-picked photos from the Top-100 one. The method is explained later in this section.
\begin{figure}[h!]
\centering
\centerline{\includegraphics[width=0.5\textwidth, height=1.5in]{flow.png}}
\caption{Work flow in the experiment: how photo images are processed to assess the compression results}
\label{fig:flow}
\end{figure}
All the photos downloaded from Flickr are in JPEG format. As shown in Fig.~\ref{fig:flow}, first all JPEG images are decompressed into PNM-format raw image files using djpeg ~\cite{djpeg} for all subgroups. Then, we concatenate all raw image files into one single big file. Finally, we apply two compression tools rzip v2.1 ~\cite{kolivas2008long} and 7-Zip v15.14 ~\cite{pavlov20137zip} to perform the compression. The compressed files are in .rzip and .7z formats respectively. By doing so, we are able to check the inter-file compressibility by leveraging the intra-file optimization in the compression tools. We define compression factor (CF) below as the size of the original file $S_{old}$ divided by the size of new (compressed) file $S_{new}$. The higher the CF is, the better compression result is obtained. Since we run this experiment to exploit the potential of compressibility, we do not consider the decompression phase in which photo images are to be restored from the single file. The execution time of concatenation and compression is not examined either.
\begin{displaymath}
CF = \frac{S_{old}}{S_{new}}\qquad
\end{displaymath}
For comparison purpose, we use VLFeat v0.9.20 ~\cite{vedaldi08vlfeat} to extract all SIFT local features from Top-100 image groups. Then, we use code from ~\cite{solem2012programming} to compare the features from any two images and get the number of shared ones. The number of shared features represent the similarity between the two photos. The more features they share, the more similar the two images are. The threshold value for shared features is set to 10 throughout our experiment to eliminate less relevant pairs. Identifying all images that share more than 10 features with each other is a high-dimensional computational problem. To simply the computation, we reduce the problem to finding the cluster with most number of photos. It is a trade-off between the similarity and computation complexity. By doing so, we are able to get a group of photos that are similar more quickly. We visualize the cluster selection process to make it easy to understand. Each image represents a node $n_{i}$ and the group is a set of nodes namely $N = \{n_0,n_1,n_2,n_3,...,n_t\}$ where t = 99. If two images $n_{i}$ and $n_{j}$ share at least ten local features, an edge $e_{ij}$ is established between $n_{i}$ and $n_{j}$. As a result, a diagram like Fig.~\ref{fig:sift} is generated. In Fig.~\ref{fig:sift}, there are four clusters in total. We select the first one as it is the largest cluster with seven members. The other smaller clusters are disregarded. Consequently, the images from the largest cluster are selected as ``SIFT-picked images''. The compression procedure illustrated in Fig.~\ref{fig:flow} is repeated on these images, in additional to Top-100, Top-50 and Top-20 image groups.
\begin{figure}[h!]
\centering
\centerline{\includegraphics[width=0.5\textwidth, height=1.5in]{sift.png}}
\caption{An example of choosing the largest cluster from the SIFT results}
\label{fig:sift}
\end{figure}
\begin{figure}[h!]
\centering
\centerline{\includegraphics[width=0.5\textwidth]{ss1.png}}
\caption{Example thumbnails from Top-100, Top-50, Top-20 and SIFT-picked similar photos subgroups with the same tag}
\label{fig:ss1}
\end{figure}
We created 12 groups of photos, each with top 100 photos for the given tags. Then we also create top 50 and top 20 photo groups for comparison purpose. Fig.~\ref{fig:ss1} shows some thumbnails: (a) from Top-100; (b) from Top-50; (c) from Top-20;(d) from SIFT-picked Top-100 images for the tag ``thebigben''. We denote photo group $g_{i}$ where $i = \{1,2...12\}$. We also create two mixed groups from the 1,200 photos by random selection, named m1 and m2. Two more groups are then create by random download from Flickr, named r1 and r2 respectively.
\section{Background}
To achieve better compressibility, LZMA used in 7z ~\cite{pavlov20137zip} employs larger sliding window. The compression program finds redundant strings within a certain length of window. With a greater window size, the chance of hitting redundant strings are bigger, thus the compression results are better. Similarly, rzip ~\cite{kolivas2008long} looks for identical contents over a longer distance throughout the file. It uses hash values for fixed size chunks for the check and this method allows better intra-file deduplication.
These techniques do not guarantee that good storage efficiency is obtained at system level unless the system can feed the compression tools with the right set of data: in our case, the similar photos. Digital images are expressed in pixel values composing of basic colors such as red, green, blue, often denoted as R,G,B values respectively. In this study, we aim to analyze the storage efficiency for raw images. All images are presented in a set of pixels with R,G,B values. When speaking of ``similarity'' of photos, we may refer to the color, the pattern, the content or even the theme. Things get quite complicated. Some objects that human views as similar are regarded as totally different by computer because their binary values are not equal. For instance, two images with same pattern: one in red and the other in blue. The red one denotes (1, 0, 0) for all pixels while the blue one denotes (0, 0, 1).
We do not focus on pixel level similarity detection as it is finer-grained and too complex. And it may not be viable as a pre-precessing step just to feed the compression tools for its costly computing. Then, we ask ourselves whether there is a good way to identify the basic similarity of the digital photos. Local features have been used to distinct two images. Methods such as SIFT \cite{lowe2004distinctive} have demonstrated invariance to scale or rotation and have been widely used in image processing.
\section{Conclusion and Future Work}
In this paper, we have employed the data sets and tagging system from Flickr for the empirical study. We observed storage efficiency results from two content-based similarity detection approaches for raw digital images. The results showed that with the help of similarity, the compression factor can be improved significantly, by up to 26\%. The insights obtained from the study may help direct the future system design. Our future work includes measuring and optimizing time efficiency of the aforementioned similarity detection approaches. We also expect new storage system design to be developed to pre-process raw images and utilize inter-file content-based similarity, which achieves greater storage efficiency.
\section{Introduction}
With the rapid growth of data volume, the efforts to optimize spatial and temporal efficiency have never stopped. Compression and deduplication are two well-known technologies to save storage space. Studies ~\cite{aronovich2009design, yokoo1997data} find that applying deduplication and compression techniques on similar data helps achieve better results. On the other hand, as more data are stored in a distributed environment because of the scale, the placement of data becomes important. If similar data are placed on the same node, or even a smaller number of nodes, the read performance can be significantly better than a highly fragmented placement. In a backup system, the reduction of fragmentation helps improve the performance of data restore ~\cite{fu2015design}. Therefore, for large-scale storage system, the benefit of using similarity to determine data placement is twofold: first, it helps deduplication or compression save more storage space; second, it enables quick search, sorting and read operations.
In addition, researchers find general compression or deduplication methods may not work well for all workloads and data sets. In the recent years, workload-aware deduplication or compression techniques have been proposed ~\cite{lin2015metadata, dewakar2015storage}. Instead of just checking bit-wise similarity, examining contents to put data into similar groups, can be helpful to improve the storage efficiency more significantly. The program in ~\cite{shi2014photo} has used local features detection to help compress photos albums sharing many similar contents.
One of the most common use cases for cloud storage is to upload and share personal digital photos, via social media or image repository. Photos uploaded by one user, often by albums, are more likely to be similar in contents. Raw images are increasingly popular among professional photographers, photo hobbyists, healthcare IT professionals and scientific researchers. However, more efforts to optimize the storage efficiency for raw images that preserve visual similarity are needed, which may be complementary to JPEG encoding and compression.
To this end, we propose exploiting the detection of content-based similarity for raw images. The similarity should be utilized for better spatial and temporal storage efficiency. We present our observations and insights from two approaches (one based on photo tags, the other on local feature extraction) in exploring the compressibility. We have not intended to create a specific storage system design here. Instead, we would like to share our findings and inspire more work to substantiate the methods and optimize the performance for real-life raw image workloads.
The main contributions of this paper are:
\begin{itemize}
\setlength{\itemsep}{1pt}
\item We set up and perform empirical studies on two content-based similarity detection approaches to compress similar raw images.
\item We analyze the results with statistical views and gain insights for future design.
\item We discuss technical limitations and challenges.
\end{itemize}
\subsection*{Abstract}
To improve the temporal and spatial storage efficiency, researchers have intensively studied various techniques, including compression and deduplication. Through our evaluation, we find that methods such as photo tags or local features help to identify the content-based similarity between raw images. The images can then be compressed more efficiently to get better storage space savings. Furthermore, storing similar raw images together enables rapid data sorting, searching and retrieval if the images are stored in a distributed and large-scale environment by reducing fragmentation. In this paper, we evaluated the compressibility by designing experiments and observing the results. We found that on a statistical basis the higher similarity photos have, the better compression results are. This research helps provide a clue for future large-scale storage system design.
\input{introduction}
\input{background}
\input{approach}
\input{results}
\input{related}
\input{discussion}
{\footnotesize \bibliographystyle{acm}
\section{Related Work}
Recently, to embrace the big data era, research community has shifted the focus from general storage efficiency techniques to application and data-aware specialized methods with some pre-processing capabilities. For example, some exploited the separation of metadata from data in tar files ~\cite{lin2015metadata}. By moving metadata to different locations of the file, the deduplication ratio is improved significantly. Conventional wisdom states that video data is difficult to be deduplicated. In ~\cite{dewakar2015storage}, variations such as captions, resolutions, web optimization are evaluated with different deduplication techniques. The results show that with pre-processing, video files can be effectively deduplicated. In addition, migratory compression ~\cite{lin2014migratory} has been proposed to reorder the binary sections before feeding data to compression tools to achieve better intra-file compressibility with trade-off in performance and restoring efforts. A recent study ~\cite{shi2014photo} has utilized local features rather than individual pixel values to analyze the similarity between photos from the same album, to achieve better compression results.
\section{Evaluation}
All evaluation results are obtained from a workstation equipped with one Intel Core i5 processor with 8GB RAM and 2TB disk space. Our data set includes 1,600 photos with the total size of 817MB acquired using the methods described in Section 3.
\begin{figure*}[t]
\centering
\subfigure[Results with rzip]{
\includegraphics[width=0.9\textwidth, height=0.19\textwidth]{rzip.pdf}
}
\hspace{0.05\textwidth}
\subfigure[Results with 7z]{
\includegraphics[width=0.9\textwidth, height=0.19\textwidth]{7zip.pdf}
}
\caption{Comparison of compression ratio for Flickr tagged Top-100, Top-50, Top-20 and SIFT-picked subgroups. g1 to g12 represent the tagged groups. }
\label{fig:results_1}
\end{figure*}
The CF for all twelve groups are listed in Fig.~\ref{fig:results_1}. First, we examine the results between Top-100 and Top-50 subgroups. Among the twelve groups, four groups (g1, g5, g9 and g10) see higher CF with Top-50 than Top-100. For other groups, the CF results are either very close between the Top-50 and Top-100 or lower CF is obtained on Top-50. Results from two compressors are quite consistent. Then, we look at the results between Top-100 and Top-20 subgroups. This time, more than half of the groups see a significant higher CF with Top-20, about 10\% in average and up to 26\%. Only one group g6 gets a lower CF with Top-20 subgroup. For the rest, almost equal CF results are observed. For both compression tools, SIFT-picked photos yield a higher CF than Top-100, Top-50 and Top-20 for ten groups out of twelve (about an additional 10\% compared to Top-20) and an almost equal CF for the rest two. Overall, the results from two compression tools are quite close. The exception is g8 for which rzip achieves much greater CF with Top-20. With these results, we can see that on a statistical basis, CF with SIFT-picked is better than Top-20, which is better than Top-50, followed by Top-100. The more relevant (similar) the images are, the higher CF is expected.
\begin{figure}[h!]
\centering
\centerline{\includegraphics[width=0.45\textwidth, height=1.3in]{mean.pdf}}
\caption{Mean CF from Top-100, Top-50 and Top-20 subgroups vs. mixed and random data sets using rzip. t100 stands for mean from Top-100; t50 from Top-50 and t20from Top-20. r1, r2 represent the randomly downloaded photo groups; m1, m2 represent two mixed photos from g1 through g12 repository}
\label{fig:mean}
\end{figure}
It is interesting to analyze what factors may impact the correlation of tag and CF. We find where CF improvements are more distinctive, such as g1 (thebigben), g3 (tajmahal), g7 (milfordsound) and g8 (oriental pearl), the relevant objects are symbolic and easy to be identified. Multiple tags do not make significant difference. In contrast, g6 (pizza, pepperoni) does not have a concrete pattern. And moreover, the SIFT-picked image set only includes two images for g6. There are only two images sharing at least ten SIFT local features, reflecting the diversity of the images in g6. g6 is regarded as an anomaly. According to Fig.~\ref{fig:mean} , the mean CF for all Top-100 subgroups (rzip) is 2.76 while the CF of m1 and m2 are slightly lower (2.65 and 2.74). Mixed images from the same pool yield lower CF as the relevance of the group goes down. For random groups, we actually see a different pattern when the group contains fewer photos (20 photos vs. 100 ones). We explain this with compression tool mechanism: when data is randomly organized, the CF is determined by the hit rate of identical contents in the compressor dictionary. The bigger the data pool is , the more likely the new incoming data gets a hit, thus yield a higher CF. Based on the results above, we believe Flickr tags are helping users to get more relevant images.
\begin{figure}[h!]
\centering
\centerline{\includegraphics[width=0.42\textwidth, height=1.3in]{siftres.pdf}}
\caption{The maximum, mean, the 2nd minimum and the minimum of CF, from Top-100, Top-20 and SIFT-picked subgroups using rzip. This is a statistical view of the storage efficiency of these group. }
\label{fig:siftres}
\end{figure}
Fig.~\ref{fig:siftres} shows the maximum, mean and minimum CF across the twelve groups we test with Top-100, Top-20 and SIFT-picked selection. As previously discussed, g6 is a anomaly and all its results represent the minimum of the three selection groups. So we add the 2nd minimum CF data to gain more insights. We find that statistically, the CF from SIFT-picked is 10-15\% better than CF from Top-20, which outperforms CF from Top-100 by around 15\%. By checking thumbnails illustrated in Fig.~\ref{fig:ss1}, we find that both SIFT-picked and Top-20 can help to gather more similar photos than Top-100 does. Extracting SIFT local features from 100 photos takes 15-20 minutes while sorting photos by tag relevance almost takes no computing time on the client side. SIFT approach is more accurate than tags at the cost of extra computation. The huge amount of ``sorting'' work has been accomplished by the users when photo are uploaded, or by the platform back-end program using unknown algorithms. Therefore, tags can be used as an efficient similarity detection, grouping and data placement approach.
In summary, we found correlation between photo tags and compressibility which helps to improve the storage spatial efficiency. A few limitations for tag selection are discovered. When the tags are referring to a specific and distinctive object, the correlation is higher. The mechanism of the tagging algorithm may also affect the correlation levels. It is a matter of how accurate the pre-processing can be. The comparison with SIFT local feature extraction shows that there is enough space for improvements. Ideally, the tag relevance may achieve storage efficiency results close to SIFT approach. More importantly, what we have discussed is complementary to what JPEG has done for digital image compression.
|
\section{
Introduction
}
This paper develops a discussion which first appeared in our earlier paper \cite{Carr:2009jm}.
If primordial black holes (PBHs) of mass $ M_* \approx 5 \times 10^{14}\,\mathrm g $ such that they are evaporating at the present cosmologival epoch are clustered inside the Galactic halo, as expected, then their quantum evaporation should generate a Galactic $ \gamma $-ray background.
Since this would be anisotropic, it should be separable from the \textit{extragalactic} $ \gamma $-ray background, with the ratio of the anisotropic to isotropic intensities depending on the Galactic longitude and latitude.
This places important constraints on the number of PBHs, although their precise form depends upon such parameters as the Galactic core radius and the halo flattening.
Similar considerations apply if the dark matter is in the form of WIMPs, with a Galactic $ \gamma $-ray background being generated by their annihilations and decays \cite{Ackermann:2012rg,*Ackermann:2015zua}.
Many years ago Wright \cite{1996ApJ...459..487W} claimed that a Galactic background had been detected in EGRET observations between $ 30\,\mathrm{MeV} $ and $ 120\,\mathrm{MeV} $ \cite{Sreekumar:1997un} and attributed this to PBHs.
His detailed fit to the data, subtracting various other known components, required the PBH clustering factor to be $ (2\textnormal{--}12) \times 10^5\,h^{-1} $\,, comparable to that expected, and the local PBH explosion rate to be $ \mathcal R = 0.07\textnormal{--}0.42 \,\mathrm{pc}^{-3}\,\mathrm{yr}^{-1} $\,.
Here $ h $ is the Hubble parameter in units of $ 100\,\mathrm{km}\,\mathrm s^{-1}\,\mathrm{Mpc}^{-1} $ and the dependence on this arises because the mass $ M_* $ of the black holes evaporating now ($ t_0 \approx 13.8\,\mathrm{Gyr} $ \cite{Ade:2015xua}) scales as $ t_0^{1/3} \propto h^{-1/3} $\,, corresponding to an individual black hole luminosity $ L \propto M_*^{-2} \propto h^{2/3} $\,.
The contribution to the Galactic intensity is then $ I \propto \rho_\mathrm L\,M_*^{-3} \propto h $\,, where $ \rho_\mathrm L $ is the local PBH density, so the limit on $ \rho_\mathrm L $ and hence the clustering factor scales as $ h^{-1} $\,, while the limit on the local explosion rate, $ \mathcal R \propto \rho_\mathrm L\,t_0^{-1} $\,, is $ h $-independent.
A more recent analysis of EGRET data between $ 70\,\mathrm{MeV} $ and $ 150\,\mathrm{MeV} $\,, assuming a variety of PBH distributions, was given by Lehoucq \textit{et al.} \cite{Lehoucq:2009ge}.
In the isothermal model, which gives the most conservative limit, they found that the observed Galactic $ \gamma $-ray background required $ \mathcal R \leq 0.06 \,\mathrm{pc}^{-3}\,\mathrm{yr}^{-1} $\,.
They claimed that this corresponds to a limit on the cosmological PBH density of $ \Omega_\mathrm{PBH}(M_*) \leq 2.6 \times 10^{-9} $ in units of the critical density.
This implies that the fraction of the Universe's mass undergoing collapse at the PBH formation epoch is $ \beta(M_*) \leq 1.4 \times 10^{-26}\,\gamma^{-1/2} $\,, where $ \gamma $ is the size of the black hole relative to the particle horizon at formation, which is probably close to $ 1 $.
This is five times larger than the extragalactic background constraint derived in Ref.~\cite{Carr:2009jm}.
Lehoucq \textit{et al.} themselves claimed that it corresponds to $ \beta(M_*) < 1.9 \times 10^{-27}\,\gamma^{-1/2} $ but this is because they used a rather inaccurate formula relating $ \Omega_\mathrm{PBH} $ to $ \beta(M_*) $\,.
No dependence upon $ h $ was indicated since the Hubble parameter was assumed to be known ($ H_0=72\,\mathrm{km}\,\mathrm s^{-1}\,\mathrm{Mpc}^{-1} $).
The preferred value of the Hubble parameter is now lower ($ H_0 = 68\,\mathrm{km}\,\mathrm s^{-1}\,\mathrm{Mpc}^{-1} $) \cite{Ade:2015xua}.
In our previous paper \cite{Carr:2009jm}, we reassessed the Lehoucq \textit{et al.} analysis by including a more precise model for the PBH mass spectrum.
By deriving the relationship between the current PBH mass $ m $ and the initial mass $ M $\,, we showed that the dominant contribution to the Galactic background comes not from black holes with the mass $ M_* $ whose lifetime is the current age of the Universe but a somewhat larger mass of $ 1.08\,M_* $\,.
The point is that the Galactic background depends upon the \textit{current} PBH emission, whereas the extragalactic background depends upon the time-integrated emission.
The $ M_* $ black holes themselves no longer exist, so their emission could only be reaching us from the edge of the Universe rather than the edge of the Galaxy.
We also pointed out that the form of the Galactic background depends upon the low-mass tail of the PBH spectrum below $ M_* $\,, this naturally resulting from evaporations at the present epoch.
The implied limits on $ \beta(M) $ were rather different from those found by Lehoucq \textit{et al.}, both in their functional dependence on $ M $ and in their strength.
Several factors require a re-evaluation of our previous analysis.
First, it was based on the EGRET data and we now have more recent data from the Fermi satellite, extending to $ 100\,\mathrm{GeV} $\,.
At such high energies one must also consider the effects on the Galactic background of the secondary emission generated by quark and gluon jet decays above the QCD temperature \cite{MacGibbon:1991tj}.
Second, our own earlier analysis assumed that the initial mass function of the PBHs was \textit{almost} monochromatic.
This is because we were interested in constraints on the PBH abundance as a function of mass.
However, it cannot be \textit{exactly} monochromatic, else there would be no low-mass tail, so this involved a rather complicated calculation of how the bandwidth of the emission associated with the spread of the mass function compares to the bandwidth of the observations.
We cover the monochromatic case in this paper for completeness but stress that the monochromatic assumption is unlikely to apply in any realistic PBH formation scenario.
Even if the density fluctuations producing the PBHs are highly peaked on some scale (e.g.\ the horizon scale at their formation), the resulting PBH mass spectrum may be quite broad.
This applies, in particular, if the PBHs form from critical collapse since the spectrum then extends well below the horizon scale.
This problem was originally analysed by Yokoyama \cite{Yokoyama:1998xd} in the context of the extragalactic background and is here updated and applied to the Galactic background.
Coincidentally, the low-mass tails from evaporations and critical phenomena have similar form.
Even if the mass function were monochromatic, there is no reason why it should correspond to the mass $ M_* $\,.
The plan of the paper is as follows.
In Sec.~\ref{sec:BH} we recall the characteristics of black hole emission, deriving a precise relationship between the initial and current PBH mass, determining the mass at which secondary emission becomes important and comparing the characteristics of the primary and secondary emission.
In Sec.~\ref{sec:mf} we explain why the contribution of PBHs to the Galactic background is very sensitive to the initial mass function around $ M_* $ and we discuss the form of this function for a variety of scenarios, including one in which the PBHs form from primordial density perturbations via critical collapse.
In Sec.~\ref{sec:flux} we calculate the expected Galactic gamma-ray flux for the various scenarios.
In Sec.~\ref{sec:constraint} we infer the associated constraints for these scenarios on the fraction of the Universe going into PBHs over various mass ranges.
In Sec.~\ref{sec:conclusion} we draw some general conclusions and compare our limits with recent ones from the search for PBH bursts \cite{Abdo:2014apa,MacGibbon:2015mya}.
\section{\label{sec:BH}
Black hole gamma-ray emission
}
As first shown by Hawking \cite{Hawking:1974rv,Hawking:1974sw}, a black hole with mass $ M \equiv M_{14} \times 10^{14}\,\mathrm g $ emits thermal radiation with temperature
\begin{equation}
T_\mathrm{BH}
= \frac{1}{M}
\approx
106\,M_{14}^{-1}\,\mathrm{MeV}\,,
\label{eq:temp}
\end{equation}
where throughout this paper we use natural units with $ \hbar = c = k_\mathrm B = 8 \pi G = 1 $ in any formulae but appropriate physical units when giving numerical values.
This assumes that the hole has no charge or angular momentum, which is reasonable since charge and angular momentum will also be lost through quantum emission on a shorter timescale than the mass \cite{Page:1976df,Page:1976ki,Page:1977um}.
The mass loss rate can be expressed as
\begin{equation}
\frac{\mathrm dM_{14}}{\mathrm dt}
= -5.34 \times 10^{-17}\,f(M)\,M_{14}^{-2}\,\mathrm s^{-1}\,,
\label{eq:massloss}
\end{equation}
where $ f(M) $ measures the number of emitted particle species and is normalised to unity for the holes with $ M \gg 10^{17}\,\mathrm g $ which emit only (effectively) massless particles (photons and neutrinos).
The contribution of each relativistic degree of freedom to $ f(M) $ depends on the spin $ s $ \cite{MacGibbon:1991tj}:
\begin{equation}
\begin{aligned}
&
f_{s=0} = 0.267\,,
\quad
f_{s=1} = 0.060\,,
\quad
f_{s=3/2} = 0.020\,,
\quad
f_{s=2} = 0.007\,, \\
&
f_{s=1/2} = 0.147~(\textnormal{neutral})\,,
\quad
f_{s=1/2} = 0.142~(\textnormal{charge}~\pm e)\,.
\end{aligned}
\label{eq:spin}
\end{equation}
The average energies of the emitted particles are $ 4.22\,T_\mathrm{BH} $ for $ s = 1/2 $ neutral, $ 4.18\,T_\mathrm{BH} $ for $ s = 1/2 $ charged, and $ 5.71\,T_\mathrm{BH} $ for $ s = 1 $, respectively.
The peak energies of the flux and power are within $ 7\,\% $ of these values \cite{MacGibbon:1990zk}.
Therefore holes in the mass range $ 10^{15}\,\mathrm g < M < 10^{17}\,\mathrm g $ emit electrons but not muons, while those in the range $ 10^{14}\,\mathrm g < M < 10^{15}\,\mathrm g $ also emit muons, which subsequently decay into electrons and neutrinos.
At this point the value of $ f $ is $ 2 \times 0.06 + 8 \times 0.142 + 6 \times 0.147 = 2.14 $, allowing for all spin states of relevant particles and antiparticles.
A black hole begins to emit pions ($ m_\pi \approx 140\,\mathrm{MeV} $) once $ M $ falls below about $ 5 \times 10^{14}\,\mathrm g $ and then other hadron species as $ M $ continues to fall.
However, hadrons are composite particles made up of quarks held together by gluons, so one would expect only these fundamental particles to be emitted for temperatures exceeding the QCD confinement scale, $ \Lambda_\mathrm{QCD} = 250\textnormal{--}300\,\mathrm{MeV} $\,.
Taking the peak emission energy to be $ 4\,T_\mathrm{BH} $ for quarks ($ s = 1/2 $) and $ 6\,T_\mathrm{BH} $ for gluons ($ s = 1 $) , this corresponds to a mass below
\begin{equation}
M_\mathrm q
= (1.4\textnormal{--}2.5) \times 10^{14}\,\mathrm g
\approx
2 \times 10^{14}\,\mathrm g\,.
\label{eq:Mq}
\end{equation}
Since there are $ 12 $ quark degrees of freedom per flavour and $ 16 $ gluon degrees of freedom, one would expect the emission rate (i.e.\ the value of $ f $) to increase suddenly once the QCD temperature is reached.
If one includes just $ u $\,, $ d $ and $ s $ quarks and gluons, Eq.~\eqref{eq:spin} implies that their contribution to $ f $ is $ 3 \times 12 \times 0.14 + 16 \times 0.06 \approx 6 $, compared to the pre-QCD value of about $ 2 $.
Thus the value of $ f $ roughly quadruples, although there will be a further increase in $ f $ at somewhat higher temperatures due to the emission of the heavier quarks.
After their emission, quarks and gluons fragment into further quarks and gluons until they cluster into the observable hadrons when they have travelled a distance $ \Lambda_\mathrm{QCD}^{-1} \sim 10^{-13}\,\mathrm{cm} $\,.
We describe the products of quark and gluon decays as ``secondary'' emission.
The dependence of $ f(M) $ on $ M $ is indicated in Fig.~\ref{fig:dof}.
One could also add another step at around $ 10^{12}\,\mathrm g $ due to the emission of $ W $ and $ Z $ bosons, the top quark and the Higgs boson, leading to a maximum value $ f \approx 15 $ in the standard model.
However, this last step is smaller (a factor of $ 2 $ instead of $ 4 $) and it is not relevant to later considerations, so we neglect it below.
An equivalent figure has been derived by Ukwatta \textit{et al.} \cite{Ukwatta:2015iba}.
\begin{figure}[htb]
\includegraphics[scale=0.65]{dof.eps}
\caption{\label{fig:dof}
Dependence of $ f(M) $ on $ M $\,.
Dotted red line shows step-function approximation at mass thresholds for quarks (up, down, strange, charm, bottom, top), gluons, $ W $/$ Z $ bosons and the Higgs particle.
Solid red curve shows MacGibbon's approximation formula \cite{MacGibbon:1991tj}, updated to include $ W $/$ Z $ boson, top quark and Higgs.
The most notable feature is the increase by factor $ \alpha = 4 $ at $ 2 \times10^{14}\,\mathrm g $\,.
}
\end{figure}
Integrating the mass loss rate over time \cite{MacGibbon:1991tj} gives a lifetime
\begin{equation}
\tau
\approx
2.7 \times 10^{14}\,f(M)^{-1}\,M_{14}^3\,\mathrm s\,.
\label{eq:tau}
\end{equation}
This can be inverted to give the mass of a PBH evaporating at time $ \tau $ after the big bang.
Since the current age of the Universe is $ 13.8\,\mathrm{Gyr} $ \cite{Ade:2015xua}, the mass of a PBH completing its evaporation at the present epoch is
\begin{equation}
M_*
\approx
5.1 \times 10^{14}\,
\left(\frac{f_*}{1.9}\right)^{1/3}\,\mathrm g\,,
\end{equation}
where $ f_* $ is the value of $ f $ at the temperature $ T_\mathrm{BH}(M_*) \approx 21\,\mathrm{MeV} $ implied by Eq.~\eqref{eq:temp}.
We note that the mass $ M_\mathrm q $ is smaller than this by a factor of $ 0.4 $.
The above analysis is not exact because the value of $ f(M) $ in Eq.~\eqref{eq:tau} should really be the weighted average over the lifetime of the black hole.
Another recent calculation gives $ 5.0 $ rather than $ 5.1 $ \cite{MacGibbon:2007yq}.
We present a more accurate calculation below.
\subsection{
More accurate relationship between $ M_* $ and $ m $
}
We now obtain a more precise expression for $ M_* $ taking hadron emission into account.
The mass-loss rate is
\begin{equation}
\frac{\mathrm dM(t)}{\mathrm dt}
= -\frac{\phi[M(t)]}{3\,M(t)^2}\,,
\end{equation}
where $ \phi(M) $ represents the number of emitted particle degrees of freedom for a PBH with mass $ M $\,.
This is hereafter assumed to have the simplified form
\begin{equation}
\phi(M)
=
\begin{cases}
\phi_*
& (M_\mathrm q \leq M \lesssim M_*) \\
\alpha\,\phi_*
& (M \leq M_\mathrm q)\,,
\end{cases}
\end{equation}
where $ \alpha \approx 4 $ to sufficient precision.
The function $ \phi(M) $ is equivalent to the function $ f(M) $ but the latter is normalized to $ 1 $ at high $ M $\,.
The PBH mass at time $ t $ is then
\begin{equation}
M(t)^3
= M^3 - \int_{t_\mathrm f}^t\!\mathrm dt\,\phi[M(t)]\,,
\end{equation}
where in this section $ M \equiv M(t_\mathrm f) $ is the mass at the formation epoch $ t_\mathrm f $\,.
The time $ \tau_\mathrm q $ at which a PBH with initial mass $ M $ falls to the mass $ M_\mathrm q $ is
\begin{equation}
\tau_\mathrm q(M)
\approx
\frac{M^3 - M_\mathrm q^3}{\phi_*}
\equiv
t_0\,\left(\frac{M^3 - M_\mathrm q^3}{\bar M_*^3}\right)\,,
\end{equation}
where $ t_0 = 13.8\,\mathrm{Gyr} $ and
\begin{equation}
\bar M_*
\equiv
(\phi_*\,t_0)^{1/3}
\approx
5.07 \times 10^{14}\,\mathrm g\,\left(\frac{f_*}{1.9}\right)^{1/3}
\end{equation}
is the mass of a PBH currently evaporating if one neglects secondary emission once $ M(t) $ falls below $ M_\mathrm q $\,.
Note that $ \tau_\mathrm q(M) \leq t_0 $ implies
\begin{equation}
M
\leq
M_\mathrm c
\equiv
\bar M_*\,\left[1 + \left(M_\mathrm q/\bar M_*\right)^3\right]^{1/3}
= (1.01\textnormal{--}1.04)\,\bar M_*
\approx
1.02\,\bar M_*\,,
\label{eq:Mc}
\end{equation}
using the range of $ M_\mathrm q $ given by Eq.~\eqref{eq:Mq} and then some intermediate value at the last step.
So only PBHs slightly larger than $ \bar M_* $ generate secondary emission by the present epoch.
For $ M \geq M_\mathrm c $\,, we have $ \tau_\mathrm q(M) \geq t_0 $ and the current mass $ m \equiv M(t_0) $ is given by
\begin{equation}
m^3
= M^3 - \bar M_*^3
\quad
(M \geq M_\mathrm c)\,.
\end{equation}
For $ M \leq M_\mathrm c $\,, we approximate the mass at $ t \in [\tau_\mathrm q(M),t_0] $ by
\begin{equation}
\begin{aligned}
M(t)^3
&
= M^3
- \left(\int_{t_\mathrm f}^{\tau_\mathrm q(M)} + \int_{\tau_\mathrm q(M)}^t\right)
\mathrm dt\,\phi[M(t)] \\
&
\approx
\alpha\,\left[
M^3
- (1-\alpha^{-1})\,M_\mathrm q^3
- \bar M_*^3\,\frac{t}{t_0}
\right]\,,
\end{aligned}
\end{equation}
so the current mass is given by
\begin{equation}
m^3
= \alpha\,\left[
M^3
- (1-\alpha^{-1})\,M_\mathrm q^3
- \bar M_*^3
\right]
\quad
(M \leq M_\mathrm c)\,.
\end{equation}
PBHs completing their evaporation today have $ m = 0 $ and therefore an initial mass
\begin{equation}
M_*
= \left[\bar M_*^3 + (1-\alpha^{-1})\,M_\mathrm q^3\right]^{1/3}\,.
\end{equation}
Defining $ q \equiv M_\mathrm q/M_* = 0.3\textnormal{--}0.5 \approx 0.4 $, we obtain
\begin{equation}
M_*
= \frac{\bar M_*}{[1 - (1-\alpha^{-1})\,q^3]^{1/3}}
\approx
\left[1 + \frac{1}{3} (1-\alpha^{-1})\,q^3\right]\,\bar M_*
= (1.007\textnormal{--}1.031)\,\bar M_*
\approx
1.017\,\bar M_*
\approx
5.15 \times 10^{14}\,\mathrm{g}\,,
\end{equation}
where the small correction $ 0.017 $ differs from the correction $ 0.020 $ in Eq.~\eqref{eq:Mc} by the factor $ 1 - \alpha^{-1} \approx 3/4 $.
The current mass can then be expressed as
\begin{equation}
m
=
\begin{cases}
\left[M^3 - M_*^3 + (1 - \alpha^{-1})\,q^3\,M_*^3\right]^{1/3}
& (M \geq M_\mathrm c) \\
\alpha^{1/3}\,(M^3 - M_*^3)^{1/3}
& (M_* \leq M \leq M_\mathrm c)\,,
\end{cases}
\label{eq:precisem}
\end{equation}
where
\begin{equation}
M_\mathrm c
= (1+q^3/\alpha)^{1/3}\,M_*
= (1.002\textnormal{--}1.010)\,M_*
\approx
1.005\,M_*
\approx
5.17 \times 10^{14}\,\mathrm g
\end{equation}
is the initial mass corresponding to a current mass $ M_\mathrm q $\,.
This relationship is indicated in Fig.~\ref{fig:m}(a).
The function $ m(M) $ is continuous at $ M_\mathrm c $ but its derivative is discontinuous.
\begin{figure}[htb]
\includegraphics[scale=0.65]{m.eps}
\includegraphics[scale=0.65]{m_approx.eps}
\caption{\label{fig:m}
(a): $ m $ versus $ M $\,.
(b): Comparison of exact $ m(\mu) $ relation (red line) with various approximations.
}
\end{figure}
It is also convenient to write the mass of PBHs somewhat larger than $ M_* $ in the form
\begin{equation}
M
= M_*\,(1+\mu)\,,
\end{equation}
where $ \mu $ is dimensionless and generally small.
One can then write the $ m(M) $ relationship \eqref{eq:precisem} as
\begin{equation}
m
=
\begin{cases}
\left[(\mu+1)^3 -1 + (1-\alpha^{-1})\,q^3\right]^{1/3}\,M_*
& (\mu \geq \mu_\mathrm c) \\
(3\,\alpha\,\mu)^{1/3}\,(1 + \mu + \mu^2/3)^{1/3}\,M_*
& (0 \leq \mu \leq \mu_\mathrm c)\,,
\end{cases}
\label{eq:mmu}
\end{equation}
where
\begin{equation}
\mu_\mathrm c
\approx
q^3/(3\,\alpha)
= 0.005\,(\alpha/4)^{-1}\,(q/0.4)^3
\end{equation}
is the value of $ \mu $ corresponding to $ M_\mathrm c $\,.
The $ m(\mu) $ relationship can be approximated in various regimes by
\begin{equation}
m
=
\begin{cases}
\mu\,M_*
& (\mu \gg 1) \\
(3\,\mu)^{1/3}\,M_*
& (\mu_\mathrm d \leq \mu \ll 1) \\
\left[3\,\mu + q^3(1-\alpha^{-1})\right]^{1/3}\,M_*
& (\mu_\mathrm c \leq \mu \leq \mu_\mathrm d) \\
(3\,\alpha\,\mu)^{1/3}\,M_*
& (0 \leq \mu \leq \mu_\mathrm c)\,,
\end{cases}
\label{eq:mmu_approx}
\end{equation}
where
\begin{equation}
\mu_\mathrm d
\approx
q^3/3
= 0.02\,(q/0.4)^3
\end{equation}
corresponds to the mass above which the second expression applies (i.e.\ it is accurate for $ \mu > \mu_\mathrm d $).
This will be useful when calculating the Galactic gamma-ray background and is accurate to about $ 10\,\% $ over the relevant range of $ \mu $\,.
The validity of these approximations is indicated in Fig.~\ref{fig:m}(b).
\subsection{
Instantaneous primary and secondary emission
}
In calculating the Galactic gamma-ray background, we need the instantaneous emission as a function of the mass $ M $\,.
This evolves from the initial mass $ M_\mathrm i $ to the current mass $ m $\,.
Only black holes with $ M \geq M_* $ are relevant since smaller ones do not contribute.
As we use units with $ 8 \pi G = 1 $, the temperature of a black hole of mass $ M $ is $ T_\mathrm{BH} = 1/M $\,.
The instantaneous emission rate for primary photons of energy $ E $ can be written as
\begin{equation}
\frac{\mathrm d\dot N^\mathrm P}{\mathrm dE}(M,E)
= \frac{1}{2\pi^2}\,\frac{E^2\,\sigma(M,E)}{\mathrm e^{M E}-1}
\propto
\begin{cases}
E^3\,M^3
&(E < M^{-1}) \\
E^2\,M^2\,\mathrm e^{-M E}
& (E > M^{-1})\,,
\end{cases}
\label{eq:rate_pri}
\end{equation}
where $ \sigma(E,M) $ is the absorption cross-section for photons ($ s = 1 $), given by \cite{Page:1976df}
\begin{equation}
\sigma(E,M)
\propto
\begin{cases}
E^2\,M^4 & (E < M^{-1} ) \\
M^2 & (E > M^{-1})\,.
\end{cases}
\label{eq:sigma}
\end{equation}
The form of the spectrum is illustrated by the lower curves in Fig.~\ref{fig:ratios}(a) for various values of $ M $\,.
It peaks at $ \bar E^\mathrm P \approx 5.8\,T_\mathrm{BH} \approx 600\,M_{14}^{-1}\,\mathrm{MeV} $ with a value
\begin{equation}
\frac{\mathrm d\dot N^\mathrm P}{\mathrm dE}(E = \bar E^\mathrm P)
\approx
1.4 \times 10^{18}\,\mathrm s^{-1}\,\mathrm{MeV}^{-1}\,.
\label{eq:ratepeak}
\end{equation}
The average energy of the primary photons is $ \bar E^\mathrm P \approx 5.7\,T_\mathrm{BH} $\,, while that of the primary quarks which generate the secondary photons is $ 4.2\,T_\mathrm{BH} $\,.
Once secondary emission becomes important, as is always the case for $ M_\mathrm i < M_\mathrm q $\,, the analysis of MacGibbon and Webber \cite{MacGibbon:1990zk} shows that the instantaneous emission rate can be expressed as an integral over the jet energy $ Q $:
\begin{equation}
\frac{\mathrm d\dot N^\mathrm S}{\mathrm dE}
= E^{-1}
\int_E^\infty\!
\frac{Q^2\,T_\mathrm{BH}^{-2}\,(1-E/Q)^{2s-1}\,\Theta(E - k\,m_{\pi})}
{\mathrm e^{Q/T_\mathrm{BH}} \pm 1}\,
\mathrm dQ
\propto
\begin{cases}
G(E,M)
& (E < M_\mathrm q^{-1}) \\
E^{-1}\,M^{-1}
& (M^{-1} > E > M_\mathrm q^{-1}) \\
E^2\,M^2\,\mathrm e^{-E M}
& (E > M^{-1})\,,
\end{cases}
\label{eq:rate_sec}
\end{equation}
where the function $ G(E,M) $ reflects the form of the jet fragmentation peak, $ k $ is a constant of $ \mathcal O(1) $\,, $ M_\mathrm q \approx 0.2 \Lambda_\mathrm{QCD} \approx 53\,\mathrm{MeV} $\,, and $ + $ and $ - $ signs apply for quark and gluon jets, respectively.
The form of the spectrum is illustrated by the upper curves in Fig.~\ref{fig:ratios}(a).
This has a rather broad peak at half the pion mass, corresponding to an average photon energy of $ \bar E^\mathrm S \approx m_{\pi^0}/2 \approx 68\,\mathrm{MeV} $\,, and its form reflects the low-energy fragmentation function.
More precisely, the secondary peak flux is
\begin{equation}
\begin{aligned}
\frac{\mathrm d\dot N^\mathrm S}{\mathrm dE}(E = \bar E^\mathrm S)
&
\approx
2 \sum_{i=q,g} \mathcal B_{i\to\pi^0}(\bar E_i)\,\frac{\bar E_i}{m_{\pi^0}}\,
\frac{\mathrm d\dot N^\mathrm P_i}{\mathrm dE_i}(E_i=\bar E_i) \\
&
\approx
8.4 \times 10^{18}\,\mathrm s^{-1}\,\mathrm{MeV}^{-1}\,
\left(\frac{M}{M_*}\right)^{-1}\,
\sum_{i=q,g} \mathcal B_{i\to\pi^0}(\bar E_i)\,,
\end{aligned}
\end{equation}
where $ \bar E_i = 4.2\,T_\mathrm{BH} $ and the last term is $ \mathcal O(1) $\,.
This expression only applies for $ M < M_\mathrm q $ since the secondary emission drops off exponentially for $ M > M_\mathrm q $ because of the Wien factor.
The function $ G(E,M) $ can be empirically represented for the interval $ 10\,\mathrm{MeV} < E < M_\mathrm q^{-1} $ as
\begin{equation}
G(E,M)
\sim
E\,M^{-1}\,M_\mathrm q^2\,\mathrm e^{-\chi M/M_\mathrm q}\,,
\label{eq:frag}
\end{equation}
where $ \chi \approx 6 $.
Figure~\ref{fig:ratios}(a) is compatible with the equivalent figure in Ukwatta \textit{et al.} \cite{Ukwatta:2015iba} but they are interested in the higher energies associated with the final black hole burst.
\begin{figure}[htb]
\includegraphics[scale=0.65]{rate.eps}
\includegraphics[scale=0.65]{ratios_rate.eps}
\caption{\label{fig:ratios}
(a) Instantaneous emission rates for black holes of various temperatures, with primary component at bottom.
The $ 50\,\mathrm{MeV} $ emission rate (solid red) corresponds to $ T_\mathrm{BH} \approx M_\mathrm q^{-1} $\,.
(b) Ratios of secondary to primary peak energies (dashed green) and fluxes (solid red) for the instantaneous emission.
The right figure confirms the secondary peak is proportional to the temperature for $ m < M_\mathrm q $ (as the primary peak is always constant).
In (a) it is noted that the widths of secondary emission are roughly proportional to the temperature.
}
\end{figure}
We will be interested in the ratios of the secondary to primary peak energies and fluxes at the present epoch ($ M = m $).
The energy ratio is
\begin{equation}
\frac{\bar E^\mathrm S}{\bar E^\mathrm P}
\approx
(68\,\mathrm{MeV})/(600\,m_{14}^{-1}\,\mathrm{MeV})
\approx
0.6\,(m/M_*)\,,
\label{eq:energyratio}
\end{equation}
while the flux ratio is
\begin{equation}
\left.\left(\frac{\mathrm d\dot N^\mathrm S}{\mathrm dE}\right)_{\bar E^\mathrm S}\right/
\left(\frac{\mathrm d\dot N^\mathrm P}{\mathrm dE}\right)_{\bar E^\mathrm P}
\approx
1.4\,\left(\frac{m}{M_*}\right)^{-1}\,\mathrm e^{-\chi\,m/M_\mathrm q}\,.
\end{equation}
These ratios are plotted as a function of $ m $ in Fig.~\ref{fig:ratios}(b), along with the exact PBH emission spectra, which are computed numerically.
This shows that the analytic dependence on $ m $ and $ E $ fits the expected form quite well.
\subsection{\label{sec:BH_tail}
Time-integrated primary and secondary emission
}
The time-integrated spectrum has been studied in detail by MacGibbon \cite{MacGibbon:1991tj} and more recently Linton \textit{et al.} \cite{Linton:2006yu} but we now derive the qualitative features using simple analytical arguments.
Throughout this section, $ M $ is the evolving mass and $ M_\mathrm i $ is the initial mass.
There are three different cases, depending on the value of $ M_\mathrm i $\,.
For $ M_\mathrm i > M_\mathrm c $\,, only primary emission is important and we can integrate Eq.~\eqref{eq:rate_pri} over time (i.e.\ $ M $) for fixed $ E $:
\begin{equation}
\frac{\mathrm dN^\mathrm P}{\mathrm dE}
= \int^m_{M_\mathrm i}\!\frac{\mathrm d\dot N^\mathrm P}{\mathrm dE}\,
\frac{\mathrm dt}{\mathrm dM}\,\mathrm dM
\propto
E^2\,
\int_m^{M_\mathrm i}\!\frac{\sigma (E,M)\,M^2}{\mathrm e^{E M}-1}\,
\mathrm dM\,,
\end{equation}
where $ m > M_\mathrm q $\,, we have used the relation $ \mathrm dM/\mathrm dt \propto M^{-2} $ and $ \sigma(E,M) $ is given by Eq.~\eqref{eq:sigma}.
In this case, nearly all the emission occurs at the present epoch, so we neglect redshift effects.
For $ E < M_\mathrm i^{-1} $\,, the mass integral just involves the Rayleigh--Jeans part of the spectrum and is dominated by the upper limit $ M_\mathrm i $\,.
For $ M_\mathrm i^{-1} < E < m^{-1} $\,, the exponential term cuts the integral off above a mass $ M \sim E^{-1} $\,.
For $ E > m^{-1} $\,, the integral is dominated by the lower limit $ m $ and falls off exponentially.
The time-integrated spectrum of photons from a PBH with $ M_\mathrm i > M_\mathrm c $ can therefore be expressed as
\begin{equation}
\frac{\mathrm dN^\mathrm P}{\mathrm dE}
\propto
\begin{cases}
E^3\,M_\mathrm i^6
& (E < M_\mathrm i^{-1}) \\
E^{-3}
& (M_\mathrm i^{-1}< E < m^{-1}) \\
E\,m^4\,\mathrm e^{-E m}
& (E > m^{-1})\,.
\end{cases}
\label{eq:int_pri}
\end{equation}
This peaks at $ E \sim M_\mathrm i^{-1} $ with a value $ \sim M_\mathrm i^3 $ but there is a high-energy tail, falling as $ E^{-3} $ until the cut-off at $ m^{-1} $\,.
For the narrow mass band $ M_* < M_\mathrm i < M_\mathrm c $\,, Eq.~\eqref{eq:int_pri} still gives the primary emission but there is also secondary emission once $ M $ falls below $ M_\mathrm q $ and this gives
\begin{equation}
\frac{\mathrm dN^\mathrm S}{\mathrm dE}
= \int^m_{M_\mathrm q}\!\frac{\mathrm d\dot N^\mathrm S}{\mathrm dE}\,
\frac{\mathrm dt}{\mathrm dM}\,\mathrm dM
\propto
\begin{cases}
E\,M_\mathrm q^4
& (E < M_\mathrm q^{-1}) \\
E^{-3}
& (M_\mathrm q^{-1} < E < m^{-1}) \\
E\,m^4\,\mathrm e^{-E m}
& (E > m^{-1})\,.
\end{cases}
\label{eq:int_sec}
\end{equation}
This has the same form as Eq.~\eqref{eq:int_pri} except in the low-energy regime, where quark fragmentation dominates and we assume $ \chi\,M_\mathrm i \ll M_\mathrm q $ and $ \epsilon \ll 1 $.
The mass integral is determined by the form of the fragmentation function for $ E < M_\mathrm q^{-1} $\,, by the $ M \sim E^{-1} $ contribution for $ M_\mathrm q^{-1} < E < m^{-1} $\,, and by the exponential tail for $ E > m^{-1} $\,.
Since $ m \to 0 $ as $ M_\mathrm i \to M_* $\,, the exponential cut-off disappears in this limit.
For $ M_* > M_\mathrm i > M_\mathrm q $\,, one again has secondary emission once $ M $ falls below $ M_\mathrm q $ but $ m = 0 $ and effectively all the emission occurs at the redshift $ z_\mathrm{evap}(M_\mathrm i) $ of evaporation.
This can be accounted for by replacing $ E $ by the \textit{present} photon energy $ E_0 = E\,(1+z_\mathrm{evap})^{-1} $ but we do not include this dependence explicitly here.
Figure~\ref{fig:ratios_integrated}(a) shows that secondary emission dominates at all energies except around $ E \sim M_\mathrm i^{-1} $\,.
We therefore have
\begin{equation}
\frac{\mathrm dN^\mathrm S}{\mathrm dE}
= \int^0_{M_\mathrm q}\!\frac{\mathrm d\dot N^\mathrm S}{\mathrm dE}\,
\frac{\mathrm dt}{\mathrm dM}\,\mathrm dM
\propto
\begin{cases}
E\,M_\mathrm q^4
& (E < M_\mathrm q^{-1}) \\
E^{-3}
& (E > M_\mathrm q^{-1})\,.
\end{cases}
\end{equation}
For $ E \leq M_\mathrm q^{-1} $\,, the mass integral is dominated by the limit $ M_\mathrm q $\,, while for $ E > M_\mathrm q^{-1} $ it is dominated by $ M \sim E^{-1} $\,.
This is the same as Eq.~\eqref{eq:int_sec} but without the exponential cut-off.
For $ M_\mathrm i < M_\mathrm q $\,, secondary emission always dominates and it is generated at the redshift $ z_\mathrm{evap}(M_\mathrm i) $\,, so we have
\begin{equation}
\frac{\mathrm dN^\mathrm S}{\mathrm dE}
= \int^0_{M_\mathrm i}\!\frac{\mathrm d\dot N^\mathrm S}{\mathrm dE}\,
\frac{\mathrm dt}{\mathrm dM}\,\mathrm dM
\propto
\begin{cases}
E\,M_\mathrm i^2\,M_\mathrm q^2
& (E < M_\mathrm q^{-1}) \\
E^{-1}\,M_\mathrm i^2
& (M_\mathrm q^{-1} < E < M_\mathrm i^{-1}) \\
E^{-3}
& (E > M_\mathrm i^{-1})\,.
\end{cases}
\label{eq:int_sec2}
\end{equation}
The first expression reflects the form of the low-energy fragmentation function and applies for $ \chi\,M_\mathrm i \ll M_\mathrm q $ and $ \epsilon \ll 1 $.
For $ E < M_\mathrm i^{-1} $\,, the mass integral is dominated by the limit $ M_\mathrm i $\,, while for $ E > M_\mathrm i^{-1} $ it is dominated by the mass $ M \sim E^{-1} $\,.
One again has a high-energy $ E^{-3} $ tail but there is no exponential cut-off because $ m = 0 $.
\begin{figure}[htb]
\includegraphics[scale=0.65]{spectrum.eps}
\includegraphics[scale=0.65]{ratios_spectrum.eps}
\caption{\label{fig:ratios_integrated}
(a) Time-integrated spectra for different values of $ M_\mathrm i $\,.
(b) Ratios of secondary to primary peak energies (solid red) and fluxes (dashed green) for the time-integrated emission as a function of $ M_\mathrm i $\,.
}
\end{figure}
The forms of Eqs.~\eqref{eq:int_pri} to \eqref{eq:int_sec2} are shown in Fig.~\ref{fig:ratios_integrated}(a).
The ratio of the secondary and primary time-integrated peak energies is still given roughly by Eq.~\eqref{eq:energyratio}, as illustrated in Fig.~\ref{fig:ratios_integrated}(b).
For many effects, one is interested in the time-integrated fraction of a black hole's initial mass going into secondaries.
For $ M_\mathrm i < M_* $\,, the fraction is
\begin{equation}
f_\mathrm S
\approx
\begin{cases}
1 - (M_\mathrm i/M_\mathrm q)^5
& (M_\mathrm i < M_\mathrm q) \\
M_\mathrm q/M_\mathrm i
& (M_\mathrm q < M_\mathrm i< M_*)\,,
\end{cases}
\end{equation}
where the first expression accounts for the fact that even PBHs with $ M_\mathrm i < M_\mathrm q $ have some primary emission because of the Rayleigh--Jeans part of the emission.
The fraction falls off sharply above $ M_* $ because $ m $ falls below $ M_\mathrm q $ only when $ \mu $ is less than the tiny value $ \mu_\mathrm c \approx 0.005 $.
Since the mass radiated into secondary particles by the present epoch is $ M_\mathrm q - m $\,, the fraction of the initial mass going into secondaries over the narrow range between $ M_* $ and $ M_\mathrm c $ is
\begin{equation}
f_\mathrm S
\approx
0.4\,(1-M_\mathrm i/M_\mathrm c)
\quad
(M_* < M_\mathrm i < M_\mathrm c\,, 0 < \mu < 0.005)
\label{eq:f_S}
\end{equation}
and this goes to zero at $ M_\mathrm i = M_\mathrm c $\,.
However, even for PBHs with $ M_\mathrm i > M_\mathrm c $\,, there will still be some secondary emission, albeit exponentially reduced by the Wien factor.
We therefore write the secondary fraction as
\begin{equation}
f_\mathrm S
\approx
0.4\,\exp(-\chi\,M_\mathrm i/M_\mathrm c)
\quad
(M_\mathrm i > M_\mathrm c\,, \mu > 0.005)
\end{equation}
for some constant $ \chi $\,.
This formula extends the linear expression \eqref{eq:f_S} beyond $ M_\mathrm c $ for $ m \ll M_\mathrm q $\,.
\section{\label{sec:mf}
PBH mass function
}
In determining the Galactic $ \gamma $-ray background, one is mainly interested in the effects of PBHs with initial mass around $ M_* $\,.
Smaller ones have already evaporated and much larger ones are too cool to contribute appreciably.
In fact, we will find that the dominant contribution comes from PBHs with initial mass slightly larger than $ M_* $\,, since these are the ones which have not quite completed their evaporation.
As discussed in Sec.~\ref{sec:mf_tail}, these generate a current mass function with a low-mass tail below $ M_* $\,, whose form can be predicted very precisely.
While the extragalactic background is dominated by the time-integrated emission of PBHs with $ M \approx M_* $\,, the Galactic background is dominated by the instantaneous emission from this low-mass tail.
In our previous paper \cite{Carr:2009jm} we assumed that the PBHs have an effectively monochromatic mass function at formation.
This assumption was useful in discussing cosmological constraints on the fraction of the Universe $ \beta(M) $ going into PBHs with a specific mass.
However, the low-mass tail would not exist if the initial mass function were \textit{precisely} monochromatic at $ M_* $\,, so one needs at least some spread of mass.
One might naturally expect a spread $ \Delta M $ comparable to $ M_* $ but even a tiny spread (with $ \Delta M \ll M_* $) would suffice to generate an extended low-mass tail of PBHs at the current epoch.
We discuss these nearly-monochromatic scenarios in Sec.~\ref{sec:mf_mono}.
We also consider a variant of these scenarios in which the mass spectrum is narrow but not centred at exactly $ M_* $\,.
Of course, \textit{a priori} a narrow mass function is unlikely to contain or be close to the mass $ M_* $ but it is still interesting to calculate the associated Galactic background.
In practice, a nearly-monochromatic mass function at \textit{any} $ M $ may be implausible for realistic formation processes.
Even if the density fluctuations producing the PBHs peak on some scale, the resulting PBH mass spectrum may still be quite broad.
In some scenarios (such as PBH formation from cosmic strings) the spectrum may cover a wide range of masses and have no peak at all.
These considerations motivate us to consider in Sec.~\ref{sec:mf_ext} scenarios in which the mass function is extended.
A particular realization of this scenario, discussed in Sec.~\ref{sec:mf_cc}, arises if the PBHs form from primordial density perturbations as a result of critical collapse.
In this case, the mass function extends well below the peak and can be predicted rather precisely.
Coincidentally, its form is close to that of the low-mass tail.
\subsection{\label{sec:mf_tail}
Low mass tail
}
We first discuss the low-mass tail effect and its connection with the high-energy tail described in Sec.~\ref{sec:BH_tail}.
For simplicity, we take the \textit{formation} mass function to have the power-law form
\begin{equation}
\frac{\mathrm dn}{\mathrm dM}
= \left(\frac{\mathrm dn}{\mathrm dM}\right)_*\,
\left(\frac{M}{M_*}\right)^\nu
\label{eq:mf_pl}
\end{equation}
in some mass range containing $ M_* $\,, where the exponent $ \nu $ is arbitrary.
The expression~\eqref{eq:massloss} for the evaporation rate then implies that the \textit{current} mass function is
\begin{equation}
\frac{\mathrm dn}{\mathrm dm}
= \left(\frac{m}{M_*}\right)^2\,
\left[\frac{1}{1+\mu(m)}\right]^2\,
\left(\frac{\mathrm dn}{\mathrm dM}\right)
\approx
\left(\frac{m}{M_*}\right)^2\,
\left(\frac{\mathrm dn}{\mathrm dM}\right)_*
\quad
(M_\mathrm q \leq m \ll M_*)\,,
\label{eq:currmf_pl}
\end{equation}
both mass functions being comoving.
The first expression is exact, with $ \mu(m) $ being implicitly determined by Eq.~\eqref{eq:mmu}, while the second expression applies for $ \mu \ll 1 $.
In the latter case, $ m \approx (3 \mu)^{1/3}\,M_* $ for $ \mu > \mu_\mathrm d \approx 0.02 $ from Eq.~\eqref{eq:mmu_approx} and the integrated number density of holes with mass below $ m $ can be approximated by
\begin{equation}
n(m)
\approx
\frac{1}{3}\,\left(\frac{m}{M_*}\right)^3\,n_*
\quad
(M_\mathrm q \leq m \ll M_*)\,,
\label{eq:n_curr}
\end{equation}
where $ n_* \equiv M_*\,(\mathrm dn/\mathrm dM)_* $ is the original comoving number density of PBHs with mass around $ M_* $\,.
For $ m \leq M_\mathrm q $\,, an extra factor $ \alpha^{-1} \approx 1/4 $ appears on the right-hand-side of Eq.~\eqref{eq:currmf_pl} and $ m \approx (3 \alpha \mu)^{1/3}\,M_* $\,.
Therefore we can approximate the current mass function by
\begin{equation}
\frac{\mathrm dn}{\mathrm dm}
= \left[
\frac{1}{\alpha}\,
\left(\frac{m}{M_*}\right)^2\,
\left(\frac{\mathrm dn}{\mathrm dM}\right)_*\,,
\left(\frac{m}{M_*}\right)^2\,
\left(\frac{\mathrm dn}{\mathrm dM}\right)_*\,,
\left(\frac{\mathrm dn}{\mathrm dM}\right)
\right]
\quad\textnormal{for}\quad
[m < M_\mathrm q\,, M_\mathrm q < m < M_*\,, m > M_*]\,.
\end{equation}
This is the same as the formation mass function well above $ M_* $ (i.e.\ $ \mathrm dn/\mathrm dm \approx \mathrm dn/\mathrm dM $ for $ \mu \gg 1 $), reflecting the fact that $ m \approx M $ in this regime.
More precisely, Eq.~\eqref{eq:mmu} implies
\begin{equation}
m/M
\approx
[1-0.95\,(1+\mu)^{-3}]^{1/3}
\quad
(\mu > \mu_\mathrm c)\,,
\end{equation}
where the factor $ 0.95 $ corresponds to $ 1-(1-\alpha^{-1})\,q^3 $\,.
For example, the ratio is $ 0.95 $ for $ \mu = 2 $ and $ 0.99 $ for $ \mu = 3 $.
For $ m \ll M_* $\,, we have $ \mathrm dn/\mathrm dm \propto m^2 $ and we describe this as the ``low mass tail''.
For intermediate values of $ m $ ($ \mu \sim 1 $), Eqs.~\eqref{eq:mmu} and \eqref{eq:currmf_pl} imply that the local slope of the mass function is given by
\begin{equation}
\frac {\mathrm dn}{\mathrm dm}
\propto
m^\beta\,,
\quad
\beta
= 2-(2-\nu)\,\frac{\ln[(m/M_*)^3 + 0.95]}{3\,\ln(m/M_*)}
\approx
\begin{cases}
2
& (m \ll M_*) \\
\nu
& (m \gg M_*)\,.
\end{cases}
\label{eq:slope_mf}
\end{equation}
We stress that the low mass tail is only present if the formation mass function contains or gets sufficiently close to $ M_* $\,.
One has three possible situations: (1) an extended mass function which reaches $ M_* $ from below and extends slightly above it; (2) an extended mass function which nearly reaches $ M_* $ from above but not quite; (3) an extended mass function which contains $ M_* $ and goes well below and well above it.
The first two cases correspond to a fine-tuning of the upper or lower cut-off and the degree of fine-tuning determines how much of the tail is present.
For example, if the initial mass function extends from below $ M_* $ to $ (1+\mu)\,M_* $ with $ \mu \ll 1 $, then the bottom of the tail appears between $ 0 $ and $ (3\mu)^{1/3}\,M_* $; the whole tail up to $ M_* $ appears for $ \mu \sim 1 $.
On the other hand, if the initial mass function extends down to $ (1+\mu)\,M_* $\,, then only the top of the tail above $ (3\mu)^{1/3}\,M_* $ appears and there will be very little tail if $ \mu \sim 1 $.
Such fine-tuning would not be expected \textit{a priori} but we discuss this for completeness.
These two situations are represented in Figs.~\ref{fig:mf}(a) and (b) for a spectrum with $ \nu = -5/2 $.
If the initial mass function extends well below and well above $ M_* $\,, as in the more likely case (3), then the entire tail is present.
\begin{figure}[htb]
\includegraphics[scale=0.65]{mf_pl1.eps}
\includegraphics[scale=0.65]{mf_pl2.eps}
\caption{\label{fig:mf}
This shows the relationship between the PBH mass functions at formation (dotted) and currently (solid) for extended mass functions with a fine-tuned upper (a) or lower (b) cut-off.
}
\end{figure}
Since the photon production rate of an individual hole is $ \dot N \propto m^{-1} $\,, the instantaneous flux from the tail population is $ I \propto n(m)\,m^{-1} \propto m^2\,\propto E^{-2} $\,, where we have used Eq.~\eqref{eq:n_curr}.
This relates to the high energy $ E^{-3} $ tail of the time-integrated emission from PBHs with $ M \leq M_* $\,, given by Eqs.~\eqref{eq:int_pri} to \eqref{eq:int_sec2}.
However, the connection between the low mass tail and high energy tail requires some clarification.
All PBHs generate an $ E^{-3} $ energy tail \textit{eventually} but only those with $ M \approx M_* $ produce one at the present epoch and those with mass only slightly above $ M_* $ do not produce the \textit{entire} energy tail because they have still not completed their evaporation (i.e.\ the highest energy part is missing).
But it is precisely these unevaporated remnants which provide the low-mass tail, so the energy and mass tails are complementary.
\subsection{\label{sec:mf_mono}
Nearly monochromatic initial mass function
}
One may model a nearly monochromatic initial mass function using a top-hat distribution
\begin{equation}
\frac{\mathrm dn}{\mathrm dM}
=
\begin{cases}
\frac{n}{\Delta M_\mathrm f}
& ((1-\Delta)M_\mathrm f < M < M_\mathrm f) \\
0
& (M < (1-\Delta)\,M_\mathrm f\,, M_\mathrm f < M)
\end{cases}
\label{eq:mf_tophat}
\end{equation}
with fractional width $ 0 < \Delta < 1 $.
Here $ n $ is the total comoving number density.
If the PBHs form in a radiation-dominated era, this is related to $ \beta $\,, the fraction of the Universe collapsing at their formation epoch, by
\begin{equation}
\frac{n\,M_\mathrm f}{\rho_\mathrm{CMB}}
= \beta(M_\mathrm f)\,(1+z_\mathrm f)
\propto
\beta(M_\mathrm f)\,M_\mathrm f^{-1/2}
\quad\Rightarrow\quad
n
\approx
96.5\,\mathrm{pc}^{-3}\,
\left(\frac{\beta(M_\mathrm f)}{10^{-27}}\right)\,
\left(\frac{M_\mathrm f}{M_*}\right)^{-3/2}\,.
\label{eq:nbeta}
\end{equation}
For $ M_\mathrm q < m < \mathcal O(10)\,M_* $ (i.e.\ $ M_\mathrm c < M < \mathcal O(10)\,M_* $), the number of emission degrees of freedom is approximately $ \phi_* $ all the way until $ t_0 $\,, so Eqs.~\eqref{eq:currmf_pl} and \eqref{eq:mmu} imply that the current mass function is
\begin{equation}
\frac{\mathrm dn}{\mathrm dm}
\approx
\left(1+\frac{\phi_*\,t_0}{m^3}\right)^{-2/3}\,
\frac{n}{\Delta\,M_\mathrm f}
\quad
(M_\mathrm q < m < \mathcal O(10)\,M_*)\,.
\end{equation}
This just scales as $ m^2 $ for $ m \ll M_* $\,, so the monochromatic initial mass function is spread out into the expected low-mass tail.
Fig.~\ref{fig:mf_mono} depicts the evolution of typical mass functions of interest.
\begin{figure}[htb]
\includegraphics[scale=0.65]{mf_mono1.eps}
\includegraphics[scale=0.65]{mf_mono2.eps}
\caption{\label{fig:mf_mono}
(a) Nearly-monochromatic mass functions with different mass scales $ M_\mathrm f $ but the same fractional width $ \Delta = 0.1 $.
The dashed lines represent the initial mass functions and the solid lines the current ones, the color coding the value of $ M_\mathrm f $\,.
(b) Nearly-monochromatic mass functions with $ M_\mathrm f = 1.5 M_*$ but different values of $ \Delta $\,.
In each case $ n $ is normalised so that $ \beta(M_\mathrm f) = 10^{-27} $, the maximum value consistent with the extragalactic $ \gamma $-ray background.
}
\end{figure}
In Fig.~\ref{fig:mf_mono}(a), the initial (dashed) and current (solid) mass functions are plotted for $ M_\mathrm f = 1.001\,M_*, 1.1\,M_*\,, 1.2\,M_*\,, 1.5\,M_* $ with fixed fractional width $ \Delta = 0.1 $.
For $ M_\mathrm f = 1.1\,M_* $ (green), the initial spectrum extends down to $ 0.99\,M_* $\,, so there is an extensive $ m^2 $ tail at the present epoch with a drop at $ M_\mathrm q $\,.
For $ M_\mathrm f = 1.2\,M_* $ (blue), the spectrum extends down to $ 1.08\,M_* $\,, so the tail is quite short and does not reach the drop at $ M_\mathrm q $\,.
For $ M_\mathrm f = 1.5\,M_* $ (magenta), the spectrum only extends down to $ 1.35\,M_* $\,, so the mass function does not evolve significantly and there is no appreciable tail at all.
For $ M_\mathrm f = 1.01\,M_*$ (red), the initial spectrum does not extend up to $ M_\mathrm c $\,, so only the bottom end of the low-mass tail appears.
Plotted in Fig.~\ref{fig:mf_mono}(b) are mass functions with different values of $ \Delta $ for $ M_\mathrm f = 1.5\,M_* $\,.
For $ \Delta = 0.333 $, $ (1-\Delta)\,M_\mathrm f $ is slightly above $ M_\mathrm c $\,, so only the top end of the low-mass tail appears.
Note that $ M_\mathrm c $ is so close to $ M_* $ that these scales cannot be distinguished in the figures.
\subsection{\label{sec:mf_ext}
Extended initial mass function
}
We now consider the consequences of the PBHs having an initial mass function which extends well above $ M_* $\,, thereby generating the entire low-mass tail below $ M_* $\,.
We assume this has the form given by Eq.~\eqref{eq:mf_pl} over some mass range $ M_\mathrm{min} < M < M_\mathrm{max} $\,, where the exponent $ \nu $ is arbitrary and may be positive or negative.
In the present context, we assume $ M_\mathrm{min} = M_* $\,, since PBHs smaller than $ M_* $ are irrelevant to the Galactic gamma-ray background, and we use the notation $ M_\mathrm{max} = M_\mathrm f $\,.
If the PBHs form from initial scale-invarant density fluctuations, $ \beta(M) $ is independent of $ M $ and $ \nu = -5/2 $ for PBHs forming in a radiation-dominated era \cite{Carr:1975qj} but one does not expect this in general.
Later we discuss a fairly generic scenario in which $ \nu $ is close to $ 2 $.
From Eq.~\eqref{eq:slope_mf}, the current mass function is
\begin{equation}
\frac{\mathrm dn}{\mathrm dm}
\approx
\left(\frac{\mathrm dn}{\mathrm dM}\right)_*
\times
\begin{cases}
\left(\frac{m}{M_*}\right)^2
& (m < M_*) \\
\left(\frac{m}{M_*}\right)^\nu
& (m > M_*)\,.
\end{cases}
\end{equation}
For the purpose of numerical computations, we normalize $ (\mathrm dn/\mathrm dM)_* $ to $ 100\,\mathrm{pc}^{-3}\,M_*^{-1} $\,.
Then $ n(M_*) \sim M_*\,(\mathrm dn/\mathrm dM)_* \sim 100\,\mathrm{pc}^{-3} $\,, which corresponds to $ \beta(M_*) \sim 10^{-27} $ from Eq.~\eqref{eq:nbeta}, and this is the maximum value allowed by the extragalactic $ \gamma $-ray background limit.
Independent of the $ \gamma $-ray background constraint at $ M_* $\,, there will be another constraint if $ \nu > -2 $ since black holes with mass around $ M $ will have a density parameter $ \Omega_\mathrm{PBH}(M) \propto M^{2+\nu} $ which increases with $ M $\,.
Therefore the mass function will be constrained by dark matter observations at the largest value of $ M $\,.
Indeed, as emphasized by Yokoyama \cite{Yokoyama:1998xd}, one could envisage a scenario in which $ M_\mathrm f $ is sufficiently large that the PBHs could provide the dark matter even if the mass function is strongly constrained at $ M_* $\,.
More precisely, the density parameter of the PBHs with mass around $ M_* $ would be
\begin{equation}
\Omega_\mathrm{PBH}(M_*)
= \Omega_\mathrm{PBH}(M_\mathrm f)\,(M_*/M_\mathrm f)^{2+\nu}
= f\,\Omega_\mathrm{CDM}\,(M_\mathrm f/10^{15}\,\mathrm g)^{-2-\nu}\,,
\end{equation}
where $ f $ is the fraction of the Cold Dark Matter density in the PBHs.
For PBHs to explain both the extragalactic background, $ \Omega_\mathrm{PBH}(M_*)\approx 10^{-9} $, and the dark matter, $ \Omega_\mathrm{PBH}(M_\mathrm f) = \Omega_\mathrm{CDM} \approx 0.2 $, one would require
\begin{equation}
M_\mathrm f
\approx
10^{(39+15\nu)/(2+\nu)}\,\mathrm g
\approx
\begin{cases}
10^{17}\mathrm g
& (\nu =2) \\
10^{20}\mathrm g
& (\nu =0) \\
10^{24}\mathrm g
& (\nu =-1)\,.
\end{cases}
\label{eq:cdm}
\end{equation}
If $ \nu < -2 $, $ \Omega_\mathrm{PBH}(M) $ decreases with increasing $ M $\,, so there is no dark matter constraint.
\subsection{\label{sec:mf_cc}
Critical mass function
}
It is well known that black hole formation is associated with critical phenomena and this applies, in particular, to PBHs which form from initial density fluctuations \cite{Choptuik:1992jv,Abrahams:1993wa,Evans:1994pj,Koike:1995jm,Niemeyer:1997mt}.
In this section, we will show that this implies that the PBH mass spectrum should have a simple power-low form which extends well below the peak mass.
This scenario has been considered before \cite{Yokoyama:1998xd} but we generalize it to a wider range of situations.
Let us assume a monochromatic power spectrum for the density fluctuations on some mass scale and identify the amplitude of the density fluctuation when that scale crosses the horizon, $ \delta $\,, as the control parameter.
Then the black hole mass is given by
\begin{equation}
M
= K\,(\delta - \delta_\mathrm c)^c\,,
\label{eq:M_cc}
\end{equation}
where $ \delta_\mathrm c $ is the critical magnitude of the density fluctuation required for PBH formation ($ 0.4 $ in a radiation-dominated era), the exponent has a universal value $ c \approx 0.35 $ \cite{Evans:1994pj,Koike:1995jm,Niemeyer:1997mt} and $ K $ is a mass scale of order the horizon mass $ M_\mathrm H $\,.
Although the scaling relation \eqref{eq:M_cc} is expected to be valid only in the immediate neighborhood of $ \delta_\mathrm c $\,, most black holes are expected to form from fluctuations with this value because the probability distribution function (PDF) declines exponentially beyond $ \delta = \delta_\mathrm c $\,.
Hence it is sensible to calculate the expected mass function of PBHs using the formula \eqref{eq:M_cc}.
This allows us to estimate the mass function fairly independently of the specific form of the PDF of primordial density or curvature fluctuations.
Since the PDF of $ \delta $\,, $ P(\delta) $\,, is a steeply declining function around $ \delta_\mathrm c $\,, we write it as
\begin{equation}
P(\delta)\,\mathrm d\delta
= \mathrm e^{-f(\delta)}\,\mathrm d\delta\,,
\label{eq:pdf}
\end{equation}
where $ f(\delta) $ is a well-behaved function around $ \delta \simeq \delta_\mathrm c $\,.
If $ \delta $ has a Gaussian distribution, as assumed in most literature \cite{Carr:1975qj,Carr:1993aq,*Carr:1994ar,Green:1997sz}, $ f(\delta) $ is given by
\begin{equation}
f(\delta)
= \ln\left(\sqrt{2 \pi}\,\sigma\right) + \frac{\delta^2}{2\,\sigma^2}\,,
\label{eq:Gauss}
\end{equation}
with $ \sigma $ being the dispersion of $ \delta $\,.
Then the probability, $ \beta(M_\mathrm H) $\,, that the relevant horizon mass-scale has a fluctuation above the threshold required for black hole formation is given by
\begin{equation}
\beta(M_\mathrm H)
= \int_{\delta_\mathrm c}\!P(\delta)\,\mathrm d\delta
= \int_{\delta_\mathrm c}\!\mathrm e^{-f(\delta)}\,\mathrm d\delta\,.
\end{equation}
This is the volume fraction of the regions collapsing to PBHs at time $ t_\mathrm f $\,.
Since $ P(\delta) $ is a steeply decreasing function, the integral is sensitive to only its lower bound $ \delta_\mathrm c $\,.
Furthermore we can Taylor expand $ f(\delta) $ as
\begin{equation}
f(\delta)
= f(\delta_\mathrm c)
+ f'(\delta_\mathrm c)\,(\delta - \delta_\mathrm c)
+ \cdots
\equiv
f_\mathrm c
+ s\,(\delta-\delta_\mathrm c)
+ \cdots\,,
\label{eq:Taylor}
\end{equation}
to find
\begin{equation}
\beta(M_\mathrm H)
\approx
\frac{1}{s}\,\mathrm e^{-f_\mathrm c}\,.
\end{equation}
Here $ s = \delta_\mathrm c/\sigma^2 $ and the approximation is applicable if $ |f''(\delta_\mathrm c)| \ll s^2 $\,.
For a Gaussian distribution, this corresponds to $ \sigma \ll \delta_\mathrm c $\,.
Putting $ \delta_\mathrm c = 1/3 $ and using \eqref{eq:Gauss}, we recover Carr's formula \cite{Carr:1975qj},
\begin{equation}
\beta
\simeq
\sigma\,\exp[-1/(18\,\sigma^2)]\,.
\end{equation}
If $ P(\delta) $ is non-Gaussian, we must analyze on a case-by-case basis, but so long as $ \beta(M_\mathrm H) $ is small enough to satisfy the cosmological constraints and we use specific non-Gaussian distributions reported in the literature \cite{Bullock:1996at,Yokoyama:1998pt,Ivanov:1997ia}, we may justify \eqref{eq:Taylor}.
Let us present two specific examples.
One is the lognormal matter distribution
\begin{equation}
P_\mathrm{LN}(\delta)
= \frac{1}{(1+\delta)\,\sqrt{2\pi\,\ln(1+\sigma^2)}}\,
\exp\left[
-\frac{\left\{\ln\left[(1+\delta)\,\sqrt{1+\sigma^2}\right]\right\}^2}
{2\,\ln\left(1+\sigma^2\right)}
\right]\,,
\end{equation}
which is more plausible than Gaussian because it gives null probability for negative density and is known to fit the nonlinear density distribution of large-scale structures well \cite{1991MNRAS.248....1C,Bernardeau:1994aq}.
For $ \sigma^2 \ll 1 $, we find
\begin{align}
f_\mathrm{LN}(\delta_\mathrm c)
&
= \frac{\left\{\ln\left[(1+\delta_\mathrm c)\,\sqrt{1+\sigma^2}\right]\right\}^2}
{2\,\ln\left(1+\sigma^2\right)}
+ \ln\left(1+\delta_\mathrm c\right)
+ \frac{1}{2}\,\ln\left[2\pi\,\ln(1+\sigma^2)\right]\,, \\
s_\mathrm{LN}
&
= f_\mathrm{LN}'(\delta_\mathrm c)
= \frac{1}{1+\delta_\mathrm c}\,\left[
\frac{\ln\left[(1+\delta_\mathrm c)\,\sqrt{1+\sigma^2}\right]}
{\ln\left(1+\sigma^2\right)}+1
\right]
\simeq
\frac{\ln\left(1+\delta_\mathrm c\right)}
{(1+\delta_\mathrm c)\,\sigma^2}\,, \\
f_\mathrm{LN}''(\delta_\mathrm c)
&
\simeq
-\frac{\ln(1+\delta_\mathrm c)-1}{(1+\delta_\mathrm{c})^2\,\sigma^2}\,.
\end{align}
Hence $ |f_\mathrm{LN}''(\delta_\mathrm c)| \ll s_\mathrm{LN}^2 $ corresponds to $ \sigma^2 \ll \delta_\mathrm c $\,, which is satisfied unless PBHs are overproduced.
Next we consider a more phenomenological description of non-Gaussianity where the density contrast is expressed in terms of a random Gaussian variable $ \delta_\mathrm G $ as
\begin{equation}
\delta
= \delta_\mathrm G + \tilde f_\mathrm{NL}\,\delta_\mathrm G^2
\label{eq:localNG}
\end{equation}
at each point \cite{Komatsu:2001rj}.
Such a model has been widely used in studies of the CMB and large-scale structure.
The local nonlinearity parameter $ f_\mathrm{NL} $ has been stringently constrained and can be at most $ \mathcal O(1) $ on the scales probed by the Planck satellite \cite{Ade:2015ava}.
It has been argued that $ \tilde f_\mathrm{NL} $ of order of unity significantly affects the PBH abundance, leading to significant constraints \cite{Young:2013oia}.
However, this is misleading because $ f_\mathrm{NL} = \mathcal O(1) $ on large scales corresponds to non-Gaussian corrections of order $ 10^{-5} $, while $ \tilde f_\mathrm{NL} = \mathcal O(1) $ on the PBH scale means corrections of $ 0.01\textnormal{--}0.1 $ because appreciable PBH formation requires $ \sqrt{\langle\delta_\mathrm G^2\rangle} \gtrsim 0.05 $.
Hence the same values of $ f_\mathrm{NL} $ and $ \tilde f_\mathrm{NL} $ can have totally different implications.
In fact, it is not sensible to identify $ f_\mathrm{NL} $ on large scale with $ \tilde f_\mathrm{NL} $\,.
Keeping these remarks in mind, Eq.~\eqref{eq:localNG} implies
\begin{equation}
P_\mathrm{loc}(\delta)
= \frac{1}{\sqrt{2\pi}\,\xi\,\sigma}
\exp\left[
-\frac{1}{2\,\sigma^2}\,
\left(\frac{\xi-1}{2\,\tilde f_\mathrm{NL}}\right)^2
\right]
\quad\textnormal{with}\quad
\xi
\equiv
\sqrt{1+4\,\tilde f_\mathrm{NL}\,\delta}\,,
\end{equation}
so
\begin{align}
f_\mathrm{loc}(\delta_\mathrm c)
&
= \frac{1}{2\,\sigma^2}\,
\left(\frac{\xi_\mathrm c-1}{2\,\tilde f_\mathrm{NL}}\right)^2
- \frac{1}{2}\,\ln\left(2\pi\,\xi_\mathrm c^2\,\sigma^2\right)\,, \\
s_\mathrm{loc}
&
= f_\mathrm{loc}'(\delta_\mathrm c)
= \frac{1}{2\,\tilde f_\mathrm{NL}\,\sigma^2}\,\left(1-\frac{1}{\xi_\mathrm c}\right)
- \frac{2\,\tilde f_\mathrm{NL}}{\xi _\mathrm c^2}\,, \\
f_\mathrm{loc}''(\delta_\mathrm c)
&
= \frac{1}{\sigma^2\,\xi_\mathrm c^3}
+ \frac{8\,\tilde f_\mathrm{NL}^2}{\xi_\mathrm c^4}\,.
\end{align}
The condition $ |f_\mathrm{loc}''(\delta_\mathrm c)| \ll s_\mathrm{loc}^2 $ is equivalent to $ \sigma^2 \ll \delta_\mathrm c $ for $ 4\,\tilde f_\mathrm{NL}\,\delta_\mathrm c \ll 1 $ and $ \sigma^2 \ll 2\,\tilde f_\mathrm{NL}^{1/2}\,\delta_\mathrm c^{3/2} \ll 1 $ for $ 4\,\tilde f_\mathrm{NL}\,\delta_\mathrm c \gg 1 $.
Both are satisfied for realistic abundance of PBHs.
Hence this simple approximation is widely applicable.
Using \eqref{eq:M_cc}, \eqref{eq:pdf} can be expressed in terms of $ M $ as
\begin{equation}
P(\delta)\,\mathrm d\delta
= P\left[\delta_\mathrm c+\left(\frac{M}{K}\right)^{1/c}\right]\,
\left(\frac{M}{K}\right)^{1/c-1}\,
\frac{\mathrm dM}{c\,K}\,,
\end{equation}
where the right-hand-side can be interpreted as the formation probability of a PBH with mass $ M $ in each horizon volume as the fluctuation peak enters the Hubble radius at $ t_\mathrm f $\,.
The comoving mass function of PBHs at formation is therefore
\begin{equation}
\frac{\mathrm dn}{\mathrm dM}
= \frac{1}{V_\mathrm f\,c\,K}\,
\left(\frac{M}{K}\right)^{1/c-1}\,
P\left[\delta_\mathrm c+\left(\frac{M}{K}\right)^{1/c}\right]\,,
\end{equation}
where $ V_\mathrm f $ is the \textit{comoving} horizon volume at $ t_\mathrm f $\,, related to the horizon mass $ M_\mathrm f $ at that time by
\begin{equation}
V_\mathrm f
= \frac{4\pi}{3}\,\left(\frac{M_\mathrm f}{4 \pi\,a(t_\mathrm f)}\right)^3\,.
\end{equation}
We therefore find
\begin{equation}
\frac{\mathrm dn}{\mathrm dM}
\simeq
\frac{1}{V_\mathrm f\,c\,K}\,
\left(\frac{M}{K}\right)^{1/c-1}\,
\exp\left[-f_\mathrm c - s\,\left(\frac{M}{K}\right)^{1/c}\right]\,,
\label{eq:initmf_cc}
\end{equation}
which peaks at
\begin{equation}
M_\mathrm{peak}
= \gamma\,M_\mathrm f
\quad\textnormal{with}\quad
\gamma
\equiv
\left(\frac{1-c}{s}\right)^c\,,
\quad
M_\mathrm f
= K\,.
\end{equation}
We can express \eqref{eq:initmf_cc} in terms of $ \gamma $ and $ M_\mathrm f $ as
\begin{equation}
\frac{\mathrm dn}{\mathrm dM}
\simeq
\frac{\beta(M_\mathrm f)}{V_\mathrm f\,\gamma\,M_\mathrm f}\,
\left(\frac{1-c}{c}\right)\,
\left(\frac{M}{\gamma\,M_\mathrm f}\right)^{1/c-1}\,
\exp\left[-(1-c)\,\left(\frac{M}{\gamma\,M_\mathrm f}\right)^{1/c}\right]\,.
\label{eq:initmf_cc2}
\end{equation}
Thus the possible non-Gaussianity of the density fluctuation PDF affects only $ \beta(M_\mathrm f) $ and the peak mass; the overall shape of the mass function is independent of the PDF apart from these two parameters.
Equation~\eqref{eq:initmf_cc2} gives the mass function at the formation epoch.
In order to calculate the current (comoving) mass function, we must incorporate mass loss due to the Hawking radiation since this is important for holes with $ M \simeq M_* $\,.
The PBH mass at the formation time, $ M $\,, is related to the current mass, $ m $ through $ M^3 = M_*^3 + m^3 $\,.
The more exact expression is given by \eqref{eq:precisem}.
We can therefore write the current comoving mass spectrum as
\begin{equation}
\frac{\mathrm dn}{\mathrm dm}
\simeq
\frac{\beta(M_\mathrm f)}{V_\mathrm f\,\gamma\,M_\mathrm f}\,
\left(\frac{1-c}{c}\right)\,
\left(\frac{M(m)}{\gamma\,M_\mathrm f}\right)^{1/c-1}\,
\exp\left[
-(1-c)\,\left(\frac{M(m)}{\gamma\,M_\mathrm f}\right)^{1/c}
\right]
\times
\begin{cases}
\frac{m^2}{M(m)^2}
& (m \geq M_\mathrm q) \\
\frac{m^2}{\alpha\,M(m)^2}
& (m \leq M_\mathrm q)
\end{cases}\,,
\label{eq:currmf_cc}
\end{equation}
where we have distinguished between the $ m > M_\mathrm q $ and $ m < M_\mathrm q $ cases.
This function is plotted in Fig.~\ref{fig:mfs_cc} for $ \beta(M_\mathrm f) = 10^{-27} $ and different values of $ M_\mathrm f $\,.
Since $ c \approx 0.35 $, it scales as $ M^{-0.15}\,m^2 $\,.
So coincidentally the effects of critical collapse on the initial mass function and of evaporations on the current mass function give slopes close to $ M^2 $ and $ m^2 $\,, respectively, for $ M \ll \gamma\,M_\mathrm f $\,.
Note that there would be another drop in the curves below $ 10^{12}\,\mathrm g $ if one allowed for the increase in $ f $ due to the emission of extra particles but this is not shown.
One can also obtain a constraint on the mass $ M_\mathrm f $ in order to avoid overproducing dark matter.
If one applies Eq.~\eqref{eq:cdm} with $ \nu \approx 1.85 $, this gives $ M_\mathrm f < 10^{17}\,\mathrm g $\,.
\begin{figure}[htb]
\includegraphics[scale=0.65]{mf_cc.eps}
\caption{\label{fig:mfs_cc}
Initial mass function (broken) and current mass function (solid) for critical collapse with $ \gamma\,M_\mathrm f = 10^{16}\,\mathrm g $ (red), $ 10^{15}\,\mathrm g $ (green), $ 5 \times 10^{14}\,\mathrm g $ (blue), and $ 2 \times 10^{14}\,\mathrm g $ (magenta).
For $ \gamma\,M_\mathrm f \gtrsim 10^{15}\,\mathrm g $\,, the broken and solid curves differ only below $ M_\mathrm q = 0.4\,M_* \approx 2 \times 10^{14}\,\mathrm g $\,, but the difference becomes more significant as $ \gamma\,M_\mathrm f $ decreases.
All curves have the value $ \beta(M_*) = 10^{-27} $ associated with the extragalactic $ \gamma $-ray background limit, corresponding to $ (\mathrm dn/\mathrm dM)_* \approx 100\,\mathrm{pc}^{-3}\,M_*^{-1} $\,.
}
\end{figure}
\section{\label{sec:flux}
Galactic gamma-ray flux
}
If the PBHs evaporating at the present epoch are clustered inside galactic halos (as expected), then there will be a Galactic background generated by PBHs with $ M \geq M_* $\,.
As discussed later, this is dominated by the low mass tail of PBHs with initial mass just above $ M_* $ but with an intensity increased by the local density enhancement.
While this mass tail makes a negligible contribution to the time-integrated extragalactic background, it is crucial for the Galactic background.
There would also be a Galactic contribution from PBHs which were slightly \textit{smaller} than $ M_* $ but sufficiently distant for their emitted particles to have only just reached us; since the light-travel time across the Galaxy is $ t_\mathrm{gal} \sim 10^5\,\mathrm{yr} $\,, this corresponds to PBHs initially smaller than $ M_* $ by $ (t_\mathrm{gal}/3t_0)\,M_* \sim 10^{-5}\,M_* $\,, so this contribution is very small.
In this section, an overbar denotes the cosmological average of a quantity.
For instance, $ \mathrm d\bar n/\mathrm dm $ is the average current mass function, which we discussed in the last section.
It is related to the average PBH mass density by
\begin{equation}
\bar\rho_\mathrm{PBH}
= \int_0^\infty\!\mathrm dm\,m\,\frac{\mathrm d\bar n}{\mathrm dm}\,,
\end{equation}
where the mass function will be zero below some lower limit and above some upper limit.
For simplicity, we assume that the local mass function of PBHs in the Galaxy is the same as the average except for the enhancement $ \rho_\mathrm{PBH}(\boldsymbol R)/\bar\rho_\mathrm{PBH} $\,, where $ \rho_\mathrm{PBH}(\boldsymbol R) $ is the local mass density of PBHs and $ \boldsymbol R $ represents the position in the Galaxy.
Then the local PBH mass function at $ \boldsymbol R $ is
\begin{equation}
\frac{\mathrm dn}{\mathrm dm}(\boldsymbol R)
= \frac{\mathrm d\bar n}{\mathrm dm}\,
\frac{\rho_\mathrm{PBH}(\boldsymbol R)}{\bar\rho_\mathrm{PBH}}\,.
\end{equation}
The local photon emission rate from PBHs per unit energy per unit volume is
\begin{equation}
\mathcal E(E,\boldsymbol R)
= \int_0^\infty\!\mathrm dm\,
\frac{\mathrm dn}{\mathrm dm}(\boldsymbol R)\,
\frac{\mathrm d\dot N}{\mathrm dE}(m,E)
= \frac{\rho_\mathrm{PBH}(\boldsymbol R)}{\bar\rho_\mathrm{PBH}}\,
\bar{\mathcal E}(E)\,,
\end{equation}
where expressions for $ \mathrm d\dot N/\mathrm dE $ were derived in Sec.~\ref{sec:BH} and $ \bar{\mathcal E} $ is the average emission rate, defined by
\begin{equation}
\bar{\mathcal E}(E)
= \int_0^\infty\!\mathrm dm\,
\frac{\mathrm d\bar n}{\mathrm dm}\,
\frac{\mathrm d\dot N}{\mathrm dE}(m,E)\,.
\label{eq:em_avg}
\end{equation}
Both $ \mathcal E $ and $ \bar{\mathcal E} $ have dimensions $ \mathrm s^{-1}\,\mathrm{MeV}^{-1}\,\mathrm{cm}^{-3} $\,.
We evaluate the average emissivity for various scenarios below.
We regard the position $ \boldsymbol R $ as a function of the line of sight vector $ \boldsymbol n $ and the distance $ r $ from the Sun (or us).
Consider photons emitted from PBHs at a distance $ r $ within a volume $ \mathrm dV = r^2\,\mathrm d\Omega\,\mathrm dr $\,, where $ \mathrm d\Omega $ denotes the solid angle of the volume relative to us.
A fraction $ 1/(4 \pi r^2) $ of these photons come into a unit area of our detector, so the photon number flux per unit solid angle from PBHs at a distance between $ r $ and $ r + \mathrm dr $ is
\begin{equation}
\mathrm d\Phi(\boldsymbol n,E)
= \frac{1}{4\pi}\,\mathcal E(E,\boldsymbol R(\boldsymbol n,r))\,\mathrm dr\,.
\end{equation}
Integrating over the radial distance gives the total flux
\begin{equation}
\Phi(\boldsymbol n,E)
= \frac{1}{4\pi}\,\int_0^\infty\!\mathrm dr\,
\mathcal E(E,\boldsymbol R(\boldsymbol n,r))
= \frac{\bar{\mathcal E}(E)}{4\pi}\,\int_0^\infty\!\mathrm dr\,
\frac{\rho_\mathrm{PBH}(\boldsymbol R(\boldsymbol n,r))}{\bar\rho_\mathrm{PBH}}
\label{eq:flux}
\end{equation}
with dimensions $ \mathrm s^{-1}\,\mathrm{MeV}^{-1}\,\mathrm{sr}^{-1}\,\mathrm{cm}^{-2} $\,.
The associated intensity is
\begin{equation}
I(E)
\equiv
E\,\Phi(E)
\end{equation}
with dimensions $ \mathrm s^{-1}\,\mathrm{sr}^{-1}\,\mathrm{cm}^{-2} $\,.
\subsection{
Integration along line of sight
}
In order to carry out the integration along line of sight in Eq.~\eqref{eq:flux}, we assume a spherically symmetric PBH distribution about the centre of the Galaxy, $ \rho_\mathrm{PBH}(\boldsymbol R) = \rho_\mathrm{PBH}(R) $ with $ R $ denoting the Galactocentric distance.
Then we must compute the expression for $ \Phi(\boldsymbol n,E) $ given by Eq.~\eqref{eq:flux} by writing $ R $ in terms of the line-of-sight distance $ r $ and Galactic coordinates $ (b,l) $\,.
This gives
\begin{equation}
R(\boldsymbol n,r)
= \sqrt{r^2-2 r\,R_\odot\,\cos b\,\cos l+R_\odot^2}\,,
\end{equation}
with $ R_\odot = 9\,\mathrm{kpc} $ being the distance of the Sun from the Galactic centre.
For illustrative purposes we define a Galactic line-of-sight enhancement factor as
\begin{equation}
g(\boldsymbol n)
= \frac{1}{r_\mathrm{gal}}\,
\int_0^{r_\mathrm{gal}}\!\mathrm dr\,
\frac{\rho_\mathrm{PBH}(R(\boldsymbol n,r))}{\bar\rho_\mathrm{PBH}}\,,
\end{equation}
with $ r_\mathrm{gal} = 100\,\mathrm{kpc} $ being our distance from the edge of the dark matter halo (assumed direction-independent as an approximation).
We adopt the Navarro--Frenk--White (NFW) profile \cite{Navarro:1995iw},
\begin{equation}
\rho_\mathrm{PBH}(R)
= \frac{f\,\rho_\mathrm s}
{(R/R_\mathrm s)^\gamma\,[1+(R/R_\mathrm s)^\alpha]^{(\beta-\alpha)/\alpha}}\,,
\end{equation}
with a set of best-fitting parameters taken from Diemand \textit{et al.} \cite{Diemand:2008in}:
$ \gamma = 1.24, \alpha = 1, \beta = 4-\gamma = 2.86, R_\mathrm s = 28.1\,\mathrm{kpc}\,, \rho_\mathrm s = 3.50 \times 10^{-3}\,M_\odot\,\mathrm{pc}^{-3} $\,.
Then we can compute $ g(\boldsymbol n) $ numerically and this is shown in Fig.~\ref{fig:gf}.
\begin{figure}[htb]
\includegraphics[scale=0.65]{gf.eps}
\caption{\label{fig:gf}
Line-of-sight Galactic density enhancement $ g(\boldsymbol n) $ for an NFW profile with $ f = 1 $.
}
\end{figure}
We shall require that the $ \gamma $-ray background from PBHs be below the Diffuse Galactic Emission (DGE).
For a spherically symmetric PBH distribution, the $ \gamma $-ray flux from PBHs averaged over the region of interest, $ |b| \geq 20^\circ $ to avoid contamination from the Galactic disc, is
\begin{equation}
\Phi(|b|\geq20^\circ;E)
= \frac{\int_{|b|\geq20^\circ} \Phi(\boldsymbol n,E)\,\mathrm d\Omega}
{\int_{|b|\geq20^\circ} \mathrm d\Omega}
= \mathcal G\,r_\mathrm{gal}\,
\frac{\bar{\mathcal E}(E)}{4\pi}\,,
\end{equation}
where $ \mathrm d\Omega = \cos b\,\mathrm db\,\mathrm dl $ and $ \mathcal G $ denotes the average value of $ g(\boldsymbol n) $ over the region of interest:
\begin{equation}
\mathcal G(|b|\geq20^\circ)
= \frac{\int_{|b|\geq20^\circ} g(\boldsymbol n)\,\mathrm d\Omega}
{\int_{|b|\geq20^\circ} \mathrm d\Omega}\,.
\end{equation}
A numerical computation gives $ \mathcal G(|b|\geq20^\circ) \approx 4.3 \times 10^4 $ if $ r_\mathrm{gal} = 100\,\mathrm{kpc} $\,.
\subsection{
Emissivity for monochromatic mass function
}
We assume that the initial mass function is given by Eq.~\eqref{eq:mf_tophat} and that $ M_\mathrm f $ exceeds $ M_* $\,, else there is no emission at the present epoch.
The current emissivity is given by Eq.~\eqref{eq:em_avg} with an upper limit at $ m(M_\mathrm f) $ and a lower limit at $ m((1-\Delta)\,M_\mathrm f) $\,.
Here $ m(M) \approx M $ for $ \mu \gg 1 $, $ (3 \mu)^{1/3}\,M_* $ for $ 0.02 < \mu \ll 1 $ and $ (3 \alpha \mu)^{1/3}\,M_* $ for $ \mu < 0.005 $, with the more exact expression \eqref{eq:mmu} covering the transitions between these ranges.
We will usually be interested in the situation where the mass band encompasses or is close to $ M_* $\,, since this is relevant to the Galactic background.
Analysing the emissivity associated with the various monochromatic scenarios is quite complicated, so we start off with some general qualitative remarks.
For $ (1-\Delta)\,M_\mathrm f \gg M_\mathrm c $\,, the mass function does not evolve significantly, so it remains very narrow and there is only primary emission.
As $ (1-\Delta)\,M_\mathrm f $ falls towards $ M_* $\,, the current mass function broadens at the low end and begins to acquire a tail with $ \mathrm d\bar n/\mathrm dm \propto m^2 $ just below $ M_* $\,.
Secondary emission becomes important once the tail extends below $ M_\mathrm c $ and it extends all the way down to $ 0 $ for $ (1-\Delta)\,M_\mathrm f < M_* $\,.
So long as $ M_\mathrm f $ remains above $ M_\mathrm c $\,, there will also be some primary emission but both the upper and lower ends of the mass function cross $ M_\mathrm c $ nearly together if $ \Delta $ is small, so emission will usually be dominated by the primary or secondary component.
In any case, secondary emission will dominate once $ M_\mathrm f $ also falls below $ M_\mathrm c $\,.
An important qualitative point is that the low-mass tail will produce a high-energy emissivity tail ($ \bar{\mathcal E} \propto E^{-3} $) providing the mass scale $ E^{-1} $ lies between the limits in the mass integral \eqref{eq:em_avg}.
Otherwise the emissivity will fall off exponentially, so a crucial transition occurs when $ (1-\Delta)\,M_\mathrm f $ gets close to $ M_* $ since this marks the onset of the low-mass tail.
Another important feature is that the dependence of the emissivity on the parameter $ \Delta $ often drops out and always in scenarios where $ \Delta $ can go to zero.
We now discuss some of the possible cases in more detail.
Although we calculate all the emissivities numerically, our purpose is to understand the results analytically.
We use units with $ \hbar = c = k_\mathrm B = 8 \pi G = 1 $ but there is an implicit factor of $ \hbar^{-1} $ in the emissivity expressions below and they all scale with the PBH number density $ \bar n $\,, so the units are $ \mathrm s^{-1}\,\mathrm{MeV}^{-1}\,\mathrm{cm}^{-3} $\,.
Note that the expressions always involve factors of $ E\,m $\,, this combination being dimensionless with our chosen units.
\textit{Case A}.
If $ (1-\Delta)\,M_\mathrm f \gg M_* $\,, the current mass function preserves its original (narrow) form and the only secondary emission comes from the Wien tail, which we neglect here.
Equations~\eqref{eq:rate_pri}, \eqref{eq:mf_tophat} and \eqref{eq:em_avg} then imply
\begin{equation}
\begin{aligned}
\bar{\mathcal E}^\mathrm P(E)
&
\approx
\int_{(1-\Delta) M_\mathrm f}^{M_\mathrm f}\!\mathrm dm\,
\frac{\bar n}{\Delta\,M_\mathrm f}\,
\frac{\mathrm d\dot N^\mathrm P}{\mathrm dE}(m,E) \\
&
\propto
\bar n
\times
\begin{cases}
E^3\,M_\mathrm f^3\,
[1 - 3 \Delta/2 + \mathcal O(\Delta^2)]
& (E < M_\mathrm f^{-1}) \\
E^2\,M_\mathrm f^2\,\mathrm e^{-E M_\mathrm f}\,
[1 + (E\,M_\mathrm f-2)\,\Delta/2 + \mathcal O(\Delta^2)]
& (E > M_\mathrm f^{-1})\,.
\end{cases}
\end{aligned}
\label{eq:em_mono}
\end{equation}
For $ E < M_\mathrm f^{-1} $\,, the factor of $ \Delta $ in the denominator is cancelled by the difference in the integral limits if only $ \Delta \ll 1 $.
For $ E \gg M_\mathrm f^{-1} $\,, a more severe condition $ \Delta \ll (E\,M_\mathrm f)^{-1}\,(\ll 1) $ has to be imposed for the cancellation.
So $ \Delta $ cancels except in the high energy regime $ E > \Delta^{-1}\,M_\mathrm f^{-1} $\,.
The emissivity is effectively black-body radiation from holes with mass $ M_\mathrm f $\,, so one has a peak at $ E^\mathrm P \approx 6\,M_\mathrm f ^{-1}$ with an $ M_\mathrm f $-independent value
\begin{equation}
\bar{\mathcal E}^\mathrm P(E^\mathrm P)
\approx
\bar n\,\frac{\mathrm d\dot N^\mathrm P}{\mathrm dE}(M_\mathrm f,E^\mathrm P)
\approx
1 \times 10^{18}\,\bar n\,\mathrm s^{-1}\,\mathrm{MeV}^{-1}\,,
\label{eq:em_mono2}
\end{equation}
using Eq.~\eqref{eq:ratepeak}.
The important point is that Eq.~\eqref{eq:em_mono} has an exponential upper cut-off for $ E > M_\mathrm f^{-1} $; there is no power-law high-energy tail because $ E^{-1} $ is less than the lower mass limit.
\textit{Case B}.
If $ M_\mathrm c < M_\mathrm d < (1-\Delta)\,M_\mathrm f < M_\mathrm f < 1.25 M_* $\,, which requires a high degree of tuning since the entire mass range is close to $ M_* $\,, the mass function evolves significantly but there is no secondary emission.
The mass limits become
\begin{equation}
m_\mathrm f
\equiv
m(M_\mathrm f)
\approx
(3 \mu_\mathrm f)^{1/3}\,M_*\,,
\quad
m((1-\Delta)\,M_\mathrm f)
\approx
(1 - \Delta/\mu_\mathrm f)^{1/3}\,m_\mathrm f\,.
\end{equation}
The emissivity is therefore
\begin{equation}
\begin{aligned}
\bar{\mathcal E}^\mathrm P(E)
&
\approx
\int_{(1-\Delta/ \mu_\mathrm f)^{1/3}m_\mathrm f}^{m_\mathrm f}\!\mathrm dm\,
\frac{\bar n}{\Delta\,M_\mathrm f}\,
\left(\frac{m}{M_*}\right)^2\,
\frac{\mathrm d\dot N^\mathrm P}{\mathrm dE}(m,E) \\
&
\propto
\bar n
\times
\begin{cases}
E^3\,M_*^3\,\mu_\mathrm f\,
[1-\Delta/(2 \mu_\mathrm f)+\mathcal O(\Delta^2)]
& (E < m_\mathrm f^{-1}) \\
E^2\,M_*^2\,\mu_\mathrm f^{2/3}\,\mathrm e^{-m_\mathrm f E}\,
[1 + (E\,m_\mathrm f-2)\,\Delta/(6 \mu_\mathrm f) + \mathcal O(\Delta^2)]
& (E > m_\mathrm f^{-1})\,,
\end{cases}
\end{aligned}
\end{equation}
where we have used $ M_\mathrm f \approx M_* $ and $ m_\mathrm f \approx (3 \mu_\mathrm f)^{1/3}\,M_* $ at the last step.
For $ E < m_\mathrm f^{-1} $\,, the factor of $ \Delta $ in the denominator is cancelled if only $ \Delta \ll \mu_\mathrm f $\,.
For $ E \gg m_\mathrm f^{-1} $\,, a more severe condition $ \Delta \ll \mu_\mathrm f/(E\,m_\mathrm f)\,(\ll \mu_\mathrm f) $ is necessary.
So $ \Delta $ cancels except in the high energy regime $ E > (m_\mathrm f\,\Delta/\mu_\mathrm f)^{-1} $\,.
The emissivity peaks at $ E \approx 6\,m_\mathrm f^{-1} $ with the value given by Eq.~\eqref{eq:em_mono2}.
There is no power-law high-energy tail because the mass-scale $ E^{-1} $ lies below the integration range.
For $ M_\mathrm f > M_* $\,, there would be an additional primary component given by Eq.~\eqref{eq:em_mono}, so one would effectively have a combination of cases A and B.
\textit{Case C}.
If $ (1-\Delta)\,M_\mathrm f < M_* < M_\mathrm c < M_\mathrm f < 1.25\,M_* $\,, which requires $ \Delta > 0.005 $, the low-mass tail is complete (i.e.\ extends down to $ 0 $) and secondary emission is important below $ M_\mathrm q $\,.
Using Eq.~\eqref{eq:rate_sec}, the secondary emissivity is
\begin{equation}
\bar{\mathcal E}^\mathrm S(E)
\approx
\int_0^{M_\mathrm q}\!\mathrm dm\,
\frac{\bar n}{\Delta\,\alpha M_\mathrm f}\,
\left(\frac{m}{M_*}\right)^2\,
\frac{\mathrm d\dot N^\mathrm S}{\mathrm dE}(m,E)
\propto
\frac{\bar n}{\Delta\,\alpha}
\times
\begin{cases}
q^4\,E\,M_*^2\,M_\mathrm f^{-1}
& (E < M_\mathrm q^{-1}) \\
E^{-3}\,M_*^{-2}\,M_\mathrm f^{-1}
& (E > M_\mathrm q^{-1})\,.
\end{cases}
\end{equation}
In this case, there is an $ E^{-3} $ high-energy tail for $ E > m_\mathrm f^{-1} $ because $ E^{-1} $ lies below the integral upper limit.
There is also now a dependence on $ \Delta $ but this cannot go to $ 0 $ because $ \Delta > 0.005 $.
The emissivity peaks at $ E^\mathrm S \approx 6\,M_\mathrm q^{-1} $ with a value
\begin{equation}
\bar{\mathcal E}^\mathrm S(E^\mathrm S)
\sim
\frac{\bar n\,q^2\,M_*}{3 \alpha\,\Delta\,M_\mathrm f}
\sim
10^{17}\,\mathrm s^{-1}\,\mathrm{MeV}^{-1}\,\mathrm{pc}^{-3}\,
\left(\frac{\Delta}{0.1}\right)^{-1}\,
\left(\frac{M_*}{M_\mathrm f}\right)
\left( \frac{\bar n}{\mathrm{pc}^{-3}}\right)\,.
\end{equation}
In this case, there is also a primary component from holes between $ M_\mathrm q $ and $ m_\mathrm f $ with emissivity
\begin{equation}
\bar{\mathcal E}^\mathrm P(E)
\approx
\int_{M_\mathrm q}^{m_\mathrm f}\!\mathrm dm\,
\frac{\bar n}{\Delta\,M_\mathrm f}\,
\left(\frac{m}{M_*}\right)^2\,
\frac{\mathrm d\dot N^\mathrm P}{\mathrm dE}(m,E)
\propto
\frac{\bar n}{\Delta}
\times
\begin{cases}
E^3\,m_\mathrm f^6\,M_\mathrm f^{-1}\,M_*^{-2}
& (E < m_\mathrm f^{-1}) \\
E^{-3}\,M_*^{-2}\,M_\mathrm f^{-1}
& (E > m_\mathrm f^{-1})\,.
\end{cases}
\end{equation}
There is a high-energy $ E^{-3} $ tail since $ E^{-1} $ lies between $ M_\mathrm q $ and $ m_\mathrm f $\,.
This has the same form as the high-energy tail of the secondary emission and it also scales as $ \Delta^{-1} $ but it has a different low-energy form.
\textit{Case D}.
If $ (1-\Delta)\,M_\mathrm f < M_* < M_\mathrm f < M_\mathrm c $\,, which requires fine-tuning of $ M_* $ and $ \mu_\mathrm f < 0.005 $, there is only secondary emission and the mass tail goes between $ 0 $ and $ m_\mathrm f $\,, so the emissivity is
\begin{equation}
\bar{\mathcal E}^\mathrm S(E)
\approx
\int_0^{m_\mathrm f}\!\mathrm dm\,
\frac{\bar n}{\Delta\,\alpha\,M_\mathrm f}\,
\left(\frac{m}{M_*}\right)^2\,
\frac{\mathrm d\dot N^\mathrm S}{\mathrm dE}(m,E)
\propto
\frac{\bar n}{\Delta\,\alpha}
\times
\begin{cases}
q^2\,E\,m_\mathrm f^2\,M_*^{-1}
& (E < M_\mathrm q^{-1}) \\
E^{-1}\,m_\mathrm f^2\,M_*^{-3}
& (M_\mathrm q^{-1} < E < m_\mathrm f^{-1}) \\
E^{-3}\,M_*^{-3}
& (E > m_\mathrm f^{-1})\,,
\end{cases}
\end{equation}
where we have put $ M_\mathrm f \approx M_* $ at the last step.
Because $ E^{-1} $ is below $ m_\mathrm f $\,, one again has an $ E^{-3} $ high-energy tail and a $ \Delta $-dependence.
This peaks at $ E^\mathrm S \approx 6\,M_\mathrm q^{-1} $ with a value
\begin{equation}
\bar{\mathcal E}^\mathrm S(E^\mathrm S)
\sim
\frac{\bar n\,q\,m_\mathrm f^2}{\Delta\,M_*^2}
\sim
10^{18}\,\mathrm s^{-1}\,\mathrm{MeV}^{-1}\,\mathrm{pc}^{-3}\,
\left(\frac{\Delta}{0.1}\right)^{-1}\,
\left(\frac{\bar n}{\mathrm{pc}^{-3}}\right)\,
\left(\frac{\mu_\mathrm f}{0.005}\right)^{2/3}\,.
\end{equation}
To be specific, we calculate the $ \gamma $-ray emissivity numerically for some of the mass functions shown in Fig.~\ref{fig:mf_mono} and the results are shown in Fig.~\ref{fig:em_mono}.
In the top-left figure, $ M_\mathrm f = 1.5\,M_* $ and $ \Delta = 0.1 $ (case A);
since $ (1-\Delta)\,M_\mathrm f \gg M_\mathrm c $\,, the primary component dominates and this falls exponentially for $ E > 6\,M_\mathrm f^{-1} $\,.
In the top-right figure, $ M_\mathrm f = 1.1\,M_* $ and $ \Delta = 0.01 $ (case B); this is similar to case~A but the peak shifts to a higher energy $ E \approx 6\,m_\mathrm f^{-1} $ since $ m_\mathrm f \ll M_\mathrm f $\,.
In the middle-left figure, $ M_\mathrm f = 1.1\,M_* $ and $ \Delta = 0.1 $ (case C); since $ (1-\Delta)\,M_\mathrm f < M_\mathrm c $\,, there is secondary emission and this is comparable to the primary emission, both falling as $ E^{-3} $ for $ E > 100\,\mathrm{MeV} $\,.
In the middle-right figure, $ M_\mathrm f = 1.001\,M_* $ and $ \Delta = 0.1 $ (case D); this is similar to case~C, but the secondary emissivity is suppressed as $ \mu_\mathrm f^{2/3} $\,.
The crucial feature of these figures is that the high-energy emissivity scales as $ E^{-3} $ if there is low mass tail but falls exponentially otherwise.
Also the emissivity has no dependence on $ \Delta $ in the latter case but it scales as $ \Delta^{-1} $ in the former case.
A subtle effect on the primary emission is the broadening of the peak towards higher energy and this shows up as $ \Delta $ increases.
The bottom-left figure shows the effect of varying the width $ \Delta $ for $ M_\mathrm f = 1.5\,M_* $; the form changes as $ \Delta $ approaches $ 0.333 $, below which there is an exponential cut-off for secondary emission (case A).
The bottom-right figure shows the same for $ M_\mathrm f = 1.001\,M_* $; the form only changes for $ \Delta = 0.0001 $, when there is a power-law fall-off and secondary emission (case C).
\begin{figure}[htb]
\includegraphics[scale=0.65]{em_monoA.eps}
\includegraphics[scale=0.65]{em_monoB.eps} \\
\includegraphics[scale=0.65]{em_monoC.eps}
\includegraphics[scale=0.65]{em_monoD.eps} \\
\includegraphics[scale=0.65]{em_mono_width1.eps}
\includegraphics[scale=0.65]{em_mono_width2.eps}
\caption{\label{fig:em_mono}
Top: components of $ \gamma $-ray emissivity for $ M_\mathrm f = 1.5\,M_* $ with $ \Delta = 0.1 $ (left) and $ M_\mathrm f = 1.1\,M_* $ with $ \Delta = 0.3 $ (right).
The secondary components are suppressed in both cases since $ (1-\Delta)\,M_\mathrm f > M_\mathrm c $\,.
The peak energies for the primary components are $ E^\mathrm P \approx 6 M_\mathrm f^{-1} $ (left) and $ E^\mathrm P \approx 6 m_\mathrm f^{-1} $ (right), respectively.
Middle: components of $ \gamma $-ray emissivity for $ M_\mathrm f = 1.1\,M_* $ (left) and $ M_\mathrm f = 1.001\,M_* $ with $ \Delta = 0.1 $.
The secondary emission occurs since $ (1-\Delta)\,M_\mathrm f < M_\mathrm c $\,.
Bottom: total $ \gamma $-ray emissivities for $ M_\mathrm f = 1.5\,M_* $ (left) and $ M_\mathrm f = 1.001\,M_* $ (right) with various values of $ \Delta $\,.
As seen in the right figure, the secondary emissivity is proportional to $ \Delta^{-1} $ as long as the entire mass tail is formed, i.e.\ $ (1-\Delta)\,M_\mathrm f < M_* $\,, and is exponentially suppressed once $ (1-\Delta)\,M_\mathrm f $ exceeds $ M_* $\,.
All figures use the normalisation $ \beta(M_\mathrm f) = 10^{-27} $.
}
\end{figure}
\subsection{
Emissivity for extended mass function
}
We assume that the initial mass function has the extended form \eqref{eq:mf_pl}, i.e.\ with $ \mathrm d\bar n/\mathrm dm \propto m^\nu $ up to some mass $ M_\mathrm f $ exceeding $ M_* $\,.
We first consider the contribution from the holes with $ m > M_* $ which do not produce a low mass tail or secondary emission.
In this case, Eq.~\eqref{eq:em_avg} with $ \nu > -3 $ implies that the emissivity is given by
\begin{equation}
\bar{\mathcal E}^\mathrm P(E)
\approx
\int_{M_*}^{M_\mathrm f}\!\mathrm dm\,
\frac{\bar n_*}{M_*}\,
\left(\frac{m}{M_*}\right)^\nu\,
\frac{\mathrm d\dot N^\mathrm P}{\mathrm dE}(m,E)
\propto
\bar n_*
\times
\begin{cases}
E^3\,M_\mathrm f^{4+\nu}\,M_*^{-\nu-1}
& (E < M_\mathrm f^{-1})\\
E^{-1-\nu}\,M_*^{-\nu-1}
& (M_*^{-1} > E > M_\mathrm f^{-1}) \\
E\,M_*\,\mathrm e^{-E M_*}
& (E > M_*^{-1})\,,
\end{cases}
\label{eq:slope}
\end{equation}
where we have used Eq.~\eqref{eq:rate_pri} and $ \bar n_* \equiv M_*\,(\mathrm d\bar n/\mathrm dM)_* $\,.
For $ E < M_\mathrm f^{-1} < m^{-1} $\,, one is in the Rayleigh--Jeans region for the entire mass integral, so $ M_\mathrm f $ gives the upper limit; for $ M_*^{-1} > E > M_\mathrm f^{-1} $\,, one splits the mass integral into a Rayleigh--Jeans part with an upper limit at $ m \sim E^{-1} $ and a Wien part with a lower limit at $ m \sim E^{-1} $\,, both contributions scaling as $ E^{-\nu-1} $; for $ E > M_*^{-1} $\,, $ E^{-1} $ is below the lower mass limit, so one has the exponential cut-off.
For $ \nu > -1 $, the emissivity peaks at $ E \sim M_\mathrm f^{-1} $ with a value scaling as $ M_\mathrm f^{1+\nu} $\,, so the peak shifts to lower energies but gets higher as $ M_\mathrm f $ increases.
For $ \nu < -1 $ (including the favored case $ \nu = -5/2 $), the peak occurs at $ E \sim M_*^{-1} $ with a constant value.
For $ \nu < -3 $, the lower integral limit in Eq.~\eqref{eq:slope} dominates, so one replaces $ M_\mathrm f $ by $ M_* $ in the $ E < M_\mathrm f^{-1} $ case, giving $ E^3\,M_*^3 $\,.
We now consider the primary emission from the narrow mass range $ M \in [M_\mathrm c, 1.25 M_*] $\,, or equivalently $ m \in [M_\mathrm q, M_*] $\,, which produces a low mass tail with $ m < M_* $ and $ \mathrm d\bar n/\mathrm dm \propto m^2 $ but no secondary emission.
We then have
\begin{equation}
\begin{aligned}
\bar{\mathcal E}^\mathrm P(E)
\approx
\int_{M_\mathrm q}^{M_*}\!\mathrm dm\,
\frac{\bar n_*}{M_*}\,
\left(\frac{m}{M_*}\right)^2\,
\frac{\mathrm d\dot N^\mathrm P}{\mathrm dE}(m,E)
\propto
\bar n_*
\times
\begin{cases}
E^3\,M_*^{3}
& (E < M_*^{-1}) \\
E^{-3}\,M_*^{-3}
& (M_\mathrm q^{-1} > E > M_*^{-1}) \\
q^4\,E\,M_*\,\mathrm e^{-E M_\mathrm q}
& (E > M_\mathrm q^{-1})\,,
\end{cases}
\end{aligned}
\end{equation}
the first two cases being equivalent to Eq.~\eqref{eq:slope} with $ \nu = 2 $ and $ M_\mathrm f = M_* $\,.
This dominates the primary contributions from the $ M_\mathrm f $ holes providing $ \nu > - 1 $.
For the mass range $ M < M_\mathrm c $\,, or equivalently $ m < M_\mathrm q $\,, a high-energy tail $ \propto E^{-3} $ appears for $ E > M_\mathrm q^{-1} $ but with a suppression factor $ \alpha^{-1} $ from the mass function.
Numerical investigations show that the secondary emissivity always dominates in the energy range $ E > M_\mathrm q^{-1} $\,.
Unless there is a fine-tuned upper limit, we must integrate over the mass range $ m \in [0,M_\mathrm q] $\,.
For $ E < M_\mathrm q^{-1} $\,, the emission is determined by the jet fragmentation function \eqref{eq:frag}.
For $ E > M_\mathrm q^{-1} $\,, there is an effective upper cut-off at $ m \sim E^{-1} $\,, this necessarily being below $ M_\mathrm q $\,.
We therefore have
\begin{equation}
\begin{aligned}
\bar{\mathcal E}^\mathrm S(E)
\approx
\int_0^{M_\mathrm q}\!\mathrm dm\,
\frac{\bar n_*}{\alpha\,M_*}\,
\left(\frac{m}{M_*}\right)^2\,
\frac{\mathrm d\dot N^\mathrm S}{\mathrm dE}(m,E)
\propto
\frac{\bar n_*}{\alpha}
\times
\begin{cases}
q^4\,E\,M_*
& (E < M_\mathrm q^{-1}) \\
E^{-3}\,M_*^{-3}
& (E > M_\mathrm q^{-1})\,.
\end{cases}
\end{aligned}
\label{eq:em_pl}
\end{equation}
Figure~\ref{fig:em_pl} shows the averaged emissivity for extended mass functions with $ \nu = -5/2 $ and $ 2 $.
The primary emissivity is divided into the three contributions mentioned above: $ M > 1.25 M_* $\,, $ M_\mathrm c < M < 1.25 M_* $\,, and $ M < M_\mathrm c $\,.
\begin{figure}[htb]
\includegraphics[scale=0.65]{em_pl1.eps}
\includegraphics[scale=0.65]{em_pl2.eps} \\
\includegraphics[scale=0.65]{em_pl_cutoff1.eps}
\includegraphics[scale=0.65]{em_pl_cutoff2.eps}
\caption{\label{fig:em_pl}
Top: Averaged emissivity $ \bar{\mathcal E}(E) $ for extended mass functions with $ \nu = -5/2 $ (left) and $ 2 $ (right).
Bottom: Averaged emissivity $ \bar{\mathcal E}(E) $ for extended mass functions with $ \nu = -5/2 $ and fine-tuned upper (a) or lower (b) cutoffs.
}
\end{figure}
For a fine-tuned upper cut-off at $ M_\mathrm{max} < M_\mathrm c $\,, or $ m_\mathrm{max} < M_\mathrm q $\,, one has
\begin{equation}
\begin{aligned}
\bar{\mathcal E}^\mathrm S(E)
\approx
\int_0^{m_{max}}\!\mathrm dm\,
\frac{\bar n_*}{\alpha\,M_*}\,
\left(\frac{m}{M_*}\right)^2\,
\frac{\mathrm d\dot N^\mathrm S}{\mathrm dE}(m,E)
\propto
\frac{\bar n_*}{\alpha}
\times
\begin{cases}
q^2\,E\,m_\mathrm{max}^2\,M_*^{-1}
& (E < M_\mathrm q^{-1}) \\
E^{-1}\,m_\mathrm{max}^2\,M_*^{-3}
& (M_\mathrm q^{-1} < E < m_\mathrm{max}^{-1}) \\
E^{-3}\,M_*^{-3}
& (E > m_\mathrm{max}^{-1})\,.
\end{cases}
\end{aligned}
\end{equation}
For a fine-tuned lower cut-off at $ M_\mathrm{min} < M_\mathrm c $ or $ m_\mathrm{min} < M_\mathrm q $\,, one has
\begin{equation}
\begin{aligned}
\bar{\mathcal E}^\mathrm S(E)
\approx
\int_{m_\mathrm{min}}^{M_\mathrm q}\!\mathrm dm\,
\frac{\bar n_*}{\alpha\,M_*}\,
\left(\frac{m}{M_*}\right)^2\,
\frac{\mathrm d\dot N^\mathrm S}{\mathrm dE}(m,E)
\propto
\frac{\bar n_*}{\alpha}
\times
\begin{cases}
q^4\,E\,M_*
& (E < M_\mathrm q^{-1}) \\
E^{-1}\,m_\mathrm{min}^2\,M_*^{-3}
& (M_\mathrm q^{-1} < E < m_\mathrm{min}^{-1}) \\
E\,m_\mathrm{min}^4\,M_*^{-3}\,\mathrm e^{-Em_\mathrm{min}}
& (E > m_\mathrm{min}^{-1})\,.
\end{cases}
\end{aligned}
\end{equation}
The emissivity in these two cases is shown in Fig.~\ref{fig:em_pl}(a) for $ \mu_\mathrm{max} = 0.01 $ and Fig.~\ref{fig:em_pl}(b) for $ \mu_\mathrm{min} = 0.01 $.
In both cases we assume $ \nu = -5/2 $.
As expected, only in the first case is there a power-law high-energy tail.
The sum of these effectively gives the emissivity \eqref{eq:em_pl} for an extended mass function without fine-tuned cut-offs.
\subsection{
Emissivity for critical collapse mass function
}
As a specific example of an extended mass function with $ M_\mathrm f \gg M_* $\,, we assume that the PBHs form from critical collapse and have the mass function given by Eq.~\eqref{eq:currmf_cc} and shown in Fig.~\ref{fig:mfs_cc}.
We write this as
\begin{equation}
\frac{\mathrm d\bar n}{\mathrm dm}
= \beta(M_\mathrm f)\,A\,m^2\,M(m)^{1/c-3}\,\exp[-B\,M(m)^{1/c}]
\propto
\begin{cases}
m^{1/c -1}\,\exp[-B\,m^{1/c}]
& (m \gg M_*) \\
m^2
& (m < M_*)\,,
\end{cases}
\end{equation}
where $ c \approx 0.35 $, $ A $ and $ B $ are constants, and the exponential term gives an effective upper cut-off at $ M_\mathrm f \approx B^{-c} $\,.
In the $ m < M_* $ regime, although $ M $ itself depends weakly on $ m $\,, the power of $ M $ before the exponential term is only $ -0.15 $, so the main dependence comes from the $ m^2 $ term.
The emissivity can now be modelled analytically by using Eq.~\eqref{eq:slope} with $ \nu = 1.85 $.
This gives the primary emissivity
\begin{equation}
\bar{\mathcal E}^\mathrm P(E)
\propto
\bar n_*
\times
\begin{cases}
E^3\,M_\mathrm f^{5.85}\,M_*^{-2.85}
& (E < M_\mathrm f^{-1}) \\
E^{-2.85}\,M_*^{-2.85}
& (M_*^{-1} > E > M_\mathrm f^{-1}) \\
E\,M_*\,\mathrm e^{-E M_*}
& (E > M_*^{-1})\,.
\end{cases}
\end{equation}
In our numerical analysis, we compute the emissivity for $ \gamma\,M_\mathrm f = 10^{16}\,\mathrm g $\,, $ 10^{15}\,\mathrm g $\,, and $ 2 \times 10^{14}\,\mathrm g $ and the results are shown in Fig.~\ref{fig:em_cc} for $ \beta = 10^{-27} $\,, the maximum value allowed by the extragalactic $ \gamma $-ray background.
The primary components all show the expected $ E^3 $ rise below $ M_\mathrm f^{-1} $ and $ E^{-2.85} $ fall above $ M_\mathrm f^{-1} $\,.
The secondary components are still given by Eq.~\eqref{eq:em_pl} and show the usual $ E^{-3} $ fall above $ M_\mathrm q^{-1} $\,.
\begin{figure}[htb]
\includegraphics[scale=0.65]{em_cc1.eps}
\includegraphics[scale=0.65]{em_cc2.eps} \\
\includegraphics[scale=0.65]{em_cc3.eps}
\caption{\label{fig:em_cc}
The average emissivity $ \bar{\mathcal E}(E) $ for critical collapse with the peak mass scale $ \gamma\,M_\mathrm f = 10^{16}\,\mathrm g $ (top-left), $10^{15}\,\mathrm g $ (top-right), and $ 2 \times 10^{14}\,\mathrm g $ (bottom), respectively.
}
\end{figure}
\section{\label{sec:constraint}
Constraints
}
\subsection{
Observations
}
First, we summarize the data on the Galactic $ \gamma $-ray background from both EGRET and Fermi.
An important difference is that the Fermi data extend well above $ 250\,\mathrm{MeV} $\,.
If such high energy photons are generated by PBHs, it could only be as a result of their secondary emission.
However, in this regime most of the energy is degraded into lower energy particles, so the strongest limit may still come from observations at $ 250\,\mathrm{MeV} $\,.
The observed $ \gamma $-ray sky is regarded as the sum of Galactic and extragalactic components.
An analysis of the Fermi LAT data \cite{Ackermann:2014usa} has determined the spectrum of the Diffuse Galactic Emission (DGE) averaged over Galactic latitudes $ |b| \geq 20^\circ $\,.
In this analysis, the DGE is modeled as the sum of interstellar photons inverse-Compton scattered by cosmic-ray electrons, pion decays, bremsstrahlung due to the interactions of hydrogen atoms with cosmic rays, and other processes.
We shall require the $ \gamma $-ray background from Galactic PBHs to be below the astrophysical DGE, as illustrated in Fig.~\ref{fig:flux_ext}.
\begin{figure}[htb]
\includegraphics[scale=0.65]{flux_cc.eps}
\includegraphics[scale=0.65]{flux_pl.eps}
\caption{\label{fig:flux_ext}
Comparison of the $ \gamma $-ray fluxes from PBHs with extended mass functions averaged over the latitudes $ |b| \geq 20^\circ $ with the Fermi LAT observation \cite{Ackermann:2014usa} for (a) a critical mass function with different upper cut-offs and (b) an extended mass function with different lower cut-offs.
}
\end{figure}
\subsection{
Wright and Lehoucq \textit{et al.} analyses
}
Constraints on the PBH scenario from EGRET observations of the Galactic $ \gamma $-ray background were first studied by Wright \cite{1996ApJ...459..487W} and Lehoucq \textit{et al.} \cite{Lehoucq:2009ge}.
Wright derived limits on the PBH clustering factor and explosion rate, while Lehoucq \textit{et al.} limited the PBH collapse fraction and density parameter.
However, both these analyses omitted one important feature.
Whereas the strongest constraint from the extragalactic background comes from the time-integrated contribution of PBHs with \textit{initial} mass $ M_* $\,, the Galactic background does not constrain these PBHs at all, since they no longer exist.
Rather it constrains PBHs with \textit{current} mass of around $ M_* $\,, since these are the ones which contribute to this background.
For example, putting $ m = M_* $ in Eq.~\eqref{eq:mmu} gives
\begin{equation}
\mu
= (2-0.05)^{1/3} - 1
\approx
0.25\,,
\end{equation}
so the initial mass is $ 1.25\,M_* $\,.
More precisely, since the emission from PBHs with initial mass $ (1+\mu)\,M_* $ currently peaks at an energy $ E \approx 100\,(3 \mu)^{-1/3}\,\mathrm{MeV} $ for $ 1 > \mu > 0.02 $\,, this is in the EGRET range of $ 70\,\mathrm{MeV}\textnormal{--}150\,\mathrm{GeV} $ for $ 0.7 > \mu > 0.08 $.
Secondary emission can be neglected in this regime, as assumed by the earlier analyses, since this is important only for $ \mu < 0.005 $.
Although Fermi observations extend well past the QCD threshold, so we take this into account in the analysis below, we note that the high-energy tail of secondary emission from low-mass holes at $ E \gtrsim 1/M_\mathrm q $ is \emph{irrelevant} for current purposes.
This is because the high-energy tail of the $ \gamma $-ray flux obeys a power-law $ I \propto E\,\mathcal E(E) \propto E^{-2} $\,, while the spectrum of the observed Galactic $ \gamma $-rays is shallower than $ E^{-2} $\,, so the flux just below the start of the tail is most crucial for constraining PBHs.
\subsection{
Constraints for extended and critical collapse PBH mass spectrum
}
Constraints are conveniently expressed in terms of the fraction of the Universe collapsing into PBHs of mass $ M $ at the formation epoch $ t_\mathrm f $\,.
This is denoted by $ \beta(M) $ but the definition of this quantity requires care if the mass function is extended.
Ignoring evaporations, the current number density of PBHs with mass around $ M $ is roughly related to the comoving cosmologically averaged mass function by
\begin{equation}
\bar n
= M\,\frac{\mathrm d\bar n}{\mathrm dM}(M)\,.
\end{equation}
This is related to the collapse fraction by
\begin{equation}
\beta(M)
\approx
1.05 \times 10^{-29}\,
\gamma^{-1/2}\,\left(\frac{g_{*\mathrm f}}{106.75}\right)^{1/4}\,
\left(\frac{M}{M_*}\right)^{3/2}\,
\left(\frac{\bar n}{1\,\mathrm{pc}^{-3}}\right)\,,
\end{equation}
where $ \gamma $ is the mass of the black hole relative to the particle horizon mass at formation and the factor $ g_{*\mathrm f} $ is the number of relativistic degrees of freedom then.
The latter is normalized to the value at $ 10^{-5}\,\mathrm s $\,, since it does not increase much before that in the standard model, and this is the period when PBHs are expected to form.
The current density parameter for PBHs which have not yet evaporated is then
\begin{equation}
\Omega_\mathrm{PBH}
\approx
\left(\frac{\beta(M)}{1.15 \times 10^{-8}}\right)\,
\gamma^{1/2}\,
\left(\frac{h}{0.72}\right)^{-2}\,
\left(\frac{g_{*\mathrm f}}{106.75}\right)^{-1/4}\,
\left(\frac{M}{M_\odot}\right)^{-1/2}\,.
\end{equation}
Note that $ \beta(M) $ refers to PBHs within a mass-band $ \Delta M \sim M $ around $ M $\,.
This is distinct from the fraction of mass in PBHs smaller than $ M $ (for $ \nu > -2 $) or larger than $ M $ (for $ \nu < -2 $), although these quantities are the same up to a numerical factor.
For a power-law mass function \eqref{eq:mf_pl}, we have
\begin{equation}
\beta(M)
= \beta(M_*)\,\left(\frac{M}{M_*}\right)^{5/2+\nu}
\approx
10^{-27}\,
\gamma^{-1/2}\,
\left(\frac{g_{*\mathrm f}}{106.75}\right)^{1/4}
\left(\frac{M}{M_*}\right)^{5/2+\nu}\,
\left(\frac{\bar n_*}{96.5\,\mathrm{pc}^{-3}}\right)\,,
\end{equation}
where the value of $ \beta(M_*) $ is relevant to the Galactic $ \gamma $-ray background.
In calculating this background, it is sometimes interesting to assume the mass function has a lower cutoff at $ M_\mathrm{min} = (1+\mu_\mathrm{min})\,M_* $ or an upper cutoff at $ M_\mathrm{max} = (1+\mu_\mathrm{max})\,M_* $\,.
The intensity $ I \equiv E\,\Phi(E) $ for various extended mass function scenarios are shown in Fig.~\ref{fig:flux_ext}.
(a) applies for the critical collapse scenario with $ c = 0.35 $ (i.e.\ $ \nu = 1.85 $) and different values of $ M_\mathrm f $\,, (b) for mass functions with $ \nu = -5/2 $ and different values of $ \mu_\mathrm{min} $\,, a completely extended initial mass function corresponding to $ \mu_\mathrm{min} = 0 $.
Each of the curves is normalised to have the maximum flux compatible with the Fermi LAT observations.
As indicated in Fig.~\ref{fig:ul_ext}(a), for each value of $ \nu $\,, we can constrain $ \beta(M_\mathrm f) $ as a function of $ M_\mathrm f $ and this also shows the value of $ M_\mathrm f $ required for the PBHs to comprise the dark matter.
Figure~\ref{fig:ul_ext}(b) shows the limits as a function of $ M_\mathrm{min} $\,.
Figure~\ref{fig:uln_ext} shows the constraint on the number of $ M \approx M_* $ black holes as a function of $ \mu_\mathrm{min} $ for different values of $ \nu $\,.
The limit from the Milagro search for high-energy bursts \cite{Abdo:2014apa,MacGibbon:2015mya} depends on the timescale of the burst but it is always above $ 5 \times 10^4\,\mathrm{pc}^{-3}\,\mathrm{yr}^{-1} $ and weaker than the $ \gamma $-ray limit.
\begin{figure}[htb]
\includegraphics[scale=0.65]{ul_cc.eps}
\includegraphics[scale=0.65]{ul_pl.eps}
\caption{\label{fig:ul_ext}
Upper limits from Galactic $ \gamma $-ray background on (a) $ \beta(M_\mathrm{min}) $ and (b) $ \beta(M_\mathrm f) $ for different values of $ \nu $ (including the critical case with $ \nu = 1.85 $).
The (generally weaker) limit from the extragalactic background is also shown for comparison.
}
\end{figure}
\begin{figure}[htb]
\includegraphics[scale=0.65]{ul_pl_n.eps}
\caption{\label{fig:uln_ext}
Upper limits on number density of PBHs for an extended initial mass function with a lower cut-off at a mass $ M_\mathrm{min} $ just above $ M_* $ as a function of $ \mu_\mathrm{min} $\,.
If there is no lower cut-off, the effective value of $ \mu_\mathrm{min} $ is $ 0 $.
}
\end{figure}
\subsection{
Constraints on nearly monochromatic PBH mass spectrum from Galactic background
}
The intensity $ I \equiv E\,\Phi(E) $ can be calculated using the emissivities shown in Fig.~\ref{fig:em_mono} and this leads to the curves shown in Fig.~\ref{fig:flux_mono} for $ \Delta = 0.1 $ and different values of $ M_\mathrm f $\,.
Each of them is normalised to have the maximum flux compatible with the Fermi LAT observations.
In Fig.~\ref{fig:ul_mono}, upper limits on $ \beta(M_\mathrm f) $ are shown for various values of $ \Delta $\,.
For $ \Delta > 0.005 $, over almost the entire mass range $ M_\mathrm c < M_\mathrm f < M_\mathrm c/(1-\Delta) $\,, an extensive low-mass tail is formed and the secondary emission from the holes at $ m \approx M_\mathrm q $ is significant.
The upper limit on $ \beta(M_\mathrm f) $ can then be written as
\begin{equation}
\beta(M_\mathrm f)
\lesssim
5 \times 10^{-26}\,
\left(\frac{\Delta}{0.1}\right)\,
\left(\frac{M_\mathrm f}{M_*}\right)^{5/2}
\quad
(M_\mathrm c < M_\mathrm f < M_\mathrm c/(1-\Delta))\,.
\end{equation}
As $ (1-\Delta)\,M_\mathrm f $ increases beyond $ M_\mathrm c $\,, the primary emission, peaking at $ E^\mathrm P = 6/[(1-\Delta)\,M_\mathrm f] $\,, becomes responsible for the constraint instead of the secondary emission.
The weakening of the constraint at that mass explains the kinks in Fig.~\ref{fig:ul_mono}.
Since the Fermi LAT observation of the Galactic background extend only down to $ 100\,\mathrm{MeV} $\,, the constraint on $ \beta $ due to the primary emission derives from the Wien tail and therefore weakens exponentially.
It roughly fits
\begin{equation}
\beta(M_\mathrm f)
\lesssim
10^{-27}\,\exp\left(\frac{\tilde\chi\,(1-\Delta)\,M_\mathrm f}{M_*}\right)
\quad
(M_\mathrm f > M_\mathrm c/(1-\Delta))
\end{equation}
with $ \tilde\chi \approx 2 $.
The extragalactic constraint \cite{Carr:2009jm} is also shown in Fig.~\ref{fig:ul_mono}.
It is clear that this is weaker than the Galactic one below a value of $ M_\mathrm f $ which depends on $ \Delta $ and increases as $ \Delta $ increases.
\begin{figure}[htb]
\includegraphics[scale=0.65]{flux_mono.eps}
\caption{\label{fig:flux_mono}
Comparison of the $ \gamma $-ray fluxes from PBHs, averaged over latitudes $ |b| \geq 20^\circ $, with the Fermi LAT observations \cite{Ackermann:2014usa} for nearly monochromatic initial mass functions with different values of $ M_\mathrm f $ and $ \Delta = 0.1 $.
}
\end{figure}
\begin{figure}[htb]
\includegraphics[scale=0.65]{ul_mono.eps}
\caption{\label{fig:ul_mono}
Upper limits on $ \beta $ with respect to the mass scale $ M_\mathrm f $ for a nearly monochromatic initial mass function with different values of $ \Delta $\,.
Upper limits only exist for $ M_\mathrm f > M_* $\,.
Also plotted is the constraint from the extragalactic $ \gamma $-ray background (EGRB) obtained in this case.
For each $ \Delta $\,, the limit has a kink at $ M_\mathrm f = M_\mathrm c/(1-\Delta) $\,, where the secondary emission stops.
The limits are $ \propto (M_\mathrm f/M_*)^{5/2} $ below the critical mass but become exponentially weaker above that.
}
\end{figure}
Finally, we briefly discuss the transition to monochromaticity.
As regards the mass range where primary emission dominates, the constraint clearly converges as $ \Delta \to 0 $ to the value obtained in the monochromatic case.
On the other hand, the secondary emissivity increases in proportion to $ \Delta^{-1} $ as long as an extensive low-mass tail is formed.
This implies that the constraint becomes unboundedly stronger as $ \Delta \to 0 $ in the mass range $ M_* < M_\mathrm f < (1+\Delta)\,M_* $ in contrast to the monochromatic case where no mass tail emerges.
\section{\label{sec:conclusion}
Conclusions
}
In this paper we have placed constraints on the number of PBHs with mass around $ M_* $ from observations of the Galactic $ \gamma $-ray background.
There are other sources of such a background, including decaying or annihilating WIMPs, so PBHs are not definitely the explanation.
On the other hand, the observed background certainly provides the strongest constraint on the PBH density in this mass range.
In particular, it is stronger than the limit from the extragalactic gamma-ray background.
Whereas the extragalactic background comes from the time-integrated emission of all the PBHs within the particle horizon and is dominated by those with initial mass $ M_* $\,, the Galactic background comes from the instantaneous emission of all the PBHs within the Galactic halo and with initial mass slightly larger than $ M_* $\,.
However, their \textit{current} mass is smaller than $ M_* $\,, the Galactic background being dominated by the low mass tail ($ \mathrm dn/\mathrm dm \propto m^2 $) of the PBHs which have not quite completed their evaporation.
By contrast, the high-energy tail ($ \mathrm dN/\mathrm dE \propto E^{-3} $) of the extragalactic background derives from the PBHs which have just completed their evaporation, so these two components are complementary.
Our previous analysis of PBH constraints \cite{Carr:2009jm} assumed that the PBHs have a monochromatic mass function (i.e.\ a mass spread $ \Delta m $ no larger than $ m $).
However, this is inappropriate in calculating the Galactic background because the dominant contribution comes from the low-mass tail, which only represents a very narrow part of the original mass range.
Even if one expects the PBH mass spectrum to be monochromatic, there is no \textit{a priori} reason why it should encompass the particular mass $ M_* $\,.
Therefore we have focused mainly on the possibility of an extended mass spectrum, although we have also covered the nearly monochromatic scenario in order to allow comparison with the results in our previous paper \cite{Carr:2009jm}.
A particularly interesting extended mass spectrum scenario arises if the PBHs form from critical collapse.
In this case, the spectrum can be predicted very precisely and the PBH density increases with $ m $ up to some limiting mass $ M_\mathrm f $\,.
This means that the largest (unevaporated) PBHs could provide the dark matter without the $ M_* $ ones contravening the Galactic background limit.
However, this still requires fine-tuning of the mass $ M_\mathrm f $\,, since it cannot be much larger than $ M_* $\,.
Finally, it should be stressed that the analysis of this paper has shed light on a number of issues which go beyond the Galactic background problem itself.
For example, we have determined the mass $ M_\mathrm q $ at which secondary emission becomes important and the initial mass $ M_\mathrm c $ below which PBHs have evaporated to $ M_\mathrm q $ by the present epoch.
We have also calculated the ratio of the primary and secondary emission as a function of $ M $\,, and the form of the low-mass tail of currently evaporating PBHs and its connection to the high-energy tail.
This has allowed us to predict the Galactic backgrounds generated in many PBH scenarios analytically, thereby clarifying the results of our detailed numerical calculations.
\begin{acknowledgments}
B.C.\ thanks Research Center for the Early Universe (RESCEU), University of Tokyo, for hospitality received during this work.
This work is supported in part by MEXT KAKENHI Grant Nos.~15H05889, 16H00877 (K.K.) 15H05888 (J.Y.), and by JSPS KAKENHI Grant Nos.~26105520, 26247042 (K.K.), 24111701, 26800115, 16K17675 (Y.S.), 15H02082 (J.Y.).
The work of K.K.\ is also supported by the Center for the Promotion of Integrated Science (CPIS) of Sokendai (1HB5804100).
\end{acknowledgments}
\bibliographystyle{apsrev4-1}
|
\section{Introduction}
Recently, bidirectional long short-term memory networks (bi-LSTM)~\cite{graves:schmidhuber:2005,Hochreiter:Schmidhuber:97} have been used for
language modelling \cite{ling:ea:2015}, POS tagging \cite{ling:ea:2015,wang:ea:2015:arxiv}, transition-based dependency parsing \cite{ballesteros:ea:2015,kiperwasser:goldberg:2016}, fine-grained sentiment analysis \cite{Liu:ea:15}, syntactic chunking \cite{Huang:ea:15}, and semantic role labeling \cite{Zhou:Xu:15}. LSTMs are recurrent neural networks (RNNs) in which layers are designed to prevent vanishing gradients. Bidirectional LSTMs make a backward and forward pass through the sequence before passing on to the next layer. For further details, see \cite{goldberg-primer,cho-primer}.
We consider using bi-LSTMs for POS tagging. Previous work on using deep learning-based methods for POS tagging has focused either on a single language~\cite{Collobert:ea:2011natural,wang:ea:2015:arxiv} or a small set of languages~\cite{ling:ea:2015,santos:zadrozny:2014}. Instead we evaluate our models across 22 languages.
In addition, we compare performance with representations at different levels of granularity (words, characters, and bytes).
These levels of representation were previously introduced
in different efforts \cite{chrupala:2013,zhang:ea:2015:char,ling:ea:2015,santos:zadrozny:2014,gillick:ea:2016,kim2015character}, but a comparative evaluation was missing.
Moreover, deep networks are often said to require large volumes of training data. We investigate to what extent bi-LSTMs are more sensitive to the amount of training data and label noise than
standard POS taggers.
Finally, we introduce a novel model, a bi-LSTM trained with auxiliary loss. The model jointly predicts the POS and the log frequency of
the word. The intuition behind this model is that the auxiliary loss, being predictive of word frequency, helps to differentiate the representations of rare and common words.
We indeed observe performance gains on rare and out-of-vocabulary words. These performance gains transfer into general improvements for morphologically rich languages.
\paragraph{Contributions} In this paper, we a) evaluate the effectiveness of different representations in bi-LSTMs,
b) compare these models across a large set of languages and under varying conditions (data size, label noise) and
c) propose a novel bi-LSTM model with auxiliary loss (\textsc{Logfreq}).
\section{Tagging with bi-LSTMs}
Recurrent neural networks (RNNs)~\cite{elman:1990} allow the computation of fixed-size vector representations for word sequences of arbitrary length.
An RNN is a function that reads in $n$ vectors $x_1,...,x_n$ and produces an output vector $h_n$, that depends on the entire sequence $x_1,...,x_n$.
The vector $h_n$ is then fed as an input to some classifier, or higher-level RNNs in stacked/hierarchical models.
The entire network is trained jointly such that the hidden representation captures the important information from the sequence for the prediction task.
A bidirectional recurrent neural network (bi-RNN)~\cite{graves:schmidhuber:2005} is an extension of an RNN that reads the input sequence twice,
from left to right and right to left, and the encodings are concatenated.
The literature uses the term bi-RNN to refer to two related architectures, which we refer to here as ``context bi-RNN'' and ``sequence bi-RNN''.
In a sequence bi-RNN (bi-RNN$_{\text{seq}}$), the input is a sequence of vectors $x_{1:n}$ and the output is a concatenation ($\circ$) of a forward ($f$) and reverse ($r$)
RNN each reading the sequence in a different directions:
\[ \scalebox{.95}{$ v = \text{bi-RNN}_\text{seq}(x_{1:n}) = \text{RNN}_f(x_{1:n}) \circ \text{RNN}_r(x_{n:1}) $} \]
In a context bi-RNN (bi-RNN$_{\text{ctx}}$), we get an additional input $i$ indicating a sequence position, and the resulting vectors $v_i$ result from concatenating the RNN encodings up to $i$:
\[ \scalebox{.93}{$ v_i = \text{bi-RNN}_\text{ctx}(x_{1:n},i) = \text{RNN}_f(x_{1:i}) \circ \text{RNN}_r(x_{n:i}) $} \]
Thus, the state vector $v_i$ in this bi-RNN encodes information
at position $i$ and its entire sequential context.
Another view of the context bi-RNN is of taking a sequence $x_{1:n}$ and returning the corresponding sequence of state vectors $v_{1:n}$.
LSTMs \cite{Hochreiter:Schmidhuber:97} are a variant of RNNs that replace the cells of RNNs
with LSTM cells that were designed to prevent vanishing gradients.
Bidirectional LSTMs are the bi-RNN counterpart based on LSTMs.
Our basic bi-LSTM tagging model is a context bi-LSTM taking as input word embeddings $\vec{w}$.
We incorporate subtoken information using an hierarchical bi-LSTM architecture~\cite{ling:ea:2015,ballesteros:ea:2015}.
We compute subtoken-level (either characters $\vec{c}$ or unicode byte $\vec{b}$) embeddings of words
using a sequence bi-LSTM at the lower level. This representation is then concatenated with the (learned) word
embeddings vector $\vec{w}$ which forms the input to the context bi-LSTM at the next layer.
This model, illustrated in Figure~\ref{fig:bilstm} (lower part in left figure), is inspired by~\newcite{ballesteros:ea:2015}.
We also test models in which we only keep sub-token information, e.g., either both byte and character
embeddings (Figure~\ref{fig:bilstm}, right) or a single (sub-)token representation alone.
\begin{figure}[ht!]\centering
\includegraphics[width=1.0\columnwidth]{bilstm2}
\caption{Right: bi-LSTM, illustrated with $\vec{b}+\vec{c}$ (bytes and characters), for $\vec{w}+\vec{c}$ replace $\vec{b}$ with words $\vec{w}$. Left: \textsc{Freqbin}, our multi-task bi-LSTM that predicts at every time step the tag and the frequency class for the token.}
\label{fig:bilstm}
\end{figure}
In our novel model, cf.\ Figure~\ref{fig:bilstm} left, we train the bi-LSTM tagger to predict both the tags of the sequence, as well as a label that represents the log frequency of the token as estimated from the training data. Our combined cross-entropy loss is now: $L(\hat{y_t},y_t) + L(\hat{y_{a}},y_{a})$, where $t$ stands for a POS tag and $a$ is the log frequency label, i.e., $a=int(log(freq_{train}(w))$.
Combining this log frequency objective with the tagging task can be seen as an instance of multi-task learning in which the labels are predicted jointly.
The idea behind this model is to make the representation predictive for frequency, which encourages the model to not share representations between common and rare words, thus benefiting the handling of rare tokens.
\section{Experiments}
All bi-LSTM models were implemented in CNN/pycnn,\footnote{\url{https://github.com/clab/cnn}} a flexible neural network library. For all models we use the same hyperparameters, which were set on English dev, i.e., SGD training with cross-entropy loss, no mini-batches, 20 epochs, default learning rate (0.1), 128 dimensions for word embeddings, 100 for character and byte embeddings, 100 hidden states and Gaussian noise with $\sigma$=0.2. As training is stochastic in nature, we use a fixed seed throughout. Embeddings are not initialized with pre-trained embeddings, except when reported otherwise. In that case we use off-the-shelf \texttt{polyglot} embeddings~\cite{polyglot:2013}.\footnote{\url{https://sites.google.com/site/rmyeid/projects/polyglot}} No further unlabeled data is considered in this paper. The code is released at: \url{https://github.com/bplank/bilstm-aux}
\paragraph{Taggers} We want to compare POS taggers under varying conditions. We hence use three different types of taggers: our implementation of a bi-LSTM; \textsc{Tnt}~\cite{brants2000tnt
---a second order HMM with suffix trie handling for OOVs. We use \textsc{Tnt} as it was among the best performing taggers evaluated in~\newcite{horsmann:ea:2015}.\footnote{They found TreeTagger was closely followed by HunPos, a re-implementation of TnT, and Stanford and ClearNLP were lower ranked. In an initial investigation, we compared Tnt, HunPos and TreeTagger and found Tnt to be consistently better than Treetagger, Hunpos followed closely but crashed on some languages (e.g., Arabic).} We complement the NN-based and HMM-based tagger with a CRF tagger, using a freely available implementation~\cite{Plank:ea:14:coling} based on \texttt{crfsuite}.
\subsection{Datasets}
For the multilingual experiments, we use the data from the Universal Dependencies project v1.2~\cite{universal1.2} (17 POS) with the canonical data splits.
For languages with token segmentation ambiguity we use the provided gold segmentation. If there is more than one treebank per language, we use the treebank that has the canonical language name (e.g., \emph{Finnish} instead of \emph{Finnish-FTB}).
We consider all languages that have at least 60k tokens and are distributed with word forms, resulting in 22 languages.
We also report accuracies on WSJ (45 POS) using the standard splits~\cite{Collins:02,Manning:11}. The overview of languages is provided in Table~\ref{tbl:lang}.
\begin{table}
\resizebox{\columnwidth}{!}{
\begin{tabular}{lll|lll}
\toprule
& \textsc{coarse} & \textsc{fine} & & \textsc{coarse} & \textsc{fine}\\
\midrule
ar & non-IE & Semitic & he & non-IE & Semitic\\
bg & Indoeuropean & Slavic & hi & Indoeuropean & Indo-Iranian\\
cs & Indoeuropean & Slavic & hr & Indoeuropean & Slavic\\
da & Indoeuropean & Germanic & id & non-IE &Austronesian \\
de & Indoeuropean & Germanic & it & Indoeuropean & Romance\\
en & Indoeuropean & Germanic & nl & Indoeuropean & Germanic\\
es & Indoeuropean & Romance & no & Indoeuropean & Germanic\\
eu & Language isolate & & pl & Indoeuropean & Slavic\\
fa & Indoeuropean & Indo-Iranian & pt & Indoeuropean & Romance\\
fi & non-IE & Uralic & sl & Indoeuropean & Slavic\\
fr & Indoeuropean & Romance & sv & Indoeuropean & Germanic\\
\bottomrule
\end{tabular}
}
\caption{Grouping of languages.}
\label{tbl:lang}
\end{table}
\subsection{Results}
Our results are given in Table~\ref{tbl:results}. First of all, notice that \textsc{TnT} performs remarkably well across the 22 languages, closely followed by CRF. The bi-LSTM
tagger ($\vec{w}$) without lower-level bi-LSTM for subtokens falls short, outperforms the traditional taggers only on 3 languages. The bi-LSTM model clearly benefits from character
representations. The model using characters alone ($\vec{c}$) works remarkably well, it improves over \textsc{TnT} on 9 languages (incl.\ Slavic and Nordic languages). The combined word+character representation
model is the best representation, outperforming the baseline on all except one language (Indonesian), providing strong results already without pre-trained embeddings. This model (${\vec{w}+\vec{c}}$) reaches the biggest improvement (more than +2\% accuracy) on Hebrew and Slovene.
Initializing the word embeddings (+\textsc{Polyglot}) with off-the-shelf language-specific embeddings further improves accuracy.
The only system we are aware of that evaluates on UD is~\newcite{gillick:ea:2016} (last column). However, note that these results are not strictly comparable as they use the earlier UD v1.1 version.
The overall best system is the multi-task bi-LSTM \textsc{freqbin} (it uses ${\vec{w}+\vec{c}}$ and \textsc{Polyglot} initialization for $\vec{w}$).
While on macro average it is on par with bi-LSTM ${\vec{w}+\vec{c}}$, it obtains the best results on 12/22 languages, and it is successful in predicting POS for OOV tokens
(cf.\ Table~\ref{tbl:results} \textsc{OOV Acc} columns), especially for languages like Arabic, Farsi, Hebrew, Finnish.
We examined simple RNNs and confirm the finding of \newcite{ling:ea:2015} that they performed worse than their LSTM counterparts.
Finally, the bi-LSTM tagger is competitive on WSJ, cf.\ Table~\ref{tbl:WSJ}.
\paragraph{Rare words} In order to evaluate the effect of modeling sub-token information, we examine accuracy rates at different frequency rates.
Figure~\ref{fig:logfreq} shows absolute improvements in accuracy of bi-LSTM $\vec{w}+\vec{c}$ over mean log frequency, for different language families. We see that especially for Slavic and non-Indoeuropean languages, having high morphologic complexity, most of the improvement is obtained in the Zipfian tail. Rare tokens benefit from the sub-token representations.
\begin{figure}[h!]
\includegraphics[width=\columnwidth]{logfreqaccuracy.png}
\caption{Absolute improvements of bi-LSTM ($\vec{w}+\vec{c}$) over \textsc{Tnt} vs mean log frequency.}
\label{fig:logfreq}
\end{figure}
\begin{table*}[h!t]\centering
\resizebox{\textwidth}{!}{
\begin{tabular}{lcc|cccc|cc|cc|c}
\toprule
& \multicolumn{2}{c}{\textsc{Baselines}} & \multicolumn{4}{c}{\textsc{bi-LSTM} using:} & \multicolumn{2}{c}{\textsc{${\vec{w}+\vec{c}}$ +Polyglot}} & \multicolumn{2}{c}{\textsc{OOV Acc}} & BTS\\
& \textsc{Tnt} & \textsc{Crf} & $\vec{w}$ & $\vec{c}$ & $\vec{c}+\vec{b}$ & $\vec{w}+\vec{c} $ & bi-LSTM & \textsc{Freqbin} &bi-LSTM & \textsc{Freqbin} & \\
\midrule
avg &94.61 & 94.27 & 96.00$\dagger$ & 94.29 & 94.01 & 92.37 & \textbf{96.50} &\textbf{96.52} & 83.48 &87.98 & 95.70\\
\midrule
Indoeur. & 94.70 & 94.58 & 96.15$\dagger$ & 94.58 & 94.28 & 92.72 & \textbf{96.63} & \textbf{96.63} & 82.77 & 87.63& --\\
non-Indo. & 94.57 & 93.62 & 95.67$\dagger$ & 93.51 & 93.16 & 91.97 & 96.21 & \textbf{96.28} & 87.44 &90.39 & --\\
Germanic & 93.27& 93.21 & 95.09$\dagger$ & 92.89 & 92.59 & 91.18 & \textbf{95.55} & 95.49 & 81.22 & 85.45& --\\
Romance & 95.37& 95.53 & 96.51$\dagger$ & 94.76 & 94.49 & 94.71 & \textbf{96.93} & \textbf{96.93} & 81.31 &86.07 & --\\
Slavic & 95.64& 94.96 & 96.91$\dagger$ & 96.45 & 96.26 & 91.79 & 97.42 & \textbf{97.50} & 86.66 & 91.69& --\\
\midrule
ar & 97.82 & 97.56 & \textbf{98.91} & 98.68 & 98.43 & 95.48 & 98.87 & \textbf{98.91} & 95.04 & 96.21 & --\\
bg & 96.84 & 96.36 & 98.02 & 97.89 & 97.78 & 95.12 & \textbf{98.23} & 97.97 & 87.40 & 90.56& 97.84\\
cs & 96.82 & 96.56& 97.80 & 96.38 & 96.08 & 93.77 & 98.02 & \textbf{98.24} & 89.02& 91.30& 98.50\\
da & 94.29 & 93.83 & 96.19 & 95.12 & 94.88 & 91.96 & 96.16 & \textbf{96.35} & 77.09 & 86.35 & 95.52\\
de & 92.64 & 91.38 & 92.64 & 90.02& 90.11 & 90.33 & \textbf{93.51} & 93.38 & 81.95& 86.77 & 92.87\\
en & 92.66 & 93.35 & 94.46 & 91.62 & 91.57 & 92.10 & \textbf{95.17} & 95.16 & 71.23& 80.11 & 93.87\\
es & 94.55 & 94.23 & 95.12 & 93.06 & 92.29 & 93.60 & 95.67 & \textbf{95.74} & 71.38 & 79.27 & 95.80\\
eu & 93.35 & 91.63 & 94.70 & 92.48 & 92.72 & 88.00 & 95.38 & \textbf{95.51}& 79.87 & 84.30 & --\\
fa & 95.98 & 95.65 & 97.19 & 95.82 & 95.03 & 95.31 & \textbf{97.60} & 97.49& 80.00& 89.05 & 96.82\\
fi & 93.59 & 90.32 & 94.85 & 90.25 & 89.15 & 87.95 & 95.74 & \textbf{95.85}& 86.34 & 88.85 & 95.48\\
fr & 94.51 & 95.14 & 95.80 & 94.39 & 93.69 & 94.44 & \textbf{96.20} & 96.11& 78.09 & 83.54 & 95.75\\
he & 93.71 & 93.63 & 95.79 & 93.74 & 93.58 & 93.97 & 96.92 & \textbf{96.96}& 80.11 & 88.83 & --\\
hi & 94.53 & 96.00 & 96.23 & 93.40 & 92.99 & 95.99 & 96.97 & \textbf{97.10}& 81.19& 85.27 & --\\
hr & 94.06 & 93.16 & 94.76 &95.32 & 94.47 & 89.24 & 96.27 & \textbf{96.82}& 84.62& 92.71 & --\\
id & 93.16 & 92.96 & 93.11 & 91.37 & 91.46 & 90.48 & 93.32 & \textbf{93.41}& 88.25 & 87.67 & 92.85\\
it & 96.16 & 96.43 & 97.59 & 95.62 & 95.77 & 96.57 & 97.90 & \textbf{97.95}& 83.59 & 89.15 & 97.56\\
nl & 88.54 & 90.03 & 93.32 & 89.11 & 87.74 & 84.96 & \textbf{93.82} & 93.30& 76.62 & 75.95 & --\\
no & 96.31 & 96.21 & 97.57 & 95.87 & 95.75 & 94.39 & \textbf{98.06} & 98.03& 92.05 & 93.72 & --\\
pl & 95.57 & 93.96 & 96.41 & 95.80 & 96.19 & 89.73 & \textbf{97.63} & 97.62& 91.77 & 94.94 & --\\
pt & 96.27 & 96.32 & 97.53 & 95.96 & 96.20 & 94.24 & \textbf{97.94} & 97.90& 92.16 & 92.33 & --\\
sl & 94.92 & 94.77 & \textbf{97.55} & 96.87 & 96.77 & 91.09 & \textbf{96.97} & 96.84& 80.48& 88.94 & --\\
sv & 95.19 & 94.45 & 96.36 & 95.57 & 95.50 &93.32 & 96.60 & \textbf{96.69}& 88.37 & 89.80 & 95.57\\
\bottomrule
\end{tabular}
}
\caption{Tagging accuracies on UD 1.2 test sets. $\vec{w}$: words, $\vec{c}$: characters, $\vec{b}$: bytes.
Bold/$\dagger$: best accuracy/representation; \textsc{+Polyglot}: using pre-trained embeddings. \
\textsc{Freqbin}: our multi-task model. \textsc{OOV Acc}: accuracies on OOVs.
BTS: best results in~\newcite{gillick:ea:2016} (not strictly comparable). }
\label{tbl:results}
\end{table*}
\begin{table}\centering
\begin{small}
\begin{tabular}{lc}
\toprule
{\sc Wsj} & Accuracy\\
\midrule
Convnet \cite{santos:zadrozny:2014} & 97.32\\
Convnet reimplementation \cite{ling:ea:2015} & 96.80\\
Bi-RNN \cite{ling:ea:2015} & 95.93\\
Bi-LSTM \cite{ling:ea:2015} & 97.36\\
\midrule
Our bi-LSTM $_{\vec{w}+\vec{c}}$ & 97.22\\
\bottomrule
\end{tabular}
\end{small}
\caption{Comparison POS accuracy on WSJ; bi-LSTM: 30 epochs, $\sigma$=$0.3$, no \textsc{Polyglot}.}
\label{tbl:WSJ}
\end{table}
\paragraph{Data set size} Prior work mostly used large data sets when applying neural network based
approaches~\cite{zhang:ea:2015:char}. We evaluate how brittle such models are with respect to their more
traditional counterparts by training bi-LSTM ($\vec{w}+\vec{c}$ without Polyglot embeddings) for increasing amounts of training instances (number of sentences). The learning curves in Figure~\ref{fig:curve}
show similar trends across language families.\footnote{We observe the same pattern with more, 40, iterations.}
\textsc{TnT} is better with little data, bi-LSTM is better with more data,
and bi-LSTM always wins over CRF. The bi-LSTM model performs already surprisingly well after only 500 training sentences.
For non-Indoeuropean languages it is on par and above the other taggers with even less data (100 sentences).
This shows that the bi-LSTMs often needs more data than the generative markovian model, but this is definitely less than what we expected.
\begin{figure}
\includegraphics[width=1.0\columnwidth]{learningcurves.png}
\caption{Amount of training data (number of sentences) vs tagging accuracy. }
\label{fig:curve}
\end{figure}
\paragraph{Label Noise} We investigated the susceptibility of the models to noise, by artificially corrupting training labels.
Our initial results show that at low noise rates, bi-LSTMs and \textsc{TnT} are affected similarly, their accuracies drop to a similar degree. Only at higher noise levels (more than 30\% corrupted labels), bi-LSTMs are less robust, showing higher drops in accuracy compared to \textsc{TnT}. This is the case for all investigated language families.
\section{Related Work}
Character embeddings were first introduced by~\newcite{sutskever:ea:2011} for language modeling. Early applications include text classification~\cite{chrupala:2013,zhang:ea:2015:char}. Recently, these representations were successfully applied to a range of structured prediction tasks. For POS tagging,
\newcite{santos:zadrozny:2014} were the first to propose character-based models.
They use a convolutional neural network (CNN; or convnet) and evaluated their model on English (PTB) and Portuguese, showing that the model achieves
state-of-the-art performance close to taggers using carefully designed feature templates. \newcite{ling:ea:2015} extend this line and compare
a novel bi-LSTM model, learning word representations through character embeddings. They evaluate their model on a language modeling and POS tagging setup,
and show that bi-LSTMs outperform the CNN approach of \newcite{santos:zadrozny:2014}.
Similarly, \newcite{labeau:ea:2015} evaluate character embeddings for German.
Bi-LSTMs for POS tagging are also reported in \newcite{wang:ea:2015:arxiv}, however, they only explore word embeddings,
orthographic information and evaluate on WSJ only.
A related study is \newcite{cheng:fang:ostendorf:2015} who propose a multi-task RNN for named entity recognition by jointly predicting the
next token and current token's name label. Our model is simpler, it uses a very coarse set of labels rather then integrating an entire language modeling
task which is computationally more expensive. An interesting recent study is~\newcite{gillick:ea:2016}, they build a single byte-to-span model for multiple
languages based on a sequence-to-sequence RNN~\cite{sutskever:ea:2014} achieving impressive results. We would like to extend this work in their direction.
\section{Conclusions}
We evaluated token and subtoken-level representations for neural network-based
part-of-speech tagging across 22 languages and proposed a novel multi-task bi-LSTM
with auxiliary loss. The auxiliary loss is effective at improving the accuracy of rare words.
Subtoken representations are necessary to obtain a state-of-the-art POS
tagger, and character embeddings are particularly helpful for non-Indoeuropean and Slavic languages.
Combining them with word embeddings in a hierarchical network provides the best representation.
The bi-LSTM tagger is as effective as the CRF and HMM taggers with already as little as 500 training sentences,
but is less robust to label noise (at higher noise rates).
\section*{Acknowledgments}
We thank the anonymous reviewers for their feedback.
AS is funded by the ERC Starting Grant
LOWLANDS No.\ 313695. YG is supported by The Israeli Science Foundation (grant number 1555/15) and a Google Research Award.
|
\section{Introduction}
The surface amplitudes of $p$-mode acoustic oscillations have been known to be significantly smaller within magnetically active regions compared to those in the surrounding quiet Sun \citep{1962ApJ...135..474L,1981SoPh...69..233W,1982ApJ...253..386L,1988ESASP.286..315T,1992ApJ...393..782T}. Consequently, magnetic regions are highlighted by locations of reduced power in frequency-filtered powermaps. Several theories have been proposed to explain such power suppression. By studying the power difference of waves travelling inwards and outwards of sunspots, \citet{1987ApJ...319L..27B} found that sunspots absorb as much as 50\% of the incident acoustic waves. It was suggested that the absorbed power could either be scattered or lost due to the mode coupling of magnetoacoustic or pure magnetic waves. More recently, it has been proposed that the absorption mechanism involves partial conversion of $p$-modes into slow magnetoacoustic waves, which are channelled by magnetic fields and lost into the solar interior \citep{1995ApJ...451..372C,2003SoPh..214..201C,2003MNRAS.346..381C}. Also, convection is largely inhibited in locations of strong magnetic field \citep{1952PASP...64...98C} as evidenced in recent sunspot simulations \citep{2006ApJ...641L..73S,2009ApJ...691..640R} hence the excitation of $p$-modes by turbulent convection \citep{1977ApJ...212..243G,1988ApJ...326..462G} is less likely to be efficient in highly magnetic regions. Alternatively, it has been suggested that the acoustic wave functions are modified in the presence of magnetic fields in such a way that the attenuation length of the evanescent $p$-modes is reduced in the solar atmosphere \citep{1996ApJ...464..476J,1997ApJ...476..392H}. This mechanism reduces the observed oscillation amplitudes in magnetic regions without any loss of the actual $p$-mode power. A related effect has been discussed in \citet{2006RSPTA.364..313B} where the authors demonstrate that the existence of wave sources at greater depths in the umbral regions results in reduced oscillatory power at the surface. The possible differences in the line formation heights associated with magnetic and non-magnetic environments which will naturally give rise to different observed amplitudes, has also been discussed previously \citep{1998ApJ...504.1029H,2002A&A...387.1092J}.
As observations progress to higher cadences, it has been observed that at high frequencies ($>$5 mHz) the power is in fact enhanced surrounding magnetic regions \citep{1992ApJ...394L..65B,1992ApJ...392..739B,2002A&A...387.1092J,2007A&A...471..961M,2013SoPh..287..107R}. Similar behaviour was observed around quiet-Sun network magnetic elements \citep{2001A&A...379.1052K,2010A&A...510A..41K,2012ApJ...744...98C}. At larger heights in the atmosphere, enhanced suppression is found at higher frequencies surrounding active region \citep{2003A&A...401..685M} and quiet-Sun \citep{2001ApJ...554..424J,2007A&A...461L...1V,2010A&A...510A..41K,2013SoPh..282...67G} magnetic fields. Although the exact physical mechanism responsible for these phenomena is not yet clear, currently, the most popular theory that explains the observed features at both low and high frequencies is the interaction of acoustic $p$-mode oscillations with the embedded magnetic fields, which generates fast and slow magnetoacoustic waves in the magnetic canopy through the process of mode conversion \citep{2007A&A...471..961M,2014A&A...567A..62K,2016ApJ...817...45R}.
For this work, our main focus is on the suppression of oscillatory power within magnetic regions at low frequencies. It has been demonstrated by \citet{1998ApJ...504.1029H} and \citet{2002A&A...387.1092J} that low-frequency power suppression increases with magnetic field strength for both Doppler velocity and continuum intensity data. Using multi-height observations, \citet{2007A&A...471..961M} observed that the spatial extent of the suppression region increases with height in the solar atmosphere. More recently, through theoretical modelling work, \citet{2014ApJ...796...72J} predicted that the power deficit in the suppression region also increases with height. Here, we investigate these aspects using our high spatial- and temporal-resolution observations in four different channels obtained simultaneously with the Dunn Solar Telescope (DST). We performed a time-dependent study of the oscillatory power suppression related to a small evolving magnetic concentration that is part of an active region. We present the details of our observations and data preparation in Section~\ref{observ}, the applied analysis methods and results in Section~\ref{anres}, and finally discuss the important conclusions of this work in Section~\ref{concl}.
\section{Observations}
\label{observ}
High-resolution images of active region NOAA~11372 were obtained with the Rapid Oscillations in the Solar Atmosphere \citep[ROSA;][]{2010SoPh..261..363J} and the Hydrogen-Alpha Rapid Dynamics camera \citep[HARDcam;][]{2012ApJ...757..160J} instruments at the Dunn Solar Telescope (DST), New Mexico, on 2011 December 10, for about two hours starting from 17:51~UT. Simultaneous observations were made in four different channels; blue continuum (52{\,}{\AA} bandpass centred at 4170{\,}{\AA}), G-band (9.2{\,}{\AA} bandpass centred at 4305.5{\,}{\AA}), Ca~\textsc{ii} K line core (1{\,}{\AA} bandpass centred at 3933.7{\,}{\AA}), and H$\alpha$ line core (0.25{\,}{\AA} bandpass centred at 6562.8{\,}{\AA}), using HARDcam for H$\alpha$ and three identical ROSA cameras for the other lines. The ROSA continuum and G-band filters correspond to a minimum formation height of 25~km and 100~km \citep{2012ApJ...746..183J}, respectively, whereas the Ca~\textsc{ii} K line core forms below 1300~km \citep{1969SoPh...10...79B} and the H$\alpha$ line core originates near 1500 km \citep{1981ApJS...45..635V} above the photosphere. Note that these heights are only representative as the exact determination of line formation height is quite complex, particularly in the chromosphere \citep[for e.g., see the review by][]{2007ASPC..368...27R}.
All the images were subjected to speckle reconstruction, amongst other post-processing routines, as detailed in \citet{2014A&A...566A..99K}. The final processed cadences were 2.11~s for the continuum and G-band data, 14.81~s for the Ca~\textsc{ii}~K data, and 1.78~s for the H$\alpha$ data. For each dataset, the counts in each image were normalised to the median of that image to remove any variations in brightness due to changes in the inclination of the Sun during the observations. The seeing conditions remained excellent throughout the duration of observations, except for a brief spell of short-term atmospheric fluctuations that affected a small number of images which were manually identified and replaced through interpolation. A series of calibration images, taken along with the science observations, were used to coalign the data across the different channels. This step brings all of the data to a common plate scale (i.e., that of the blue continuum), which involved interpolating the H$\alpha$ data to match.
The corresponding line-of-sight (LOS) magnetograms, obtained from the Helioseismic and Magnetic Imager \citep[HMI;][]{2012SoPh..275..229S}, onboard the \textit{Solar Dynamics Observatory} \citep[\textit{SDO};][]{2012SoPh..275....3P}, are also used in this study. HMI data were processed following the standard \texttt{hmi\_prep} routine available through {\it{SolarSoft}}. The final pixel scale and cadence of the data were approximately $0{\,}.{\!\!}{\arcsec}6$ and 45~s, respectively. The required coalignment between the HMI and ROSA data was achieved by cross-correlating the ROSA blue continuum and HMI continuum images. This process determined the exact plate scale of the ROSA images to be $0{\,}.{\!\!}{\arcsec}0592$ per pixel.
\begin{figure}
\centering
\includegraphics[width=15cm]{f1.jpg}
\caption{Sample images of a portion of active region NOAA 11372, as observed with the ROSA and HARDcam instruments across four different channels. The overplotted contours, outer and inner, enclose the locations of HMI LOS magnetic fields with strengths $\ge$500~G and $\ge$950~G, respectively. The dashed box highlights the subfield region chosen for creating the powermaps shown in Figure~\ref{fig2}}
\label{fig1}
\end{figure}
Samples of the images for each channel are shown in Figure~\ref{fig1}. The overplotted contours represent the HMI LOS magnetic fields corresponding to 500~G and 950~G, and highlight the accuracy of the coalignment between the various channels and instruments.
\section{Analysis \& Results}
\label{anres}
Figure~\ref{fig1} shows sample images relating to a portion of active region AR~11372, as seen in the ROSA and HARDcam channels. The displayed field-of-view encompasses two pores of the same polarity, one close to the centre, and the other at the top-left corner. We consider a subfield region outlined by the dashed box in these images, which covers the central pore. This data is then subjected to wavelet analysis \citep{1998BAMS...79...61T} at each pixel in order to study the spatial distribution of oscillatory power across different period bands.
\begin{figure}
\centering
\includegraphics[width=16cm]{f2.jpg}
\caption{The columns (from left-to-right) show the intensities at the start time, time-averaged intensities and powermaps in three different period bands: 2--4 min, 4--6 min, and 6--10 min, for four different imaging channels as labelled. The overplotted contours represent HMI LOS magnetic field as described in Figure~\ref{fig1}. The dashed red box and the vertical green line mark the locations of subsequent analysis. Darker and brighter regions in the powermaps highlight locations of lower and higher oscillatory power, respectively.}
\label{fig2}
\end{figure}
Results of the wavelet analysis are shown in Figure~\ref{fig2}. Different rows in this figure correspond to different imaging channels. The first and second columns display actual intensities at the start of the time sequence and those averaged over time, respectively. Powermaps in three different period bands (2--4 min, 4--6 min, and 6--10 min) are displayed in the last three columns, which show the corresponding time-averaged oscillatory power present in these bands. The overplotted contours outline the LOS magnetic field at 500~G and 950~G, at the start of sequence (for the first column) and averaged over time (for the rest of the columns).
All the powermaps clearly show suppression of oscillatory power, across all bands, at the location of the pore. Interestingly, there is another patch of suppression of similar size visible in the top-left quarter in Ca~\textsc{ii}~K and H$\alpha$ powermaps. This appears to be connected to a fairly small magnetic concentration in this region, as evident from the magnetic field contours. It must be noted that this small magnetic element would easily have been overlooked in visual inspections of the actual magnetograms had it not been for the associated power suppression. In fact, it has been shown that the suppression of surficial acoustic power can be used to probe subsurface magnetic fields well before their emergence \citep{2011SoPh..268..321H}. Thus, to study in detail the observed power suppression and its relation to underlying small magnetic element, we consider an additional subfield outlined by the dashed box in Figure~\ref{fig2}. Inspection of a time-lapse movie of HMI LOS magnetic fields reveals that the smaller magnetic patch in this subfield is constantly evolving from a thin and linear structure at the start of the observations, through to a near circular concentration at the end. One must note that the spatial resolution of HMI is approximately 10 times more coarse compared to ROSA, which can potentially mask other even smaller magnetic concentrations, if present.
\begin{figure}
\centering
\includegraphics[width=12cm]{f3.jpg}
\caption{Evolution of the magnetic field within the subfield region outlined by a dashed box in Figure~\ref{fig2}. \textit{Bottom}: The black line represents the average magnetic field over the full subfield, while the red line shows the average computed only from strongly magnetic pixels ($\ge$950~G; inner contours). The axis for the red line is shown on the right. \textit{Top}: Time-distance representation of the magnetic field extracted from the locations marked by the vertical green line in Figure~\ref{fig2}. Distance `0' corresponds to the bottom of the slit, while the applied colour scaling is shown on the right. Also, the temporal location of 500~G and 950~G field strength is highlighted through overplotted contours. An animation showing the spatial distribution of the magnetic field, and its evolution, is available online.}
\label{fig3}
\end{figure}
The evolution of the average magnetic field in this region is shown in Figure~\ref{fig3}. The black line in the bottom panel represents the average taken over the entire subfield, while the red line represents the average taken only from strongly magnetic pixels, i.e., from locations where the magnetic field $>$950~G. It appears that the strong field average increases with time, even in the later stage when the average for the whole region has decreased. This suggests more of a reorganisation of magnetic flux, rather than the actual emergence of new magnetism. The top panel in this figure shows the time-distance map generated from the location of the vertical green line marked in Figure~\ref{fig2}. Contours outlining locations with magnetic fields $\ge$500~G and $\ge$950~G are also overplotted on this map. It is evident that the vertical extent of the magnetic element is gradually collapsed until the end of the time sequence, where it forms a more concentrated patch. A time-lapse movie of the magnetic field in this region is provided online to clearly show this behaviour.
\subsection{Time-resolved powermaps}
To understand how the evolving magnetic field in the subfield (outlined by dashed box) in Figure~\ref{fig2} influences the oscillatory power in this region, we extract the time-dependent power from wavelet analysis to construct powermaps at different instants for the same 2--4, 4--6, and 6--10 min period bands.
\begin{figure}
\centering
\includegraphics[width=15cm]{f4.jpg}
\caption{Time-resolved powermaps and the respective intensity images from the continuum channel at five different instants during the observations. Each column displays results for a particular instant in time (shown at the top), while rows from the bottom to top display powermaps in 6--10 min, 4--6 min and 2--4 min, with the top row revealing the corresponding intensity. The contours overplotted denote the locations of magnetic fields at 500~G and 950~G, as obtained from the nearest-time HMI LOS magnetogram. Oscillation power can be seen to be suppressed in the magnetic region. A single colour scale (shown on right) is used for all the period bands, which highlights the decrease in power with time, in addition to revealing lower oscillatory power at shorter periods.}
\label{fig4}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=15cm]{f5.jpg}
\caption{Time-resolved powermaps and the respective intensity images for the G-band channel. Descriptions of the individual panels are the same as those described in Figure~\ref{fig4}. Intensity images highlight G-band bright points at the intergranular lanes. Power suppression properties are similar to those observed in the continuum channel.}
\label{fig5}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=15cm]{f6.jpg}
\caption{Time-resolved powermaps and the respective intensity images for the Ca~\textsc{ii}~K channel. Descriptions of the individual panels are the same as those described in Figure~\ref{fig4}. The power suppression appears to be spatially extended and asymmetrically distributed towards the left of the magnetic region. The polygon marked over the intensity images roughly encloses the power suppression region used in subsequent analysis.}
\label{fig6}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=15cm]{f7.jpg}
\caption{Time-resolved powermaps and the respective intensity images for the H$\alpha$ channel. Descriptions of the individual panels are the same as those described in Figure~\ref{fig4}. Intensity images highlight horizontal canopy structures connected with the magnetic region. Power suppression properties are similar to those observed in the Ca~\textsc{ii}~K channel. The polygon marked over the intensity images roughly encloses the power suppression region used in subsequent analysis.}
\label{fig7}
\end{figure}
\!\!\!\!\!Figures~\ref{fig4}, \ref{fig5}, \ref{fig6}, \& \ref{fig7} display these time-dependent powermaps at 5 different instants in time for the blue continuum, G-band, Ca~\textsc{ii}~K and H$\alpha$ channels, respectively. In each of these figures, powermaps for discreet bands are shown in the bottom three rows, with the corresponding intensity image displayed in the top row. Respective magnetic field contours, for 500~G and 950~G are also shown using white contours. Each column in these figures represents a time-resolved snapshot of the observations, as specified at the top of each column. The continuum and G-band results (Figures~\ref{fig4} \& \ref{fig5}) show more suppression in the vicinity of the magnetic field as its magnitude becomes stronger and more organised. As already highlighted, one must also consider the difference in the spatial resolutions between the various instruments before trying to make a one-to-one correspondence between the power suppression regions in the ROSA powermaps and the HMI magnetic fields.
The Ca~\textsc{ii}~K and H$\alpha$ results (Figures~\ref{fig6} \& \ref{fig7}) also show clear evidence for suppression in all period bands at all instants. However, the suppression region appears to be larger and asymmetrically distributed towards the left of the magnetic patch. This appears to be a consequence of the horizontal magnetic canopy structures extending towards the left side, as evident in the H$\alpha$ intensity images. The remarkable structuring visible in the suppression regions of the H$\alpha$ powermaps is also worth noting. The spatial extent of the power suppression increases with height above the photosphere in agreement with the findings of \citet{2007A&A...471..961M}. However, this is the first time it has been observed in higher regions of chromosphere using Ca~\textsc{ii} K and H$\alpha$ images.
\subsection{Time-distance powermaps}
The time-resolved powermaps shown in the previous subsection for 5 different instants of time, revealed the spatial distribution and extent of power at different times spanning the magnetic field evolution. However, to get a more clear picture of the time-dependent nature of the power suppression with the evolving field, we constructed time-distance powermaps. To produce these, we considered a 10-pixel wide slit ($\approx$$0{\,}.{\!\!}{\arcsec}592$ or 430~km) placed on top of the time-resolved powermaps, as shown by the dashed green line marked in Figure~\ref{fig2}, and averaged the power lying across the slit.
\begin{figure}
\centering
\includegraphics[width=12cm]{f8.jpg}
\caption{(From top to bottom) Time-distance maps of the continuum intensity and the corresponding power in the three period bands corresponding to 2--4 min, 4--6 min, and 6--10 min. These maps are constructed from the vertical green slit shown in Figure~\ref{fig2}. Distance `0' corresponds to the bottom of the slit. The overplotted contours highlight the locations of magnetic fields at 500~G and 950~G, as labelled. Stronger fields clearly coincide with locations of power suppression.}
\label{fig8}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=12cm]{f9.jpg}
\caption{Same as Figure~\ref{fig8}, but for the G-band channel. The strong field regions suppress the oscillatory power in all bands. The bright line at approximately 6$\arcsec$ in the intensity image coincides with the locations of occasional dips in magnetic field (as identified from the magnetic field contour `islands') and shows slight power enhancement in the 6--10 min band.}
\label{fig9}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=12cm]{f10.jpg}
\caption{Same as Figure~\ref{fig8}, but for the Ca~\textsc{ii}~K channel. Power suppression again coincides with the locations of strong fields and appears to be more pronounced for longer periodicities. The intensity map clearly shows an oscillatory pattern with $\approx$4 min periodicity.}
\label{fig10}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=12cm]{f11.jpg}
\caption{Same as Figure~\ref{fig8}, but for the H$\alpha$ channel. Power suppression properties are similar to those observed in the Ca~\textsc{ii}~K channel. The bright line at 6$\arcsec$ is now replaced with a dark line in intensity, and is accompanied by occasional enhancements in power.}
\label{fig11}
\end{figure}
\!\!\!\!\!The obtained time-distance powermaps, along with the corresponding intensity plots, are shown in Figures~\ref{fig8}, \ref{fig9}, \ref{fig10}, \& \ref{fig11} for the continuum, G-band, Ca~\textsc{ii}~K and H$\alpha$ channels, respectively. The overplotted contours on these figures enclose the corresponding spatial locations demonstrating field strengths $\ge$500~G and $\ge$950~G as annotated. It is clear from these maps that the region between 4$\arcsec$ -- 7$\arcsec$ distance (from the bottom of the slit) has relatively lower power across all period bands, which coincides with the locations of stronger magnetic fields. The time-distance maps in intensity reveal a brightening (albeit a darkening in H$\alpha$) at the centre of the magnetic patch (at $\approx$6$\arcsec$) where the field strength is slightly weaker at certain times as indicated by the 950~G contour `islands'. The intensity map in Ca~\textsc{ii}~K (Figure~\ref{fig10}) shows a clear oscillatory pattern with a periodicity of $\approx$4~min. A similar periodicity is also found in the HMI magnetic field measurements suggesting they are likely to be magnetoacoustic waves. It is possible that they are driven by $p$-modes originating below the photosphere \citep[see][]{2014ApJ...796...72J, 2015ApJ...812L..15K}. In predominantly photospheric channels, the amplitudes are usually small making them difficult to detect in the continuum and G-band channels and perhaps also the reason why they are not easily discernible in the more chromospheric H$\alpha$ bandpass.
\subsection{Temporal variation of power}
While the time-distance powermaps discussed in the previous subsection reveal the (partly) spatial and temporal behaviour of power in the suppression region, it is not clear whether there is any increase or decrease in power as the magnetic field evolves with time. Hence, we present here how the average power in the suppression region varies with time. To do this, first we interpolate HMI data both spatially and temporally to match the resolution of the ROSA channels. Then we identify the locations of strong magnetic fields (i.e., $\ge$950~G) at each instant and average the power contained within these locations for each period band to generate time evolving power. While scaling the HMI observations to the spatial and temporal resolutions of ROSA involves considerable interpolation, the revised HMI data is solely used to identify magnetic locations over which the ROSA/HARDcam power is averaged. Furthermore, we also verified our results by compressing the ROSA/HARDcam channels spatially and temporally to match the HMI resolution, which resulted in consistent outputs. Also, the power suppression regions in the Ca~\textsc{ii}~K and H$\alpha$ channels do not exactly coincide with the magnetic region as defined by HMI. Therefore, for these channels we selected a separate region bounded by the polygons marked in Figures~\ref{fig6} and \ref{fig7}, which roughly encloses the magnetic patch and the horizontal structures connected to it, and obtained the average power within that isolated region.
\begin{figure}
\centering
\includegraphics[width=12cm]{f12.jpg}
\caption{Variations in the average power for different period bands as a function of time. The four panels display results for the four channels studied. In each panel, red, green and blue lines denote the time evolution of power for the different period bands as annotated. The black line represents the corresponding magnetic field evolution, with its axis shown on right. For the continuum and G-band channels, the power is averaged only from the strong magnetic field locations ($\ge$950~G), whereas for the Ca~\textsc{ii}~K and H$\alpha$ channels, the power is averaged over the polygon marked in Figures~\ref{fig6} and \ref{fig7}. }
\label{fig12}
\end{figure}
The results are shown in Figure~\ref{fig12}, where different colours represent the different period bands as annotated. The black curve represents the corresponding variation in the photospheric (HMI) magnetic field strength from the original, uninterpolated data. It appears that in general the power across all period bands decreases with increases in the magnetic field (i.e., is anti-correlated). However, the power also appears to fluctuate with time, and naturally one would wish to check whether these small-scale fluctuations are also anti-correlated with changes in magnetic field. But this is difficult to accomplish since the power, which is proportional to the oscillation amplitude, also fluctuates in time due to closely spaced oscillation frequencies \citep{2015ApJ...812L..15K}. A closer inspection of the 4~min oscillations seen in Ca~\textsc{ii}~K indeed shows periodic variations in the amplitude, which resembles a beat pattern. To study the exact quantitative dependence of oscillation power on magnetic field, we construct co-spatial and co-temporal power maps with HMI magnetic field, which are discussed in the following subsection.
\subsection{Quantitative dependence of oscillation power on magnetic field}
\label{mag_pow}
So far we have shown that the oscillation power is suppressed in the presence of a magnetic field, and that the suppression becomes increasingly enhanced as the magnetic field strength increases. In this section, we study the exact quantitative dependence of oscillation power, across different period bands, on the magnetic field. To perform this, we compressed all of the time-resolved powermaps, both spatially and temporally, to construct co-spatial and co-temporal powermaps with HMI magnetic field. This allowed us to make a one-to-one mapping of the oscillation power with the magnetic field. We then considered bins of 100~G and estimated the means and standard deviations of oscillatory power contained within each period band, for each bin.
\begin{figure}
\centering
\includegraphics[width=12cm]{f13.jpg}
\caption{Dependence of the oscillatory power on the magnetic field strength across different channels and period bands as annotated. In each plot, diamonds represent the average power within a 100~G bin starting from that value, and the error bars denote the respective standard deviations. The overplotted sold lines are linear fits to the data. Locations with field strengths above 100~G are considered for the continuum and G-band channels, while fields above 500~G are considered for the Ca~\textsc{ii}~K and H$\alpha$ channels. Consequently, two different fits are performed for the photospheric channels (i.e., continuum and G-band; see text for details). The last point in the Ca~\textsc{ii}~K plot for the 2--4 min band (shown in red) is discarded while making the fit. The obtained gradient values are listed in each plot. Oscillation power clearly decreases with increasing magnetic field strength.}
\label{fig13}
\end{figure}
The obtained mean values are plotted as diamonds in Figure~\ref{fig13} for each channel, with the corresponding standard deviations used to create the error bars. For the continuum and G-band channels, only those locations with a minimum magnetic field strength of 100~G are chosen. For Ca~\textsc{ii}~K and H$\alpha$, this limit is set at 500~G. The reason a higher limit is imposed for these channels is that a large portion of the structures in the subfield appear to be connected to the magnetic region (see Figure~\ref{fig7}) as previously described, which makes it less meaningful to map one-to-one across the full subfield. Clearly, all the plots in Figure~\ref{fig13} show an enhanced suppression of power with increasing magnetic field strength. Here, we would like to emphasise that the error bars do not represent actual errors, but are instead the standard deviations for each value within the corresponding bin. Consequently, the extent of the error bars is smaller at higher field strengths as a result of more limited statistics.
In order to quantitatively compare suppression across different channels and period bands, the mean power values were fit linearly as shown in Figure~\ref{fig13}. For the continuum and G-band data, separate fits were made for the full range of values (green line), and for values corresponding to magnetic field strengths above 500~G (red line). The last point in the Ca~\textsc{ii}~K plot for the 2--4 min band (marked in red) was ignored as an outlier while making the fit. This is justified considering the poor statistics associated with the highest field strengths. The obtained gradients are listed in each plot in the Figure. Comparing the gradient values across different period bands, it appears that the suppression is steeper for longer periods. A similar comparison across different channels, e.g., the continuum, G-band, and H$\alpha$, suggests that the suppression is also steeper at higher formation heights. The different behaviour observed in the Ca~\textsc{ii}~K plots is likely a result of its wide passband ($\approx$1{\,}$\AA$) that naturally covers an extended range of solar atmospheric heights. In fact, \citet{2009A&A...500.1239R} has shown that the contributions from bright photospheric wings swamp the dark chromospheric structures in Ca~\textsc{ii} K filtergrams, even for a bandpass narrower than that used in the present study.
\subsection{Dominant period}
In this section we discuss the effects of evolving magnetic fields on the dominant periods and the corresponding spatial distributions. We identify peaks in the wavelet power spectra at each pixel and consider the period at the strongest peak (with highest power) as the dominant period. Since the wavelet analysis gives us time-resolved power spectra, we were able to construct {\it{time evolving}} dominant period maps. Power spectra with periodicities only up to 10 minutes are considered in this analysis.
\begin{figure}
\centering
\includegraphics[width=15cm]{f14.jpg}
\caption{Dominant period maps (maps showing the period with highest oscillatory power at each spatial location) in all four imaging channels at five different instants during the observations as annotated. Power spectra only in the 0--10 min range is considered to generate these plots. The color scale is shown on the right, with the corresponding magnetic field contours overplotted similar to those displayed in Figures~\ref{fig4} -- \ref{fig7}. Ca~\textsc{ii}~K and H$\alpha$ maps clearly show a drift toward shorter periods as the field strength increases with time.}
\label{fig14}
\end{figure}
The generated dominant period maps at 5 different instants during the observation period are shown in Figure~\ref{fig14} for all four channels. The white contours overplotted correspond to a magnetic field strength of 500~G and 950~G. The continuum and G-band maps are dominated by red and yellow patches synonymous with longer ($>$6~min) periods. Although sparsely populated, the green and blue patches in these maps, corresponding to 5~min and lower periods, are predominantly in the intergranular lanes (see Figures~\ref{fig4} and \ref{fig5}). However, the major magnetic concentration in this region does not seem to have any influence on the distribution of dominant periods seen in these maps. On the other hand, the Ca~\textsc{ii}~K and H$\alpha$ maps show preferentially shorter periods at the magnetic patch, alongside longer periods in the horizontal structures connected to it. The increasing green and blue colours, found in the vicinity of the magnetic patch from the start of the time sequence to the end, indicates the dominance of shorter periods with increasing field strength. The changing spatial distribution of the surrounding red/yellow patches in Ca~\textsc{ii}~K is also worth noting.
\begin{figure}
\centering
\includegraphics[width=12cm]{f15.jpg}
\caption{Scatter plots showing the dependence of the dominant period on the magnetic field strength for all four imaging channels. Locations with field strengths above 100~G are considered for the continuum and G-band channels, and those above 500~G are considered for the Ca~\textsc{ii}~K and H$\alpha$ channels. The overplotted solid lines show histograms for this data within different magnetic field ranges (listed in the legend at the centre) as identified by their color. All the histograms are normalised to their respective maxima before plotting. The axis for the histograms is displayed on the right.}
\label{fig15}
\end{figure}
Figure~\ref{fig15} shows a scatter plot of the dominant periods versus the magnetic field strengths for all four channels. All of the ROSA/HARDcam data has been compressed to match the HMI resolution, and is therefore similar to that described in section~\ref{mag_pow}. Again, only pixel locations corresponding to magnetic fields $>$100~G were considered for the continuum and G-band channels, and those corresponding to $>$500~G were included for the Ca~\textsc{ii}~K and H$\alpha$ channels. The overplotted solid lines in colour show histograms of the dominant periods for the magnetic field ranges listed in the figure legend. Each of the histograms were normalised to their respective maxima before plotting. While the scatter plots indicate all of the possible dominant periods throughout the magnetic field range, the histograms suggest many of the pixel locations have dominant period $>$5 min in the continuum and G-band channels, irrespective of the strength of the field. A similar inference can also be drawn from the dominant period maps. However, it is important to note that the scatter plots include data from all temporal locations. Plots for Ca~\textsc{ii}~K and H$\alpha$ show a majority of the pixel locations with stronger fields ($>$950~G) have a dominant period at $\approx$4 min. This value is shifted to about 5 min for pixel locations with relatively weaker fields (500~G -- 950~G) in Ca~\textsc{ii}~K. For H$\alpha$, the dominant period appears to have shifted to about 10 min for weaker field locations, but still a significant fraction of them show dominant power at $\approx$4~min. The difference in behaviour of Ca~\textsc{ii}~K and H$\alpha$ channels in the weak field regime, i.e., at the locations between the outer and the inner contours shown in Figure~\ref{fig14}, can also be understood to have arisen from their distinct passbands. The 1{\,}{\AA} wide Ca~\textsc{ii}~K channel can have contributions from slightly inclined fields in the lower atmosphere, shifting the dominant period from 4~min to 5~min, while the narrowband H$\alpha$ channel has contributions mainly from the nearly horizontal structures (see Figure~\ref{fig7}), which perhaps can raise the dominant period to $\approx$10~min.
\section{Conclusions}
\label{concl}
Observations of active region NOAA~11372 reveal a reduction in $p$-mode oscillatory power (suppression) adjacent to a magnetic pore. The corresponding HMI LOS magnetic fields disclose a small magnetic concentration within this region, which is found to evolve with time. During the observation period, the magnetic element appears to change from a thin linear shape into a more uniform circular shape. The overall magnetic field strength for this element is also found to increase with time. We studied the effect of the evolving field on the time-dependent oscillatory power through the application of wavelet analysis. The power suppression regions in the continuum and G-band images are found to coincide with the locations of the magnetic element, whereas the power suppression found in Ca~\textsc{ii}~K and H$\alpha$ images is spatially extended and asymmetrically distributed towards the left of the magnetic element. The asymmetric distribution of horizontal canopy structures in the chromosphere, which are connected to the magnetic region, most likely explains the different behaviour in the latter channels. Power suppression is found to increase with time as the magnetic field is increased. Detailed analysis on the dependence of the oscillatory power on the magnetic field strengths revealed negative gradients, suggesting this is indeed true. A quantitative comparison of this dependence between different period bands, and across different channels, indicates that the power suppression is steeper for longer periods and at higher atmospheric heights.
Using a theoretical model, \citet{2014ApJ...796...72J} showed that the power deficit in the suppression region increases with height above the photosphere. They also found that this behaviour manifests with a larger effect when the magnetic field is stronger, which explains the steeper dependence on magnetic field we found at larger heights. At the locations of higher field strengths, which were closer to the centre of the magnetic element (see Figure~\ref{fig3}), the magnetic fields are likely to be less inclined than those in the surroundings with relatively lower field strengths. This difference in inclination can cause more effective suppression in longer periods at higher field strengths (for instance, a recent study by \citet{2013ApJ...779..168J} demonstrates the effect of magnetic field inclination on the dominant oscillation period observed) and thus explains the steeper dependence of the oscillation power on the magnetic field for longer periods. We have not computed power suppression ratios to study the frequency dependence shown by \citet{2014ApJ...796...72J} and \citet{1998ApJ...504.1029H} since our field of view mainly encompasses the active region and therefore does not provide an inherently quiet region to make them statistically meaningful.
In addition, we studied the spatial distribution of the dominant period, and its evolution, with time. The dominant period extracted from the continuum and G-band intensities did not show any influence from the magnetic concentrations, whereas the Ca~\textsc{ii}~K and H$\alpha$ time series displayed shorter periods in the vicinity of stronger magnetic fields. Here, the dominant periodicity was also found to shorten with time as the magnetic field strength increased. Again, this behaviour may be related to a decrease in the inclination of the field as the field strength increases.
The observed increase in the spatial extent of the suppression region with height is in agreement with the results of \citet{2007A&A...471..961M} and \citet{2014ApJ...796...72J}. \citet{2007A&A...471..961M} explained their observations based on a mode-conversion model where the power suppression is primarily due to the partial conversion of $p$-modes into magnetoacoustic waves that go undetected \citep{2003MNRAS.346..381C}. The model by \citet{2014ApJ...796...72J} also involves the generation of magnetoacoustic waves via the buffeting of p-modes, but here the power suppression is mainly a result of the difference in the evanescence of compressive waves within and outside the magnetic flux tube, producing shorter attenuation lengths inside the tube. In addition, each magnetic element is considered as a collection of thin magnetic fibrils where no radial structuring is present. Despite the differences, both models could reproduce the increasing spatial extent of the suppression region with atmospheric height. Therefore, the exact physical explanation behind these phenomena remains open and requires further theoretical and observational studies. In the near future we hope to utilize coordinated multi-height observations with spectropolarimetric sensitivites combined with realistic atmospheric models to address important issues such as the location of equipartition ($\beta=$1) layer with respect to the observed spectral lines, identifying the slow/fast nature of the observed oscillations, etc., that might help resolve this problem.
\acknowledgements
The authors thank the referee for useful comments. D.B.J. thanks STFC for an Ernest Rutherford Fellowship in addition to a dedicated standard grant that allowed this project to be undertaken. The HMI data used here are courtesy of NASA/SDO and HMI science teams.
{\it Facilities:} \facility{Dunn (ROSA, HARDcam)}, \facility{SDO (HMI)}.
|
\section{Introduction}
\label{sec-intro}
In the diverse family of active galactic nuclei (AGN), blazars stand out due to their extreme variability in all wavebands and over a broad range of timescales. Their predominantly non-thermal emission arises in relativistic jets that are pointed close to our line of sight. The resulting Doppler boosting is responsible for their short-timescale variability, apart from boosting their flux and creating the illusion of superluminal motion (e.g., \cite{Urry95}). This broadband variability presents both a challenge and an opportunity. On the one hand, the variability makes it difficult to construct a physical model of high-energy emission from blazars. On the other hand, the variability also provides important constraints on the many open questions about the origin of blazar emission. With continuous monitoring of the sky by the {\it Fermi} Gamma-ray Space Telescope, and observations by X-ray satellites as well as ground-based telescopes in the radio through TeV bands, we are able to make near-simultaneous observations that contribute to addressing these questions (e.g., \cite{FermiMrk501, FermiMrk421}).
Blazars are typically divided into BL\,Lac objects and flat spectrum radio quasars (FSRQs) with the formal distinction being the absence or presence, respectively, of emission lines with a rest frame equivalent width $\geq 5$~\AA\ (e.g., \cite{Marcha96}). S4~0954+65\ is a blazar at a redshift $z=0.368$ \citep{Stickel93, Lawrence96}. Although a recent paper by \citet{Landoni15} reported a more distant lower limit to the redshift at $z \geq 0.45$, our preliminary result for the source spectrum taken with the Telescopio Nazionale Galileo 3.58~m telescope confirm the $z=0.368$ (Becerra Gonzalez et al. in prep.). This object clearly meets the formal definition of a BL\,Lac (see Table~35 and Fig.~8 of \cite{Lawrence96}). However, its archival (non-simultaneous) multi-wavelength spectral energy distribution (SED) hints at the presence of a ``blue bump" more typical of a FSRQ. Past X-ray observation by ROSAT (e.g., \cite{Comastri97}) shows a flatter energy distribution than typical for a radio-selected BL\,Lac leading to the suggestion that S4~0954+65\ may be a transition object with properties that lie in between the BL\,Lac and FSRQ classes. This idea has also been explored by \citet{Ghisellini11}, who, however, conclude that it should be classified as a LBL (a ``low-peaked" BL\,Lac object) based on the luminosity of the broad-line region in Eddington units, rather than the emission lines' equivalent width.
A powerful $\gamma$-ray flare was detected from S4~0954+65\ by {\it Fermi} Large Area Telescope (LAT) on 2014 November 25 \citep{Krauss14} when its daily averaged $\gamma$-ray flux ($E>100$~MeV) was about 32 times its average flux in the \textit{Fermi}-LAT\ third source catalog (3FGL catalog, see \cite{3FGL}). In late January 2015, \citet{Carrasco15a} reported an increase by a factor of three in its near-infrared (NIR) emission. This heralded the beginning of unprecedented optical/NIR activity in this object with its $V$-band magnitude brightening by two magnitudes \citep{Stanek15}, continued flaring in the NIR band \citep{Carrasco15b}, and its brightest ever optical state reported \citep{Spiridonova15a, Spiridonova15b}. Rapid intra-night variability in the $R$-band was detected on 11-15 February 2015 \citep{Bachev15}. An increase in the degree of optical polarization in the $R$-band was also observed from 14\% on 18 February 2015 to 25\% on 19 February 2015 \citep{Jorstad15}.
On 2015 February 13/14 (MJD~57067) the MAGIC telescopes detected very-high-energy (VHE; $\mathrm{E > 100\,GeV}$) emission from S4~0954+65\ \citep{Mirzoyan15}. This coincided with the detection of an unusually hard $\gamma$-ray ($E>0.1$~GeV) spectrum by \textit{Fermi}-LAT\ along with an elevated $\gamma$-ray flux \citep{Ojha15}. In this paper, we make a detailed study of the evolution of the $\gamma$-ray spectrum and its relationship to activity in the X-ray and optical bands. We first present our observations in \S\ref{sec-data}. Then we show the results in \S\ref{sec-results}, and discuss them in \S\ref{sec-dis}. Throughout this paper, we use the cosmology $\mathrm{{\it H}_0 = 70 \,km\,s^{-1} Mpc^{-1}}$, $\Omega_{m}=0.3$, and $\Omega_{\Lambda} = 0.7$ \citep{Komatsu09}. Note that S4~0954+65\ is listed in the second {\it Fermi}-LAT catalog of high-energy sources (2FHL catalog, see \cite{2FHL}) as 2FHL~J0958.3+6535.
\section{Observations}
\label{sec-data}
\subsection{\textit{Fermi}-LAT}
\label{sec-LAT}
The LAT on board the {\it Fermi} satellite monitors the entire $\gamma$-ray sky every 3 hours in the energy range from 20~MeV to $> 300$~GeV \citep{Atwood09}. We selected Pass 7 reprocessed source-class events, from 4 August 2008 to 30 April 2015, within a 10 deg circular region centered at the location of S4~0954+65. The analysis was performed with the ScienceTools software package version v9r33p0 using the instrument response function \texttt{P7REP\_SOURCE\_V15} \citep{Ackermann12}. A zenith angle cut of $< 100^{\circ}$ was applied to reduce the contamination from the Earth Limb. The appropriate Galactic diffuse emission model (\texttt{gll\_iem\_v05\_rev.fit}) and isotropic component (\texttt{iso\_source\_v05.txt}) were used\footnote{Available at http://fermi.gsfc.nasa.gov/ssc/data/access/lat/BackgroundModels.html}. The normalizations of both components in the background model were allowed to vary freely during the spectral fitting. The unbinned maximum-likelihood method implemented in the \texttt{gtlike} tool was used. For a first likelihood fit, the model included all the 3FGL \citep{3FGL} sources within a 15$^{\circ}$ circular region around S4~0954+65. Spectral indices and fluxes were left free for the fit for sources within 10$^{\circ}$, while sources from 10$^{\circ}$ to 15$^{\circ}$ were frozen to the catalog values. The significance of each source was evaluated using the test statistic ${\rm TS} = 2 \left( \log L_1 - \log L_0 \right)$, where $L$ is the likelihood of the data given the model with ($L_1$) or without ($L_0$) the source and TS is interpreted as a detection significance of $\sim \sqrt{\rm TS} \sigma$ (e.g., \cite{Mattox96}). A maximum-likelihood analysis was performed with several iterations to remove sources not contributing to the Region of Interest (low TS values, up to a maximum of ${\rm TS}=10$). The light curve has been calculated in 30, 7, and 1-day time bins modeling the source with a single power-law spectrum (as described in the 3FGL catalog). Both the flux and spectral index of S4~0954+65\ were left free during the light curve calculation, while the rest of the point sources were fixed and only the diffuse Galactic and isotropic models were allowed to vary.
The LAT SEDs were calculated for four time intervals which show different characteristics in the multi-wavelength light curve (see \S~\ref{sec-results} for details). In all cases the spectrum is well-fit by a single power law (PL). A curvature test was performed on the SEDs in each time interval assuming a log-parabolic (LP) fit for comparison with the power law. As defined in \citet{Nolan12}, the curvature test statistic can be expressed as ${\rm TS}_{\rm curve}=\left( {\rm TS}_{\rm LP} - {\rm TS}_{\rm PL} \right)$. We do not find significant curvature in any of the above periods.
\subsection{X-ray}
\label{sec-xray}
The {\it Swift} X-Ray Telescope (XRT, \cite{Burrows05}) observed S4~0954+65\ many times since July 2006, and all the XRT data presented here were taken in photon counting (PC) mode. Data reduction and calibration were performed with HEASoft v6.4 standard tools. We selected events of 0.3--8~keV and grades 0--12 for analysis. Source spectra were binned to include a minimum of 20 counts in each bin to allow $\chi^2$ minimization fitting. Response files were generated with \texttt{xrtmkarf}, with corrections applied for point-spread function losses and CCD defects. For spectral analysis we used the \verb|XSPEC| software package version 12.3.0.
We fit the \textit{Swift}/XRT data by assuming an absorbed single power-law model where hydrogen column density for the direction of S4~0954+65\ is fixed to the Galactic value of $N_H = 4.8 \times 10^{20}$ cm$^{-2}$, which is estimated from the Leiden/Argentine/Bonn (LAB) Survey of Galactic HI \citep{Kalberla05}. All the data were well represented by the absorbed power-law model except that taken on MJD~57077 (obsID: 00033530018) for which a broken power-law model is applied (see \S\ref{sec-results} for details).
\subsection{Optical and ultraviolet photometry}
\label{sec-optical}
We analyzed optical and ultraviolet data in $V$, $B$, $U$, $UVW1$, $UVM2$ and $UVW2$ bands taken with the Ultraviolet and Optical Telescope (UVOT, \cite{Roming05}) onboard \textit{Swift}. The UVOT data were reduced following the standard procedure for CCD photometry. Source counts were extracted from a circular region of 5 arcsec radius, while background counts were measured from an annulus centered on the target position with inner and outer radii of 27.5 and 35 arcsec, respectively. The net source counts were converted to flux densities using the standard zero points \citep{Poole08}. The fluxes were corrected for Galactic extinction \citep{Schlegel98} to obtain the intrinsic fluxes ($A_{\rm V}=0.321, A_{\rm B}=0.436, A_{\rm U}=0.492, A_{\rm UVW1}=0.784, A_{\rm UVM2}=1.146, A_{\rm UVW2}=1.091$).
The source was observed in the optical R-band as part of the Tuorla blazar monitoring program\footnote{http://users.utu.fi/kani/1m} \citep{Takalo08}. These observations were made using the 35~cm Celestron telescope attached to the KVA 60~cm telescope (La Palma, Canary Islands, Spain). The data have been analyzed using the semi-automatic pipeline developed at the Tuorla Observatory (Nilsson et al. 2016, in prep.). The observed fluxes have been corrected for Galactic extinction using values from \citet{Schlafly11} (see Appendix of their paper). S4~0954+65\ was also observed by 2.56~m Nordic Optical Telescope (NOT) in SDSS (Sloan Digital Sky Survey) $u$ and $z$ bands. The data were reduced (de-biasing, flat field correction) using standard IRAF routines. By using aperture photometry with the typical aperture radius $1.0-1.5$ arcsec, we measured the source magnitudes against the stars 3 and 6 in \citet{Raiteri99}.
\section{Results}
\label{sec-results}
Figure~\ref{fig:lc} displays the \textit{Fermi}-LAT\ 30-day binned light curve from 2008 August to 2015 April. S4~0954+65\ entered a high state after MJD~56900 and hence we produced a \textit{Fermi}-LAT\ weekly (7-day) binned light curve together with a daily KVA R-band one during the high state (Fig.~\ref{fig:lc}, lower panel). The brightening in the $\gamma$-ray and optical bands is prominent in particular between MJD 57050 and 57100. To investigate the details of flux and spectral changes in multiple bands, we constructed \textit{Fermi}-LAT, \textit{Swift}/XRT, \textit{Swift}/UVOT, and KVA light curves in each of the time periods and they are shown in Fig.~\ref{fig:lc2}. Note that the MAGIC telescope detected sub-TeV emission on MJD~57067.0 \citep{Mirzoyan15}. Indeed, on MJD~57066 and 57067, \textit{Fermi}-LAT\ detected a moderate 0.1--300~GeV flux of $\sim 1.0 \times 10^{-6}$ photons cm$^{-2}$ s$^{-1}$ but with an unusually hard spectrum of $\Gamma_{\rm GeV} < 2.0$, where $\Gamma_{\rm GeV}$ is the photon power-law index on daily time scales in the LAT band (see second panel of Fig.~\ref{fig:lc2}). Note here that the 4-year averaged power-law index of the LAT spectrum is $2.38\pm0.04$ \citep{3FGL} and that a similarly hard GeV spectrum was observed on MJD~57059.
\begin{figure}[!th]
\begin{center}
\includegraphics[width=14cm]{fig1.eps}
\caption{
({\it Upper}) \textit{Fermi}-LAT\ 30-day binned 0.1--300~GeV flux light curve of S4~0954+65\ from 2008 August to 2015 April. Black triangles show 90\% confidence level upper limits when ${\rm TS} < 4$. They are calculated by assuming a single power-law spectrum of $\Gamma=2.34$, taken from 3FGL catalog \citep{3FGL}. ({\it Lower}) \textit{Fermi}-LAT\ 7-day binned and KVA daily $R$-band extinction-corrected ($A_{\rm R}=0.259$) light curves during high state from MJD~56900 to 57150. The two vertical dashed lines indicate the period of ``highest" state from MJD~57050 to 57100. Note that daily light curves during the ``highest" state in $\gamma$-ray, X-ray, optical and UV bands are shown in Fig.~\ref{fig:lc2}.
}
\label{fig:lc}
\end{center}
\end{figure}
\begin{figure}[!th]
\begin{center}
\includegraphics[width=14cm]{fig2.eps}
\caption{Multi-wavelength light curves of S4~0954+65\ during the ``highest" state between MJD~57050 and 57100. From {\it top} to {\it bottom}: \textit{Fermi}-LAT\ 1-day binned 0.1--300~GeV flux, \textit{Fermi}-LAT\ daily photon power-law index, \textit{Swift}/XRT flux (0.3--8~keV), \textit{Swift}/XRT photon power-law index, and optical/UV fluxes in 7 bands measured by KVA and \textit{Swift}/UVOT.
Gray hatched areas, labeled by A, B, C, and D, indicate the selected 1-day periods during which SEDs are constructed (see Fig.\ref{fig:sed}). The black arrow at the top indicates the time (MJD~57067.0) when MAGIC telescope detected VHE emission \citep{Mirzoyan15}. In the second panel, the blue points with no error indicate the 3FGL value of 2.34, which was assumed for flux upper limit calculation.
}
\label{fig:lc2}
\end{center}
\end{figure}
Interestingly, the quasi-simultaneous ($< 1$ day) \textit{Swift}/XRT spectrum showed a clear softening ($\Gamma_{\rm x}=1.72\pm0.08$) compared to that measured on the other days during the high state shown here ($\Gamma_{\rm x}=1.38\pm0.03$, see Table~\ref{tab:xrt}). The simultaneous R-band flux was almost at the brightest level during this outburst.
Note also that \textit{Fermi}-LAT\ detected a 51~GeV photon from close vicinity of S4~0954+65\ on MJD 57066.98, which was exactly simultaneous with the time of the MAGIC VHE detection. The angular separation between this 51 GeV event and the position of S4~0954+65\ was only 0.013$^{\circ}$ and the probability that the event belongs to S4~0954+65\ was $>99$\% based on the \texttt{gtsrcprob} tool available in the ScienceTools. The quasi-simultaneous SED on MJD 57066.5--57067.5 (period A), which is selected to include the MAGIC VHE detection time, is shown in the upper-left panel in Fig.~\ref{fig:sed}.
On the next day (MJD~57068--57069, period B), the 0.1--300~GeV flux slightly decreased and the LAT spectrum became softer ($\Gamma=2.3 \pm 0.2$), while the X-ray spectrum became harder. In addition, the optical flux showed a sharp decrease. On MJD~57069--57070 (period C), GeV $\gamma$-ray, X-ray and optical fluxes increased again. The \textit{Fermi}-LAT\ and \textit{Swift}/XRT spectra were intermediate with power-law indices of $\Gamma_{\rm GeV}=2.0\pm0.1$ and $\Gamma_{\rm x}=1.41\pm0.08$, respectively. After that, fluxes in the MeV/GeV, X-ray, and optical bands showed a gradual decrease with an almost similar spectral shape, but on MJD~57077--57078 (period D), the X-ray spectrum showed the hardest index during this outburst. Note here that the limited statistics of \textit{Fermi}-LAT\ makes it hard to draw strong conclusions on the evolution of the $\gamma$-ray spectral index between period B and D. We checked the XRT data on Period D and found that larger systematic residuals are present in the lower and higher energy and hence we fitted the data using a broken power-law model. The broken power-law model is statistically favored over a single power law (p-value of $5.1 \times 10^{-4}$ from an $F$-test). The best-fit values were $\Gamma_{\rm low}=0.78^{+0.21}_{-0.22}$, $\Gamma_{\rm high}=1.90^{+0.57}_{-0.39}$, and $E_{\rm break}=2.66^{+0.70}_{-0.48}$~keV. Note that \citet{Ghisellini11} also claimed from \textit{Swift}/XRT data accumulated over 2006 to 2010 that a broken power law is a better representation for the X-ray spectrum of S4~0954+65\ (see Table~2 of their paper).
\begin{table}
\caption{\textit{Swift}/XRT power-law indices and fluxes during MJD~57066--57078, the GeV-brightest period}
\begin{center}
\label{tab:xrt}
\begin{tabular}{ccc}
\hline
MJD & PL index & 0.3--8~keV flux \\
& & ($10^{-11}$ erg cm$^{-2}$ s$^{-1}$) \\
\hline
57066.71 & 1.72$\pm$0.08 & 1.64$\pm$0.19 \\
57068.30 & 1.39$\pm$0.11 & 1.14$\pm$0.15 \\
57069.55 & 1.41$\pm$0.08 & 1.85$\pm$0.16 \\
57070.76 & 1.49$\pm$0.08 & 2.13$\pm$0.19 \\
57071.42 & 1.42$\pm$0.08 & 1.51$\pm$0.15 \\
57072.35 & 1.46$\pm$0.14 &1.57$\pm$0.21 \\
57073.68 & 1.57$\pm$0.16 &1.28$\pm$0.24 \\
57074.81 & 1.27$\pm$0.09 &1.59$\pm$0.20 \\
57075.61 & 1.39$\pm$0.09 &1.38$\pm$0.17 \\
57076.15 & 1.27$\pm$0.14 &1.27$\pm$0.27 \\
57077.21 & 1.15$\pm$0.10 & 2.05$\pm$0.24 \\
\hline
\end{tabular}
\end{center}
\end{table}
\section{Discussion}
\label{sec-dis}
To derive physical quantities at the emission site, the broadband spectra for the four selected periods are modeled by a one-zone synchrotron plus inverse-Compton model \citep{Finke08, Dermer09}. The electron distribution is assumed to have a broken power-law shape,
\begin{eqnarray*}
N^{\prime} \left( \gamma^{\prime} \right) &\propto& \gamma^{\prime -s_1} \quad \left( \gamma^{\prime}_{\rm min} < \gamma^{\prime} < \gamma^{\prime}_{\rm brk} \right)\\
N^{\prime} \left( \gamma^{\prime} \right) &\propto& \gamma^{\prime -s_2} \quad \left( \gamma^{\prime}_{\rm brk} < \gamma^{\prime} < \gamma^{\prime}_{\rm max} \right),
\end{eqnarray*}
where $\gamma^{\prime}_{\rm min}$, $\gamma^{\prime}_{\rm max}$, and $\gamma^{\prime}_{\rm brk}$ are the minimum, maximum, and break electron Lorentz factors, respectively. $s_1$ and $s_2$ are the power-law indices of the electron distribution below and above the break electron Lorentz factor $\gamma^{\prime}_{\rm brk}$.
Primed quantities indicate those measured in the jet comoving frame.
The model curves and derived parameter values are shown in Fig.~\ref{fig:sed} and Table~\ref{tab:sed}, respectively. The SEDs were well represented by changing only the electron distribution and the magnetic field (see also e.g., \cite{Dutka13, Ackermann14}).
Note that the spectral break in the electron distribution cannot be understood in terms of radiative cooling, because $s_2-s_1$ does not correspond to the canonical value of 1.0 (e.g., \cite{Longair11}).
We found that the $\gamma$ rays can be modeled by an external Compton (EC) component, rather than synchrotron self-Compton (SSC), despite the BL Lac classification for this object \citep{Mukherjee95}. We modeled the seed photon source for this process as a monochromatic isotropic external radiation field with energy density $u_{\rm seed}=2.4\times10^{-4}$\ erg s$^{-1}$ and energy $\epsilon_0=7.5\times10^{-7}$ in $m_ec^2$ units. This corresponds to a dust temperature of $T_{\rm dust} = 1500$\ K and, for a disk luminosity of $3.0\times10^{43}$\ erg s$^{-1}$ and, using the relation from \citep[equation (1)]{Nenkova08}, a dust radius of $2.1\times10^{17}$\ cm.
Note that, as shown in Fig.~\ref{fig:sed}, the SSC component is lower than the EC one by two orders of magnitude under the parameter values tabulated in Table~\ref{tab:sed}.
Note also that once we assume that SSC emission is responsible for the X-ray and MeV/GeV $\gamma$-ray emissions, the required magnetic field becomes very small ($B \sim 1$~mG) because of the relatively large Compton dominance of $L_{\rm IC}/L_{\rm sync} \sim 10$. Since this is much weaker than the typical magnetic field derived from blazar SED modeling ($\sim 1$~Gauss, see e.g., \citet{Ghisellini10}), our modeling under the EC assumption seems reasonable. There would be another option that the X-ray and MeV/GeV emissions are from SSC and EC components, respectively. However, given the lack of evidence of a spectral break between the X-ray and MeV/GeV data points, it is simpler to assume that only a single EC component is responsible for both X-ray and MeV/GeV emissions. In this regard, more precise flux measurements are needed to determine whether our assumption is valid or an alternative SSC+EC modeling is required.
\begin{figure}[!th]
\begin{center}
\includegraphics[width=\textwidth]{fig3.eps}
\caption{Quasi-simultaneous ($<1$~day) SEDs of S4~0954+65\ during the 4 selected time intervals. ({\it Top-left}) The SED on MJD~57066.5--57067.5, including MAGIC VHE detection time. Optical/UV data are taken from KVA R-band and \textit{Swift}/UVOT measurements. X-ray and MeV/GeV fluxes are from \textit{Swift}/XRT and \textit{Fermi}-LAT, respectively. The blue line indicates a model curve (Synchrotron, EC, and SSC emissions are summed up) calculated based on one-zone synchrotron emission and inverse-Compton scattering of dust torus photons \citep{Finke08, Dermer09}. The two orange lines indicate the dust torus and accretion disk emissions. The gray circles are historical fluxes taken from the NED database. The derived parameter values are tabulated in Table~\ref{tab:sed}.
({\it Top-right}) Same as {\it top-left} panel but for the SED on MJD~57068--57069 (shown in green). ({\it Bottom-left}) Same as {\it top-left} panel but for the SED on MJD~57069--57070 (shown in cyan). ({\it Bottom-right}) Same as {\it top-left} panel but for the SED on MJD~57077--57078 (shown in red). KVA R-band flux is not included during this period due to lack of observation.
}
\label{fig:sed}
\end{center}
\end{figure}
\begin{table}
\scriptsize
\caption{Model parameters.}
\begin{center}
\label{tab:sed}
\begin{tabular}{lccccc}
\hline
Parameter & Symbol & MJD 57066.5-57067.5 & MJD 57068-57069 & MJD 57069-57070 & MJD 57077-57078 \\
\hline
Redshift & $z$ & \multicolumn{4}{c}{0.368} \\
Bulk Lorentz Factor & $\Gamma$ & \multicolumn{4}{c}{30} \\
Doppler factor & $\delta_D$ & \multicolumn{4}{c}{30} \\
Variability Timescale [s]& $t_v$ & \multicolumn{4}{c}{$1.0\times10^5$} \\
Comoving radius of blob [cm]& $R^{\prime}_b$ & \multicolumn{4}{c}{6.6$\times$10$^{16}$} \\
Magnetic Field [G]& $B$ & 0.6 & 1.4 & 1.0 & 1.0 \\
\hline
Low-Energy Electron Spectral Index & $s_1$ & 2.4 & 2.3 & 2.4 & 2.4 \\
High-Energy Electron Spectral Index & $s_2$ & 4.5 & 4.0 & 3.0 & 4.0 \\
Minimum Electron Lorentz Factor & $\gamma^{\prime}_{\rm min}$ & $1.0$ & $1.0$ & $1.0$ & $1.5$ \\
Break Electron Lorentz Factor & $\gamma^{\prime}_{\rm brk}$ & $8.0\times10^3$ & $6.0\times10^2$ & $6.0\times10^2$ & $6.0\times10^2$ \\
Maximum Electron Lorentz Factor & $\gamma^{\prime}_{\rm max}$ & $2.0\times10^4$ & $1.0\times10^4$ & $1.0\times10^4$ & $1.0\times10^4$ \\
\hline
Black hole Mass [$M_\odot]$ & $M_{\rm BH}$ & \multicolumn{4}{c}{$3.4\times10^8$} \\
Disk luminosity [$\mathrm{erg}\ \mathrm{s}^{-1}$] & $L_{\rm disk}$ & \multicolumn{4}{c}{$3.0\times10^{43}$} \\
Inner disk radius [$R_g$] & $R_{\rm in}$ & \multicolumn{4}{c}{$6.0$}\\
Seed photon source energy density [$\mathrm{erg}\ \mathrm{cm}^{-3}$] & $u_{\rm seed}$ & \multicolumn{4}{c}{$2.4\times10^{-4}$} \\
Seed photon source photon energy [$m_e c^2$ units] & $\epsilon_{\rm seed}$ & \multicolumn{4}{c}{$7.5\times10^{-7}$} \\
Dust Torus luminosity [$\mathrm{erg}\ \mathrm{s}^{-1}$] & $L_{\rm dust}$ & \multicolumn{4}{c}{$3.9\times10^{42}$} \\
Dust Torus radius [cm] & $R_{\rm dust}$ & \multicolumn{4}{c}{$2.1\times10^{17}$} \\
Dust temperature [K] & $T_{\rm dust}$ & \multicolumn{4}{c}{$1500$} \\
\hline
Jet Power in Magnetic Field [$\mathrm{erg}\ \mathrm{s}^{-1}$] & $P_{j,B}$ & $1.0\times10^{46}$ & $5.7\times10^{46}$ & $2.9\times10^{46}$ & $2.9\times10^{46}$ \\
Jet Power in Electrons [$\mathrm{erg}\ \mathrm{s}^{-1}$] & $P_{j,e}$ & $1.1\times10^{45}$ & $6.1\times10^{44}$ & $1.3\times10^{45}$ & $1.1\times10^{45}$ \\
\hline
\end{tabular}
\end{center}
\end{table}
During the GeV spectral hardening (MJD~57066.5--57067.5, period A), the break energy of the electron distribution $\gamma^{\prime}_{\rm brk}$ increased about one order of magnitude (up to $8 \times 10^3$ from $6 \times 10^2$) due to the rising shape of the LAT $\nu F_{\nu}$ spectrum, indicating a rapid injection of high-energy electrons with $\gamma^{\prime} \sim 10^3$--$10^4$. The observed softer X-ray spectrum in period A would result from the modest contribution of synchrotron photons emitted by the highest energy electrons instead of the inverse-Compton X-rays produced by the lowest energy electrons (see upper left panel of Fig.~\ref{fig:sed}). We note that the spectral break at $E_{\rm break}=2.66^{+0.70}_{-0.48}$~keV seen in period D can be modeled by setting the minimum Lorentz factor of the electron distribution to be 1.5. Note also that a similar X-ray break seems to be present in the X-ray data during Period D (MJD~57068--57069), which is again reasonably modeled by $\gamma^{\prime}_{\rm min}=1.0$ (see {\it upper right} panel in Fig.~\ref{fig:sed} and Table~\ref{tab:sed}). Therefore, we stress that X-ray spectroscopy is a powerful tool to constrain the minimum electron Lorentz factor $\gamma^{\prime}_{\rm min}$ of the emitting electron distribution (see also e.g., \citet{Celotti08}). We also point out that the observed spectral break is a good indication that the EC component indeed dominates over SSC in the X-ray band, because it is difficult to produce such a break by assuming SSC.
From SED modeling, we also found that the jet power in the magnetic field ($P_{\rm B}$) dominates over the jet power in emitting electrons ($P_{\rm e}$) by a factor of 10--100 (see Table~\ref{tab:sed}). Here we define the jet power components as in \citet{Finke08}; $P_{\rm i}=2 \pi R^{\prime 2} \Gamma^2 \beta c U^{\prime}_{\rm i}$ (${\rm i}={\rm B}, {\rm e}$), where $\Gamma=\left( 1- \beta^2 \right)^{-1/2}$ is the bulk Lorentz factor of the emitting blob, $U^{\prime}_{\rm B}=B^2/8\pi$ and $U^{\prime}_{\rm e}= \left( m_e c^2/V^{\prime} \right) \int^{\gamma^{\prime}_{\rm max}}_{\gamma^{\prime}_{\rm min}} \gamma^{\prime} N^{\prime}_e \left( \gamma^{\prime} \right)$ are the energy densities of magnetic field and electrons, respectively, and $V^{\prime}= \left( 4/3 \right) \pi R^{\prime 3}$ is the volume of the emitting blob. Note that this definition assumes a two-sided jet.
This Poynting-flux dominance is robust under our EC assumption and not unprecedented considering there are several blazars showing a similar feature of $P_B > 10 P_e$ such as 0234+285 and 0528+134 (see Table~A2 of \citet{Celotti08}).
There is some evidence that cold protons in the jet ($P_{\rm p}= 2 \pi R^{\prime 2} \Gamma^2 \beta c \left( m_p c^2/V^{\prime} \right) \int^{\gamma^{\prime}_{\rm max}}_{\gamma^{\prime}_{\rm min}} N^{\prime}_p \left( \gamma^{\prime} \right)$, where $N^{\prime}_p$ is a proton distribution and $N^{\prime}_p=N^{\prime}_e$ is assumed, see e.g., \cite{Ghisellini14}) can carry much larger (as large as 100 times) power than the emitting electrons (e.g., \cite{Sikora00, Ghisellini14, Tanaka15}). Hence, it is possible in the context of the models presented here, that $P_{\rm B} \sim P_{\rm e}+P_{\rm p}$.
This paper serves as a case study for the capability of detecting new VHE sources based upon follow-up of flaring LAT sources showing spectral hardening (i.e. fluxes above $1.0 \times 10^{-6}$ photons cm$^{-2}$ s$^{-1}$ above 100~MeV and $\Gamma_{\rm GeV} < 2.0$). The capabilities of the LAT (specifically the daily all-sky monitoring and the improved high-energy performance from Pass~8 \citep{Pass8}) are well suited to these types of efforts and we can expect many such discoveries in the next few years. In fact, several spectral hardening events have been seen from Fermi-LAT FSRQs (e.g., \cite{Tanaka11, Pacciani14}) which would have been excellent candidates for VHE follow-up at the time.
Additionally, recent theoretical and observational studies of the extragalactic background light (EBL) indicate that the horizon of 100 GeV photons is $z \sim 1$ (e.g., \cite{Finke10, Dominguez11, Ackermann12EBL, Inoue13}). The current capabilities of the LAT are allowing us to probe beyond this edge. For example, \citet{Tanaka13} report the detection of two VHE photons from the $z=1.1$ blazar PKS~0426-380 (see also Figure~13 of \citet{2FHL} for the \textit{Fermi}-LAT\ detection of $E>50$~GeV photons from blazars beyond the horizon). But the current generation of ground based VHE observatories have not yet detected a source beyond a redshift of 1. MAGIC recently reported the detection of two high-redshift blazars S3~0218+35 at $z = 0.944$ \citep{Mirzoyan14} and PKS~1441+25 at $z = 0.939$ \citep{Mirzoyan1441, VERITAS_ApJL, MAGIC_ApJL}, but, depending on the spectrum of these sources at VHE energies, might not challenge the current understanding of the EBL. Triggering VHE observations of moderately-high redshift blazars with the \textit{Fermi}-LAT\ when they are in high- and hard-flux states is a way to push the redshift limit of VHE detections further and allow us to learn more about the EBL. This will become even more important when the next generation instrument, CTA, comes online and provides a lower energy threshold combined with better sensitivity.
\begin{ack}
We appreciate the referee's careful reading and valuable comments.
The \textit{Fermi} LAT Collaboration acknowledges generous ongoing support
from a number of agencies and institutes that have supported both the
development and the operation of the LAT as well as scientific data analysis.
These include the National Aeronautics and Space Administration and the
Department of Energy in the United States, the Commissariat \`a l'Energie Atomique
and the Centre National de la Recherche Scientifique / Institut National de Physique
Nucl\'eaire et de Physique des Particules in France, the Agenzia Spaziale Italiana
and the Istituto Nazionale di Fisica Nucleare in Italy, the Ministry of Education,
Culture, Sports, Science and Technology (MEXT), High Energy Accelerator Research
Organization (KEK) and Japan Aerospace Exploration Agency (JAXA) in Japan, and
the K.~A.~Wallenberg Foundation, the Swedish Research Council and the
Swedish National Space Board in Sweden.
Additional support for science analysis during the operations phase is gratefully acknowledged from the Istituto Nazionale di Astrofisica in Italy and the Centre National d'\'Etudes Spatiales in France.
This research was funded in part by NASA through Fermi Guest Investigator grants NNH12ZDA001N and NNH13ZDA001N-FERMI. This research has made use of NASA's Astrophysics Data System. YTT is supported by Kakenhi 15K17652.
\end{ack}
\bibliographystyle{apj}
|
\section{Introduction}
The McLerran-Venugopalan (MV) model of the Color Glass Condensate (CGC) has provided a useful phenomenology of high energy
hadronic processes~\cite{McLerran:1993ni,McLerran:1993ka}. This model is however lacking in one essential aspect: There
is no color charge screening.
This lack of color screening follows from the form of the charge density correlation function
\begin{equation}
\langle \rho^a(y_1,\vec{x}_{1}) \rho^b(y_2, \vec{x}_{2}) \rangle = \frac{ d \mu^2 }{d y} \delta^{ab} \delta(y_1-y_2) \delta^{(2)}(\vec{x}_1-\vec{x}_2)\,.
\end{equation}
In this equation, we take the charge densities to be local both in rapidity and in two dimensional transverse coordinate.
The locality in rapidity is required for what we wish to do in the following analysis. Upon integrating over coordinate
$y_1, \vec{x}_1$, we see that we get a non-vanishing contribution so that the total charge is non zero. In the MV model,
color charge screening is usually argued to occur on a scale size of order the confinement size scale and is outside the
range of applicability of the model.
On the other hand, if one evolves the MV model~\cite{Iancu:2000hn,Ferreiro:2001qy}, one restores charge neutrality on a
scale of order the saturation momentum~\cite{Iancu:2002tr}. The effect of evolution is to modify the charge-charge
correlation function, and is best understood in transverse momentum space:
\begin{equation}
\langle \rho^a(y_1,\vec{k}_{1}) \rho^b(y_2, \vec{k}_{2}) \rangle = (2\pi)^2 {{d\mu^2} \over {dy}} \delta^{ab} \delta(y_1-y_2) \delta^{(2)} (\vec{k}_1+\vec{k}_2) \Delta(\vec{k}_1)\,.
\end{equation}
The total charge in a transverse plane corresponding to a fixed rapidity is the limit as $k \rightarrow 0$ of the Fourier
transformed charge density. The requirement of charge neutrality is that
\begin{equation}
\lim_{k \rightarrow 0} \Delta(k) \rightarrow 0\,.
\end{equation}
It should be noted here that we are not being careful about gauge invariance when discussing a charge charge correlation
function at non-zero spatial separation. This is fixed up by inserting line ordered phases attached to the charge densities.
This complication comes in when one goes beyond leading order in coupling in the MV model; in this case fluctuations in the
transverse vector potential become important.
In a recent paper, we wrote down a phenomenological model which includes corrections to the MV
that enforce charge neutrality~\cite{McLerran:2015sva}. This model has
\begin{eqnarray}
\Delta(k) & = & {k^2 \over {k^2+m^2}} \nonumber \\
& = & 1 - {m^2 \over {k^2+m^2}} \,.
\end{eqnarray}
Here $m$ is of order the saturation momentum. The charge induced by the first term on the RHS of this equation is precisely
cancelled by the second term. Note that in coordinate space, the second term Fourier transforms to a $K_0(mr)$ so that the
neutralizing polarization charge density
is exponentially well localized around the initial charge density.
One effect of including the polarization charge density is to generate angular moments of elliptic flow
for radiation from the CGC~\cite{McLerran:2015sva}. Without final state interactions, one generates even moments
for multiparticle correlations which at high momentum have the correct semiquantitative features to
describe flow harmonics seen in $pp$ and $pA$ collisions. However these correlations are only present if we further
generalize our model to a finite number of emission sources. As happened for ellipticities in Glauber or CGC
computations~\cite{Bzdak:2013rya,Yan:2014afa}, fluctuation induced ellipticities vanish for large numbers of emitters.
It also should be noted that the odd flow moments vanish and may require some degree of final state interaction
and a deeper understanding of the nuclear wave function.
In any case, whether these flow contributions are essentially modified by final state interactions or not, it is important
to understand the initial state contribution to such moments.
It is the purpose of this paper to properly motivate a theory of a finite number of color charge emitters.
The $m^2$ correction to the charge density correlation function generates an effective Coulomb interaction.
This Coulomb interaction must be
viewed as arising from a higher order term in the operator product expansion for the effective theory of sources
in the McLerran-Venugopalan model. It does not directly arise from Coulomb interactions of the QCD Lagrangian from
which this theory is derived. The screening effect we generate from our
effective action is an analogy to Debye screening for a thermalized Quark Gluon Plasma.
\section{The Coulomb Interaction and Charge Screening}
We begin by observing that the action that generates the screened propagator above is
\begin{equation}
\label{eq:model}
S = \int dy \int \frac{d^2k_\perp}{(2\pi)^2} \,\,
\rho (y,\vec{k}_\perp) \left[
{\frac{1}{2 \overline{\mu}^2} }
\left( 1 + \kappa { \overline{\mu}^2 \over k_\perp^2} \right) \right]
\rho (y,- \vec{k}_\perp)\, ,
\end{equation}
where
\begin{equation}
\overline{\mu}^2 = {{d\mu^2} \over {dy}}
\end{equation}
is the two dimensional charge density per unit rapidity. And we introduced the dimensionless coefficient
$\kappa = m^2 / \overline{\mu}^2 $.
Note that the {\it second} term in this equation is simply the two-spatial dimensional Coulomb interaction which in coordinate space is
\begin{equation}
S_{C} = \int dy\, \int d^2x_\perp d^2y_\perp\, \,
\rho(y,\vec{x}_\perp)
\left[
{\kappa \over {8\pi}}
\ln\frac1 {(\vec {x}_\perp-\vec{y}_\perp)^2 \Lambda_{\rm IR}^2}
\right]
\, \, \rho(y,\vec{y}_\perp)\,.
\end{equation}
The dependence upon the IR scale arises from regulating the integration over small $k_\perp$ in the Fourier transformed
action integration. Note that if it is much larger than all scales in the problem,
it projects the total color charge in a unit of rapidity onto zero. Alternatively, if the total color charge in a
unit of rapidity is zero, which we will assume in what follows, then there is no dependence upon the IR scale, which
may therefore be replaced by some convenient physical scale size of order the size of
the system being considered.
The parameter $\bar\mu^2 = d\mu^2/dy$ is proportional to the charge squared per unit area per unit rapidity,
and is therefore proportional to the saturation momentum. We can see this explicitly
for adjoint representation sources (see e.g.~\cite{Iancu:2002tr,McLerran:2015sva}),
where
\begin{equation}
\mu^2 = 4\pi \alpha_s N_c N/S_\perp.
\end{equation}
Here $N$ is the total number of particle integrated over rapidity, and $S_\perp$ is the transverse area.
The saturation momentum in the MV model up to logarithmic corrections (see e.g.~\cite{Iancu:2002tr}) is
\begin{equation}
Q_s^2 = \alpha_s N_c \mu^2.
\end{equation}
Note that for a truly two dimensional Coulomb interaction there is a dimensional scale associated
with the two dimensional coupling. This has disappeared from this formula, and has been replaced by the
dimensionless three spatial dimensional coupling. We can think of our effective action as being associated
with a dimensional scale of order the saturation momentum, which is then weighed
in the action like $e^{-E/T}$ where the effective temperature $T$ is proportional to the saturation momentum.
The Coulomb 2-dimensional interaction is natural to expect when we have Lorentz
boosted Coulomb fields. The electric field around a point charge is boosted to
\begin{equation}
F^{i+} \propto \delta(x^-) {\hat{r} \over r}
\end{equation}
and arises from a vector potential $A^+ \propto \ln(r)$. This vector potential has an infrared cutoff
originating from a vector potential of the form
\begin{equation}
A^+ \propto \frac{\gamma} {\sqrt{\gamma^2x^{-2} + x_T^2}}
\end{equation}
In the limit $\gamma \rightarrow \infty$, this reduces to the logarithmic potential, so long
as $r \gg x^-/\gamma$. This explains the infrared cutoff in the two dimensional potential.
The origin of locality in rapidity follows because $x^- \sim 1/\gamma$ implies that
$\Delta x^- = \tau_1 e^y_1 - \tau_2 e^y_2 \sim 1/\gamma$ or $\Delta y = \ln(\tau_1/\tau_2)$.
This means interactions are localized within about a unit of rapidity.
Although it might appear that the Coulomb interaction
under investigation might originate from a simple interpretation of the underlying gauge theory,
it is not the case, because $S_C$ is not of the covariant form $F^{i+} F^{i-}$. It should be rather
thought of as arising from an operator product expansion for the effective action of the sources.
\section{Lattice formulation for the effective action and numerical results}
This theory can be put on a finite grid. There is a mild logarithmic singularity at short distance in
the Coulomb potential can be regulated by the finite grid size in the transverse direction. We can
choose the spacing to be one unit of rapidity, and this is a good approximation since distributions
are slowly varying over one unit of rapidity, and the Coulomb interaction, for the reasons discussed
above should have a range of about one unit of rapidity if the interaction in rapidity is properly accounted for.
This is of course finite in the limit the grid size shrinks to zero. We also assume the IR divergence is taken
care of by requiring total color charge neutrality on a confining scale.
It is useful to think about this theory for a discrete number of emitters, that is we imagine that the sources
of the color charge are single gluons carrying an amount of charge corresponding to the octet
representation of the gauge group. This pushes the classical description of the color charge
to its limit of validity. To have a truly proper theory one should treat the color charge
operator as a matrix and solve the theory like was done in static matrix models. For our
proposes, we will however treat the color charge as a continuous classical variable. Our
interest is in understanding the effects of having a finite number of particles and writing
down a theory that corresponds to such a finite number of sources. Presumably, if we discretize
on a small scale, but consider quntlities whose scale of variation
is over a size scale that includes many units of color charge, treating the color sources as classical
variable should be well behaved.
Before the discretization is performed, it is necessary to regularize the interaction
and maintain positivity of the action. The last requirement does not allow one to use a naive
delta-function point-like source on the lattice.
We can maintain the positivity of the action when we spread the sources
over the region of size $\Lambda^{-1}_{\rm UV}$, i.e. in the momentum space we consider
\begin{equation}
\label{Eq:rho_cut}
\rho^a(y, {\vec k}_\perp) =
\sum_{i} \frac{\Lambda^2_{\rm UV}}{k^2 + \Lambda^2_{\rm UV}}
\xi_i^a(y) \exp(-i {\vec k}_\perp {\vec x}_i)
\end{equation}
or transforming into the coordinate space
\begin{equation}
\label{Eq:rho_cut_x}
\rho^a(y, {\vec x}_\perp) =
\frac{1}{2\pi} \sum_{i} \xi_i^a(y) K_0(|{\vec x}_\perp - {\vec x}_i|) \Lambda_{\rm UV}\,.
\end{equation}
Note that in the limit of large $\Lambda_{\rm UV}$ Eq.~\eqref{Eq:rho_cut} reduces to the Fourier transform
of the delta-function.
Thus, combining Eq.~\eqref{Eq:rho_cut_x} and Eq.~\eqref{eq:model}
results in the MV action which is manifestly positive
\begin{equation}
\label{eq:S2int}
S_{\rm MV}[\{ \xi\}, \{ { \vec x } \}] = \int dy \; \sum_{i,j}
\xi_i^a(y)\, \, \left[
\frac{
|\hat{\vec x}_i - \hat{\vec x}_j|
K_1(|\hat{\vec x}_i - \hat{\vec x}_j|)
}{ 8 \pi \hat{\mu}^2}
\right]
\, \,
\xi_j^a(y),
\end{equation}
where in order to simplify the notations we introduced the following dimensionless variables
$\hat{x} = x \Lambda_{\rm UV}$ and $\hat{\mu} = \bar{\mu}/\Lambda_{\rm UV}$.
The Coulomb term is then
\begin{eqnarray}
&&S_C [\{ \xi\}, \{ { \vec x } \}] =
\int dy \int d^2 x_\perp d^2 y_\perp\,\, \rho(y, {\vec x}_\perp)
\left[
\frac{\kappa}{4\pi}
\ln \frac{1}{|{\vec x}_\perp-{\vec y}_\perp|\Lambda_{\rm IR}} \right]
\rho(x_-, {\vec y}_\perp) =
\\ &&
\int dy
\sum_{i,j}
\xi_i^a(y)
\left[
\frac{\kappa}{4\pi}
\left(
\ln \frac{1}{|\hat{\vec x}_i-\hat{\vec x}_j|\hat\Lambda_{\rm IR}}
-
K_0 \left( |\hat{\vec x}_i-\hat{\vec x}_j| \right)
- \frac12 |\hat{\vec x}_i-\hat{\vec x}_j|
K_1 \left( |\hat{\vec x}_i-\hat{\vec x}_j| \right)
\right)
\right] \xi_j^a(y)\,. \nonumber
\label{eq:coul}
\end{eqnarray}
We note that the kernel enclosed in the rectangular brackets is finite at small distances
due to compensation of the logarithmic singularities in the first and second terms. We will return to this point in
the next section.
Now to perform the simulations, one can use a spatial rectangular lattice with the lattice spacing $a$ and
transverse length $L$.
The rapidity is to be discretized as well to simulate a finite extent of sources in the rapidity direction.
This means that the integrals with respect to rapidity are replaced by sums as follows
\begin{equation}
\int dy \to \sum_n \delta y\, .
\label{eq:intdy}
\end{equation}
It is interesting that the action for a finite number of sources is similar to that for the MV model except that in the MV model, sources are allowed to fluctuate in all of the two dimensional space. The
typical charge per grid unit in the MV model is the same as the typical charge per particle in our discretized model. The essential difference is that for our discretized model, only a finite fraction of the transverse area is covered by sources. This is what ultimately will allow for generation of
elliptical flow moments in radiation from the grid, for effect that vanish in the limit that the number of sources $N \rightarrow \infty$.
As a test of our formalism, we will compute the source-source correlator and
the S matrix for single particle scattering by numerically
solving the finite $N$ discretized version of our theory.
Consider $N$ sources distributed in the target. We will assume that the distribution is uniform in rapidity and thus
the number of sources per a rapidity slice is given by $N/N_y$ where $N_y$ is the number of rapidity slices.
The sources are spread as we discussed before. Their (non-Abelian) Weizs\"acker-Williams fields are
in covariant gauge,
\begin{equation}\label{eq:A+}
A^{+ a}(y,\vec{x}_\perp) = - \frac{g}{ \nabla_\perp^2} \rho^a(y,\vec{x}_\perp)~.
\end{equation}
The only non-vanishing field
strength is $F^{+i}=-\partial^i A^+$. The (light-cone) electric field
is
\begin{equation}
E^i = \int d x^- F^{+i} = - \partial^i \int d x^- A^+~.
\end{equation}
The propagation of a fast charge in this field is described by an
eikonal phase given by a light-like Wilson line $V(\vec{x}_\perp)$:
\begin{equation}\label{eq:V_rho}
V(\vec{x}_\perp) = \mathbb{P} \exp\left\{ - ig \int d y
A(y,\vec{x}_\perp) \right\} \,,
\end{equation}
where $\mathbb{P}$ denotes path-ordering in rapidity $y$ and the field can be found by solving Eq.~\eqref{eq:A+}
\begin{equation}
A(y,\vec{x}_\perp) = \frac{g}{2\pi} \sum_i \xi_i(y)
\left( \ln\left[\frac{1}{|\hat{\vec x}_\perp-\hat{\vec x}_i| \hat{\Lambda}_{\rm IR} } \right]
- K_0(|\hat{\vec x}_\perp-\hat{\vec x}_i|)\right)\,.
\label{Axminus}
\end{equation}
Here $\hat{\Lambda}_{\rm IR} = \Lambda_{\rm IR}/\Lambda_{UV}$.
Note that $A(y,\vec{x}_\perp)$ is finite at any $\vec{x}_\perp$ except for infinite distances owing to the following identity for small ${\hat {r}}$
\begin{equation}
\ln\left[\frac{1}{\hat{r} \hat{\Lambda}_{\rm IR} } \right]
- K_0(\hat{r}) =
\gamma+\log \left(\frac{1}{2 \hat{\Lambda}_{\rm IR} }\right)+
\frac{1}{4}\hat{r}^2 \left(\log
\left(\frac{\hat{r} }{2 e }\right)+\gamma\right)+{\cal{O}}(x^3).
\label{eq:K0expansion}
\end{equation}
The S-matrix for scattering of this
charge off the given target field configuration is
\begin{equation}
{\cal S}_\rho(\vec{r}_\perp,\vec{b}_\perp) \equiv \frac{1}{d_R}\, {\rm tr} \, V^\dagger(\vec{x}_\perp)\,
V(\vec{y}_\perp)~, ~~~~\vec{r}_\perp \equiv \vec{x}_\perp-\vec{y}_\perp~,~~~2\vec{b}_\perp \equiv \vec{x}_\perp+\vec{y}_\perp~.
\end{equation}
In momentum space,
this can be written in the following form
\begin{equation}
{\cal S}_\rho(\vec{k}_\perp) = \frac{1}{d_R}\, {\rm tr} \left[ \int d^2x_\perp d^2y_\perp e^{i \vec{k}_\perp (\vec{x}_\perp-\vec{y}_\perp)} V^\dagger(\vec{x}_\perp)\,
V(\vec{y}_\perp)\right] = \frac{1}{d_R}\, {\rm tr} \, V^\dagger(\vec{k}_\perp)\,
V(\vec{k}_\perp),
\end{equation}
The S-matrix is obtained by averaging ${\cal S}_\rho(\vec{k}_\perp)$ with respect to target configurations.
Those are to be generated using the effective action we defined above. Here it is
important to realize that the effective action is quadratic in color charges $\xi_i$,
and thus they can be integrated out, leaving us with a non-trivial complicated function of
the positions of the charges. We prefer not to follow this way but rather to simulate the configurations
using the Metropolis Monte-Carlo algorithm as detailed in Appendix.
Lets first consider the source-source correlator for different number of particles $n$ per rapidity slice.
We check that there is a convergence if large values of $\Lambda_{\rm UV}$ are considered.
From very general considerations, it is clear that if the momentum $k_\perp$ is larger than
$\Lambda_{\rm UV}$ model results will be sensitive to the details of the source regularization
in Eq.~\eqref{Eq:rho_cut}. Indeed Fig.~\ref{fig:lambda_uv_dep} for $\Lambda_{\rm UV}=2\mu$
shows a very significant variation in
the correlator $\langle \rho(\vec{k}) \rho(-\vec{k}) \rangle $ which, at large $k_\perp$, is expected to be independent
of the momentum
and assume $\mu^2 S_\perp$ in the limit of the infinite number of sources. Nonetheless independent of the scale
$\Lambda_{\rm UV}$ we see the color neutralization driving the value of the correlator to zero at small momentum.
In our calculations we prefer to set the scale $\Lambda_{\rm UV}$ to the largest possible on the lattice $1/a$. In this case,
the $\rho \rho$ correlator is approximately constant above the color neutralization scale.
\begin{figure}
\centerline{\includegraphics[width=0.5\linewidth]{compar_lambda_uv.pdf}}
\caption{The correlator $\langle \rho(\vec{k}) \rho(-\vec{k}) \rangle$ normalized to yield $1$ in the limit of the infinite number
of sources. The number of sources is $N=500$ and $\kappa=1$. }
\label{fig:lambda_uv_dep}
\end{figure}
The dependence of the correlator on the number of sources is displayed in Fig.~\ref{fig:rhorho}
for $\kappa=0$ and $1$.
The offset of the Debye screening can be seen for the number of particles $N=100$.
\begin{figure}
\centerline{
\includegraphics[width=0.5\linewidth]{comparison.pdf}}
\caption{The correlator $\langle \rho(\vec{k}) \rho(-\vec{k}) \rangle$ normalized to yield $1$ in the limit of the infinite number
of sources. The solid (dashed) lines correspond to MV model without (with) Coulomb interaction.
The infrared cutoff is $\Lambda_{\rm IR} = 1/L$,
where $L$ is the system size.
}
\label{fig:rhorho}
\end{figure}
To check that the model reproduces $1/k_\perp^4$ dependence of the particle spectrum, we
computed the S matrix, depicted in Fig.~\ref{fig:S}. As expected, the results are not very sensitive to the
Coulomb interaction. This however should not be discouraging since the effect Coulomb interaction is essential
for the two particle correlation function, as discussed in Ref.~\cite{McLerran:2015sva}.
\begin{figure}
\centerline{
\includegraphics[width=0.5\linewidth]{comparison_w.pdf}}
\caption{ The differential spectrum $d^2 N/d^2 k$ normalized by the transverse area of the target.
The solid (dashed) lines corresponds to MV model without (with) Coulomb interaction.
The ultraviolet and infrared cutoffs are set to $\Lambda_{\rm UV} = 4 \mu$ and $\Lambda_{\rm IR} = 1/L$,
where $L$ is the system size.
}
\label{fig:S}
\end{figure}
\section{Conclusions}
We considered an extension of the McLerran-Venugopalan to include a finite number of sources of color charge and
Coulomb interactions between color charges. To simulate this theory on the lattice, the sources are regularized
in a manner that maintains the positivity of the MV action. We showed that if the corresponding scale of the transverse momentum is
large it leads to the expected results of approximately constant $\rho\rho$-correlator. We investigated the dependence on
$\kappa$ and showed the emergence of the color neutralization in the model. In this paper, we did not consider
the two particle correlation function, this is the ultimate aim of the model which will be reported elsewhere.
\section{Acknowledgements}
The authors gratefully acknowledge the comments of Jean Paul Blaizot, Soren Schlichting, Bjoern Schenke, Raju Venugopalan and Ulrich Heinz.
The authors are supported under Department of Energy contract number Contract No. DE-SC0012704.
\section{Appendix A: Numerical procedure}
The averaging with respect to the target configurations
must be performed with the weight function
\begin{equation}
W[\{x\},\{\xi\}] = \exp(-S(\{x\},\{\xi\})).
\label{eq:W}
\end{equation}
In order to generate the configurations we use the Metropolis algorithm for each rapidity slice.
Although the functional $S(\{x\},\{\xi\})$ is quadratic in $\{\xi\}$, it has a very non-trivial structure in the sources' positions $\{x\}$.
The Metropolis algorithm is performed along the following steps:
\begin{enumerate}
\item Initially $N/N_y$ sources are randomly distributed on a two-dimensional
rectangular grid with the spatial extent $L$ and the spacing $a$. $N_y$ is the number of the rapidity slices, see below. For each point,
the initial color vector $\xi^a$ is generated according to the Gaussian probability distribution
with zero mean and the variance $\bar{\mu}$.
\item The Metropolis step is performed. One source is randomly chosen;
a trial change, $\Delta S$, of the action $S = S_{\rm MV} + S_C$ is computed; if the source position is
randomly adjusted by a step $a$ in a randomly chosen direction and its color vector
receive a random contribution distributed according to a Gaussian with zero mean and
the variance of 10\% of $\bar{\mu}$.
\item If $\Delta S < 0$, the change of the position and the color vector is accepted.
Otherwise the change is accepted with the probability $\exp(-S)$.
\item The steps 2 and 3 are repeated until equilibrium is reached.
\item The configurations are collected. To avoid autocorrelation,
there is at least 10 MC sweeps between each saved configuration.
\end{enumerate}
After the configurations are collected, we compute the source density $\rho(y, \vec{x}_\perp)$ and the corresponding $A(y, \vec{x}_\perp)$.
The number of the rapidity slices is finite in our approach and each rapidity slice has approximately one unit in rapidity $\delta y = 1$.
We assume that the sources are generated in each rapidity slice independently.
Overall we consider $N_y$ rapidity slices, we fix $N_y=5$. Owing to the path ordering the Wilson line is given by the product of
exponentials computed in each rapidity slice
\begin{equation}
V(\vec{x}_\perp) = \prod_{i=1}^{N_y} \exp\left(
- i g A(y_i,\vec{x}_\perp) \right), \, \, y_i = i \delta y.
\label{eq:Vy}
\end{equation}
By performing Fourier transformation and averaging with respect to the target configurations we can extract $S(\vec{k}_\perp)$.
|
\section{Introduction}
Dirac first explored the existence of monopoles in the quantum mechanical interest and the quantization of electric charge \cite{Dir1}. Later the Kepler problems involving additional magnetic monopole interaction was independently discovered by McIntosh and Cisneros \cite{Mci1} and Zwanziger \cite{Zwa1} which is known as MICZ-Kepler problem. The MICZ-Kepler problem discusses the existence of the Runge-Lenz vector in addition to the angular momentum vector and a large dynamical symmetry $so(4)$ algebra \cite{Bar1,Jac1}. The generalized Dirac monopole exhibits a hidden dynamical algebra \cite{Men1}. The MICZ-Kepler problems have been generalized using many approaches to higher dimensions \cite{ Men1, Yan1,Mad1, Ner1, Mad4}. These monopole systems are separable in hyperspherical, spheroidal and parabolic coordinates \cite{ Men1, Yan1, Mad1, Ner1, Mad4}.
One important class of monopole models is Kaluza-Klein monopoles. Kaluza and Klein introduced a five-dimensional theory with one dimension curled up to form a circle in the context of unification theory \cite{Kak1, Kak2}. The complete algebraic description of Kaluza-Klein monopole allows a dynamical symmetry of the quantum motions \cite{Grs1, Gib1, Feh1, Cor1}. Models in space with Taub-NUT (Taub-Newman-Unit-Tambrino) metric have attracted much attention because the geodesic of the Taub-NUT metric describes appropriately the motion of well-separated monopole-monopole interactions ( see e.g. \cite{Grs1, Gib1, Feh1, Cor1, Man2, Ati1, Gro1, Cot1, Mar1}). This Taub-NUT metric is well known to admit the Kepler-type symmetry and provides non-trivial generalization of the Kepler problems. Iwai and his collaborators published a series of papers \cite{Iwa5, Iwa2, Iwa1, Iwa6} about the reduction system to admit a Kepler and harmonic oscillator type symmetry via generalized Taub-NUT metric. The generalized MICZ-Kepler problems \cite{Mad5} represent the intrinsic Smorodinsky-Winternitz system \cite{Fri1,Eva2} with monopole in 3D Euclidean space. Supersymmetry could be constructed in the generalized MICZ-Kepler system \cite{Ran1}. The MICZ-Kepler problem was also considered in $S^3$ \cite{Gri1}.
Quadratic algebra is a useful tool to obtain energy spectrum of superintegrable systems in the viewpoint of classical and quantum mechanics \cite{Gra1}. General quadratic algebras involving three generators generated by second-order integrals of motion and their realizations in terms of deformed oscillator algebra have been investigated in \cite{Das1}. Most of the applications of the quadratic algebra and representation theory have been on systems with scalar potential interactions \cite{Kal1, Kal2, Das2, Mil1, Isa1, Gen1, FH1,FH2}. In this paper we introduce a new superintegrable system in a Taub-NUT space with Abelian monopole interaction.
The contents of this paper are organized as follows: Section 2 introduces a new Kepler monopole system in a Taub-NUT space which includes Kaluza-Klein and MICZ monopole as special cases. It is remarked that this system covers a class of dynamical systems of interest. In section 3, the Schrodinger equation of the Hamiltonian in the Taub-NUT space is solved in both spherical and parabolic coordinates. In section 4, we construct second-order integrals of motion which show the superintegrability of the model in the parabolic coordinates. We obtain quadratic algebra and Casimir operator generated by integrals, and realize these algebras in terms of deformed oscillator algebra. This enables us to obtain the energy spectra of the system algebraically. Finally in section 5, we discuss the results and some open problems.
\section{Kepler monopole system}
Let us consider the generalized Taub-NUT metric in $\mathbb{R}^3$
\begin{eqnarray}
ds^2=f(r)d\textbf{r}^2+g(r)(d\psi+\textbf{A}. d\textbf{r} )^2,\label{mc1}
\end{eqnarray}
where
\begin{eqnarray}
&& f(r)=\frac{a}{r}+b, \qquad g(r)=\frac{r(a+br)}{1+c_1 r+dr^2},\label{fg1}
\\&&
A_1=\frac{-y}{r(r+z)}, \quad A_2=\frac{x}{r(r+z)}, \quad A_3=0,
\end{eqnarray}
$r=\sqrt{x^2+y^2+z^2}$ and the three dimensional Euclidean line element $d\textbf{r}^2=dx^2+dy^2+dz^3$, $a$, $b$, $c_1$, $d$ are constants. Here $\psi$ is the additional angular variable which describes the relative phase and its coordinate is cyclic with period $4\pi$ \cite{ Grs1, Cor1}. The functions $f(r)$ and $g(r)$ in the metric represent gravitational effects and $A_i$ is identified the monopole interaction.
We consider the Hamiltonian system associated with (\ref{mc1})
\begin{eqnarray}
H=\frac{1}{2}\left[\frac{1}{f(r)}\left\{p^2+\frac{c_0}{2r}+\frac{c_2}{2r(r+z)}+\frac{c_3}{2r(r-z)}+c_4\right\}+\frac{Q^2}{g(r)}\right],\label{k1}
\end{eqnarray}
where $c_0$, $c_2$, $c_3$, $c_4$ are constants and the operators
\begin{eqnarray}
p_i=-i(\partial_i-i A_i Q), \quad Q=-i\partial_\psi
\end{eqnarray}
satisfying the following commutation relations
\begin{eqnarray}
[p_i,p_j]=i\epsilon_{ijk}B_k Q, \quad [p_i,Q]=0,\quad \textbf{B}=\frac{\textbf{r}}{r^3}.
\end{eqnarray}
The system with Hamiltonian (\ref{k1}) is generalized Hartmann system \cite{Hartm1} in a curved Taub-NUT space with abelian monopole interaction. The Hartmann system is a deformed Coulomb interaction in 3D Euclidean space. This new system (\ref{k1}) is referred to as Kepler monopole system. It contains the Kaluza-Klein \cite{Gib1, Mar1} and MICZ monopoles \cite{Mci1, Zwa1} as special cases: it is Kaluza-Klein monopole system when $a=1$, $b=1$, $c_1=2$, $d=1$ and MICZ monopole system when $a=0$, $b=1$, $c_1=-2$, $d=1$, $c_2=0$, $c_3=0$.
The Kepler monopole system allows the following suitable total angular momentum operator $\textbf{L}$ and the Runge-Lenz operator \textbf{M} which can be constructed into the form
\begin{eqnarray}
\textbf{L}=\textbf{r}\times \textbf{p}-\frac{\textbf{r}}{r}Q, \quad \textbf{M}=\frac{1}{2}(\textbf{p}\times \textbf{L}-\textbf{L}\times \textbf{p})-\frac{\textbf{r}}{r}(aH-\frac{c_1}{2} Q^2).
\end{eqnarray}
The operators $L$ and $M$ commute with the Kepler monopole system (\ref{k1}) when $c_0=c_2=c_3=c_4=0$ and verify its maximally superintegrability.
These operators close to an $o(4)$ or $o(3,1)$ dynamical symmetry algebra in the quantum state with fixed energy and eigenvalue of operator $Q$:
\begin{eqnarray}
[L_i, L_j]=i\epsilon_{ijk}L_k,\quad [L_i, M_j]=i\epsilon_{ijk}M_k, \quad [M_i, M_j]=i\epsilon_{ijk}L_k(\frac{c_1 Q^2}{2}-aH).
\end{eqnarray}
It is $o(4)$ algebra for $\frac{c_1 Q^2}{2}-aH>0$ and $o(3,1)$ algebra for $\frac{c_1 Q^2}{2}-aH<0$.
In the next section, we examine model (\ref{k1}) in the spherical and parabolic coordinate systems for separation of variables.
\section{Separation of variables}
The Hamiltonian (\ref{k1}) with monopole interaction is multiseparable and allows the separation of variables for the corresponding Schr\"{o}dinger equations in spherical and parabolic coordinates.
\subsection{Spherical coordinates}
Let us consider the spherical coordinates
\begin{eqnarray}
&&x=r \sin\theta\cos\phi,\quad y=r\sin\theta\sin\phi,\quad z=r\cos\theta,
\end{eqnarray}
where $r>0$, $0\leq\theta\leq\pi$ and $0\leq \phi\leq 2\pi$.
In terms of these coordinates, the Taub-NUT metric (\ref{mc1}) takes on the form
\begin{eqnarray}
ds^2=f(r)(dr^2+r^2d\theta^2+r^2\sin^2\theta d\phi^2)+g(r)(d\psi+\cos\theta d\phi)^2,\label{mc2}
\end{eqnarray}
\begin{eqnarray}
A_1=-\frac{1}{r}\tan\frac{\theta}{2}\sin\phi,\quad A_2=\frac{1}{r}\tan\frac{\theta}{2}\cos\phi,\quad A_3=0,
\end{eqnarray}
and the Schrodinger equation $H\Psi=E\Psi$ of the model (\ref{k1}) takes the following form
\begin{eqnarray}
&&\frac{-r}{2(a+br))}\left[\frac{\partial^2}{\partial r^2}+\frac{2}{r}\frac{\partial}{\partial r}-\frac{c_0}{2r}-\frac{c_2}{4r^2\cos^2\frac{\theta}{2}}-\frac{c_3}{4r^2\sin^2\frac{\theta}{2}}-c_4\right.\nonumber\\&&\left.+\frac{1}{r^2}\left(\frac{\partial^2}{\partial\theta^2}+\cot\theta\frac{\partial}{\partial\theta}+\frac{1}{\sin^2\theta}\frac{\partial^2}{\partial\phi^2}\right)+\left(\frac{1}{r^2\cos^2\frac{\theta}{2}}+\frac{c_1}{r}+d\right)\frac{\partial^2}{\partial\psi^2}\right.\nonumber\\&&\left.-\frac{1}{r^2\cos^2\frac{\theta}{2}}\frac{\partial}{\partial\phi}\frac{\partial}{\partial\psi} \right]\Psi(r,\theta,\phi,\psi) =E\Psi(r,\theta,\phi,\psi).\label{kp2}
\end{eqnarray}
For the separation of (\ref{kp2}), the ansatz
\begin{eqnarray}
\Psi(r,\theta,\phi,\psi)=R(r)\Theta(\theta)e^{i(\nu_1\phi+\nu_2\psi)},
\end{eqnarray}
leads readily to the following radial and angular ordinary differential equations
\begin{eqnarray}
&&\left[\frac{d^2}{d r^2}+\frac{2}{r}\frac{d}{d r}+\alpha+\frac{\beta}{r}-\frac{k_1}{r^2}\right ]R(r)=0,\label{kp3}
\\
&&\left[\frac{d^2}{d\theta^2}+\cot\theta\frac{d}{d\theta}+\left\{k_1-\frac{c_2+(\nu_1-2\nu_2)^2}{2(1+\cos\theta)}-\frac{c_3+\nu_1^2}{2(1-\cos\theta)}\right\}\right]\Theta(\theta)=0,\nonumber\\&&\label{kp4}
\end{eqnarray}
where $\alpha=2b E-d \nu_2^2-c_4$, $\beta=2a E-c_1\nu_1^2-\frac{c_0}{2}$ and $k_1$ is separable constant.
We now turn to (\ref{kp4}), which can be converted, by setting $z=\cos\theta$ and $\Theta(z)=(1+z)^{a}(1-z)^{b} Z(z)$, to
\begin{eqnarray}
&&(1-z^2)Z''(z)+\{2a-2b-(2a+2b+2)z\}Z'(z)\nonumber \\&&\qquad +\{k_2-(a+b)(a+b+1)\}Z(z)=0,\label{pr5}
\end{eqnarray}
where $2a=\delta_{1}+\nu_1$, $2b=\delta_{2}+\nu_1$ and
\begin{eqnarray}
\delta_{1}=\sqrt{c_2+(\nu_1-2\nu_2)^2}-\nu_1,\quad \delta_{2}=\sqrt{c_3+\nu_1^2}-\nu_1. \label{pr1}
\end{eqnarray}
Comparing (\ref{pr5}) with the Jacobi differential equation
\begin{equation}
(1-x^{2})y''+\{\beta_1-\alpha_1-(\alpha_1+\beta_1+2)x\}y'+\lambda(\lambda+\alpha_1+\beta_1+1)y=0,\label{Jd1}
\end{equation}
we obtain the separation constant
\begin{equation}
k_1=(l+\frac{\delta_{1}+\delta_{2}}{2})(l+\frac{\delta_{1}+\delta_{2}}{2}+1),\label{pr2}
\end{equation}
where $l=\lambda+\nu_1$.
Hence solutions of (\ref{kp4}) are given in terms of the Jacobi polynomials as
\begin{eqnarray}
\Theta(\theta)&\equiv &\Theta_{l \nu_1}(\theta; \delta_{1}, \delta_{2})
= F_{l \nu_1}(\delta_{1}, \delta_{2})(1+\cos\theta)^{\frac{(\delta_{1}+\nu_1)}{2}}(1-\cos\theta)^{\frac{(\delta_{2}+\nu_1)}{2}}\nonumber\\&&\quad\times P^{(\delta_{2}+\nu_1, \delta_{1}+\nu_1)}_{l-\nu_1}(\cos\theta),\label{jp1}
\end{eqnarray}
where $P^{(\alpha, \beta)}_{\lambda}$ denotes Jacobi polynomial, $F_{l \nu_1}(\delta_{1}, \delta_{2})$ is the normalized constant and $l\in \mathbb{N}$.
Let us now turn to the radial equation (\ref{kp3}), which can be converted, by setting
$z=\varepsilon r$, $R(z)=z^{l+\frac{\delta_{1}+\delta_{2}}{2}} e^{-\frac{z}{2}}R_1(z)$ and $\alpha =\frac{-\varepsilon^2}{4}$, to
\begin{equation}
z\frac{d^2R_1(z)}{dz^2}+\{(2l+\delta_{1}+\delta_{2}+2)-z\}\frac{dR_1(z)}{dz}-(\frac{\delta_{1}+\delta_{2}}{2}+l+1)-\frac{\beta}{\varepsilon})R_1(z)=0.\label{an6}
\end{equation}
Set
\begin{eqnarray}
n=\frac{\beta}{\varepsilon}-\frac{\delta_{1}+\delta_{2}}{2}.\label{an7}
\end{eqnarray}
Then (\ref{an6}) can be expressed as
\begin{equation}
z\frac{d^2R_1(z)}{dz^2}+\{(2l+\delta_{1}+\delta_{2}+2)-z\}\frac{dR_1(z)}{dz}-(-n+l+1)R_1(z)=0.\label{an8}
\end{equation}
This is the confluent hypergeometric equation. Hence we can write the solution of (\ref{kp3}) in terms of the confluent hypergeometric function as
\begin{eqnarray}
&R(r)&\equiv R_{nl}(r;\delta_{1}, \delta_{2})=F_{nl}(\delta_{1},\delta_{2})(\varepsilon r)^{l+\frac{\delta_{1}+\delta_{2}}{2}} e^{\frac{-\varepsilon r}{2}}\nonumber\\&&
\quad \times {}_1 F_1(-n+l+1, 2l+\delta_{1}+\delta_{2}+2; \varepsilon r),\label{an9}
\end{eqnarray}
where $F_{nl}(\delta_{1},\delta_{2})$ is the normalized constant.
In order to have a discrete spectrum the parameter $n$ needs to be positive integer. From (\ref{an7}) we have
\begin{equation}
\varepsilon=\frac{\beta}{(n+\frac{\delta_{1}+\delta_{2}}{2})}
\end{equation} and hence the energy spectrum is given by
\begin{equation}
\frac{2aE-c_1\nu_2^2-\frac{c_0}{2} }{2\sqrt{c_4-2b E+d\nu_2^2}}=n+\frac{\delta_1+\delta_2}{2},\qquad n=1, 2, 3,\dots\label{en2}
\end{equation}
\subsection{Parabolic Coordinates }
The parabolic coordinate system has the form
\begin{eqnarray}
&&x=\sqrt{\xi\eta}\cos\phi,\quad y=\sqrt{\xi\eta}\sin\phi,\\&&
z=\frac{1}{2}(\xi-\eta),\quad r=\frac{1}{2}(\xi+\eta)
\end{eqnarray}
with $\xi, \eta >0$ and $0\leq\phi\leq 2\pi$.
In terms of the coordinates, the Taub-NUT metric (\ref{mc1}) takes the form
\begin{eqnarray}
&&ds^2=f(r)\left[(\xi+\eta)(d\xi^2+d\eta^2)+\xi\eta d\phi^2\right]+g(r)\left[ d\psi+\left(1-\frac{\xi-\eta}{\xi+\eta} d\phi\right) \right]^2,\nonumber\\&&\label{mc3}
\end{eqnarray}
\begin{eqnarray}
A_1=\frac{-2 \sqrt{\eta}}{\sqrt{\xi}}\frac{\sin\phi}{\xi+\eta}, \quad A_2=\frac{-2 \sqrt{\eta}}{\sqrt{\xi}}\frac{\cos\phi}{\xi+\eta}, \quad A_3=0
\end{eqnarray}
and the Schrodinger equation of the system (\ref{k1}) is
\begin{eqnarray}
&&\frac{-1}{2\{2a+b(\xi+\eta)\}}\left[4\xi\frac{\partial^2}{\partial\xi^2}+ 4\eta\frac{\partial^2}{\partial\eta^2}+4\frac{\partial}{\partial\xi} +4\frac{\partial}{\partial\eta}-c_0-\frac{c_2}{\xi}-\frac{c_3}{\eta}\right.\nonumber\\&&\left.-c_4(\xi+\eta)+\frac{\xi+\eta}{\xi\eta}\frac{\partial^2}{\partial\phi^2}-\frac{4}{\xi}\frac{\partial}{\partial\phi}\frac{\partial}{\partial\psi}+\left\{\frac{4}{\xi}+c_1+\frac{d}{4}(\xi+\eta)\right\}\frac{\partial^2}{\partial\psi^2}\right]\nonumber\\&&\times \Psi(\xi,\eta,\phi,\psi)=E\Psi(\xi,\eta,\phi,\psi).\label{kp1}
\end{eqnarray}
By making the Ansatz,
\begin{eqnarray}
\Psi(\xi,\eta,\phi,\psi)=\Theta_1(\xi)\Theta_2(\eta)e^{i(\nu_1\phi+\nu_2\psi)},
\end{eqnarray}
(\ref{kp1}) becomes
\begin{eqnarray}
&&\left[\partial_{\xi}(\xi\partial_{\xi})+\frac{\alpha}{4}\xi+\frac{\beta}{4}-\frac{c_2+(\nu_1-2\nu_2)^2}{4\xi}\right ]\Theta_1(\xi)=k_2 \Theta_1(\xi),\label{fk4}
\\
&&\left[\partial_{\eta}(\eta\partial_{\eta})+\frac{\alpha}{4}\eta+\frac{\beta}{4}-\frac{c_3+\nu_1^2}{4\eta}\right]\Theta_2(\eta)=-k_2 \Theta_2(\eta),\label{fk5}
\end{eqnarray}
where $\alpha=2b E-d\nu_2^2-c_4$, $\beta=2a E-c_1\nu_2^2-\frac{c_0}{2}$ and $k_2$ is separable constant. Putting $z_{1}=\varepsilon \xi $ in (\ref{fk4}), $z_{2}=\varepsilon \eta $ in (\ref{fk5}) and $\Theta_i(z_i)=z_i^\frac{\delta_i+\nu_1}{2}e^{-\frac{z_i}{2}}F_i(z_i)$, $\alpha=-\varepsilon^2$, these two equations represent
\begin{equation}
z_{i}\frac{d^2F_{i}(z_i)}{dz^2_{i}}+\{(\delta_{i}+\nu_1+1)-z_{i})\}\frac{dF_{i}(z_i)}{dz_{i}}-(\frac{\delta_{i}+\nu_1+1}{2}-\frac{\beta}{4\varepsilon}+\frac{k_i}{\varepsilon})F_{i}(z_i)=0,\label{fk6}
\end{equation}
where $i=1,2$, $k_2=-k_1$ and
\begin{eqnarray}
\delta_1=\sqrt{c_2+(\nu_1-2\nu_2)^2}-\nu_1,\quad \delta_2=\sqrt{c_3+\nu_1^2}-\nu_1.\label{dt1}
\end{eqnarray}
Let us now denote
\begin{eqnarray}
n_{i}=-\frac{1}{2}(\delta_{i}+\nu_1+1)+\frac{\beta}{4\varepsilon}-\frac{k_i}{\varepsilon}, \quad i=1,2.\label{fk8}
\end{eqnarray}
Then (\ref{fk6}) can be identified with the Laguerre differential equation. Thus we have the normalized wave function
\begin{eqnarray}
\Psi(\xi,\eta,\phi,\psi)&=&U_{n_{1}n_{2}\nu_1}(\xi,\eta,\phi,\psi; \delta_{1},\delta_{2})\nonumber\\&=&\frac{\hbar \varepsilon^2}{\sqrt{-8c_{0}}}f_{n_{1}\nu_1}(\xi;\delta_{1})f_{n_{2}\nu_1}(\eta;\delta_{2})\frac{e^{i(\nu_1\phi+\nu_2\psi)}}{\sqrt{2\pi}},
\end{eqnarray}
where
\begin{eqnarray*}
&f_{n_{i} \nu_1}(t_{i};\delta_{i})& \equiv f_{i}(t_{i})=\frac{1}{\Gamma(\nu_1+\delta_{i}+1)}\sqrt{\frac{\Gamma(n_{i}+\nu_1+\delta_{i}+1)}{ n_{i}!}}
(\varepsilon t_{i})^{(\nu_1+\delta_{i})/2} e^{-\varepsilon t_{i}/2}\nonumber\\&& \times {}_1F_{1}(-n_{i}, \nu_1+\delta_{i}+1; \varepsilon t_{i}),\label{fk7}
\end{eqnarray*}
$i=1, 2$ and $ t_{1}\equiv\xi , t_{2}\equiv\eta $. We look for the discrete spectrum and thus $n_{1}$ and $n_{2}$ are both positive integers. The expression for the energy of the system in terms of $n_{1}$ and $n_{2}$ can be found by using $\alpha=-\varepsilon^2$ in (\ref{fk8}) to be
\begin{equation}
\frac{2a E-c_1\nu_2^2-\frac{c_0}{2}}{2\sqrt{c_4-2bE+d\nu_2^2}}=n_1+n_2+\frac{\delta_1+\delta_2}{2}+\nu_1+1.\label{en3}
\end{equation}
We can relate the quantum numbers in (\ref{en2}) and (\ref{en3}) by the following relation
\begin{eqnarray}
n_{1}+n_{2}+\nu_1=n-1,
\end{eqnarray}
where $n_{1}, n_{2}=0, 1, 2,\dots.$
\section{Kepler monopole in Taub-NUT space and algebra structure}
In this section, we construct integrals of motion for the superintegrable monopole system (\ref{k1}), their quadratic algebra and Casimir operator. The realization of the algebra in terms of deformed oscillator algebra which generate a finite dimensional unitary representation (unirrep) to degenerate energy spectrum of the model (\ref{k1}) is presented.
\subsection{Integrals of motion and quadratic algebra}
The Hamiltonian system (\ref{k1}) has the following algebraically independent integrals of motion
\begin{eqnarray}
&&A=L^2+\frac{c_3 \xi}{4\eta}+\frac{c_2\eta}{4\xi}, \label{k2}
\\&&
B=M_3+\frac{\xi-\eta}{\xi+\eta}\left\{\frac{c_3\xi^2-c_2\eta^2}{2\xi^2\eta-2\xi\eta^2}+\frac{c_0}{4}\right\}\label{k3},
\\&& L_3,
\end{eqnarray}
where $L_3=\sqrt{\xi\eta}\cos\phi p_2-\sqrt{\xi\eta}\sin\phi p_1-\frac{\xi+\eta}{\xi-\eta}Q$ and $M_3=\frac{1}{2}\{(p_1L_2-p_2L_1)-(L_1p_2-L_2p_1)\}-\frac{z}{r}(aH-\frac{c_1}{2}Q^2).$
The integral of motion $A$ is associated with the separation of variables in spherical coordinates and $B$ is associated with the separation of variables in parabolic coordinates system. The Hamiltonian (2.4) is minimally superintegable as it allows five integrals of motion including $H$ and the superintegrability can be verified by proving the commutation relations
\begin{eqnarray}
&[A, L_3]=0=[A,H], \quad [B, L_3]=0=[B,H],&\\&[A,Q]=0=[B,Q], \quad [H, Q]=0=[H, L_3], \\&[Q,L_3]=0.&
\end{eqnarray}
For convenience we present a diagram of the above commutation relations
\begin{eqnarray}
\begin{xy}
(10,0)*+{Q}="f"; (50,0)*+{L_{3}}="k"; (0,30)*+{A}="a"; (60,30)*+{B}="b"; (30,60)*+{H}="h";
"f";"k"**\dir{--};
"h";"b"**\dir{--};
"h";"f"**\dir{--};
"h";"a"**\dir{--};
"h";"k"**\dir{--};
"h";"f"**\dir{--};
"a";"f"**\dir{--};
"a";"k"**\dir{--};
"b";"f"**\dir{--};
"b";"k"**\dir{--};
\end{xy}
\end{eqnarray}
The diagram shows that $Q$ and $L_3$ are central elements.
We now construct a new integral of motion $C$ of the system from (\ref{k2}) and (\ref{k3}) via commutator
\begin{eqnarray}
[A,B]=C.
\end{eqnarray}
Here $C$ is a cubic function of momenta. By direct computation we can show that the integrals of motion $A$, $B$ and central elements $H$, $Q$, $L_3$ satisfy the following quadratic algebra $Q(3)$,
\begin{eqnarray}
&[A,B]&=C.\label{k4}
\\&[A,C]&=2\{A,B\}-4aHQL_3+2c_1Q^3L_3+c_0QL_3+(c_2+c_3)B\nonumber\\&&\quad+a(c_2-c_3)H-\frac{1}{2}c_1(c_2-c_3)Q^2-\frac{1}{4}c_0(c_2-c_3)\label{k5},
\\&[B,C]&=-2B^2+8bAH+2a^2H^2-2(ac_1+2b)HQ^2-4bHL_3^2-4dAQ^2\nonumber\\&&\quad+\frac{1}{2}(c_1^2+4d)Q^4+2dQ^2L_3^2-4c_4A+(4b-ac_0)H\nonumber\\&&\quad+\frac{1}{2}(c_0 c_1+4c_4-4d)Q^2+2c_4L_3^2+\frac{1}{8}(c_0^2-16c_4)\label{k6}.
\end{eqnarray}
The Casimir operator of $Q(3)$ in terms of central elements is given by
\begin{eqnarray}
K&=&4a^2H^2L_3^2+4a^2H^2Q^2+a^2(c_2+c_3)H^2-4ac_1HQ^4-4(2b+ac_1)HQ^2L_3^2\nonumber\\&&-(2ac_0-2bc_2+ac_1c_2-2bc_3+ac_1c_3)HQ^2-2(ac_0-bc_2-bc_3)HL_3^2\nonumber\\&&-\frac{1}{2}(4bc_2+ac_0c_2+4bc_3+ac_0c_3-4bc_2c_3)H+4b(c_2-c_3)HQL_3+c_1^2Q^6 \nonumber\\&& +(c_1^2+4d)Q^4L_3^2+\frac{1}{4}(4c_0c_1 +c_1^2c_2 +c_1^2c_3 -4c_2d -4c_3d)Q^4+(c_0c_1+4c_4\nonumber\\&&-c_2d-c_3d)Q^2L_3^2-2d(c_2-c_3)L_3Q^3 +\frac{1}{4}(c_0^2+c_0c_1c_2+c_0c_1c_3-4c_2c_4\nonumber\\&&-4c_3c_4+4c_2d+4c_3d-4c_2c_3d)Q^2-2c_4(c_2-c_3)QL_3+\frac{1}{4}(c_0^2-4c_2c_4\nonumber\\&&-4c_3c_4)L_3^2 +\frac{1}{16}(c_0^2c_2+c_0^2c_3+16c_2c_4+16c_3c_4-16c_2c_3c_4)\label{k7}.
\end{eqnarray}
This is a main step in the application of the deformed oscillator algebra approach which relies on the quadratic algebra $Q(3)$ and the Casimir operator $K$. In order to derive the spectrum of the system we realize the quadratic algebra $Q(3)$ in terms of deformed oscillator algebras \cite{Das1, Das3} $\{\aleph, b^{\dagger}, b\}$ of the form
\begin{eqnarray}
[\aleph,b^{\dagger}]=b^{\dagger},\quad [\aleph,b]=-b,\quad bb^{\dagger}=\Phi (\aleph+1),\quad b^{\dagger} b=\Phi(\aleph).\label{kpfh}
\end{eqnarray}
Here $\aleph $ is the number operator and $\Phi(x)$ is well behaved real function satisfying
\begin{eqnarray}
\Phi(0)=0, \quad \Phi(x)>0, \quad \forall x>0.\label{kpbc}
\end{eqnarray}
It is non-trivial to obtain such a realization and find the structure function $\Phi(x)$. The realization of $Q(3)$ is of the form $A=A(\aleph)$, $B=b(\aleph)+b^{\dagger}\rho(\aleph)+\rho(\aleph)b$, where
\begin{eqnarray}
A(\aleph)&=&\left\{(\aleph+u)^2-\frac{1}{4}-\frac{c_2+c_3}{4}\right\},
\\
b(\aleph)&=&\left[4aHQL_3-2c_1Q^3L_3-c_0QL_3-a(c_2-c_3)H+\frac{1}{2}c_1(c_2-c_3)Q^2\right.\nonumber\\&&\left.+\frac{1}{4}c_0(c_2-c_3)\frac{1}{4}\right]\frac{1}{4(\aleph+u)^2-1} ,
\\
\rho(\aleph)&=&\frac{1}{3. 2^{20}(\aleph+u)(1+\aleph+u)\{1+2(\aleph+u)^2\}},
\end{eqnarray}
and $u$ is a constant to be determined from constraints on the structure function.
\subsection{Unirreps and energy spectrum}
We now construct the structure function $\Phi(x)$ from the realizations of the quadratic algebra ((\ref{k4})-(\ref{k6})) and the Casimir operator (\ref{k7}) as follows
\begin{eqnarray}
\Phi(x;u, H)&=&12288 \left[c_0^2 + c_0 (-8aH + 4 c_1 Q^2) + 4 [2 H \{2 a^2 H + b(1 - 2 (x+u))^2\}\right.\nonumber \\&&\left. - c_4 (1 - 2 (x+u))^2- \{4 a c_1 H + d(1 - 2 (x+u))^2\} Q^2 + c_1^2 Q^4]\right]\nonumber\\&&\times\left[c_2^2 -2 c_2 \{c_3 + (1 - 2 (x+u))^2 + 4 L_3 Q\}+ \{c_3 - (-1 + 2L_3 \right. \nonumber\\&&\left.+ 2 (x+u)) (-1 + 2 (x+u) - 2 Q)\} \{c_3 + (1 + 2 L_3 - 2 (x+u)) \right. \nonumber\\&&\left.\times(-1 + 2 (x+u) + 2 Q)\}\right].
\end{eqnarray}
We need to use an appropriate Fock space to obtain finite dimensional unirreps. Thus the action of the structure function on the Fock basis $|n, E\rangle$ with $\aleph|n, E\rangle =n|n,E\rangle$ and using the eigenvalues of $H$, $Q$ and $L_3$, the structure function becomes the following factorized form:
\begin{eqnarray}
\Phi(x;u, E)&=&-3145728 (c_4 - 2 bE + d q_2^2)[x+u-\frac{1}{2}(1-m_1+m_2)]\nonumber\\&&\times[x+u-\frac{1}{2}(1+m_1-m_2)][x+u-\frac{1}{2}(1-m_1-m_2)]\nonumber\\&&\times [x+u-\frac{1}{2}(1+m_1+m_2)]\left[x+u-\left(\frac{1}{2}+\frac{c_0-4aE+2c_1 q_2^2}{4\sqrt{c_4-2bE+dq_2^2}}\right)\right]\nonumber\\&&\times \left[x+u-\left(\frac{1}{2}-\frac{c_0-4aE+2c_1 q_2^2}{4\sqrt{c_4-2bE+dq_2^2}}\right)\right],\label{stf1}
\end{eqnarray}
where $m_1^2=c_2+(q_1-q_2)^2$, $m_2^2=c_3+(q_1+q_2)^2$, $q_1$ and $q_2$ are the eigenvalues of $L_3$ and $Q$ respectively.
For finite dimensional unitary representations we should impose the following constraints on the structure function (\ref{stf1}),
\begin{equation}
\Phi(p+1; u,E)=0,\quad \Phi(0;u,E)=0,\quad \Phi(x)>0,\quad \forall x>0,\label{pro2}
\end{equation}
where $p$ is a positive integer. These constraints give $(p+1)$-dimensional unitary representations and their solution gives the energy $E$ and the arbitrary constant $u$. Thus all the possible structure function and energy spectra for $
\epsilon_1=\pm 1$, $\epsilon_2=\pm 1$,
\\Set-1:
\begin{eqnarray}
u=\frac{1}{2}(1 +\epsilon_1 m_1 +\epsilon_2 m_2), \quad \frac{2aE-c_1 q^2_2-\frac{c_0}{2}}{\sqrt{c_4-2bE+dq_2^2}}= 2 + 2 p + \epsilon_1 m_1 + \epsilon_2 m_2 , \nonumber\\&&
\end{eqnarray}
\begin{eqnarray}
\Phi(x)&=&3145728 x(x +\epsilon_1 m_1)(x +\epsilon_2 m_2)(x+\epsilon_1 m_1+\epsilon_2 m_2)(1+p-x)\nonumber\\&&\times(1+ p+x +\epsilon_1 m_1+\epsilon_2 m_2 )s_1^2.
\end{eqnarray}
\\Set-2:
\begin{eqnarray}
&&u=\frac{1}{2}-\frac {2aE-c_1 q^2_2-\frac{c_0}{2}}{2\sqrt{c_4-2bE+dq_2^2}}, \quad \frac{2aE-c_1 q^2_2-\frac{c_0}{2}}{\sqrt{c_4-2bE+dq_2^2}}= 2 + 2 p + \epsilon_1 m_1 + \epsilon_2 m_2, \nonumber\\&&
\end{eqnarray}
\begin{eqnarray}
\Phi(x)&=& \frac{1572864 (1 + p)}{a}[x-1-p][1 + p- x+\epsilon_1 m_1 ][1+p-x+\epsilon_2 m_2 ]\nonumber\\&& \times[1+ p- x+\epsilon_1 m_1 +\epsilon_2 m_2 ][2+ 2 p- x+\epsilon_1 m_1 +\epsilon_2 m_2 ]\left[-2a(c_4 + d q_2^2)\right.\nonumber\\&&\left. + b\{c_0 + 2c_1 q_2^2 + 2 (2+2 p+\epsilon_1 m_1 +\epsilon_2 m_2 )s_1\}\right],
\end{eqnarray}
\begin{eqnarray*}
\text{where} &s^2_1&=c_4+d q_2^2+\frac{b}{2a^2}\left[b \eta_1^2-a c_0 - 2 a c_1 q_2^2\right.\\&&\left.\quad +\sqrt{\eta_1^2 \{b^2 \eta_1^2 - 2 a b (c_0 + 2 c_1 q_2^2) + 4 a^2 (c+4 + d q_2^2)\}}\right], \\& \eta_1&=2p + 2 + \epsilon_1 m_1 +\epsilon_2 m_2.
\end{eqnarray*}
The Structure functions are positive for the constraints $\varepsilon_1=1$, $\varepsilon_2=1$ and $m_1, m_2>0$. Using formula (\ref{dt1}) and $\nu_2=q_2$, we can write $m_1=\sqrt{c_2+(\nu_1-2\nu_2)^2}-\nu_1$ and $m_2=\sqrt{c_3+\nu_1^2}-\nu_1$. Making the identification $p=n_1+n_2$, the energy spectrum coincides with the physical spectra (\ref{en3}). The physical wave functions involve other quantum numbers and we have in fact degeneracy of $p+1$ only when these other quantum numbers would be fixed. The total number of degeneracies may be calculated by taking into account the further constraints on these quantum numbers.
\section{Conclusion}
In this paper, we have introduced a new superintegrable monopole system in the Taub-NUT space whose wave functions are given in terms of a product of Laguerre and Jacobi polynomials. By construction, algebraically independent integrals of motion of the Hamiltonian (\ref{k1}) makes it a superintegrable system with monopole interactions. We have presented the quadratic algebra and corresponding Casimir operator generated by the integrals. The realization of this algebra in terms of deformed oscillator enable us to provide the finite dimensional unitary representations and the degeneracy of the energy spectrum of the monopole system.
{\bf Acknowledgements:}
The research of FH was supported by International Postgraduate Research Scholarship and Australian Postgraduate Award. IM was supported by the Australian Research Council through a Discovery Early Career Researcher Award DE 130101067. YZZ was partially supported by the Australian Research Council, Discovery Project DP 140101492. He would like to thank the Institute of Theoretical Physics, Chinese Academy of Sciences for hospitality and support.
|
\section{Introduction and Main Result}
Let $\mathcal{A}$ denote the class of all normalized analytic functions $f$ in the open unit disk
${\mathbb D}:=\{z\in\mathbb{C}:\,|z|<1\}$, i.e. $f$ has the Taylor series expansion
\begin{equation}\label{sec1-eqn1}
f(z)=z+\sum_{n=2}^\infty a_n z^n.
\end{equation}
The Taylor polynomial $s_n(z)=s_n(f)(z)$ of $f$ in $\mathcal{A}$, defined by,
$$s_n(z)=z+\sum_{k=2}^n a_k z^k
$$
is called the $n$-th {\em section/partial sum} of $f$.
Denote by $\mathcal{S}$, the class of {\em univalent} functions in $\mathcal{A}$.
A function $f\in\mathcal{A}$ is said to be {\em locally univalent}
at a point $z_0\in D\subset \mathbb{C}$ if it is univalent in some neighborhood of $z_0$;
equivalently $f'(z_0)\neq 0$. A function $f\in \mathcal{A}$ is called {\em convex} if $f(\mathbb{D})$
is a convex domain. The set of all convex functions are denoted by $\mathcal{C}$. The functions $f\in\mathcal{C}$
are characterized by the well-known fact
$${\rm Re}\left(1+\frac{zf''(z)}{f'(z)}\right)>0,\quad |z|<1.
$$
In this article, we mainly focus on a class, denoted by $\mathcal{L}$, of all
locally univalent {\em odd} functions $f$ satisfying
\begin{equation}\label{sec1-eqn2}
{\operatorname{Re}\,}\left(1+\frac{zf''(z)}{f'(z)}\right)>-\frac{1}{2}, \quad z\in {\mathbb D}.
\end{equation}
Clearly, a function $f\in\mathcal{L}$ will have the Taylor series expansion
$f(z)=z+\sum_{n=2}^{\infty}{a_{2n-1} z^{2n-1}}$.
The function $f_0(z)=z/\sqrt{1-z^2}$ plays the role of an extremal function
for $\mathcal{L}$; see for instance \cite[p.~68, Theorem~2.6i]{MM00}.
This article is devoted to finding the largest disk $|z|<r$ in which every section
$s_{2n-1}(z)=z+\sum_{k=2}^na_{2k-1}z^{2k-1}$, of $f\in \mathcal{L}$, is convex;
that is, $s_{2n-1}$ satisfies
$${\rm Re}\left(1+\frac{zs_{2n-1}''(z)}{s_{2n-1}'(z)}\right)>0.
$$
Our main objective in this article is to prove
\medskip
\noindent
{\bf Main Theorem.} {\em Every section of a function in $\mathcal{L}$ is convex in the disk $|z|< \sqrt{2}/3$.
The radius $\sqrt{2}/3$ cannot be replaced by a greater one.}
\medskip
\noindent
This observation is also explained geometrically in Figure~\ref{fig1}
by considering the third partial sum, $s_{3,0}$, of the extremal function
$f_0$. We next discuss some motivational background of our problem.
\begin{figure}[H]\label{fig1}
\begin{minipage}[b]{0.5\textwidth}
\includegraphics[width=6.7cm]{RadiusSqrt2by3.eps}
\end{minipage}
\begin{minipage}[b]{0.45\textwidth}
\hspace*{-0.3cm}\includegraphics[height=5.3cm,width=6.7cm]{Radius2by3.eps}
\end{minipage}
\caption{The first figure shows convexity of the image domain $s_{3,0}(z)$
for $|z|<\sqrt{2}/3$ and the second figure
shows non-convexity of the image domain $s_{3,0}(z)$ for $|z|<2/3=:r_0~(r_0>\sqrt{2}/3)$.}
\end{figure}
Considering odd univalent functions and studying classical problems
of univalent function theory such as (successive) coefficient bounds,
inverse functions, etc. are quite interesting and found throughout the
literature; see for instance \cite{Ke86,LZ84,Mil81,Ye05}.
In fact, an application of the Cauchy-Schwarz inequality shows that
the conjecture of Robertson: $1+|c_3|^2+|c_5|^2+\cdots+|c_{2n-1}|^2\le n$,
$n\ge 2$, for each odd function $f(z)=z+c_3z^3+c_5z^5+\cdots$ of $\mathcal{S}$,
stated in 1936 implies the well-known Bieberbach conjecture \cite{Rob36};
see also \cite{Dur77}.
In our knowledge, studying radius properties for sections of odd univalent functions
are new (as we do not find in the literature).
Note that a subclass denoted by $\mathcal{F}$, of the class, $\mathcal{K}$,
of close-to-convex functions, consisting of all locally univalent
functions $f\in\mathcal{A}$ satisfying
the condition (\ref{sec1-eqn2}) was considered in \cite{PSY14}. In this paper,
we consider functions from $\mathcal{F}$ that have odd Taylor coefficients.
Note that the following inclusion relations hold:
$$\mathcal{L}\subsetneq \mathcal{F}\subsetneq \mathcal{K}\subsetneq \mathcal{S}.
$$
The fact that functions in $\mathcal{F}$ are close-to-convex may be obtained
as a consequence of the result due to Kaplan (see \cite[p. 48, Theorem 2.18]{Dur83}).
In \cite{PSY14}, Ponnusamy et. al. have shown that every section of a function in the class $\mathcal{F}$ is convex in the disk $|z|<1/6$ and the radius $1/6$ is the best possible.
They conjectured that every section of
functions in the family $\mathcal{F}$ is univalent and close-to-convex in the disk $|z|<1/3$.
This conjecture has been recently settled by Bharanedhar and Ponnusamy in \cite[Theorem~1]{BP}.
The problem of finding the radius of univalence of sections of $f$ in $\mathcal{S}$
was first initiated by Szeg\"o in 1928.
According to the Szeg\"o theorem
\cite[Section~8.2, p. 243-246]{Dur83}, every section $s_n(z)$ of a function
$f\in \mathcal{S}$ is univalent in the disk $|z|<1/4$; see \cite{Sze28} for the original paper.
The radius $1/4$ is best
possible and can be verified from the second partial sum of the Koebe function
$k(z)=z/(1-z)^2$.
Determining the exact (largest) radius of univalence
$r_n$ of $s_n(z)$ ($f\in\mathcal{S}$) remains an open problem.
However, many other related problems
on sections have been solved for various geometric subclasses of $\mathcal{S}$,
eg. the classes $\mathcal{S}^*$, $\mathcal{C}$ and $\mathcal{K}$ of starlike, convex and
close-to-convex functions, respectively (see Duren \cite[\S8.2, p.241--246]{Dur83},
\cite{Goo83,Rob41,Rus72,Sma70} and the survey articles \cite{Ili79,Rav12}).
In \cite{Mac62}, MacGregor considered the class
$$\mathcal{R}=\{f\in \mathcal{A}:{\operatorname{Re}\,} f'(z)>0, z\in {\mathbb D}\}
$$
and proved that the partial sums $s_n(z)$ of $f\in \mathcal{R}$ are univalent
in $|z|<1/2$, where the radius $1/2$ is best possible. On the other hand, in \cite{Sin70},
Ram Singh obtained the best radius, $r=1/4$, of convexity for sections of functions in the class
$\mathcal{R}$. The reader can refer to \cite{PP74} for related information. Radius of
close-to-convexity of sections of close-to-convex functions is obtained in
\cite{Miki56}.
By the argument principle, it is clear that the $n$-th section $s_n(z)$ of an arbitrary
function in $\mathcal{S}$ is univalent in each fixed compact subdisk
$\overline{{\mathbb D}_r}:=\{z\in {\mathbb D}:|z|\le r\}(r<1)$ of ${\mathbb D}$ provided that $n$ is sufficiently
large. In this way one can get univalent polynomials in $\mathcal{S}$ by setting
$p_n(z)= \frac{1}{r}s_n(rz)$. Consequently, the set of all univalent polynomials
is dense in the topology of locally uniformly convergence in
$\mathcal{S}$. The radius of starlikeness of the partial sums $s_n(z)$ of $f\in\mathcal{S}^*$
was obtained by Robertson in \cite{Rob41}; (see also \cite[Theorem~2]{Sil88}) in the following form:
\medskip
\noindent
{\bf Theorem~A.} \cite{Rob41}
{\em If $f\in \mathcal{S}$ is either starlike, convex, typically-real, or convex in the direction of imaginary axis, then there
is an $N$ such that, for $n\ge N$, the partial sum $s_n(z)$ has the same property
in ${\mathbb D}_r:=\{z\in {\mathbb D}:|z|<r\}$, where $r\ge 1-3(\log n)/n$.}
\medskip
\noindent
However, Ruscheweyh in \cite{Rus88} proved a stronger result by showing that the partial
sums $s_n(z)$ of $f$ are indeed starlike in ${\mathbb D}_{1/4}$ for functions $f$ belonging not only
to $\mathcal{S}$ but also to the closed convex hull of $\mathcal{S}$.
Robertson \cite{Rob41} further showed that sections of the Koebe function $k(z)$ are univalent
in the disk $|z|<1-3 n^{-1} \log n$ for $n\ge 5$,
and that the constant $3$ cannot be replaced by a smaller constant. However, Bshouty
and Hengartner \cite{BH91} pointed out that the Koebe function is not extremal for
the radius of univalency of the partial sums of $f\in \mathcal{S}$. A well-known
theorem by Ruscheweyh and Sheil-Small \cite{RS73} on convolution allows us to conclude immediately
that if $f$ belongs to $\mathcal{C},\mathcal{S}^*,$ or $\mathcal{K}$, then its $n$-th section is
respectively convex, starlike, or close-to-convex in the disk
$|z|<1-3n^{-1} \log n$, for $n\ge 5$.
Silverman in \cite{Sil88} proved that the radius of starlikeness for sections of
functions in the convex family $\mathcal{C}$ is $(1/2n)^{1/n}$ for all $n$.
We suggest readers refer to \cite{PSY14,Rus72,Sma70,Sze28} and recent articles \cite{OP11,OP13,OP14,OPW13} for further interest on this topic. It is worth recalling that
radius properties of harmonic sections have recently been studied in \cite{KPV14,LS13-1,LS13-2,LS15,PS15}.
\section{Preparatory results}
In this section we derive some useful results to prove our main theorem.
\begin{lemma}\label{sec2-lem1}
If $f(z)=z+\sum_{n=2}^{\infty}{a_{2n-1} z^{2n-1}}\in \mathcal{L}$, then the following estimates are obtained:
\begin{itemize}
\item[\bf (a)] $|a_{2n-1}|\leq \frac{(2n-2)!}{2^{2n-2}(n-1)!^2}$ for $n\ge2$. The equality holds for
$$f_0(z)=\frac{z}{\sqrt{1-z^2}}
$$
or its rotation.
\medskip
\item[\bf (b)] $\left|\frac{zf^{\prime\prime}(z)}{f^{\prime}(z)}\right|\leq \frac{3r^2}{1-r^2}$ for $|z|=r<1$. The inequality is sharp.
\medskip
\item[\bf (c)] $\frac{1}{(1+r^2)^{3/2}}\leq |f^{\prime}(z)|\leq \frac{1}{(1-r^2)^{3/2}}$ for $|z|=r<1$. The inequality is sharp.
\medskip
\item[\bf (d)] If $f(z)=s_{2n-1}(z)+\sigma_{2n-1}(z)$, with $\sigma_{2n-1}(z)=\sum_{k=n+1}^{\infty}{a_{2k-1} z^{2k-1}}$,
then for $|z|=r<1$ we have
$$|\sigma_{2n-1}^{\prime}(z)|\leq A(n,r)
~~\mbox{ and }~~
|z\sigma_{2n-1}^{\prime\prime}(z)|\leq B(n,r),
$$
where
$$A(n,r)=\sum_{k=n+1}^{\infty}\frac{(2k-1)!}{2^{2k-2}(k-1)!^2}r^{2k-2}
~~\mbox{ and }~~
B(n,r)=\sum_{k=n+1}^{\infty}\frac{(2k-2)(2k-1)!}{2^{2k-2}(k-1)!^2}r^{2k-2}.
$$
The ratio test guarantees that both the series are convergent.
\end{itemize}
\end{lemma}
\begin{proof}
{\bf (a)} Set
\begin{equation}\label{Neweqn}
p(z)=1+\displaystyle\frac{2}{3}\left(\frac{zf^{\prime\prime}(z)}{f^{\prime}(z)}\right).
\end{equation}
Clearly, $p(z)=1+\sum_{n=1}^{\infty}{p_n z^n}$ is analytic in ${\mathbb D}$ and ${\operatorname{Re}\,} p(z)>0$ there.
So, by Carath{\'e}odory Lemma, we obtain that $|p_n|\leq 2$ for all $n \ge 1$.
Putting the series expansions for $f'(z),~f''(z)$ and $p(z)$ in (\ref{Neweqn}) we get
$$\sum_{n=2}^{\infty}{(2n-1)(2n-2)a_{2n-1}z^{2n-1}}
=\frac{3}{2}\sum_{n=2}^{\infty}\left(\sum_{k=1}^{n-1} p_{2k-1}(2n-2k-1)a_{2n-2k-1}\right)z^{2n-2}
$$
$$+\frac{3}{2}\sum_{n=2}^{\infty}\left(\sum_{k=1}^{n-1} p_{2k}(2n-2k-1)a_{2n-2k-1}\right)z^{2n-1}.
$$
Equating the coefficients of $z^{2n-1}$ and $z^{2n-2}$ on both sides, we obtain
$$\sum_{k=1}^{n-1} p_{2k-1}(2n-2k-1)a_{2n-2k-1}=0
$$
and
\begin{equation}\label{sec2-eqn0}
(2n-1)(2n-2)a_{2n-1}=\frac{3}{2}\sum_{k=1}^{n-1} p_{2k}(2n-2k-1)a_{2n-2k-1},
\quad \mbox{ for all } n\ge 2.
\end{equation}
Hence,
\begin{equation}\label{sec2-eq1}
|a_{2n-1}|\leq\frac{3}{(2n-1)(2n-2)}\sum_{k=1}^{n-1}(2k-1)|a_{2k-1}|.
\end{equation}
For $n=2$, we can easily see that $|a_3|\leq 1/2$, and for $n=3$, we have
$$|a_5|\leq \frac{3}{20}(1+3|a_3|)\leq \frac{3}{8}.
$$
Now, we can complete the proof by method of induction. Therefore, if we assume $|a_{2k-1}|\leq \frac{(2k-2)!}{2^{2k-2}(k-1)!^2}$ for $k=2, 3, \ldots , n-1$, then we deduce
from (\ref{sec2-eq1}) that
$$|a_{2n-1}|\leq\frac{3}{(2n-1)(2n-2)}\sum_{k=1}^{n-1} {\frac{(2k-1)!}{2^{2k-2}(k-1)!^2}}.
$$
Induction principle tells us to show that
$$|a_{2n-1}|\leq \frac{(2n-2)!}{2^{2n-2}(n-1)!^2}.
$$
It suffices to show that
$$\frac{3}{(2n-1)(2n-2)}\sum_{k=1}^{n-1} {\frac{(2k-1)!}{2^{2k-2}(k-1)!^2}}=\frac{(2n-2)!}{2^{2n-2}(n-1)!^2}
$$
or,
$$\sum_{k=1}^{n-1} {\frac{3(2k-1)!}{2^{2k-2}(k-1)!^2}}=\frac{(2n-2)(2n-1)!}{2^{2n-2}(n-1)!^2}.
$$
Again, we prove this by method of induction. It can easily be seen that for $k=1$ it is true.
Assume that it is true for $k=2, 3, \ldots , n-1$, then we have to prove that
$$\sum_{k=1}^{n} {\frac{3(2k-1)!}{2^{2k-2}(k-1)!^2}}=\frac{(2n)(2n+1)!}{2^{2n}(n)!^2},
$$
which is easy to see, since
$$\sum_{k=1}^{n} {\frac{3(2k-1)!}{2^{2k-2}(k-1)!^2}}=\frac{(2n-2)(2n-1)!}{2^{2n-2}(n-1)!^2}+\frac{3(2n-1)!}{2^{2n-2}(n-1)!^2}=\frac{(2n)(2n+1)!}{2^{2n}(n)!^2}.
$$
Hence, the proof is complete. For equality, it can easily be seen that
$$ f_0(z)=\frac{z}{\sqrt{1-z^2}}=z+\sum_{n=2}^{\infty} \frac{(2n-2)!}{2^{2n-2}(n-1)!^2}
z^{2n-1}
$$
belongs to $\mathcal{L}$.
The image of the unit disk ${\mathbb D}$ under $f_0$ is
shown in Figure~\ref{sec2-fig1} which indicates that $f_0({\mathbb D})$ is not convex.
\begin{figure}[H]
\includegraphics[height=10cm,width=7cm]{Figure_1.eps}
\caption{The image domain $f_0({\mathbb D})$, where $f_0(z)=\frac{z}{\sqrt{1-z^2}}$.}\label{sec2-fig1}
\end{figure}
{\bf (b)} We see from the definition of $\mathcal{L}$ that
$$1+\frac{zf^{\prime\prime}(z)}{f^\prime (z)}\prec \frac{1+2z^2}{1-z^2},\quad
\mbox{i.e.}, \frac{zf^{\prime\prime}(z)}{f^\prime (z)}\prec \frac{3z^2}{1-z^2}=:h(z),
$$
where $\prec$ denotes the usual subordination. The poof of (b) now follows easily.
{\bf (c)} Since
$$ \frac{zf^{\prime\prime}(z)}{f^\prime (z)}\prec h(z),
$$
it follows by the well-known subordination result due to Suffridge \cite{Suf70} that
$$f^{\prime}(z) \prec \exp\left(\int_0 ^ z {\frac{h(t)}{t}\mbox{d}t}\right)
=\exp\left(3\int_0^z {\frac{t}{1-t^2}\mbox{d}t}\right)=\frac{1}{(1-z^2)^{3/2}}.
$$
Hence, the proof of (c) follows.
{\bf (d)} By $(a)$, we see that
$$|\sigma_{2n-1}^{\prime}(z)|\leq \sum_{k=n+1}^{\infty}(2k-1)|a_{2k-1}|r^{2k-2}
\leq A(n,r).
$$
and
$$|z\sigma_{2n-1}^{\prime\prime}(z)|\leq \sum_{k=n+1}^{\infty}(2k-1)(2k-2)|a_{2k-1}|r^{2k-2}\leq B(n,r).
$$
The proof of our lemma is complete.
\end{proof}
\section{Proof of the Main Theorem}
For an arbitrary $f(z)=z+\sum_{n=2}^{\infty}{a_{2n-1} z^{2n-1}}\in \mathcal{L}$, we first consider its third section $s_3(z)=z+a_3z^3$ of $f$. Simple computation shows
$$1+\frac{zs_3 ^{\prime\prime}(z)}{s_3^{\prime}(z)}=1+\frac{6a_3z^2}{1+3a_3z^2}.
$$
By using Lemma~\ref{sec2-lem1}(a), we have $|a_3|\le 1/2$ and hence
$${\operatorname{Re}\,}\left(1+\frac{zs_3 ^{\prime\prime}(z)}{s_3^{\prime}(z)}\right)\ge 1-\frac{6|a_3||z|^2}{1-3|a_3||z|^2} \ge 1-\frac{3|z|^2}{1-\frac{3}{2}|z|^2}
$$
which is positive for $|z|<\sqrt{2}/3$. Thus, $s_3(z)$ is convex in the disk $|z|<\sqrt{2}/3$. To show that the constant $\sqrt{2}/3$ is best possible, we consider the function $f_0(z)$ defined by
$$f_0(z)=\frac{z}{\sqrt{1-z^2}}.
$$
We denote by $s_{3,0}(z)$, the third partial sum $s_3(f_0)(z)$ of $f_0(z)$ so that $s_{3,0}(z)=z+(1/2)z^3$ and hence, we find
$$1+\frac{zs_{3,0} ^{\prime\prime}(z)}{s_{3,0}^{\prime}(z)}=\frac{2+9z^2}{2+3z^2}.
$$
This shows that
$${\operatorname{Re}\,}\left(1+\frac{zs_{3,0} ^{\prime\prime}(z)}{s_{3,0}^{\prime}(z)}\right)=0
$$
when $z^2=(-2/9) \mbox{ or } (-2/3)$ \quad i.e., when $|z|^2=(2/9) \mbox{ or } (2/3)$.
Hence, the equality occurs.
Next, let us consider the case $n=3$.
Our aim in this case is to show that
$${\operatorname{Re}\,}\left(1+\frac{zs_5^{\prime\prime}(z)}{s_5^{\prime}(z)}\right)={\operatorname{Re}\,}\left(\frac{1+9a_3 z^2+25 a_5 z^4}{1+3a_3 z^2+5a_5 z^4}\right)>0
$$
for $|z|<\sqrt{2}/3$. Since the real part ${\operatorname{Re}\,}[(1+9a_3 z^2+25 a_5 z^4)/(1+3a_3 z^2+5a_5 z^4)]$ is harmonic in $|z|\leq \sqrt{2}/3$, it suffices to check that
$${\operatorname{Re}\,}\left(\frac{1+9a_3 z^2+25 a_5 z^4}{1+3a_3 z^2+5a_5 z^4}\right)>0
$$
for $|z|=\sqrt{2}/3$. Also we see that
$${\operatorname{Re}\,}\left(\frac{1+9a_3 z^2+25 a_5 z^4}{1+3a_3 z^2+5a_5 z^4}\right)=3-{\operatorname{Re}\,}\left(\frac{2-10 a_5 z^4}{1+3a_3 z^2+5a_5 z^4}\right)\ge 3-\left|\frac{2-10 a_5 z^4}{1+3a_3 z^2+5a_5 z^4}\right|
$$
and, so by considering a suitable rotation of $f(z)$, the proof reduces to $z=\sqrt{2}/3$; this means that it is enough to prove
$$\frac{3}{2}> \left|\frac{81-20 a_5}{81+54a_3 +20a_5}\right|.
$$
From (\ref{sec2-eqn0}), we have
$$ a_3=\frac{p_2}{4} \quad \mbox{and}\quad a_5=\left(\frac{3}{40}\right)\left(\frac{3}{4} p_2^2+p_4\right).
$$
Since $|p_2|\le 2$ and $|p_4|\le 2$, it is convenient to rewrite the last two relations as
$$a_3=\frac{\alpha}{2} \quad \mbox{and} \quad a_5=\frac{3}{40}(3\alpha^2+2\beta)
$$
for some $|\alpha|\le 1$ and $|\beta|\le 1$.
Substituting the values for $a_3$ and $a_5$, and applying the maximum principle in
the last inequality, it suffices to show the inequality
$$\frac{3}{2}\left|81+27\alpha+\frac{9\alpha^2}{2}+3\beta\right|> \left|81-\frac{9\alpha^2}{2}-3\beta\right|
$$
for $|\alpha|=1=|\beta|$. Finally, by the triangle inequality, the last inequality follows if we can show that
$$9\left|9+3\alpha+\frac{\alpha^2}{2}\right|-6\left|9-\frac{\alpha^2}{2}\right|>5
$$
which is easily seen to be equivalent to
$$9\left|9\overline{\alpha}+3+\frac{\alpha}{2}\right|-6\left|9\overline{\alpha}-\frac{\alpha}{2}\right|>5
$$
as $|\alpha|=1$. Write ${\operatorname{Re}\,} (\alpha)=x$. It remains to show that
$$T(x):=9\sqrt{18x^2+57x+\frac{325}{4}}-6\sqrt{\frac{361}{4}-18x^2}> 5
$$
for $-1\leq x\leq1$.
\begin{figure}[H]
\includegraphics{Figure_greaterthan_5.eps}
\caption{Graph of $T(x)$.}
\end{figure}
It suffices to show
$$9\sqrt{18x^2+57x+\frac{325}{4}}> 5+6\sqrt{\frac{361}{4}-18x^2}.
$$
Squaring both sides we have
$$ 2106 x^2+4617x+\frac{13229}{4} > 60\left(\sqrt{\frac{361}{4}-18x^2}\right).
$$
Again by squaring both sides we have
$$ \left(2106 x^2+4617x+\frac{13229}{4}\right)^2 > 3600\left(\frac{361}{4}-18x^2\right).
$$
After computing, it remains to show that $\phi(x)>0$, where
$$\phi(x)=ax^4+bx^3+cx^2+dx+e
$$
and the coefficients are
$$a=4435236, b=19446804, c=35311626, d=30539146.5, e=10613002.5625.
$$
Here we see that $\phi^{iv}(x)=24a>0$. Thus the function $\phi^{\prime\prime\prime}(x)$
is increasing in $-1\le x\le 1$ and hence $\phi^{\prime\prime\prime}(x)\ge \phi^{\prime\prime\prime}(-1)=10235160>0$. This implies $\phi^{\prime\prime}(x)$ is increasing. Hence $\phi^{\prime\prime}(x)\ge \phi^{\prime\prime}(-1)=7165260>0$.
Consequently, $\phi^{\prime}(x)$ is increasing and we have $\phi^{\prime}(x)\ge \phi^{\prime}(-1)=515362.5>0$. Finally we get, $\phi(x)$ is increasing and hence we have $\phi(x)>\phi(-1)=373914.0625>0$.
This completes the proof for $n=3$.
We next consider the general case $n\ge 4$. It suffices to show that
$${\operatorname{Re}\,}\left(1+\frac{zs_{2n-1}^{\prime\prime}}{s_{2n-1}^\prime}\right)>0 \quad \mbox{for} \quad |z|=r
$$
with $r=\sqrt{2}/3$ for all $n\ge 4$. From the maximum modulus principle, we shall then conclude that the last inequality holds for all $n\ge 4$
$${\operatorname{Re}\,}\left(1+\frac{zs_{2n-1}^{\prime\prime}}{s_{2n-1}^\prime}\right)>0
$$
for $|z|<\sqrt{2}/3$. In other words, it remains to find the largest $r$ so that
the last inequality holds for all $n\ge 4$.
By the same setting of $f(z)$ as in Lemma~\ref{sec2-lem1}(d),
it follows easily that
$$1+\frac{zs_{2n-1}^{\prime\prime}}{s_{2n-1}^\prime}=1+\frac{z(f^{\prime\prime}(z)-\sigma_{2n-1}^{\prime\prime}(z))}{f^{\prime}(z)-\sigma_{2n-1}^{\prime}(z)}=1+\frac{zf^{\prime\prime}(z)}{f^{\prime}(z)}+\frac{\frac{zf^{\prime\prime}(z)}{f^{\prime}(z)}\sigma_{2n-1}^{\prime}(z)-z\sigma_{2n-1}^{\prime\prime}(z)}{f^{\prime}(z)-\sigma_{2n-1}^{\prime}(z)}
$$
or,
$${\operatorname{Re}\,}\left(1+\frac{zs_{2n-1}^{\prime\prime}}{s_{2n-1}^\prime}\right)\ge 1-\left|\frac{zf^{\prime\prime}(z)}{f^{\prime}(z)}\right|-\frac{\left|\frac{zf^{\prime\prime}(z)}{f^{\prime}(z)}\right||\sigma_{2n-1}^{\prime}(z)|+|z\sigma_{2n-1}^{\prime\prime}(z)|}{|f^{\prime}(z)|-|\sigma_{2n-1}^{\prime}(z)|}.
$$
Then by using Lemma~\ref{sec2-lem1}, we obtain
$${\operatorname{Re}\,}\left(1+\frac{zs_{2n-1}^{\prime\prime}}{s_{2n-1}^\prime}\right)\ge 1-\frac{3r^2}{1-r^2}-\frac{\left(\frac{3r^2}{1-r^2}\right)A(n,r)+B(n,r)}{\frac{1}{(1+r^2)^{(3/2)}}-A(n,r)}.
$$
Thus, we conclude that
$${\operatorname{Re}\,}\left(1+\frac{zs_{2n-1}^{\prime\prime}}{s_{2n-1}^\prime}\right)>0
$$
provided
$$\frac{1-4r^2}{1-r^2}-\frac{(1+r^2)^{3/2}}{1-r^2}\left(\frac{3r^2 A(n,r)+(1-r^2)B(n,r)}{1-(1+r^2)^{3/2}A(n,r)}\right)>0,
$$
or, equivalently
$$(1+r^2)^{3/2}\left(\frac{3r^2 A(n,r)+(1-r^2)B(n,r)}{1-(1+r^2)^{3/2}A(n,r)}\right)<1-4r^2.
$$
We show that the above relation holds for all $n\ge 4$ with $r=\sqrt{2}/3$.
The choice $r=\sqrt{2}/3$ brings the last inequality to the form
$$\left(\frac{11}{9}\right)^{3/2}\left(\frac{\frac{2}{3} A(n,\frac{\sqrt{2}}{3})+\frac{7}{9}B(n,
\frac{\sqrt{2}}{3})}{1-(\frac{11}{9})^{3/2}A(n,\frac{\sqrt{2}}{3})}\right)< \frac{1}{9}.
$$
Set
$$ C\left(n,\frac{\sqrt{2}}{3}\right):=1-\left(\frac{11}{9}\right)^{3/2}A\left(n,\frac{\sqrt{2}}{3}\right).
$$
We shall prove that $C\left(n,\frac{\sqrt{2}}{3}\right)>0$ for $n\ge 4$ i.e., $$A\left(n,\frac{\sqrt{2}}{3}\right)<\frac{27}{(11)^{3/2}}$$
and
$$A\left(n,\frac{\sqrt{2}}{3}\right)+B\left(n,\frac{\sqrt{2}}{3}\right)<\frac{27}{7\times (11)^{3/2}}\quad \mbox{ for } n\ge 4.
$$
If the last inequality is proved, then automatically the previous one follows.
Hence, it is enough to prove the last inequality. Now,
\begin{eqnarray*}
A(n,r)+B(n,r) &=& \sum_{k=n+1}^{\infty}\frac{(2k-1)(2k-1)!}{2^{2k-2}(k-1)!^2}(r^2)^{k-1}\\ &\le & \sum_{k=5}^{\infty}\frac{(2k-1)(2k-1)!}{2^{2k-2}(k-1)!^2}(r^2)^{k-1}\\
&= & \sum_{k=1}^{\infty}\frac{(2k-1)(2k-1)!}{2^{2k-2}(k-1)!^2}(r^2)^{k-1}
- \sum_{k=1}^{4}\frac{(2k-1)(2k-1)!}{2^{2k-2}(k-1)!^2}(r^2)^{k-1}\\
&=& \frac{1+2 r^2}{(1-r^2)^{5/2}}-\left(1+\frac{9}{2}r^2+\frac{75}{8}r^4+
\frac{245}{16}r^6 \right).
\end{eqnarray*}
Substituting the value $r=\sqrt{2}/3$, we obtain
$$A\left(n,\frac{\sqrt{2}}{3}\right)+B\left(n,\frac{\sqrt{2}}{3}\right) \le 0.076\cdots < 0.105\cdots = \frac{27}{7\times (11)^{3/2}}.
$$
This completes the proof of our main theorem.
\hfill{$\Box$}
\vskip 1cm
\noindent
{\bf Acknowledgement.} The work of the first author is supported by University
Grants Commission, New Delhi (grant no. F.2-39/2011 (SA-I)).
|
\section{Introduction}
In 1951, G.~Higman defined the group
\begin{equation}\label{eq:Hig}
\Hig_n = \big\langle a_i \ (i\in \ZZ/n\ZZ) : [a_{i-1}, a_i]= a_i \big\rangle
\end{equation}
and proved that for $n\geq 4$ it is infinite without non-trivial finite quotient~\cite{Higman51}. Since the presentation~\eqref{eq:Hig} is explicit and simple, A.~Thom suggested that $\Hig_n$ is a good candidate to contradict approximation properties for groups and proved such a result in~\cite{Thom_higman}. Perhaps the most elusive approximation property is still \emph{soficity}~\cite{Gromov_ax,Weiss00}; but a non-sofic group would in particular not be residually \emph{amenable}, a statement we do not know for the Higman groups (cf.\ also~\cite{Helfgott-Juschenko_arx}). The purpose of this note is to propound variations of Higman's construction with no non-trivial amenable quotients at all.
\bigskip
There are several known sources of groups without amenable quotients since it suffices to take a (non-amenable) \emph{simple} group to avoid all possible quotients. However, as Thelonius Sphere Monk observed, \emph{simple ain't easy}. To wit, one had to wait until the break-through of Burger--Mozes~\cite{Burger-Mozes0,Burger-Mozes2} for simple groups of \emph{type~F}, i.e.\ admitting a finite $K(\pi, 1)$. Before this, no torsion-free finitely presented simple groups were known.
\bigskip
The examples below are of a completely opposite nature because they admit a wealth of quotients: indeed, like $\Hig_n$, they are \emph{SQ-universal}, i.e.\ contain any countable group in a suitable quotient. It follows that they have uncountably many quotients~\cite[\S{III}]{Neumann37}, despite having no amenable quotients.
We shall start with the easiest examples, whose cyclic structure is directly inspired by~\eqref{eq:Hig}. Below that, we propose a cleaner construction, starting from copies of $\ZZ$ only, which might be a better candidate to contradict approximation properties; the price to pay is to replace the cycle by a more complicated graph.
\bigskip\noindent
\textbf{Disclaimer.}
No claim is made to produce the first examples of groups with a hodgepodge of sundry properties (for instance, if $G$ is a Burger--Mozes group, then $G*G$ satisfies many properties of $G_n$ in Theorem~\ref{thm:G} below, though with ``amenable'' instead of ``Haagerup'').\\ Our goal is to suggest transparent presentations for which the stated properties are explicit and their proofs effective.
\bigskip
\noindent
\textbf{1.A. Starting from large groups.}
Given a group $K$, an element $x\in K$ and a positive integer $n$, we define the group
\begin{equation*}
K^{(n,x)} = \big\langle K_i \ (i\in \ZZ/n\ZZ) : [x_{i-1}, x_i]= x_i \big\rangle,
\end{equation*}
where $K_i, x_i$ denote $n$ independent copies of $K,x$. Thus, $K^{(n,e)}=K^{*n}$ and $\Hig_n = \ZZ^{(n,1)}$.
We recall that a group is \emph{normally generated} by a subset if no proper normal subgroup contains that subset. Following the ideas of Higman and Schupp, we obtain:
\begin{prop}\label{prop:var}
Let $K$ be a group normally generated by an element $x$ of infinite order and let $n\geq 4$.
\begin{enumerate}[label=(\roman*)]
\item If $K$ has no infinite amenable quotient (e.g.\ if $K$ is Kazhdan), then $K^{(n,x)}$ has no non-trivial amenable quotient.\label{pt:var:no}
\item If $K$ is finitely presented, torsion-free, type~F$_\infty$, or type~F, then $K^{(n,x)}$ has the corresponding property.\label{pt:var:fin}
\item Every countable group embeds into some quotient of $K^{(n,x)}$.\label{pt:var:SQ}
\end{enumerate}
\end{prop}
\begin{rem*}
Suppose that $\sC$ is any class of groups closed under taking subgroups. The proof of~\ref{pt:var:no} shows: if every quotient of $K$ in $\sC$ is finite, then $K^{(n,x)}$ has no non-trivial quotient in $\sC$. For instance, if $K$ is Kazhdan, then $K^{(n,x)}$ has no non-trivial quotient with the Haagerup property.
\end{rem*}
\begin{example*}
The group $K=\SL_d(\ZZ)$ is an infinite, finitely presented (even type F$_\infty$) Kazhdan group for all $d\geq 3$ and the Steinberg relations show that it is normally generated by any elementary matrix (with coefficient~$1$). Alternatively, the Steinberg group itself $K=\St_d(\ZZ)$ has the same properties (it is Kazhdan because it is a finite extension of $\SL_d(\ZZ)$, see e.g.~\cite[10.1]{MilnorK}). This gives us the following presentations of SQ-universal type F$_\infty$ groups without Haagerup quotients:
$$S_{d,n} = \Bigg\langle E_i^{p,q}\ (i\in \ZZ/n\ZZ, 1\leq p\neq q \leq d) : \begin{array}[c]{l}
{[E_i^{p,q}, E_i^{q,r}] = E_i^{p,r}}\ (p\neq r \neq q)\\
{[E_i^{p,q}, E_i^{r,s}]=e}\ (q\neq r, p\neq s\neq r)\\
{[E_{i-1}^{1,2}, E_i^{1,2}]=E_i^{1,2}}
\end{array}\Bigg\rangle.$$
The choice of the pair $(1,2)$ is arbitrary and any other elementary matrix for $x$ gives an isomorphic group. If we use the Magnus--Nielsen presentation~\cite{Magnus35,Steinberg85s} of $\SL_d(\ZZ)$ instead of the Steinberg group, we have to add the relations $(E_i^{1,2} (E_i^{2,1})\inv E_i^{1,2})^4=e$.
These groups are not, however, torsion-free. Although congruence subgroups of $\SL_d(\ZZ)$ are torsion-free (and even type~F by~\cite{Raghunathan68}), the latter are never normally generated by a single element because they have large abelianizations.
This construction can be transposed to other Chevalley groups.
\end{example*}
Notice that if in addition $K$ is \emph{just infinite}, like for instance $K=\SL_d(\ZZ)$ for $d$ odd~\cite{Mennicke65}, then this construction shows that $K$ embeds into all non-trivial quotients of $K^{(n,x)}$, such as for instance the simple quotients obtained from maximal normal subgroups.
\bigskip
\noindent
\textbf{1.B. An example built from $\ZZ$.}
Consider the semi-direct product
$$L = (\ZZ[1/2])^2 \rtimes (\ZZ \times F_2)$$
where the generator $h$ of $\ZZ$ acts on $(\ZZ[1/2])^2$ by multiplication by~$2$, and the generators $u,v$ of the free group $F_2$ act by multiplication by
$$\begin{pmatrix}1&1\\ 0&1\end{pmatrix}\ \text{ and } \ \begin{pmatrix}1&0\\ 1&1\end{pmatrix}$$
respectively. In particular the group $L$ is torsion-free, linear and finitely presented. It is generated by $\{x,y,h,u,v\}$ where $(x,y)$ is the standard basis of $\ZZ^2$.
\smallskip
We define a group $G_n$ by fusing together $n$ copies $L_i$ of $L$ in a circular fashion along the corresponding generators as follows:
\begin{equation}\label{eq:G}
G_n=\big\langle L_i : (h_i, u_i, v_i) = (y_{i-2}, x_{i-2}, y_{i-1} ), i\in \ZZ/n\ZZ\big\rangle.
\end{equation}
It is easy to write down an explicit presentation of $G_n$. Observe first that $L$, with our choice of generators, has a presentation with the following set~$R$ of relations
$$R(x,y,h,u,v) :
\begin{array}[t]{l}
{e=[x,y]=[x,u]=[y,v]=[h,u]=[h,v],}\\
{[h,x]=[u,y]=x, \ [h,y]=[v,x]=y.}
\end{array}$$
Now~\eqref{eq:G} is equivalent to the finite presentation
\begin{equation}\label{eq:Gn}
G_n=\big\langle x_i, y_i : R(x_i, y_i, y_{i-2}, x_{i-2}, y_{i-1}), i\in \ZZ/n\ZZ\big\rangle.
\end{equation}
We find these groups more elementary than~$K^{(n,x)}$ (with Kazhdan $K$) and hope that they will be easier to use in applications. In return, we have to work more than before to deduce some of the following properties.
\begin{thm}\label{thm:G}
Let $n\geq 8$.
\begin{enumerate}[label=(\roman*)]
\item The group $G_n$ has no non-trivial Haagerup quotient.\label{pt:G:no}
\item Any quotient with a $\frac{1}{36}$-F{\o}lner set for the generators $x_i, y_i$ is trivial.\label{pt:G:Folner}
\item The only Kazhdan subgroup of $G_n$ is the trivial group.\label{pt:G:noT}
\item The group $G_n$ admits a finite $K(\pi, 1)$.\label{pt:G:fin}
\item The group $G_n$ can be constructed starting from copies of $\ZZ$, using amalgamated free products, semi-direct products and HNN-extensions.\label{pt:G:Z}
\item Every countable group embeds into some quotient of $G_n$ if $n\geq 9$.\label{pt:G:SQ}
\item The groups $G_m$ are trivial for $m\leq 4$ and $m=6$.\label{pt:G:trivial}
\end{enumerate}
\end{thm}
\noindent The restriction $n\geq 9$ is probably not needed in~\ref{pt:G:SQ} but makes it very easy to check Schupp's criterion for SQ-universality. We have not elucidated $G_5$ and $G_7$.
\bigskip
\noindent
\textbf{Scholium.}
We should like to point out a general type of presentations subsuming the examples above. Consider a group $L$ and two finite sets $A, P\se L$. We think of elements in $A$ as ``active'', whilst those in $P$ are ``passive''. Consider furthermore a transitive labelled oriented graph $\gr$ whose edges are labelled by $P\times A$. To every vertex $i$ of $\gr$ we associate an independent copy $L_i$ of $L$. We then form the group
$$G =\big\langle L_i, i\in \gr : p_j = a_k \text{ if $\exists$ $(p,a)$-labelled edge from $j$ to $k$} \big\rangle.$$
In order to get a manageable group from this presentation, we would like to ensure at the very least that each $L_i$ embeds. A favourable case is when $A$ is a basis for a free subgroup in $L$ and the edges spread the passive elements of $P_j$ incoming to a vertex $k$ over copies $L_j$ for suitably distinct $j$s. (In our case, we allowed a commutation in $A_k$ because it was going to hold also among the corresponding $P_j$.)
The trade-off is that this spreading should remain limited compared to the girth of the cycles in $\gr$ along which we can cut the amalgamation scheme. Higman's groups and the groups $K^{(n,x)}$ use a simple $n$-cycle for~$\gr$; as for $G_n$, we depict its graph in the figure below for $n=8$; the orientation is implicit from the labelling.
\begin{figure}[h!]
\input{figure_small.tex}
\end{figure}
\bigskip\noindent
\textbf{Notation.}
Our convention for commutators is $[\alpha, \beta] = \alpha \beta \alpha\inv \beta\inv$; Higman used a different convention for~\eqref{eq:Hig} but this does not affect the group~$\Hig_n$. Given a subset $E$ of a group $H$, we denote the subgroup it generates by $\langle E \rangle$ or by $\langle E \rangle_H$ when $H$ needs to be clarified.
\section{Proof of Proposition~\ref{prop:var}}
This proposition really is just a variation on the work of Higman and Schupp. For~\ref{pt:var:no}, we start by recalling the following.
\begin{lem}[Higman's circular argument]\label{lem:Hig}
Let $f$ be a homomorphism from $\Hig_n$ to another group. If $f(a_i)$ has finite order for some $i$, then $f$ is trivial.
\end{lem}
\begin{proof}[Proof {\upshape (see also~\cite[p.~547]{Neumann54}).}]
The relations in~\eqref{eq:Hig} imply inductively that $f(a_i)$ has finite order $r_i \geq 1$ for \emph{all} $i$. Suppose for a contradiction that $r_i>1$ for some $i$, hence for all $i$ by the relations~\eqref{eq:Hig}. Let $p$ be the smallest prime dividing any $r_j$. The relation $a_{j-1}^{r_{j-1}} a_j a_{j-1}^{-r_{j-1}} = a_j^{2^{r_{j-1}}}$ implies that $2^{r_{j-1}}-1$ is a multiple of $r_j$ and hence of $p$. In particular, $p\neq 2$ and the order $s>1$ of $2$ in $(\ZZ/p\ZZ)^\times$ divides $r_{j-1}$. This contradicts the choice of $p$ because $s\leq p-1$.
\end{proof}
Suppose now that $f$ is a homomorphism from $K^{(n,x)}$ to an amenable group. The image of $K_i$ in $K^{(n,x)}$ is mapped by $f$ to a finite group, so that in particular $f(x_i)$ has finite order for all $i$. Since we have a homomorphism $\Hig_n\to K^{(n,x)}$ sending $a_i$ to $x_i$, we deduce from Lemma~\ref{lem:Hig} that $f(x_i)$ is in fact trivial. Since $K$ is normally generated by $x$, it follows that $f(K_i)$ is trivial. We conclude that $f$ is trivial because the various $K_i$ generate $K^{(n,x)}$.
\bigskip
The two other points follow once we re-construct $K^{(n,x)}$ as a suitable amalgam. Recall that $x$ has infinite order; thus
\begin{equation}\label{eq:KL}
L=\langle K, h : [h,x]=x \rangle
\end{equation}
is an HNN-extension; we define $L_i, h_i$ similarly. Now
$$H = \big\langle L_0, L_1 : x_0 = h_1 \big\rangle$$
is a free product with amalgamation (because $x_0$ has infinite order) and therefore, using also the HNN-structure of~\eqref{eq:KL}, it follows that $\langle h_0, x_1 \rangle$ is a free group on $h_0, x_1$. Likewise, since $n\geq 4$, we deduce that
$$H' = \big\langle L_2, \ldots L_{n-1} : x_2 = h_3, \ldots, x_{n-2} = h_{n-1} \big\rangle$$
is a (successive) free product with amalgamation and that $h_2, x_{n-1}$ are a basis of a free group in $H'$. Therefore, we obtain $K^{(n,x)}$ by amalgamating $H$ and $H'$ over the groups $\langle h_0, x_1 \rangle$ and $\langle x_{n-1}, h_2 \rangle$ by identifying the free generators in the order given here.
Now the finiteness properties of~\ref{pt:var:fin} all follow since $K^{(n,x)}$ was obtained from copies of $K$ by finitely many HNN-extensions and amalgamated free products (see e.g.~\cite[\S7]{Geoghegan}). Regarding SQ-universality, P.~Schupp proved that it suffices to find a \emph{blocking pair} for $\langle h_0, x_1 \rangle$ in $H$, see Thm.~II in~\cite{Schupp71}. A blocking pair is provided for instance by any distinct non-trivial powers of an element $t\in H$ such that $t, h_0, x_1$ form a basis of a free group (see the comment after Thm.~II in~\cite{Schupp71}). Just as in Lemma 4.3 of~\cite{Schupp71}, the element $t=x_0\inv x_1 h_0 x_1\inv x_0$ will do.
\section{Proof of Theorem~\ref{thm:G}}
We now turn to the groups $L$ and $G_n$ defined in part~1.B of the Introduction and fix some more notation. Denote by $\Heis(\alpha, \beta, \zeta)$ the (discrete) Heisenberg group with generators $\alpha,\beta$ and central generator $\zeta$. More precisely, it is defined by the relations $[\alpha, \beta]= \zeta$ and $[\zeta,\alpha]= [\zeta,\beta]=e$. For instance, $\{v,x,y\}$ (or just $\{v,x\}$) generate a copy of $\Heis(v,x,y)$ in $L$.
We shall use repeatedly, but tacitly, the following fundamental property of a free product with amalgamation $A*_C B$. If $A'<A$ and $B'<B$ are subgroups whose intersections with $C$ yield the same subgroup $C'<C$, then the canonical map $A' *_{C'} B' \to A*_C B$ is an embedding~\cite[8.11]{Neumann48}.
\medskip
We embed $L$ into a larger group $J$ generated by $L$ together with an additional generator $z$ by defining the following free product with amalgamation:
\begin{equation}\label{eq:J}
J = L *_{\langle h,v\rangle} \Heis(h,z,v).
\end{equation}
Although $h$ and $v$ already occur in our definition of $L$, there is no ambiguity since they form a basis of a copy of $\ZZ^2$ both in $L$ and in $\Heis(h,z,v)$. In particular, $L$ is indeed canonically embedded in $J$.
When we want to consider normal forms for this amalgamation (cf.~\cite[\S1]{Schreier27} or Thm.~4.4 in~\cite{Magnus-Karrass-Solitar}), it is convenient that there are very nice coset representatives of $\langle h,v\rangle$ in each factor. Indeed, in $\Heis(h,z,v)$, we can simply take the group $\langle z\rangle$. In $L$ written as
$$L = (\ZZ[1/2])^2 \rtimes (\langle h \rangle \times \langle u,v \rangle ),$$
we can take as set of representatives the group $(\ZZ[1/2])^2\rtimes K$, where $K\lhd\langle u,v \rangle$ is the kernel of the morphism killing $v$.
\medskip
As before, we shall denote by $J_i$ a family of independent copies of $J$. We further denote by $z_i$ the corresponding additional generator. Then we have an equivalent presentation of $G_n$ given by
\begin{equation}\label{eq:newP}
\Bigg\langle J_i:
\begin{array}{c}
v_{i-1} = h_{i}\\
x_{i-1} = z_{i}\\
y_{i-1} = v_{i}\\
z_{i-1} = u_{i}
\end{array}
\kern4mm\forall\, i\in \ZZ/n\ZZ \Bigg\rangle.
\end{equation}
The advantage is that each relation involves only \emph{successive} indices $i-1$ and $i$.
\medskip
We define inductively the groups $D_r$ for $r\in \NN$, starting with $D_0 = J_0$, by the presentation
$$D_r= \Bigg\langle D_{r-1} , J_r :
\begin{array}{c}
v_{r-1} = h_{r}\\
x_{r-1} = z_{r}\\
y_{r-1} = v_{r}\\
z_{r-1} = u_{r}
\end{array}
\Bigg\rangle.$$
We claim that this is in fact a free product with amalgamation of $D_{r-1}$ and $J_r$. More precisely, we claim that the subgroups of $J$ given respectively by
\begin{equation}\label{eq:QT}
Q=\langle v,x,y,z \rangle_J \ \text{ and } \ T=\langle h,z,v,u \rangle_J
\end{equation}
are isomorphic under matching their generators in the order listed in~\eqref{eq:QT}. This claim, transported to the various $J_i$, implies in particular by induction that $D_r$ is indeed a free product with amalgamation $D_r\cong D_{r-1} *_{Q_{r-1} = T_r} J_r$, where $Q_i, T_i$ denote the corresponding subgroups of $J_i$.
To prove the claim, we note first that the structure of $Q$ is revealed by observing which subgroups are generated by $\{v,x,y\}$ and by $\{v,z\}$ in the amalgamation~\eqref{eq:J} defining $J$. Both intersect $\langle h,v\rangle$ exactly in $\langle v\rangle$ and thus $Q$ is itself a free product with amalgamation $Q= \Heis(v,x,y) *_{\langle v\rangle} \langle v,z\rangle_J$ with $\langle v,z\rangle_J\cong \ZZ^2$.
As for $T$, given its relations, we have an epimorphism $Q\to T$ given by the above matching of generators; we need to show that it is in fact injective. To this end, consider that $T$ is generated by its subgroups $\Heis(h,z,v)$ and $\langle h,v,u\rangle_J$. Since $L$ is a factor of $J$, the latter is $\langle h,v,u\rangle_L \cong \ZZ\times F_2$. Thus $T$ is an amalgamated free product $\Heis(h,z,v) *_{\langle h,v \rangle} \langle h,v,u\rangle_L$. The injectivity now follows. In conclusion, $D_r$ is the following iterated free product with amalgamations:
$$D_r \cong J_0 *_{Q_0 = T_1} J_1 *_{Q_1 = T_2} \cdots *_{Q_{r-1} = T_r} J_r.$$
We also need to understand the intersection $Q\cap T$, which contains at least the group $\langle z,v \rangle_J \cong \ZZ^2$. In fact, this intersection is exactly $\langle z,v \rangle_J$. This follows by examining the normal form for the particularly simple choice of coset representatives made above.
As a consequence, we deduce that when $r\geq 3$, the subgroups $T_0$ and $Q_r$ of
\begin{equation}\label{eq:Dr2}
D_r \cong \big( J_0 *_{Q_0 = T_1} J_1\big) *_{Q_1 = T_2} \cdots *_{Q_{r-2} = T_{r-1}} \big( J_{r-1} *_{Q_{r-1} = T_r} J_r\big)
\end{equation}
intersect trivially and hence generate a free product $T_0 * Q_r$.
\medskip
Finally, to close the circle, we will use the assumption $n\geq 8$ and glue $D_{n-5}$ with a copy $D'_3$ of $D_3$ as follows. We shift indices in the $D_3$ factor to obtain the isomorphic group
$$D' _3 = J_{n-4} *_{Q_{n-4} = T_{n-3}} \cdots *_{Q_{n-2} = T_{n-1}} J_{n-1}.$$
In $D'_3$, the subgroups $T_{n-4}$ and $Q_{n-1}$ generate $T_{n-4}*Q_{n-1}$. Since we have constructed isomorphisms $T_0\cong Q_{n-1}$ and $Q_{n-5}\cong T_{n-4}$, we have a corresponding isomorphism
$$\fhi\colon T_0 * Q_{n-5} \lra Q_{n-1} * T_{n-4}$$
and therefore we have a free product with amalgamation
\begin{equation}\label{eq:close}
D_{n-5} *_{\fhi} D'_3.
\end{equation}
Since this is a rewriting of the presentation~\eqref{eq:newP}, we have indeed constructed $G_n$ as an amalgam whenever $n\geq 8$. In particular, $L_i$ is embedded in $G_n$.
\medskip
At this point, we have established point~\ref{pt:G:Z} of Theorem~\ref{thm:G}, observing that $(\ZZ[1/2])^2 \rtimes \langle h \rangle$ is an HNN-extension of $\ZZ\times \ZZ$, that we can write
$$L \cong \Big( (\ZZ[1/2])^2 \rtimes \langle h \rangle\Big) \rtimes (\ZZ * \ZZ)$$
and that Heisenberg groups have the form $(\ZZ\times \ZZ) \rtimes \ZZ$.
On the other hand, point~\ref{pt:G:fin} follows from~\ref{pt:G:Z}, see e.g.~\cite[\S7]{Geoghegan}. As for~\ref{pt:G:noT}, we only need to recall that Kazhdan groups have Serre's property~FA~\cite[\S6.a]{Harpe-Valette_s}. This implies that any Kazhdan subgroup of $G_n$ can be recursively constrained into the factors of any amalgam. By~\ref{pt:G:Z}, we finally reach $\ZZ$, which has no non-trivial Kazhdan subgroup.
For~\ref{pt:G:SQ}, we indulge in the expedience of $n\geq 9$. This allows us to see from the decomposition~\eqref{eq:Dr2} applied to $r=n-5\geq 4$ that we have a free product
$$\langle T_0, u_2 x_2, Q_r\rangle_{D_r} = T_0 * \langle u_2 x_2 \rangle *Q_r.$$
Indeed, reasoning within $J$, we see that $\langle u x \rangle$ intersects both $Q$ and $T$ trivially (and is infinite). This implies that any two distinct non-trivial powers of $u_2 x_2$ constitute a blocking pair for $T_0 *Q_r$ in $D_r$, see again~\cite{Schupp71}; we conclude that $G_n$ is SQ-universal.
\medskip
Turning to~\ref{pt:G:no}, we first observe that every generator in the presentation~\eqref{eq:Gn} functions as a self-destruct button for the group $G_n$, i.e.\ normally generates $G_n$.
\begin{lem}\label{lem:autothysis}
Let $f$ be a homomorphism from $G_n$ to another group. If $f$ sends some $x_i$ or some $y_i$ to the identity, then $f$ is trivial.
\end{lem}
\begin{proof}
The element $u_i v_i\inv u_i$ conjugates $x_i$ to $y_i\inv$ and therefore we can assume that $f(y_i)$ is trivial. Since $y_i=v_{i+1}$, the relation $[v_{i+1}, x_{i+1}] = y_{i+1}$ implies inductively that $f(y_j)$ vanishes for all $j$. Conjugating by $u_j v_j\inv u_j$, we find that all generators in~\eqref{eq:Gn} are trivialized by $f$.
\end{proof}
Let now $f$ be a homomorphism from $G_n$ to some Haagerup group. The subgroup $\langle x,y\rangle$ of $\langle x,y\rangle \rtimes \langle u,v\rangle$ has the relative property~(T). Indeed, the proof of the corresponding statement for $\ZZ^2\rtimes \SL_2(\ZZ)$ only depends on the image of $\mathbf{SL}_2(\ZZ)$ in the automorphism group of $\ZZ^2$, see e.g.~\cite{Burger_kazhdan}. Therefore, $f(\langle x_i, y_i\rangle)$ is finite for all $i$.
On the other hand, the presentation~\eqref{eq:G} shows that we have a morphism $\Hig_n \to G_n$ defined by $a_i \mapsto y_{2i}$. By Higman's argument (Lemma~\ref{lem:Hig}), it follows that $f(y_{2i})$ is trivial for all $i$. We conclude from Lemma~\ref{lem:autothysis} that $f$ is trivial.
\smallskip
For~\ref{pt:G:Folner}, we use the explicit \emph{relative Kazhdan pair} $(S_0, \epsilon_0)$ provided by M.~Burger, Example~2 p.~40 in~\cite{Burger_kazhdan}. Here $S_0$ is a certain generating set of $\ZZ^2\rtimes \SL_2(\ZZ)$ and $\epsilon_0 = \sqrt{2-\sqrt 3}$. Being a relative Kazhdan pair means that any unitary representation of $\ZZ^2\rtimes \SL_2(\ZZ)$ with $(S_0, \epsilon_0)$-invariant vectors admits $\ZZ^2$-invariant vectors, see~\cite{Harpe-Valette_s}. We denote by $S=\{x,y,u,v\}$ our usual generators of $\ZZ^2\rtimes F_2$ and write $\overline{S} = S \cup S\inv \cup \{e\}$; then $(S,\epsilon)$-invariance is equivalent to $(\overline{S},\epsilon)$-invariance. The set $S_0$ from~\cite[Ex.~2]{Burger_kazhdan} is contained in $\overline{S}^3$ under the map $F_2\to \SL_2(\ZZ)$ and therefore every $(S,\epsilon_0/3)$-invariant vector is $(S_0, \epsilon_0)$-invariant. Now~\ref{pt:G:Folner} follows because $\epsilon_0/3 > 1/6$ and because any $(S, \epsilon)$-F{\o}lner set gives a $(S, \sqrt\epsilon)$-invariant vector.
\begin{rem*}
The corresponding argument provides also a lower bound on F{\o}lner constants for quotients of $K^{(n,x)}$ when $K$ is Kazhdan.
\end{rem*}
It only remains to prove~\ref{pt:G:trivial}. Consider again the homomorphism $\Hig_n \to G_n$ above. When $n$ is even, this factors through a morphism $\Hig_{n/2} \to G_n$. Since $\Hig_r$ is trivial for $r\leq 3$ (see~\cite{Higman51}), it follows that $y_0$ is trivial when $n=4,6$; now Lemma~\ref{lem:autothysis} shows that $G_n$ is trivial. The same argument applied to the original map $\Hig_n \to G_n$ takes care of $n\leq 3$.
\bibliographystyle{../BIB/amsplain}
|
\section{\label{sec:level1}Introduction}
In quantum optics, single and multimode nonlinearities are of use for quantum information processing tasks and for tests of foundational physics. Such nonlinearities can be generated from more readily available (linear) operations by enclosing loops in phase or parameter space. This technique is now utilized broadly throughout both theoretical and experimental quantum science with one prominent example being trapped-ion systems \cite{milburn2000, sorensen2000, Leibfried2003}. A set of simple operations is applied in a sequence to enclose such a loop and deterministically generate an effective non-linearity on the other system. These types of nonlinearities and phases, which have a geometric interpretation, are also very valuable in optical~\cite{Kwiat2005, Langford2011} and superconducting circuit~\cite{Leek2007} experiments.
Quantum optomechanics, which exploits the radiation-pressure interaction between an optical field and a mechanical element~\cite{aspelmeyer2014}, is an emerging area of quantum science that is now gaining increasing interest in such nonlinearities. A key goal of the field is to explore non-classical properties of mechanical motion, which can be generated by enclosing loops in the phase space of either the optical~\cite{khosla2013} or mechanical degrees~\cite{pikovski2012, latmiral2016} of freedom. Indeed, the seminal works of Refs. \cite{mancini1997, bose1997}, which study a continuous interaction between an optical cavity field and a mechanical element, have an implicit closed loop in the dynamics where the mechanical oscillator undergoes a closed pattern in phase space and the optical field picks up a nonlinear phase. Bose {\it et al.} \cite{bose1999} noticed that at a certain interaction time, the optical field state decouples from the oscillator state and proposed to leverage this peculiarity for decoherence sensing. This idea was further developed by Armour {\it et al.} in Ref.\cite{armour2002}, where a micromechanical resonator is capacitively coupled to a Cooper-pair-box and then, by Marshall {\it et al.} in Ref.\cite{penrose2003}, where correlations between a single-photon path-entangled optical state and a mechanical object are used to study gravitational decoherence mechanisms \cite{penrose1998}. In the latter scheme, the interference visibility between the two components of the optical field is used as a witness of mechanical coherence, which can be degraded by both standard decoherence and potential gravitational collapse mechanisms. A key to their proposal is observing a recovery of the interference visibility, which arises when the light-mechanics system becomes disentangled after the mechanics completes a closed loop in phase space. Other optomechanical proposals consider a nonlinear phase imparted on a qubit after the mechanical oscillator undergoes a closed loop \cite{vacanti2012, scala2013}.
The optomechanical interaction has been studied extensively in quantum mechanics. In this paper, we analyze the non-classicality of optomechanical phases by studying the dynamics in a fully classical picture and comparing it with the quantum prediction. We provide a general mathematical framework and focus our discussion on two proposals: Ref.~\cite{pikovski2012} and Ref.~\cite{penrose2003}. We start by considering the \emph{pulsed} interaction regime \cite{braginsky1995, vanner2011} of Ref.~\cite{pikovski2012} and then discuss the \emph{continuous} interaction regime of Ref.~\cite{penrose2003} through which we explore the evolution of interferometric visibility. We find that many of the features which have been tacitly considered quantum signatures in such setups can be reproduced classically. Specifically, in the context of the pulsed regime discussed in Ref.\cite{pikovski2012}, we prove that a large amount of the quantum phase has a classical nature. We also find that the main peculiarities of the quantum phase have a correspondence in classical physics: the nonlinearity induced by the mechanical oscillator and its independence of the oscillator state at some interaction times. Surprisingly, this is key to prove that the loss and revival of the visibility pattern in the interferometric scheme discussed in Ref.~\cite{penrose2003}, which have been considered a quantum signature of the system dynamics, can be explained by a completely classical description of the model. On the other hand, we are able to identify nonclassical components to the dynamics that cannot be obtained classically or semi-classically.
\section{\label{sec:level2} The Model}
We consider a mechanically oscillating mirror of frequency $\omega$ and mass $m$ coupled to an optical field of frequency $\omega_f$ inside a cavity of mean length $L$ [see Fig.\ref{kicks}(a)]. The effective Hamiltonian that describes this system in a frame rotating with the field can be written as \cite{pace1993, law1994}
\begin{equation}
\hat{H}=\hat{H}_0 - \hbar g_0\hat{n}\hat{x},
\label{HOpt}
\end{equation}
where $\hat{H}_0=\frac{\hbar\omega}{2}(\hat{x}^2+\hat{p}^2)$ represents the mechanical free energy, $\hat{n}$ is the number operator of the optical field, $\hat{x}=(1/\sqrt{2})(\hat{b}^{\dag}+\hat{b})$ and $\hat{p}=(i/\sqrt{2})(\hat{b}^{\dag}-\hat{b})$ are the mirror quadrature operators and $g_0 = \omega_{f} x_0 / L$ is the optomechanical coupling rate for $x_0 = \sqrt{\hbar/m\omega}$. In the case of the short pulsed regime, the interaction time is much smaller than a period of mechanical motion $\tau=2\pi/\omega$ and the system operates in the bad cavity limit $\kappa\gg\omega$ where $\kappa$ is the cavity amplitude decay rate. We also require the characteristic mechanical decoherence time to be lower than the mechanical period. In such a regime, we can neglect the mechanical free evolution during the light-mirror interaction. The dynamics can thus be described using the unitary evolution operator $\hat{U}_x=e^{i\lambda \hat{n}\hat{x}}$ \cite{vanner2011}, where $\lambda=g_0/\kappa$ is the dimensionless coupling strength. As in Ref.~\cite{pikovski2012} we now consider a sequence of four interactions with the same pulse, each interaction being separated by a quarter of a period of mechanical motion. We write this procedure as $\hat{U}_x$, followed by $\hat{U}_p$, $\hat{U}_{-x}$, and $\hat{U}_{-p}$. This sequence of four pulses generates a square loop in mechanical phase space [see Fig.\ref{kicks}(b)] with a photon-number-dependent side-length. The net interaction of the sequence can be described by the unitary $\hat{\xi} =e^{i\lambda^2\hat{n}^2}$. This effective interaction is a highly nonlinear self-Kerr interaction. This type of nonlinearity is central in Ref.~\cite{khosla2013} and is closely analogous to the controlled gate operations in trapped ion qubits using the phononic mode of the harmonic oscillator as a mediator \cite{milburn2000, sorensen2000, Leibfried2003}.
\begin{figure}[t!]
\centering
\includegraphics[scale=0.23]{system_fig1.pdf}
\caption{a) Optomechanical cavity with a harmonically oscillating mirror at one end. b) Scheme of a four displacement operation in the phase space of the mechanical oscillator.}\label{kicks}
\end{figure}
\section{\label{sec:level3 } Quantum vs classical dynamics}
To compute the dynamics predicted quantum mechanically, we take the field initially in a coherent state $\ket{\alpha}_f$ and the mirror in an arbitrary initial state. We apply the four-pulse operator $\hat{\xi}$ and we compute the mean value of the optical field $\langle \hat{a}\rangle=\alpha\; e^{-N_{p}(1-\cos 2\lambda^2)} e^{i(\lambda^2+N_{p}\sin 2\lambda^2)}$, where $N_p=|\alpha|^2$ is the mean photon number. We observe that both modulus and phase are changed by the non-linear interaction. While the magnitude of this expectation value is reduced due to the coherent state spreading out in phase-space [for small coupling it scales as $O(e^{-N_p\lambda^4})$], the mean phase shift results to be
\begin{equation}\label{Opticalphase-t}
\varphi_{q}=(\lambda^2+N_{p}\sin 2\lambda^2).
\end{equation}
The fact that Eq.\eqref{Opticalphase-t} is independent of the state of the mirror and depends on the intensity of the optical field is going to play a crucial role for the forthcoming considerations.
Since the phase derives from commutation rules both of field and oscillator, we would like to explore its derivation from a fully classical perspective without invoking quantum operators in order to see to what extent it can be considered an indicator of non-classicality.\\
The phase associated with a single reflection of a field on a movable mirror is proportional to the product of the field wavevector $\mathrm{k}_f$ times the mirror position \cite{rakhmanov2001, rakhmanov2002}. A radiation-pressure kick, i.e. a pulse that transfers a momentum $\mathcal{I}$ to the mechanical oscillator, can be classically depicted as the sum of $N_{rt}$ round trips of the light inside the cavity. In the pulsed regime, where the position of the movable mirror is essentially fixed during the $N_{rt}$ reflections, we imagine that the optical field enters the cavity, escapes after a time equal to the inverse of the decay rate $1/\kappa=(2L/c)N_{rt}$ and then waits in an engineered loop before being injected again. During the time between two consecutive kicks the movable mirror freely evolves accordingly to the equation of motion of a harmonic oscillator. For every radiation-pressure kick the field picks up an additional phase due to the movable mirror dynamics. We eventually have a net classical phase of
\begin{equation}
\varphi_{c}=2\mathrm{k}_fN_{rt}\sum_{j=0}^{3}x(t_j),
\end{equation}
where $x(t_j)$ are the positions of the mirror at times $t_j=j\tau/4$.
Solving the equations of motion (see Appendix \ref{appendix1} for more details), we obtain for the classical phase
\begin{equation}\label{classical-harmonic-phase-t}
\varphi_{c}=4 \mathrm{k}_f N_{rt}\frac{\mathcal{I}}{m\omega},
\end{equation}
which linearly depends on the light intensity as described by a (classical) nonlinear Kerr effect. We also note that the classical phase does not depend on the initial conditions of the mechanical oscillator. Hence, the two features which are at the heart of the quantum operations recur also in the classical picture. In order to quantitatively compare Eq. \eqref{classical-harmonic-phase-t} with the quantum-mechanical prediction, we substitute the characteristic parameters of the optomechanical system and the transferred momentum $\mathcal{I}=2\mathrm{k}_fN_{rt}\hbar N_p$, obtaining $\varphi_{c}=2\lambda^2N_{p}$. We therefore find that quantum and classical predictions for the optical phase shift generally differ, though for small coupling strengths this difference is mainly in the form of a (small) offset $\lambda^2$.
Reducing the waiting time between subsequent pulses, it is possible to generalize the argument to $\mathcal{N}$ kicks, where loops in the shape of $\mathcal{N}$-sided polygons are enclosed in mechanical phase space \cite{vacanti2012} (see Appendix \ref{appendix1} for more details). The limit $\mathcal{N}\rightarrow\infty$ coincides with the continuous dynamics, i.e. when light remains in the cavity for the entire mechanical period. Even though it is impossible to tune the same experimental apparatus to achieve this limit, still theoretically we can correctly recover a continuous dynamics from a pulsed regime. By explicitly solving the quantum dynamics and tracing out the mechanical degrees of freedom, we find the reduced density matrix of the field $\hat{\rho}_{f}$ and the mean value of the optical field $\langle \hat{a}\rangle=\Tr[\hat{a}\hat{\rho}_{f}]$. The resulting optical phase shift for a closed loop is $\varphi_q=2\pi k^2+N_p\sin[4\pi k^2]$ where $k=g_0/(\sqrt{2}\omega)$ is the ratio between the single photon optomechanical coupling rate and the mechanical resonance frequency (see Appendix \ref{appendix2} for more details on the derivation of the quantum continuos phase). On the other hand, from a classical perspective the continuous interaction can be depicted as a constant force during the whole evolution, whose intensity is given by the field energy $E_0$. The classical Hamiltonian will then be
\begin{equation}\label{classical-hamiltonian}
H_c=\frac{1}{2}m\omega^2x^2+\frac{p^2}{2m}-\frac{E_0}{L}x,
\end{equation}
and the classical phase can be accordingly generalized to the integral over mirror positions as
\begin{equation}
\varphi_c(\tau)=2\frac{\mathrm{k}_f}{d\tilde{\tau}}\int_0^{\tau}x(\tau')d\tau',
\end{equation}
with $d\tilde{\tau}=2L/c$ the single round trip time. By working out the classical continuous dynamics, the value of the phase in the case of a closed loop results $\varphi_{c}=2\pi\omega_fE_0/(\omega^3mL^2)$ and substituting the optomechanical parameters it reads $\varphi_{c}=4\pi k^2N_p$ (see Appendix \ref{appendix2} for more details on the derivation of the classical continuous phase).
When comparing the phase predicted quantum mechanically $\varphi_q$ to the classical case $\varphi_c$ the main difference is an offset, which is equal to $\lambda^2$ for the four pulse case and depends on $k^2$ for the continuous case. We highlight that this offset is not predicted with semi-classical descriptions where either the light or mechanics are quantized and the other is treated classically (see Appendix \ref{appendix3} for further details on the semiclassical model). Experimentally observing this offset would therefore demonstrate the quantum nature of the interaction between the light and the mechanics. Such an evidence could be provided by measuring the phase as a function of the photon number per pulse $N_p$ and fitting the resultant data to obtain an estimate for the offset. Counter-intuitively, we remark that a large optomechanical coupling is not strictly necessary for the purpose, as long as the phase can be measured with a high precision. Indeed, uncertainty is mainly amenable to the quantum noise of the coherent state probe, which scales approximately as $\delta\varphi_q\sim1/\sqrt{N_p N_r}$, where $N_r$ is the number of averages. We thus require $\delta\varphi_q<\lambda^2$ to provide a good estimate for the quantum offset, which can be easily achieved with current experiments ($10^{-5}\lesssim\lambda\lesssim10^{-1}$ and $N_p\sim10^8$) \cite{brennecke2008,leijssen2015}.
Aside from this small phase shift that certifies the quantum nature of the interaction, we pinpoint that, in the context of pulsed interactions, the non-linear phase of the optical field is mainly due to the classical contribution. If the quantum nature of the system is relevant for the interpretation of an experiment, such as in Ref. \cite{pikovski2012}, it might be necessary, in order to verify the non-classical nature of the interaction, to rely on quantum state preparation of the mechanics, to study the non-classical photon statistics after the interaction or to observe the quantum offset discussed above.
\section{\label{sec:level4} Interferometer visibilities}
We have observed that for closed loops in both classical and quantum pictures the phase does not depend on the initial conditions of the mechanical oscillator: we will see how this property has a non-trivial implication on the quantum-classical comparison.
Consider the Michelson interferometer depicted in Fig.~\ref{interferometer} where the end mirror of the cavity in arm $1$ interacts with an incoming coherent state via the Hamiltonian in Eq. \eqref{HOpt}. We first compute the quantum dynamics and assume the mirror initially prepared in a thermal state $\hat{\rho}_m=(\pi \bar{n})^{-1}\int d^2\gamma\; e^{-|\gamma|^2/\bar{n}}\ket{\gamma}_m\bra{\gamma}$, where $\bar{n}=1/(e^{\beta\hbar\omega}-1)$ is the average thermal occupation number and $\beta=(k_BT)^{-1}$.
By solving the Liouville equation $\dot{\hat{\rho}} = -(i/\hbar)[\hat{\rho},\hat{H}]$ for the system density matrix and tracing out the mechanical degrees of freedom, it is possible to recover the reduced density matrix of the field that allows us to calculate the light intensities on detectors $D_a$ and $D_b$.
Defining $I_{max}$ $(I_{min})$ as the maximum (minimum) intensity on the detectors, the visibility is given by the ratio $\nu =(I_{max}-I_{min})/(I_{max}+I_{min})$, which can be written conveniently as $\nu_q(t)=\nu_q^{cor}(t)\nu_q^{Kerr}(t)$ where
\begin{eqnarray}\label{visibility}
\nu_{q}^{cor}(t)&=&e^{-k^2(1-\cos\omega t)(2\bar{n}+1)} \nonumber \\
\nu_q^{Kerr}(t)&=&e^{-N_{p}[1-\cos(2k^2(\omega t-\sin\omega t))]}.
\end{eqnarray}
(see Appendix \ref{appendix4} for more details on the derivation of Eq.\eqref{visibility}). As shown in Fig.~\ref{visibility_quantum}, the visibility is the composition of two periodic functions with different frequencies that settle two time scales, being responsible for two revivals. The short one of period $\tau$ is due to the term $\nu_q^{cor}(t)$, while the long one of $\tau'=\tau/(2k^2)$ is related to $\nu_q^{Kerr}(t)$. For the former, the revivals of the visibility are explained by the decoupling of field and mirror after periods of the mechanical evolution (i.e. for closed loops in phase space). This demonstrates the presence of correlations between field and mirror at intermediate times. These revivals are clearly manifested in Fig.~\ref{visibility_quantum}. On the other hand, $\nu_q^{Kerr}(t)$ is due to the Kerr non-linear interaction experienced by the field when entering into the cavity because of Hamiltonian \eqref{HOpt} and it is responsible for a reduction of the interferometric pattern. In other words, this reduction of visibility stems from the onset of squeezing of the coherent optical state due to the Kerr nonlinearity. As a result, even if mirror and field are completely uncorrelated after an interaction that lasts a mechanical period, we still cannot fully recover visibility.
\begin{figure}[t!]
\centering
\subfigure[]{
\label{interferometer}
\includegraphics[width=0.34\textwidth]{visibility_qc_fig2a.pdf} }
\subfigure[]{
\label{visibility_quantum}
\includegraphics[width=0.34\textwidth]{visibility_qc_fig2b.pdf} }
\subfigure[]{
\label{visibility_qc}
\includegraphics[width=0.34\textwidth]{visibility_qc_fig2c.pdf}}
\caption{a) Michelson interferometer: a coherent field $\ket\alpha_f$ is split by a beam splitter (BS) in the two arms of the interferometer. Arm 1 ends with an optomechanical cavity with a movable oscillator, while arm 2 is composed by a phase shifter and a stationary cavity.
b) Quantum visibilities $\nu_q(t)$ in Eq.\eqref{visibility} for $T=10^{-5}$K (blue dotted line), $T=10^{-2}$K (red continuous line) and $T=1\;$K (green dashed line); optomechanical coupling $k=10^{-2}$, number of photons $N_p=10^5$ and period $\tau=10^{-5}s$. For relatively high temperature the visibility is strongly suppressed within every single oscillating period. Instead, in the low temperature limit visibility is slightly lowered and the main effect is due to the Kerr non-linearity experienced by the field.
c) Quantum (red continuous line) and classical (blue dotted line) visibilities in Eqs. \eqref{visibility} and \eqref{Vis-Full-Class-t} for temperature $T=5\times 10^{-2}$K. Other parameters are as in b).}
\label{Fig2}
\end{figure}
We are now going to show how the visibility recovery can be explained through a fully classical treatment, thanks to the periodic restoration of phase independence from the initial mechanical conditions. We assume the mirror initially subjected to classical thermal fluctuations around the origin described by a Maxwell-Boltzmann distribution. By using polar coordinates $(\theta,\varrho)$ we define the initial position and momentum of the oscillator as
\begin{equation}\begin{split}
&x(t=0,\;\theta,T)=\sqrt{2/(m\omega^2)}\varrho(T)\cos\theta\\
&p(t=0,\;\theta,T)=\sqrt{2m}\varrho(T)\sin\theta\\
&\varrho^2(T)=\frac{m\omega^2}{2}x^2(0,\theta,T)+\frac{p^2(0,\theta,T)}{2m},
\end{split}\end{equation}
with $\varrho^2(T)$ the initial thermal energy of the oscillator at temperature $T$. The phase acquired by the field after an interaction time $t$ will consequently depend on these initial conditions
\begin{equation}\begin{split}\label{classphase-t}
\varphi_{c}(\varrho,\theta,t)=&\sqrt{2}\chi\varrho\left[ \cos\theta\sin\omega t+\sin\theta(1-\cos\omega t)\right]\\
&+\frac{\omega}{\omega_f}\chi^2E_0\left(\omega t-\sin\omega t\right),
\end{split}\end{equation}
where $\chi=\omega_f/(\omega^2L\sqrt{m})$, (see Appendix \ref{appendix2} for more details on the derivation of the classical continuous phase). If we set with $I_0$ the intensity of the incoming field, the intensities on the detectors $D_a$ and $D_b$ depend on the phase between the two arms as
\begin{equation}
I^a_b(\varrho,\theta,t)=\frac{I_0}{2}[1 \pm \cos(\varphi_{c}(\varrho,\theta,t)-\phi)].
\end{equation}
By averaging over all initial mechanical states, we thus obtain
\begin{equation}\label{class-int-ab}\begin{split}
\langle I^a_b(t)\rangle&=\frac{\beta}{\pi}\iint \varrho\;d\varrho\ d\theta\; I^a_b(\varrho,\theta,t)\;e^{-\beta\varrho^2}\\
&=\frac{I_0}{2}\bigg[1 \pm e^{-\frac{\chi^2}{\beta}(1-\cos\omega t)}\\
&\hspace{1cm}\times\cos\left(\frac{\omega}{\omega_f}E_0\chi^2(\omega t-\sin\omega t)-\phi\right)\bigg].
\end{split}\end{equation}
It is then possible to derive the expression for the classical visibility by maximizing and minimizing Eq.\eqref{class-int-ab}
\begin{equation}\begin{split}\label{Vis-Full-Class-t}
\nu_{c}(t)=e^{-\frac{\chi^2}{\beta}(1-\cos\omega t)},
\end{split}\end{equation}
which reveals a fully classical revival after each period of the mechanical oscillator. These revivals are due to the particular property of the phase acquired by the field that still holds in the classical scenario, i.e. its independence from the initial mirror conditions after periods of the mechanical oscillator. Indeed, the loss of visibility has to be attributed to the uncertainty on the initial conditions due to the thermal fluctuations of the mirror, which appear in the same form both in quantum and classical pictures. In contrast, in the case of zero temperature, the classical visibility will result equal to one at all times.
Let us now compare the classical result in Eq. \eqref{Vis-Full-Class-t} with the fully quantum one $\nu_q$. By using the optomechanical parameters we get $k=\chi\sqrt{\hbar\omega/2}$ and hence the classical visibility can be written as $\nu_c(t)=e^{-\frac{2k^2}{\beta\hbar\omega}(1-\cos\omega t)}$. First of all, we confirm that the quantum thermal part of the visibility $\nu_q^{cor}(t)$ coincides with the classical expression in the limit $k_BT\gg\hbar\omega$.
We point out that the difference between $\nu_q^{cor}$ (which arises from the mirror-field correlation) and the classical visibility is negligible even at very low temperatures (at $T=10^{-6}$K and $\omega=2\pi\times 10^5$Hz we have $|\nu_q^{cor}-\nu_c|\le |e^{-2k^2}-1|\sim 0.01$ even when pushing the coupling to $k=0.1$). The parameter $k$ is thus crucial for quantum behavior in such setups, as also discussed in Refs. \cite{penrose2003, kleckner2008}. In the context of a single photon source and within a hybrid framework a similar result was observed in Ref. \cite{lampo2014}.
Moreover, our analysis identifies additional quantum behavior in $\nu_q^{Kerr}$ due to the quantum-mechanical Kerr non-linear interaction. As Fig.\ref{visibility_qc} shows, while the classical result displays a complete revival after every mechanical period $\tau$, the Kerr nonlinearity lowers the visibility giving rise to a partial revival.
Although the noise in the coherent state has an intrinsic quantum origin, we can bring our classical model closer to the quantum picture. Let us assume our classical coherent field is affected by a gaussian noise \cite{milburn1992}: the field energy in the classical Hamiltonian $H_c$ could be written as $E(\epsilon)=E_0(1-\epsilon)$ where the dimensionless parameter $\epsilon$ is described by the distribution $\mathcal{P}(\epsilon)=1/(\sqrt{2\pi}\Delta)e^{-\frac{\epsilon^2}{2\Delta^2}}$, $\Delta^2$ being the variance. The classical phase in Eq. \eqref{classphase-t} and the intensities in Eq. \eqref{class-int-ab} will now depend on the noise $\epsilon$. By averaging Eq.\eqref{class-int-ab} over the gaussian distribution, the classical visibility (in terms of the optomechanical parameters) is calculated as
\begin{equation}\label{class-visibility-noise}
\tilde{\nu}_c(t)=\nu_c(t)e^{-2k^4N_p(\omega t-\sin\omega t)^2},
\end{equation}
where we used $E_0=\hbar\omega_fN_p$ and $\Delta^2=1/N_p$ to closely compare our gaussian noise with the (poissonian) quantum noise (see Appendix \ref{appendix5} for more details on the derivation of Eq.\eqref{class-visibility-noise}). Therefore, noise in the classical field allows us to exploit the classical kerr-nonlinearity of the phase (see Eq. \eqref{classical-harmonic-phase-t}) to recover a further loss in the classical visibility, which coincides in the limit $k^2\omega t \ll 1$ and large intensities with the quantum result $\nu_q^{Kerr}$ in Eq. \eqref{visibility}. However, while $\nu_q^{Kerr}$ is periodic so to cause revivals, the classical kerr-nonlinearity only lowers the visibility. This further highlights the importance of the parameter $k$ for quantum behavior in optomechanical systems.
We conclude that quantum and classical visibilities display qualitatively the same trend in the current experimental conditions and in order to observe significant deviations ($|\nu_q-\nu_c|\gtrsim 10^{-4}$ within a mechanical period) we need to improve the coupling or the number of photons to $k\gtrsim 10^{-3}$ and $N_p\gtrsim 10^6$ (with all the other parameters as in Fig. \ref{visibility_qc}), independently of the temperature. Indeed, while $\nu_q$ tends to $\nu_c$ in the limit $k^2N_p\ll\bar{n}$ and $k_BT\gg \hbar\omega$, in the same limit, the classical visibility and its quantum counterpart (for a coherent state) coincide with the quantum visibility for a single photon, found in Refs. \cite{penrose2003, kleckner2008}. This entails that the visibility pattern alone is not sufficient to infer non-classicality of the system dynamics. For a quantum interpretation of the results it is essential to have additional assumptions: for instance, in Refs. \cite{penrose2003, kleckner2008} (where the entanglement between the oscillator and the field causes the collapse of visibility) one has to rely on single photon and a ground state mechanical oscillator.
Classically, on the other hand, the certainty of the mechanical position for zero effective temperature keeps the maximum visibility without a collapse. However, since any small deviation from zero effective temperature does cause the classical visibility to reduce, an unambiguous proof of quantumness requires additional measurements, such as the verification of the entanglement between field and mechanics.
\section{\label{sec:level4} Conclusions}
Dynamical operations that modify the phase of a system are used in a variety of optomechanical schemes and play a central role in optomechanics to probe the foundations of quantum theory. Here, we studied the classical and quantum nature of such phases, showing that some key features in recent proposals are reproduced classically. In particular, we have seen that the two main peculiarities of the quantum phase are reproduced classically: the nonlinear interaction induced by the mechanical oscillator and its decoupling at certain interaction times. These findings have further allowed us to challenge the quantumness of the interferometric visibility, which has been considered a quantum signature of the system dynamics. While in the common experimental regimes of large photon numbers and small couplings the classical and quantum descriptions mostly coincide, we isolate genuine quantum signatures of the interaction that appear on the phase and the visibility. These signatures might be probed in future optomechanical experiments, even in the weak coupling limit. We finally remark that the classical results found here derive from a fully classical theory in contrast to other approaches using both quantum operators and thermal fields.
\section{\label{sec:level4} Acknowledgements}
The authors wish to thank Carlo Di Franco and Doug Plato for useful discussions. MSK acknowledges the Leverhulme Trust [Project RPG-2014-055], the UK EPRSC (EP/034480/1) and the Royal Society. FA and MSK acknowledge the Marie Curie Actions of the EU's 7$^{\mbox{th}}$ Framework Programme under REA [grant number 317232] for their financial support. IP acknowledges support by the NSF through a grant to ITAMP. CB acknowledges support from the European Commission project RAQUEL (No. 323970); the Austrian Science Fund (FWF) through the Special Research Programme FoQuS, the Doctoral Programme CoQuS and Individual Project (No. 2462).
|
\section{Introduction}
The original motivation for this paper lies in a model different than the one claimed in the title. Namely, we are interested in freelance job websites, which have two kinds of visitors: customers offering jobs and freelancers, or servers, looking for jobs. The key feature of such websites is that multiple servers compete for a single job there. The most common situation is competition at the stage of application, i.e.\ to get the job. Along with that, the applicants might have to do the job, and then the one who has done it best gets paid --- this is, for example, the former principle of work of \url{flightfox.com}, a website for searching cheap flight connections.
To start with, we design a~basic model of a freelance job website, where there is a Poisson stream of customers and a Poisson stream of freelancers of rates $\lambda$ and $\mu$, respectively. Each customer upon arrival posts a job on the website main page and sets a patience clock that is distributed exponentially with parameter $\nu$. Each freelancer upon arrival picks a job from the main page at random and applies for it, in the form of leaving a comment. If there are no jobs, the freelancer leaves. At most $I$ applications are allowed per job. Once a customer receives the $I$-th application, or his patience expires, he should remove the job from the main page and continue communication with the applicants via private messaging. The state of this system is represented by the vector composed of the numbers of jobs on the main page with $i = 0,\ldots, I-1$ applications. Mathematically, the constraint on the number of applications per job is convenient since it makes the problem finite-dimensional. In practice, such a threshold is always present implicitly: jobs with too many applications are not attractive anymore since the chance to get them is small. We are not aware of websites with an explicit threshold, but we suggest it as a guarantee of a chance to get a job, which is necessary in case of the ``do-it-best-get-paid'' policy or in case the website aims to expand and thus encourage unexperienced freelancers to join.
Our next observation (inspired by Borst et al. \cite{BBMNQ}) is that the basic freelance model is actually equivalent to a PS-queue where
\begin{itemize}
\item arrivals are Poisson of rate~$\lambda$,
\item customers re-enter the queue for~$I$ times with independent service requirements distributed exponentially with parameter $\mu$,
\item patience times of customers are exponentially distributed with parameter $\nu$.
\end{itemize}
The state of the PS-queue is, respectively, the vector composed of the numbers of customers who have entered the queue for $i = 1, \ldots ,I$ times, or we also say "{\it customers at stage~$i$ of service}". Finally, we generalise the model by allowing service requirements at different stages of service have different parameters $\mu_i$ (the distribution is still exponential).
The results of this paper concern fluid limit approximations of the suggested model in overload. We show that trajectories of the per-stage population process, when scaled properly, converge to solutions of a system of differential equations, which in turn stabilise to the unique invariant solution over time. Then we use the fluid limit approximation to estimate the chance for a freelancer to get a job.
As for the proof techniques, convergence of the scaled trajectories follows by the classical arguments of compact containment and oscillation control. To establish convergence of fluid limits to the invariant point, we use an equivalent description of fluid limits, which is a generalisation of the approximating equation suggested by Gromoll et al. \cite{GRZ08} for a single-stage-service PS queue. We also discuss the method of of Lyapunov functions since the model treated in this paper is an instant of a more general open problem: no Lyapunov function is known for a PS-queue with routing and impatience. We present some partial solutions to this open problem.
In the future, we aim to build on the motivation behind this chapter. A next logical step would be to incorporate the service stage in addition to the application stage. We are mostly interested in the scenario when the same job is done multiple times, which mathematically is a special kind of dependence of job sizes. There are also optimization questions that arise in practice. For example, if freelancers are ranked in a way, what strategies should they follow to build and maintain a strong reputation? The majority of freelance websites exist at the cost of transaction fees, then what are the ways to increase website profits while keeping transaction fees affordable to visitors? Recently there has been more interest in analysing related problems, cf. \cite{2},\cite{5}, \cite{3}, \cite{7},\cite{1}.
The paper is organised as follows. In Section~\ref{FL:sec:model_description}, we discuss in detail how the PS-queue with multistage service arises from the basic freelance model. In Section~\ref{FL:sec:fluid_model}, we introduce two equivalent deterministic systems of equations that are analogues of the stochastic model and discuss their properties. We also discuss Lyapunov functions and estimate the probability of a freelancer getting a job. Section~\ref{FL:sec:fluid_limit} specifies the fluid scaling under which the stochastic model converges to its deterministic analogues. In Sections~\ref{FL:sec:fluid_model_proof} and~\ref{FL:sec:fluid_limit_proof}, the proofs for the results of Sections~\ref{FL:sec:fluid_model} and~\ref{FL:sec:fluid_limit} are presented. Section~\ref{FL:appendix} shows how the convergence to the invariant point in the single-stage-service case implies that for the multistage-service case. In the remainder of this section we list the notation we use throughout the paper.
\paragraph{Notation} To define $x$ as equal to $y$, we write $x:=y$ or $y=:x$. We abbreviate the left-hand side and right-hand side of an equation as ``LHS" and ``RHS", respectively.
The standard sets are: the natural numbers $\mathbb{N}:= \{1,2, \ldots \}$, the real line $\mathbb{R} := (-\infty, \infty)$ and non-negative half-line $\mathbb{R}_+:=[0,\infty)$.
All vector notations are boldface. Unless stated otherwise, the coordinates of an $I$ dimensional vector are denoted by the same symbol (regular font instead of bold) with subscripts $1, \ldots, I$ added. Overlining and superscripts of vectors remain in their coordinates as well, for example $\overline{\mathbf{Q}}^r(t) = (\overline{Q}_1, \ldots, \overline{Q}_I)(t)$. The $\mathbb{R}^I$ space is endowed with the $L_1$-norm $\|\mathbf{x} \|_1 := \sum_{i=1}^I |x_i|$.
For the metric space $S=\mathbb{R}$, $\mathbb{R}_+$ or $\mathbb{R}_+^I$, the notation $\mathbf{D}(\mathbb{R}_+, S)$ stands for the space of functions $f \colon \mathbb{R}_+ \to S$ that are right-continuous with left limits. This space is endowed with the Skorokhod $J_1$-topology.
\section{Stochastic model} \label{FL:sec:model_description} In this section we introduce two stochastic models: a basic model of a freelance job website and a processor sharing (PS) queue with multistage service. We then discuss in what sense the latter model generalises the former.
\paragraph{Basic model of a freelance job website} There are two types of visitors on a freelance job website: customers, who publish job descriptions, and freelancers, who apply for those jobs. We assume that new jobs appear on the website main page according to a Poisson process of rate~$\lambda$, and that freelancers intending to find a job visit the website according to a Poisson process of rate~$\mu$. As a freelancer looking for a job visits the website, he picks a job from the main page at random and applies for it, say leaves a comment. Each job is allowed to collect at most~$I$ applications while its patience time lasts, measured from the moment the job was published and distributed exponentially with parameter~$\nu$. All the random elements mentioned: the arrival processes of jobs and freelancers, and patience times of different jobs are mutually independent. As soon as a~job either gets~$I$ applications, or its patience time expires, the customer removes the job description from the main page and continues communication with the applicants elsewhere. In this model, our focus is on the process
\[
\mathbf{Q}^{\textup{FL}}(t) = (Q_0^{\textup{FL}}, \ldots, Q_{I-1}^{\textup{FL}})(t), \quad t \geq 0,
\]
where $Q_i^{\textup{FL}}(t)$ is the number of jobs on the main page that have collected $i$ applications up to time instant~$t$.
\paragraph{PS-queue with multistage service} Now consider a PS queue with Poisson arrivals of rate~$\lambda$. We assume that each customer of this queue should undergo~$I$ stages of service, with stage~$i+1$ starting immediately upon completion of stage~$i$ and the service requirement at stage~$i$ distributed exponentially with parameter~$\mu_i$. A customer is supposed to leave the queue upon service completion, but if his patience time expires earlier, he abandons then. As in the previous model, patience times are distributed exponentially with parameter~$\nu$. The arrival process, service requirements of all customers at all stages, and patience times of all customers are mutually independent. Here we analyse the process
\[
\mathbf{Q}(t) = (Q_1, \ldots, Q_I)(t), \quad t \geq 0,
\]
where $Q_i(t)$ stands for the number of customers in stage~$i$ of service at time instant~$t$.
\paragraph{Equivalence of the two models in case all $\mu_i$'s are the same} Suppose that, in the second model, all service stages have the same distribution parameter~$\mu$. In this case, the processes $\mathbf{Q}^{\textup{FL}}(\cdot)$ and $\mathbf{Q}(\cdot)$ are distributed identically. The idea is that the jobs waiting for the~$i$-th application (i.e.\ those with~$i-1$ applications) can be viewed as customers of the PS-queue who are undergoing stage~$i$ of service, and the moments jobs receive applications --- as completions of stages of service in the PS-queue. When a freelancer applies for a job, he picks one at random. Correspondingly, if there is a service stage completion in the PS-queue, all of the service stages that have been ongoing are equally likely to be the one that has finished. That is due to the memoryless property of the exponential distribution and because all the $\mu_i$'s are the same.
The above insight originally belongs to Borst et al. \cite{BBMNQ}, who discussed the equivalence of PS and random order of service in the context of the $G/M/1$ queue. To formalise the idea they constructed a probabilistic coupling, which can be generalised in a straightforward way to the two models we consider here.
\paragraph{Dynamic equations} Most of the results presented in this paper are developed for the more general model of PS with multistage service. We assume it is defined on a probability space $(\Omega, \mathcal{F}, \mathbb{P})$ with expectation operator $\mathbb{E}$. Denote the arrival process of customers, which is Poisson of rate~$\lambda$, by $A(\cdot)$. These are arrivals to stage~$1$ of service. Let $D_i^\textup{s}(\cdot)$ stand for the process of service completions at stage~$i$. Note that, for $i \leq I-1$, $D_i^\textup{s}(\cdot)$ is the arrival process to stage~$i+1$, and $D_I^\textup{s}(\cdot)$ is the process of departures due to total service completions. Finally, denote by $D_i^\textup{a}(\cdot)$ the process of abandonments due to impatience at stage~$i$. Since service requirements at all stages and patience times of all customers are distributed exponentially, and since the exponential distribution is memoryless, the processes $D_i^\textup{s}(\cdot)$ and $D_i^\textup{a}(\cdot)$ are doubly stochastic Poisson with instantaneous rates $\mu_i Q_i (\cdot) / \| Q (\cdot) \|$ (zero by convention when the system is empty) and $\nu Q_i(\cdot)$, respectively. That is, the population process $\mathbf{Q}(\cdot) = (Q_1, \ldots, Q_I)(\cdot)$ can be represented as the unique (see e.g.~\cite{MMR98}) solution to the following system of equations: for $t \geq 0$,
\begin{equation} \label{FL:eq:dyn_1}
\begin{split}
Q_1(t) &= Q_1(0) + A(t) - D_1^\textup{s}(t) - D_1^\textup{a}(t), \\
Q_i(t) &= Q_i(0) + D_{i-1}^\textup{s}(t) - D_i^\textup{s}(t) - D_i^\textup{a}(t), \quad i \geq 2,
\end{split}
\end{equation}
with
\begin{equation} \label{FL:eq:dyn_2}
\begin{split}
D_i^\textup{s}(t) &= \Pi_i^\textup{s} \Bigl( \mu_i \int_0^t \frac{Q_i(u)}{\|\mathbf{Q}(u)\|_1} \, du \Bigr),\\
D_i^\textup{a}(t) &= \Pi_i^\textup{a} \Bigl( \nu \int_0^t Q_i(u) du \Bigr),
\end{split}
\end{equation}
where $\Pi_i^\textup{s}(\cdot), \Pi_i^\textup{a}(\cdot)$ are Poisson processes of unit rate for all~$i$, and also the initial state $\mathbf{Q}(0) = (Q_1, \ldots, Q_I)(0)$, the arrival process $A(\cdot)$ and the processes $\Pi_i^\textup{s}(\cdot)$, $\Pi_i^\textup{a}(\cdot)$ are mutually independent.
Finally, throughout the rest of the paper, we assume the following.
\begin{assumption} \label{FL:ass:load} The system is overloaded, i.e.\ $\lambda \sum_{i=1}^I 1/\mu_i > 1$.
\end{assumption}
\section{Fluid model} \label{FL:sec:fluid_model}
In this section, we define and analyse a fluid model --- a deterministic analogue of the PS-queue with multistage service introduced above. We use the fluid model to estimate the chance of a freelancer getting a job when the application limit $I$ is large. In the next section, the fluid model is shown to approximate the stochastic PS model, where the time and space are appropriately normalised.
\begin{definition}
A function $\mathbf{z}(\cdot) = (z_1, \ldots, z_I)(\cdot) \colon \mathbb{R}_+ \to \mathbb{R}_+^I$ that is continuous and such that $\inf_{t \geq \delta} \| \mathbf{z}(t) \|_1 > 0$ for any $\delta > 0$ is called a {\it fluid model solution (FMS)} if it solves the following system of differential equations: for $t>0$,
\begin{equation} \label{FL:eq:fluid_model_dif}
\begin{split}
z_1'(t) &= \lambda - \mu_1 \dfrac{z_1(t)}{\|\mathbf{z}(t)\|_1} - \nu z_1(t), \\
z_i'(t) &= \mu_{i-1} \dfrac{z_{i-1}(t)}{\|\mathbf{z}(t)\|_1} - \mu_i \dfrac{z_i(t)}{\|\mathbf{z}(t)\|_1} - \nu z_i(t), \quad i \geq 2.
\end{split}
\end{equation}
\end{definition}
When investigating properties of FMS's, we will also use an alternative description of them. Let random variables $B_i$, $i= 1, \ldots, I$, and $D$, all defined on the same probability space $(\Omega, \mathcal{F}, \mathbb{P})$, be mutually independent and distributed exponentially, $B_i$ with parameter~$\mu_i$ for all~$i$ and $D$ with parameter~$\nu$. Introduce also
\[
B_j^i := \left\{
\begin{array}{ll}
\sum_{l=j}^i B_l, & j \leq i, \\
0, & j > i.
\end{array}
\right.
\]
It turns out that~\eqref{FL:eq:fluid_model_dif} is equivalent to the following system of integral equations: for $i = 1, \ldots, I$ and $t \geq 0$,
\begin{equation} \label{FL:eq:fluid_model_int}
\begin{split}
z_i(t) =& \sum_{j=1}^i z_j(0) \, \mathbb{P} \Bigl\{ B_j^{i-1} \leq \int_0^t \frac{du}{\|\mathbf{z}(u)\|_1} < B_j^i, \, D > t \Bigr\} \\
&+ \lambda \int_0^t \mathbb{P} \Bigl\{ B_1^{i-1} \leq \int_s^t \frac{du}{\|\mathbf{z}(u)\|_1} < B_1^i, \, D > t-s \Bigr\} \, ds.
\end{split}
\end{equation}
The two systems are equivalent in the sense that they have the same set of continuous, non-negative, non-zero outside $t=0$ solutions.
The differential equations \eqref{FL:eq:fluid_model_dif} capture the drift of the system, they are direct analogues of the stochastic equations \eqref{FL:eq:dyn_1}--\eqref{FL:eq:dyn_2}. The integral equations~\eqref{FL:eq:fluid_model_int} mimic the evolution of the stochastic system from an individual customer's prospective. Given a customer arrived at time instant~$s$, he is undergoing stage~$i$ of service at time instant $t \geq s$ if his patience time allows it, and if the amount of service he has received up to~$t$ covers the service requirements of the first $i-1$ stages completely and the service requirement of stage~$i$ only partially. This explains the second term in the RHS of~\eqref{FL:eq:fluid_model_int}. The first term has the same interpretation but in the context of customers who were present in the system at $t= 0$. Due to the memoryless property of the exponential distribution, the residual service requirements of the service stages that are ongoing at $t = 0$ are still exponentially distributed with the corresponding parameters.
A rigorous proof of the equivalence of the two descriptions of FMS's follows in Section~\ref{FL:sec:fluid_model_proof}. It exploits certain properties of the exponential and phase-type distributions.
We now proceed with the analysis of FMS's.
\begin{theorem} For any initial state $\mathbf{z}(0)$, a FMS exists and is unique.
\end{theorem}
\begin{proof}
Existence of FMS's is established in Sections~\ref{FL:sec:fluid_limit} and~\ref{FL:sec:fluid_limit_proof}: fluid limits of the population process~$\mathbf{Q}(\cdot)$ are FMS's. When proving uniqueness, we distinguish between two cases. If the initial state is non-zero, the uniqueness follows from the description~\eqref{FL:eq:fluid_model_dif} by the Gronwall inequality: it applies because the RHS of \eqref{FL:eq:fluid_model_dif} is Lipschitz continuous on sets $\{ \mathbf{z} \in \mathbb{R}_+^I \colon ||\mathbf{z}||_1 \geq a \}$, $a>0$. In case the initial state is zero, we use the description~\eqref{FL:eq:fluid_model_int}. The summation of the equations of~\eqref{FL:eq:fluid_model_int} where $\mathbf{z}(0) = \mathbf{0}$ implies that the norm $\|\mathbf{z}(\cdot)\|_1$ solves the following equation: for $t \geq 0$,
\begin{equation} \label{FL:eq:norm_fms_int}
x(t) = \lambda \int_0^t \mathbb{P} \Bigl\{ B_1^I > \int_s^t \frac{du}{x(u)}, \, D > t-s \Bigr\} \, ds.
\end{equation}
The last equation is, in fact, the fluid model of a PS-queue with single-stage service. It is studied in~Gromoll et al. \cite{GRZ08} and shown to have a unique solution that is bounded away from zero outside $t = 0$, see Corollary~3.8. So the norm $\|\mathbf{z}(\cdot)\|_1$ is unique. Then a solution to~\eqref{FL:eq:fluid_model_int} must be unique as well, since the individual coordinates $z_i(\cdot)$ are uniquely defined by the norm~$\| \mathbf{z}(\cdot) \|_1$ in~\eqref{FL:eq:fluid_model_int}.
\end{proof}
In the next theorem we characterize the invariant (constant) FMS.
\begin{theorem}
There exists a unique invariant FMS, which is given by
\begin{equation} \label{FL:eq:0}
\begin{split}
z_1^\ast &= \dfrac{\lambda}{\mu_1 + \nu \|\mathbf{z}^\ast\|_1} \,\|\mathbf{z}^\ast\|_1, \\
z_i^\ast &= \dfrac{\mu_{i-1}}{\mu_i + \nu \|\mathbf{z}^\ast\|_1}\, z_{i-1}^\ast, \quad i \geq 2,
\end{split}
\end{equation}
where $\|\mathbf{z}^\ast\|_1$ solves
\begin{equation} \label{FL:eq:2}
\begin{split}
f(\|\mathbf{z}^\ast\|_1) := \lambda \biggl( \frac{1}{\mu_1 + \nu \|\mathbf{z}^\ast\|_1} + \frac{\mu_1}{(\mu_1 + \nu \|\mathbf{z}^\ast\|_1) (\mu_2 + \nu \|\mathbf{z}^\ast\|_1)}& \\
+ \cdots+ \frac{\mu_1 \ldots \mu_{I-1}}{(\mu_1 + \nu \|\mathbf{z}^\ast\|_1) \ldots (\mu_I + \nu \|\mathbf{z}^\ast\|_1)} &\biggr) = 1.
\end{split}
\end{equation}
\end{theorem}
\begin{proof}
By definition, an invariant FMS must be non-zero. It follows from the description~\eqref{FL:eq:fluid_model_dif} that an invariant FMS $\mathbf{z}^\ast = (z_1^\ast, \ldots, z_I^\ast)$ is defined by the following system of equations:
\begin{equation} \label{FL:eq:fp_dif}
\begin{split}
&\lambda - \mu_1 \frac{z_1^\ast}{\|\mathbf{z}^\ast\|_1} - \nu z_1^\ast = 0, \\
&\mu_{i-1} \frac{z_{i-1}^\ast}{\|\mathbf{z}^\ast\|_1} - \mu_i \frac{z_i^\ast}{\|\mathbf{z}^\ast\|_1} - \nu z_i^\ast = 0, \quad i \geq 2.
\end{split}
\end{equation}
As we solve the $i$-th equation in~\eqref{FL:eq:fp_dif} with respect to~$z_i^\ast$, we obtain~\eqref{FL:eq:0}.
Now,~\eqref{FL:eq:0} is equivalent to
\begin{equation*}
\begin{split}
z_1^\ast &= \dfrac{\lambda}{\mu_1 + \nu \|\mathbf{z}^\ast\|_1} \, \|\mathbf{z}^\ast\|_1, \\
z_i^\ast &= \dfrac{\mu_{i-1} \ldots \mu_1}{(\mu_i + \nu \|\mathbf{z}^\ast\|_1) \ldots (\mu_2 + \nu \|\mathbf{z}^\ast\|_1)} \, z_1^\ast, \quad i \geq 2.
\end{split}
\end{equation*}
As we sum up over the last set of equations and divide by $\|\mathbf{z}^\ast\|_1$ on both sides,~\eqref{FL:eq:2} follows.
Note that equations~\eqref{FL:eq:0}--\eqref{FL:eq:2} have a unique solution. Indeed, the function $f(\cdot)$ is strictly decreasing in $(0,\infty)$ and takes all values between $\lambda \sum_{i=1}^I 1/\mu_i$ (which is bigger than~$1$ by Assumption~\ref{FL:ass:load}) and 0 as it arguments runs from $0$ to $\infty$. Hence \eqref{FL:eq:2} uniquely defines the norm $\|\mathbf{z}^\ast\|_1$, and then \eqref{FL:eq:2} uniquely defines the individual coordinates $z_i$ via $\|\mathbf{z}^\ast\|_1$.
\end{proof}
Finally, we show that the invariant FMS found above is asymptotically stable.
\begin{theorem} \label{FL:th:fixed_point_stable}
Any FMS $\mathbf{z}(t)$ converges to the unique invariant FMS $\mathbf{z}^\ast$ as $t \to \infty$.
\end{theorem}
When proving the last theorem, we again refer to the paper~\cite{GRZ08} on PS with single-stage service. The equations of~\eqref{FL:eq:fluid_model_int} summed up give: for $t \in \mathbb{R}_+$,
\begin{equation} \label{FL:eq:fms_norm}
\begin{split}
\|\mathbf{z}(t)\|_1 =& \sum_{j=1}^I z_j(0) \, \mathbb{P} \Bigl\{B_j^I > \int_0^t \frac{du}{\|\mathbf{z}(u)\|_1}, D>t \Bigr\} \\
&+ \lambda \int_0^t \mathbb{P} \Bigl\{ B_1^I > \int_s^t \frac{du}{\|\mathbf{z}(u)\|_1}, \, D > t-s \Bigr\} \, ds.
\end{split}
\end{equation}
In the last equation, we put $\mathbf{z}(\cdot) \equiv \mathbf{z}^\ast$ and take $t \to \infty$, which implies that the norm $\|\mathbf{z}^\ast\|_1$ of the invariant FMS should solve the equation
\begin{equation} \label{FL:eq:fp_norm}
x = \lambda \mathbb{E} \min\{ x(B_1 + \ldots + B_I), D \}.
\end{equation}
Gomoll et al.\ \cite{GRZ08} show that \eqref{FL:eq:fp_norm} has a unique solution, so it must be $\|\mathbf{z}^\ast\|_1$; see Theorem~2.4 in~\cite{GRZ08}. It also follows from Theorem~2.4 that all solutions $\|\mathbf{z}(t)\|_1$ to~\eqref{FL:eq:fms_norm} converge to the unique solution $\|\mathbf{z}^\ast\|_1$ of~\eqref{FL:eq:fp_norm} as $t \to \infty$. To be precise, the theorem works with a slightly different equation than~\eqref{FL:eq:fms_norm}, but the difference is in the terms that represent the initial customers and vanish as $t \to \infty$. Now that we have the convergence of the norm $\|\mathbf{z}(t)\|_1 \to \|\mathbf{z}^\ast\|_1$ for any FMS $\mathbf{z}(\cdot)$, the coordinate-wise convergence can be shown with the use of the same ideas as in Theorem~2.4 of Gromoll et al.\ \cite{GRZ08}. We provide the proof in Section~\ref{FL:appendix} for completeness.
{\begin{remark}[Asymptotic stability of the invariant point via Lyapunov functions]
An alternative way to establish the asymptotic stability of the invariant solution to the fluid model~\eqref{FL:eq:fluid_model_dif} would be to suggest a Lyapunov function, i.e.\ a function $L \colon (0,\infty)^I \to \mathbb{R}_+$ such that $L(\mathbf{z}) \to \infty$ as $\|\mathbf{z}\|_1 \to \infty$ and whose derivative with respect to~\eqref{FL:eq:fluid_model_dif} is non-positive. It is known that a PS-queue with $I$ classes of customers, a Markovian routing and no impatience admits the entropy Lyapunov function (see Bramson \cite{Bram96})
\begin{equation} \label{eq:Lyapunov_entropy}
L_\textup{lg}(\mathbf{z}) := \sum_{i=1}^I z_i \ln \left( \frac{z_i / \|\mathbf{z}\|_1}{z_i^\ast/\|\mathbf{z}^\ast\|_1} \right).
\end{equation}
It can also be checked along the lines of Theorem~\cite[Theorem ]{ALOHA} that a PS-queue with impatience (different rates $\nu_i$ for different classes are allowed) and no routing admits the quadratic Lyapunov function
\[
{L}_\textup{qd}(\mathbf{z}) = \sum_{i=1}^I \dfrac{(z_i-z_i^\ast)^2}{\mu_i z_i^\ast / \|\mathbf{z}^\ast\|_1}.
\]
Whether there is a Lyapunov function for a PS-queue with both routing and impatience is an open problem. In the particular case of a PS-queue with multistage service, where the routing is tandem (from class~$i$ to $i+1$) and the impatience parameters are the same for all classes, the mentioned open problem does not seem to become easier. We have, however, come up with some partial solutions, which we present here without a proof. For a general Markovian routing and the same impatience parameters for all classes, the entropy Lyapunov function \eqref{eq:Lyapunov_entropy} works if there are $I=2$ classes of customers, and if there are $I >2$ classes, it can be shown to work everywhere except for a~compact set (the derivative of $L_\textup{lg}(\mathbf{z})$ with respect to~\eqref{FL:eq:fluid_model_dif} is non-negative on $\{\mathbf{z} \in (0,\infty)^I \colon \|\mathbf{z}\|_1 \geq \|\mathbf{z}^\ast\|_1$). In case of $I=2$ classes, a general Markovian routing $(P_{i,j})_{i,j=1}^2$ and different impatience parameters $\nu_1, \nu_2$, the following quadratic Lyapunov function works:
\[
L_\textup{qd}(\mathbf{z}) = \alpha_1 (z_1 - z_1^\ast)^2 + \alpha_2 (z_2 - z_2^\ast)^2,
\]
where
\[
\alpha_1 = \frac{1}{[(1 - P_{1,1}) \mu_1 + P_{2,1} \mu_2 ] q_1}, \quad
\alpha_2 = \frac{1}{[(1 - P_{2,2}) \mu_2 + P_{1,2} \mu_1 ] q_2}.
\]
\end{remark}}
\paragraph{Probability for a freelancer to get a job} In the next section we discuss in what sense the fluid model approximates the stochastic PS-model. Here we estimate the chance of a freelancer getting a job based on the fluid model and under the following additional assumptions:
\begin{itemize}
\item[(A1)] the application limit $I$ is large,
\item[(A2)] all freelancers that applied for the same job have equal chances to get the job.
\end{itemize}
For the basic model of a freelance website presented in the previous section, the invariant point equations \eqref{FL:eq:0}--\eqref{FL:eq:2}
can be rewritten as
\[
z_i^\ast = \frac{\lambda}{\nu} u^i (1-u), \quad 0 \leq i \leq I-1,
\]
where $z_i^\ast$ stands for the number of jobs on the website with $i$ applications and $u$ is the unique solution to
\begin{equation}
\frac{\lambda}{\mu} \sum_{i=1}^I u^i = 1. \label{eq:0}
\end{equation}
(We make the substitution $u:=\mu/(\mu+\nu \| \mathbf{z}^\ast\|_1)$ to obtain the equation for $u$.)
Now, by \eqref{FL:eq:fp_dif}, out of $\lambda$ jobs arriving per time unit, the fraction $\nu z_i^\ast / \lambda$ will leave with $i=0, \ldots, I-1$ applications due to impatience, and the fraction $\mu z_{I-1}^\ast / (\lambda \|\mathbf{z}^\ast\|_1)$ will be patient enough to collect $I$ applications. Then, by the assumption (A2), the probability for a freelancer to get a job under the application limit $I$ is
\[
P_I = \sum_{i=1}^{I-1} \frac{1}{i} \frac{\nu z_i^\ast}{\lambda} + \frac{1}{I} \frac{\mu z_{I-1}^\ast}{\lambda \|\mathbf{z}^\ast \|_1} = \sum_{i=1}^I \frac{1}{i} u^i (1-u) + \frac{1}{I} u^I.
\]
As $I \to \infty$, the solution $u$ to \eqref{eq:0} and $P_I$ converge:
\begin{align*}
u &\to u_\infty := \frac{\mu}{\lambda+\mu}, \\
P_I & \to \sum_{i=1}^\infty \frac{1}{i} u_\infty^i (1-u_\infty) = -- (1-u_\infty)\ln (1-u_\infty).
\end{align*}
Hence, for a large application limit $I$, the probability to get a job can be approximated by
\[
P_\infty = - \frac{\lambda}{\lambda+\mu} \ln \frac{\lambda}{\lambda+\mu}.
\]
Interestingly, neither $P_I$ nor $P_\infty$ depend on the impatience parameter $\nu$. Intuitively, bigger $\nu$'s, i.e. smaller patience times, should result in jobs collecting less applications meaning less competition among freelancers and a higher chance to get a job.
\section{Fluid limit theorem} \label{FL:sec:fluid_limit}
In this section, we show that, under a proper scaling, the PS-queue with multistage service converges to the fluid model introduced in Section~\ref{FL:sec:fluid_model}.
Consider a family of stochastic PS-queues upper-indexed by positive numbers $r$, all of them defined on the probability space $(\Omega, \mathcal{F}, \mathbb{P})$. Let the arrival rate $\lambda$ and the parameters $\mu_i$ of service stages be the same in all models (and satisfy Assumption~\ref{FL:ass:load}), and the impatience parameter of model~$r$ be $\nu/r$. Define the fluid scaled population processes
\begin{equation} \label{FL:eq:scaled_process}
\overline{\mathbf{Q}}^{\,r}(t) := \mathbf{Q}^r(rt) / r, \quad t \in \mathbb{R}_+.
\end{equation}
We refer to weak limits along subsequences of the processes~\eqref{FL:eq:scaled_process} as {\it fluid limits}. They can be characterised as solutions to the differential/integral equations \eqref{FL:eq:fluid_model_dif}--\eqref{FL:eq:fluid_model_int}, as the next theorem asserts.
\begin{theorem} \label{FL:th:fluid_limit} Suppose that $\overline{\mathbf{Q}}^{\,r}(0) \Rightarrow \mathbf{z}(0)$ as $r \to \infty$, where $\mathbf{z}(0)$ is a random vector. Then the processes $\overline{\mathbf{Q}}^{\,r}(\cdot)$ converge weakly in the Skorokhod space $\mathbf{D}(\mathbb{R}_+, \mathbb{R}_+^I)$ to the unique FMS with initial state $\mathbf{z}(0)$.
\end{theorem}
The proof is given in Section~\ref{FL:sec:fluid_limit_proof}. First, we show that the family of the scaled processes~\eqref{FL:eq:scaled_process} is relatively compact by checking the compact containment and oscillation control conditions. That is, we show that fluid limits exist. Then we check that they are FMS's by deriving the fluid model equations~\eqref{FL:eq:fluid_model_dif} from the scaled stochastic dynamic equations~\eqref{FL:eq:dyn_1}--\eqref{FL:eq:dyn_2}.
\section{Equivalence of the two fluid model descriptions} \label{FL:sec:fluid_model_proof}
This proof partly relies on the ideas of the proof of a similar result in \cite{ALOHA}, see Lemma~2, but it is more involved. In particular, it uses (and establishes) the special property~\eqref{FL:eq:5} of the phase-type distribution.
Let a function $\mathbf{z} \colon \mathbb{R}_+ \to \mathbb{R}_+^I$ be continuous and non-zero outside $t = 0$.
\paragraph{Proof of \eqref{FL:eq:fluid_model_dif} $\Rightarrow$ \eqref{FL:eq:fluid_model_int}} Suppose that $\mathbf{z}(\cdot)$ is a solution to~\eqref{FL:eq:fluid_model_dif}. Consider the following Cauchy problem with respect to $\mathbf{u}(\cdot)$: for $t>0$,
\begin{equation} \label{FL:eq:3}
\begin{split}
u'_1(t) &= \lambda - \mu_1 \dfrac{u_1(t)}{\|\mathbf{z}(t)\|_1} - \nu u_1(t),\\
u'_i(t) &= \mu_{i-1} \dfrac{u_{i-1}(t)}{\|\mathbf{z}(t)\|_1} - \mu_i \dfrac{u_i(t)}{\|\mathbf{z}(t)\|_1} - \nu u_i(t), \quad i \geq 2, \\
\mathbf{u}(0) &= \mathbf{z}(0).
\end{split}
\end{equation}
This problem has at most one continuous solution. Indeed, let $\mathbf{u}(\cdot)$ and $\widetilde{\mathbf{u}}(\cdot)$ be two continuous solutions to~\eqref{FL:eq:3}. Then the difference $\mathbf{w}(\cdot) := (\mathbf{u} - \widetilde{\mathbf{u}})(\cdot)$ satisfies: for $t>0$,
\begin{equation*}
\begin{split}
w'_1(t) &= - w_1(t) \left(\frac{\mu_1}{\|\mathbf{z}(t)\|_1} + \nu \right),\\
w'_i(t) &= w_{i-1}(t)\frac{\mu_{i-1}}{\|\mathbf{z}(t)\|_1} - w_i(t) \left(\frac{\mu_i}{\|\mathbf{z}(t)\|_1} + \nu \right), \quad i \geq 2, \\
\mathbf{w}(0) &= \mathbf{0}.
\end{split}
\end{equation*}
Note that if $w_1(t) > 0$, then $w'_1(t) < 0$, and the other way around. Then $w_1(\cdot) \equiv 0$ (see e.g.\ \cite[Lemma 1]{ALOHA}) and $w'_2(t) = - w_2(t) (\mu_i / \|\mathbf{z}(t)\|_1 + \nu )$, $t>0$. To each pair $w_i(\cdot)$ and $w_{i+1}(\cdot)$, we apply the same reasoning as to $w_1(\cdot)$ and $w_2(\cdot)$, and thus obtain $\mathbf{w}(\cdot) \equiv \mathbf{0}$.
It is straightforward to check that the LHS and RHS of~\eqref{FL:eq:fluid_model_int} both satisfy~\eqref{FL:eq:3}. Since a solution to~\eqref{FL:eq:3} must be unique, the LHS and RHS of~\eqref{FL:eq:fluid_model_int} must coincide.
\paragraph{Proof of \eqref{FL:eq:fluid_model_int} $\Rightarrow$ \eqref{FL:eq:fluid_model_dif}} Suppose now that $\mathbf{z}(\cdot)$ solves~\eqref{FL:eq:fluid_model_int}. As we differentiate the RHS of~\eqref{FL:eq:fluid_model_int}, it follows that, for $t > 0$,
\begin{equation*}
\begin{split}
z_1'(t) &= \lambda - \mu_1 \frac{z_1(t)}{\|\mathbf{z}(t)\|_1} - \nu z_1(t), \\
z_i'(t) &= \displaystyle{\sum_{j=1}^i} \left(f_{B_j^{i-1}} - f_{B_j^i}\right) \left( \int_0^t \dfrac{du}{\|\mathbf{z}(u)\|_1} \right) \dfrac{\mathbb{P}\{D>t\}}{\|\mathbf{z}(t)\|_1} \, \\
&\phantom{=}+ \lambda \displaystyle{\int_0^t} \left(f_{B_1^{i-1}} - f_{B_1^i}\right) \left( \int_s^t \dfrac{du}{\|\mathbf{z}(u)\|_1} \right) \dfrac{\mathbb{P}\{D>t-s\}}{\|\mathbf{z}(t)\|_1} \, \, ds \\
&\phantom{=}- \nu z_i(t), \quad i \geq 2,
\end{split}
\end{equation*}
where $f_{B_j^i}(\cdot)$ denotes the probability density function of the phase-type random variable
\[
B_j^i := \left\{
\begin{array}{ll}
\sum_{l=j}^i B_l, & j \leq i, \\
0, & j > i,
\end{array}
\right.
\]
where $B_l$ is distributed exponentially with parameter $\mu_l$.
At this stage, in order to have~\eqref{FL:eq:fluid_model_dif}, it suffices to show that, for $t>0$,
\begin{equation} \label{FL:eq:4}
\begin{split}
\mu_i z_i(t) =& \sum_{j=1}^i f_{B_j^i} \left( \int_0^t \dfrac{du}{\|\mathbf{z}(u)\|_1} \right) \mathbb{P}\{D>t\} \\
&+ \lambda \int_0^t f_{B_1^i} \left( \int_s^t \dfrac{du}{\|\mathbf{z}(u)\|_1} \right) \dfrac{\mathbb{P}\{D>t-s\}}{\|\mathbf{z}(t)\|_1} \, ds.
\end{split}
\end{equation}
In turn, in order to have~\eqref{FL:eq:4} under the assumption~\eqref{FL:eq:fluid_model_int}, it suffices to show that, for all $i \in \mathbb{N}$ and $x \in \mathbb{R}$,
\begin{equation*}
\dfrac{1}{\mu_i} f_{B_1^i}(x) = \mathbb{P} \{ B_1^{i-1} \leq x < B_1^i \},
\end{equation*}
or equivalently,
\begin{equation} \label{FL:eq:5}
\mathbb{P} \{ B_1^i > x \} = \sum_{j=1}^i \dfrac{1}{\mu_j} f_{B_1^j}(x).
\end{equation}
(To be precise, for $i>I$, we need to introduce random variables $B_i$ distributed exponentially with parameters~$\mu_i$, mutually independent with each other and with $B_j$, $j \leq I$.)
We prove~\eqref{FL:eq:5} by induction: it holds for $i=1$, assume that it holds for an $i \geq 1$, we have to check that it holds for $i+1$ as well. By the convolution formula,
\begin{align*}
\mathbb{P} \{ B_1^{i+1} > x \}
&= \int_0^\infty \mathbb{P} \{(y + B_2^{i+1} > x\} f_{B_1}(y) dy \\
&= \int_x^\infty f_{B_1}(y) dy + \int_0^x \mathbb{P} \{B_2^{i+1} > x-y\} f_{B_1}(y) dy.
\end{align*}
Now we incorporate the induction hypothesis and obtain
\begin{align*}
\mathbb{P} \{ B_1^{i+1} > x \}
&= \mathbb{P}\{ B_1 > x\} + \sum_{j=2}^{i+1} \dfrac{1}{\mu_{j}} \int_0^x f_{B_2^j}(x - y)f_{B_1}(y) dy \\
&= \dfrac{1}{\mu_1} f_{B_1}(x) + \sum_{j=2}^{i+1} \dfrac{1}{\mu_{j}} \int_{-\infty}^\infty f_{B_2^j}(x - y)f_{B_1}(y) dy \\
&= \dfrac{1}{\mu_1} f_{B_1}(x) + \sum_{j=2}^{i+1} \dfrac{1}{\mu_{j}} f_{B_1^j}(x).
\end{align*}
So~\eqref{FL:eq:5} indeed holds and implies~\eqref{FL:eq:4}; and \eqref{FL:eq:4}, in turn, implies~\eqref{FL:eq:fluid_model_dif}.
\section{Proof of Theorem~\ref{FL:th:fixed_point_stable}} \label{FL:appendix}
It follows from the fluid model description~\eqref{FL:eq:fluid_model_int}, that the coordinates of the invariant FMS $\mathbf{z}^\ast$ are uniquely defined by its norm via
\begin{equation} \label{FL:eq:fp_int}
z_i^\ast = \lambda \mathbb{E} \min\{\| \mathbf{z}^\ast \|_1 B_1^i, D \} - \lambda \mathbb{E} \min\{\| \mathbf{z}^\ast \|_1 B_1^{i-1}, D \} \quad \text{for all $i$}.
\end{equation}
It is shown in~Gromoll et al. \cite[Theorem 2.4]{GRZ08} that, for any FMS $\mathbf{z}(\cdot)$, we have $\|\mathbf{z}(t)\|_1 \to \|\mathbf{z}^\ast\|_1$ as $t \to \infty$. Here we derive the coordinate-wise convergence from the convergence of the norms.
As we compare~\eqref{FL:eq:fluid_model_int} to \eqref{FL:eq:fp_int}, it follows that, in order to have $z_i(t) \to z_i^\ast$ as $t \to \infty$, it suffices to show that, for all $i$,
\begin{equation} \label{FL:eq:25}
\int_0^t f_i(s,t) \,ds \\
\to \mathbb{E} \min\{\| \mathbf{z}^\ast \|_1 B_1^i, D \},
\end{equation}
where
\[
f_i(s,t) = \mathbb{P} \Bigl\{ B_1^i > \int_s^t \frac{du}{\|\mathbf{z}(u)\|_1}, D>t-s \Bigr\}.
\]
Fix an $\varepsilon \in (0,\|\mathbf{z}^\ast\|_1)$ and let $t_\varepsilon$ be such that
\[
\|\mathbf{z}^\ast\|_1 - \varepsilon \leq \|\mathbf{z}(t)\|_1 \leq \|\mathbf{z}^\ast\|_1 + \varepsilon \quad \text{for all $t \geq t_\varepsilon$}.
\]
For any fixed $s$, $f_i(s,t) \to 0$ as $t \to \infty$, and then, by the dominated convergence theorem,
\begin{equation} \label{FL:eq:24}
\int_0^{t_\varepsilon} f_i(s,t) \, ds \to 0 \quad \text{as $t \to \infty$}.
\end{equation}
For all $t \geq t_\varepsilon$, we have
\begin{align*}
\int_{t_\varepsilon}^t f_i(s,t) \, ds &\leq \int_{t_\varepsilon}^t \mathbb{P} \Bigl\{ B_1^i > \int_s^t \frac{du}{\|\mathbf{z}^\ast\|_1+\varepsilon}, \, D>t-s \Bigr\} \, ds \\
&\leq \int_{0}^{t - t_\varepsilon} \mathbb{P} \left\{ \min\{ (\|\mathbf{z}^\ast\|_1+\varepsilon)B_1^i, \,D \} \geq s\right\} \, ds,
\end{align*}
which, in combination with~\eqref{FL:eq:24}, implies that
\[
\limsup_{t \to \infty} \int_0^t f_i(s,t) \, ds \leq \mathbb{E} \min\{ (\|\mathbf{z}^\ast\|_1+\varepsilon) B_1^i, \, D \}.
\]
Similarly, we obtain
\[
\liminf_{\,t \to \infty} \int_0^t f_i(s,t) \, ds \geq \mathbb{E} \min\{ (\| \mathbf{z}^\ast\|_1-\varepsilon) B_1^i, \, D \}.
\]
As we take $\varepsilon \to 0$ in the last two equations, \eqref{FL:eq:25} follows.
\section{Proof of Theorem~\ref{FL:th:fluid_limit}} \label{FL:sec:fluid_limit_proof}
The proof consists of two parts. First we show that the family of the fluid scaled processes $\overline{\mathbf{Q}}^{\, r}(\cdot)$ is $\mathbf{C}$-tight, i.e.\ that fluid limits exist and are continuous. Then we check that fluid limits are FMS's, i.e.\ that they are bounded away from zero outside $t=0$ and solve the fluid model equations~\eqref{FL:eq:fluid_model_dif}.
Throughout the proof, we use the following representation of the processes~$\mathbf{Q}^r(\cdot)$ (they all are defined on the same probability space $(\Omega, \mathcal{F}, \mathbb{P})$): for $t \in \mathbb{R}_+$,
\begin{equation} \label{FL:eq:dyn_1_r}
\begin{split}
Q_1^r(t) &= Q_1^r(0) + A(t) - D_1^{r, \textup{s}}(t) - D_1^{r,\textup{a}}(t), \\
Q_i^r(t) &= Q_i^r(0) + D_{i-1}^{r,\textup{s}}(t) - D_i^{r,\textup{s}}(t) - D_i^{r,\textup{a}}(t), \quad i \geq 2,
\end{split}
\end{equation}
with
\begin{equation} \label{FL:eq:dyn_2_r}
\begin{split}
D_i^{r,\textup{s}}(t) &= \Pi_i^\textup{s} \left( \mu_i \int_0^t \frac{Q^r_i(u)}{\|\mathbf{Q}^r(u)\|_1} \,du \right), \\
D_i^{r,\textup{a}}(t) &= \Pi_i^\textup{a} \left( \dfrac{\nu}{r} \int_0^t Q^r_i(u) du \right),
\end{split}
\end{equation}
where the processes $A(\cdot)$ and $\Pi_i^\textup{s}(\cdot), \Pi_i^\textup{a}(\cdot)$ are the same as in \eqref{FL:eq:dyn_1}--\eqref{FL:eq:dyn_2}, except that this time we assume them to be independent from the family of the initial states $\mathbf{Q}^r(0)$.
\paragraph{$\mathbf{C}$-tightness} In order to prove that the family of the processes $\overline{\mathbf{Q}}^{\,r}(\cdot)$ is $\mathbf{C}$-tight, it suffices to show that the following two properties hold (see Ethier and Kurtz~\cite{EthierKurtz}): for any $T > 0$ and $\varepsilon > 0$, there exist an $M < \infty$ and a $\delta > 0$ such that
\begin{equation} \label{FL:eq:compact}
\liminf_{\,r \to \infty} \mathbb{P} \{ \| \overline{\mathbf{Q}}^{\,r}(T) \|_1 \leq M \} \geq 1 - \varepsilon,
\end{equation}
and
\begin{equation} \label{FL:eq:oscillation}
\liminf_{\,r \to \infty} \mathbb{P} \{ \sup_{\begin{subarray}{l} s,t\in [0,T], \\ |s-t|<\delta \end{subarray}} \|\overline{\mathbf{Q}}^{\,r}(s) - \overline{\mathbf{Q}}^{\,r}(t) \|_1 \leq \varepsilon \} \geq 1 - \varepsilon.
\end{equation}
The compact containment condition~\eqref{FL:eq:compact} follows easily by the upper bound
\[
\| \overline{\mathbf{Q}}^{\,r}(T) \|_1 \leq \| \overline{\mathbf{Q}}^{\,r}(0) \|_1 + A(rT)/r \Rightarrow \|\mathbf{z}(0)\|_1 + \lambda T \quad \text{as $r \to \infty$}.
\]
Take an $\widetilde{M} < \infty$ that is a continuity point for the distribution of $\|\mathbf{z}(0)\|_1$ such that $\mathbb{P} \{ \|\mathbf{z}(0)\|_1 \leq \widetilde{M} \} \geq 1 - \varepsilon$ and put $M = \widetilde{M} + \lambda T + 1$.
To establish the oscillation control condition~\eqref{FL:eq:oscillation}, it is enough to have oscillations of the scaled departure processes $D_i^{r,\textup{s}}(r \cdot)/r$ and $D_i^{r,\textup{a}}(r \cdot)/r$ bounded.
Define the modulus of continuity for functions $x \colon \mathbb{R}_+ \to \mathbb{R}$,
\[
\omega(x,T,\delta) := \sup \{ |x(s) - x(t)| \colon s,t \in [0,T], |s-t|<\delta \}.
\]
First we estimate oscillations of $D_i^{r,\textup{s}}(r \cdot)/r$. We have, for all $t \geq s \geq 0$,
\begin{align*}
&\left| \dfrac{D_i^{r,\textup{s}}(r s)}{r} - \dfrac{D_i^{r,\textup{s}}(r t\,)}{r} \right| \leq \, |G^{r,\textup{s}}_i(s)| + |G^{r,\textup{s}}_i(t)| + \mu_i \int_s^t \dfrac{\overline{Q}_i^{\, r}(u)}{\| \overline{\mathbf{Q}}^{\, r}(u) \|_1} \,du,
\end{align*}
where, for all $t \in \mathbb{R}_+$,
\begin{equation} \label{FL:eq:10}
\begin{split}
G^{r,\textup{s}}_i(t) := \dfrac{1}{r} \Pi_i^\textup{s}\left( r\mu_i \int_0^t \dfrac{\overline{Q}_i^{\, r}(u)}{\| \overline{\mathbf{Q}}^{\, r}(u) \|_1} \,du\right)
- \mu_i \int_0^t \dfrac{\overline{Q}_i^{\, r}(u)}{\| \overline{\mathbf{Q}}^{\, r}(u) \|_1} \,du.
\end{split}
\end{equation}
Then
\begin{equation} \label{FL:eq:6}
\omega\left(\frac{D_i^{r,\textup{s}}(r \cdot)}{r},T,\delta\right) \leq \ 2 \sup_{t \in [0,\mu_i T]} \left|\dfrac{\Pi_i^\textup{s}(rt)}{r} - t\right| + \delta.
\end{equation}
Now we switch to $D_i^{r,\textup{a}}(r \cdot)/r$. Consider a family of $M/M/\infty$ queues with a common arrival process $A(\cdot)$, queue~$r$ starting with $\|\mathbf{Q}^r(0)\|_1$ customers, and service times in queue~$r$ being patience times of the corresponding customers in the $r$-th PS-queue with multistage service. Denote the departure process of the $r$-th $M/M/\infty$-queue by $\widetilde{D}^r(\cdot)$. We have, for all $i$ and $s,t \in \mathbb{R}_+$,
\begin{equation*}
\left| \dfrac{D_i^{r,\textup{a}}(r s)}{r} - \dfrac{D_i^{r,\textup{a}}(r t)}{r} \right| \leq \left| \dfrac{\widetilde{D}^r(rs)}{r} - \dfrac{\widetilde{D}^r(r t)}{r} \right|,
\end{equation*}
and hence,
\begin{equation} \label{FL:eq:7}
\omega(D^{r,\text{a}}(r\cdot)/r,T,\delta) \leq \omega(\widetilde{D}^r(r\cdot)/r,T,\delta).
\end{equation}
By e.g.\ Robert \cite{Robert}, the scaled processes $\widetilde{D}^r(r\cdot)/r$ converge weakly in the Skorokhod space $\mathbf{D}(\mathbb{R}_+, \mathbb{R}_+)$ to a continuous limit, which we denote by $\widetilde{D}(\cdot)$. (Although technically the fluid scalings considered in Robert \cite{Robert} and here are different: arrival rates and space versus time and space, they result in the same distributions of the scaled processes, and hence the same limit.)
Since the modulus of continuity $\omega(\cdot,T,\delta)$ as a function on $\mathbf{D}(\mathbb{R}_+,\mathbb{R})$ is continuous at any continuous $x(\cdot)$, we have, by the continuous mapping theorem,
\begin{equation} \label{FL:eq:8}
\omega(\widetilde{D}^r(r\cdot)/r,T,\delta) \Rightarrow \omega(\widetilde{D}(\cdot),T,\delta) \quad \text{as $r \to \infty$}.
\end{equation}
Since continuity implies uniform continuity on compact sets, we also conclude that
\begin{equation} \label{FL:eq:9}
\omega(\widetilde{D}(\cdot),T,\delta) \Rightarrow 0 \quad \text{as $\delta \to \infty$}
\end{equation}
Finally, as we put together the FLLN for $A(\cdot)$, \eqref{FL:eq:6} and the FLLN for $\Pi_i^\textup{s}(\cdot)$, and also~\eqref{FL:eq:7}--\eqref{FL:eq:9}, it follows that one can pick a~$\delta$ such that~\eqref{FL:eq:oscillation} holds.
\paragraph{Fluid limits as FMS's} Now that we know that fluid limits exist, it is left to check that they are FMS's. Consider a fluid limit $\widetilde{\mathbf{Q}}(\cdot)$ along a subsequence $\{\overline{\mathbf{Q}}^{\, q}(\cdot)\}_{q \to \infty}$. The $\mathbf{C}$-tightness part of the proof implies that $\widetilde{\mathbf{Q}}(\cdot)$ is a.s.\ continuous. As we discussed before, the total population process of a PS-queue with multistage service behaves as an ordinary, single-stage-service PS-queue, whose fluid limits are studied by Gromoll et al. \cite{GRZ08}. In particular, it follows from Assumption~\ref{FL:ass:load} and~\cite[Lemma~6.1]{GRZ08} that a.s., for all $\delta>0$, $\inf_{t \geq \delta}\|\widetilde{\mathbf{Q}}(t)\|_1 > 0$. We will now show that $\widetilde{\mathbf{Q}}(\cdot)$ a.s.\ satisfies the fluid model equations~\eqref{FL:eq:fluid_model_dif}, and this will finish the proof.
Consider the mappings $\varphi_i \colon \mathbf{D}(\mathbb{R}_+,\mathbb{R}_+^I) \to \mathbf{D}(\mathbb{R}_+,\mathbb{R})$, $i = 1, \ldots, I$, given by
\begin{align*}
\varphi_1(\mathbf{x})(t) =:&\ x_1(t) - x_1(0) - \lambda t + \mu_1 \int_0^t \dfrac{x_1(u)}{\|\mathbf{x}(u)\|_1}\,du + \nu \int_0^t x_1(u) \, du, \\
\varphi_i(\mathbf{x})(t) =:&\ x_i(t) - x_i(0) - \mu_{i-1} \int_0^t \dfrac{x_{i-1}(u)}{\|\mathbf{x}(u)\|_1}\,du + \mu_i \int_0^t \dfrac{x_i(u)}{\|\mathbf{x}(u)\|_1}\,du + \nu \int_0^t x_i(u) \, du, \quad i \geq 2.
\end{align*}
These mappings are continuous at any $\mathbf{x}(\cdot)$ that is continuous and non-zero outside $t = 0$. Then, by the continuous mapping theorem, for all~$i$,
\begin{equation} \label{FL:eq:14}
\varphi_i(\overline{\mathbf{Q}}^q) \Rightarrow \varphi_i(\widetilde{\mathbf{Q}}) \quad \text{as $q \to \infty$}.
\end{equation}
On the other hand, it follows from the stochastic dynamics~\eqref{FL:eq:dyn_1_r}--\eqref{FL:eq:dyn_2_r} that, for all $q$ and $t \in \mathbb{R}_+$,
\begin{equation} \label{FL:eq:11}
\begin{split}
\varphi_1(\overline{\mathbf{Q}}^q)(t) &= (A(qt)/q - \lambda t) - G^{\,q,\textup{s}}_1(t) - G^{\,q,\textup{a}}_1(t), \\
\varphi_i(\overline{\mathbf{Q}}^q)(t) &= G^{\,q,\textup{s}}_{i-1}(t) - G^{\,q,\textup{s}}_i(t) - G^{\,q,\textup{a}}_i(t), \quad i \geq 2,
\end{split}
\end{equation}
where, for all $i$ and $t \in \mathbb{R}_+$,
\[
G^{\,q,\textup{a}}_i(t) := \dfrac{1}{q} \Pi_i^\textup{a}\left( q \nu \int_0^t \overline{Q}_i^{\, q}(u) \,du\right) - \nu \int_0^t \overline{Q}_i^{\, q}(u)\,du,
\]
and the processes $G^{\,q,\textup{s}}_i(\cdot)$ were defined earlier by~\eqref{FL:eq:10}.
Next we use the following result (see e.g.\ Billingsley \cite{Billingsley}).
\begin{proposition}[{\bf Random time change theorem}] \label{FL:prop:random_time_change}
Consider stochastic processes $X^q(\cdot) \in \mathbf{D}(\mathbb{R}_+,S)$, where $S$ is a complete and separable metric space, and non-decreasing stochastic processes $\Phi^q(\cdot) \in \mathbf{D}(\mathbb{R}_+,\mathbb{R}_+)$. Assume that the joint convergence $(X^q, \Phi^q)(\cdot) \Rightarrow (X, \Phi)(\cdot)$ holds as $q \to \infty$, and that the limits $X(\cdot)$ and $\Phi(\cdot)$ are a.s.\ continuous. Then $X^q(\Phi^q(\cdot)) \Rightarrow X(\Phi(\cdot))$ in $\mathbf{D}(\mathbb{R}_+,S)$ as $q \to \infty$.
\end{proposition}
Put $X^q(t) = \Pi_i^\textup{s}(qt)/q - t$ and $\Phi^q(t) = \nu \int_0^t \overline{Q}_i^{\, q}(u)\,du$ for all~$t \in \mathbb{R}_+$. The marginal weak limits of these processes are $X(\cdot) \equiv 0$ and $\Phi(\cdot) = \nu \int_0^\cdot \widetilde{Q}_i(u)\,du$, respectively. Since one of the marginal limits is deterministic, we actually have the joint weak convergence, and then Proposition~\ref{FL:prop:random_time_change} implies that, as $q \to \infty$,
\begin{equation} \label{FL:eq:12}
G_i^{\,q, \textup{a}}(\cdot) \Rightarrow 0 \quad \text{in $\mathbf{D}(\mathbb{R}_+,\mathbb{R})$}.
\end{equation}
Similarly,
\begin{equation} \label{FL:eq:13}
G_i^{\,q, \textup{s}}(\cdot) \Rightarrow 0 \quad \text{in $\mathbf{D}(\mathbb{R}_+,\mathbb{R})$}.
\end{equation}
As we put \eqref{FL:eq:11}--\eqref{FL:eq:13} together with \eqref{FL:eq:14}, it follows that
\[
\text{a.s., for all $i$}, \quad \varphi_i(\widetilde{\mathbf{Q}}) \equiv 0,
\]
which, after differentiation, gives~\eqref{FL:eq:fluid_model_dif}.
|
\section{Introduction}
\label{sec:introduction}
Since irreducible polynomials play a fundamental role in applications and in the
whole theory of finite fields (see for
example~\cite{lidl1997finite,mullen2013handbook,rabin1981fingerprinting,barbulescu2014heuristic,ostafe2010length,ahmadi2012stable}),
related questions have a long history (see for example
\cite{gao1999irreducible,gao1997tests,shoup1990new,jones2012iterative,jones2012settled,andrade2013special,von2003irreducible}).
In this paper we specialize on irreducibility questions regarding
compositional semigroups of polynomials. This kind of question has been
addressed in the specific case of semigroups generated by a single quadratic
polynomial, see for example in
\cite{ahmadi2012stable,ostafe2010length,jones2012settled,jones2012iterative},
for analogous results related to additive polynomials, see
\cite{batra1994algebraic,batra1994}. It is worth mentioning that one of these
results \cite[Lemma 2.5]{jones2012settled} has been
recently used in \cite{ferraguti2016existence} by the first and the second
author of the present paper to prove \cite[Conjecture 1.2]{andrade2013special}.
Throughout the paper, $q$ will be an odd prime power, $\mathbb{F}_q[x]$ the univariate
polynomial ring over the finite field $\mathbb{F}_q$ and $\IRR(\mathbb{F}_q[x])$ the set of
irreducible polynomials in $\mathbb{F}_q[x]$.
Let us give an example which motivates this paper.
For a prime $p$ congruent to $1$ modulo $4$, we can fix in $\mathbb{F}_{p}[x]$ two
quadratic polynomials $f = (x-a)^2 + a$ and $g = (x-a-1)^2 + a$ such
that both $a$
and $ a + 1$ are non-squares in $\mathbb{F}_p$. One can experimentally check that any
possible composition of a sequence of $f$'s and $g$'s is irreducible (for a
concrete example, take $q=13$, $(x-5)^2 + 5$ and $g = (x-6)^2 + 5$).
Let us denote the set of such compositions by $C$.
A couple of observations are now necessary:
\begin{itemize}
\item In principle, it is unclear whether a finite number of irreducibility checks will ensure that $C$ is a subset of $\IRR(\mathbb{F}_q[x])$.
\item The fact that $C\subseteq \IRR(\mathbb{F}_{q}[x])$ is indeed pretty unlikely to happen by chance, as the density of degree $2^n$ monic irreducible polynomials over $\mathbb{F}_q$ is roughly $1/2^n$. Thus, if $C$ satisfies this property, one reasonably expects that there must be an algebraic reason for that.
\end{itemize}
We address these issues by giving a necessary and sufficient condition for the
semigroup $C\subset \mathbb{F}_q[x]$ to be contained in $\IRR(\mathbb{F}_q[x])$. In addition,
this condition is algebraic and can be checked by performing only a finite
amount of computation over $\mathbb{F}_q$, answering both points above.
In Section \ref{sec:gen_crit} we describe the criterion (Theorem \ref{thm:main} and Corollary \ref{main_corollary}) and provide a non-trivial example (Example \ref{ex:irred_semigroup}) of a compositional semigroup in $\mathbb{F}_q[x]$ contained in $\IRR(\mathbb{F}_q[x])$ and generated by two polynomials.
In Section \ref{sec:p3mod4} we show the non-existence of such $C$ whenever $q$
is a prime congruent to $3$ modulo $4$ and the generating polynomials are of a
certain form (Proposition \ref{prop:p3}). Example \ref{ex:sharp_cond} shows
that these conditions are indeed sharp.
\section{A general criterion}\label{sec:gen_crit}
In order to state our main result, we first need the following definition, which describes how to build a finite graph encoding only the useful (to our purposes) information contained in the generating set of the semigroup.
\begin{definition}\label{graph_definition}
Let $q$ be an odd prime power, $\mathbb{F}_q$ the finite field of order $q$ and $\mathcal{S}$ a subset of $\mathbb{F}_q[x]$.
We denote by $G_\mathcal{S}$ the directed multigraph defined as follows:
\begin{itemize}
\item the set of nodes of $G_\mathcal{S}$ is $\mathbb{F}_q$;
\item for any node $a \in \mathbb{F}_q$ and any polynomial $f \in \mathcal{S}$, there is a
directed edge $a\rightarrow f(a)$. We label that edge with $f$.
\end{itemize}
\end{definition}
Before stating the next definition, we recall that for any monic polynomial $f$
of degree $2$ there exist unique pair $(a_f,b_f)\in \mathbb{F}_{q}^2$ such that
$f=(x-a_f)^2-b_f$.
\begin{definition}
Let $\mathcal{S}$ be a subset of $\mathbb{F}_q[x]$ consisting of monic polynomials of degree $2$.
We call the set $D_\mathcal{S}:=\{-b_f\,|\,f\in \mathcal{S} \}\subseteq \mathbb{F}_q$, the $\mathcal{S}$\emph{-distinguished set} of $\mathbb{F}_q$.
\end{definition}
The following result is just an inductive extension of the classical Capelli's Lemma.
\begin{lemma}[Recursive Capelli's Lemma]
Let $K$ be a field and $f_1,\dots,f_l$ be a set of irreducible polynomials in
$K[X]$. The polynomial $f_1(f_2(\cdots (f_{l})\cdots))$ is irreducible if and only if the following conditions are satisfied
\[\begin{cases}
f_1 \mbox{is irreducible over $K[X]$ }\\
f_2-\alpha_1 \quad \mbox{is irreducible over $K(\alpha_1)[X]$ for a root $\alpha_1$ of $f_1$}\\
f_3-\alpha_2 \quad \mbox{is irreducible over $K(\alpha_1,\alpha_2)[X]$ for a root $\alpha_2$ of $f_2- \alpha_1$}\\
\cdots\\
f_{l}-\alpha_{l-1} \quad \mbox{is irreducible over $K(\alpha_1,\dots, \alpha_{l-1})[X]$ for a root $\alpha_{l-1}$ of $f_{l-1} - \alpha_{l-2}$}
\end{cases}
\]
\end{lemma}
\begin{proof}
Given Capelli's Lemma \cite[Lemma 2.4]{jones2012settled}, the proof is straightforward by induction.
\end{proof}
We are now ready to state and prove the main theorem.
\begin{theorem}\label{thm:main}
Let $\mathcal{S}$ be a set of generators for a compositional semigroup $C\subseteq \mathbb{F}_q[x]$.
Suppose that $\mathcal{S}$ consists of polynomials of degree $2$.
Then we have that $C\subseteq \IRR(\mathbb{F}_q[x])$ if and only if no element of
$-D_{\mathcal{S}}=\{b_f\,|\,f\in \mathcal{S} \}\subseteq \mathbb{F}_q$ is a square and
in $G_\mathcal{S}$ there is no path of positive length from a node of $D_\mathcal{S}$ to a square of $\mathbb{F}_q$.
\end{theorem}
\begin{proof}
It is clear that $C$ contains a reducible polynomial of degree $2$ if and only if one element of $-D_\mathcal{S}$ is a square.
Thus we can assume that $\mathcal{S}$ consists only of irreducible polynomials.
We now show that in $G_\mathcal{S}$ there is a path of positive length from a node of $D_{\mathcal{S}}$ to a square if and only if $C$ contains a reducible polynomial of degree greater or equal than $4$.
First, suppose that the composition $f_1 f_2\cdots f_{l+1}$ is a reducible polynomial of minimal degree, with $f_i\in \mathcal{S}$ and $f_i=(x-a_i)^2-b_i$, for $i\in\{1,\dots, l+1\}$ and $l\geq 1$.
Whenever $\beta$ is not a square in $\mathbb{F}_q$, we denote by $\sqrt{\beta}$ a root of the polynomial $T^2-\beta$ in the algebraic closure of $\mathbb{F}_q$.
By Capelli's Lemma applied to the composition of $f_1\cdots f_l$ and by the minimality of the degree of $f_1 f_2\cdots f_{l+1}$, we have that the following elements are not squares in their field of definition:
\[\beta_0:=b_1\in \mathbb{F}_q,\]
\[\beta_1:=b_2+a_1+\sqrt{\beta_0}\in \mathbb{F}_{q^2}\]
\[\beta_2=b_3+a_2+\sqrt{\beta_1}\in \mathbb{F}_{q^{2^2}}\]
\[\dots\]
\[\beta_{l-1}:=b_l+a_{l-1}+\sqrt{\beta_{l-2}}\in \mathbb{F}_{q^{2^{l-1}}}.\]
On the other hand, $\beta_l=b_{l+1}+a_{l}+\sqrt{\beta_{l-1}} \in \mathbb{F}_{q^{2^{l}}}$ is necessarily a square.
For $j<i$, let us denote by $N_i^j:\mathbb{F}_{q^{2^i}} \longrightarrow \mathbb{F}_{q^{2^j}}$ the usual norm map.
We claim that the $\mathbb{F}_q$-norm $N_l^0:\mathbb{F}_{q^{2^l}}\longrightarrow \mathbb{F}_q$ maps $\beta_l$ to $f_1 (\cdots f_{l}(-b_{l+1})\cdots)$, and this defines a path in $G_\mathcal{S}$ from $-b_l$ to a square. This can be easily seen by first decomposing $N_l^1$:
\[N_l^1=N_2^{1} \circ N_{3}^{2} \circ \dots N_l^{l-1}\]
and then by directly computing $N_2^{1} \circ N_{3}^{2} \circ \dots N_l^{l-1}(\beta_l)$.
It is important indeed that $\beta_0,\beta_1,\dots, \beta_{l-1}$ are not squares, as the computation above only gives the desired result when $(\sqrt{\beta_i}) ^{q^{2^i}}=-\sqrt{\beta_i}$.
Conversely, suppose that in $G_\mathcal{S}$ there is a path to a square $s$. Choose such a path of minimal length, starting at some $-b_f$ in the distinguished set, for some $f\in \mathcal{S}$. Consider now the composition associated to this path:
if \[s=f_1 f_2 \cdots f_l(-b_f),\] set $f_{l+1} = f$ and let $g\coloneqq f_1 f_2 \cdots f_{l+1}\in \mathbb{F}_q[x]$.
One can construct the $\beta_i$'s as before, i.e.\@ $\beta_0 = b_1$ and for $i\in \{1,\dots, l\}$, $\beta_i= b_{i+1} + a_i+\sqrt{\beta_{i-1}}$. We can suppose that the $\beta_i$'s for $i < l$ are all non-squares as otherwise, by taking the smallest $d$ such that $\beta_d$ is square, we find a composition $f_1 f_2 \cdots f_{d+1}$ that is reducible by Recursive Capelli's Lemma, and then we are done.
As all the $\beta_i$'s, for $i<l$, can be supposed to be non-squares, we have as above that $N_l^0(\beta_l)=f_1 f_2 \cdots f_l(-b_{l+1})=s$, which we have assumed to be a square. Now, recall that an element of a finite field is a square if and only if its norm is a square: this shows that $g$ is reducible by Recursive Capelli's Lemma.
\end{proof}
The reader should observe that this theorem generalizes \cite[Proposition 2.3]{jones2012settled}.
It is useful to mention the following corollary, which is immediate.
\begin{corollary}\label{main_corollary}
Let $\mathcal{S}$ be a set of irreducible degree two polynomials and $C$ defined as in Theorem \ref{thm:main}. Then $C\subseteq \IRR(\mathbb{F}_q[x])$ if and only if there is no path of positive length from a node of $D_\mathcal{S}$ to a square of $\mathbb{F}_q$.
\end{corollary}
\begin{proof}
It is enough to observe that whenever $\mathcal{S}\subseteq \IRR(\mathbb{F}_q[x])$ then $-D_\mathcal{S}$ consists of non-squares.
\end{proof}
\begin{remark}
Given that $C$ is generated by degree $2$ polynomials, it is easy to observe that the datum of $\mathcal{S}$ is equivalent to the datum of $C$.
\end{remark}
The following example shows a way to find examples of semigroups contained in $\IRR(\mathbb{F}_q[x])$ when $q\equiv 1 \mod 4$.
\begin{example}\label{ex:irred_semigroup}
Let $q \equiv 1 \mod 4$ be a prime power, and let $a \in \mathbb{F}_q$ such that both $a$
and $b = a + 1$ are non-squares.
Define $f = (x-a)^2 + a$ and $g = (x-b)^2 + a$.
In this situation, we have $D_\mathcal{S} = \{ a \}$, and by assumption, $-a$,
$a$ and $b$ are all non-squares.
Since $f(a) = g(b) = a$ and $f(b) = g(a) = b$, all paths in $G_\mathcal{S}$ starting
from $a$ end in a non-square, and the conditions of Theorem~\ref{thm:main} are
satisfied.
Figure~\ref{fig:irred_semigroup} shows the relevant part of the graph $G_\mathcal{S}$.
The reader should observe that this is indeed the example mentioned in the introduction.
\begin{figure}[h]
\centering
\begin{tikzpicture}
\node (a) at (-1,0) [draw, circle, double] {$a$};
\node (b) at ( 1,0) [draw, circle] {$b$};
\draw [->] (a) to [out=45,in=135] node[below] {$g$} (b);
\draw [->] (b) to [out=225,in=315] node[above] {$g$} (a);
\draw [->] (a) to [loop left] node[left] {$f$} (a);
\draw [->] (b) to [loop right] node[right] {$f$} (b);
\end{tikzpicture}
\caption{The nodes of $G_\mathcal{S}$ reachable from $D_\mathcal{S}$.}
\label{fig:irred_semigroup}
\end{figure}
\end{example}
\section{The case \texorpdfstring{$p\equiv 3 \mod 4$}{}}\label{sec:p3mod4}
Whenever $q=p$ is a prime congruent to $3$ modulo $4$, we have the following non-existence results.
\begin{lemma}
Let $p\equiv -1 \bmod 8$ be a prime, and let $f=x^2-b$ be a polynomial in $\mathbb{F}_p[x]$. Let $C$ be the semigroup generated by $f$. Then $C$ contains a reducible polynomial.
\end{lemma}
\begin{proof}
Assume for contradiction that $C \subset \IRR(\mathbb{F}_p[x])$.
First note that if $b$ is a square, then $f$ is reducible, so we can assume
that $b$ is not a square, and thus $-b$ is a square. Consider the set of
iterates $T=\{f(-b),f^2(-b),\ldots\}\subseteq \mathbb{F}_p$. By Corollary
\ref{main_corollary}, $C$ contains only irreducible polynomials if and only if
$T$ contains only nonsquares. So assume that this condition holds. Since $T$ is
finite, there exist $k < m\in \mathbb{N}_{>0}$ such that $f^m(-b)=f^k(-b)$. Choose $k$
to be minimal.
Now there are two cases: if $k > 1$, then there exist two distinct
elements $u,v\in T$ such that $u^2-b=v^2-b$. Thus, $u=-v$, which implies that
one between $u$ and $v$ is a square, a contradiction.
If on the other hand $k = 1$, then we have $f^m(-b) = f(-b) = b^2 - b$, and so
$f^{m-1}(-b)$ is either $-b$ or $b$. It can't be $-b$, since that is a square,
so we must have $f^{m-1}(-b) = b \in T$. Setting $u = f^{m-2}(-b)$, we get that
$u^2 - b = b$ and so $u^2 = 2b$, which is a contradiction because $2$ is a
square in $\mathbb{F}_p$ and consequently $2b$ is not.
\end{proof}
\begin{proposition}\label{prop:p3}
Let $p\equiv 3 \bmod 4$ be a prime. Let $f=x^2-b_f$ and $g=x^2-b_g$ be polynomials in $\mathbb{F}_p[x]$ with $b_f,b_g$ distinct non-squares. Let $\mathcal S=\{f,g\}$ and let $C$ be the semigroup generated by $\mathcal S$. Then $C$ contains a reducible polynomial.
\end{proposition}
\begin{proof}
Let $G_{\mathcal{S}}$ be the graph attached to $\mathcal{S}$ as in Definition
\ref{graph_definition}. Let $G'_{\mathcal{S}}$ be the induced subgraph consisting of
all nodes of $G_{\mathcal{S}}$ that are reachable by some path of
positive length starting from $-b_f$ or $-b_g$.
That is, the edges of $G'_{\mathcal{S}}$ are just the edges of $G_{\mathcal{S}}$ starting and
ending at a node in $G'_{\mathcal{S}}$.
From now on, when we
speak of nodes and edges, we will always be referring to nodes and edges in
$G'_{\mathcal{S}}$.
We call an edge from $u$
to $v$ an \emph{$f$-edge} if it comes from the relation $f(u)=v$, while we
call it a \emph{$g$-edge} if it comes from $g(u)=v$.
Since $b_f$ and $b_g$ are assumed nonsquare, we have by Corollary
\ref{main_corollary} that $C$ contains a reducible polynomial if and only if at
least one of the nodes of $G'_{\mathcal{S}}$ is a square.
In the following, we assume for contradiction that $G'_{\mathcal{S}}$ consists only of
non-squares.
Let us observe the following: suppose that there exists a node $v$ of
$G'_{\mathcal{S}}$ which is the target of two $f$-edges. By definition, this means that
there exist two distinct nodes $u,u'\in G'_{\mathcal{S}}$ such that
$u^2-b_f=u'^2-b_f=v$. This implies that $u'=-u$, and thus one between $u$ and
$u'$ is a square, since $-1$ is not a square in $\mathbb{F}_p$. This contradicts our
assumption.
By symmetry, the same applies to $g$-edges.
By the argument above, we see that every node is the target of at most one
$f$-edge and one $g$-edge, and by counting edges that it is indeed
exactly one of each.
Now, consider the sum
\[
\sum_{v \in G'_{\mathcal{S}}} (f(v) - g(v)).
\]
On one hand, each node $u \in G'_{\mathcal{S}}$ appears exactly once as $f(v)$ and once as $g(v')$ for some $v,v'\in G'_{\mathcal{S}}$, so the sum is zero.
On the other hand, it clearly holds that $f(v) - g(v) = b_g - b_f$ for all
$v$. Letting $n$ be the number of nodes in $G'_{\mathcal{S}}$, we get the equation
\[
0=n(b_g-b_f) \mbox{ in }\mathbb{F}_p.
\]
Since $b_f\neq b_g$ by hypothesis, we must have $p \mid n$. This is impossible
however, since $G'_{\mathcal{S}}$ is not empty and consists only of nonsquares, so
$1 \le n \le \frac{p-1}{2}$.
\end{proof}
The fact that the polynomials of Proposition \ref{prop:p3} don't have a linear
term is of crucial importance. Let us see why by giving an explicit example of a
semigroup of irreducible polynomials in $\mathbb{F}_p[x]$ for which Proposition
\ref{prop:p3} does not apply (but $p\equiv 3 \mod 4$).
\begin{example}\label{ex:sharp_cond}
Let us fix $p=7$ and
\[f=(x-1)^2-5=x^2+5x+3\in \mathbb{F}_7[x]\]
\[g=(x-4)^2-5=x^2+6x+4\in \mathbb{F}_7[x].\]
The set $\mathcal{S}=\{f,g\}$ has distinguished set $D_\mathcal{S}=\{-5\}$ and graph as in Figure \ref{fig:irred_semigroup_f7}.
\begin{figure}[h]
\centering
\begin{tikzpicture}
\node (a) at (2,0) [draw, circle, double] {$-5$};
\node (b) at (-2,0) [draw, circle] {$3$};
\node (c) at (0,-2) [draw, circle] {$-1$};
\draw [->] (a) to [out=500,in=30] node[above] {$f$} (b);
\draw [->] (a) to [out=225,in=30] node[above] {$g$} (c);
\draw [->] (b) to [out=225,in=200] node[above] {$f$} (c);
\draw [->] (b) to [loop left] node[above] {$g$} (b);
\draw [->] (c) to [loop right] node[right] {$f$} (b);
\draw [->] (c) to [loop above] node[right] {$g$} (b);
\end{tikzpicture}
\caption{The nodes of $G_{\mathcal{S}}$ reachable from $-5$.}
\label{fig:irred_semigroup_f7}
\end{figure}
Since $5$ is not a square, and we only look at paths of positive length, the final claim follows by checking that $3$ and $-1$ are not squares modulo $7$.
\end{example}
\bibliographystyle{unsrt}
|
\section{Introduction}
Various surveys on galaxy morphology have revealed that the spiral structure is mainly of two types: flocculent structure, and grand-design spiral structure \citep{Elm11}. According to the density wave theory, the grand-design spiral pattern is a density wave that rotates rigidly in a galactic disc, and is maintained by the disc gravity \citep{LS64,LS66}, also see \citet{DOBA14} for a recent review.
The determination of pattern speed is of particular interest in galactic dynamics as it sets the location of resonance points where angular momentum transport is believed to occur, thus it has direct implications for the secular evolution of the galactic disc \citep{LYKA72}. Over the years, several techniques have been devised to measure the pattern speed of these spiral structures. A common technique that is used is based on the assumed knowledge of the location of the resonance points \citep{BuCs96}, which involves understanding the behaviour of stars and gas at these resonance points. Thus, estimation of the resonance points from the observed surface brightness profiles, will give the value of pattern speed \citep{PD97}.
Another approach relies on information regarding the sign reversal of the radial streaming motion across the corotation. This can be done by studying a strip covering the kinematical minor-axis, where the radial component of the velocity has a non-zero projection along the line of sight. This method requires the position angle of the strip to be known accurately, which is not easy to check observationally because warps, often present in the outer parts of a galaxy, twist the location of the position angles.
A related method, first proposed by \citet{CAN93}, employs the change of sign of radial streaming motion across corotation and also takes account of the geometric phase values. This technique has been applied successfully first to NGC~4321 \citep{Sem95}. Also, the pattern speed can be estimated from the observed azimuthal age-gradient of the young stellar complexes which are seen to be associated with the spiral arms \citep{GP98}. This technique has been applied to NGC~2997 to measure its pattern speed \citep{GD09}. Other popular method is the Tremaine-Weinberg method (hereafter, the TW method) which requires no specific dynamic model and predicts the value of pattern speed from kinematic measurements only \citep{TW84}. In the past, the TW method has been used to deduce the pattern speed of bars \citep{MK95,COR03,MA06} and spiral structures \citep{Fat07}. Each of the above methods involves different possible sources of errors or inaccuracies \citep[see e.g. the discussion in][]{Jun15}.
Spiral galaxies also contain a certain amount of interstellar gas whose fraction varies with their Hubble type \citep[e.g
][]{YoSc91,BM98}. The role of gas has been studied in various contexts in galactic dynamics, and it has been shown that the low velocity dispersion component, namely, gas has a significant effect on stability against both local axisymmetric \citep{JS84a,JS84b,BR88,Jog96,Raf01} and non-axisymmetric \citep{Jog92} perturbations.
The longevity of a density wave was questioned by \citet{Too69} who showed that a wavepacket of density waves would propagate radially with a group velocity $c_{\rm g}(R)$ = $\partial \omega(k, R) / \partial k$, where $\omega$ and $k$ are the frequency and the wavenumber, respectively, and $R$ is the radius; and the dependence of $\omega$ on $k$ is determined by the corresponding dispersion relation. This results in winding up of the wavepacket in a time-scale of about $10^9$ years. A recent work by \citet{GJ15} showed that the inclusion of gas in the disc makes the group transport slower by a factor of few, thus allowing the pattern to persist for a longer time-scale. They also showed that for the observed pattern speed of 18 km s$^{-1}$ kpc$^{-1}$ \citep{Sie12} and for assumed values of Toomre Q-parameters for our Galaxy, the disc when modelled as a stars-alone case, does not give a stable wave solution. Instead, one needs to invoke gas in order to get a stable density wave solution for the observed pattern speed.
In this paper, we study this in more detail and show this to be a general result: for this we study three external galaxies, NGC~6946, NGC~2997, and M~51 (NGC~5194)
for which the observational values of the pattern speeds for the spiral structure and the rotation curves are available in the literature. We first treat the galactic disc as comprised only of stars and from the dispersion relation we obtain the lowest possible value of the dimensionless frequency (see \S~2.2 for details) for which stars-alone will allow a stable wave. We next include gas on an equal footing with stars and follow the same procedure except for a two-component dispersion relation. We find that, at a radius equal to two disc scale-lengths and for an assumed set of Toomre Q parameter values, the stars-alone cases for NGC~6946 and NGC~2997 do not support a stable wave while for M~51, the stars-alone case marginally supports a stable density wave for the observed pattern speed. One has to include a gas fraction appropriate for the galaxies considered here, to get a stable density wave corresponding to the observed pattern speed.
As a check, we also varied the parameters considered, covering a reasonable range of values, and confirmed the validity of this finding. Also, based on these calculations, we derive a range of allowed pattern speeds that yields a stable density wave at a given radius of a galaxy. We apply this method to these three galaxies, and find that the observed pattern speed values indeed fall in this prescribed range.
\S~2 describes the formulation of the problem while \S~3 presents the results. \S~4 and \S~5 contain the discussion and conclusion, respectively.
\section{Formulation of the problem}
We treat the galactic disc as a gravitationally coupled two-component (star plus gas) system, where the stars are treated as a collisionless system and characterized by the surface density $\Sigma_{\rm 0s}$ and the one-dimensional velocity dispersion $\sigma_{\rm s}$. The gas is treated as a fluid, characterized by the surface density $\Sigma_{\rm 0g}$ and a one-dimensional velocity dispersion or sound speed $\sigma_{\rm g}$.
Note that in any real galaxy, gas is seen to be present in both atomic (HI) and molecular (H$_2$) hydrogen form, having different surface density \citep{YoSc91,BB12} and velocity dispersion profiles \citep{Tam09}. For the sake of simplicity, here we treat gas as a single-component and study its effect on the dispersion relation.
The galactic disc is taken to be infinitesimally thin and the pressure acts only in the disc plane. In other words, we are interested in gravitational perturbations in the disc plane only. We use the cylindrical co-ordinates (R, $\phi$, z).\\
\subsection{Dispersion relation in the WKB limit}
Consider the above system being perturbed by linear perturbations of the type exp[${i (kr - \omega t)}$], where $k$ is the wavenumber and $\omega$ is the frequency of the perturbation.
For such a system, the dispersion relation in the WKB (Wentzel - Kramers - Brillouins) limit or the tightly wound case is \citep{GJ15}
\begin{equation}
\frac{2\pi G \Sigma_{\rm 0s} |k|F\Big(\frac{\omega-m \Omega}{\kappa},\frac{k^2\sigma^2_s}{\kappa^2}\Big)}{\kappa^2-(\omega-m\Omega)^2}+\frac{2\pi G \Sigma_{\rm 0g} |k|}{\kappa^2-(\omega-m\Omega)^2+\sigma^2_gk^2} = 1
\end{equation}
\noindent where $F$ is the reduction factor which physically takes into account the reduction in $\omega^2$ arising due to the velocity dispersion of stars. The functional form of $F$ is as given in \citet{BT87}. Here $\Omega$ is the angular frequency and $\kappa$ is the local epicyclic frequency at a given radius.
After some algebraic simplifications \citep [for details see][]{GJ15}, the dispersion relation (equation 1) reduces to
\begin{eqnarray}\nonumber
~~~~~~~~(\omega-m\Omega)^2=\frac{1}{2}\{(\alpha_s+\alpha_g)- [(\alpha_s+\alpha_g)^2-\\\nonumber
~~~~~~~~~4(\alpha_s\alpha_g-\beta_s\beta_g)]^{1/2}\}\\
\end{eqnarray}
where,
\begin{eqnarray}\nonumber
\alpha_s = \kappa^2-2\pi G\Sigma_{\rm 0s}|k| F\Big(\frac{\omega-m \Omega}{\kappa},\frac{k^2\sigma^2_s}{\kappa^2}\Big)\\\nonumber
\alpha_g = \kappa^2-2\pi G\Sigma_{\rm 0g}|k|+k^2{\sigma}^2_g\\\nonumber
\beta_s = 2\pi G\Sigma_{\rm 0s}|k|F\Big(\frac{\omega-m \Omega}{\kappa},\frac{k^2\sigma^2_s}{\kappa^2}\Big)\\\nonumber
\beta_g = 2\pi G\Sigma_{\rm 0g}|k| \\
\end{eqnarray}
Now we define two dimensionless quantities, $s$, the dimensionless frequency and $x$, the dimensionless wavenumber as\\
\begin{eqnarray}
s=({\omega-m\Omega})/{\kappa} = {m(\Omega_p - \Omega})/{\kappa}, \: \: x = k / k_{crit}
\end{eqnarray}
\noindent where $k_{crit} = \kappa^2 / 2 \pi G (\Sigma_{\rm 0s} + \Sigma_{\rm 0g})$.
Substituting equation (4) in equation (2), we get the dimensionless form of the dispersion relation as \citep[see equations (7) \& (8) in][]{GJ15}:
\begin{eqnarray}
s^2=\frac{1}{2}[(\alpha'_s+\alpha'_g)-\{(\alpha'_s+\alpha'_g)^2-4(\alpha'_s\alpha'_g-\beta'_s\beta'_g)\}^{1/2}]
\label{stargas-disp}
\end{eqnarray}
where,
\begin{eqnarray}\nonumber
\alpha'_s=1-(1-\epsilon)|x|F(s,\chi) \\\nonumber
\alpha'_g=1-\epsilon |x|+\frac{1}{4}Q^2_g\epsilon^2x^2 \\\nonumber
\beta'_s=(1-\epsilon)|x|F(s,\chi) \\\nonumber
\beta'_g = \epsilon |x|\\
\end{eqnarray}
and, $\chi$= ${k^2\sigma^2_s}/{\kappa^2}$ = $0.286 Q_s^2 (1-\epsilon)^2 x^2$.
The three dimensionless parameters $Q_{\rm s}$, $Q_{\rm g}$, and $\epsilon$ are respectively the Toomre $Q$ factors for stars as a collisionless system $Q_{\rm s}$(=$\kappa \sigma_s /(3.36 G \Sigma_{0s})$), and for gas $Q_{\rm g}$ = ($\kappa \sigma_g /(\pi G \Sigma_{0g})$) \citep{Too64},
and $\epsilon$ =${\Sigma_{0g}}/( {\Sigma_{0s}+\Sigma_{0g}})$ is the gas mass fraction in the disc.
Similarly, the one-component analog of this dispersion relation is \citep{BT87}:
\begin{equation}
s^2= 1-|x|F\Big(\frac{\omega-m \Omega}{\kappa},\frac{k^2\sigma^2_s}{\kappa^2}\Big)
\label{onefluid-disp}
\end{equation}
The dispersion relations (equation 7 for stars-alone and equation 5 for the two-component case) provide the information about how the dimensionless frequency $s$ varies locally with respect to the dimensionless wavenumber $x$. Note that the equations (5) and (7) are symmetric with respect to both $s$ and $x$, hence we consider only their absolute values throughout this paper. It is clear that the absolute value of $s$ ($|s|$) ranges from 0 to 1 , where $s=0$ yields the position of corotation (hereafter CR) and $|s| =1$ gives the positions of Lindblad resonances \citep{BT87}.
It has been shown that for any $Q_s> 1$, there exists a zone between Lindblad resonance and corotation, known as the forbidden region where the dispersion relations (equations 5 and 7) have no real solution for $|k|$. Hence the corresponding density wave solutions, that fall in that range, will be evanescent, i.e. they will have complex wavenumber $k$, and they will either decay or grow exponentially \citep{BT87}. A similar result holds when a two-component system has real $|s|$ solution.
A wavepacket, starting from the long-wave branch of the dispersion relation ($|x| < 1$), travels inward with a negative group velocity and gets reflected from the edge of the forbidden region near the CR, and then starts travelling radially outward in the short-wave branch ($|x|> 1$) with a positive group velocity (see Fig. 1) before finally being absorbed at a large wavenumber by a process similar to Landau damping \citep{BT87}.
\subsection {Method}
Note that, in the density wave theory, the pattern speed of the grand-design two-armed spiral structure, $\Omega_p$ (= $\omega$/m; m = 2 here for spirals) is treated as a free parameter \citep[e.g.,][]{LS66}, and its value is obtained from observations. Thus for a given observed value of $\Omega_ p$ and from the observed rotation curve, the dimensionless frequency $|s|$ ($=m|\Omega_p- \Omega|/\kappa$) (equation 4), has a definite value at a certain radius R, say $|s|_{\rm obs}$. Therefore, for getting a stable density wave, the observationally found $|s|_{\rm obs}$ value should fall in the allowed range of $|s|$, derived from the dispersion relation, both obtained at the same radius. In other words, the horizontal line $|s|$ = $|s|_{\rm obs}$ should cut the plot of $|s|$ versus $|x|$ at that radius, to yield a stable wave solution (i.e. a real solution for $|k|$), otherwise it will give an evanescent density wave solution.
We define $|s|_{\rm cut-off}$ as the lowest possible value of $|s|$ for which one is able to get a stable wave solution from the dispersion relation at a given radius $R$. We set $|s|_{\rm cut-off}$ as the lowest $|s|$-value, where the plot of the dispersion relation turns around (equation (5) or equation (7), whichever is applicable). In other words, $|s|_{\rm cut-off}$ indicates the edge of the forbidden region. A typical example of how $|s|_{\rm cut-off}$ is obtained from a dispersion relation for a stars-alone case, is shown in Fig.~{\ref{fig1}}. For the sake of illustration, we assume $Q_{\rm s}$ = 1.7, as observed in the solar neighbourhood \citep{BT87}.
\begin{figure}
\centering
\includegraphics[height=2.5in,width=3.5in]{fig1.eps}
\caption{The dimensionless frequency $|s|$ vs. the dimensionless wavenumber $|x|$ from the dispersion relation for the stars-alone case (equation 7), plotted for $Q_s =1.7$. Since the dispersion relation is symmetric in both $s$ and $x$, only their absolute values are shown here. The arrows denote the direction of propagation of a typical density wavepacket. The horizontal line $|s|$ = $|s|_{\rm cut-off}$ indicates the lowest possible value of $|s|$, for which one can get a stable wave solution.}
\label{fig1}
\end{figure}
Thus, if the following inequality holds for a certain radius $R$:
\begin{equation}
|s|_{obs} \ge |s|_{\rm cut-off}
\end{equation}
then one can say that the observed pattern speed will give a stable density wave, and the dispersion relation will have real solution for $|k|$.
Throughout this paper, $|s|_{\rm cut-off}$ will be used for making quantitative statements
regarding the existence of stable solutions.
\section{Results}
\subsection{Input parameters}
We consider three galaxies for which the observational values for the input parameters, namely the pattern speed and the rotation curve, are available in the literature.
\subsubsection{NGC~6946}
This is a barred grand-design spiral galaxy with the Hubble type Scd. It has an angle of inclination $38^0$ \citep{CAR90,Boo07} and it is located at a distance of 5.5 Mpc \citep{KEN03}. The pattern speed of the main $m = 2$ gravitational perturbation i. e., the large oval and the two prominent spiral arms is measured to be $22_{-1}^{+4}$ km s$^{-1}$ kpc$^{-1}$ by \citet{Fat07}, using the TW method. They also derived the locations of different resonance points (see table 2 there). The HI rotation curve is taken from \citet{Boo07}. The exponential disc scale-length is measured as $1.9'$ or 3.3 kpc, where $1' = 1.75$ kpc \citep{CAR90}.
\subsubsection{NGC~2997}
This is a grand-design spiral galaxy of the Hubble type Sc \citep{MM81}. The pattern speed of the grand-design spiral structure is measured
to be 16 km s$^{-1}$ kpc$^{-1}$ by \citet{GD09}, by using the measurement of azimuthal age-gradient of newly formed stars.
The rotation curve is taken from \citet{PET78}. The exponential disc scale-length is measured as 4.0 kpc \citep{GBP99}
\subsubsection{M~51 (NGC~5194)}
This is a face-on spiral galaxy of the Hubble type Sc and is located at a distance of 9.6 Mpc \citep{SanTamm75}, in close interaction with NGC~5195. The pattern speed of the spiral structure is measured to be 38 km s$^{-1}$ kpc$^{-1}$ by \citet{Zimm04}, using CO as a tracer and by applying the TW method. The rotation curve for M~51 is found to be steeply rising up to $\sim$ $R = 25''$ and then for R $>$ $25''$ it saturates to 210 km s$^{-1}$ \citep{RAND93}, where $1''=46.5$ pc, assuming a distance of 9.6 Mpc \citep{SanTamm75}. The observed rotation curve and the observed pattern speed together place the CR at a distance of 5.5 kpc. The exponential disc scale-length is measured in various wavelengths and is found to vary from 4.36 kpc in B-band to 3.77 kpc in R-band \citep{Beck96}. We took a mean value of 4.0 kpc for the present purpose.
\subsection{Stars-alone case}
We first investigate whether a disc, consisting only of stars, can support a stable density wave for the observed values of pattern speed in different galaxies. To do this, first we obtained $|s|_{\rm obs}$
at a radius of 2$R_{\rm d}$, $R_{\rm d}$ being the exponential disc scale-length, in each of these three galaxies.
The choice of 2R$_{\rm d}$ is made because the spiral structure is typically seen in the middle part of an optical disc whose size is $\sim$ 4-5 R$_{\rm d}$ \citep[e.g.,][]{BM98}. We found that the $|s|_{\rm obs}$ values for NGC~6946, NGC~2997, and M~51 are 0.38, 0.44, and 0.63 respectively.
Now to check whether the inequality given in equation (8) is satisfied or not, we need to calculate the $|s|_{\rm cut-off}$ value from the dispersion relation (equation 7) for these galaxies. Note that the calculation of $|s|_{\rm cut-off}$ from the dispersion relation requires the knowledge of $Q_{s}$, and the values of $Q_{\rm s}$ at different radii for a galaxy are not known observationally for most galaxies. We assume $Q_{\rm s}$ to be constant with $R$ for simplicity, but in reality its values will vary \citep[e.g., see][]{Jog14,GJ14}. Further, for a theoretical study, we varied the value of this radially-constant $Q_{\rm s}$ from $1.3$ to $2.0$, while $1.7$ is the typical value in the solar neighbourhood \citep{BT87}. The plot of the resulting $|s|_{\rm cut-off}$ versus $Q_{\rm s}$ is shown in Fig. 2.
\begin{figure}
\centering
\includegraphics[height=2.5in,width=3.5in]{fig2.eps}
\caption{$|s|_{\rm cut-off}$, the lowest values of the dimensionless frequency for which a stable density wave solution is possible,
plotted as a function of $Q_s$, obtained from the one-component dispersion relation (equation 7). The resulting $|s|_{\rm cut-off}$ value shows a steady increase with $Q_{\rm s}$, thereby implying an increase in the forbidden region.}
\label{fig2}
\end{figure}
From Fig.~{\ref{fig2}}, we see that the $|s|_{\rm cut-off}$ value increases steadily with the increase of $Q_{\rm s}$, thereby implying a steady increase in the forbidden region around the CR as the $Q_{\rm s}$ value increases.
On comparing the $|s|_{\rm obs}$ values that we obtained for both NGC~6946 and NGC~2997, with Fig.~{\ref{fig2}}, we find that the inequality given by equation (8) is not satisfied for any value of $Q_{s}$, considered here. Thus, the dispersion relation for a purely stellar disc does not yield a real solution for $|k|$ and hence it does not yield a stable density wave corresponding to the observed pattern speeds of both these galaxies. For M~51, the stars-alone case barely supports a stable density wave when $Q_{\rm s} =$ 1.5, but if it is set to a value larger than 1.5, then the stars-alone case no longer supports a stable density wave for the observed pattern speed.
\subsection{Stars plus gas case}
We next include the interstellar gas, which has a low velocity dispersion as compared to the stars, in the system, and study whether the inclusion of gas helps in getting a stable wave solution for the observed pattern speeds.
First we investigated how the values of $|s|_{\rm cut-off}$ change with different values for the three parameters $Q_{\rm s}$, $Q_{\rm g}$, and $\epsilon$. We varied $Q_{\rm s}$ from 1.3 to 2.0 and $\epsilon$ from 0.1 to 0.25. In each case we fix $Q_{\rm g}$, and then compute $|s|_{\rm cut-off}$ from equation (5), as a function of $Q_{\rm s}$, and repeat this procedure for different values of $\epsilon$. For comparison, we replotted the $|s|_{\rm cut-off}$ values for the stars-alone case, as a function of $Q_{\rm s}$. The result for $Q_{g} = 1.5$ is shown in Fig. 3. From Fig 3, it is clear that with the inclusion of more gas (i.e., higher $\epsilon$ value), the $|s|_{\rm cut-off}$ value steadily decreases. This holds true for the above mentioned range of $Q_{\rm s}$ values, at a given $Q_{\rm g}$. In other words, a larger value of gas fraction ($\epsilon$) helps to decrease the forbidden region around the CR, and thus allowing a higher range of permitted pattern speeds (for details see \S~3.4). For the other values of $Q_{\rm g}$ in the range of 1.4 to 1.8, we got a similar trend, hence we do not produce them here.
\begin{figure}
\centering
\includegraphics[height=2.5in,width=3.5in]{fig3.eps}
\caption{$|s|_{\rm cut-off}$, the lowest values of the dimensionless frequency for which a stable density wave solution is possible for the two-component case,
plotted as a function of $Q_s$, for different gas fractions ($\epsilon$) and $Q_{\rm g}$ = 1.5. The labels used for different gas fractions are as indicated in the legend. With increasing gas fraction, the $|s|_{\rm cut-off}$ decreases steadily for the whole range of $Q_{\rm s}$ considered here. Thus the extent of the forbidden region decreases with increasing gas fraction.}
\label{fig3}
\end{figure}
Now we investigate the dynamical effect of gas on the grand-design spiral structure for the three specific galaxies, chosen for this work. The value of $|s|_{\rm cut-off}$ is obtained from the dispersion relation for a two-component system (equation 5) for a set of values for the three
dimensionless input parameters ($Q_{\rm s}$, $Q_{\rm g}$, $\epsilon$). The values used are $Q_{\rm s} = 1.5$ and $Q_{\rm g} = 1.5$ for the stars plus gas case, and
$Q_{\rm s} = 1.5$ for the stars-alone case, with $\epsilon=0.25$ for NGC 6946 and $\epsilon=0.15$ for NGC 2997 and M~51, as typical for their Hubble types \citep[see fig. 5,][]{YoSc91}. Then we checked whether or not the value of $|s|_{\rm cut-off}$ obtained theoretically from the dispersion relation for the above input parameters, and the value of $|s|_{\rm obs}$ obtained from observations satisfy the inequality in equation (8).
The results for NGC~6946, NGC~2997, and M~51 are shown in Fig.~4, Fig.~{\ref{fig5}}, and in Fig.~{\ref{fig6}}, respectively.
Since, the above values of $Q_{\rm s}$ and $Q_{\rm g}$ are chosen in a somewhat ad-hoc way, hence for each galaxy, we next study the variation in the dispersion relation for a reasonable range of $Q_{\rm s}$ and $Q_{\rm g}$ values, $Q_{\rm s}$ = 1.5, 1.6, 1.7 and $Q_{\rm g}$ = 1.4, 1.5, 1.6 and 1.7. The typical gas fraction value, chosen as per the Hubble type of any individual galaxy \citep[for details see][]{YoSc91} is kept constant. We found that, for a fixed $\epsilon$, there is a strong variation in the behaviour of the dispersion relation for different $Q_{\rm s}$ values, as compared to the different $Q_{\rm g}$ values.
A higher gas fraction ($\epsilon$) would be expected to change the results substantially, as suggested by \citet[see fig. 3 there]{JS84a}, but here we have kept $\epsilon$ constant as typical for a given Hubble type.
\begin{figure*}
\centering
\begin{minipage}{.32\textwidth}
\centering
\includegraphics[height=2.1in,width=2.3in]{fig4a.eps}
\vspace{0.2 cm}
{\bf{(a)}}\\
\end{minipage}
\begin{minipage}{.32\textwidth}
\centering
\includegraphics[height=2.1in,width=2.3in]{fig4b.eps}
\vspace{0.2 cm}
{\bf{(b)}}\\
\end{minipage}
\begin{minipage}{.32\textwidth}
\centering
\includegraphics[height=2.1in,width=2.3in]{fig4c.eps}
\vspace{0.2 cm}
{\bf{(c)}}\\
\end{minipage}
\caption{{\it{NGC~6946}} : Dispersion relations for stars-alone (S) and stars plus gas (S + G) cases, plotted in a dimensionless form, for a range of $Q_{\rm s}$ and $Q_{\rm g}$ values, at R = 2R$_{\rm d}$. Panel (a) for $Q_{\rm s}=1.5$, panel (b) for $Q_{\rm s}=1.6$, and panel (c) for $Q_{\rm s}=1.7$. In each panel, $Q_{\rm g}$ is taken to be 1.4, 1.5, 1.6, and 1.7, successively. The corresponding dispersion relations are shown from bottom to top. The horizontal line indicates the value $|s|_{\rm obs}$, derived from the observed pattern speed and the rotation curve. Here in all the cases, the two-component case allows a real solution for $|k|$ and thus a stable density wave solution for the observed value of the pattern speed, but this is not true for the stars-alone case.}
\label{fig4}
\end{figure*}
\begin{figure*}
\centering
\begin{minipage}{.32\textwidth}
\centering
\includegraphics[height=2.1in,width=2.3in]{fig5a.eps}
\vspace{0.2 cm}
{\bf{(a)}}\\
\end{minipage}
\begin{minipage}{.32\textwidth}
\centering
\includegraphics[height=2.1in,width=2.3in]{fig5b.eps}
\vspace{0.2 cm}
{\bf{(b)}}\\
\end{minipage}
\begin{minipage}{.32\textwidth}
\centering
\includegraphics[height=2.1in,width=2.3in]{fig5c.eps}
\vspace{0.2 cm}
{\bf{(c)}}\\
\end{minipage}
\caption{{\it{NGC~2997}} : Dispersion relations for stars-alone (S) and stars plus gas (S + G) cases, plotted in a dimensionless form, for a range of $Q_{\rm s}$ and $Q_{\rm g}$ values, at R = 2R$_{\rm d}$. Panel (a) for $Q_{\rm s}=1.5$, panel (b) for $Q_{\rm s}=1.6$, and panel (c) for $Q_{\rm s}=1.7$. In each panel, $Q_{\rm g}$ is taken to be 1.4, 1.5, 1.6, and 1.7, successively. The corresponding dispersion relations are shown from bottom to top. The horizontal line indicates the value $|s|_{\rm obs}$, derived from the observed pattern speed and the rotation curve. Here for $Q_{\rm s} = 1.5$, the two-component case, but not the stars-alone case, allows a stable density wave solution while for other values of $Q_{\rm s}$, none of the stars-alone and two-component case allows a stable density wave for the observed value of the pattern speed.}
\label{fig5}
\end{figure*}
\begin{figure*}
\centering
\begin{minipage}{.32\textwidth}
\centering
\includegraphics[height=2.1in,width=2.3in]{fig6a.eps}
\vspace{0.2 cm}
{\bf{(a)}}\\
\end{minipage}
\begin{minipage}{.32\textwidth}
\centering
\includegraphics[height=2.1in,width=2.3in]{fig6b.eps}
\vspace{0.2 cm}
{\bf{(b)}}\\
\end{minipage}
\begin{minipage}{.32\textwidth}
\centering
\includegraphics[height=2.1in,width=2.3in]{fig6c.eps}
\vspace{0.2 cm}
{\bf{(c)}}\\
\end{minipage}
\caption{{\it{M~51}} : Dispersion relations for stars-alone (S) and stars plus gas (S + G) cases, plotted in a dimensionless form, for a range of $Q_{\rm s}$ and $Q_{\rm g}$ values, at R = 2R$_{\rm d}$. Panel (a) for $Q_{\rm s}=1.5$, panel (b) for $Q_{\rm s}=1.6$, and panel (c) for $Q_{\rm s}=1.7$. In each panel, $Q_{\rm g}$ is taken to be 1.4, 1.5, 1.6, and 1.7, successively. The corresponding dispersion relations are shown from bottom to top. The horizontal line indicates the value $|s|_{\rm obs}$, derived from the observed pattern speed and the rotation curve. Here for $Q_{\rm s}=1.5$, both the two-component case and the stars-alone case, allow a stable density wave solution, but for larger values of $Q_{\rm s}$, only the two-component case allows a stable density wave for the observed value of pattern speed.}
\label{fig6}
\end{figure*}
Fig.~{\ref{fig4}}, and Fig.~{\ref{fig6}} show that for NGC~6946 and M~51, the $|s|_{\rm obs}$ value lies above the $|s|_{\rm cut-off}$ value for the star-gas system, thus the inequality given by equation (8) is satisfied, and this is true for the whole range of parameter space considered here. Thus the stars plus gas case allows a stable solution. For NGC~2997, the inequality given by equation (8) is satisfied only for $Q_{\rm s} = 1.5$. For a $Q_{\rm s}$ value higher than 1.5, even the addition of gas in the two-component system no longer admits a stable density wave (see Fig.~5). In contrast, for $Q_{\rm s} < 1.5$, the two component system admits a stable density wave solution. This can be seen from the result that as $Q_{\rm s}$ decreases, the $|s|_{\rm cut-off}$ for the stars plus gas also decreases, so that the forbidden region is smaller (see Fig.~{\ref{fig3}}).
Hence, the galactic disc when treated as a gravitationally coupled stars plus gas system,
with the observed gas fraction, allows a stable wave solution for the observed pattern speed, for most of the parameter range considered here. This is the main finding from this paper.
Interestingly, we see that for both NGC~6946 and NGC~2997 (Fig. 4 \& Fig.~5 (a)), the observed value of $|s|_{\rm obs}$ is close to the $|s|_{\rm cut-off}$ value which is obtained theoretically from the dispersion relation for the stars plus gas case (equation {\ref{stargas-disp}), but not the $|s|_{\rm cut-off}$ value obtained for the stars-alone case (equation 7). Note that the curve for the dispersion relation for stars-alone case lies above that for the stars plus gas case, so if the pattern speed were such that the corresponding observed $|s|_{\rm obs}$ were to be greater $|s|_{\rm cut-off}$ value for the stars-lone case it would also be greater than the cut-off value for the two-component case.
Thus if a pattern speed value gives a stable density wave solution for a one-component case, it will also give so for the two-component case. Also the observed value of $|s|_{\rm obs}$ lies close to the two-component $|s|_{\rm cut-off}$ value (but see M~51), and
this means that a galaxy seems to ``prefer'' to have a pattern speed that is indicated by the stars-plus-gas case for the observed gas fraction.
This can be explained as follows.
A joint two-component system is more unstable to the growth of perturbations or is closer to being unstable
than the stars-alone case (Jog \& Solomon 1984), and this results in a lower cut-off $|s|_{\rm cut-off}$
for the two component case than the stars-alone case. If the galactic disc were subjected to perturbations having a range of values for pattern speeds (say as arising
due to a tidal interaction), then the perturbation most likely to be amplified in a galaxy is the one for which the dimensionless frequency $|s|_{\rm cut-off}$
has the lowest value, as this would correspond to the fastest growing perturbation.
This indicates that the inclusion of even 15 to 25 per cent gas fraction by mass has a non-trivial effect on the determination of the pattern speed that a galaxy is likely to have.
The value of the pattern speed, along with the rotation curve, sets the locations of the Lindblad resonances in the disc. These are important in determining the secular evolution of galactic disc via angular momentum transport \citep{LYKA72}.
Thus our work shows that the gas
is important in setting the observed pattern speed in a galaxy and hence it is likely to play a crucial role in future dynamical evolution of a galactic disc.
We caution that the assumption of tight-winding (or, WKB limit), which played the crucial role in deriving the dispersion relations in equation~({\ref{stargas-disp}}) and equation~({\ref{onefluid-disp}}), is suspect for the long-wave branch ($|x| < 1$). This is important especially for NGC~2997, where the real solution ($|x|$), i.e., where the line $|s|=|s|_{\rm obs}$ cuts the dispersion relation, is less than 2 (see Fig.~{\ref{fig5}}). To verify the validity of the tight-winding limit in a more quantitative manner for all three galaxies considered here, we calculated the quantity $X$, at a radius $R$ equals to 2R$_{\rm d}$, where $X$ is defined as follows:
\begin{equation}
X=\frac{\kappa^2 R}{2\pi G m \Sigma_{\rm tot}}
\end{equation}
$\Sigma_{\rm tot}$ denotes the sum of the surface densities of the stellar and the gaseous components and $m$ (= 2, here) denotes the number of spiral arms. For the gas surface density tending to zero, it reduces to the usual $X$, defined for the one-component stellar case, as expected \citep[for details see][]{BT87}. The quantity $X$ denotes the cotangent of the pitch angle of waves of the critical wavenumber $k_{crit}$ and $X >> 1$ implies that the spiral arm is tightly wound, and hence the tight-winding approximation holds good \citep{BT87}. We followed the following prescription for calculating the quantity $X$.\\
For a given gas fraction $\epsilon$ and for an observed gas surface density at a given radius $R$, we can obtain the total surface density at that radius. Further from the observed rotation curve, the epicyclic frequency $\kappa$ at $R=2R_{\rm d}$ is obtained. The total gas surface density for NGC~6946 is taken from \citet{Cros07} and for M~51, it is taken from \citet{Schu07}. A similar distribution of the total gas surface density for NGC~2997, as a function of radius, is not available in the literature, to the best of our knowledge. So for this case we used the following technique to have an estimate of gas surface density. The $HI$ observations for NGC~2997 give a total $HI$ mass of 4.2$\times$ 10$^9$ M$_\odot$, which extends over an area having mean diameter of 31.2 kpc \citep{Kod11}. This, in turn, gives a mean HI surface density of 5.5 M$_\odot$ pc$^{-2}$ for NGC~2997. Now assuming a constant value of 0.5 for the ratio of mass in HI to mass in H$_2$ \citep[for details see][]{YoSc91}, we get the mean surface density of H$_2$. Then using $\epsilon$, we get the total mean surface density which is used in equation (9) to derive the quantity $X$. The results for value of $X$ for the three galaxies are given in Table~{\ref{table1}}.
\begin{table}
\centering
\caption{Values for $X$ for three galaxies, calculated at $R=2R_{\rm d}$}
\begin{tabular}{ccccccc}
\hline
Galaxy & $R$ & $\kappa$ &$\Sigma_{\rm g}$ & $\epsilon$ & $\Sigma_{\rm tot}$ & $X$\\
name & (kpc) & (km s$^{-1}$ & (M$_{\odot}$ && (M$_{\odot}$ \\
&&kpc$^{-1}$) & pc $^{-2}$) && pc $^{-2}$)\\
\hline
NGC~6946 & 6.6 &42.4 & 22.4 & 0.25 & 89.6 & 2.3 \\
NGC~2997 & 8.0 & 32.7 & 8.3 & 0.15 & 55.3 & 2.7\\
M~51 & 8.0 & 37.1 & 10 & 0.15 & 66.7 & 2.9 \\
\hline
\end{tabular}
\label{table1}
\end{table}
From Table~{\ref{table1}}, we see that the values of $X$ is greater than 1, thus the tight-winding approximation is satisfied, though not by a comfortable margin.
\subsection {A general constraint on pattern speeds}
For a collisionless disc, the density wave can exist only in the regions where
\begin{equation}
\Omega-\kappa/2 \le \Omega_{\rm p} \le \Omega+\kappa/2
\end{equation}
\noindent holds, and the equality holds only at the resonance points.\\
Here in this section, we use our technique based on the calculation of $|s|_{\rm cut-off}$ to constrain the range of allowed pattern speed for the $m=2$, grand-design spiral structures, which will give a stable density wave. The prescription is as follows.
First we consider $Q_s$ values in the range from $1.3$ to $2.0$ and $Q_g$ also in the range from $1.4$ to $1.8$. The gas-fraction, $\epsilon$, is varied from 5 to 25 per cent of the total disc mass, depending on the Hubble-type of a particular galaxy. Then for a fixed value of $\epsilon$, we obtained the value of $|s|_{\rm cut-off}$ for the whole range of $Q_s$ and $Q_g$ considered here. We found that for the gas-fraction of 5 per cent, the gas does not contribute much towards getting a stable density wave, but as the gas-fraction increases steadily, the effect of gas becomes more prominent. However, galaxies having $\epsilon$ $>$ 25 per cent mainly show a flocculent spiral structure and do not generally host a grand-design spiral structure \citep{Elm11}. Considering the above points, we have restricted the value of $\epsilon$ from 10 to 25 per cent.
Now suppose, at a certain radius $R$ for a particular galaxy, one knows the value of $\epsilon$, and one can make a reasonable choice for the values of $Q_{\rm s}$ and $Q_{\rm g}$. Then from these parameters, we can obtain the value of $|s|_{\rm cut-off}$, call it $\alpha$.
Then, to get a stable wave, the pattern speed ($\Omega_{\rm p}$) has to satisfy equation (8) with $|s|_{\rm obs}$ being replaced by $|s|$.
This in turn gives
\begin{equation}
s \ge \alpha \hspace{0.5 cm}\mbox{or} \hspace{0.5 cm}s\le -\alpha\,
\end{equation}
\noindent i.e.,
\begin{equation}
\Omega_{\rm p} \ge \Omega+\frac{\alpha \kappa}{2} \hspace{0.3 cm} \mbox{or} \hspace{0.3 cm} \Omega_{\rm p} \le \Omega-\frac{\alpha \kappa}{2}
\end{equation}
depending upon whether one is outside the CR or inside the CR.
Now combining inequality (10) and (12), we can say that when one is inside the CR then the allowed range of pattern speed would be ($\Omega- \kappa/2$, $\Omega-\alpha \kappa/2$) and when one is outside the CR then the allowed range would be ($\Omega+\alpha \kappa/2$, $\Omega+\kappa/2$).
We applied this technique to the three galaxies considered here, at $R=2R_d$, using $Q_{\rm s}=1.5$ and $Q_{\rm g}=1.5$ that were used as a set of parameters in Fig.~{\ref{fig4}}, Fig.~{\ref{fig5}} and Fig.~{\ref{fig6}}. For NGC~6946 and NGC~2997, $R=2R_{\rm d} $ lies inside the CR, and for M~51, $R=2R_{\rm d} $ lies outside the CR. Hence following the above prescription, the predicted range of allowed pattern speeds that give a stable density wave, would be ($\Omega- \kappa/2$, $\Omega-\alpha \kappa/2$) for NGC~6946 and NGC~2997, and for M~51, predicted range of allowed pattern speeds would be ($\Omega + \alpha\kappa/2$, $\Omega + \kappa/2$). The results are summarized in Table~{\ref{table2}}. We check that the observed values of the pattern speed, 22 km s$^{-1}$ kpc$^{-1}$ for NGC 6946, 16 km s$^{-1}$ kpc$^{-1}$ for NGC 2997, and 38 km s$^{-1}$ kpc$^{-1}$ for M~51, do indeed lie within the respective range of allowed pattern speeds obtained theoretically.
\begin{table*}
\centering
\caption{Range of allowed pattern speeds for NGC~6946, NGC~2997 \& M~51 at $R=2R_{\rm d}$}
\begin{tabular}{cccccccc}
\hline
Galaxy & $\Omega$ & $\kappa$ & $\epsilon$ & observed $\Omega_{\rm p}$ & $\alpha$ & Lower bound & Upper bound \\
name & (km s$^{-1}$ & (km s$^{-1}$ & (gas & (km s$^{-1}$&& on $\Omega_{\rm p}$ (km s$^{-1}$ & on $\Omega_{\rm p}$ (km s$^{-1}$ \\
& kpc$^{-1}$) & kpc$^{-1}$) & fraction) & kpc$^{-1}$)&& kpc$^{-1}$) & kpc$^{-1}$) \\
\hline
NGC~6946 & 30.0 & 42.4 & 0.25 & 22 & 0.17 & 8.8 & 26.4 \\
NGC~2997 & 23.1 & 32.7 & 0.15 & 16 & 0.42 & 6.8 & 16.2 \\
M~51 & 26.2 & 37.1 & 0.15 & 38 &0.42 & 34.0 & 44.8 \\
\hline
\end{tabular}
\label{table2}
\end{table*}
We then varied $Q_{\rm s}$ from 1.3 to 2.0 and $Q_{\rm g}$ from 1.4 to 1.8 to see what ranges of these two parameter will allow the observed pattern speed of three galaxies, to fall in the range, predicted from our theoretical work, and thus give a stable density wave solution. These are summarized in Table~{\ref{table3}}.
\begin{table}
\centering
\caption{Ranges of $Q_{\rm s}$ and $Q_{\rm g}$ for three galaxies, that give a stable wave solution}
\begin{tabular}{ccccc}
\hline
Galaxy & $\epsilon$ & $R (=2R_{\rm d})$ & Range in & Range in \\
name & &(kpc) & $Q_{\rm s}$ & $Q_{\rm g}$ \\
\hline
NGC~6946 & 0.25 & 6.6 &1.3 - 1.7 & 1.4 - 1.8 \\
NGC~2997 & 0.15 & 8.0 &1.3 - 1.5 & 1.4 - 1.8 \\
M~51 & 0.15 & 8.0 &1.3 - 1.9 & 1.4 - 1.8 \\
\hline
\end{tabular}
\label{table3}
\end{table}
We note that a lower value of $Q_{\rm s}$ or $Q_{\rm g}$ than their respective minima chosen here will give an even smaller forbidden region, hence the observed pattern speed would be also permitted for $Q_{\rm s} < 1.3$ and $Q_{\rm g} < 1.4$.
It is interesting to note that for NGC~6946, the allowed range for the pattern speed for a stable
wave is obtained to be
8.8-17.1 km s$^{-1}$ kpc$^{-1}$ for stars-alone case, while the observed pattern speed 22 km s$^{-1}$ kpc$^{-1}$ clearly lies outside this allowed range.
Similarly, for NGC 2997, the allowed range for the stars-alone case is calculated to be 6.8-13.5 km $^{-1}$ kpc$^{-1}$, while again the observed pattern speed
16 km s$^{-1}$ kpc$^{-1}$ lies outside this permitted range. Thus real galaxies seem to have pattern speed values that lie beyond the values required for
a stable solution for the stars-alone case. The presence of gas pushes the galaxy to adopt a pattern speed which is higher than the stars-alone case. Thus
the inclusion of gas will have effect in setting the pattern speed and thus in turn will effect the secular evolution of the disc galaxy (see \S~3.3).
We also illustrate the effect of gas on pattern speeds in another way. Suppose we were to artificially decrease the gas fraction in NGC 6946 to be 15 per cent, then the allowed range for the pattern speeds is obtained to be 8.8-20.8 km $^{-1}$ kpc$^{-1}$ - this does not cover the observed pattern speed of 22 km s$^{-1}$ kpc$^{-1}$. Thus the actual value of gas mass fraction ($\epsilon$) also matters in setting the value of pattern speed. The real galaxies studied seem to have pattern speeds that are close to the
upper value in the allowed range, or in other words when $|s|_{\rm obs}$ is just higher than $|s|_{\rm cut-off}$ (see the discussion in Section 3.3).
\section {Discussion}
Here we mention a few points regarding this current work. First, the shape of the dispersion relation and hence the value of $|s|_{\rm cut-off}$ is largely dependent on the values of the parameters ($Q_{\rm s}$, $Q_{\rm g}$, $\epsilon$) chosen. Note that, for most of the galaxies, the observed radial profiles for $Q_{\rm s}$ and $Q_{\rm g}$ are not available. Consequently, one has to rely on educative guesses for these two Q-values, as we have done here. If the actual observed values for $Q_{\rm s}$ and $Q_{\rm g}$ are known, the findings of this paper can be put in a more accurate way.
Secondly, the density wave corresponding to the observed pattern speed may not be long lasting. In fact, some of the past $N$- body simulations of spiral galaxies have showed that the spiral arms fade out quickly in time \citep{DOBA14}. However when a stellar disc is represented with sufficiently higher number of particles ($\sim$ order of 10$^8$), the spiral structure in the simulations lasts for a time-scale of about a Hubble time, because in these cases the Poisson noise of the system is minimized \citep{Fuji11,Don13}. But, in general, $N$-body simulations of spiral galaxies show that an individual spiral arm is transient and gets wound up, which is at odds with a classical long-lived quasi-stationary density wave scenario \citep{Sel11,Gra12,Ba13}.
The spiral structures could be more complex, for example, there is evidence that some galaxies could show either a long-lived spiral pattern or a short-lived pattern, or a galaxy could exhibit both types of patterns, e.g., see the discussion in \citet{Sie12}.
Thirdly, all the results presented in this work, are based on the assumption of the existence of a quasi-stationary density wave that rotates in the galactic disc with a constant pattern speed. However, observational studies by \citet{Foy11} for a sample of 12 nearby late-type star-forming galaxies and by \citet{Fer12} for NGC~4321 did not find any angular off-set in age as predicted by the classical density wave theory. This shows that the density wave theory does not seen to be applicable for these galaxies.
Finally, note that, the results presented here are based on a local calculation, whereas the density wave extends over a large range of radii in the galactic disc.
The results indicate that gas may have a significant effect on the spiral arms for the large-scale as well. A global modal analysis for a gravitationally coupled two-component (star plus gas) galactic disc to study the effect of the gas on large-scale spiral arms will be taken up in a future study.
\section{conclusion}
In summary, we have shown that the inclusion of gas is essential to get a stable density wave solution corresponding to the observed pattern speed in a spiral galaxy.
We use a two-component (stars plus gas) dispersion relation for a galactic disc, and assume reasonable gas fraction and Toomre $Q$ values for stars and gas. Then we check whether the theoretical dispersion relation permits a real $|k|$ solution (or a stable wave) for the observed rotation curve and the pattern speed.
Three galaxies of different Hubble type, NGC 6946, NGC 2997, and M~51, are chosen for which the pattern speed values of the grand-design spiral structure and the rotation curves are known from observations. We show that for both NGC~6946 and NGC~2997, at a radius of two disc scale-lengths, the stars-alone case is not able to produce a stable density wave corresponding to the observed pattern speeds, while for M~51, stars-alone case barely supports a stable density wave. One has to include the observed gas fraction in the study, in order to get a stable density wave for these pattern speeds.
This is the main result from this work.
Since these galaxies are typical representatives of their Hubble type, we expect that this finding will hold true for other grand-design spiral galaxies as well.
Based on the technique used here, we obtain a theoretical range of allowed pattern speeds that give a stable density wave at a certain radius of a galaxy. We apply this technique to the three galaxies considered here, and find that the observed pattern speeds of these three galaxies indeed fall in the respective prescribed range.
We show that the inclusion of even 15 to 25 per cent gas by mass fraction has a significant dynamical effect on the dispersion relation and hence on the pattern speed which is likely to be seen in a real, gas-rich galaxy. The resulting allowed range of pattern speeds is higher in presence of gas.
The value of pattern speed affects the angular momentum transport. Thus, the gas is likely to play a crucial role in the secular evolution of a galaxy. The effect of gas on the large-scale spiral structure will be investigated in a future study.
\bigskip
\noindent {\bf Acknowledgements:}
We thank the anonymous referee for the constructive comments which have greatly helped to improve the paper. C.J. would like to thank the DST, Government of India for support via
J.C. Bose fellowship (SB/S2/JCB-31/2014).
\bigskip
|
\section{Approximate counting and NLP tasks}
The Count-Min Sketch \cite{cormode2005improved} (CMS) is a widely adopted structure for approximate event counting in large scale processing. With proved bounds in terms of mean absolute error and confidence, one can easily design a constant size sketch as an alternative to expensive exact counting for a setting where the total number of event types is approximately known.
The CMS is used in many applications, often with a focus on high frequency events \cite{cormode2005s}. However, in the domain of text-mining, highest frequency events are often of low interest: frequent words are often grammatical, highly polysemous or without any interesting semantics, while low-frequency words are more relevant. As a matter of fact, a common regularizations in text-mining consist in computing the Pointwise Mutual Information \cite{xu2007study} (equation \ref{eqn:PMI}) or Log-likelihood Ratio \cite{dunning1993accurate} between two words in order to estimate the importance of their cooccurrence.
\begin{subequations}
\label{eqn:PMI}
\begin{align}
pmi_i,j = \log \frac{p(i,j)}{p(i)p(j)}
\end{align}
\end{subequations}
where $p(i)$ the probability to find word $i$ in the corpus and $p(i,j)$ is the probability that both words $i$ and $j$ appear in the same cooccurrence window.
This formula shows that higher frequency words will induce a relatively lower value at the end. Moreover, they all use a logarithm, hinting that only the order of magnitude is important. Another aspect of text-mining tasks, is that the distribution of word occurrence counts follows the Zipf law, which is highly skewed: most of the words have very few occurrences.
\section{Background on approximate counting}
The original version of the Count-Min-Sketch (CMS) is focused toward minimizing the absolute error and for uniform value distributions. A variant of CMS \cite{goyal2012sketch} has been proposed to compensate for the high relative error for low-frequency events, but the solutions explored tend to correct the errors instead of preventing them.
The Count-Min Log proposed by \cite{pitel2015count} improves the quality of the approximation by focusing on the relative error, while being highly efficient implementation-wise, but it does not take advantage of the Zipfian distribution of counts in text-mining data. TOMB structures \cite{van2009probabilistic}, on the other hand, combines logarithmic counters and multi-level Spectral Bloom Filters, and thus takes advantage of the Zipfian distribution. The TOMB structures are, however, not very efficient from a computational perspective, and they use MAX values as guards to use an upper level of counters.
\section{Count-Min Tree Sketch}
We have designed and implemented the \textit{Count-Min Tree Sketch} (CMTS) \ref{fig:hierarchie}, a tree structure mixing \textbf{counting bits} and \textbf{barrier bits}. A counter starts at the bottom with a counting bit, if its first barrier bit equals one, then the next counting bit is also considered otherwise the counter just uses one counting bit. The counter stops at the bit right after the last contiguously activated barrier. A barrier bit, once set to $1$ can never be change anymore. At the very top, after the last barrier bit, a spire holds the remaining counting bits.
\begin{figure} \centering
\includegraphics[width=0.6\linewidth]{CMTS_desc}
\caption[Count-Min Tree Sketches]{An example of CMTS with 4 layers and a spire.}
\label{fig:hierarchie}
\end{figure}
The general algorithms for updating and querying a Sketch is unchanged. However, given the complexity of the shared bits structure, the algorithms for getting the value, incrementing or merging the counters in case of distributed computing are much more complex than a Count-Min Sketch. Obtaining a competitive implementation has been a major endeavour.
The principle of getting the value of a CMTS's counter is the following, and is illustrated figure \ref{fig:cmts_value}:
\begin{enumerate}
\item The binary values of the barrier are gathered from the bottom cell of the counter, up to the first zero barrier. If there are 2 barrier bits contiguously set (like counter 0 in Figure \ref{fig:cmts_value}), then $b = 2$.
\item ($b + 1$) value bits are gathered in counter $c$. If the bottom value bit is $0$ and the two others are $1$, then the counter is $c = 110_b = 6$
\item The real value can finally be computed: $v = c + 2 \times \left ( 2^b-1 \right ) = 12$
\end{enumerate}
\begin{figure} \centering
\includegraphics[width=0.6\linewidth]{CMTS_value}
\caption[Count-Min Tree Sketches]{Getting the value of counters in a CMTS with 4 layers and a 4 bits spire. Real values of counters 0 and 7 are respectively 12 (6 from barrier, 6 from counting bits) and 119 (30 from barrier, 89 from counting bits). Counter 4 and 7 are in conflict and share values at the third level.}
\label{fig:cmts_value}
\end{figure}
Incrementing can be implemented by getting the real value, incrementing it, then putting the result back into the CMTS, by setting the correct barrier and counting bits.
The principle of setting the value of a CMTS's counter is the following:
\begin{enumerate}
\item The new barrier $nb$ is computed from the post increment value $nv$ using the following formula: $nb = min(nblayers, lsb(\frac{nv + 2}{4}))$, where $lsb(x)$ gives the bit length of $x$, i.e. the position of the first set bit plus one.\\ Within the previous example, the new value of counter 0 is $13$, $nblayer$ is $4$ and $lsb(\frac{13+2}{4}) = 2$. Hence, $nb = 2$
\item The new counting bit is then computed by $nc = nv - 2 \times (2^{nb} - 1)$. Here $nc = 7, i.e., 111_b$
\item Finally, the new barrier and the new value are set: $nb$ bits set to one for the barrier, and $nb + 1$ bits are set for the value using the new counting bit. \\In our example the number of barrier bits set to one remains the same ($2$), and $nb + 1 = 3$ bits are set for the value using the new counting bit $nc = 111_b$, thus the first three counters are set to $1$. In this case only the first one changes (from $0$ to $1$).
\end{enumerate}
The same basic get and set algorithms can be used for merging counters, even though many errors can be avoided by taking into account the possible overflows that can happen due to the conflicts in the tree structure.
\section{Empirical evaluation}
\subsection{Data}
We have verified this hypothesis empirically in the following setting: we count unigrams and bigrams of 140 million words of the English Wikipedia corpus. The small corpus analyzed contains 14.7 million distinct tokens.
In the following, the ideal perfect count storage size corresponds, for a given number of elements, at the minimal amount of memory to store them perfectly, in an ideal setting. A high-pressure setting corresponds to a setting where the memory footprint is lower than the ideal perfect count storage size for the same number of elements. For our experiment, this size is 59 Megabytes (MiB).
All sketches use an implementation which is faster than a native dictionary structure (we use the native C++ STL implementation of an UnorderedMap). The memory footprint of this structure is approximately 815 MiB, i.e. 1380\% of the ideal perfect count storage size.
\subsection{Variants}
We compare the estimates of four sketches:
\begin{description}
\item[CMS-CU] is the classical linear Count-min Sketch with Conservative Update,
\item[CMLS16-CU] is the Count-min-log Sketch with Conservative Update using a logarithmic base of 1.00025 and 16bits counters, and
\item[CMLS8-CU] is the Count-min-log Sketch with Conservative Update using a logarithmic base of 1.08 and 8bits counters.
\item[CMTS-CU] is the Count-Min Tree Sketch with Conservative Update. Parameters are: 128 bits base, 32 bits spire.
\end{description}
\subsection{Error on counts}
\begin{figure*}
\centering
\includegraphics[width=0.9\linewidth]{PYare}
\caption[Average Relative Error of sketches counts]{Average Relative Error of estimated counts with Count-Min Sketch (CMS-CU, blue lines), Count-Min-Log 16bits (CMLS16-CU, red lines), Count-Min-Log 8bits (CMLS8-CU, green lines) and Count-Min Tree Sketch (CMTS-CU, purple). The bold vertical line corresponds to the ideal perfect counts storage size.}
\label{fig:PYare}
\end{figure*}
\begin{figure*}
\centering
\includegraphics[width=0.9\linewidth]{rmse_plot}
\caption[Average Relative Error of sketches counts]{Root Mean Square Error of estimated counts.}
\label{fig:PYrmse}
\end{figure*}
\subsubsection{Relative Error}
The results for the Average Relative Error on simple counts of unigrams and bigrams are shown on figure \ref{fig:PYare}. The bold vertical line indicates the storage needed to memorize perfectly all the counts (the extra memory required for accessing the counters and storing the words is not taken into account).
This experiment shows that before the perfect storage mark, the estimation error of the CMLS16-CU is approximately 2 to 4 times lower than the error of the estimate of the CMS-CU. The CMLS8-CU error improvement over CMS-CU is in the range of 7 to 12 times. However, the CMLS8-CU reaches a minimal ARE of $10^{-1.5}$ at 200\% of the perfect size, and stops improving, due to the residual error caused by approximate counting.
The CMTS produces an ARE of $10^{-2}$ at 100\% of the perfect size, and $10^{-3}$ at 300\% of the perfect size.
With respect to the standard CMS, CMTS improves the ARE by a factor of 100 at the perfect size. The size improvement for an equivalent error is approximately 800\%.
\subsubsection{Absolute Error}
The results for the Root Mean Square Error on simple counts of unigrams and bigrams are shown on figure \ref{fig:PYrmse}. Unlike logarithmic counters, which produce a high absolute error for high values, the CMTS-CU always performs better than the CMS-CU.
\subsection{Error on PMI}
In a second step, we compute the Pointwise Mutual Information of the bigrams, and the error between the estimated PMI using counts from the sketch versus using the exact counts. The results for RMSE on estimated PMI are illustrated in figure \ref{fig:PYrmsepmi}.
These results show that, with sketches near the theoretical size of a perfect storage, both CMLS16-CU and CMLS8-CU outperforms CMS-CU by a factor of about 2 on the RMSE of the PMI. CMTS-CU outperforms CMS-CU by a factor of 10 for the RMSE at the perfect size, and the size improvement ratio is again approximately about 800\%.
\begin{figure*}
\centering
\includegraphics[width=0.9\linewidth]{rmsepmi}
\caption{Root Mean Square Error of estimated PMI.}
\label{fig:PYrmsepmi}
\end{figure*}
\subsection{Behaviour under very high pressure}
When the memory footprint is less than 10\% of the ideal storage size, the CMTS performance degrades faster than all other variants. We consider this not to be a real problem for two reasons. First, at this pressure, the RMSE on the PMI is in the range $[1.5,2.5]$, and the ARE on counts is in the range $[4,31]$, which are too high for being practically useable.
\section{Conclusion and perspectives}
In this paper we show how approximate counting can take advantage of the Zipfian distribution of the textual data to improve precision to an unprecedented level: improvements over standard Count-Min Sketch range from 100 times smaller for the ARE, and more than 10 times smaller for the RMSE on the PMI.
The Count-Min Tree Sketch can be implemented in an efficient way. Although it's slightly less computationaly efficient than standard CMS, it remains competitive with native maps implementations.
Moreover, like for the Count-Min Sketch, an unsynchronized multithreaded implementation shows very little adversarial effect on the precision of most common sketch sizes: the effects on precision only appear at very low errors ($10^{-5}$).
|
\section{Introduction}
\label{sec:sec1}
Continuous random processes and fields are regularly applied to model temporal or spatial phenomena in many different fields of science such as agriculture, chemistry, econometrics, finance, geology or physics. Model fitting is usually done with the help of data obtained by observing the given process at various time points or spatial locations. These observations are either used for parameter estimation or for prediction. However, the results highly depend on the choice of the data collection points. Starting with the fundamental works of \citet{hoel58} and \citet{kiefer59}, a lot of work has been done in the field of optimal design. Here by a design we mean a set \ $\boldsymbol\xi = \{x_1, x_2 , \ldots , x_n \}$ \ of distinct time points or locations where the investigated process is observed, whereas optimality refers to some prespecified criterion \citep{muller}. In case of prediction, one can use, e.g., the Integrated Mean Square Prediction Error criterion, which minimizes a functional of the error of the kriging predictor \citep{baz,bss13} or maximize the entropy of observations \citep{swin}. In parameter estimation problems,
a popular approach is to consider information based criteria. An A-optimal design minimizes the trace of the inverse of the Fisher information matrix (FIM) on the unknown parameters, whereas E-, T- and D- optimal designs maximize the smallest eigenvalue, the trace and the determinant of the FIM, respectively
\citep[see, e.g.,][]{puk,aw,pazman}. The latter design criterion for regression experiments has been studied by several authors both in uncorrelated \citep[see, e.g.,][]{silvey} and in correlated setups \citep{ms,ks,zba09,dpz}. However, there are several situations when D-optimal designs do not exist, for instance, if one has to estimate the covariance parameter(s) of an Ornstein-Uhlenbeck (OU) process \citep{zba09} or sheet \citep{bsschemo}. This deficiency can obviously be corrected by choosing a more appropriate design criterion. In case of regression models
a recently introduced approach, which optimizes the condition number of the FIM, called K-optimal design \citep{yz}, might be a reasonable choice. K-optimal designs try to minimize the error sensitivity of experimental measurements \citep{myz} resulting in more reliable least squares estimates of the parameters. However, one can also consider the condition number of the FIM as a measure of collinearity \citep{rz}, thus minimizing the condition number avoids multicollinearity.
In contrast to the standard information based design criteria, the condition number (and the corresponding optimization problem) is not convex, only quasiconvexity holds \citep{myz}. Hence, finding a K-optimal design usually requires non-smooth algorithms. \citet{yz} consider polynomial regression models and solve the K-optimal design problem with nonlinear programming, whereas in \citet{rz} simulated annealing is applied. In this class of models K-optimal designs are quite similar to their A-optimal counterparts. Further, \citet{myz} investigate Chebyshev polynomial models and suggest a two-step approach to find a probability distribution approximating the K-optimal design.
Further, one should also mention that K-optimal design is invariant to the multiplication of the FIM by a scalar, so it does not measure the amount of information on the unknown parameters. Besides this, K-optimality obviously does not have meaning for one-parameter models, but in this case multicollinearity does not appear either.
All regression models where K-optimality has been investigated so far consider uncorrelated errors, but there are no results for correlated processes.
In the present paper we derive K-optimal designs for estimating the regression parameters of simple temporal and spatial linear models driven by OU processes and sheets, respectively, and compare the obtained sampling schemes with the corresponding D-optimal designs. Both increasing domain and infill equidistant designs are investigated and the key differences between the two approaches are highlighted. Our aim is to give a first insight into the behaviour of K-optimal designs in a correlated setup, but many results presented here can be generalized to models with different base functions and/or correlation structures \citep[see, e.g.,][]{nather,dpz2}. This is a natural direction for further research.
\section{Ornstein-Uhlenbeck processes with linear trend}
\label{sec:sec2}
Consider the stochastic process
\begin{equation}
\label{model}
Y(s) = \alpha_0 + \alpha_1 s +U(s)
\end{equation}
with design points taken from a compact interval \ $[a,b]\subset
{\mathbb R}$, \ where $U(s), \ s\in {\mathbb R}$, is a stationary OU
process, that is a zero mean Gaussian process with covariance structure
\begin{equation}
\label{oucov}
{\mathsf E}\,U(s)U(t)=\frac{{\sigma}^2}{2\beta}\exp\big
(-\beta|s-t|\big ),
\end{equation}
with \ $\beta>0, \ \sigma>0$. \ We remark that
\ $U(s)$ \ can also be represented as
\begin{equation}
\label{ourep}
U(s)=\frac{\sigma}{\sqrt{2\beta}}{\mathrm
e}^{-\beta s}{\mathcal W}\big({\mathrm e}^{2\beta s}\big),
\end{equation}
where \ ${\mathcal W}(s), \ s\in {\mathbb R}$, \ is a standard
Brownian motion \citep[see, e.g.,][]{sw,bpz}. In the present study
the parameters \ $\beta$ \ and $\sigma$ \ of the driving OU
process \ $U$ \ are assumed to be known. However, a valuable
direction for future research will be the investigation of models
where these parameters should also be estimated. We remark that the same type of regression model appears in \citet{ms}, where the properties of D-optimal design under a different driving process are investigated.
For model \eqref{model}, the FIM \
$\mathcal I_{\alpha_0,\alpha_1}(n)$ \ on the unknown parameters \ $\alpha_0$ \
and \ $\alpha_1$ \ based on observations \ $\big\{ Y(s_i), \
i=1,2,\ldots ,n\big\}, \ n\geq 2,$ \ equals
\begin{equation*}
\mathcal I_{\alpha_0,\alpha_1}(n)=H(n)C(n)^{-1}H(n)^{\top}, \quad \text{where}
\quad H(n):=\begin{bmatrix} 1 & 1 & \cdots & 1 \\ s_1 & s_2 & \cdots &
s_n \end{bmatrix},
\end{equation*}
and \ $C(n)$ \ is the covariance matrix of the observations
\citep[see, e.g.,][]{xia,pazman}. Without loss of generality, one can set the variance of \ $U$ \ to be equal to one, which reduces \ $C(n)$ \ to a correlation matrix. Due to the particular structure of \ $C(n)$
\ resulting in a special form of its inverse (see \ref{subs:subsA.1} or \citet{ks}), a short
calculation shows that
\begin{equation*}
\mathcal I_{\alpha_0,\alpha_1}(n)=
\begin{bmatrix} L_1(n) & L_2(n) \\ L_2(n) & L_3(n) \end{bmatrix},
\end{equation*}
with
\begin{equation}
\label{entry}
L_1(n):=\!1\!+\!\sum_{i=1}^{n-1} \frac{1\!-\!p_i}{1\!+\!p_i}, \qquad \
L_2(n):=\!s_1\!+\!\sum_{i=1}^{n-1}
\frac{s_{i+1}\!-\!s_ip_i}{1\!+\!p_i},
\qquad L_3(n):=\!s_1^2\!+\!\sum_{i=1}^{n-1}
\frac{(s_{i+1}\!-\!s_ip_i)^2}{1\!-\!p_i^2},
\end{equation}
where \ $p_i:=\exp(-\beta d_i)$ \ and \ $d_i:=s_{i+1}-s_i, \ i=1,2, \ldots
,n-1$. \ To simplify calculations, we assume
that the first design point is at the origin, that is \ $s_1=0$, \ which does not change the general character of the presented results. Hence, in order to obtain the D-optimal design, one has to find
the maximum in \ $\boldsymbol d=(d_1,d_2,\ldots ,d_{n-1})$ \ of
\begin{equation}
\label{Dopt}
{\mathcal D}(\boldsymbol d):=\det \big(\mathcal
I_{\alpha_0,\alpha_1}(n)\big)= L_1(n)L_3(n)-L_2^2(n),
\end{equation}
whereas K-optimal design minimizes the condition number \ ${\mathcal
K}(\boldsymbol d)$ \ of \ $\mathcal I_{\alpha_0,\alpha_1}(n)$, \ where
\begin{equation}
\label{Kopt}
{\mathcal K}(\boldsymbol d):=\frac 14 \bigg(L_1(n)+L_3(n)+\sqrt{\big(L_1(n)-L_3(n)\big)^2+4L_2^2(n)}\bigg)^2 \Big / \big(L_1(n)L_3(n)-L_2^2(n)\big).
\end{equation}
Now, observe that
\begin{equation*}
{\mathcal K}(\boldsymbol d)=g\big(\mathcal R(\boldsymbol d)\big), \qquad \text{where} \qquad g(x):=\frac 14 \big(\sqrt{x}+\sqrt{x-4}\big)^2, \quad x\geq 4,
\end{equation*}
and
\begin{equation}
\label{Ropt}
{\mathcal R}(\boldsymbol d):= \big(L_1(n)+L_3(n)\big)^2 \big / \big(L_1(n)L_3(n)-L_2^2(n)\big)\geq 4.
\end{equation}
As \ $g(x)$ \ is strictly monotone increasing, K-optimal design can be found by minimizing the objective function \ $\mathcal R(\boldsymbol d)$. \ Hence, the properties of K-optimal design for OU processes with linear trend are derived with the help of \ $\mathcal R(\boldsymbol d)$.
General results on D-optimal designs for models driven by OU processes
have already been formed and published \citep{ks,zba09}, but the
dependence of \ ${\mathcal R}(\boldsymbol d)$ \ on the design points
is far more complicated. Hence, in the next sections we investigate
some special cases in order to highlight the main differences between
the two design criteria.
\begin{ex}
\label{ex1}
Let the design space be \ ${\mathcal X}=[0,1]$ \ and consider a three-point restricted design \citep[see, e.g.,][]{bsschemo} where \ $s_1=0, \ s_2:=d, \ s_3=1$ \ with \ $0\leq d\leq 1$. \ In this case the objective functions \eqref{Dopt} and \eqref{Ropt} are univariate functions of \ $d$ \ and take the forms
\begin{equation*}
{\mathcal D}(d)=2\frac{(1-{\mathrm e}^{-\beta d})+d({\mathrm e}^{-\beta d}-{\mathrm e}^{-\beta (1-d)})-d(1-d)(1-{\mathrm e}^{-\beta})}{(1-{\mathrm e}^{-2\beta d})(1-{\mathrm e}^{-2\beta (1-d)})} \qquad \text{and} \qquad
{\mathcal R}(d)= \frac {{\mathcal R}_1^2(d)}{{\mathcal R}_2(d)},
\end{equation*}
respectively, where
\begin{align*}
{\mathcal R}_1(d):=&\, (1-{\mathrm e}^{-\beta (1-d)})^2(1-{\mathrm e}^{-2\beta d})+(1-{\mathrm e}^{-\beta d})^2(1-{\mathrm e}^{-2\beta (1-d)})+(1-{\mathrm e}^{-2\beta d})(1-{\mathrm e}^{-2\beta (1-d)}) \\
&+d^2(1-{\mathrm e}^{-2\beta (1-d)})+(1-d{\mathrm e}^{-\beta (1-d)})^2(1-{\mathrm e}^{-2\beta d}), \\[2mm]
{\mathcal R}_2(d):= &\,
2(1-{\mathrm e}^{-2\beta d})(1-{\mathrm e}^{-2\beta (1-d)})\big(1-{\mathrm e}^{-\beta d}+d^2(1-{\mathrm e}^{-\beta})-d(1+{\mathrm e}^{-\beta (1-d)})(1-{\mathrm e}^{-\beta d})\big).
\end{align*}
Direct calculations show that for all \ $\beta>0$ \ function \ $\mathcal D(d)$ \ has its maximum at \ $d=1/2$, \ that is the D-optimal three point restricted design is equidistant.
In case of K-optimality, the situation is completely different. Assume first \ $\beta^*\leq\beta\leq\beta ^{**}$, \ where \ $ \beta^*\approx 0.5718$ \ and \ $\beta^{**}\approx 4.9586$ \ are the only positive roots of \ $S(\beta)=0$, \ with
\begin{equation*}
S(\beta)\!:=\!(\beta^2-6\beta+4){\mathrm e}^{4\beta}\!+
(6\beta^2+6\beta-10){\mathrm e}^{3\beta}\!-(11\beta^2-10\beta-2)
{\mathrm e}^{2\beta}\!+(2\beta^2-6\beta+10){\mathrm e}^{\beta}-2\beta^2-4\beta-6.
\end{equation*}
Since
\begin{equation*}
\lim_{d\to 0}{\mathcal R}'(d)=-\frac {3{\mathrm e}^{\beta}-2}
{2\beta{\mathrm e}^{\beta}({\mathrm e}^{2\beta}-1)^2}S(\beta),
\end{equation*}
$\beta^*$ \ and \ $\beta^{**}$ \ are the only solutions of \ $\lim_{d\to 0}{\mathcal R}'(d)=0$, \ too. For \ $\beta \in[\beta^*,\beta^{**}]$, \ function \ ${\mathcal R}(d)$ \ has a single extremal point in the \ $]0,1[$ \ interval, which corresponds to a maximum. Hence, as
\begin{equation*}
\lim_{d\to 0}{\mathcal R}(d)=\lim_{d\to 1}{\mathcal R}(d)=\frac {\big (3{\mathrm e}^{\beta}-2\big)^2}
{{\mathrm e}^{2\beta}-1},
\end{equation*}
the minimum of \ ${\mathcal R}(d)$ \ is reached at the boundary points $0$ and $1$, so the K-optimal design collapses. In contrast, for parameter values outside the interval \ $[\beta^*,\beta^{**}]$ \ K-optimal designs exist.
Figures \ref{fig1}a and \ref{fig1}b display the K-optimal value \ $d_{opt}$ \ plotted against the parameter \ $\beta$ \ for intervals \ $]0,\beta^*[$ \ and \ $]\beta^{**},100]$. \ We remark that \ $d_{opt}\to 0$ \ as \ $\beta \to \infty$, \ and the limit \ $0$ \ is the minimum point of
\begin{equation*}
\lim_{\beta\to\infty}{\mathcal R}(d)=\frac {\big(d^4+4\big)^2}{2(d^2-d+1)}.
\end{equation*}
\begin{figure}[t]
\begin{center}
\leavevmode
\hbox{
\epsfig{file=plot1D3p_L.pdf,height=6cm, width=8 cm} \quad
\epsfig{file=plot1D3p_U.pdf,height=6cm, width=8 cm}}
\centerline{\hbox to 9 truecm {\scriptsize (a) \hfill (b)}}
\end{center}
\caption{K-optimal value \ $d_{opt}$ \ for the three point design \ $\boldsymbol\xi=\{0,d,1\}$ \ plotted against the parameter \ $\beta$ \ for the intervals (a) \ $]0,\beta^*[, \ \beta^*\approx 0.5718$, \ and (b) \ $]\beta^{**},100], \ \beta^{**}\approx 4.9586$.}
\label{fig1}
\end{figure}
\end{ex}
\subsection{Optimality of increasing domain equidistant designs}
\label{subs:subs2.1}
Consider an equidistant increasing domain design with step size \ $d>0$, \
that is the observation points are \ $\boldsymbol \xi=\big\{0,d,2d, \ldots
,(n-1)d\big\}$. In this case, \ $p_i=\exp (-\beta d), \ i=1,2, \ldots
,n-1,$ \ so the expressions in \eqref{entry} reduce to
\begin{align}
\label{entry_d}
L_1(n)&=\frac {2-n+n{\mathrm e}^{\beta d}}{{\mathrm e}^{\beta
d}+1}, \qquad \qquad L_2(n)=\frac{d(n-1)}2 L_1(n), \\
L_3(n)&=\frac {d^2(n-1)}{{\mathrm e}^{2\beta
d}-1}\bigg(\frac {n(2n-1)({\mathrm e}^{\beta d}-1)^2}6+n\big({\mathrm e}^{\beta
d}-1\big)+1 \bigg), \nonumber
\end{align}
and the objective functions \ $\mathcal D$, \ $\mathcal K$ \ and \ $\mathcal R$ \ defined by \eqref{Dopt}, \eqref{Kopt} and \eqref{Ropt}, respectively, are univariate functions of \ $d$.
\begin{thm}
\label{equiresgen}
For model \eqref{model} with covariance structure
\eqref{oucov} and equidistant increasing domain design with step size \
$d>0$, \ function \ $\mathcal D$ \ is monotone
increasing in \ $d$, \ whereas \ $\mathcal R$ \ (and \ $\mathcal K$) \ has at least one global minimum point, that is, there exists a K-optimal design.
\end{thm}
As a special case consider a two-point design \ $\{0,d\}$. \ Figures
\ref{fig2}a and \ref{fig2}b show the behaviour of \ ${\mathcal D}(d)$
\ and \ ${\mathcal K}(d)$, \ respectively, for \ $\beta=0.1$, \
whereas the following theorem formulates a general result on the
two-point K-optimal design.
\begin{thm}
\label{eqirestwop}
For model \eqref{model} with covariance structure \eqref{oucov}, there
exists a unique K-optimal two-point design \ $\{0,d_{opt}\}$, \ where \
$d_{opt}$ \ is the unique solution of
\begin{equation}
\label{twopeq}
\big(d^2-2\big){\mathrm e}^{3\beta d}+2(\beta d+1){\mathrm e}^{2\beta
d}-\big(\beta d^3+d^2+2\beta d-2\big){\mathrm
e}^{\beta d}-2=0.
\end{equation}
\end{thm}
\begin{figure}[t]
\begin{center}
\leavevmode
\hbox{
\epsfig{file=dopt1D.pdf,height=6cm, width=8 cm} \quad
\epsfig{file=kopt1D.pdf,height=6cm, width=8 cm}}
\centerline{\hbox to 9 truecm {\scriptsize (a) \hfill (b)}}
\end{center}
\caption{Objective functions for two-point D-optimal (a) and
K-optimal (b) designs with \ $\beta=0.1$.}
\label{fig2}
\end{figure}
\subsection{Comparison of equidistant designs}
\label{subs:subs2.2}
According to the ideas of \citet{hoel58}, we investigate the change
of D- and K-optimality criteria arising from doubling the number of
sub-intervals in an equidistant partition of a fixed design interval, and we also study the situation when the length of the design interval is also doubled.
The former approach refers to infill-, whereas the latter to increasing domain asymptotics.
Let the design space be \ ${\mathcal X}=[a,b]\subset {\mathbb R}, \ a<b$, \ and denote by \ $\widetilde{\mathcal X}$ \ the interval \ $[2a,2b]$. \
Obviously, without loss of generality we may assume \
${\mathcal X}=[0,1]$ \ and consider the sequences \ $\boldsymbol \xi_n$ \ and \
$\boldsymbol \xi_{2n}$ \ of designs on \ ${\mathcal X}$, \ where \ $\boldsymbol \xi_n:=\big \{0,1/n, \ldots ,(n-1)/n,1\big\},\ n\geq 2, \ n\in{\mathbb N}$,
\ and \ designs \ $\widetilde{\boldsymbol \xi}_{2n}:=\big \{0,1/n, \ldots ,(2n-1)/n,2\big\}$ \ on \ $\widetilde{\mathcal X}=[0,2]$.
\begin{thm}
\label{doublim}
For model \eqref{model} with covariance structure \eqref{oucov}
\begin{equation}
\label{k_lim}
\lim_{n\to\infty}\frac {{\mathcal D}(2n)}{{\mathcal D}(n)}=
\lim_{n\to\infty}\frac {{\mathcal K}(2n)}{{\mathcal K}(n)}=1,
\end{equation}
where \ $\mathcal D(n)$ \ and \ $\mathcal K(n)$ \ are the values of
the objective functions \eqref{Dopt} and \eqref{Kopt}, respectively,
corresponding to the design \ $\boldsymbol \xi_n$ \ on \ ${\mathcal X}$.
\end{thm}
Limits \eqref{k_lim} show that for both investigated design criteria, if one has a dense enough equidistant partition of a fixed design space, there is no use of doubling the number of intervals in the partition, which is in accordance with the results of \citet{hoel58} for classical polynomial regression and \citet{ks} for OU processes with a constant trend.
\begin{thm}
\label{doubintlim}
For model \eqref{model} with covariance structure \eqref{oucov}
\begin{equation}
\label{kint_lim}
\lim_{n\to\infty}\frac {\widetilde{\mathcal D}(2n)}{{\mathcal D}(n)}=D(\beta)
\qquad \text{and} \qquad
\lim_{n\to\infty}\frac {\widetilde{\mathcal K}(2n)}{{\mathcal K}(n)}=K(\beta),
\end{equation}
with
\begin{align}
\label{DKform}
D(\beta)&:= \frac{16(\beta+1)(\beta^2+3\beta +3)}{(\beta+2) (\beta^2+6\beta +12)} \qquad \text{and} \\
K(\beta)&:=\frac{(\beta+2)(\beta^2+6\beta +12) \big(7\beta^2+9\beta +3+\sqrt{37\beta^4+78\beta^3+51\beta^2+18\beta+9}\big)^2}{4(\beta+1) (\beta^2+3\beta +3)\big(4\beta^2+9\beta +3+\sqrt{13\beta^4+48\beta^3+33\beta^2-18\beta+9}\big)^2}, \nonumber
\end{align}
where \ $\mathcal D(n)$ \ and \ $\widetilde{\mathcal D}(2n)$ \ are the values of
the objective function \eqref{Dopt}, whereas \ $\mathcal K(n)$ \ and \ $\widetilde{\mathcal K}(2n)$ \ are the values of
the objective function \eqref{Kopt} corresponding to the designs \ $\boldsymbol \xi_n$ \ and \ $\widetilde{\boldsymbol \xi}_{2n}$, \ respectively.
\end{thm}
Note that \ $D(\beta)$ \ is strictly increasing with \ $\lim_{\beta\to 0}D(\beta)=2$ \ and \ $\lim_{\beta\to\infty}D(\beta)=16$, \ whereas \ $\lim_{\beta\to 0}K(\beta)=2$, \ $K(\beta)$ \ has a single maximum of $2.3454$ at $0.2730$, and then it is strictly decreasing with \ $\lim_{\beta\to\infty}K(\beta)=\big(7+\sqrt{37}\big)^2/\big(8+2\sqrt{13}\big)^2\approx 0.7397$. \ Hence, doubling the interval over which the dense enough equidistant observations are made at least doubles the information on the unknown regression parameters \ $(\alpha_0,\alpha_1)$, \ which supports the extension of the design space. Moreover, after the maximum point of \ $K(\beta)$ \ the larger the covariance parameter \ $\beta$, \ the more we gain in efficiency in terms of the condition number with extending the interval where the observations are made.
\section{Ornstein-Uhlenbeck sheets with linear trend}
\label{sec:sec3}
As a spatial generalization of model \eqref{model}, consider the spatial process
\begin{equation}
\label{2Dmodel}
Y(s,t)=\alpha_0+\alpha_1s+\alpha_2t+U(s,t),
\end{equation}
where the design points are taken from a compact design space
\ $\mathcal{X}=[a_1,b_1]\times [a_2, b_2]$, \ with \ $b_1>a_1$ \ and \
$b_2>a_2$, \ and \ $U (s,t), \ s,t\in {\mathbb R}$, \ is a
stationary OU sheet, i.e.,
a centered Gaussian process with covariance structure
\begin{equation}
\label{2Doucov}
{\mathsf E}\,U(s_1,t_1)U(s_2,t_2)=
\frac{\sigma^2}{4\beta\gamma}\exp\big
(-\beta|s_1-s_2|-\gamma|t_1-t_2|\big ),
\end{equation}
where \ $\beta>0, \ \gamma>0, \ \sigma>0$. \ Similar to the OU process, \
$U(s,t)$ \ can be represented as
\begin{equation}
\label{2Dourep}
U(s,t)=\frac{\sigma}{2\sqrt{\beta\gamma}}{\mathrm
e}^{-\beta s-\gamma t}{\mathcal W}\big({\mathrm e}^{2\beta s},
{\mathrm e}^{2\gamma t}\big),
\end{equation}
where \ ${\mathcal W}(s,t), \ s,t\in {\mathbb R}$, \ is a standard
Brownian sheet \citep{bpz, bs}. Again, we assume that the parameters \ $\beta, \ \gamma$ \ and \ $\sigma$ \ of the OU sheet \ $U(s,t)$ \ driving model \eqref{2Dmodel} are known.
We investigate regular grid designs of the form \ $\big\{(s_i,t_j): \ i=1,2, \ldots ,n, \ j=1,2, \ldots ,m\big\}\subset \mathcal{X}=[a_1,b_1]\times [a_2,
b_2], \ n,m\geq 2$, \ and without loss of generality we may assume \
$a_1\leq s_1<s_2< \ldots < s_n\leq b_1$ \ and \ $a_2\leq t_1<t_2< \ldots < t_m\leq b_2$ \ \citep{bsschemo}, and that \ $U(s,t)$ \ has a unit variance. Again, the general form of the FIM \ $\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(n,m)$ \ on regression parameters \ $\alpha_0,\ \alpha_1$ \ and \ $\alpha_2$ \ of model \eqref{2Dmodel} based on observations \ $\big\{Y(s_i,t_j), \ i=1,2,\ldots, n, \ j=1,2,\ldots, m\big\}$ \ equals
\begin{equation*}
\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(n,m)=G(n,m)C(n,m)^{-1}G(n,m)^{\top},
\end{equation*}
where \ $C(n,m)$ \ denotes the covariance matrix of the observations and
\begin{equation*}
G(n,m):=\begin{bmatrix}
1 & 1 & \cdots & 1 & 1 & 1 & \cdots & 1 & \cdots & 1 & 1 & \cdots & 1 \\
s_1 & s_1 & \cdots & s_1 & s_2 & s_2 & \cdots & s_2 & \cdots & s_n & s_n & \cdots & s_n \\
t_1 & t_2 & \cdots & t_m & t_1 & t_2 & \cdots & t_m & \cdots & t_1 & t_2 &\cdots & t_m \\
\end{bmatrix}.
\end{equation*}
The following theorem gives the exact form of the FIM \ $I_{\alpha_0,\alpha_1,\alpha_2}(n,m)$.
\begin{thm}
\label{FIMsheet}
Consider the OU model \eqref{2Dmodel} with covariance structure \eqref{2Doucov} observed in points \ $\big\{(s_i,t_j): \ i=1,2, \ldots ,n, \ j=1,2, \ldots ,m\big\}$. \ Then
\begin{equation}
\label{FIMform}
\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(n,m) =\begin{bmatrix}
L_1(n)M_1(m) & L_2(n)M_1(m) & L_1(n)M_2(m) \\
L_2(n)M_1(m) & L_3(n)M_1(m) & L_2(n)M_2(m) \\
L_1(n)M_2(m) & L_2(n)M_2(m) & L_1(n)M_3(m)
\end{bmatrix}
\end{equation}
with
\begin{alignat*}{3}
L_1(n)&:=\!1\!+\!\sum_{i=1}^{n-1} \frac{1\!-\!p_i}{1\!+\!p_i}, \qquad \
L_2(n)&&:=\!s_1\!+\!\sum_{i=1}^{n-1}
\frac{s_{i+1}\!-\!s_ip_i}{1\!+\!p_i},
\qquad L_3(n)&&:=\!s_1^2\!+\!\sum_{i=1}^{n-1}
\frac{(s_{i+1}\!-\!s_ip_i)^2}{1\!-\!p_i^2},\\
M_1(m)&:=\!1\!+\!\sum_{i=1}^{m-1} \frac{1\!-\!q_i}{1\!+\!q_i}, \qquad
M_2(m)&&:=\!t_1\!+\!\sum_{i=1}^{m-1}
\frac{t_{i+1}\!-\!t_iq_i}{1\!+\!q_i},
\qquad M_3(m)&&:=\!t_1^2\!+\!\sum_{i=1}^{m-1}
\frac{(t_{i+1}\!-\!t_iq_i)^2}{1\!-\!q_i^2},
\end{alignat*}
where \ $p_i:=\exp(-\beta d_i)$ \ with \ $d_i:=s_{i+1}-s_i, \ \ i=1,2, \ldots ,n-1$, \ and \ $q_j:=\exp(-\gamma \delta_j)$ \ with
$\delta_j:=t_{j+1}-t_j, \ j=1,2, \ldots, m-1$.
\end{thm}
Again, to simplify calculations we assume \ $s_1=t_1=0$, \ so the
D-optimal design maximizes
\begin{equation}
\label{2DDopt}
{\mathcal D}(\boldsymbol d,\boldsymbol \delta):=\det \big(\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(n,m)\big)=
L_1(n)M_1(m)\big(L_1(n)L_3(n)-L_2^2(n)\big)\big(M_1(m)M_3(m)-M_2^2(m)\big)
\end{equation}
both in \ $\boldsymbol d=(d_1,d_2,\ldots ,d_{n-1})$ \ and \ $\boldsymbol \delta=(\delta_1,\delta_2,\ldots ,\delta_{m-1})$, \ whereas to obtain the K-optimal design one has to minimize the condition number \ ${\mathcal K}(\boldsymbol d,\boldsymbol \delta)$ \ of \ $\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(n,m)$. \ Using the expressions of \citet{smith} for the eigenvalues of a $3\times 3$ symmetric matrix, one can easily show
\begin{equation}
\label{2DKopt}
{\mathcal K}(\boldsymbol d,\boldsymbol \delta)=
\frac{\tr \big(\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(n,m)\big)+
\sqrt{6\tr \big(\mathcal I_{\alpha_0,\alpha_1,\alpha_2}^{\,2}(n,m)\big)
-2\tr^2 \big(\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(n,m)\big)}\cos (\varphi)}
{\tr \big(\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(n,m)\big)+
\sqrt{6\tr \big(\mathcal I_{\alpha_0,\alpha_1,\alpha_2}^{\,2}(n,m)\big)
-2\tr^2 \big(\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(n,m)\big)}\cos \big(\varphi+2\pi /3 \big)},
\end{equation}
where \ $\varphi := \frac 13 \arccos (\varrho ) \in [0,\pi/3]$, \ with
\begin{equation*}
\varrho:=\frac{54\det \big(\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(n,m)\big)
+\tr\big(\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(n,m)\big) \Big(
9\tr \big(\mathcal I_{\alpha_0,\alpha_1,\alpha_2}^{\,2}(n,m)\big)
-5\tr^2 \big(\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(n,m)\big)\Big)}
{\sqrt 2 \Big(
3\tr \big(\mathcal I_{\alpha_0,\alpha_1,\alpha_2}^{\,2}(n,m)\big)
-\tr^2 \big(\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(n,m)\big)\Big)^{3/2}}.
\end{equation*}
\begin{ex}
\label{ex2}
Let the design space be the unit square \ $\mathcal X=[0,1]^2$ \ and consider a nine-point restricted regular grid design, where \ $s_1=t_1=0, \ s_2=d, \ t_2=\delta, \ s_3=t_3=1$, \ with \ $0\leq d,\delta \leq 1$. \ In this case
the FIM \eqref{FIMsheet} equals
\begin{equation*}
\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(d,\delta) =\begin{bmatrix}
L_1(d)M_1(\delta ) & L_2(d)M_1(\delta ) & L_1(d)M_2(\delta ) \\
L_2(d)M_1(\delta ) & L_3(d)M_1(\delta ) & L_2(d)M_2(\delta ) \\
L_1(d)M_2(\delta ) & L_2(d)M_2(\delta ) & L_1(d)M_3(\delta )
\end{bmatrix}
\end{equation*}
with
\begin{alignat*}{3}
L_1(d)&\!:=\!\frac 2{1\!+\!{\mathrm e}^{-\beta d}}\!+\!\frac {1\!-\!{\mathrm e}^{-\beta (1-d)}}{1\!+\!{\mathrm e}^{-\beta (1-d)}}, \
L_2(d)&&\!:=\!\frac d{1\!+\!{\mathrm e}^{-\beta d}}\!+\!\frac {1\!-\!d{\mathrm e}^{-\beta (1-d)}}{1\!+\!{\mathrm e}^{-\beta (1-d)}}, \
L_3(d)&&\!:=\!\frac {d^2}{1\!-\!{\mathrm e}^{-2\beta d}}\!+\!\frac {(1\!-\!d{\mathrm e}^{-\beta (1-d)})^2}{1\!-\!{\mathrm e}^{-2\beta (1-d)}}, \\
M_1(\delta)&\!:=\!\frac 2{1\!+\!{\mathrm e}^{-\gamma \delta}}\!+\!\frac {1\!-\!{\mathrm e }^{-\gamma (1-\delta)}}{1\!+\!{\mathrm e}^{-\gamma (1-\delta)}}, \
M_2(\delta)&&\!:=\!\frac {\delta}{1\!+\!{\mathrm e}^{-\gamma \delta}}\!+\!\frac {1\!-\!\delta {\mathrm e }^{-\gamma (1-\delta)}}{1\!+\!{\mathrm e}^{-\gamma (1-\delta)}}, \
M_3(\delta)&&\!:=\!\frac {\delta^2}{1\!-\!{\mathrm e}^{-2\gamma \delta}}\!+\!\frac {(1\!-\!\delta {\mathrm e }^{-\gamma (1-\delta)})^2}{1\!-\!{\mathrm e}^{-2\gamma (1-\delta)}},
\end{alignat*}
so both the determinant \ $\mathcal D$ \ and the condition number \ $\mathcal K$ \ of \ $\mathcal I_{\alpha_0,\alpha_1,\alpha_2}(d,\delta)$ \ are bivariate functions of \ $d$ \ and \ $\delta$. \ As for all possible parameter values \ $\beta>0$ \ function \ $L_1(d)$ \ reaches its unique maximum at \ $d=1/2$, \ and obviously the same holds for \ $M_1(\delta)$ \ for all \ $\gamma>0$, \ representations \eqref{Dopt} and \eqref{2DDopt} together with the results of Example \ref{ex1} imply that the D-optimal nine-point restricted regular grid design is directionally equidistant.
Similar to the temporal case of Example \ref{ex1}, a non-collapsing K-optimal design exists only outside a certain region of the \ $(\beta,\gamma)$ \ parameter space. In Figures \ref{fig3}a and \ref{fig3}b the \ $d_{opt}$ \ and \ $\delta_{opt}$ \ coordinates of the minimum point of \ $\mathcal K(d,\delta)$ are plotted as functions of parameters, where $0$ values correspond to collapsing designs, whereas Figures \ref{fig3}c and \ref{fig3}d display the corresponding contour plots.
\begin{figure}[t]
\begin{center}
\leavevmode
\hbox{
\epsfig{file=ex2Da_s.pdf,height=6cm, width=8 cm} \quad
\epsfig{file=ex2Db_s.pdf,height=6cm, width=8 cm}}
\centerline{\hbox to 9 truecm {\scriptsize (a) \hfill (b)}}
\smallskip
\leavevmode
\hbox{
\epsfig{file=ex2Dc_new_s.pdf,height=6cm, width=8 cm} \quad
\epsfig{file=ex2Dd_new_s.pdf,height=6cm, width=8 cm}}
\centerline{\hbox to 9 truecm {\scriptsize (c) \hfill (d)}}
\end{center}
\caption{ $d_{opt}$ (a) and \ $\delta_{opt}$ (b) coordinates of the minimum point of the objective function \ $\mathcal K(d,\delta)$ \ and the corresponding contour plots \ ($d_{opt}$: (c); \ $\delta_{opt}$: (d)) for a nine-point restricted regular grid design.}
\label{fig3}
\end{figure}
\end{ex}
\subsection{Optimality of increasing domain equidistant designs}
\label{subs:subs3.1}
Consider now the directionally equidistant regular grid design with step sizes \ $d>0$ \ and \ $\delta>0$ \ consisting of observation locations \ $\boldsymbol \xi = \big\{\big((i\!-\!1)d,(j\!-\!1)\delta\big) : \ i=1,2, \ldots, n, \ j=1,2,\ldots ,m\big\}$. \ In this situation, \ $L_1(n), \ L_2(n)$ \ and \ $L_3(n)$ have forms given by \eqref{entry_d}, and in a similar way we have
\begin{align}
\label{entry_m}
M_1(m)&=\frac {2-m+m{\mathrm e}^{\gamma\delta}}{{\mathrm e}^{\gamma
\delta}+1}, \qquad \qquad M_2(m)=\frac{\delta(m-1)}2 M_1(m), \\
M_3(m)&=\frac {\delta^2(m-1)}{{\mathrm e}^{2\gamma
\delta}-1}\bigg(\frac {m(2m-1)({\mathrm e}^{\gamma \delta}-1)^2}6+m\big({\mathrm e}^{\gamma \delta}-1\big)+1 \bigg). \nonumber
\end{align}
Hence, objective functions \ $\mathcal D$ \ and \ $\mathcal K$ \ are bivariate
functions of \ $d$ \ and \ $\delta$.
\begin{thm}
\label{2Dequiresgen}
For model \eqref{2Dmodel} with covariance structure \eqref{2Doucov} and directionally equidistant increasing domain design with step sizes \
$d>0$ \ and \ $\delta>0$, \ function \ $\mathcal D$ \ is monotone
increasing both in \ $d$ \ and \ $\delta$.
\end{thm}
Similar to Section \ref{subs:subs2.1}, in case of K-optimality one faces a different situation.
\begin{ex}
\label{ex3}
Consider the four-point increasing domain regular grid design \ $\big\{(0,0),(d,0),(0,\delta),(d,\delta)\big\}$ \ for the process \eqref{2Dmodel} with parameters \ $\beta=0.2, \ \gamma=0.3$. \ By Theorem \ref{2Dequiresgen}, there is no D-optimal design, whereas Figures \ref{fig4}a and \ref{fig4}b showing the objective function \ $\mathcal K(d,\delta)$ \ and the corresponding contour plot, respectively, clearly indicate the existence of a K-optimal design.
\begin{figure}[t]
\begin{center}
\leavevmode
\hbox{
\epsfig{file=kopt2da_s.pdf,height=6cm, width=8 cm} \quad
\epsfig{file=kopt2db_s.pdf,height=6cm, width=8 cm}}
\centerline{\hbox to 9 truecm {\scriptsize (a) \hfill (b)}}
\end{center}
\caption{Objective function \ $\mathcal K(d,\delta)$ \ (a) and the corresponding contour plot (b) of a four-point regular grid design with
\ $\beta=0.2, \ \gamma=0.3$.}
\label{fig4}
\end{figure}
\end{ex}
\subsection{Comparison of equidistant designs}
\label{subs:subs3.2}
Again, given a fixed design space \ ${\mathcal X}=[a_1,b_1]\times [a_2,b_2], \ a_1<b_1, \ a_2<b_2$, \ we are interested in the effect of refining the directionally equidistant regular grid design by doubling the number of partition intervals in one direction (by symmetry it suffices to deal, for instance, with the first coordinate) or in both coordinate directions. Further, we also consider the case when doubling of the partition intervals in a given coordinate direction is combined with doubling the corresponding dimension of the design space. Obviously, assumption \ ${\mathcal X}=[0,1]^2$ \ does not violate generality, and we may consider
designs \ $\boldsymbol \xi_{n,m}$, \ $\boldsymbol \xi_{2n,m}$ \ and \
$\boldsymbol \xi_{2n,2m}$, \ on \ $\mathcal X$ \ with \ $\boldsymbol \xi_{n,m}:=\big \{(i/n,j/m): i=0,1, \ldots ,n, \ j=0,1,\ldots ,m\big\}, \ n,m \!\geq\! 2, \ n,m\in{\mathbb N}$, \ design \ $\widetilde{\boldsymbol \xi}_{2n,2m}:=\big \{(i/n,j/m): i=0,1, \ldots ,2n, \ j=0,1,\ldots ,2m\big\}$ \ on \ $\widetilde{\mathcal X}:=[0,2]^2$ \ and \ $\widehat{\boldsymbol \xi}_{2n,m}:=\big \{(i/n,j/m): i=0,1, \ldots ,2n, \ j=0,1,\ldots ,m\big\}$ \ on \ $\widehat{\mathcal X}:=[0,2]\times [0,1]$.
\begin{thm}
\label{2Ddoublim}
For model \eqref{2Dmodel} with covariance structure \eqref{2Doucov}
\begin{equation*}
\lim_{n,m\to\infty}\frac {{\mathcal D}(2n,2m)}{{\mathcal D}(n,m)}=
\lim_{n,m\to\infty}\frac {{\mathcal D}(2n,m)}{{\mathcal D}(n,m)}=
\lim_{n,m\to\infty}\frac {{\mathcal K}(2n,2m)}{{\mathcal K}(n,m)}=
\lim_{n,m\to\infty}\frac {{\mathcal K}(2n,m)}{{\mathcal K}(n,m)}=1,
\end{equation*}
where \ $\mathcal D(n,m)$ \ and \ $\mathcal K(n,m)$ \ are the values of
the objective functions \eqref{2DDopt} and \eqref{2DKopt}, respectively,
corresponding to the design \ $\boldsymbol \xi_{n,m}$ \ on \ ${\mathcal X}$.
\end{thm}
Using Theorem \ref{2Ddoublim}, on can formulate a similar conclusion as in the case of OU processes. In particular, after a sufficiently large amount of grid design points there is no need of further refinement of the grid.
\begin{thm}
\label{2Ddoubintlim}
For model \eqref{2Dmodel} with covariance structure \eqref{2Doucov}
\begin{equation*}
\lim_{n,m\to\infty}\frac {\widetilde{\mathcal D}(2n,2m)}{{\mathcal D}(n,m)}\!=\!\widetilde D(\beta)\widetilde D(\gamma)
\quad \text{and} \quad
\lim_{n,m\to\infty}\frac {\widehat{\mathcal D}(2n,m)}{{\mathcal D}(n,m)}\!=\!\widetilde D(\beta), \qquad \text{with} \qquad \widetilde D(\beta)\!:=\!\frac{2(\beta\!+\!1)}{\beta\!+\!2}D(\beta),
\end{equation*}
where \ $D(\beta)$ \ is defined by \eqref{DKform}, whereas \ $\widetilde{\mathcal D}(2n,2m)$ \ and \ $\widehat{\mathcal D}(2n,m)$ \ denote the values of the objective function \eqref{2DDopt} corresponding to designs
\ $\widetilde{\boldsymbol \xi}_{2n,2m}$ \ and \ $\widehat{\boldsymbol \xi}_{2n,m}$, \ respectively.
\end{thm}
\begin{figure}[t]
\begin{center}
\leavevmode
\hbox{
\epsfig{file=rKn2m2_new_s.pdf,height=6cm, width=8 cm} \quad
\epsfig{file=rKn2m_new_s.pdf,height=6cm, width=8 cm}}
\centerline{\hbox to 9 truecm {\scriptsize (a) \hfill (b)}}
\end{center}
\caption{Limiting functions \ $\widetilde K(\beta,\gamma)$ \ (a) and \ $\widehat K(\beta,\gamma)$ \ (b) of \ $\widetilde{\mathcal K}(2n,2m)/{\mathcal K}(n,m)$ \ and \ $\widehat{\mathcal K}(2n,m)/{\mathcal K}(n,m)$ \ as \ $n,m\to \infty$. }
\label{fig5}
\end{figure}
As \ $\widetilde D(\beta)$ \ is strictly increasing with \ $\lim_{\beta\to 0}\widetilde D(\beta)=2$ \ and \ $\lim_{\beta\to\infty}\widetilde D(\beta)=32$, \ if one has a dense enough directionally equidistant grid of observations, the extension of the design space along a coordinate direction will at least double the information on the unknown regression parameters $(\alpha_0,\alpha_1,\alpha_2)$.
Now, denote by $\widetilde{\mathcal K}(2n,2m)$ \ and \ $\widehat{\mathcal K}(2n,m)$ \ the values of the objective function \eqref{2DKopt} corresponding to designs \ $\widetilde{\boldsymbol \xi}_{2n,2m}$ \ and \ $\widehat{\boldsymbol \xi}_{2n,m}$, \ respectively, and let
\begin{equation*}
\widetilde K(\beta,\gamma):=\lim_{n,m\to\infty}\frac {\widetilde{\mathcal K}(2n,2m)}{{\mathcal K}(n,m)} \qquad \text{and} \qquad
\widehat K(\beta,\gamma):=\lim_{n,m\to\infty}\frac {\widehat{\mathcal K}(2n,m)}{{\mathcal K}(n,m)}.
\end{equation*}
Due to the very complicated form of the objective function \eqref{2DKopt} one cannot provide feasible expressions for the limiting functions\ $\widetilde K(\beta,\gamma)$ \ and \ $\widehat K(\beta,\gamma)$, \ plotted in Figures \ref{fig5}a and \ref{fig5}b, respectively. In contrast to the D-optimal design, \ $\widehat K(\beta,\gamma)$ \ depends not only on \ $\beta$. \ Moreover, there is a substantial difference compared to the one dimensional case, since \ $\widetilde K(\beta,\gamma)$ \ seems to have a maximum point.
\section{Simulation results}
\label{sec:sec4}
\begin{figure}[t]
\begin{center}
\leavevmode
\hbox{
\epsfig{file=sim1D3p_L.pdf,height=6cm, width=8 cm} \quad
\epsfig{file=sim1D3p_U.pdf,height=6cm, width=8 cm}}
\centerline{\hbox to 9 truecm {\scriptsize (a) \hfill (b)}}
\end{center}
\caption{Average mean squared errors \ $\mse_K$ \ and \ $\mse_D$ \ of GLS estimates of parameters based on three-point restricted K- and D-optimal designs and relative efficiency \ ($\eff:= {\mse_K}/{\mse_D}\times 100\%$) \ plotted against the parameter \ $\beta$ \ for the intervals (a) \ $]0,\beta^*[, \ \beta^*\approx 0.5718$, \ and (b) \ $]\beta^{**},100], \ \beta^{**}\approx 4.9586$, \ respectively.}
\label{fig6}
\end{figure}
To illustrate the differences between K- and D-optimal designs, computer simulations using Matlab R2014a are performed. In general, the driving stationary Ornstein-Uhlenbeck processes and fields of models \eqref{model} and \eqref{2Dmodel}, respectively, can be simulated either
with the help of discretization \citep[see, e.g.,][]{gil} or using their Karhunen-Lo\`eve expansions based on representations \eqref{ourep} and \eqref{2Dourep} \citep{jb,bs}. However, in our simulation study, due to the small number of locations, it is sufficient to draw samples from the corresponding finite dimensional distributions.
In each of the following examples, \ $10000$ \ independent samples of
the driving Gaussian processes are simulated and the average mean squared errors (MSE) of the generalized least squares (GLS) estimates of the regression parameters based on samples corresponding to different designs are calculated.
\begin{ex}
\label{ex4}
Consider the model \eqref{model} with true parameter values \ $\alpha_0=\alpha_1=1$ \ and standard deviation parameter \ $\sigma=1/4$ \ defined on the unit interval \ $[0,1]$, \ and the three-point restricted design \ $\{0,d,1\}$. \ As it has been mentioned in Example \ref{ex1}, the D-optimal design for all \ $\beta>0$ \ is equidistant, whereas K-optimal design exists only for parameter values \ $0<\beta <\beta^*\approx 0.5718$ \ and \ $\beta> \beta^{**}\approx 4.9586$. \
Figures \ref{fig6}a and \ref{fig6}b display the average mean squared errors \ $\mse_K$ \ and \ $\mse_D$ \ of the GLS estimates of parameters based on K- and D-optimal designs plotted against the parameter \ $\beta$ \ together with the relative efficiency
\begin{equation}
\label{eff}
\eff:=\frac {\mse_K}{\mse_D}\times 100\%
\end{equation}
for the intervals \ $]0,\beta^*[$ \ and \ $]\beta^{**},100]$, \ respectively. Observe that for small parameter values the difference in MSE is negligible, whereas for parameters from the upper interval the K-optimal design exhibits a superior overall performance.
\end{ex}
\begin{ex}
\label{ex5}
Consider the model \eqref{2Dmodel} with true parameter values \ $\alpha_0=\alpha_1=\alpha_1=1$ \ and standard deviation parameter \ $\sigma=1/4$ \ defined on the unit square \ $[0,1]^2$, \ and the nine-point restricted regular grid design \ $\{(0,0),(0,\delta),(0,1),(d,0),(d,\delta),(d,1), (1,0),(1,\delta),(1,1)\}$. \ According to the results of Example \ref{ex2}, for all positive values of \ $\beta$ \ and \ $\gamma$ \ the D-optimal design is directionally equidistant, that is \ $d=\delta=1/2$, \ whereas a non-collapsing K-optimal design exists only in a certain region of the parameter space, see Figure \ref{fig3}.
\begin{table}[b]
\begin{center}
\hbox{\small
\begin{tabular}{c|rrrrr}
$\beta \setminus \gamma$&0.01&0.03&0.05&0.10&0.15 \\ \hline
0.01&100.88&99.45&97.53&101.60&96.92\\
0.03&99.43&101.54&100.12&99.22&104.38\\
0.05&100.79&100.33&102.00&97.51&97.46\\
0.10&101.37&99.91&99.61&99.86&99.66\\
0.15&100.94&99.51&102.65&98.48&102.48
\end{tabular}
\qquad
\begin{tabular}{c|rrrrr}
$\beta \setminus \gamma$&10&15&20&25&30 \\ \hline
10&115.33&109.19&105.53&102.89&99.14\\
15&108.18&104.65&96.49&95.25&93.80\\
20&103.93&100.66&95.09&93.61&93.70\\
25&100.50&95.92&94.18&93.20&89.28\\
30&102.91&96.98&94.14&90.04&88.90
\end{tabular}
}
\caption{Relative efficiency $\eff$ (\%) of MSEs of GLS estimates of regression parameters based on nine-point restricted K- and D-optimal regular grid designs for various values of \ $\beta$ \ and \ $\gamma$.}
\label{tab1}
\end{center}
\end{table}
In Table \ref{tab1} the relative efficiencies \eqref{eff} of the MSEs of the GLS estimates of regression parameters based on nine-point restricted K- and D-optimal regular grid designs are reported for different values of \ $\beta$ \ and \ $\gamma$. \ Similar to the temporal case of Example \ref{ex4}, for large parameter values, if a non-collapsing K-optimal design exists, it will outperform the corresponding D-optimal one.
\end{ex}
\section{Conclusions}
\label{sec:sec5}
We investigate the properties of K-optimal designs for temporal and spatial linear regression models driven by OU processes and sheets, respectively, and highlight the differences compared with the corresponding D-optimal sampling.
We study the problems of existence of K-optimal designs and also investigate the dependence of the two designs on the covariance parameters of the driving processes. This information may be crucial for an experimenter in order to increase efficiency in practical situations. Simulation results display the superiority of restricted K-optimal designs for large covariance parameter values.
\subsection*{Acknowledgments}
This research was supported by
the J\'anos Bolyai Research Scholarship of the Hungarian Academy of Sciences and by the Hungarian -- Austrian intergovernmental S\&T cooperation program T\'ET\_{}15-1-2016-0046. The author is indebted to Milan Stehl\'\i k for his valuable suggestions and remarks.
\begin{appendix}
\section{Appendix}
\label{sec:secA}
\subsection{Correlation structure of observations}
\label{subs:subsA.1}
The correlation matrix of observations \ $\big\{ Y(s_i), \
i=1,2,\ldots ,n\big\}, \ n\geq 2,$ \ of the stochastic process \eqref{model}
equals
\begin{equation*}
C(n)=
\begin{bmatrix}
1 &p_1 &p_1p_2 &p_1p_2p_3 &\dots &\dots &\prod_{i=1}^{n-1}p_i \\
p_1 &1 &p_2 &p_2p_3 &\dots &\dots &\prod_{n=2}^{n-1}p_i \\
p_1p_2 &p_2 &1 &p_3 &\dots &\dots &\prod_{i=3}^{n-1}p_i \\
p_1p_2p_3 &p_2p_3 &p_3 &1 &\dots &\dots &\vdots \\
\vdots &\vdots &\vdots &\vdots &\ddots & &\vdots \\
\vdots &\vdots &\vdots &\vdots & &\ddots &p_{n-1} \\
\prod_{i=1}^{n-1}p_i &\prod_{i=2}^{n-1}p_i
&\prod_{i=3}^{n-1}p_i &\dots &\dots &p_{n-1} &1\\
\end{bmatrix},
\end{equation*}
where \ $p_i:=\exp(-\beta d_i)$ \ and \ $d_i:=s_{i+1}-s_i, \ i=1,2, \ldots
,n-1$. \ According to the results of \citet{ks}, the inverse of \
$C(n)$ \ is given by
\begin{equation*}
C^{-1}(n)=
\begin{bmatrix}
\frac{1}{1-p_1^2} &\frac{p_1}{p_1^2-1} &0 &0 &\dots &\dots &0 \\
\frac{p_1}{p_1^2-1} &V_{2} &\frac{p_2}{p_2^2-1} &0 &\dots &\dots &0 \\
0 &\frac{p_2}{p_2^2-1} &V_{3} &\frac{p_3}{p_3^2-1} &\dots &\dots &0 \\
0 &0 &\frac{p_3}{p_3^2-1} &V_{4} &\dots &\dots &\vdots \\
\vdots &\vdots &\vdots &\vdots &\ddots & &\vdots \\
\vdots &\vdots &\vdots &\vdots & &V_{n-1} &\frac{p_{n-1}}{p_{n-1}^2-1} \\
0 &0 &0 &\dots &\dots &\frac{p_{n-1}}{p_{n-1}^2-1} &\frac{1}{1-p_{n-1}^2}\\
\end{bmatrix},
\end{equation*}
where \ $V_k:=\frac{1-p_k^2p_{k-1}^2}{(p_k^2-1)(p_{k-1}^2-1)}=\frac
1{1-p_k^2}+ \frac {p_{k-1}^2}{1-p_{k-1}^2}, \ k=2,\dots,n-1$.
\subsection{Proof of Theorem \ref{equiresgen}}
\label{subs:subsA.2}
Using form \eqref{entry_d} of the entries of the information matrix, a
short calculation shows
\begin{equation*}
{\mathcal D}(d)=J_n(\beta d) \frac{n\!-\!1}{\beta^2}F_n(\beta d),
\end{equation*}
with
\begin{equation}
\label{detdecomp}
J_n(d):=\frac {2\!-\!n\!+\!n{\mathrm e}^d}{{\mathrm e}^d\!+\!1}\geq 1
\quad \text{and} \quad
F_n(d):=\frac{d^2}{{\mathrm e}^{2d}\!-\!1}\left(
\frac{n(n\!+\!1)}{12}\big({\mathrm e}^{d}\!-\!1\big)^2
\!+\! \frac{n\!+\!1}2\big({\mathrm e}^{d}\!-\!1\big)\!+\!1\right)\geq 0,
\end{equation}
where \ $J_n(d)$ \ is a strictly increasing function of
\ $d$. \ Hence, in order to prove the first statement of Theorem
\ref{equiresgen}, it suffices to show that \ $F_n(d)$ \ is also
strictly increasing for all integers \ $n\geq 2$. \ This latter property
obviously holds for
\begin{equation*}
F_2(d)=\frac {d^2}{2(1-{\mathrm e}^{-d})} \qquad \text{and} \qquad
F_3(d)=\frac {d^2}{1-{\mathrm e}^{-2d}},
\end{equation*}
whereas for \ $n\geq 4$ \ one can consider the decomposition
\begin{equation*}
F_n(d)=F_3(d)G_n(d), \qquad \text{where} \qquad
G_n(d):=\frac 1 {{\mathrm
e}^{2d}}\left(\frac{n(n+1)}{12}\big({\mathrm e}^{d}-1\big)^2
+ \frac{n+1}2\big({\mathrm e}^{d}-1\big)+1\right).
\end{equation*}
A short calculation shows that the numerator of \ $G'_n(d)$ \ equals
\begin{equation*}
\frac {{\mathrm e}^{2d}(n-3)}6\big({\mathrm e}^{d}(n+1)-n+2\big )\geq
\frac {{\mathrm e}^{2d}(n-3)}2>0,
\end{equation*}
which completes the proof of monotonicity of \ ${\mathcal D}(d)$.
Now, \eqref{Ropt} and \eqref{entry_d} imply
\begin{equation}
\label{Kopt_d}
\mathcal R(d)=\frac {\Big(n({\mathrm e}^{\beta
d}\!-\!1)^2\big((n\!-\!1)(2n\!-\!1)d^2+6\big)/6 +({\mathrm e}^{\beta
d}\!-\!1)\big(n(n\!-\!1)d^2+2 \big)+(n\!-\!1)d^2 \Big)^2}
{d^2(n\!-\!1)({\mathrm e}^{\beta
d}\!-\!1)\big(n(n\!+\!1)({\mathrm e}^{\beta
d}\!-\!1)^2/12+(n\!+\!1)({\mathrm e}^{\beta
d}\!-\!1)/2+1 \big)\big(n({\mathrm e}^{\beta d}\!-\!1)+2\big)}.
\end{equation}
After dividing both the numerator and the denominator of the right-hand
side of \eqref{Kopt_d} by \ ${\mathrm e}^{4\beta d}$, \ one can easily
see
\begin{equation}
\label{Klim_r}
\lim_{d\to\infty} \mathcal R(d)=\lim_{d\to\infty}\frac{n^2\big((n-1)(2n-1)d^2+6\big)^2}{3n^2
\big(n^2-1\big)d^2}=\infty.
\end{equation}
In a similar way, taking into account that \ $\lim_{d\to 0}\big({\mathrm e}^d-1\big)/d=1$, \ the division of both the numerator and the denominator of \ ${\mathcal R}(d)$ \ by \ $d^2({\mathrm e}^{\beta d}-1)$ \ results in
\begin{equation*}
\lim_{d\to 0} \mathcal R(d)=\lim_{d\to 0}\frac {\Big(nd^{1/2}\big((n-1)(2n-1)d^2+6\big)/6 +\big(n(n-1)d^{3/2}+2d^{-1/2} \big)+(n-1)d^{1/2} \Big)^2}{2(n-1)} =\infty,
\end{equation*}
which together with \eqref{Klim_r} implies that \ $\mathcal R(d)$ \ should have at least one global minimum. \proofend
\subsection{Proof of Theorem \ref{eqirestwop}}
\label{subs:subsA.3}
For \ $n=2$ \ expression \eqref{Kopt_d} simplifies to
\begin{equation*}
\mathcal R(d)=\frac {\big((d^2+2){\mathrm e}^{\beta
d}-2\big)^2}{d^2\big({\mathrm e}^{2\beta d}-1\big)},
\end{equation*}
and
\begin{equation*}
\mathcal R'(d)=\frac{2\big((d^2\!+\!2){\mathrm e}^{\beta d}\!-\!2\big)}{d^3
\big({\mathrm e}^{2\beta d}\!-\!1\big)^2} R(d) \quad \text{with} \quad
R(d):= (d^2-2){\mathrm e}^{3\beta d}+2(\beta d+1){\mathrm e}^{2\beta
d} - (\beta d^3+d^2+2\beta d -2){\mathrm e}^{\beta d}-2.
\end{equation*}
For \ $d\geq 0$ \ the derivative \ $\mathcal R'(d)$ \
equals \ $0$ \ if and only if equation \eqref{twopeq} holds, that is \ $R(d)=0$. \
Hence, to complete the proof of Theorem \ref{eqirestwop}, it remains
two show that \eqref{twopeq} has a unique non-negative solution and
this solution is the minimum of \ $\mathcal R(d)$. \
Now, observe that \ $R(d)$ \ admits the representation
\begin{equation*}
R(d)=d^2R^{(1)}(\beta d)-2R^{(2)}(\beta d),
\end{equation*}
where
\begin{equation*}
R^{(1)}(x):={\mathrm e}^x\big({\mathrm e}^{2x}-x-1\big)>0
\quad \text{and} \quad R^{(2)}(x):=
\Big({\mathrm e}^x\big({\mathrm e}^x-x-1\big)+\big({\mathrm e}^x-1\big)\Big)\big({\mathrm e}^x-1\big)>0, \ \ \text{for} \ \ x>0.
\end{equation*}
In this way
\begin{equation}
\label{Rroot}
R(d)=0 \qquad \text{if and only if} \qquad \frac {d^2}2=\frac {R^{(2)}(\beta d)}
{R^{(1)}(\beta d)}.
\end{equation}
A short calculation shows that \ ${R^{(2)}(x)}/ {R^{(1)}(x)}$ \ is strictly monotone increasing and strictly concave. Further, we have
\begin{equation*}
\lim_{x\to 0} \frac {R^{(2)}(x)} {R^{(1)}(x)}=0 \qquad \text{and} \qquad
\lim_{x\to \infty} \frac {R^{(2)}(x)} {R^{(1)}(x)}=1.
\end{equation*}
Hence, by the convexity of \ $d^2/2$, \ for all \ $\beta >0$ \ the equation on the right hand side of \eqref{Rroot} has a single solution (obviously, depending on \ $\beta$). \ Moreover, as for all \ $\beta >0$,
\begin{equation*}
\lim_{d\to 0}R(d)=0 \qquad \text{and} \qquad \lim_{d\to \infty}R(d)=\infty,
\end{equation*}
if \ $R(d)$ \ has a change of sign at this unique root, the change shall be from negative to positive. This means that the solution of \eqref{twopeq} is the unique minimum of \ $\mathcal R(d)$. \ Thus, it remains to show that for all \ $\beta >0$, \ one can find some \ $d>0$ \ such that \ $R(d)<0$.
Consider the decomposition
\begin{equation*}
R(d)={\mathrm e}^{\beta d} \big(d^2Q^{(1)}(d) -2{\mathrm e}^{\beta
d}Q^{(2)}(d)\big)-2Q^{(3)}(d),
\end{equation*}
where
\begin{align*}
&Q^{(1)}(d):={\mathrm e}^{2\beta d}-
\beta^2\Big(\frac{\beta d}3+1\Big) {\mathrm e}^{\beta d} -\beta
d-1, \\[1mm]
Q^{(2)}(d):={\mathrm e}^{\beta d}&\,-
\Big(\frac{\beta^3 d^3}6+\frac{\beta^2d^2}2+\beta d+1\Big), \qquad
Q^{(3)}(d):={\mathrm e}^{\beta d}(\beta d-1)+1.
\end{align*}
Using Taylor series expansions one can easily see that for all \ $x>0$
\begin{equation*}
1-x <{\mathrm e}^{-x} \qquad \text{and} \qquad 1+x+\frac{x^2}2+\frac
{x^3}6 <{\mathrm e}^x,
\end{equation*}
implying for all \ $d>0$ \ and \ $\beta>0$ \ the positivity of \
$Q^{(3)}(d)$ \ and \ $Q^{(2)}(d)$, \ respectively. Finally,
\begin{equation*}
\lim_{d\to 0} Q^{(1)}(d)=-\beta^2 \qquad \text{and} \qquad \lim_{d\to
\infty} Q^{(1)}(d)=\infty,
\end{equation*}
thus, for all \ $\beta >0$ \ there exist a \ $d>0$ \ such that \
$Q^{(1)}(d)<0$, \ which completes the proof. \proofend
\subsection{Proof of Theorem \ref{doublim}}
\label{subs:subsA.4}
Under the settings of the theorem \ ${\mathcal D}(n)= L_1(n+1)L_3(n+1)-L_2^2(n+1)$ \ and \ ${\mathcal K}(n)=g\big(\mathcal R(n)\big)$ \ with \ ${\mathcal R}(n)=\big(L_1(n+1)+L_3(n+1)\big)^2 / \mathcal D(n)$ \
and \ $g(x):=\frac 14 \big(\sqrt{x}+\sqrt{x-4}\big)^2$, \
where the expressions for \ $L_1(n+1), \ L_2(n+1)$ \ and \
$L_3(n+1)$ \ can be obtained using \eqref{entry_d} with \
$d=1/n$. \
Since for all \ $\beta>0$
\begin{equation*}
\lim_{n\to\infty} n\big({\mathrm e}^{\beta /n}-1\big)=\beta,
\end{equation*}
one can easily show
\begin{align}
\label{Llim}
\lim_{n\to\infty}L_1(n+1)=&\lim_{n\to\infty}L_1(2n+1)=\frac{\beta} 2+1,
\qquad \lim_{n\to\infty}L_2(n+1)=\lim_{n\to\infty}L_2(2n+1)=\frac{\beta} 4+\frac 12, \\
&\lim_{n\to\infty}L_3(n+1)=\lim_{n\to\infty}L_3(2n+1)=\frac 1{2\beta}\left(\frac{\beta^2}3+\beta +1\right), \nonumber
\end{align}
which completes the proof. \proofend
\subsection{Proof of Theorem \ref{doubintlim}}
\label{subs:subsA.5}
Similar to the proof of Theorem \ref{doublim} we have \
$\widetilde{\mathcal D}(2n)= \widetilde L_1(2n+1)\widetilde L_3(2n+1)-\widetilde L_2^2(2n+1)$ \ and \ $\widetilde{\mathcal K}(2n)=g\big(\widetilde{\mathcal R}(2n)\big)$ \ with \
$\widetilde {\mathcal R}(2n)=\big(\widetilde L_1(2n+1)+\widetilde L_3(2n+1)\big)^2 / \widetilde{\mathcal D}(2n)$, \
where now the expressions for \ $\widetilde L_1(2n+1), \ \widetilde L_2(2n+1)$ \ and \ $\widetilde L_3(2n+1)$ \ can be obtained using \eqref{entry_d} for \ $2n+1$ \ design points with \ $d=1/n$. \ Hence, the limits in \eqref{kint_lim} are direct consequences of \eqref{Llim} and
\begin{equation*}
\lim_{n\to\infty}\widetilde L_1(2n+1)=\beta +1,
\qquad \lim_{n\to\infty}\widetilde L_2(2n+1)=\beta +1 , \qquad
\lim_{n\to\infty}\widetilde L_3(2n+1)=\frac 1{\beta}\left(\frac 43{\beta^2}+2\beta +1\right).
\end{equation*}
\proofend
\subsection{Proof of Theorem \ref{FIMsheet}}
\label{subs:subsA.6}
For the regular grid design introduced in Section \ref{sec:sec3}, the covariance matrix \ $C(n,m)$ \ of observations admits the decomposition
\begin{equation*}
C(n,m)=P(n)\otimes Q(m),
\end{equation*}
where \ $P(n)$ \ and \ $Q(m)$ \ are covariance matrices of observations of OU processes with covariance parameters \ $\beta>0$ \ and \ $\gamma>0$ \ in time points \ $s_1<s_2<\ldots < s_n$ \ and \ $t_1<t_2<\ldots < t_m$, respectively (see \citet{bss} or the online supplement of \citet{bsschemo}). In this way,
\begin{equation}
\label{Cinvdecomp}
C^{-1}(n,m)=P^{-1}(n)\otimes Q^{-1}(m),
\end{equation}
where for the exact forms of $P^{-1}(n)$ \ and \ $Q^{-1}(m)$ \ see \ref{subs:subsA.1}.
Further,
\begin{equation}
\label{Gdecomp}
G(n,m)=S(n)\otimes {\mathbf 1}_m^{\top}+{\mathbf 1}_n^{\top}\otimes T(m),
\end{equation}
where \ ${\mathbf 1}_n, \ n\in{\mathbb N},$ \ denotes the column vector of ones of length \ $n$, \
\begin{equation*}
S(n):=\begin{bmatrix} 1/2 & 1/2 & \cdots & 1/2 \\ s_1 & s_2 & \cdots &
s_n \\ 0 & 0 & \cdots & 0 \end{bmatrix} \quad \text{and} \quad
T(m):=\begin{bmatrix} 1/2 & 1/2 & \cdots & 1/2 \\ 0 & 0 & \cdots & 0 \\
t_1 & t_2 & \cdots & t_m \end{bmatrix}.
\end{equation*}
Decompositions \eqref{Cinvdecomp} and \eqref{Gdecomp} and the properties of the Kronecker product imply
\begin{align}
\label{FIMdecomp}
{\mathcal I}_{\alpha_0,\alpha_1,\alpha_2}(n,m)\!=&\,\big(S(n)P^{-1}(n)S^{\top}(n)\big) \!\otimes\! \big({\mathbf 1}_m^{\top}Q^{-1}(m){\mathbf 1}_m\big)\!+\!
\big(S(n)P^{-1}(n){\mathbf 1}_n\big) \!\otimes\! \big({\mathbf 1}_m^{\top}Q^{-1}(m)T^{\top}(m)\big) \\
&+\!\big({\mathbf 1}_n^{\top}P^{-1}(n)S^{\top}(n)\big) \!\otimes\! \big(T(m)Q^{-1}(m){\mathbf 1}_m\big)\!+\!\big({\mathbf 1}_n^{\top}P^{-1}(n){\mathbf 1}_n\big)\!\otimes\! \big(T(m)Q^{-1}(m)T^{\top}(m)\big). \nonumber
\end{align}
Matrix manipulations, similar to the proof of \eqref{entry}, show
\begin{alignat*}{2}
S(n)P^{-1}(n)S^{\top}(n)&=
\begin{bmatrix} \frac{L_1(n)}4 & \frac{L_2(n)}2 & 0 \\ \frac{L_2(n)}2 & L_3(n) & 0\\ 0 & 0& 0
\end{bmatrix}, \qquad
T(m)Q^{-1}(m)T^{\top}(m)&&=
\begin{bmatrix} \frac{M_1(m)}4 & 0 & \frac{M_2(m)}2 \\ 0 & 0& 0 \\ \frac{M_2(m)}2 & 0 & M_3(m)
\end{bmatrix},\\
S(n)P^{-1}(n){\mathbf 1}_n&=\begin{bmatrix} \frac{L_1(n)}2 & L_2(n) & 0 \end{bmatrix}^{\top}, \qquad \quad \,
T(m)Q^{-1}(m){\mathbf 1}_m&&=\begin{bmatrix} \frac{M_1(m)}2 & 0 & M_2(m)\end{bmatrix}^{\top},\\[2mm]
{\mathbf 1}_n^{\top}P^{-1}(n){\mathbf 1}_n&=L_1(m),
\qquad \qquad \qquad \qquad \qquad {\mathbf 1}_m^{\top}Q^{-1}(m){\mathbf 1}_m&&=M_1(m),
\end{alignat*}
which together with \eqref{FIMdecomp} implies \eqref{FIMform}. \proofend
\subsection{Proof of Theorem \ref{2Dequiresgen}}
\label{subs:subsA.7}
Using \eqref{2DDopt} and representations \eqref{entry_d} and \eqref{entry_m} of the FIM, a short calculation shows
\begin{align}
\label{Dprod}
{\mathcal D}(d,\delta)&=\left(L_1^2(n)\Big(L_3(n)-\frac {d^2(n-1)^2}4 L_1(n)\Big)\right)\left(M_1^2(m)\Big(M_3(m)-\frac {\delta^2(m-1)^2}4 M_1(m)\Big)\right)\\
&=\left( J_n^2(\beta d) \frac{n-1}{\beta^2}F_n(\beta d)\right)\left( J_m^2(\gamma \delta) \frac{m-1}{\gamma^2}F_m(\gamma \delta)\right), \nonumber
\end{align}
where functions \ $J_n(d)$ \ and \ $F_n(d)$ \ are defined by \eqref{detdecomp}. As both functions are strictly increasing in \ $d$ \ for all integers \ $n\geq 2$, \ decomposition \eqref{Dprod} directly implies the statement of Theorem \ref{2Dequiresgen}. \proofend
\subsection{Proof of Theorem \ref{2Ddoublim}}
\label{subs:subsA.8}
The statement of the theorem is a direct consequence of \eqref{Llim} and the corresponding limits of \ $M_1(m+1), \ M_2(m+1)$ \ and \ $M_3(m+1)$ \ as \ $m\to \infty$, \ where expressions for \ $M_i(m+1), \ i=1,2,3,$ \ can be obtained using \eqref{entry_m} with \ $\delta=1/m$. \proofend
\end{appendix}
|
\section{Introduction}
Recently there has been an upsurge of interest towards the behaviour of the so-called active fluids
whose elementary constituents are either self-propelled due their ability to convert energy into motion, for instance by
chemical reactions, or receive the energy and impulse necessary to their motion when in contact with living matter, such as bacteria~\cite{bechinger2016,marchetti2013hydrodynamics,marchetti2015structure,poon2013clarkia,romanczuk2012active,
elgeti2014physics}. Examples of active matter systems include self-propelled colloids, swimming bacteria, biological motors, swimming fish and flocking birds. The phenomenology of active fluids is quite different
from that characterizing out-of-equilibrium molecular fluids, often referred as passive fluids, and for this reason the field is so fascinating.
The theoretical studies are based on phenomenological models, constructed by using physical
insight, with the aim to reproduce the complex biological mechanisms or chemical reactions
determining the observed dynamics \cite{cates2012diffusive,bialke2014negative,fily2012athermal,stenhammar2013continuum}.
Among these models we mention the important work of Cates, Tailleur and coworkers \cite{tailleur2008statistical,cates2013active} who elaborated the Run-and-Tumble (RnT) model of Berg \cite{berg2004coli} and Schnitzer \cite{schnitzer1993theory}. Such a model is based on the observations that the trajectories of individual bacteria consist of relatively straight segments (runs) alternated by erratic motions which cause the successive pieces of trajectory to be in almost random relative directions (tumbles). The persistence length of the trajectory sets the crossover between a ballistic regime at short time scales and a diffusive regime at longer times.
Similarly chemically propelled synthetic Janus colloids have a persistent propulsion
direction which is gradually reoriented by Brownian fluctuations~\cite{zheng2013nongaussian} (active Brownian particles). Also an ensemble of colloidal particles suspended in a "bath" of such bacteria, is a particular realization of an active fluid~\cite{maggi2014generalized,koumakis2014delivery,koumakis2013targeted,maggi2011effective}.
Our description, at variance with the Cates and Tailleur model and the active Brownian model, involves only translational degrees of freedom of the particles,
but not their orientations, and represents somehow a coarse-grained version of these models
as also discussed by Farage et al.~\cite{farage2015effective,marconi2015towards}.
In the present model in order to capture the peculiar character of the RnT motion
on a coarse-grained time scales one introduces a colored noise, that is noise with a finite memory, which represents the persistence of the motion of the bacteria.
The observed behaviour displays a relevant feature: the particles display a spontaneous tendency to aggregate even in the absence of mutual attractive forces, as a result of the combined effect of colored noise and interactions. This is a dynamic mechanism leading to a decrease of the particle effective mobility when the density increases.
Clearly this behaviour cannot be described by standard equilibrium statistical mechanics, but it is possible to make progress in our understanding by applying kinetic methods and the theory of stochastic processes \cite{marconi2010dynamic} .
This paper is organized as follows: in Sec. \ref{Model} we present the coarse-grained stochastic model
describing an assembly of active particles, consisting of a set of coupled Langevin equations for the coordinates of the particles
subject to colored Gaussian noise. After switching from the Langevin description to the corresponding Fokker-Planck equation
we obtain the stationary joint probability distribution of $N$ particles within the multidimensional unified colored noise approximation (MUCNA) \cite{hanggi1995colored,cao1993effects,maggi2015multidimensional,marconi2015velocity}.
The resulting configurational distribution function can be written explicitly for a vast class of inter-particle potentials
and shows the presence of non-pairwise effective interactions due to the coupling between direct forces
and the colored noise. To reduce the complexity of the problem
in section \ref{Effectivepotential} we discuss whether it is possible to further simplify the theoretical study by introducing a pairwise effective potential. We analyze such an issue analytically by means of a system of just two particles in an external field and
numerically using a one-dimensional system of $N$ soft repulsive spheres.
Our results show the limits of the effective two-body potential method. Finally in the last section we present our conclusions. Two appendices are included: in appendix \ref{multipletimescale} we derive the UCNA approximation by means of multiple time-scale analysis and in \ref{appendixdeterminant} we obtain the key approximation of the theory necessary to evaluate the
functional determinant of the MUCNA in the case of a many-particle system.
\section{Model system}
\label{Model}
In this section, we briefly describe the salient assumptions employed to formulate the model adopted in the present work. First consider an assembly of $N$ over-damped active Brownian particles at positions ${\bf r}_i$, self-propelling with constant velocity $v_0$ along orientations $\boldsymbol{n}_i$, which change in time according to the stochastic law
\be
\dot{\boldsymbol{n}}_i =\sqrt{D_r} \boldsymbol{\eta}_i\times\boldsymbol{n}_i
\label{orientation}
\end{equation}
where $\boldsymbol{\eta}_i(t)$ are Gaussian random processes distributed with zero mean,
time-correlations
$\langle\boldsymbol{\eta}_i(t)\boldsymbol{\eta}_j(t')\rangle=2\boldsymbol{1}\delta_{ij}\delta(t-t')$, and
$D_r=1/\tau$ is a rotational diffusion coefficient. In addition
the particles experience deterministic forces $\boldsymbol{F}_i =\!-\nabla_i {\cal U}$, generated by the
potential energy $ {\cal U}$. The
resulting governing equations are:
\be
\dot{{\bf r}}_i = v_0\,\boldsymbol{n}_i + \gamma^{-1}\boldsymbol{F}_i ,
\label{full_langevin}
\end{equation}
where $\gamma$ is the friction coefficient.
The resulting dynamics are persistent on short time scales, i.e. the trajectories maintain their orientation for an average time $\tau$,
and diffusive on larger time scales. Hydrodynamic interactions are disregarded for the sake of simplicity together with inertial effects
because particles are typically in a low-Reynolds-number regime \cite{purcell1977life}.
Equations \eqref{orientation} and
\eqref{full_langevin} involve the dynamics of both translational and rotational degrees of freedom and are not a practical starting point for developing a microscopic theory.
Hence, it is convenient to switch to a coarse-grained description stochastically equivalent to the original one on times
larger than $\tau$ . To this purpose, one integrates out the angular coordinates
as shown by Farage et al.\cite{farage2015effective}.
According to this approximation, one introduces a colored stochastic noise term acting on the position coordinates
and replacing the stochastic rotational dynamics \eqref{orientation}.
The effective evolution equations are:
\begin{align}\label{effective_langevin}
\dot{{\bf r}}_i(t) &= \frac{1}{\gamma}\boldsymbol{F}_i(t) + \boldsymbol{u}_i(t),
\end{align}
with
\be\label{exp_correlation}
\dot\boldsymbol{u}_i(t) =- \frac{1}{\tau}\boldsymbol{u}_i(t) + \frac{ D^{1/2}}{ \tau} \boldsymbol{\eta}_i(t)
\end{equation}
where $\boldsymbol{u}_i(t)$ is an Ornstein-Uhlenbeck process with zero mean, time-correlation function given by:
\be
\label{exp_correlation2}
\langle\boldsymbol{u}_i(t)\,\boldsymbol{u}_j(t')\rangle = \frac{D}{\tau} e^{-2 |t-t'|/\tau}\boldsymbol{1}\delta_{ij}.
\end{equation}
and whose diffusion coefficient $D$ is related to the original parameters by $D=v_0^2 \tau /6 $.
In order to derive an equation involving only the positions of the particles we differentiate with respect to time eq.\eqref{effective_langevin}
and with simple manipulations we get the following second order differential equation:
\bea
\ddot x_i= \frac{1}{\gamma} \sum_k \frac{\partial F_i}{\partial x_k} \dot x_k
-\frac{1}{\tau} \left[ \dot x_i-\frac{F_i}{\gamma} \right] +\frac{D^{1/2}}{\tau}\eta_i(t)
\label{sistema}
\end{eqnarray}
where
for the sake of notational economy we indicated by $x_i$ the array $\{{\bf r}_i\}$ and similarly the components of the force.
By performing an adiabatic approximation (see appendix \ref{multipletimescale}) we neglect the terms $\ddot x_i$ and obtain
the following set of Langevin equations for the particles coordinates:
\be
\dot x_i \simeq \sum_k \Gamma^{-1}_{ik} \Bigl[ \frac{1}{\gamma} F_k+
D^{1/2} \eta_k(t) \Bigl]
\label{stochasticxi}
\end{equation}
with the non dimensional friction matrix $\Gamma_{ik}$ defined as
\be
\Gamma_{ik}(x_1,\dots,x_N)=\delta_{ik}+\frac{\tau}{\gamma} \frac{\partial^2 {\cal U}(x_1,\dots,x_N) }{\partial x_i \partial x_k}.
\label{gammamatrix}
\end{equation}
Notice that, within the approximation introduced in eq. \eqref{stochasticxi}, the effective random force corresponds to a multiplicative noise due to its dependence on the state of the system, $x_i(t)$, through the prefactor $\Gamma^{-1}_{ik}(x_1,\dots,x_N)$ in front of the noise term $\eta_k(t)$.
For the sake of concreteness
${\cal U}$ is the sum of one-body and two body contributions:
\be
{\cal U}(x_1,\dots,x_N) =\sum_i u(x_i)+ \sum_{i>j} w(x_i,x_j) .
\end{equation}
The associated multidimensional Smoluchowski equation for the
the configurational distribution function associated with eq. \eqref{stochasticxi}
can be written as (see ref. \cite{marconi2015towards}):
\bea
\frac{ \partial P_N(x_1,\dots,x_N;t)}{\partial t}=-\sum_{l} \frac{\partial }{\partial x_l} \sum_k \Gamma^{-1}_{lk} \Bigl(\frac{1}{\gamma } F_k P_N
- D \sum_{j} \frac{\partial }{\partial x_j}
[ \Gamma^{-1}_{jk} P_N ] \Bigr)
\label{FPE}
\end{eqnarray}
and shows that the effective friction
experienced by each particle also
depends on the coordinates of all other particles.
In order to determine the stationary properties of the model
we apply the following zero current condition in eq. \eqref{FPE} and get:
\bea
&& -T_s \sum_\beta \sum_n \frac{\partial }{\partial r_{\beta n}}[ \Gamma^{-1}_{\alpha l,\beta n}({\bf r}_1,\dots,{\bf r}_N) P_N({\bf r}_1,\dots,{\bf r}_N)]
\nonumber\\&&=
P_N({\bf r}_1,\dots,{\bf r}_N) \Bigl( \frac{\partial u({\bf r}_{\alpha l})}{\partial r_{\alpha l}} + \sum_{k\neq l} \frac{ \partial w({\bf r}_l-{\bf r}_k) }{ \partial r_{\alpha l}}
\Bigl) \, .
\label{FPEstationary}
\end{eqnarray}
The resulting stationary distribution can be written explicitly as
(see ref. \cite{maggi2015multidimensional}):
\be
P_N(x_1,\dots,x_N) = \frac{1}{Z_N} \, \exp \Bigl(- \frac{{\cal H}(x_1,\dots,x_N)}{T_s} \Bigr)
\label{probabilitydistr}
\end{equation}
where we have defined the effective temperature $T_s=D\gamma$ and the effective configurational energy of the system ${\cal H}(x_1,\dots,x_N)$ related to the bare potential energy
${\cal U}(x_1,\dots,x_N)$ by:
\be
{\cal H}(x_1,\dots,x_N) = {\cal U}(x_1,\dots,x_N) +\frac{\tau}{2 \gamma}
\sum_k^N \Bigr(\frac{\partial {\cal U}(x_1,\dots,x_N)}{\partial x_k} \Bigl)^2
- T_s \ln |\det \Gamma_{ik} | ,
\label{hamilt1}
\end{equation}
where $Z_N$ is a normalization constant
\be
Z_N=\mathrm{Tr} \exp \left[- \frac{{\cal H}({\bf r}_1,\dots,{\bf r}_N)}{T_s} \right] .
\end{equation}
with
$\mathrm{Tr} \equiv \int d{\bf r}_1 ,\dots,d{\bf r}_N$.
Formula \eqref{probabilitydistr}, gives within the unified colored noise approximation, a complete information about the
configurational state of a system of $N$ particles, but
it requires the evaluation of a $dN\times dN$ determinant stemming from the matrix $\Gamma_{ik}$, where $d$ is the dimensionality
of the system. One can only get analytic results either by considering non-interacting systems with $d=1,..,3$ or
systems with few particles, where the computation of the determinant is possible.
Thus, in spite of the fact that in principle from the knowledge of $P_N$ is possible to determine all steady properties of the system, including the pair correlation
function of the model, $g({\bf r}_1,{\bf r}_2)$, this task is not possible in practice. The same situation occurs in equilibrium statistical mechanics where from the knowledge
of the canonical Boltzmann distribution of an $N$ particle system we cannot in general exactly determine the n-particle distribution functions with $n<N$. On the other hand,
it is possible to derive a structure similar to the Born-Bogolubov-Green-Yvon
(BBGY) hierarchy of equations linking the n-th order distribution to those of higher order, but it requires
the specification of a closure relation. To this purpose,
we integrate eq. \eqref{FPEstationary}
over $d(N-n)$ coordinates and obtain an equation for the marginalized probability distributions of $n$ particles, $P_N^{(n)}({\bf r}_1,\dots,{\bf r}_n)$ in terms of higher order marginal distributions. When $n=1$ we find:
\bea
&&
T_s \int \int d{\bf r}_2\dots d{\bf r}_N \sum_{\beta=1}^d \sum_{n=1}^N\frac{\partial }{\partial r_{\beta n}}[ \Gamma^{-1}_{\alpha 1,\beta n}({\bf r}_1,\dots,{\bf r}_N) P_N({\bf r}_1,\dots,{\bf r}_N)]=
\nonumber\\
&&
- P^{(1)}_N({\bf r}_1) \frac{\partial u({\bf r}_{ 1})}{\partial r_{\alpha 1}}
- (N-1) \int d{\bf r}_2 P^{(2)}_N({\bf r}_1,{\bf r}_2) \frac{ \partial w({\bf r}_1-{\bf r}_2) }{ \partial r_{\alpha 1}}
\label{p2distrb}
\end{eqnarray}
where Greek indexes stand for Cartesian components.
In the case of a large number of particles the exact matrix inversion necessary to use formula \eqref{p2distrb}
becomes prohibitive. However, we notice
that in the limit of small $(\tau/\gamma)$ and $N\to\infty$ the structure of the matrix $\Gamma^{-1}_{\alpha 1,\beta n}$
becomes much simpler as illustrated in appendix \ref{appendixdeterminant} and can be approximated by
$$
\Gamma^{-1}_{\alpha l,\beta n}({\bf r}_l) \approx \Bigl( \delta_{\alpha\beta}-\frac{\tau}{\gamma} u_{\alpha\beta}({\bf r}_l)-
\frac{\tau}{\gamma} \sum_{k\neq l} w_{\alpha\beta}({\bf r}_l-{\bf r}_k) ) \Bigl)\delta_{ln},
$$
where $u_{\alpha\beta}\equiv \frac{\partial^2 u({\bf r})}{\partial r_\alpha \partial r_\beta}$ and
$w_{\alpha\beta}\equiv \frac{\partial^2 w({\bf r})}{\partial r_\alpha \partial r_\beta}$.
Substituting this approximation in eq. \eqref{p2distrb} we get:
\bea
&&
T_s \sum_\beta \frac{\partial }{\partial r_{\beta 1}}\Bigl[P^{(1)}_N({\bf r}_1) \delta_{\alpha\beta} - \frac{\tau}{\gamma} P^{(1)}_N({\bf r}_1)
u_{\alpha\beta}({\bf r}_1) - (N-1) \frac{\tau}{\gamma} \int \sum_k d{\bf r}_2 P^{(2)}_N({\bf r}_1,{\bf r}_2) w_{\alpha\beta}({\bf r}_1-{\bf r}_2) \Bigl]
\nonumber\\
&&
=- P^{(1)}_N({\bf r}_1) \frac{\partial u({\bf r}_{ 1})}{\partial r_{\alpha 1}}
-(N-1) \int d{\bf r}_2 P^{(2)}_N({\bf r}_1,{\bf r}_2) \frac{ \partial w({\bf r}_1-{\bf r}_2) }{ \partial r_{\alpha 1}}
\label{p2bgy}
\end{eqnarray}
Such an equation, once a prescription for $P^{(2)}_N({\bf r}_1,{\bf r}_2)$ is specified, can be used to derive the density profile of a system of interacting particles under inhomogeneous conditions. Let us remark that eq. \eqref{p2bgy}
expresses the condition of mechanical equilibrium equivalent to the first member of the BBGY hierarchy as discussed in ref.
\cite{marconi2015towards}.
\section{Effective potential}
\label{Effectivepotential}
Let us apply eq.\eqref{FPEstationary}
to a system a system comprising just two
particles so that the equation becomes closed:
\bea
&&
T_s \sum_{\beta=1}^d \sum_{n=1}^2 \frac{\partial }{\partial r_{\beta n}}[ \Gamma^{-1}_{\alpha 1,\beta n}({\bf r}_1,{\bf r}_2) P^{(2)}_2({\bf r}_1,{\bf r}_2)]=
- P^{(2)}_2({\bf r}_1,{\bf r}_2) \Bigl( \frac{\partial u({\bf r}_{ 1})}{\partial r_{\alpha 1}} + \frac{ \partial w({\bf r}_1-{\bf r}_2) }{ \partial r_{\alpha 1}} \Bigr) \, .\nonumber\\
\label{pairprob}
\end{eqnarray}
The solution is
\be
P^{(2)}_2({\bf r}_1,{\bf r}_2) =
\frac{1}{Z_2}
\exp\Bigl(-\frac{\psi({\bf r}_1,{\bf r}_2)+\frac{\tau}{2 \gamma}\sum_{\alpha=1}^d
[ \frac{\partial }{\partial r_\alpha} \psi({\bf r}_1,{\bf r}_2) )]^2 - D\gamma \ln\det \Gamma({\bf r}_1,{\bf r}_2) }{T_s} \Bigr)
\label{pairproc}
\end{equation}
where $\psi({\bf r}_1,{\bf r}_2)=u({\bf r}_1)+u({\bf r}_2)+w({\bf r}_1-{\bf r}_2)$ and
$\det \Gamma$ is the determinant associated with the $2d\times 2d$ matrix whose elements are
\be
\Gamma_{\alpha \beta }({\bf r}_i,{\bf r}_j)= \delta_{\alpha\beta} \delta_{ij}+\frac{\tau}{\gamma}
\frac{\partial^2 \psi({\bf r}_i,{\bf r}_j) }{\partial r_{\alpha i}\partial r_{\beta j}}
\end{equation}
with $i,j=1,2$.
The form of eq. \eqref{pairproc} suggests the idea of introducing an effective potential to describe the interaction experienced by the particles
when subjected to colored noise. The effective potential can simplify the description, make the
analysis more transparent and avoid the difficulty of evaluating the inverse matrix $\Gamma$
when the system comprises a large number of particles.
However, we must explore the validity of such a method since it involves an approximate treatment of the interactions
when $N\geq3$.
Let us begin with the simplest case
of just two particles free to move on a line in the absence of external fields and write the pair distribution. To this purpose let us consider
the $2\times2$ matrix $\Gamma_{ij}$:
$$
\Gamma^{(2)}=
\left(\begin{array}{ccccccc}
1+\frac{\tau}{\gamma} w_{11}(x_1-x_2)& -\frac{\tau}{\gamma}w_{11}(x_1-x_2)
\\ -\frac{\tau}{\gamma}w_{11}(x_1-x_2) & 1+\frac{\tau}{\gamma} w_{11}(x_1-x_2)
\end{array}\right)
$$
with $w_{11}=\frac{d^2w(x_1-x_2)}{d x_1^2}$ .
The resulting two particles distribution function $P_2^{(2)}$ has the form:
\be
P_2^{(2)}(x_1-x_2)=\frac{1}{Z_2}\exp\Bigl( -\frac{\phi(x_2-x_1)}{T_s}\Bigl)
\label{effectiveone}
\end{equation}
Thus,
we can define, apart from a constant, the following pair
effective potential by taking the logarithm of $P_2$
\be
\phi(x_1-x_2)=w(x_1-x_2)+ (\frac{\tau}{\gamma})[ w_1(x_1-x_2) ]^2- D\gamma \ln (1+2 (\frac{\tau}{\gamma}) w_{11}(x_1-x_2))
\end{equation}
with $w_1=\frac{dw(x_1-x_2)}{d x_1}$.
The above result can be generalized in the case of higher dimensionality.
The pair correlation function in $d$ dimensions for a two-particle system interacting via a central potential $w(r)$, in the absence of external potentials, reads:
\be
g(r)= \exp \left(- \frac{ w(r) +\frac{\tau}{ \gamma} [ w'(r)]^2
- T_s\ln [(1+ 2 \frac{\tau}{ \gamma} w''(r) )(1+2\frac{\tau}{ \gamma} \frac{w'(r)}{r})^{d-1}] } {T_s} \right) \end{equation}
where the primes mean derivative with respect to the separation $r$.
Thus the effective pair potential reads
$ \phi(r)=-T_s\ln g(r)$.
Let us remark that the effective potential, being derived in the low-density limit, does not account for the three body terms
which instead are present if one considers formula \eqref{probabilitydistr} with $N>2$.
In all these cases the dependence of $\phi$ on the effective temperature is quite interesting because as $D$ increases the effective potential
displays a deeper and deeper potential well.
Hereafter, we shall adopt the following unit system: lengths are expressed in terms of the molecular length $\sigma$,
time in terms of the unit time $\gamma^{-1}$ and the unit mass is set equal to 1.
In particular, we find that for a pair potential $w(x)=w_0(\frac{\sigma}{x})^{12}$, in order to observe an attractive region it is
necessary to have $2 D\tau/\sigma^2>1$.
This is shown in Fig. \ref{peakversusD} where we display the pair correlation function obtained by numerical simulations of a system of repulsive particles
in one dimension for different values of $D$, average density $\rho\sigma=0.25$
and for $\tau=0.1$.
The various curves correspond to different values of $D$ and one can see that the height of the peak increases with $D$ because the effective attraction increases.
Such an effective attraction in a system where only repulsive interparticle forces are in action is
due to a dynamical mechanism.
It can be understood as follows: the friction that a particle
experiences with the background fluid is enhanced by the presence of surrounding particles so that their mobility
decreases.
Being less mobile the particle tends to spend more time in configurations where it is closer to other particles and
one interprets this situation as an effective attraction \cite{cates2013active,cates2014motility,barre2014motility}.
\begin{figure}[h]
\centering
\includegraphics[height=10cm]{gr01n25.eps}
\caption{Results for the pair correlation function obtained via numerical simulation of a 1 dimensional system.
Density $\rho$ is expressed in units $\sigma^{-1}$, $\tau$ in units $\gamma^{-1}$ and $D$ in units $T_s/\gamma$. }
\label{peakversusD}
\end{figure}
In spite of the fact that the MUCNA N-particle distribution function is known it is difficult to apply it to large systems
because of the many-body nature of the interactions. On the other hand,
if one could replace the complicated MUCNA potential by an effective
pairwise potential it would possible to use all the machinery employed in the study
of molecular fluids. Under this hypothesis one could, for instance, use methods such as the density functional method,
define a Helmholtz intrinsic free energy, or utilize the integral equations method and greatly simplify the study the phase behavior of the model. To analyze its validity,
we use a simple example: consider an interacting two-particle system subjected to the action of an external potential $u(x)$ whose distribution function is given by
\bea
&& P_2^{(2)}(x_1,x_2)=
\frac{1}{Z_2} \, \exp \Bigl(- \frac{w(x_1,x_2)+(u(x_1)+u(x_2) }{T_s} \Bigr) \nonumber\\
&&
\times\exp\Bigl( -\frac{\tau}{2 \gamma T_s} [\frac{\partial}{\partial x_1} (w(x_1,x_2)+u(x_1))]^2 -\frac{\tau}{2 \gamma T_s} [\frac{\partial}{\partial x_2} (w(x_1,x_2)+u(x_2))]^2
\nonumber\\
&&
+ \ln \det \Gamma(x_1,x_2)\Bigr)
\end{eqnarray}
with
\bea
\det \Gamma(x_1,x_2)&=&1+\frac{\tau}{\gamma} \Bigl(
2 \frac{\partial^2 w(x_1,x_2)}{\partial x_1^2}+ \frac{\partial^2 u(x_1)}{\partial x_1^2} + \frac{\partial^2 u(x_2)}{\partial x_2^2}
\Bigr) \nonumber\\
&&
+(\frac{\tau}{\gamma})^2 \Big(\frac{\partial^2 w(x_1,x_2)}{\partial x_1^2} [ \frac{\partial^2 u(x_1)}{\partial x_1^2}
+ \frac{\partial^2 u(x_2)}{\partial x_2^2} ]+ \frac{\partial^2 u(x_1)}{\partial x_1^2}
\frac{\partial^2 u(x_2)}{\partial x_2^2} \Bigr) .\nonumber\\ \end{eqnarray}
In the spirit of the effective potential idea we introduce the following superposition approximation
\bea
&& P_2^{approx}(x_1,x_2)\approx \frac{1}{\ Z_2^{approx}} \, \exp \Bigl(- \frac{w(x_1,x_2)+u(x_1)+u(x_2) }{T_s} \Bigr) \nonumber\\
&&
\times\exp\Bigl( -\frac{\tau}{2 \gamma T_s} [\frac{\partial}{\partial x_1} w(x_1,x_2)]^2 -\frac{\tau}{2 \gamma T_s} [\frac{\partial}{\partial x_2} w(x_1,x_2)]^2-
\frac{\tau}{2 \gamma T_s} [\frac{\partial}{\partial x_1} u(x_1)]^2 -\frac{\tau}{2 \gamma T_s} [\frac{\partial}{\partial x_2} u(x_2)]^2 \nonumber\\
&&
+ \ln \det \Gamma^{approx}(x_1,x_2)\Bigr)
\label{p2approx}
\end{eqnarray}
with
\be
\ln \det \Gamma^{approx}(x_1,x_2)\approx
\ln \Bigl(1+2 (\frac{\tau}{\gamma})\frac{\partial^2 w(x_1,x_2)}{\partial x_1^2} \Bigr)+
\ln \Bigl( 1+(\frac{\tau}{\gamma}) \frac{\partial^2 u(x_1)}{\partial x_1^2}\Bigr) + \ln \Bigl( 1+(\frac{\tau}{\gamma}) \frac{\partial^2 u(x_2)}{\partial x_2^2} \Bigr) . \end{equation}
Clearly the exact formula and the approximation for the determinant differ beyond the linear order in $\tau/\gamma$, but perhaps the largest discrepancy occurs
in the presence of cross terms of linear order in $\tau/\gamma$, such as $w(x_1,x_2)u(x_1)$ in the interaction potential .
A test can be performed
by comparing the probability density profile $P^{(1)}(x_1)$ obtained by integrating over the coordinate $x_2$ the exact distribution and the
one obtained by applying the same procedure to the approximate distribution \eqref{p2approx}.
The comparison, displayed in Fig. \ref{comparisoneffective}, reveals the presence of a systematic shift of the second peak of the approximate distribution
towards larger distances from the confining wall, as if the total effective force were more repulsive.
\begin{figure}[h]
\centering
\includegraphics[height=12cm]{comparison.eps}
\caption{Normalized single particle probability distribution function for a one dimensional system two interacting particles confined between two repulsive walls
at $x=0$ and $x=6$. The wall repulsive potential is $u(x)=u_0(\frac{\sigma}{x})^{12}$ at each wall and $w(x_1-x_2)=w_0(\frac{\sigma}{(x_1-x_2)})^{12}$ between the particles with $u_0=w_0=1$. The curves refer to $\tau=0.1,1.$ and $D=1,10$ expressed
in the same units as in fig. \ref{peakversusD}.
The agreement between the Gaussian colored noise result and the effective potential is poor as far as the second peak is concerned:
its position is shifted towards larger distances from the wall, when the persistence time increases. }
\label{comparisoneffective}
\end{figure}
We turn, now, to consider a many-particle systems and perform a similar comparison.
We have simulated the system described by eqs. \eqref{effective_langevin} - \eqref{exp_correlation} with $N=1000$ and computed numerically the pair correlation function.
In order to check the effective potential approximation we also performed simulations of the over-damped Langevin equation
with white noise for particles in one dimension subjected to interactions given by $\phi(x_i-x_j)$ .
The corresponding results are shown in figs. \ref{fgr:onedimension1}-\ref{fgr:onedimension5}.
One observes in figs. \ref{fgr:onedimension1} and \ref{fgr:onedimension2} that at moderately low values of the persistence time, $\tau=0.1$, the discrepancy between the effective potential approximation and the
full colored noise result is not too large even at large densities, although there is a systematic shift of the peaks in the effective potential towards
larger values of the distance.
The situation at values of $\tau$ ten times larger, $\tau=1$, and $D=0.1$ and $10$ is remarkably worse and the peaks of the effective theory
display a much larger
shift as illustrated by figs. \ref{fgr:onedimension3}-\ref{fgr:onedimension5}.
Such a shift is determined by the approximate treatment of the three-body repulsive term which appears in eq. \eqref{hamilt1}
which becomes more relevant as the density and $\tau$ increase.
These findings pose some limits to the possibility of obtaining reliable
results by employing the effective potential approximation for values of the persistence time too large.
\subsection{Van der Waals free energy}
We use, now, a van der Waals (vdW) argument to estimate the free energy for the present model in $d$-dimension when the bare potential is
of the form $w(r)=w_0(\frac{\sigma}{r})^\alpha$
and identify the following repulsive contribution in the effective potential:
\be
\phi_{rep}(\tilde r)=
w_0(\frac{\sigma}{r})^\alpha+ \frac{\tau }{\gamma}\frac{\alpha^2}{ \sigma^2}w_0^2 (\frac{\sigma}{r})^{2\alpha+2}
\end{equation}
whereas the attractive contribution is:
\be
\phi_{attr}(r)= - T_s\ln\Bigl(\Bigl[1+2 \alpha(\alpha+1) \frac{ w_0\tau}{\gamma \sigma^2} (\frac{\sigma}
{ r})^{\alpha+2} \Bigr] \Bigl [1- 2 \alpha \frac{w_0 \tau}{\gamma \sigma^2}(\frac{\sigma} { r})^{\alpha+2} \Bigr]^{d-1}\Bigl) .
\label{attractive}
\end{equation}
Thus for $w_0 \frac{\tau}{\gamma \sigma^2}<<1$ the system reduces to a system of passive soft repulsive spheres.
Using a standard procedure
we represent the free energy as the sum of a repulsive contribution evaluated in the
local density approximation plus a non local mean-field attractive term:
\bea
&&
{\cal F} [\rho^{(1)} ] =
T_s \int d^dr \rho ({\bf r}) \Bigl[\ln \Bigl(
\frac{\rho^{(1)} ({\bf r})} { 1- b\rho^{(1) }({\bf r}) }
\Bigr)-1\Bigr]
+\frac{1}{2} \iint_{|{\bf r}-{\bf r}'|>R_b}
d^d r d^d r' \, \phi_{attr}({\bf r}-{\bf r}')\rho^{(1)}({\bf r}) \rho({\bf r}') \nonumber \\
\label{funct}
\end{eqnarray}
where $b=\omega_d R^d$,
$\omega_d=1, \pi/2,2\pi/3$ for $d=1,2,3$, respectively and
the effective hard-sphere diameter, $R_b$ is given by the Barker-Henderson formula:
\be
R_b=\int_0^\infty dr (1-e^{-\phi_{rep}(\tilde r)/T_s}) .
\end{equation}
Following the standard vdW approach we may represent the pressure associated with the functional \eqref{funct} as:
\be
p=
\frac{ T_s \,\rho}{1-b \rho}-a\rho^2 ,
\label{vdW}
\end{equation}
where the value of the coefficient $a$ is determined by the strength of the effective attractive interaction:
\be
a =- \int_{R_b}^\infty d^d r \, \phi_{attr}(r) .
\end{equation}
From the form of the effective attractive potential \eqref{attractive} one sees that $a$ is an increasing function of the non dimensional parameter $\frac{w_0 \tau}{\gamma \sigma^2}$ and of $T_s$.
The latter feature determines a remarkable difference with respect to passive fluids: in that case the vdW pressure
is the sum of an entropic term proportional to the temperature and of a negative temperature independent enthalpic term.
In active fluids, on the contrary, the coefficient $a$ increases roughly linearly with $T_s$ as the entropic term does.
As a result, $T_s$, since $a/T_s$ is nearly constant, does not play a major role in determining the critical parameters of the active model.
The effective attraction among the particles
has its origin in the reduction of their mobility, reflected by the presence of an effective friction $\Gamma_{ij}$ in \eqref{stochasticxi}
which increases with increasing density.
As a result the particles tend to accumulate where their density is higher and move more slowly and possibly lead to the mobility induced phase separation phenomenon.
In analogy with the vdW model of passive fluids one can determine the critical parameters, where a second order transition would
take place,
by solving simultaneously the equations
$\frac{\partial p}{\partial V}=0$ and $\frac{\partial^2 P}{\partial V^2}=0$
with the result:
\bea
\frac{a(\tau_c)}{T_s}=\frac{27}{8 } b \,, \,\,\,\,\,\,
\rho_c=\frac{1}{3 b}
\label{valuescrit}
\end{eqnarray}
Thus, in order to have phase separation, the persistence time, $\tau$, must exceed the critical value
$\tau_c$, implicitly given by the first of equations \eqref{valuescrit}.
However, the numerical investigation of the phase separation of
Gaussian-colored noise driven particles is still in progress and so far it has not revealed a clear phase separation in the absence of attraction.
\begin{figure}[h]
\centering
\includegraphics[height=10cm]{gr_tau01d01.eps}
\caption{Numerical simulation of a 1 dimensional system.
Pair correlation for $\rho\sigma=0.25,0.45,0.65$ for fixed $\tau=0.1$ and $D=0.1$ , expressed
in the same units as in fig. \ref{peakversusD}.
The height of the peak increases with density. The agreement between the Gaussian colored noise result and the effective potential is moderately good. }
\label{fgr:onedimension1}
\end{figure}
\begin{figure}[h]
\centering
\includegraphics[height=10cm]{gr_tau01d1.eps}
\caption{Numerical simulation of a 1 dimensional system. Pair correlation for $\rho\sigma=0.25,0.45,0.65$ for fixed $\tau=0.1$ and $D=1$, expressed
in the same units as in fig. \ref{peakversusD}.
The agreement between the Gaussian colored noise result and the effective potential is rather poor due to the relatively large value of the persistence time. }
\label{fgr:onedimension2}
\end{figure}
\begin{figure}[h]
\centering
\includegraphics[height=10cm]{gr_tau1d01.eps}
\caption{Numerical simulation of a 1 dimensional system. Pair correlation for $\rho\sigma=0.25,0.45,0.65$ for fixed $\tau=1.$ and $D=0.1$
The agreement between the Gaussian colored noise result and the effective potential is rather poor due to the relatively large value of the persistence time. }
\label{fgr:onedimension3}
\end{figure}
\begin{figure}[h]
\centering
\includegraphics[height=10cm]{gr_tau1d10.eps}
\caption{Numerical simulation of a 1 dimensional system. Pair correlation for $\rho\sigma=0.25,0.45,0.65$ for fixed $\tau=1.$ and $D=10.$
The agreement between the Gaussian colored noise result and the effective potential is rather poor due to the relatively large value of the persistence time. }
\label{fgr:onedimension5}
\end{figure}
\section{Conclusions}
We discussed the properties of a newly introduced model describing an active fluid, consisting of an
an assembly of repulsive soft spheres subject to over-damped dynamics and driven by a colored noise.
Although within the MUCNA is possible to get an analytical expression for the many-particle distribution function it is difficult to make progress without resorting to approximations. The
effective potential hypothesis represents a practical possibility since it reduces the many-body potential to a pairwise additive potential where one can use the
standard tools of statistical mechanics.
To test the hypothesis, we performed two checks.
In the first we employed a toy model consisting of just two particles in an external field and performed explicitly the analytic calculations.
In the second check, we compared by numerical Brownian simulation the properties of a one-dimensional system of soft repulsive spheres
subjected to colored noise against the corresponding properties of a system of particles interacting via
the effective potential.
It is found that for values of the persistence time, not too large the effective potential approximation is reliable.
\section{Acknowledgements}
C. M. acknowledges support from the European Research
Council under the European Union?s Seventh Framework programme (FP7/2007-2013)/ERC Grant agreement No. 307940.
M.P. acknowledges support from NSF-DMR-1305184.
|
\section{Introduction}
\label{intro}
The star formation histories (SFHs) of galaxies with stellar masses (${\rm M_{*}}$)
lower than $10^9$${\rm\,M_\odot}$\ (low-mass galaxies or dwarf galaxies) are expected to
be bursty. In such galaxies, supernova feedback following an intense star
formation (SF) episode can quickly heat and expel gas from them, resulting in a
temporary quenching of SF. New gas accretion and recycling of the expelled gas
then induce new SF. Therefore, the SFHs of dwarf galaxies in many models are
characterized by frequent bursts of SF and subsequent quick quenchings on a
time-scale of a few or tens of megayears
\citep[e.g.,][]{hopkins14fire,shens14,sparre15}.
Observationally, in their landmark paper, \citet{searle73} tentatively
concluded, by using broadband colors, that the bluest (and dwarf) galaxies
undergo ``intermittent and unusually intense bursts of SF.'' The ratio of star
formation rates (SFRs) measured from nebular emission lines and ultraviolet
(UV) continuum provides a more direct tool than broadband colors to explore
the burstiness of galaxy SFHs. Balmer line emission arises from the
recombination of gas ionized by O-stars, which have lifetimes of only a few
megayears. Thus, H$\alpha$ and H$\beta$ emissions trace SFR over a time scale
of a few megayears. On the other hand, UV photons come from both O- and
B-stars, which last for $\sim$100 Myr. Therefore, UV traces SFRs over that
timescale. As a result, a galaxy with an SFH that forms a significant fraction
of its stars in bursts separated by $\sim$5--100 Myr will spend short amounts
of time with very high H$\alpha$ and H$\beta$ luminosities followed by long
periods of low H$\alpha$ and H$\beta$ luminosities. The time variation of their
FUV luminosities is much smoother. This effect does not alter the average
luminosity---in comparison to galaxies with steady star formation histories of
the same averaged value, a sample of bursty galaxies will still have the same
mean FUV, H$\alpha$, and H$\beta$ luminosity---but it can alter the
distribution, median, and mean values of the H$\alpha$ (or H$\beta$)--to--FUV
ratio \citep{ip04,fumagalli11,weisz12,slug1,slug2}. Thus, a measurement of this
distribution or its moments can be a sensitive diagnostic of the SFH with the
distribution of ratios depending on the intensity, duration, and separation of
the bursts.
In the local universe, a number of authors have reported H$\alpha$--to--FUV SFR
ratios lower than unity for low-mass (and hence low-SFR) or dwarf galaxies
\citep[e.g.,][]{sullivan00,bell01,boselli09,leejanice09,meurer09,weisz12}. The
effect becomes noticeable for star formation rates below $\sim$0.1
M$_\odot$~yr$^{-1}$ and is absent in galaxies with higher star formation rates.
For a sample of galaxies, an average H$\alpha$--to--FUV ratio lower than unity
indicates that these galaxies are preferentially observed during their
subsequent quenching following SF bursts.
Besides the bursty SFHs on galactic-wide scales, two other possibilities are
often used to explain the observed lower-than-unity H$\alpha$--to--FUV ratios:
non-universal initial mass function (IMF) and stochastic SF on small (star or
star cluster) scales. Non-universal IMF theories assume that the IMFs of
galaxies depend on the properties of galaxies. One particular scenario, the
integrated galactic initial mass function (IGIMF), predicts that the actual IMF
is steeper than the canonical IMF and steepens with the decrease of the total
SFR of galaxies \citep{weidner05,pa07,pa09,weidner11}. This scenario assumes
that (1) all stars form in clusters \citep[e.g.,][]{pa07}; (2) the cluster mass
function is a power law; (3) the mass of the most massive star cluster (i.e.,
the truncation mass of the power law) is a function of the total SFR of a
galaxy; and (4) the mass of the most massive star in a star cluster is a
function of the mass of the cluster. As a result, the chance of forming a
massive star in low-SFR galaxies is lower than in high-SFR galaxies.
Consequently, low-SFR galaxies have steeper IMFs than high-SFR galaxies. Due to
the lack of massive stars to ionize hydrogen, low-SFR galaxies, therefore, have
lower H$\alpha$--to--FUV ratio. \citet{leejanice09} found that the IGIMF model
is able to account for the observed H$\alpha$--to--FUV ratio in their Local
Volume galaxy sample, but they also pointed out that a critical test of the
IGIMF model would be the scatter of the H$\alpha$--to--FUV ratio.
\citet{fumagalli11} and \citet[][W12]{weisz12} compared the IGIMF model to
their samples and found that the scatter predicted by IGIMF is not compatible
with observations. In addition, observations of individual low-mass star
clusters have failed to detect the deficiency in H$\alpha$ predicted by IGIMF
models, and appear fully consistent with a universal, randomly sampled IMF
\citep{andrews13,andrews14}. While \citet{andrews13,andrews14} were testing the
mass of the most massive star in a star cluster (i.e., Assumption (4) listed
above), \citet{pa13} tested Assumption (3) --- the mass of the most massive
star cluster --- and found that the masses of the most massive young star
clusters in M33 decrease with increasing galactocentric radius, supporting a
non-universal truncation mass of the cluster mass function. \citet{weidner14}
showed that some weaker versions of the IGIMF hypothesis
\citep[e.g.,][]{weidner06} remain consistent with the Andrews et al. data, but
the fact that the observations are also consistent with a universal IMF implies
that they also provide no support for the hypothesis of non-universality.
Stochastic SF on small scales
\citep[e.g.,][]{cervino03,cervino04,fumagalli11,eldridge12,slug1,cervino13} can
also produce low H$\alpha$--to--FUV ratio for low-SFR galaxies. Sometimes,
bursty SFH is also considered as a stochastic process, but in this paper we use
the following distinction: burstiness is caused by phenomena on galaxy scales
(e.g., feedback, gas accretion, and merger, etc.), while stochasticity occurs
on star or star cluster scale. The stochasticity considered in our paper is the
stochastic sampling of IMFs and SFHs. Even for a universal IMF, when the SFR is
low, the IMF would not be fully sampled. Instead, the random sampling would
bias against very massive stars because of their low formation probability,
resulting in an actually steeper IMF.
Similarly, an SFH would not be fully sampled when the SFR is low, because a
time-averaged continuous (the undersampled) SFR would actually consist of
several small ``bursts'' associated with the formation of new star clusters.
Mathematically , the SFH is not fully sampled over a time interval $T$ if
$\frac{1}{\langle M_c\rangle} \int_0^T \mbox{SFR}(t) dt \lesssim 1$, where
$\langle M_c\rangle$ is the expected mass of a single star cluster. That is,
the SFH is not fully sampled over a specified time interval if the expected
number of star clusters formed over that time interval is of order 1 or
fewer.\footnote{We pause to point out a subtlety in terminology: as used in
this statement, a star cluster is simply defined as a collection of stars that
formed at a single instant in time, without regard to whether it is
gravitationally bound or relaxed, and the implicit assumption we make is that
the great majority of stars form in such temporally coherent structures. While
most stars do not form in gravitationally bound clusters
\citep[e.g.,][]{lada03,johnson16}, observations indicate that most stars do
form in clusters by the weaker definition of a cluster that is relevant for our
purposes \citep[e.g.,][]{lada03,fall12}. For more discussion on this point, see
\citet{krumholz14}.}
\citet{slug1} developed a simulation tool SLUG (Stochastically Lighting Up
Galaxies) to study the stochasticity in SF and its effects on SFR indicators
and stellar population \citep{slug2,slug3}. Using SLUG, \citet{fumagalli11}
showed that stochasticity is able to explain the observed low
H$\alpha$--to--FUV ratio in local dwarf galaxies
\citep{boselli09,leejanice09,meurer09}.
Although evidence of bursty SFHs of dwarf galaxies in the nearby universe has
been present through the H$\alpha$--to--FUV ratio in some of the above studies
\citep[e.g.,][W12]{leejanice09}, similar observations have not been conducted
beyond the local universe because of the lack of both deep UV and deep
optical/IR spectroscopy data. Low-mass galaxies at higher redshifts are
expected to have similar or even burstier SFHs \citep[e.g.,][]{dominguez15}
compared to their local counterparts. Recently, \citet{kurczynski16} found no
statistically significant increase of the intrinsic scatter in the SFR--${\rm M_{*}}$\
relation at low masses at $0.5<z<3.0$, which seems to indicate a gradual
assembly of galaxy masses. Their SFRs, however, were measured from SED-fitting
of broadband photometry, which traces SFR on timescales of 100 Myr. It,
therefore, remains possible that the SF burstiness (indicated by the intrinsic
scatter) increases at low masses on timescales shorter than $\sim$100 Myr. On
the other hand, both non-universal IMF and stochastic SF are phenomena on the
scales of star clusters and, therefore, independent of redshift. Studying the
redshift evolution of the H$\alpha$--to--FUV ratio would shed a light on the
importance of the burstiness of SFHs of low-mass galaxies.
In this paper, to investigate the burstiness of the SFHs beyond the local
universe, we use optical spectroscopy from the Team Keck Redshift Survey
\citep[TKRS,][]{wirth04} and UV imaging from CANDELS
\citep{candelsoverview,candelshst} and the Hubble Deep UV (HDUV) Legacy Survey
(HST-GO-13871, PI. Oesch) to measure the ratio of H$\beta$ and FUV (1500 \AA)
derived SFRs of galaxies at $0.4<z<1$ in the CANDELS GOODS-N field.
The advantage of using H$\beta$ instead of H$\alpha$ is that the dust
extinction effects on H$\beta$ and FUV almost cancel each other out, because
they have very similar extinction (assuming the Calzetti law and an extra
nebular extinction). Therefore, generally, no extinction correction is needed
when measuring the intrinsic ratio of SFR$_{H\beta}$ and SFR$_{1500\AA}$ except
for very dusty galaxies (see Section \ref{ratio} and \ref{discussion:dust}).
We adopt a flat ${\rm \Lambda CDM}$ cosmology with $\Omega_m=0.3$,
$\Omega_{\Lambda}=0.7$, and the Hubble constant $h\equiv H_0/100\ {\rm
km~s^{-1}~Mpc^{-1}}=0.70$. We use the AB magnitude scale \citep{oke74} and a
\citet{chabrier03} IMF.
\begin{figure}[htbp]
\center{\hspace*{-0.75cm}\includegraphics[scale=0.31, angle=0]{./fig1.ps}}
\caption[]{Sample selection. {\it Upper}: F275W magnitude--${\rm M_{*}}$\ relation for
GOODS-N galaxies with F275W S/N$>$5. Galaxies with no TKRS attempt are cyan.
Those with TKRS attempt, but no secure redshift obtained, are yellow. We only
measure H$\beta$ fluxes for galaxies with secure TKRS redshifts (red), and only
select those with H$\beta$ S/N$>$3 (blue) {\it and} continuum S/N$>$1/pixel
(blue+purple circle) into our sample. {\it Lower}: SFR--${\rm M_{*}}$\ relation.
Galaxies are color coded as the upper panel. All CANDELS GOODS-N galaxies at
$0.5<z<1$ are overplotted as gray points. The best-fit relation of
\citet{whitaker14} is also plotted as a reference (solid line). The method of
measuring SFR$_{tot}$ is described in Section \ref{data}.
\label{fig:sample}}
\end{figure}
\section{Data and Sample}
\label{data}
TKRS observed a magnitude-limited sample of 2911 objects to $R<24.4$ AB and
yielded secure redshifts for 1440 galaxies and active galactic nuclei. TKRS
used the 600 lines ${\rm mm^{-1}}$ grating blazed at 7500\AA. The central
wavelength was set at 7200\AA, providing a nominal spectral coverage of
4600--9800\AA\ at a FWHM resolution of $\sim$3.5\AA\ and $R\sim2500$. Each slit
mask was observed for a total on-source integration time of 3600 seconds.
We follow \citet{trump13} and \citet{ycguo16mzr} to measure the flux of
H$\beta$. First, a continuum is fitted across the emission-line region by
splining the 50-pixel smoothed continuum. Then, a Gaussian function is fitted
to the continuum-subtracted flux in the wavelength region of H$\beta$. The
emission-line intensity is computed as the area under the best-fit Gaussian in
the line wavelength region. The flux calibration is done by scaling the
continuum flux density to match the best-fit stellar population model of the
broadband spectral energy distribution (SED) from the CANDELS GOODS-N
multiwavelength catalog (Barro et al., in preparation, see
\citet{ycguo13goodss} and \citet{galametz13uds} for details). The advantage of
this calibration is that using the broadband flux of whole galaxies corrects
for the slit-loss effect, under a (reasonable) assumption that the continuum
(stellar flux) and emission line have the same spatial distribution. To obtain
a reliable flux calibration, we only use galaxies with continuum
signal-to-noise ratio (S/N)$>$1/pixel. We also require H$\beta$ S/N$>$3 to use
reliable H$\beta$ flux measurements.
The raw H$\beta$ equivalent widths are corrected for stellar absorption
according to galaxy ages measured through SED-fitting. As part of the CANDELS
SED-fitting effort, each galaxy in our sample has been fitted by 12 SED-fitting
codes, which have different combinations of synthetic stellar population
models, SFHs, fitting methods, etc. (see \citet{santini15} for details). For
each galaxy, we use the median of the 12 best-fit ages as its age to measure
the stellar absorption from the models of \citet{bc03}. The average
light-weighted age of galaxies in our sample is almost constant ($\sim$1 Gyr)
from $10^{8.5}$ to $10^{10.5}$${\rm\,M_\odot}$, corresponding to an average stellar
absorption equivalent width of $\sim$2.5 \AA. We also try to apply a fixed
equivalent width of 1 \AA\ \citep{cowie08,zahid11,henry13a} to all galaxies.
The smaller stellar absorption equivalent width does not change our results and
conclusions, because our galaxies have very large H$\beta$ equivalent widths (a
median of $\sim$15 \AA).
The UV luminosities of galaxies in our sample are measured from {\it HST}/WFC3 F275W
images of CANDELS UV and HDUV. CANDELS UV covers the CANDELS GOODS-N Deep
region in F275W at an approximately four-orbit depth. HDUV intends to add four
orbits of observations to each of eight pointings in F275W in the GOODS-N Deep
region. We use the first public release (v0.5) of
HDUV\footnote{http://www.astro.yale.edu/hduv/data.html}, which includes five
out of the eight new deeper pointings from HDUV, plus all of the CANDELS UV
exposures.
The UV photometry is measured in a similar fashion as done for the Ultraviolet
Hubble Ultra Deep Field (UVUDF) \citep{rafelski15}. SExtractor is run on F275W
and ACS/F435W images in dual-image mode with the F435W image as the detection
image. An aperture correction is then determined from the F435W band to match
the small F435W-band apertures to the larger F160W-band apertures used in the
rest of the CANDELS catalog of Barro et al. (in preparation). We only include
galaxies with F275W S/N$>$5 in our analyses. There are about 1700 galaxies with
F275W S/N$>$5 at $0.4 < z < 1.0$ in our UV catalog. Our final sample with both
H$\beta$ S/N$>$3 and F275W S/N$>$5 contains 164 galaxies after excluding
X-ray-detected sources.
We use FAST \citep{kriek09fast} to fit the \citet{bc03} models to the CANDELS
GOODS-N multiwavelength catalog to measure ${\rm M_{*}}$. The total SFRs (SFR$_{tot}$)
are measured by combining dust-uncorrected rest-frame UV (2800 \AA) and IR
luminosities, if the latter (measured from {\it Spitzer}/MIPS and/or {\it
Herschel}) is available, by following \citet{kennicutt98}. For these galaxies,
SFR$_{tot}$ = SFR$_{UV+IR}$. If no IR measurement is available, SFR$_{tot}$ is
measured through rest-frame UV (2800 \AA) corrected for dust extinction
measured from SED-fitting, i.e., SFR$_{tot}$ = SFR$_{NUV,corr}$. We refer
readers to \citet{barro11b, barro13a} for the details. Because F275W photometry
is not used in the SFR$_{tot}$ measurement, SFR$_{tot}$ is independent of our
H$\beta$--to--FUV ratios.
Figure \ref{fig:sample} shows that at ${\rm M_{*}}$$>10^{9.5}$${\rm\,M_\odot}$, our sample
(galaxies with H$\beta$ S/N$>$3 {\it and} continuum S/N$>$1) is representative
of galaxies at $0.4<z<1$ in terms of F275W magnitude and total SFR. At
$10^{8.5}<$${\rm M_{*}}$$<10^{9.5}$${\rm\,M_\odot}$, our sample is biased toward UV-bright
galaxies ({\it upper} panel of Figure \ref{fig:sample}). This bias is
introduced by the TKRS magnitude limit ($R<24.4\ AB$) and our H$\beta$ S/N
requirement, the latter of which also biases our sample toward H$\beta$-bright
galaxies. For our goal of measuring the H$\beta$--to--FUV ratio,
we will demonstrate later that the actual effect of our sample selection
(combining both H$\beta$ S/N$>$3 and F275W S/N$>$5) would bias our results
against low H$\beta$--to--FUV for low-mass galaxies (Section
\ref{discussion:bias}).
\begin{figure}[htbp]
\center{\hspace*{-0.5cm}\includegraphics[scale=0.29, angle=0]{./fig2.ps}}
\caption[]{{\it Upper}: total--to--FUV SFR ratio as a function of the Balmer
decrements (${\rm H\gamma/H\beta}$) for galaxies with S/N(H$\gamma$)$>$3 (open)
and 5 (filled). All galaxies here have IR detections. The solid line shows a
fit to galaxies with S/N(H$\gamma$)$>$5. The shaded area is where ${\rm
H\gamma/H\beta}$$>$0.468, the intrinsic Balmer flux ratio. {\it Lower}:
H$\beta$--to--FUV ratio (uncorrected for dust effect) as a function of the
Balmer decrements. The median (red squares) and 16th and 84th percentiles
(error bars) are measured for both S/N(H$\gamma$)$>$3 (open) and $>$5(filled)
galaxies. The lower panel has more points than the upper panel, because not
every galaxy in the lower panel has an IR measurement.
\label{fig:dust}}
\end{figure}
\section{Measuring the H$\beta$--to--FUV Ratio}
\label{ratio}
${\rm SFR_{H\beta}}$ and ${\rm SFR_{1500\AA}}$ are
calculated\footnote{Throughout the paper, we assume that all the 1500 \AA\
emission is purely stellar, which is a common assumption in most studies. In
very young systems with age $\lesssim$1 Myr, however, nebular emission actually
contributes $\sim$20\% to the 1500 \AA\ emission \citep{reines10}. However,
this contribution quickly drops to $\leq$5\% as the systems become 5 Myr old.
We, therefore, conclude that the nebular contribution to 1500 \AA\ is
negligible in our sample.} through the formula of
\citet{kennicutt12}\footnote{Using the recipes of \citet{kennicutt98} results
in a systematically lower H$\beta$--to--FUV ratio by 0.03 dex.}
with an intrinsic H$\alpha$/H$\beta$ ratio of 2.86 (added as the last term in
the right-hand side of Equation (1) below):
\begin{eqnarray}
\label{eq:sfrhb}
{\rm log(SFR_{H\beta}) = log(L_{H\beta}) - 41.27 + log(2.86)} \\
{\rm log(SFR_{1500\AA}) = log(L_{1500\AA}) - 43.35},
\end{eqnarray}
\noindent where both ${\rm L_{H\beta}}$ and ${\rm L_{1500\AA}}$ ($\nu L_{\nu}$) are in
units of ${\rm erg\ s^{-1}}$.
Both formulae have been converted into a Chabrier IMF and assume a solar
metallicity.
Low-mass galaxies tend to have subsolar metallicity. The average
gas-phase metallicity of $10^{8.5}$${\rm\,M_\odot}$\ galaxies at $z\sim0.7$ is about
0.5$Z_\odot$ \citep{ycguo16mzr}. \citet{castellano14} showed that using
rest-frame UV tends to underestimate the SFRs of subsolar metallicity
(gas-phase $\sim$0.3$Z_\odot$) Lyman Break Galaxies at $z\sim3$ by a factor of
a few compared to using SED-fitting or using nebular emission lines. If their
results also hold for low-redshift low-mass galaxies, using a UV SFR tracer
assuming solar metallicity would artificially increase the H$\beta$--to--FUV
ratio for low-mass galaxies, implying that the intrinsic burstiness of low-mass
galaxies is actually stronger than our results.
\begin{figure*}[htbp]
\includegraphics[scale=0.3, angle=0, clip]{./fig3a_proof.ps}
\includegraphics[scale=0.3, angle=0, clip]{./fig3b_proof.ps}
\caption[]{{\it Left}: H$\beta$--to--FUV ratio as a function of ${\rm M_{*}}$. Black
circles with gray error bars are the best-measured ratios and their
uncertainties. For most of our galaxies, the best-measured ratios are not
corrected for dust extinction (see Section \ref{ratio}). However, for very
dusty galaxies (${\rm SFR_{UV+IR}/SFR_{FUV}}$$>$20.0), the best ratios are the
ones corrected for dust extinction. As a reference, for such galaxies, their
uncorrected ratios are shown as purple stars with purple straight lines
connected to their corrected (best) values. Red squares with error bars show
the median and 16th and 84th percentiles of each ${\rm M_{*}}$\ bin.
Black solid and dotted lines show the best-fit linear relation and its 95\%
confidence level. The data of W12 at $z=0$ are shown as the blue triangles, and
their mean is shown by the blue line. {\it Right}: Similar to the left, but
showing H$\beta$--to--FUV ratio as a function of total SFR (${\rm SFR_{tot}}$).
Results of W12 at $z=0$ are also shown (blue triangles and blue line). Two
galaxies with H$\beta$--to--FUV larger than 0.5 dex are not shown in the
figure, but are still included when calculating the median, percentiles, and
the best-fit relation.
\label{fig:result}}
\end{figure*}
To calculate the intrinsic SFRs, both ${\rm L_{H\beta}}$ and ${\rm
L_{1500\AA}}$ should be corrected for dust extinction. A shortcut, however,
exists when calculating the {\it ratio} of ${\rm SFR_{H\beta}}$ and ${\rm
SFR_{1500\AA}}$: extinction correction is negligible, except for very dusty
galaxies, because the extinction of H$\beta$ and FUV almost cancel each other
out by coincidence. This is an advantage of using H$\beta$ instead of H$\alpha$
in our study.
To illustrate the shortcut, we express the intrinsic H$\beta$--to--FUV ratio as
the following: \small \begin{eqnarray} \label{eq:sfrratio5} \left(\frac{\rm
SFR_{H\beta}}{\rm SFR_{1500\AA}}\right)_{int} & = & \left(\frac{\rm
SFR_{H\beta}}{\rm SFR_{1500\AA}}\right)_{obs} \times
\left(\frac{10^{0.4A(H\beta)}}{10^{0.4A(FUV)}}\right) \\ & = & \left(\frac{\rm
SFR_{H\beta}}{\rm SFR_{1500\AA}}\right)_{obs} \times
10^{0.4(A(H\beta)-A(FUV))}, \nonumber \end{eqnarray} \normalsize \noindent
where $A(H\beta)$ and $A(FUV)$ are the attenuation of H$\beta$ and FUV. Their
difference is: \small \begin{eqnarray} \label{eq:av} A(H\beta) - A(FUV) =
E(B-V)\left[\frac{k(4861\AA)}{0.44} - k(1500\AA)\right], \end{eqnarray}
\normalsize where the factor of 0.44 is used, because
$E(B-V)_{stellar}=0.44\times E(B-V)_{gas}$ \citep{calzetti00}. For the Calzetti
attenuation curve \citep{calzetti00}, \small \begin{eqnarray} \label{eq:dust}
k(4861\AA)/0.44 - k(1500\AA) \sim 0.1. \end{eqnarray} \normalsize \noindent
Therefore, the factor in Equation (3) to correct for dust extinction is
$10^{0.4(A(H\beta)-A(FUV))} \sim 10^{0.04E(B-V)_{stellar}}$. For galaxies with
$E(B-V)_{stellar} < 1$, the dust extinction would bias the observed
H$\beta$--to--FUV ratio from the intrinsic one toward the low-value side only
by $<$0.04 dex. Since, on average, the dust extinction of galaxies with
$10^{8.5}$${\rm\,M_\odot}$$<$${\rm M_{*}}$$<10^{10.0}$${\rm\,M_\odot}$\ is smaller than $E(B-V)_{stellar} =
0.2$ \citep{dominguez13}, this systematic error is negligible compared to other
sources of uncertainty.
This shortcut is of course only valid when galaxies have (1) the Calzetti
attenuation curve and (2) $E(B-V)_{stellar}=0.44\times E(B-V)_{gas}$ (or
$E(B-V)_{gas}=2.27\times E(B-V)_{stellar}$). There are other attenuation curves
in the literature, e.g., MW\footnote{The shortcut is also valid for the MW
attenuation curve, but with a slightly higher systematic offset. In this case,
the dust extinction would bias the observed H$\beta$--to--FUV ratio from the
intrinsic one toward the low-value side by only $<0.07$ dex for galaxies with
$E(B-V)_{stellar} < 1$. It is also important to note that the relation
$E(B-V)_{gas}=2.27\times E(B-V)_{stellar}$ in \citet{calzetti00} is derived
based on the assumption that a Galactic extinction curve applies to the nebular
emission.}, LMC, SMC, and recently MOSDEF \citep{reddy15,reddy16}. Moreover,
several studies \citep[e.g.,][]{reddy10,wild11,wuyts13,reddy15} suggest that
the extra attenuation of nebular emission, compared to the stellar attenuation,
is smaller than what we use here ($E(B-V)_{gas}=2.27\times E(B-V)_{stellar}$).
The extra attenuation depends on the geometry \citep{wild11}, SFR
\citep{reddy15}, and/or specific star formation rate (sSFR)\citep{debarros15}
of the galaxies. For an attenuation curve other than the Calzetti curve or a
smaller-than-2.27 factor for the extra nebular attenuation, the extinction
correction factor $10^{0.4(A(H\beta)-A(FUV))}$ in Equation (3) would be
significantly smaller than unity, resulting in a non-negligible extinction
effect to decrease the observed (dust uncorrected) H$\beta$--to--FUV ratio (see
Section \ref{discussion:dust}).
The negligible effect of dust extinction correction in our sample is
demonstrated in Figure \ref{fig:dust}. For a small portion of our sample, we
measure the Balmer decrements through the flux ratio of H$\gamma$/H$\beta$. For
galaxies with H$\gamma$/H$\beta$$\geq$0.32 (corresponding to $E(B-V)\leq0.8$,
the vertical dotted line in Figure \ref{fig:dust}), the dust-uncorrected
H$\beta$--to--FUV ratio has no dependence on H$\gamma$/H$\beta$ \citep[see][for
similar results]{zeimann14}. Only for very dusty galaxies
(H$\gamma$/H$\beta$$\leq$0.32, i.e., galaxies with ${\rm log(H\gamma/H\beta)
\lesssim -0.5}$ in the lower panel of Figure \ref{fig:dust}), is the
dust-uncorrected H$\beta$--to--FUV ratio significantly larger than unity,
indicating that the dust affects FUV significantly more than it affects
H$\beta$.
For these galaxies, an extinction correction is needed to measure the
H$\beta$--to--FUV ratio.
The ration of ${\rm SFR_{UV+IR}/SFR_{1500\AA}}$ can serve as a good dust
extinction indicator when H$\gamma$/H$\beta$ measurement is lacking. As shown
by the upper panel of Figure \ref{fig:dust}, the Balmer decrements show a
correlation with ${\rm SFR_{UV+IR}/SFR_{1500\AA}}$.
We only make a dust correction for galaxies with ${\rm
SFR_{UV+IR}/SFR_{1500\AA}} > 20$ (corresponding to
H$\gamma$/H$\beta$$\lesssim$0.32). We use the best-fit relation in the upper
panel of Figure \ref{fig:dust} to infer their H$\gamma$/H$\beta$ ratios and
correct for the extinction for ${\rm SFR_{H\beta}}$. We then use ${\rm
SFR_{UV+IR}}$ as the dust-corrected UV SFR. For these galaxies the
dust-corrected H$\beta$--to--FUV ratio is, therefore, the ratio of ${\rm
SFR_{UV+IR}}$ and dust-corrected ${\rm SFR_{H\beta}}$. In our analyses, we use
the dust-corrected ratios as the best-measured ratios for these very dusty
galaxies, while for other galaxies, whose ${\rm SFR_{UV+IR}/SFR_{1500\AA}}<20$,
we use the uncorrected H$\beta$--to--FUV ratios as their best ratios. Only
$\sim$10\% of our entire sample are very dusty and, therefore, need the
dust-corrected ratios, and they all have ${\rm M_{*}}$$>10^{9.5}$${\rm\,M_\odot}$\ (purple
asterisks in the left panel of Figure \ref{fig:result}).
Some galaxies in our sample have H$\gamma$/H$\beta$$\geq$0.468 (the shaded area
in Figure \ref{fig:dust}), which seems to imply that not all galaxies in our
sample follow the assumptions of Case B recombination, a requirement of the
Kennicutt SFR recipes used in our analyses. We believe that these galaxies are
scattered into the shaded area by the large line-ratio uncertainties.
Considering the uncertainties (horizontal error bars), 12\% of the galaxies
with H$\gamma$ measurement in our sample have H$\gamma$/H$\beta$ larger than
0.468 by more than 1 $\sigma$, and only 4\% are larger than 2$\sigma$. This
distribution is broadly consistent with a Gaussian distribution with the mean
of 0.468, where 16\% (and 2.5\%) of the galaxies should be deviated from the
mean (0.468) by more than 1$\sigma$ (and 2$\sigma$). We, therefore, argue that
the assumption of Case B recombination is not statistically invalid for our
sample.
\begin{figure*}[htbp]
\includegraphics[scale=0.3, angle=0, clip]{./fig4a.ps}
\includegraphics[scale=0.3, angle=0, clip]{./fig4b.ps}
\caption[]{H$\beta$--to--FUV ratio as a function of the observed F275W
magnitude (left) and H$\beta$ flux (right). In each panel, our sample is
divided into two ${\rm M_{*}}$\ bins: ${\rm M_{*}}$$>10^{9.5}$${\rm\,M_\odot}$\ (red) and
${\rm M_{*}}$$<10^{9.5}$${\rm\,M_\odot}$\ (blue). A solid line with the same color is the best
linear fit to the galaxies in each ${\rm M_{*}}$\ bin, and the dotted lines with the
same color show the 95\% confidence level of the fit.
\label{fig:bias}}
\end{figure*}
\section{Results}
\label{results}
Figure \ref{fig:result} shows that the H$\beta$--to--FUV ratios of the galaxies
in our sample increase with their ${\rm M_{*}}$. The median ratio is about 0.7 for
galaxies with ${\rm M_{*}}$$\sim10^{8.5}$${\rm\,M_\odot}$\ and increases to 1.0 for galaxies with
${\rm M_{*}}$$>10^{9.5}$${\rm\,M_\odot}$. The trend is broadly consistent with the expectation
that the SFHs of lower-mass galaxies are burstier than those of massive
galaxies. The figure also shows that the H$\beta$--to--FUV ratios increase with
SFR$_{tot}$. The median ratio is about 0.7 for galaxies with SFR$<$1${\rm\,M_\odot}$/yr
and increases to $\sim$1 for galaxies with SFR$>$10${\rm\,M_\odot}$/yr.
Statistical tests show that the correlation between H$\beta$--to--FUV ratio and
${\rm M_{*}}$\ (and SFR) is significant albeit with large scatter. Two coefficients
are calculated for our results: (1) Spearman's rank correlation coefficient
($r_s$) which measures the statistical dependence between two variables and (2)
Pearson product-moment correlation coefficient ($r$) which measures {\it
linear} correlation between two variables. The correlation between
H$\beta$--to--FUV ratio and ${\rm M_{*}}$\ (and SFR) is significant: $r_s$=0.39 (and
0.5), corresponding to a probability of $2.1\times10^{-7}$ (and
$4.3\times10^{-7}$) for the null hypothesis (no correlation) to be accepted.
The linear correlation test shows $r$=0.38 (and 0.47) between H$\beta$--to--FUV
ratio and ${\rm M_{*}}$\ (and SFR), indicating a modest {\it linear} relation. A
bootstrapping test shows that $r$ of both ${\rm M_{*}}$\ and SFR has a 5$\sigma$
significance level. We, therefore, fit a linear relation between
H$\beta$--to--FUV ratio and ${\rm M_{*}}$\ and SFR in Figure \ref{fig:result}.
The large scatter of the results in Figure \ref{fig:result} may be attributed
to one or more of the following causes: (1) measurement uncertainties of both
H$\beta$ and FUV, (2) galaxy-to-galaxy variation in attenuation/extinction
curves (in Section \ref{ratio}, we assume the same extinction curve for all our
galaxies), and/or (3) galaxies being observed at different times after the
onset of their temporary SF quenchings.
We also compare our results with those of W12 at $z=0$. W12 measured the flux
ratio between H$\alpha$ and FUV after correcting for dust extinction. We
convert their flux ratios to SFR ratios to obtain a direct comparison with our
results. The data of W12 show a ratio near unity from ${\rm M_{*}}$$\sim
10^{10.5}$${\rm\,M_\odot}$\ to ${\rm M_{*}}$$\sim 10^{8.5}$${\rm\,M_\odot}$. Their ratio starts to become
smaller than unity at even lower-mass ranges and eventually reaches 0.7 at
${\rm M_{*}}$$\sim 10^{7}$${\rm\,M_\odot}$, while our ratio already reaches 0.7 at ${\rm M_{*}}$$\sim
10^{8.5}$${\rm\,M_\odot}$. This difference suggests the existence of redshift evolution of
the H$\beta$--to--FUV ratio for a given ${\rm M_{*}}$.
The correlation between H$\beta$--to--FUV ratio and SFR in our sample is also
different from that of \citet{leejanice09} and W12, after converting their flux
ratios to SFR ratios. At $z=0$, both \citet{leejanice09} and W12 show a
constant H$\alpha$--to--FUV ratio for galaxies with SFRs ranging from
0.1${\rm\,M_\odot}$/yr to 3${\rm\,M_\odot}$/yr. Their ratio decreases to 0.7 for galaxies with
SFR$\sim$0.01${\rm\,M_\odot}$/yr, which is about 50 times smaller than the SFR at which
the ratio of our sample reaches the same H$\beta$--to--FUV ratio. The redshift
evolution of the H$\beta$--to--FUV ratio shown as a function of ${\rm M_{*}}$\ is also
evident as a function of SFR.
Our sample covers a wide range of redshift, because we prefer to include as
many galaxies as possible to increase the robustness of the statistics. The cosmic
time interval of our sample's redshift range is about $\Delta t$=3.4 Gyr,
comparable to that from $z\sim0.4$ to $z\sim0$ ($\Delta t$=4.3 Gyr). Therefore,
there may also be redshift evolution of the H$\beta$--to--FUV ratio {\it
within} our sample. To test it, we divided our sample into two redshift bins to
calculate the H$\beta$--to--FUV ratios: $z=0.4-0.65$ ($\Delta t$=1.7 Gyr) and
$z=0.65-0.95$ ($\Delta t$= 1.5 Gyr). We only conduct this test for the ${\rm M_{*}}$\
range of ${\rm 10^9}$${\rm\,M_\odot}$--${\rm 10^{9.5}}$${\rm\,M_\odot}$. Above this mass range, the
signal of burstiness is almost zero. Below this mass range, our sample is
dominated by galaxies with $z<0.65$ because of the faintness of low-mass
galaxies.
The median H$\beta$--to--FUV ratios are log(H$\beta$/FUV)=-0.078 at
$z=0.4-0.65$ (38 galaxies with a median redshift of 0.51) and
log(H$\beta$/FUV)=-0.110 at $z=0.65-0.95$ (17 galaxies with a median redshift
of 0.79). The cosmic time interval between the medians of the two redshift bins
is 1.67 Gyr. The decreasing rate of log(H$\beta$/FUV) from the higher-redshift
bin to the lower one is, therefore, (0.110-0.078)/1.67 = 0.019 dex / Gyr. This
rate of redshift evolution {\it within} our sample is consistent with that
between our full ${\rm M_{*}}$=${\rm 10^9}$${\rm\,M_\odot}$--${\rm 10^{9.5}}$${\rm\,M_\odot}$\ sample (with
a median log(H$\beta$/FUV)=-0.096 and a median redshift of 0.53, corresponding
to a lookback time of 5.24 Gyr) and $z=0$ (e.g., W12).
We emphasize that the ``redshift evolution'' discussed above is for galaxies at
the same ${\rm M_{*}}$. We do not trace the mass evolution of the galaxies in our
sample, because we are not comparing the progenitors and descendants. Although
some individual nearby galaxies' mass assembly history can be determined (e.g.,
from \citet{harris09}, the LMC increased in log(${\rm M_{*}}$) by ~0.4 dex between
$z\sim1$ and $z\sim0$), the knowledge of the average assembly history of
low-mass galaxies beyond the local universe is still lacking, which prevents us
from comparing the burstiness between progenitors and descendants.
The comparison between galaxies with the same ${\rm M_{*}}$\ but different redshifts
has its own physical motivations, although it cannot trace the evolution of a
population. First, the SFR--${\rm M_{*}}$\ relation increases with redshift. At the
same ${\rm M_{*}}$, higher-redshift galaxies have higher SFR and hence stronger
supernova feedback. Second, since the ${\rm M_{*}}$--halo mass relation evolves little
with redshifts \citep{behroozi13}, the same ${\rm M_{*}}$\ at different redshifts
corresponds to the same halo mass. But at a given halo mass, the cosmic
accretion rate increases with redshift \citep{dekel09gas}. Therefore, for the
same ${\rm M_{*}}$, higher-redshift galaxies have higher baryonic accretion rate. As
we discussed in Section \ref{intro}, strong feedback and a high gas accretion
rate are two conditions, which enable the periodic temporary quenching and new
accretion bursty cycles. Therefore, at the same ${\rm M_{*}}$, higher-redshift
galaxies are expected to be burstier, which is consistent with their observed
lower H$\beta$--to--FUV ratio.
In a recent paper, \citet{zeimann14} used the G141 grism of 3D-HST
\citep{brammer123dhst} to study the H$\beta$--to--FUV ratio in galaxies at
$1.90 < z < 2.35$. Their H$\beta$ SFR is a factor of $\sim$1.8 higher than that
expected from the systems' rest-frame UV flux density (i.e., log(H$\beta$/FUV)
$\sim0.25$). The apparent contradiction between their results and ours can be
attributed to two factors: metallicity and age. The sample of \citet{zeimann14}
is brighter than F140W$\sim$25.5 AB and has a median F140W magnitude of
$\sim$24.5 AB (roughly corresponding to ${\rm M_{*}}$\ $\sim10^{9.75} M_\odot$ at
their redshifts). We, therefore, only compare their results with our
intermediate and massive regimes. First, the sample of \citet{zeimann14} has a
metallicity distribution ranging from 12+log(O/H)$\sim$7.2 to $\sim$8.5 with a
median of $\sim$8.1. Their median is about 0.6 dex lower than the median
metallicity of $10^{9.75} M_\odot$ galaxies at $0.5<z<1.0$ \citep{ycguo16mzr}.
The formulae used to infer the SFR of local galaxies from H$\beta$ and FUV
measurements need to be modified for high-redshift low-metallicity galaxies, as
argued by \citet{zeimann14}. Second, the local formulae assume a system age of
100 Myr. The theoretical H$\beta$--to--FUV ratio changes little, if any, with
age when the age is older than 100 Myr, but the ratio increases quickly as age
decreases when the age is younger than 100 Myr. Therefore, applying the local
formulae for the galaxies in our sample (with a median age of 1 Gyr) is
reasonable, but the formula need to be modified for the high-redshift
strong-H$\beta$ galaxies of \citet{zeimann14}, which are likely younger than
100 Myr.
\section{Discussion}
\label{discussion}
There are four possibilities to explain the low H$\beta$--to--FUV ratio of
low-mass and/or low-SFR galaxies: (1) sample selection, (2) non-universal IMF,
(3) stochastic SF on star or star cluster scales, and (4) bursty SFH on
galactic scales. We will show that (1), (2), and (3) are not able to plausibly
explain the observed ratios alone, and, therefore, (4) is also needed. We also
add a detailed discussion on the effect of dust extinction correction in this
section.
\subsection{Sample Selection Effect}
\label{discussion:bias}
One of our main sample selection criteria is H$\beta$ S/N$>$3, which biases our
sample against H$\beta$-faint galaxies and, therefore, would artificially
increase the H$\beta$--to--FUV ratio. A second bias, however, is introduced by
our UV cut of F275W S/N$>$3 (Figure \ref{fig:sample}), which biases our sample
against UV-faint galaxies and would artificially decrease the H$\beta$--to--FUV
ratio. Which of the two biases dominates determines the actual systematic bias
in our observed H$\beta$--to--FUV ratio.
Figure \ref{fig:bias} plots the H$\beta$--to--FUV ratio as a function of both
F275W magnitude and H$\beta$ flux. For galaxies with ${\rm M_{*}}$$<10^{9.5}$${\rm\,M_\odot}$,
their median H$\beta$--to--FUV ratio is almost independent of their F275W
magnitudes (blue in the left panel), but decreases with their H$\beta$ fluxes
(blue in the right). This result suggests that the H$\beta$ flux limit is the
main factor that biases our results: if we had a deeper spectroscopic sample to
extend the trends in the right panel of Figure \ref{fig:bias} to lower H$\beta$
flux, we would obtain an even lower median H$\beta$--to--FUV ratio for the
low-mass galaxies. On the other hand, including fainter UV galaxies from deeper
F275W images would not affect our results, because the median H$\beta$--to--FUV
ratio is almost independent of the F275W magnitudes. Therefore, our current
sample selection biases our H$\beta$--to--FUV ratio of low-mass galaxies
against the low-value side, implying that a complete sample of low-mass
galaxies might have even lower intrinsic H$\beta$--to--FUV ratios than what we
find.
\begin{figure*}[htbp]
\includegraphics[scale=0.3, angle=0, clip]{./fig5a_proof.ps}
\includegraphics[scale=0.3, angle=0, clip]{./fig5b_proof.ps}
\caption[]{Comparisons between our observed H$\beta$--to--FUV ratio (as a
function of total SFR) and the predictions of two IGIMF models ({\it left}) and
the SLUG simulations ({\it right}). In both panels, black circles with gray
error bars are the best-measured ratios and their uncertainties from our
observations. Red squares with error bars show the median and 16th and 84th
percentiles of the black circles in each SFR bin. Blue symbols with error bars
in the left panel show the mean and the standard deviation of the mean of each
SFR bin.
Black solid and dotted lines show the best-fit linear relation and its 95\%
confidence level of the black circles. The predicted H$\beta$--to--FUV ratios
of the two IGIMF models are shown by the purple lines in the left panel. The
mean and 1$\sigma$ deviation of the H$\beta$--to--FUV ratios of the SLUG
simulations are shown by the brown squares with error bars in the right panel.
\label{fig:model}}
\end{figure*}
\subsection{Non-universal IMF}
\label{discussion:imf}
Typically, an IGIMF model assumes that (1) all stars form in clusters
\citep[e.g.,][]{pa07}; (2) the cluster mass function is a power law; (3) the
mass of the most massive star cluster (i.e., the truncation mass of the power
law) is a function of the total SFR of a galaxy; and (4) the mass of the most
massive star in a star cluster is a function of the mass of the cluster. These
assumptions result in a low H$\alpha$--to--FUV ratio by reducing the
probability of forming massive stars in low-SFR galaxies. \citet{pa07,pa09}
presented the predicted H$\alpha$--to--FUV ratio as a function of
SFR$_{H\alpha}$ for a few IGIMF models. Here, we compare two of their models to
our observations: {\it Standard} and {\it Minimal1} \citep[see Table 1
of][]{pa07}. The Standard and Minimal1 models differ in the assumed cluster
mass functions. The Minimal1 scenario uses a cluster mass function that follows
$dN/dM \propto M^{-2}$ over most of its mass range in accord with most
observational determinations of the cluster mass function (e.g., see the review
by \citet{krumholz14}). In contrast, the Standard model assumes a steeper
$dN/dM \propto M^{-2.35}$ slope, i.e., it assumes that the cluster mass
function has the same slope as the stellar IMF\null. The latter choice
generates a much stronger IGIMF effect, because it places more of the SF in
smaller clusters with more strongly truncated IMFs. We convert their predicted
H$\alpha$--to--FUV ratios from a function of SFR$_{H\alpha}$ to a function of
SFR$_{FUV}$ (equivalent to SFR$_{tot}$ as their models are dust free) and
compare them with our H$\beta$--to--FUV ratio as a function of SFR$_{tot}$.
Figure \ref{fig:model} shows that the Standard IGIMF model significantly
underpredicts the ratio by a factor of three for all galaxies, because of its
severely reduced probability of forming massive stars. Moreover, the slopes of
both Standard and Minimal1 models are flatter than our observed results. The
difference of the slopes would be even larger, if our sample selection effect,
which preferentially excludes galaxies with low H$\beta$--to--FUV (Section
\ref{discussion:bias}), is taken into account. The Minimal1 model lies within
the 1$\sigma$ level of the {\it scatter} of our sample. Its prediction is close
to our observed ratios for galaxies with SFR $\sim$1${\rm\,M_\odot}$/yr, but it
underpredicts the ratio for higher-SFR galaxies. To statistically test the
acceptance (or rejection) of the Minimal1 model, we calculate the
goodness-of-fit (reduced $\chi^2$) of the Minimal1 model to the mean and the
standard deviation of the mean of our results (blue points and error bars in
Figure \ref{fig:model}). The reduced $\chi^2$ is $\sim$22, much larger than
unity, and hence rules out the Minimal 1 model with more than 5$\sigma$
confidence.
We, therefore, conclude that the two types of IGIMF models are unable to
provide a plausible explanation of our results.
Similar results have been reported by W12. They found that the Minimal1 model
matches their results at $z=0$ well for galaxies with ${\rm M_{*}}$$>10^{8}$${\rm\,M_\odot}$\
and/or SFR$_{H\alpha} > 0.01$${\rm\,M_\odot}$/yr, while the Standard model systematically
underpredicts the H$\alpha$--to--FUV ratio.
\subsection{Stochastic Star Formation on Small Scales}
\label{discussion:slug}
The stochasticity considered here consists of stochastic sampling of both the
IMFs and SFHs (see Section \ref{intro}). As shown by \citet{leejanice09} and
\citet{fumagalli11}, stochastic sampling of IMFs alone cannot reproduce the
entire range of the observed H$\alpha$--to--FUV ratio, because it predicts a
systematically high value for very low-SFR local galaxies.
To fully describe the stochasticity, the simulation code SLUG
\citep{slug1,slug2,slug3} synthesizes stellar populations using a Monte Carlo
technique to properly treat stochastic sampling including the effects of
clustering, IMF, SFH, stellar evolution, and cluster disruption. Using SLUG,
\citet{fumagalli11} showed that stochasticity is able to explain the observed
low H$\alpha$--to--FUV ratio in local dwarf galaxies. Here, we compare the SLUG
simulations with our results to test if stochastic SF can explain our observed
H$\beta$--to--FUV ratio at $0.4<z<1.0$. Among all SLUG models, we use the one
that has the most significant stochastic effects by assuming all stars are
formed in clusters. Also, the SLUG simulations are run to $z$=0.
Figure \ref{fig:model} shows that the SLUG's prediction of H$\beta$--to--FUV
ratio (brown squares with error bars) is systematically higher than the median
of our observed values. SLUG provides predictions only for galaxies with
log(SFR)$<$0.5, while our sample contains only galaxies with log(SFR)$>$-0.5.
The range of SFRs covered by both the predictions and observations is narrow.
Nevertheless, the comparison suggests that the stochastic SF alone is not able
to explain the low H$\beta$--to--FUV ratio of low-SFR galaxies in our sample.
SLUG's predictions match the results of local dwarf galaxies of W12 very well.
The good agreement between SLUG and local observations (see also
\citet{fumagalli11} for comparison with observations before W12) and the
systematic offset of SLUG from our results suggest that, compared to the local
universe, an extra source is needed to fully explain the observed
H$\beta$--to--FUV ratio at $z\sim0.7$.
\begin{figure*}[htbp]
\includegraphics[scale=0.3, angle=0, clip]{./fig6a_proof.ps}
\includegraphics[scale=0.3, angle=0, clip]{./fig6b_proof.ps}
\caption[]{H$\beta$--to--FUV ratio as a function of sSFR. {\it Left}: sSFR is
calculated by using dust-corrected H$\beta$-derived SFR, where the dust
extinction is measured through the ratio of ${\rm SFR_{tot}}/{\rm SFR_{FUV}}$
(see the upper panel of Figure \ref{fig:dust}).
{\it Right}: sSFR is calculated by using ${\rm SFR_{tot}}$. In both panels,
black circles with gray error bars are the best-measured ratios and their
uncertainties from our observations. Red squares with error bars show the
median and 16th and 84th percentiles of the black circles in each sSFR bin.
\label{fig:ssfr}}
\end{figure*}
\begin{figure}[htbp]
\includegraphics[scale=0.3, angle=0, clip]{./fig7.ps}
\caption[]{Burstiness of the SFHs of our galaxies. The burstiness, $(D \times
A)/P$, is measured from SFH models of W12 (see Section \ref{discussion:bursty}
for details). Red squares and error bars show the burstiness and 1$\sigma$
confidence level of our sample. The result of W12 at $z=0$ is shown as the blue
line.
\label{fig:bursty}}
\end{figure}
\subsection{Burstiness of Low-mass Galaxies}
\label{discussion:bursty}
Because neither non-universal IMF nor stochastic SF is able to fully explain
our data, we believe that a bursty SFH is needed for low-mass galaxies at
$z\sim0.7$. This speculation is supported by the systematically lower
H$\beta$--to--FUV ratio at $z\sim0.7$ than at $z=0$. The main driver of the
bursty SFH is gas expulsion due to feedback followed by new gas accretion (or
recycling). This driver would be more efficient at high redshift when the
cosmic gas accretion rate is high and when galaxy dynamic timescales are short.
Therefore, if low-mass galaxies are bursty, the H$\beta$--to--FUV ratio at high
redshift is expected to be lower than that at low redshift, which is consistent
with our data.
One additional piece of evidence of the bursty SFH is the relation between the
H$\beta$--to--FUV ratio and sSFR in Figure
\ref{fig:ssfr}. The H$\beta$--to--FUV ratio clearly increases with sSFR {\it
when sSFR is measured through a nebular emission line}, while the ratio is
almost constant over a wide sSFR range {\it when sSFR is measured through UV+IR
or dust-corrected UV}. The trend with H$\beta$ sSFR is consistent with galaxies
undergoing starbursts: at the onset of a starburst, nebular emission-line
luminosity increases faster than FUV luminosity, resulting in a high H$\beta$
sSFR and a high H$\beta$--to--FUV ratio; while at the end of the burst (or at
the onset of temporary quenching), emission-line luminosity decreases faster
than UV luminosity,
resulting in low H$\beta$ sSFR and a low H$\beta$--to--FUV ratio. The duration
of a burst is likely much less than $\sim$100 Myr because when the UV+IR or
dust-corrected UV sSFR (an indicator averaged over 100 Myr) is used, the trend
disappears and the H$\beta$--to--FUV ratio remains a constant over a wide range
of sSFR. \citet{kurczynski16} also found no statistically significant increase
of the intrinsic scatter in the SFR--${\rm M_{*}}$\ relation at low masses at
$0.5<z<3.0$ when the SFRs are measured from SED-fitting of broadband
photometry, which traces SFR on timescales of 100 Myr. Their results also
indicate that if the bursts exist, their timescale is likely much less than
$\sim$100 Myr.
The importance of burstiness for low-mass galaxies can be investigated through
SFH models. W12 constructed a series of models of bursty SFHs to explain the
observed H$\alpha$--to--FUV ratio at $z=0$. We use their models to explain our
results.
Their models assume an underlying constant SFH with normalized SFR=1 and
superposed with several starbursts over a period of 500 Myr. The bursts are
characterized by three key parameters: the burst amplitude ($A$, the increasing
factor of SFR over the underlying constant SFR during the burst duration),
burst duration ($D$), and burst period ($P$). The value of $(D \times A)/P$
indicates the relative importance of the bursty SF phase on SFR compared to the
constant SF phase.
As discussed in W12, it is the distribution of H$\alpha$--to--FUV ratios that
contains information about the burstiness of the galaxies. We, therefore,
calculate the burstiness of our sample by matching the H$\alpha$ (or
H$\beta$)--to--FUV ratio distributions. We divide all galaxies in our sample
into five ${\rm M_{*}}$\ bins, starting from ${\rm 10^{8.5}}$${\rm\,M_\odot}$\ and each spanning
0.5 dex. For each bin (called our bin), we try to find a ${\rm M_{*}}$\ bin in the W12
sample, where the W12 galaxies have the most similar H$\alpha$--to--FUV
distribution with the H$\beta$--to--FUV distribution of the galaxies in our
bin. Specifically, for each of our bins, we run the K-S test to compare its
H$\beta$--to--FUV distribution with the H$\alpha$--to--FUV distributions of a
series of mass bins of W12. This series of mass bins consist of many bins with
width of 1 dex. The smallest bin starts from ${\rm 10^6}$${\rm\,M_\odot}$, and each of
the next bin increases its lower-mass limit by 0.2 dex. These bins are designed
to be non-exclusive and their widths are wider than that of our bin to provide
robust statistics. The W12 bin that has the largest K-S test probability has
the most similar H$\alpha$ (or H$\beta$)--to--FUV to our bin. For example, the
${\rm M_{*}}$\ bin of ${\rm log(M_*/M_\odot)}=[9.0, 9.5)$ in our sample has the
largest K-S probability (0.94) with the ${\rm M_{*}}$\ bin of ${\rm
log(M_*/M_\odot)}=[7.5,8.5)$ in W12. We then use the burstiness of the bin of
$[7.5,8.5)$ in W12 (interpolate from Table 4 of W12) as the burstiness of our
$[9.0, 9.5)$ bin. We repeat this calculation for all our bins and the results
are shown in Figure \ref{fig:bursty}. The error bars are measured from a
bootstrapping test, which only samples three quarters of the galaxies in each
of our bins and repeats the random sampling 100 times.
Figure \ref{fig:bursty} shows that the median of $(D \times A)/P$ in our sample
increases toward lower ${\rm M_{*}}$. The three parameters in $(D \times A)/P$,
however, are coupled. A high $(D \times A)/P$ can be caused by either true
starbursts (i.e., $P \gg D$ and $(D \times A) \gg P$) or ``gasping'' SFHs
(i.e., a short decrease in the SFR from an otherwise constant rate with $A \gg
1$ and $P \lesssim D$). The best W12 models used in our figures all have $P \gg
D$ with an average $P \sim$250 Myr and $D$ of a few tens of megayears,
indicating a true ``burst'' model.
The most massive galaxies have the median $(D \times A)/P \sim 0$, suggesting
their SFH is basically constant over timescales of 500 Myr. Intermediate-mass
galaxies have median $(D \times A)/P \sim 1$, suggesting an almost equal
contribution of SFRs from both bursty and constant SF phases. For low-mass
galaxies, the median $(D \times A)/P > 1$, suggesting that most of the SF
occurs during the bursty phase. At ${\rm M_{*}}$$\sim {\rm 10^{8.5} M_\odot}$, the
bursty phase contributes a factor of three more SF than the constant phase
does.
We also compare our results with those of W12 at $z=0$. Our burstiness $(D
\times A)/P$ is larger than theirs at a given ${\rm M_{*}}$. In their sample, the
bursty phase becomes comparable to the constant phase only with galaxies at
${\rm M_{*}}$$<10^{8.5}$${\rm\,M_\odot}$. But in our sample, it occurs at ${\rm M_{*}}$$\sim
10^{9.5}$${\rm\,M_\odot}$. The difference again clearly shows the redshift evolution of
the burstiness: at a given ${\rm M_{*}}$, galaxies at higher redshift are burstier,
i.e, have more of their SF occurs during the bursty phases.
Our results of low-mass galaxies being burstier than massive galaxies also show
excellent agreement with that from the Feedback in Realistic Environments
(FIRE) simulations \citep{hopkins14fire}. \citet{sparre15} measured both
H$\alpha$ and FUV SFRs of the FIRE galaxies and found that the
H$\alpha$--to--FUV ratio in FIRE decreases toward small ${\rm M_{*}}$. The FIRE ratio
is unity at ${\rm 10^{10} M_\odot}$ and decreases to $\sim$0.7 at ${\rm
10^{8.5} M_\odot}$, matching our observed results surprisingly well. The FIRE
galaxies exhibit order-of-magnitude SFR variations over timescales of $\sim$10
Myr. Consequently, low-mass galaxies can go through both quenched (in terms of
the 10-Myr averaged SFR) and starburst phases a few times within a 200-Myr
period. The FIRE galaxies, however, are at redshifts lower than ours: $z=$0.0,
0.2, and 0.4. The FIRE H$\alpha$--to--FUV ratio is also systematically smaller
than that of W12, indicating that the FIRE galaxies are slightly burstier than
the observed local galaxies.
Our results are also consistent with other indicators of bursty SFH. A model of
\citet{forbes14mzr} suggests that the scatter in both ${\rm M_{*}}$--SFR and
${\rm M_{*}}$--gas-phase metallicity relations is mainly governed by the dispersion of
the baryonic accretion rate and/or the dispersion of the ${\rm M_{*}}$--${\rm M_{halo}}$\
relation. Therefore, the increase of scatter toward the low-mass regime in one
relation would be accompanied by an increase in the other. Our observed
H$\beta$--to--FUV trend implies that the scatter in the ${\rm M_{*}}$--SFR relation
would increase with the decreasing of ${\rm M_{*}}$. Therefore, the scatter in the
${\rm M_{*}}$--gas-phase metallicity relation should also increase toward the low-mass
regime. Indeed, \citet{ycguo16mzr} found such an increase of the scatter in the
${\rm M_{*}}$--gas-phase metallicity relation toward low-mass regimes, which
reinforces the bursty SFHs of low-mass galaxies at $z \sim 0.7$.
\begin{figure*}[htbp]
\includegraphics[scale=0.29, angle=0, clip]{./fig8.ps}
\caption[]{Test of the H$\beta$--to--FUV ratios on the choice of the dust
attenuation curve. Each panel shows the {\it dust-corrected} H$\beta$--to--FUV
ratio as a function of ${\rm M_{*}}$, by using a certain dust attenuation curve as
indicated in the lower-left corner of each panel. Black circles show the {\it
dust-corrected} values, while gray stars connected to the black circles show
the {\it uncorrected} values. Blue stars with error bars show the median and
16th and 84th percentiles of the {\it dust-corrected} ratios (i.e., black
circles) of each ${\rm M_{*}}$\ bin. Red squares with error bars show the median and
16th and 84th percentiles of the original ratios of each ${\rm M_{*}}$\ bin by using
the shortcut of ignoring dust correction, which are the same as those in the
left panel of Figure \ref{fig:result}.
\label{fig:avtest}}
\end{figure*}
\subsection{Effects of Dust Extinction Correction}
\label{discussion:dust}
Our ``shortcut'' of ignoring dust correction is enabled by the choice of the
Calzetti attenuation curve.
The Calzetti curve was derived through local starburst galaxies. Because the
normalization of the SFR--${\rm M_{*}}$\ relation increases with redshift, local
starburst galaxies would be the analogs of higher-redshift normal star-forming
galaxies, which makes the Calzetti curve possibly an appropriate and the most
commonly used one in the studies of distant (e.g., $z>0.5$) galaxies.
Choosing the Calzetti curve would make our paper consistent with other studies
of distant galaxies. For example, ${\rm M_{*}}$\ of the galaxies in our sample is
measured through SED-fitting with the Calzetti curve \citep{santini15}. The
dependence of our results on the choice of the attenuation curve, however,
needs to be discussed.
To this purpose, we measure the FUV--NUV color of each galaxy and then derive
its slope ($\beta$) of the rest-frame UV continuum. The UV slope provides a
measurement of the stellar extinction $E(B-V)_{stellar}$. We then derive the
gas extinction through $E(B-V)_{stellar} = 0.44 \times E(B-V)_{gas}$. With the
extinction of both gas and stellar components in hand, we then derive the
extinction correction factor $A(H\beta)-A(FUV)$, i.e., Equation (4), by using
four different attenuation curves: (1) Calzetti \citep{calzetti00}; (2) Milky
Way \citep{cardelli89}; (3) SMC Bar \citep{gordon03}; and (4) LMC average
\citep{gordon03}. The median and 16th and 84th percentiles of the {\it
dust-corrected} H$\beta$--to--FUV ratio are shown as blue stars and error bars
in Figure \ref{fig:avtest}. The red squares and error bars show our original
results of using the ``shortcut'' to ignore dust correction.
The new results with dust extinction corrected by using the Calzetti, Milky
Way, and LMC average attenuation curves are not significantly different from
our original results of ignoring dust. The tiny difference between the dust
corrected (black circles) and uncorrected (gray stars), especially for low-mass
galaxies, validates of our ``shortcut'' of ignoring the dust correction.
Therefore, our analyses and conclusions of the burstiness of low-mass galaxies
would not be significantly changed if these three curves are used.
The only different result comes from the SMC curve, which changes the
H$\beta$--to--FUV ratio of massive galaxies more than that of low-mass galaxies
due to the higher dust extinction of massive galaxies. In this case, the
H$\beta$--to--FUV ratio is almost constant around -0.2 for all masses and seems
to match the prediction of the IGIMF Minimal1 model (the purple dotted line in
the left panel of Figure \ref{fig:model}). However, as shown by other studies,
the SFRs measured from FUV and nebular emission line are usually in very good
agreement for massive galaxies (see W12 for $z=0$ galaxies and
\citet{shivaei15,shivaei16} for $z\sim2$ galaxies). Therefore, we suspect that
the SMC curve ``over-corrects'' the dust extinction for massive galaxies to
push their H$\beta$--to--FUV ratios to being significantly smaller than unity
(negative in logarithmic scale).
So far, we still have one assumption untested, namely $E(B-V)_{stellar} = 0.44
\times E(B-V)_{gas}$. The factor of 0.44 (called star--to--gas factor) is
argued to be a lower limit and the actual value may vary according to the
properties of the galaxies as well as the chosen attenuation curves. Here, we
test its relation with the attenuation curves. To this purpose, we assume that
any valid combination of the attenuation curve and the star--to--gas factor
would cause massive ($>10^{10} M_\odot$) galaxies to have the H$\beta$--to--FUV
ratio equal to unity. By minimizing the residual of the H$\beta$--to--FUV ratio
of massive galaxies to unity, we find that the best star--to--gas factor is
0.50 for the Calzetti curve, 0.51 for MW, 0.33 for SMC, and 0.48 for LMC.
Applying these values to each attenuation curve would not significantly change
our original results (i.e., low-mass galaxies have log(H$\beta$/FUV)
$\sim$-0.2). Our main conclusions of the burstiness of low-mass galaxies are
thus still valid.
In conclusion, we test different extinction curves and different reasonable
star--to--gas factors. Our main conclusions are hold for almost all of our
choices, expect for the SMC curve with the star--to--gas factor of 0.44. It is
important to note that we always assume all galaxies have the same attenuation
curve and star--to--gas factor. There may be galaxy--to--galaxy variation. On
the other hand, however, none of our choices would increase the
H$\beta$--to--FUV ratio of low-mass galaxies to be significantly larger than
unity (positive in logarithmic scale). Therefore, even if the
galaxy--to--galaxy variation exists, our results of a smaller-than-unity median
H$\beta$--to--FUV ratio for low-mass galaxies are still robust.
Finally, another possible explanation of the observed H$\beta$--to--FUV ratio
has not been discussed in our paper: the loss of ionizing photons. Our
emission-line SFR calibration assumes that every emitted Lyman continuum photon
results in the ionization of a hydrogen atom. This assumption may be invalid
due to either of the two effects: (1) leakage of Lyman continuum photons into
the intergalactic medium and (2) absorption of Lyman continuum photons by dust
internal to the HII region. The loss of ionizing photons would result in a
lower-than-unity H$\beta$--to--FUV ratio. The two effects, however, may be
negligible for our low-mass galaxies. The Lyman continuum escape fraction is
less than 2\% for galaxies at $z\sim1$ \citep{siana07,siana10,rutkowski16}. And
the dust absorption would preferentially affect massive (and hence dustier)
galaxies rather than low-mass systems.
\section{Conclusions}
\label{conclusion}
We study the ratio of SFRs measured from H$\beta$ and FUV for galaxies at
$0.4<z<1$ in the CANDELS GOODS-N region by using the TKRS Keck/DEIMOS
spectroscopy and the newly available {\it HST}/WFC3 F275W images from CANDELS and
HDUV. Our goal is to investigate the burstiness of the SFHs of low-mass
galaxies by using the H$\beta$--to--FUV ratio (SFR$_{H\beta}$/SFR$_{1500\AA}$).
Our sample contains 164 galaxies down to ${\rm M_{*}}$=$10^{8.5}$${\rm\,M_\odot}$. An advantage
of using H$\beta$ instead of H$\alpha$ is that the dust extinction effects on
H$\beta$ nebular line and on FUV stellar continuum (1500\AA) almost cancel each
other out, so that the dust extinction correction is negligible for most of our
galaxies when the {\it ratio} of H$\beta$ and FUV is measured.
We find that the H$\beta$--to--FUV SFR ratio increases with ${\rm M_{*}}$\ and SFR.
The median SFR$_{H\beta}$/SFR$_{1500\AA}$ ratio at ${\rm M_{*}}$$\sim10^{8.5}$${\rm\,M_\odot}$\
is lower than that at ${\rm M_{*}}$$\sim10^{10}$${\rm\,M_\odot}$\ by a factor of 0.7. In terms of
total SFR, the median H$\beta$--to--FUV ratio of galaxies with SFR$\sim
0.5$${\rm\,M_\odot}$/yr is about 0.7 times lower than that with SFR$\sim 10$${\rm\,M_\odot}$/yr. We
also find that at ${\rm M_{*}}$$<10^{9.5}$${\rm\,M_\odot}$, our median H$\beta$--to--FUV is lower
than that of local galaxies at the same ${\rm M_{*}}$, implying a redshift evolution.
Our sample selection biases our results against low H$\beta$--to--FUV ratios,
suggesting that the true H$\beta$--to--FUV ratio is even lower for a complete
sample of low-mass galaxies, which strengthens our results.
One model of non-universal IMF (IGIMF) scenario broadly matches our results for
galaxies with SFR$\sim 1$${\rm\,M_\odot}$/yr but cannot match the increase of the
H$\beta$--to--FUV ratio toward higher-SFR galaxies. Compared to our results,
SLUG simulations of stochastic SF on star cluster scales overpredicts the
H$\beta$--to--FUV ratio for low-SFR galaxies.
Bursty SFHs provide a plausible explanation for the observed H$\beta$--to--FUV
ratios of low-mass galaxies at $z\sim0.7$. The burstiness increases as ${\rm M_{*}}$\
decreases. For galaxies with ${\rm M_{*}}$$<10^{9}$${\rm\,M_\odot}$, the SF burstiness is as
large as three, namely, within a period of $\sim$500 Myr, the amount of SF
occurring in starburst phases is three times larger than that in a smooth
continuous phase. The burstiness of galaxies with ${\rm M_{*}}$$>10^{10}$${\rm\,M_\odot}$\ is
$<$1, namely, more stars formed in the smooth continuous phase than in bursty
phases.
The bursty SF plays an important role in the assembly of low-mass galaxies.
Future work can improve our knowledge of it from three aspects: (1) deeper UV
imaging (e.g., UV Frontier Fields) and deeper spectroscopy (e.g., Halo7D) to
explore even lower ${\rm M_{*}}$\ regimes; (2) larger UV and emission-line surveys to
enlarge sample sizes; and (3) IR spectroscopy (e.g., MOSDEF) to investigate the
redshift evolution of the burstiness from higher redshifts.
\ \ \
We thank the anonymous referee for the valuable and constructive comments,
which improve this article. YG, SMF, DCK, GB, and HY acknowledge support from
NSF Grant AST-0808133. Support for Program HST-GO-12060 and HST-AR-13891 were
provided by NASA through a grant from the Space Telescope Science Institute,
operated by the Association of Universities for Research in Astronomy,
Incorporated, under NASA contract NAS5-26555. MR acknowledges support from an
appointment to the NASA Postdoctoral Program at Goddard Space Flight Center.
{\it Facilities}: {\it HST} (WFC3), Keck (DEIMOS)
\bibliographystyle{apj}
\input{dwarfsfr_arxiv2.bbl}
\end{document}
|
\section{Introduction}
Image annotation is a task to associate multiple semantic tags regarding to the contents of images. With the rapid development of Internet and social web applications, the amount of online images created by users is continuously increasing. The large amount of images brings a heavy burden for image management and retrieval. Since the major approaches for people to search or to index images are through referring to the associated tags, it is a necessary step to annotate these images with proper tags. However, manually annotating images is an expensive and labor intensive work for human beings. Hence it is better if we can learn a model from available image-tag samples and use the model to automatically label new images with keywords (tags) from the annotation vocabulary. In fact, this kind of technique is called automatic image annotation (AIA)~\cite{zhang2012review}, which has been an important research topic in computer vision for decades.
Previous researches focus on learning the image-to-tag correlation as well as tag-to-tag correlation to improve the annotation performance. Although much progress has been made in the research community, most of the existing methods overlooked a fundamental philosophy of recognition: recognizing the right things. A common conventional evaluation setting has a fixed annotation length $k$, and a typical $k$ value $5$ has been used in many previous methods~\cite{feng2004multiple, makadia2008new, guillaumin2009tagprop, verma2012image} for the ease of comparison. However, we argue that this convention can be insufficiency in previous work, since it is not the normal way that we humans annotate images, and the assumption of fixed annotation length is not the fact of realistic images either, as shown in Figure \ref{fig_top5_arbitrary}. Therefore arbitrary length annotation is required for more reasonable annotation results. For top-$k$ predictions, traditional methods simply select the $k$ tags with highest prediction scores. For arbitrary length annotation, it is possible to easily imagine a naive extension that is to threshold the prediction scores. However, finding a good threshold is more difficult than merely setting a hyper-parameter as we might expect, because the optimal threshold can actually be dependent on each different image.
\begin{figure}[!t]
\centering
\includegraphics[width=3.5in]{top5_vs_arbitrary_color_try.pdf}
\caption{Examples of results showing differences between Top-5 annotations and arbitrary length annotations. Top-5 annotations tend to generate more false positives (red). AL: arbitrary length, T5: Top-5, GT: ground truth.}
\label{fig_top5_arbitrary}
\end{figure}
Instead of struggling to find the appropriate threshold, we want to import an explicit mechanism to model the annotation length, for which we originally form the image annotation task as a sequence generation problem. Therefore we propose a novel model called Recurrent Image Annotator (RIA) that jointly uses Convolutional Neural Networks and Recurrent Neural Networks (RNN) for predicting tag sequences. In the annotation phase, we just use an image as the initial input of RIA and then it will automatically generate annotation tags one by one, as shown in Figure \ref{fig_model}. The idea is inspired by recent success of RNN in machine translation~\cite{bahdanau2014neural}, and especially in image captioning~\cite{mao2014explain, vinyals2015show}, where the task is to generate natural language sentences from images. The advantages of using RNN do not only include its nature to generate varied length outputs, but also its ability to refer to previous inputs when predicting the current time step output. Such ability allows RNN to exploit the correlations of both image-to-tag and tag-to-tag.
Now we have a CNN to extract image visual features, and an RNN to generate the tag sequence from the visual features, what do we need next? The answer is: an order. Both machine translation and image captioning aim to generate sentences, which have a natural order available for the RNN model to learn from. Unfortunately, in our image annotation task, there is no natural order available. Instead, we have to choose or learn an order to make our proposed model actually work.
Just like sentences obey the language rules to form the order, we believe that there exist intrinsic ``language rules" for tags to form an order to describe an image. There are two points for an order to be good in our task. First, the order ``rule" should be based on semantic image and tag information. Second, tag sequences in each training example should follow the same rule to be sorted, since only in this way can the model learn the ``rule" from the training examples, and further generalize the prediction on the test images.
To facilitate the training of our model as well as testing the importance of tag orders, we propose several strategies to provide tag orders. And we compare the performance of our model with different tag orders in the experiments.
The main contributions of our work are as follows:
\begin{enumerate}
\item To our best knowledge, our work is one of the first\footnote{We found~\cite{wang2016cnnrnn} became publicly available on arXiv.org after we finished our work. Though there are several similar ideas existing in both papers, the focuses and motivations of ours are different. We pay more attention to the annotation length, and the tag sequence order used in training phase.} to form image annotation task as a sequence generation problem, and we propose a novel RNN based model Recurrent Image Annotator to handle image annotation work.
\item We analyze the insufficiency in existing methods that they do not pay enough attention to generate image dependent number of tags, which should be a natural requirement in realistic tasks. We propose our RIA model as a high quality baseline for comparing the performance on arbitrary length image tagging. We hope that our work can help and encourage future work on this new task.
\item We propose and evaluate several orders for sorting the tag inputs of RIA model, and show the importance of tag order in the tag sequence generation problem.
\end{enumerate}
\section{Related Work}
In this section, we review previous work in AIA and introduce previous work related to our RIA model, i.e., CNN and RNN.
\begin{figure}[!t]
\centering
\includegraphics[width=3.5in]{model.pdf}
\caption{General architecture of RIA model. In test phase, once the RIA model receives the input image $I$, and is triggered by the \textit{START} signal, it predicts the first output tag. Then it starts a loop that uses previous output as input of the next time step, predicting the tag sequence Y recursively. The loop will continue until the \textit{STOP} signal is predicted.}
\label{fig_model}
\end{figure}
\subsection{Automatic Image Annotation}
Generally the existing methods of RIA can be grouped into three categories: generative models, discriminative models, and nearest neighbor type models. Generative models minimize the generative data likelihood based on topic models~\cite{duygulu2002object}, where each topic is a distribution over image features and annotation tags, or mixture models~\cite{carneiro2007supervised, feng2004multiple, lavrenko2003model}, where the models define a joint distribution over image features and annotation tags. Different from generative models, discriminative models~\cite{cusano2003image, grangier2008discriminative} focus on directly learning a classifier for tag prediction, and recently CNN based multi-label classification models have been proposed~\cite{gong2013deep, wei2014cnn}. Another simple but powerful group of models are k-nearest-neighbor (KNN) based models~\cite{makadia2008new, guillaumin2009tagprop, verma2012image}, which also benefit from metric learning of multiple hand-crafted visual features.
\subsection{Convolutional Neural Networks}
The first step in AIA is to extract effective and efficient visual features from raw image pixels. Traditional methods usually use hand-crafted global or region based image features, or the combination of them~\cite{guillaumin2009tagprop}, while recent researches indicate that features extracted from Convolutional Neural Networks (CNN)~\cite{lecun1998gradient, krizhevsky2012imagenet} have significantly superior performance over these hand-crafted features on single-label image classification task~\cite{simonyan2014very, he2015deep}. However, the recent work~\cite{murthy2015automatic} show that deep CNN features do not outperform handcrafted features a lot in the traditional methods. We think one of the possible reasons is that the benefit from metric learning on multiple hand-crafted features is lost. Another problem is that currently there is no suitable loss function that can handle multi-label image classification perfectly for CNN models (for single-label classification task defining the optimal loss is trivial).
\subsection{Recurrent Neural Networks}
Recurrent Neural Networks (RNN) are networks with loops, which can be treated as multiple copies of the same network that are connected by passing messages (state) to the successor. However, the original architecture of RNN is difficult to train for long sequences due to gradient exploding and vanishing problem~\cite{pascanu2012difficulty}. The gradient exploding problem can be easily coped with gradient clipping, i.e., limiting the absolute value of gradients. The vanishing problem is more difficult to handle, therefore several variants of RNN have been proposed for solving the problem of long term dependencies, for example, LSTM~\cite{hochreiter1997long} and GRU~\cite{cho2014learning}. These RNN variants use hidden cell states and gate functions to control how information from each previous time step is combined and propagated, and have been proved to work better than vanilla RNN~\cite{chung2014empirical}.
We choose LSTM as our RNN sub-module just because it has been widely used and tested. Recent researches~\cite{chung2014empirical} compare LSTM and GRU, showing that they have similar performance. In our RIA model, RNN is used as a decoder to decode tag sequence from image input, and is the crucial part to predict arbitrary length of annotation results.
\section{Recurrent Image Annotator}
In this section, we describe the entire model architecture first, and then explain the details of each sub-module. For convenience and readability, we denote a single training example as an image $I$ and a target tag sequence $Y$. The target tag sequence $Y$ contains training annotations $y_1,\dots,y_{T-1}$ and a special \textit{STOP} signal ${y_T}$. Similarly, an input tag sequence $X$ contains the \textit{START} signal $x_1$ followed by the training annotation tags $x_2,\dots,x_T$.
As shown in Figure \ref{fig_model}, we use RNN as a decoder that decodes tag sequence $Y$ from the input image $I$. To fit the image and tag sequence into the RNN model, we first embed them into latent image space and tag space with the image embedding and tag embedding submodule, respectively. Then we train our model with the embedded image and tag vectors. After training, the model will be able to generate a sequence of tags only from the (unseen) input image.
\subsection{Image Embedding}
We either use pre-trained CNN features or jointly train a CNN to extract image features. In both cases we add a linear projection layer to project the output of CNN into $H$ dimensional space, where $H$ is the number of nodes in RNN hidden layer. In this way the CNN can be directly joined with the RNN sub-module.
\subsection{Tag Embedding}
Instead of directly using one-hot vectors to represent tags, we map the tags to $D$ dimensional embedding vectors by using a lookup table like the common way to learn distributed word embeddings~\cite{mikolov2013efficient}. The lookup table is trainable and can learn what kind of representation to generate through training. In this way, the learned $D$ dimensional tag representation can be optimized for minimizing the annotation error.
\subsection{Tag Sequence Generation}
We describe the tag sequence generation in two phases: training and testing.
In the training phase, the LSTM accepts an image embedding vector as its initial hidden state $h_0$ and the cell state $c_0$ of LSTM is initialized as zero. The \textit{START} signal is fed to the LSTM as its first input $x_1$. From the time step $t = 1$, the model will continue computing output score $s^t$ conditioned on $h_t$, then predicted tag index $\hat{y_t}$ will be decided by:
\begin{equation}
\label{tag classifier}
\hat{y_t} = \argmax_{j} s^t_j \;\;\; \mbox{for}\;\;\; j=1, \ldots, V
\end{equation}%
where $s^t_j$ is the score for tag index $j$ at time step $t$ and $V$ is the vocabulary size plus one (for $STOP$ signal).
On the other hand, $h_t$ is based on the current input $x_t$, the previous hidden state $h_{t-1}$ and cell state $c_{t-1}$. In this way, when predicting tags, the model can refer to both the current input tag and the previous predicted tags. The procedure that how hidden state and cell state propagate through time step is described as below:
{\setlength{\arraycolsep}{0.14em}
\begin{eqnarray}
f_t &=& \sigma(W_f \cdot [h_{t-1}, x_t] + b_f)\\
i_t &=& \sigma(W_i \cdot [h_{t-1}, x_t] + b_i)\\
o_t &=& \sigma(W_o \cdot [h_{t-1}, x_t] + b_o)\\
g_t &=& \tanh(W_g \cdot [h_t-1, x_t] + b_g)\\
c_t &=& f_t \odot c_{t-1} + i_t \odot g_t\\
h_t &=& o_t \odot \tanh(c_t)
\end{eqnarray}%
\setlength{\arraycolsep}{5pt}}%
where $f_t$, $i_t$, $o_t$ $g_t$ are the gate units of LSTM~\cite{hochreiter1997long}, and $W_*$, $b_*$ represent the corresponding weights and bias. The $\cdot$ and $\odot$ stand for the operator of matrix multiplication and element-wise multiplication respectively. The loss function of RIA is defined as the cross-entropy of prediction score $s^t$:
\begin{equation}
\label{loss}
L = \sum_{t=1}^{T}{-\log\frac{\exp{(s^t_{y_t})}}{\sum_{j=1}^{V}{\exp{(s^t_j)}}}}
\end{equation}
In the testing phase, referring to Figure \ref{fig_model}, the procedure is similar but simpler. The only needed input is the test image and the \textit{START} signal for triggering the first output tag. Then the sequence generation loop starts, in which the output of each time step $t$ will be used as the input of next time step $t+1$, until the \textit{STOP} signal is predicted.
\begin{table}[!t]
\caption{Dataset Description}
\label{dataset}
\centering
\begin{tabular}{l *{3}{c}}
\toprule
& Corel 5K & ESP Game & IAPR TC12\\
\cmidrule{1-4}
Vocabulary size & 260 & 269 & 291\\
Number of images & 4,493 &18,689 & 17,665\\
Words per image & 3.4 / 5 & 4.7 / 15 & 5.7 / 23\\
Images per word & 58.6 / 1004 & 362.7 / 4553 & 347.7 / 4999\\
\bottomrule
\end{tabular}
\end{table}
\begin{table*}[!t]
\caption{Experimental Results of Arbitrary Length Annotation}
\label{arbitrary length}
\centering
\begin{ThreePartTable}
\begin{tabu} to 140mm {X[6.1,l] X[2.5,c] *{3}{X[c] X[c] X[c] X[1.3,c]}}
\toprule
& & \multicolumn{4}{c}{Corel 5K} & \multicolumn{4}{c}{ESP GAME} & \multicolumn{4}{c}{IAPR TC12}\\
\cmidrule{3-14}
Method & Features & P & R & F & N+ & P & R & F & N+ & P & R & F & N+\\
\midrule
RIA (dictionary) & fc7 & 30 & 29 & 30 & 138 & 32 & 29 & 29 & 249 & 32 & 28 & 29 & 239\\
RIA (random) & fc7 & {\bf34} & 34 & 32 & 139 & {\bf36} & 24 & 27 & 230 & 33 & 25 & 28 & 241\\
RIA (rare-first) & fc7 & 32 & {\bf35} & {\bf32} & {\bf139} & 33 & 31 & {\bf31} & 249 & {\bf35} & 34 & {\bf34} & {\bf267}\\
RIA (frequent-first) & fc7 & 30 & 30 & 29 & 126 & 34 & 23 & 24 & 216 & 31 & 20 & 22 & 207\\
\midrule
RIA (dictionary) & conv5 & 27 & 28 & 26 & 119 & 30 & 26 & 26 & 234 & 30 & 25 & 26 & 240\\
RIA (random) & conv5 & 28 & 29 & 27 & 127 & 29 & 22 & 25 & 233 & 30 & 20 & 23 & 222\\
RIA (rare-first) & conv5 & 32 & 33 & 30 & 134 & 31 & 28 & 29 & 243 & 32 & 29 & 30 & 258\\
RIA (frequent-first) &conv5 & 28 & 29 & 27 & 125 & 30 & 22 & 24 & 218 & 29 & 19 & 21 & 200\\
\midrule
RIA (dictionary) & finetune & 26 & 29 & 26 & 128 & 31 & 30 & 29 & 251 & 32 & 34 & 31 & 261\\
RIA (rare-first) & finetune & 31 & 33 & 31 & 135 & 33 & {\bf33} & 31 & {\bf251} & 35 & {\bf37} & 34 & 265\\
\bottomrule
\end{tabu}
\end{ThreePartTable}
\end{table*}
\begin{table*}[!t]
\caption{Experimental Results of Top-5 Annotation}
\label{top-5}
\centering
\begin{ThreePartTable}
\begin{tabu} to 140mm {X[6.1,l] X[2.5,c] *{3}{X[c] X[c] X[c] X[1.3,c]}}
\toprule
& & \multicolumn{4}{c}{Corel 5K} & \multicolumn{4}{c}{ESP GAME} & \multicolumn{4}{c}{IAPR TC12}\\
\cmidrule{3-14}
Method & Features & P & R & F & N+ & P & R & F & N+ & P & R & F & N+\\
\midrule
MBRM\cite{feng2004multiple} & HC\tnote{1} & 24 & 25 & 25 & 122 & 18 & 19 & 19 & 209 & 24 & 23 & 24 & 223\\
JEC\cite{makadia2008new} & HC & 27 & 32 & 29 & 139 & 22 & 25 & 23 & 224 & 28 & 29 & 29 & 250\\
TagProp\cite{guillaumin2009tagprop} & HC & 33 & 42 & 37 &160 & 39 & 27 & 32 & 239 & 46 & 35 & 40 & 266\\
2PKNN\cite{verma2012image} & HC & 39 & 40 & 40 & 177 & 51 & 23 & 32 & 245 & 49 & 32 & 39 & 274\\
\midrule
JEC & fc7 & 31 & 32 & 31 & 141 & 26 & 22 & 24 & 234 & 28 & 21 & 24 & 237\\
2PKNN & fc7 & {\bf33}\tnote{2} & 30 & 32 & {\bf160} & {\bf40} & 23 & 29 & {\bf250} & {\bf38} & 23 & 29 & 261\\
\midrule
RIA (dictionary) & fc7 & 30 & 29 & 30 & 138 & 32 & 27 & 27 & 241 & 31 & 26 & 27 & 233\\
RIA (rare-first) & fc7 & 32 & {\bf35} & {\bf32} & 139 & 32 & {\bf32} & {\bf31} & 249 & 35 & {\bf34} & \bf{33} & {\bf267}\\
\bottomrule
\end{tabu}
\vspace{0.7mm}
\begin{minipage}{137mm}
\begin{tablenotes}[flushleft]
\footnotesize
\item[1] \hspace{0.5mm} HC: hand-crafted features.
\item[2] \hspace{0.5mm} For a fair comparison, we only use bold fonts for the highest value among the methods using the same fc7 features.
\end{tablenotes}
\end{minipage}
\end{ThreePartTable}
\end{table*}
\begin{figure*}[!t]
\centering
\subfloat[Corel 5K]{\includegraphics[width=.9\textwidth]{corel5k_different_orders.pdf}%
\label{corel5k}}
\hfil
\subfloat[ESP Game]{\includegraphics[width=.9\textwidth]{espgame_different_orders.pdf}%
\label{espgame}}
\hfil
\subfloat[IAPR TC12]{\includegraphics[width=.9\textwidth]{iaprtc12_different_orders.pdf}%
\label{iaprtc12}}
\caption{Arbitrary length annotation results on all datasets. We show the trained models of first 50 epochs for evaluation and comparison of different tag orders.}
\label{fig_result}
\end{figure*}
\subsection{Order of Tag Sequence}
To use the original training annotations as the input of LSTM, we have to sort the tag set to a tag sequence. We provide four orders: dictionary order, random order, rare-first order and frequent-first order. The dictionary order sorts the tags for each image alphabetically; the random order generates random tag sequence for each image as its name suggests; the rare-first order put the rarer tag before the more frequent ones (based on tag frequency in the dataset); the frequent-first order put the more frequent tag before the less frequent ones.
\section{Datasets and Experimental Setup}
In this section we first present the dataset used in our experiments, then we describe the different experimental settings and the evaluation measures for the experiments. Finally we explain the training details in our experiments.
\subsection{Datasets}
We adopt three image annotation datasets that have been used in previous work: Corel~5K~\cite{duygulu2002object}, ESP~Game~\cite{von2004labeling}, and IAPR~TC12~\cite{grubinger2007analysis}. Table \ref{dataset} shows statistics of the training sets of three datasets, some of which are described in a mean / maximum manner.
\subsection{Experimental Setting}
First, we compare RIA model with different tag sequence orders in the task of arbitrary length annotation. To further explore the image embedding submodule, we also compare the RIA models trained with different kinds of CNN features.
Second, we compare RIA model with existing methods on the three datasets in top-$5$ evaluation measures. For a fair comparison, especially we want to compare with the state-of-the-art methods that use the same CNN features as we adopt in our model.
\subsection{Evaluation Measures}
For both top-$5$ annotation and arbitrary length annotation, we use precision $P$, recall $R$ and F-measure $F$ averaged over classes as the main evaluation measures. Another widely used measure $N+$, which represents the number of classes with non-zero recall value, is also reported.
\subsection{Training Details}
We use three different ways to obtain the visual features: the last fully-connected layer of a pre-trained CNN denoted as \textit{fc7}, the last convolutional layer of a pre-trained CNN denoted as \textit{conv5}, and the output of a jointly trained (fine-tuned) CNN. The specific CNN model used here is the VGG-16 net~\cite{simonyan2014very}. For the tag sequence prediction module (LSTM), we set the dimension of hidden states $H$ and input $D$ both to be 1024, and we finally choose the number of hidden layers to be $1$ after exhaustive validations.
The learning rate policy used in our experiment is Adam~\cite{kingma2014adam}, which has been widely used recently. We set the initial learning rate, $\beta_1$, $\beta_2$ and $\epsilon$ as $0.0001$, $0.9$, $0.999$, $0.1$, respectively. Dropout with a ratio of $0.5$ is used in the tag classification layers of RNN. All the hyper-parameters are selected by cross-validation.
\section{Experimental Results}
\subsection{Arbitrary Length Annotation}
Table \ref{arbitrary length} shows that \textit{fc7} features achieve better performance than \textit{conv5} features in our model. The fined-tuned CNN features have a similar performance to \textit{fc7} features, but need much more training time. Thus in the following experiments we only compare our models using \textit{fc7} features with other methods. Also, the rare-first order outperforms other orders in almost all evaluation measures. From Figure \ref{fig_result}, we observe that models using rare-first order converge faster than others, and the difference is even more significant in the larger datasets ESP~Game and IAPR~TC12. The random order has a slight advantage over other orders in precision, while in terms of recall it has very poor performance. For F-measure, dictionary and random order have similar performance. The frequent-first order has the worst performance in recall and F-measure.
We compare the experimental results with our expectation: First, though dictionary order actually assigns all the tags of training examples in the same rule, it is almost meaningless since it does not provide any semantic information about the images or tags, and thus it leads to a poor performance. Second, though random order provides some possible proper orders for each training example, it does not follow the same rule and makes the model confused about the noisy orders, which may also result in a low recall rate. Third, rare-first order considers the frequency of tags and to some extent can help handle the rare tags problem, which is very important for improving the per-class measures. Besides, it uses the same rule to sort tags of all training examples, hence makes it easy for the model to learn. Finally, the frequent-first order has worse performance than we expected. We analyze the reasons why frequent-first order performs poorly especially in large datasets: the frequent tags are usually easier to predict than rare tags, and the frequent-first order puts the frequent tags first, so easy work becomes easier, but hard work becomes more difficult, which causes the extremely low per-class mean recall rate. The lowest N+ score also indicates that frequent-first order harms the ability of the model to correctly predict rare tags.
Our experiments show that the order of tag sequence is crucial for tag sequence generation. However, note that we are only using several naive approaches to decide the order, and we believe that there should be better ways to choose or learn an optimal order for this task.
\subsection{Top-5 annotation}
As shown in Table \ref{top-5}, in the conventional top-5 annotation task, our model outperforms several state-of-the-art methods that use the same CNN features. Although the same methods with multiple hand-crafted features and metric learning have better performance, the advantage of using deep features is that we can avoid the complexity of hand-crafted features and the expensiveness of metric learning. Besides the comparable performance to several state-of-the-art methods, our model also runs in an extremely fast testing speed: 5~ms per image on an NVIDIA Titan X GPU. This is very difficult for KNN based methods to achieve, especially in large scale practical problems. That is because the testing time of KNN based methods is increasing linearly with the size of training examples, while the testing time of our model is constant, i.e., not affected by the dataset size.
\section{Conclusion}
We transformed the image annotation task to a sequence generation problem, and proposed a novel Recurrent Image Annotator model that receives an image as input and predicts a sequence of tags recursively. We evaluated our model in the traditional top-5 evaluation setting on three different image annotation datasets. The experimental results show that our model can achieve comparable performance to some state-of-the-art methods. On the condition of only using deep features without expensive metric learning, our model outperforms several state-of-the-art methods. We also evaluated our model on the arbitrary length annotation task, where the model has to decide appropriate annotation length automatically. To explore the influence of the tag sequence order used in the training phase, we evaluated several order candidates and our experiments confirmed the importance of a proper order in the tag sequence generation problem. From the empirical experimental results, we conclude that RNN model is capable of doing image annotation task, and since this is only a start for adopting RNN or other sequence generation techniques in this field, we believe that there is much more to explore in the future work.
\ifCLASSOPTIONcompsoc
\else
\fi
\bibliographystyle{IEEEtran}
|
\section{Introduction}
Spintronics is a new emerging field in solid-state physics with the aim to
exploit the spin degree of freedom of electrons, which may lead to smaller and
faster semiconductor devices with reduced power consumption. The aim of
the mathematical modeling of spin-polarized materials is to develop a
hierarchy of models that describe the relevant physical phenomena in an accurate
way and, at the same time, allow for fast and
efficient numerical predictions. A model class which seems to fulfill the
requirements of precision and simplicity are moment equations derived from
the (spinorial) Boltzmann equation.
In the literature, up to now,
mostly lowest-order moment equations for spin transport have been investigated,
namely spin drift-diffusion-type equations
\cite{ElH14,PSP05,PoNe11,Sai04}. These models are mathematically analyzed in
\cite{GaGl10,Gli08,JNS15,Zam14}. When hot electron
thermalization has to be taken into account, the carrier transport needs to be
described by higher-order moment equations including energy transport.
This leads to semiclassical energy-transport equations in semiconductors,
see, e.g., \cite{BeDe96,BDG96,CKRSD92,Jue09}. A spinorial energy-transport
model was derived in \cite{BeEl09}, but the equations are not explicit such that
its structure is not easy to analyze.
The goal of this paper is to derive and analyze simplified explicit
versions of this model.
The starting point is the spinorial Boltzmann equation
for the distribution function $F(x,k,t)$ with values in the space of
Hermitian $2\times 2$ matrices,
\begin{equation}\label{1.be}
\pa_t F + k\cdot\na_x F - \na_x V\cdot\na_k F = Q(F)
+ \frac{\mathrm{i}}{2}[\vec{\Omega}\cdot\vec{\sigma},F] + Q_{\rm sf}(F),
\end{equation}
where $x\in\R^3$ denotes the spatial variable, $k\in\R^3$ the wave vector,
$t>0$ the time, $\mathrm{i}=\sqrt{-1}$ the imaginary unit, and $[\cdot,\cdot]$
the commutator. The function
$V(x,t)$ is the electric potential, which is usually self-consistently
defined as the solution of the Poisson equation
$$
-\lambda_D^2\Delta V = n_0[F] - C(x), \quad
n_0[F] = \frac12\operatorname{tr}\int_{\R^3}Fdk,
$$
where $\lambda_D$ is the scaled Debye length, $n_0[F]$ the charge density,
``tr'' the trace of a matrix,
and $C(x)$ the doping concentration \cite{Jue09}. Furthermore,
$\vec{\Omega}(x,k)$ is a local magnetization field and
$\vec{\sigma}=(\sigma_1,\sigma_2,\sigma_3)$ is the vector of the Pauli matrices.
We choose the spin-conserving BGK-type collision operator $Q(F)=M[F]-F$, where the
Maxwellian $M[F]$ is such that $Q(F)$ conserves mass and energy, and
the operator $Q_{\rm sf}(F)$ models spin-flip interactions.
Details are given in Section \ref{sec.deriv}.
Assuming dominant collisions and a large time scale, moment equations
for the electron density $n[A,C]$ and energy density $W[A,C]$ can be derived
from \eqref{1.be} in the diffusion limit \cite{BeEl09}, leading to
\begin{equation}\label{1.et}
\begin{aligned}
\pa_t n[A,C] + \diver J_n &= F_n[\vec{\Omega},A,C], \\
\pa_t W[A,C] + \diver J_W + J_n\cdot\na V &= F_W[\vec{\Omega},A,C],
\quad x\in\R^3,\ t>0,
\end{aligned}
\end{equation}
where $J_n$ and $J_W$ are the particle and energy flux, respectively, and
$F_n$, $F_W$ are some functions; we refer to Section \ref{sec.deriv} for details.
Furthermore, $A$ and $C$ are the Lagrange
multipliers which are obtained from entropy maximization
under the constraints of given mass and energy, and
the electron and energy densities are the zeroth- and second-order moments
$$
n[A,C] = \int_{\R^3}M[A,C]dk, \quad W[A,C] = \frac12\int_{\R^3}M[A,C]|k|^2 dk,
$$
where $M[A,C]=\exp(A+C|k|^2/2)$ is the
spinorial Maxwellian. Note that $A$ and $C$ are Hermitian matrices in
$\C^{2\times 2}$, so $n[A,C]$ and $W[A,C]$ are Hermitian matrices too.
In contrast to the semiclassical situation,
the densities cannot be expressed explicitly in terms of the
Lagrange multipliers because of the matrix structure.
In order to obtain explicit equations, we need to impose
simplifying assumptions on $A$ and $C$.
Our strategy is to first formulate the variables in terms
of the Pauli basis,
$$
A = a_0\sigma_0 + \vec{a}\cdot\vec{\sigma}, \quad
C = c_0\sigma_0 + \vec{c}\cdot\vec{\sigma},
$$
where $\sigma_0$ is the unit matrix and $a_0$, $c_0\in\R$,
$\vec{a}$, $\vec{c}\in\R^3$. The densities may be expanded in
this basis as well,
$n[A,C] = n_0\sigma_0 + \vec{n}\cdot\vec{\sigma}$,
$W[A,C] = W_0\sigma_0 + \vec{W}\cdot\vec{\sigma}$,
and the Maxwellian becomes
\begin{equation}\label{1.max}
M[A,C] = e^{a_0+c_0|k|^2/2}\bigg(\cosh|\vec{b}(k)|\sigma_0
+ \frac{\sinh|\vec{b}(k)|}{|\vec{b}(k)|}\vec{b}(k)\cdot\vec{\sigma}\bigg),
\quad \vec{b}(k) := \vec{a}+\vec{c}\frac{|k|^2}{2}.
\end{equation}
The formulation of the energy-transport model \eqref{1.et} in terms of the
Pauli components $(a_0,\vec{a})$, $(c_0,\vec{c})$ still leads to nonexplicit
equations, so we will impose some conditions. We will derive three model
classes by assuming $\vec{c}=0$, $\vec{a}=0$, or $\vec{a}=\lambda\vec{c}$
for some $\lambda=\lambda(x,t)$ and show the following results:
\begin{itemize}
\item First model class ($\vec{c}=0$):
we discretize the one-dimensional equations using a semi-implicit Euler
finite-volume scheme
and illustrate the effect of the temperature on two multilayer structures.
\item Second model class ($\vec{a}=0$): we show the existence of weak solutions
to a time-discrete version.
\item Third model class ($\vec{a}=\lambda\vec{c}$): we show that the equation
for the spin accumulation density $\vec{s}=\vec{n}/|\vec{n}|$ has some similarities
with the Landau-Lifshitz equation.
\item All model classes: we compute the entropy (free energy) and the
entropy production, thus providing not only the monotonicity of the entropy
but also gradient estimates.
\end{itemize}
These findings are a first step to understand higher-order spinorial
macroscopic models which may lead to improved simulation outcomes.
The paper is organized as follows. The main results are detailed in Section
\ref{sec.main}. The derivation of the general energy-transport
model from the spinorial Boltzmann equation is recalled in Section
\ref{sec.deriv} and the general model is formulated in terms of the Pauli components
in Section \ref{sec.pauli}. In Section \ref{sec.simpl}, the three simplified
energy-transport model classes are derived.
The entropy structure is investigated in Section \ref{sec.ent}, and the
existence result for the second model is stated and proved in Section
\ref{sec.ex}. Some numerical experiments for the first model are performed
in Section \ref{sec.num}.
\section{Main results}\label{sec.main}
We detail the main results of this paper.
\subsection{Derivation of explicit spin energy-transport models}
We derive explicit versions of \eqref{1.et} under three simplifying
assumptions on the Pauli components of $A$ and $C$.
\subsubsection*{First model: $\vec{c}=0$.}
If the Lagrange multiplier $C$
is interpreted as a ``temperature'' tensor, it might be reasonable to
suppose that the ``spin'' part $\vec{c}$ is much smaller than the
non-vanishing trace part $c_0$, which motivates the simplification $\vec{c}=0$.
This allows us to write three of the eight scalar moments $(n_0,\vec{n})$ and
$(W_0,\vec{W})$ in terms of the remaining moments, leading to equations
for five moments. We choose the moments $(n_0,\vec{n},W_0)$, leading to
the system (see Section \ref{sec.et1})
\begin{align}
& \pa_t n_0 + \diver J_n = 0, \quad J_n = -\big(\na(n_0T) + n_0\na V\big),
\label{1.et1.n0} \\
& \frac32\pa_t(n_0T) + \diver J_W + J_n\cdot\na V = 0, \quad
J_W = -\frac52\big(\na(n_0T^2) + n_0T\na V\big), \label{1.et1.n0T} \\
& \pa_t \vec{n} - \sum_{j=1}^3\pa_{x_j}\big(\pa_{x_j}
(\vec{n}T)+\vec{n}\pa_{x_j}V\big)
+ \vec{\Omega}_{\rm e}\times\vec{n} = -\frac{\vec{n}}{\tau_{\rm sf}},
\quad x\in\R^3,\ t>0, \label{1.et1.vecn}
\end{align}
where $T=2W_0/(3n_0)$ is interpreted as the electron temperature,
$\pa_{x_j}=\pa/\pa x_j$, $\vec{\Omega}_{\rm e}$ is the even part of the
effective field (with respect to $k$), and
$\tau_{\rm sf}>0$ is the spin-flip relaxation time.
In this model, $(n_0,\frac32 n_0T_0)$ solves the semiclassical energy-transport
equations, and the spin-vector density $\vec{n}$ solves a drift-diffusion-type
equation, which is coupled to the equations for $(n_0,\frac32 n_0T_0)$ via $T$ only.
Our numerical experiments indicate that this coupling is rather weak.
Motivated from \cite{PoNe11}, we may include a polarization matrix $P$ in the
definition of the collision operator $Q(F)$. We choose $Q(F)=P^{1/2}(M[F]-F)P^{1/2}$,
where the direction of $P=\sigma_0+p\vec{\Omega}\cdot\vec{\sigma}$ in spin space
is the local magnetization $\vec\Omega$ and $p\in[0,1)$ represents the spin
polarization of the scattering rates. This operator conserves spin, mass,
and (in contrast to the operators in \cite{PoNe11}) energy.
The corresponding spin energy-transport model (still under the assumption
$\vec{c}=0$) becomes (see Remark \ref{rem.et1})
\begin{align}
& \pa_t n_0 + \diver\J_n = 0, \quad
\J_n = \eta^{-2}\big(J_n - p\vec{\Omega}\cdot\vec{J}_n\big), \label{1.et1a.n0} \\
& \frac32\pa_t(n_0T) + \diver\J_W + \J_n\cdot\na V=0, \quad
\J_W = \eta^{-2}\big(J_W - p\vec{\Omega}\cdot\vec{J}_W\big), \label{1.et1a.n0T} \\
& \pa_t\vec{n} + \diver\vec{\J} + \vec{\Omega}_{\rm e}\times\vec{n}
= -\frac{\vec{n}}{\tau_{\rm sf}}, \quad x\in\R^3,\ t>0, \label{1.et1a.vecn}
\end{align}
where $\eta=\sqrt{1-p^2}$, $J_n$, $J_W$ are as above, and
\begin{align*}
\vec{J}_n &= -\big(\na(\vec{n}T) + \vec{n}\na V\big), \quad
\vec{J}_W = -\frac52\big(\na(\vec{n}T^2) + \vec{n}\na V\big), \\
\vec{\J} &= \eta^{-2}\big((1-\eta)(\vec{J}_n\cdot\vec{\Omega})\vec{\Omega}
+ \eta\vec{J}_n - p\vec{\Omega}J_n \big).
\end{align*}
Note that we recover the model \eqref{1.et1.n0}-\eqref{1.et1.vecn} if $p=0$.
We compare both models numerically in Section \ref{sec.num}.
It turns out that the polarization matrix $P$ leads to a stronger mixing of
the spin density components, and the heat flux effects causes a smoothing of
these components.
\subsubsection*{Second model: $\vec{a}=0$.}
The Lagrange multiplier $A$ may be related to the particle density.
Supposing that the spin effects are rather encoded in $\vec{c}$, one may
assume that $\vec{a}=0$. This condition gives as above three constraints and leads
to equations for five moments. One may choose, for instance, the variables
$(n_0,\vec{n},T)$ or $(n_0,T,\vec{W})$. In the former case,
we arrive at the system of coupled equations
\begin{align}
& \pa_t n_0 + \diver J_n = 0, \quad J_n = -\big(\na(n_0T) + n_0\na V\big),
\label{1.et2.n0} \\
& \frac32\pa_t(n_0T) + \diver J_W + J_n\cdot\na V = 0, \quad
J_W = -\frac52\big(\na(D(n_+,n_-)n_0T^2) + n_0T\na V\big), \label{1.et2.n0T} \\
& \pa_t\vec{n} - \sum_{j=1}^3\pa_{x_j}\bigg(\pa_{x_j}
\bigg(p(n_+,n_-)n_0T\frac{\vec{n}}{|\vec{n}|}\bigg)+\vec{n}\pa_{x_j}V\bigg)
+ \vec{\Omega}_{\rm e}\times\vec{n} = -\frac{\vec{n}}{\tau_{\rm sf}},
\label{1.et2.vecn}
\end{align}
and $D(n_+,n_-)$, $p(n_+,n_-)$, defined in \eqref{32.Dp}, depend on the
spin-up/spin-down densities $n_\pm:=n_0\pm|\vec{n}|$ (see Section \ref{sec.et2}).
Compared to the first model, these coefficients realize a coupling between the
charge and spin-vector densities. A similar model can be derived in the variables
$(n_0,T,\vec{W})$. This coupling is still rather weak
since the function $D(n_+,n_-)$ only takes values in the interval $[1,1.1]$; see
Remark \ref{rem.D}.
\subsubsection*{Third model: $\vec{a}=\lambda\vec{c}$.}
Generalizing the above approaches, we suppose that the vectors
$\vec{a}$ and $\vec{c}$ are aligned such
that $\vec{a}=\lambda\vec{c}$ for some function $\lambda=\lambda(x,t)\neq 0$.
The first model is recovered for $\lambda\to \infty$, the second one for
$\lambda=0$. This condition
provides only two constraints such that we obtain a system for six moments.
A possible choice is $(n_\pm,W_\pm,\vec{s})$, where
$n_\pm=n_0\pm|\vec{n}|$, $W_\pm=W_0\pm|\vec{W}|$, and $\vec{s}=\vec{n}/|\vec{n}|$,
which gives the equations
\begin{align}
& \pa_tn_\pm + \diver J_{n,\pm} = \mp\frac{n_+ - n_-}{2\tau_{\rm sf}}
\mp \frac12(n_+T_+ - n_-T_-)|\na\vec{s}|^2, \label{1.et3.npm} \\
& \frac32\pa_t(n_\pm T_\pm) + \diver J_{W,\pm} + J_{n,\pm}\cdot\na V
= \mp\frac{3}{4\tau_{\rm sf}}(n_+T_+ - n_-T_-) \label{1.et3.nT} \\
&\phantom{\frac32\pa_t(n_\pm T_\pm) + \diver J_{W,\pm} + J_{n,\pm}\cdot\na V
=}{}\mp \frac54(n_+T_+^2 - n_-T_-^2)|\na\vec{s}|^2, \nonumber \\
& \pa_t\vec{s} - \frac{n_+T_+ - n_-T_-}{n_+ - n_-}\vec{s}\times
(\Delta\vec{s}\times\vec{s})
= \bigg(2\frac{\na(n_+T_+ - n_-T_-)}{n_+ - n_-} + \na V\bigg)\cdot\na\vec{s}
- \vec{\Omega}_{\rm e}\times\vec{s}, \label{1.et3.s}
\end{align}
with the spin-up/spin-down particle and heat fluxes
\begin{equation}\label{1.et3.J}
J_{n,\pm} = -\big(\na(n_\pm T_\pm) + n_\pm\na V\big), \quad
J_{W,\pm} = -\frac52\big(\na(n_\pm T_\pm^2) + n_\pm T_\pm\na V\big),
\end{equation}
and the spin-up/spin-down energy densities $W_\pm = \frac32n_\pm T_\pm$.
The evolution equations for the spin-up/spin-down densities
are similar in structure as the first and second model.
For constant ``temperature'' $T_+=T_-=1$, we recover the two-component
spin drift-diffusion equations analyzed in \cite{Gli08}.
The coupling is realized through the spin-accumulation density
$\vec{s}$. The equation for $\vec{s}$ preserves the relation $|\vec{s}|=1$, and
the second-order term
$\vec{s}\times(\Delta\vec{s}\times\vec{s})$ also appears in the
Landau-Lifshitz equation \cite{LaLi35}; see Remark \ref{rem.LLG}.
\subsection{Entropy inequalities}
We prove that there exists an entropy
(or free energy) which is nonincreasing in time along solutions to the
corresponding equations.\footnote{In contrast to the physical notation,
the mathematical entropy is defined here as the negative physical entropy.}
To simplify the computations, we neglect electric effects,
i.e., the potential $V$ is assumed to be constant (also see Remark \ref{rem.ent1}
for the general situation).
The kinetic entropy of the general spin model \eqref{1.et} is given by
\begin{equation}\label{1.H}
H = \int_{\R^3}\int_{\R^3}\operatorname{tr}(M\log M)dkdx,
\end{equation}
where the Maxwellian is defined by \eqref{1.max} and ``tr'' denotes the
trace of a matrix. It was shown in \cite[Theorem 2.2]{BeEl09}
that the entropy is nonincreasing along solutions to \eqref{1.et}.
Our aim is to quantify the entropy production $-dH/dt$
which provides gradient estimates.
To this end, we insert the simplifying Maxwellians in \eqref{1.H} and
compute explicit expressions for the entropies. Denoting by $H_j$ the entropy
of the $j$th model presented above, we obtain
\begin{align}
H_1 &= \int_{\R^3}\big(n_+\log(n_+T_+^{-3/2}) + n_-\log(n_-T_-^{-3/2})\big)dx,
\label{1.H1} \\
H_2 &= \frac52\int_{\R^3}n_0\log\frac{n_0}{W_+^{3/5}+W_-^{3/5}}dx,
\quad\mbox{where }W_\pm=\frac32n_0T\pm |\vec{W}|^2, \label{1.H2} \\
H_3 &= H_1, \label{1.H3}
\end{align}
and the corresponding entropy inequalities read as (see Propositions
\ref{prop.ent1}-\ref{prop.ent3})
\begin{align}
\frac{dH_1}{dt} + 4\int_{\R^3}\big(|\na\sqrt{n_+ T}|^2 + |\na\sqrt{n_- T}|^2
+ 5n_0|\na\sqrt{T}|^2\big)dx &\le 0, \nonumber \\
\frac{dH_2}{dt} + c\int_{\R^3}\big(|\na \sqrt{W_+}|^2 + |\na \sqrt{W_-}|^2
+ T|\na \sqrt{n_0}|^2\big) dx &\le 0, \label{1.dhdt2} \\
\frac{dH_3}{dt} + c\int_{\R^3}\sum_{s=\pm}\big(T_s|\na\sqrt{n_s}|^2
+ n_s|\na\sqrt{T_s}|^2\big)dx &\le 0, \nonumber
\end{align}
where $c>0$ is some number and the results hold for smooth solutions.
\subsection{Existence analysis for the second model}
The second analytical result concerns the existence analysis for the
second model ($\vec{a}=0$) in the variables $(n_0,W_0,\vec{W})$, where
$W_0=\frac32n_0T$. Because
of the strong coupling, we are only able to prove the existence of solutions
to a time-discrete version without electric field in a bounded domain
$\dom\subset\R^d$:
\begin{align}
\frac{1}{h}(n_0-n_0^0) - \frac23\Delta W_0 &= 0, \label{12.n0} \\
\frac{1}{h}(W_0-W_0^0) - \frac{8}{15}\Delta\bigg(\frac{1}{n_0}
(W_+^{3/5}+W_-^{3/5})(W_+^{7/5}+W_-^{7/5})\bigg) &= 0, \label{12.w0} \\
\frac{1}{h}(\vec{W}-\vec{W}^0) - \frac{5}{18}\Delta\bigg(\frac{1}{n_0}
(W_+^{3/5}+W_-^{3/5})(W_+^{7/5}-W_-^{7/5})\frac{\vec{W}}{|\vec{W}|}\bigg)
&= -\frac{\vec{W}}{\tau_{\rm sf}}\quad \mbox{in }\dom, \label{12.vecw}
\end{align}
where $(n_0,W_0,\vec{W})$ is the solution at the actual time,
$(n_0^0,W_0^0,\vec{W}^0)$ is the solution at the previous time instant, and
$h>0$ is the time step size;
see Theorem \ref{thm.ex}. The boundary conditions are given by
\begin{equation}\label{12.bc}
n_0 = n_0^D, \quad W_0 = W_0^D, \quad \vec{W}=\vec{W}^D\quad\mbox{on }\pa\dom.
\end{equation}
The main difficulty in the existence proof is the derivation of
suitable a priori estimates. The entropy-production inequality \eqref{1.dhdt2}
provides estimates which are uniform in $h$, but they are not sufficient to
pass to the limit $h\to 0$ since the gradient estimate \eqref{1.dhdt2}
for $\na\sqrt{n_0}$ becomes useless in regions where $T$ is close to zero.
Our proof employs some ideas from \cite{ZaJu15}.
The first idea is to formulate \eqref{12.n0}-\eqref{12.vecw} as
\begin{align*}
n_0(u,v_0,\vec{v})-n_0^0 & = h\Delta u, \\
W_0(u,v_0,\vec{v})-W_0^0 & = h\Delta v_0, \\
\vec{W}(u,v_0,\vec{v})-\vec{W}^0 & = h\Delta \vec{v}
- (h/\tau_{\rm sf})\vec{W} \quad\mbox{in }\dom,
\end{align*}
where $(u,v_0,\vec{v})$ are some auxiliary variables. The second idea is
to truncate the new variables by replacing $u$ by $[u/v_0]_\eps v_0$, where
$[\cdot]_\eps$ is a truncation operator satisfying $[u/v_0]_\eps v_0=u$
for $0<u/v_0\le 1/\eps$. The existence of weak solutions
to the truncated problem is shown by means of the Leray-Schauder fixed-point
theorem. The compactness follows from standard $H^1$ elliptic estimates.
Then, choosing special Stampacchia-type test functions, we prove lower and
upper bounds for the new variables, which allow us to remove the truncation.
In this step, we exploit the particular structure of the equations.
Unfortunately, our a priori estimates depend on the time step size which
prevents the limit $h\to 0$. Even the analysis of the time-discrete equations
is highly delicate since the equations are elliptic in a non-standard sense.
The existence of weak solutions to the semiclassical energy-transport
equations near equilibrium was proved in \cite{ChHs03,FaIt01,Gri99}.
An existence analysis for general initial data was shown in \cite{DGJ97}
but for uniformly positive definite diffusion matrices only.
A semiclassical energy-transport system without electric effects has been
investigated in \cite{ZaJu15}. This system possesses similar difficulties
as \eqref{12.n0}-\eqref{12.vecw} but its structure is easier.
For details, we refer to Section \ref{sec.ex}.
\section{A general energy-transport model for spin transport}
\subsection{Derivation from the spinorial Boltzmann equation}\label{sec.deriv}
We sketch briefly the deri\-vation of the general energy-transport model \eqref{1.et}
from the spinorial Boltzmann transport equation \eqref{1.be}. Details are
given in \cite{BeEl09}. We consider the Boltzmann equation in the diffusion scaling,
\begin{equation}\label{2.be}
\pa_t F_\eps + \frac{1}{\eps}\big(k\cdot\na_x F_\eps - \na_x V\cdot\na_k F_\eps\big)
= \frac{1}{\eps^2}Q(F_\eps)
+ \frac{\mathrm{i}}{2}[\vec\Omega_\eps(x,k)\cdot\vec\sigma,F_\eps]
+ Q_{\rm sf}(F_\eps),
\end{equation}
The parameter $\eps>0$ is the scaled mean free path and is supposed to be small.
We have assumed the parabolic-band approximation such that the mean velocity
equals $v(k)=k$.
The last term in \eqref{2.be} represents the spin-flip interactions
which are specified in \eqref{3.sf} below.
The commutator $[\cdot,\cdot]$ on the right-hand side
of \eqref{2.be} can be rigorously derived
from the Schr\"odinger equation with spin-orbit Hamiltonian in the semiclassical
limit \cite[Chapter~1]{ElH08}. The term models a precession effect around
the effective field \cite{BeEl09}.
The first term on the right-hand side of \eqref{2.be} models
collisions that conserve mass and energy. For simplicity, we employ
the BGK-type operator (named after Bhatnagar, Gross, and Krook)
$Q(F) = M[F]-F$,
where the Maxwellian $M[F]$ associated to $F$ has the same mass and energy as $F$,
\begin{equation}\label{2.AC}
\int_{\R^3}M[F]dk = \int_{\R^3}Fdk, \quad
\frac12\int_{\R^3}M[F]|k|^2dk = \frac12\int_{\R^3}F|k|^2dk.
\end{equation}
The Maxwellian is constructed from entropy maximization under the constraints of
given mass and energy, which yields, in case of
Maxwell-Boltzmann statistics, the existence of Lagrange multipliers
$A(x,t)$ and $C(x,t)$ such that \cite{BeEl09}
$$
M[F](x,k,t) = \exp\bigg(A(x,t)+C(x,t)\frac{|k|^2}{2}\bigg),
$$
where exp is the matrix exponential and
$A$, $C$ are Hermitian $2\times 2$ matrices satisfying
\eqref{2.AC}.
The space of Hermitian $2\times 2$ matrices can be spanned by the
unit matrix $\sigma_0$ and the Pauli matrices
$\vec\sigma=(\sigma_1,\sigma_2,\sigma_3)$,
$$
\sigma_0 = \begin{pmatrix} 1 & 0 \\ 0 & 1 \end{pmatrix}, \quad
\sigma_1 = \begin{pmatrix} 0 & 1 \\ 1 & 0 \end{pmatrix}, \quad
\sigma_2 = \begin{pmatrix} 0 & -\mathrm{i} \\ \mathrm{i} & 0 \end{pmatrix}, \quad
\sigma_3 = \begin{pmatrix} 1 & 0 \\ 0 & -1 \end{pmatrix}.
$$
Accordingly, we may write $A=a_0+\vec{a}\cdot\vec\sigma$ and
$C=c_0+\vec{c}\cdot\vec\sigma$, where $a_0$, $c_0\in\R$,
$\vec{a}=(a_1,a_2,a_3)$, $\vec{c}=(c_1,c_2,c_3)\in\R^3$, and
$\vec{a}\cdot\vec{\sigma}=\sum_{j=1}^3 a_j\sigma_j$. The coefficients
in the Pauli basis are computed from $a_0=\frac12\operatorname{tr}(A)$,
$\vec{a}=\frac12\operatorname(\vec{\sigma}A)$, and similarly for $c_0$,
$\vec{c}$; see, e.g., \cite{PoNe11}. The matrix exponential can be also
expanded in the Pauli matrix, giving
$M[F] = M_0\sigma_0 + \vec{M}\cdot\vec\sigma$, where
\begin{equation}\label{2.MPauli}
M_0 = e^{a_0+c_0|k|^2/2}\cosh\bigg|\vec{a}+\vec{c}\frac{|k|^2}{2}\bigg|, \quad
\vec{M} = e^{a_0+c_0|k|^2/2}\frac{\sinh
|\vec{a}+\vec{c}|k|^2/2|}{|\vec{a}+\vec{c}|k|^2/2|}
\bigg(\vec{a}+\vec{c}\frac{|k|^2}{2}\bigg).
\end{equation}
It is shown in \cite[Theorem 3.1]{BeEl09} that $F_\eps$ converges formally
to $M:=M[A,C]=\exp(A+C|k|^2/2)$ as $\eps\to 0$,
where $(A,C)$ are solutions to the following
spin energy-transport system for the electron density $n(x,t)$ and energy
density $W(x,t)$, which are related to $(A,C)$ via the moment equations
$$
n = \int_{\R^3}M[A,C]dk, \quad
W = \frac12\int_{\R^3}M[A,C]|k|^2 dk.
$$
The general energy-transport equations read as \cite[Theorem~3.1]{BeEl09}
\begin{align}
& \pa_t n + \diver_x J_n = \frac{\mathrm{i}}{2}\int_{\R^3}\big|\vec{\Omega}_{\rm ET}
\cdot\vec\sigma,M\big]dk - \frac14\int_{\R^3}\big[\vec{\Omega}_{\rm o}
\cdot\vec\sigma,[\vec{\Omega}_{\rm o}\cdot\vec\sigma,M]\big]dk \label{2.etn} \\
&\phantom{xx}{}+ \int_{\R^3}Q_{\rm sf}(M)dk, \nonumber \\
& \pa_t W + \diver_x J_W + J_n\cdot\na_x V
= \frac{\mathrm{i}}{2}\int_{\R^3}\big[\vec{\Omega}_{\rm o}\cdot\vec\sigma,M\big]
\frac{|k|^2}{2}dk \label{2.etw} \\
&\phantom{xx}{}- \frac14\int_{\R^3}\big[\vec{\Omega}_{\rm o}
\cdot\vec\sigma,[\vec{\Omega}_{\rm o}\cdot\vec\sigma,M]\big]\frac{|k|^2}{2}dk
+ \frac12\int_{\R^3}Q_{\rm sf}(M)|k|^2dk,
\nonumber
\end{align}
where the effective field $\vec{\Omega}_{\rm ET}$ is defined by
\begin{equation}\label{2.OmET}
\vec{\Omega}_{\rm ET} = (k\cdot\na_x-\na_x V\cdot\na_k)\vec{\Omega}_{\rm o}
+ \vec{\Omega}_{\rm e},
\end{equation}
and $\vec{\Omega}_{\rm o}$ and $\vec{\Omega}_{\rm e}$ are the odd and even
parts of $\vec{\Omega}$ (with respect to $k$), respectively.
The tensor-valued fluxes are defined by
\begin{equation}\label{2.J}
\begin{aligned}
J_n &= -\diver_x\Pi - n\na_x V + \Pi_{\Omega_{\rm o}}, \\
J_W &= -\diver_x Q - (W\sigma_0+\Pi)\na_x V + Q_{\Omega_{\rm o}},
\end{aligned}
\end{equation}
and the tensors $\Pi=(\Pi^{j\ell})$, $Q=(Q^{j\ell})$ with
$\Pi^{j\ell}$, $Q^{j\ell}\in\C^{2\times 2}$ and
$\Pi_{\Omega_{\rm o}}=(\Pi_{\Omega_{\rm o}}^j)$,
$Q_{\Omega_{\rm o}}=(Q_{\Omega_{\rm o}}^j)$ with
$\Pi_{\Omega_{\rm o}}^j$, $Q_{\Omega_{\rm o}}^j\in\C^{2\times 2}$
are given by the moments
\begin{align*}
\Pi^{j\ell} &= \int_{\R^3}k_j k_\ell Mdk, &
Q^{j\ell} &= \frac12\int_{\R^3}k_j k_\ell|k|^2Mdk, \\
\Pi_{\Omega_{\rm o}}^j
&= \mathrm{i}\int_{\R^3}\big[\vec{\Omega}_{\rm o}\cdot\vec\sigma,M\big]k_j dk, &
Q_{\Omega_{\rm o}}^j &= \frac{\mathrm{i}}{2}\int_{\R^3}
\big[\vec{\Omega}_{\rm o}\cdot\vec\sigma,M\big]k_j|k|^2dk,
\end{align*}
where $j,\ell=1,2,3$.
The first two terms on the right-hand sides of \eqref{2.etn} and \eqref{2.etw}
are due to spinor effects; they vanish
in the classical energy-transport model. The last term on the left-hand side
of \eqref{2.etw} is the Joule heating and it is also present in the classical
model. The last terms in \eqref{2.etn}-\eqref{2.etw} express the moments
of the spin-flip interactions.
\subsection{Formulation in the Pauli basis}\label{sec.pauli}
In order to derive simplified spin energy-transport models in explicit form,
it is convenient to formulate \eqref{2.etn}-\eqref{2.etw} in the Pauli basis.
Recall that $n = n_0\sigma_0+\vec{n}\cdot\vec\sigma$ and
$W=W_0\sigma_0+\vec{W}\cdot\vec\sigma$. Furthermore, we expand
\begin{equation}\label{2.Q}
\int_{\R^3}Q_{\rm sf}(M)dk
= Q_{{\rm sf},n,0}\sigma_0+\vec{Q}_{{\rm sf},n}\cdot\vec\sigma, \quad
\frac12\int_{\R^3}Q_{\rm sf}(M)|k|^2dk
= Q_{{\rm sf},W,0}\sigma_0+\vec{Q}_{{\rm sf},W}\cdot\vec\sigma.
\end{equation}
\begin{lemma}[Energy-transport model in Pauli components]\label{lem.fullet}\sloppy
Equations \eqref{2.etn}-\eqref{2.etw} can be written in the Pauli components
$(n_0,\vec{n})$ and $(W_0,\vec{W})$ as
\begin{align}
& \pa_t n_0 - \diver_x\bigg(\frac23\na_x W_0+n_0\na_x V\bigg) = Q_{{\rm sf},n,0},
\label{2.etn0} \\
& \pa_t\vec{n} - \sum_{j=1}^3\pa_{x_j}\bigg(\frac23\pa_{x_j}\vec{W}
+ \vec{n}\pa_{x_j} V
+ 2\int_{\R^3}(\vec{\Omega}_{\rm o}\times\vec{M})k_jdk\bigg) \label{2.etvecn} \\
&\phantom{xx}{}+ \sum_{j=1}^3\int_{\R^3}\pa_{x_j}
(\vec{\Omega}_{\rm o}\times\vec{M})k_jdk
+ \sum_{j=1}^3\pa_{x_j} V\int_{\R^3}\pa_{k_j}(\vec{\Omega}_{\rm o}\times\vec{M})dk
+ \int_{\R^3}\vec{\Omega}_{\rm e}\times\vec{M}dk \nonumber \\
&\phantom{xx}{}+ \int_{\R^3}\big(|\vec{\Omega}_{\rm o}|^2
- \vec{\Omega}_{\rm o}\otimes\vec{\Omega}_{\rm o}\big)\cdot\vec{M}dk
= \vec{Q}_{{\rm sf},n}, \nonumber \\
& \pa_t W_0 - \diver_x\bigg(\frac16\int_{\R^3}\na_x M_0|k|^4 dk
+ \frac53 W_0\na_x V\bigg) \label{2.etw0} \\
&\phantom{xx}{}- \bigg(\frac23\na_x W_0+n_0\na_x V\bigg)\cdot\na_x V
= Q_{{\rm sf},W,0}, \nonumber \\
& \pa_t\vec{W} - \sum_{j=1}^3\bigg\{\pa_{x_j}\bigg(\frac16\pa_{x_j}\int_{\R^3}
\vec{M}|k|^4dk + \frac53\vec{W}\pa_{x_j}V
+ \int_{\R^3}(\vec{\Omega}_{\rm o}\times\vec{M})k_j|k|^2dk\bigg) \label{2.etvecw} \\
&\phantom{xx}{}+ \bigg(\frac23\pa_{x_j}\vec{W} + \vec{n}\pa_{x_j}V
+ 2\int_{\R^3}(\vec{\Omega}_{\rm o}\times\vec{M})k_jdk\bigg)\pa_{x_j} V\bigg\}
\nonumber \\
&\phantom{xx}{}+ \frac12\sum_{j=1}^3\pa_{x_j}
\int_{\R^3}(\vec{\Omega}_{\rm o}\times\vec{M})k_j|k|^2dk
+ \frac12\sum_{j=1}^3\pa_{x_j}V\int_{\R^3}
\pa_{k_j}(\vec{\Omega}_{\rm o}\times\vec{M})|k|^2 dk \nonumber \\
&\phantom{xx}{}+ \frac12\int_{\R^3}(\vec{\Omega}_{\rm e}\times\vec{M})|k|^2dk
+ \int_{\R^3}\big(|\vec{\Omega}_{\rm o}|^2
- \vec{\Omega}_{\rm o}\otimes\vec{\Omega}_{\rm o}\big)\cdot\vec{M}|k|^2 dk
= \vec{Q}_{{\rm sf},W}, \nonumber
\end{align}
where $\pa_{x_j}=\pa/\pa x_j$, $\pa_{k_j}=\pa/\pa k_j$.
\end{lemma}
\begin{proof}
We reformulate \eqref{2.etn}-\eqref{2.etw} in terms of the Pauli coefficients.
For this, set $J_{n}=(J_{n}^j)_{j=1,2,3}$, $J_W=(J_W^j)_{j=1,2,3}$ and
$J_n^j=J_{n,0}^j\sigma_0 + \vec{J}_n\cdot\vec{\sigma}$,
$J_W^j=J_{W,0}^j\sigma_0 + \vec{J}_W\cdot\vec{\sigma}$.
We obtain
\begin{align}
& \pa_t n_0 + \sum_{j=1}^3\pa_{x_j}J_{n,0}^j = Q_{{\rm sf},n,0}, \label{2.aux1} \\
& \pa_t\vec{n} + \sum_{j=1}^3\pa_{x_j}\vec{J}_n^j
+ \int_{\R^3}\vec{\Omega}_{\rm ET}\times\vec{M} dk
+ \int_{\R^3}\big(|\vec{\Omega}_{\rm o}|^2
- \vec{\Omega}_{\rm o}\otimes\vec{\Omega}_{\rm o}\big)\cdot\vec{M}dk
= \vec{Q}_{{\rm sf},n}, \label{2.aux2} \\
& \pa_t W_0 + \sum_{j=1}^3\big(\pa_{x_j}J_{W,0}^j + J_{n,0}^j\pa_{x_j}V\big)
= Q_{{\rm sf},W,0}, \label{2.aux3} \\
& \pa_t\vec{W} + \sum_{j=1}^3\big(\pa_{x_j}\vec{J}_W^j + \vec{J}_n^j\pa_{x_j}V\big)
+ \int_{\R^3}(\vec{\Omega}_{\rm ET}\times\vec{M})|k|^2 dk \label{2.aux4} \\
&\phantom{xxm}+ \frac12\int_{\R^3}\big(|\vec{\Omega}_{\rm o}|^2
- \vec{\Omega}_{\rm o}\otimes\vec{\Omega}_{\rm o}\big)\cdot\vec{M}|k|^2 dk
= \vec{Q}_{{\rm sf},W}. \nonumber
\end{align}
Let us expand the integrals involving $\vec{\Omega}_{\rm ET}$
and the fluxes. Let $\phi(k)=1$ or $\phi(k)=|k|^2/2$. Then, recalling
definition \eqref{2.OmET} for $\vec{\Omega}_{\rm ET}$,
\begin{align*}
\int_{\R^3} & (\vec{\Omega}_{\rm ET}\times\vec{M})\phi(k)dk \\
&= \int_{\R^3}\big(k\cdot\na_x - \na_x V\cdot\na_k\big)(\vec{\Omega}_{\rm o}
\times\vec{M})\phi(k)dk
+ \int_{\R^3}(\vec{\Omega}_{\rm e}\times\vec{M})\phi(k)dk \\
&= \sum_{j=1}^3\pa_{x_j}\int_{\R^3}(\vec{\Omega}_{\rm o}\times\vec{M})k_j\phi(k)dk
- \sum_{j=1}^3\pa_{x_j}V\int_{\R^3}(\pa_{k_j}\vec{\Omega}_{\rm o}\times\vec{M})
\phi(k)dk \\
&\phantom{xx}{}+ \int_{\R^3}(\vec{\Omega}_{\rm e}\times\vec{M})\phi(k)dk.
\end{align*}
Inserting these expressions into the evolution equations for $\vec{n}$ and $\vec{W}$,
we recover the three integrals in the second line of \eqref{2.etvecn} as well as
the integrals in the third line, and the first integral in the
fourthline of \eqref{2.etvecw}.
It remains to compute the fluxes \eqref{2.J}. First, we calculate
$$
\Pi^{j\ell} = \frac13\int_{\R^3}M|k|^2 dk\delta_{j\ell} = \frac23W\delta_{j\ell},
\quad Q^{j\ell} = \frac16\int_{\R^3}M|k|^4dk\delta_{j\ell}.
$$
Furthermore, using the formula $[\vec{u}\cdot\vec{\sigma},\vec{v}\cdot\vec{\sigma}]
= 2\mathrm{i}(\vec{u}\times\vec{v})\cdot\vec{\sigma}$ for $\vec{u}$, $\vec{v}\in\R^3$,
we find that
$\Pi_{\Omega_{\rm o}}=\Pi_{\Omega_{\rm o},0}\sigma_0+\vec{\Pi}_{\Omega_{\rm o}}
\cdot\vec\sigma$ with $\Pi_{\Omega_{\rm o},0}=0$ and
$\vec{\Pi}_{\Omega_{\rm o}}=-2\int_{\R^3}(\vec{\Omega}_{\rm o}\times\vec{M})k dk$.
Therefore,
\begin{align*}
J_{n,0}^j &= -\sum_{\ell=1}^3\pa_{x_\ell}\Pi_{0}^{j\ell}- n_0\pa_{x_j}V
+ \Pi_{\Omega_0,0}^j
= -\frac23\pa_{x_j}W_0 - n_0\pa_{x_j}V, \\
\vec{J}_{n}^j &= -\sum_{\ell=1}^3\pa_{x_\ell}\vec{\Pi}^{j\ell}
- \vec{n}\pa_{x_j}V + \vec{\Pi}_{\Omega_{\rm o}}^j
= -\frac23\pa_{x_j}\vec{W} - \vec{n}\pa_{x_j}V
- 2\int_{\R^3}(\vec{\Omega}_{\rm o}\times\vec{M})k_j dk.
\end{align*}
Expanding $Q_{\Omega_{\rm o}}=Q_{\Omega_{\rm o},0}\sigma_0
+\vec{Q}_{\Omega_{\rm o}}\cdot\vec\sigma$ with $Q_{\Omega_{\rm o},0}=0$ and
$\vec{Q}_{\Omega_{\rm o}}=-\int_{\R^3}(\vec{\Omega}_{\rm o}\times\vec{M})k|k|^2dk$,
it follows that
\begin{align*}
J_{W,0}^j &= -\sum_{\ell=1}^3\big(\pa_{x_\ell}Q_0^{j\ell} + (W_0\delta_{j\ell}
+ \Pi_0^{j\ell})\pa_{x_\ell}V\big) + Q_{\Omega_{\rm o},0}^j \\
&= -\frac16\pa_{x_j}\int_{\R^3}M_0|k|^4 dk - \frac53W_0\pa_{x_j}V, \\
\vec{J}_W^j &= -\sum_{\ell=1}^3\big(\pa_{x_\ell}\vec{Q}^{j\ell}
+ (\vec{W}\delta_{j\ell} + \vec{\Pi}^{j\ell})\pa_{x_\ell}V\big)
+ \vec{Q}_{\Omega_{\rm o}}^j \\
&= -\frac16\pa_{x_j}\int_{\R^3}\vec{M}|k|^4dk - \frac53\vec{W}\pa_{x_j}V
- \int_{\R^3}(\vec{\Omega}_{\rm o}\times\vec{M})k_j|k|^2 dk.
\end{align*}
Inserting these expressions into \eqref{2.aux1}-\eqref{2.aux4} gives
\eqref{2.etn0}-\eqref{2.etvecw}.
\end{proof}
\section{Simplified spin energy-transport equations}\label{sec.simpl}
In this section, we derive some explicit models. We assume for simplicity
that the odd part of the magnetization vanishes, $\vec{\Omega}_{\rm o}=0$, and
that the even part $\vec{\Omega}_{\rm e}$ depends on $x$ only.
Moreover, we suppose that the spin-flip interactions are modeled by the
relaxation-time operator
\begin{equation}\label{3.sf}
Q_{\rm sf}(M) := -\frac{1}{\tau_{\rm sf}}
\bigg(M-\frac12\operatorname{tr}(M)\sigma_0\bigg)
= -\frac{1}{\tau_{\rm sf}}\vec{M}\cdot\vec\sigma,
\end{equation}
where $\tau_{\rm sf}>0$ is the average time between two subsequent spin-flip
collisions, and we recall that $M=M_0\sigma_0+\vec{M}\cdot\vec\sigma$.
In particular, with the notation of \eqref{2.Q},
$$
Q_{{\rm sf},n,0} = 0, \quad \vec{Q}_{{\rm sf},n} = -\frac{\vec{n}}{\tau_{\rm sf}},
\quad Q_{{\rm sf},W,0} = 0, \quad
\vec{Q}_{{\rm sf},W} = -\frac{\vec{W}}{\tau_{\rm sf}}.
$$
Then system \eqref{2.etn0}-\eqref{2.etvecw} reduces to
\begin{align}
& \pa_t n_0 - \diver\bigg(\frac23\na W_0+n_0\na V\bigg) = 0, \label{3.etn0} \\
& \pa_t\vec{n} - \sum_{j=1}^3\pa_{x_j}\bigg(\frac23\pa_{x_j}\vec{W}
+\vec{n}\pa_{x_j}V\bigg) + \vec{\Omega}_{\rm e}\times\vec{n}
= -\frac{\vec{n}}{\tau_{\rm sf}}, \label{3.etvecn} \\
& \pa_t W_0 - \diver\bigg(\frac16\na\int_{\R^3}M_0|k|^2dk + \frac53W_0\na V\bigg)
- \bigg(\frac23\na W_0+n_0\na V\bigg)\cdot\na V = 0, \label{3.etw0} \\
& \pa_t\vec{W} - \sum_{j=1}^3\bigg\{\pa_{x_j}\bigg(\frac16\pa_{x_j}\int_{\R^3}
\vec{M}|k|^4 dk + \frac53\vec{W}\pa_{x_j}V\bigg) + \bigg(\frac23\pa_{x_j}\vec{W}
+ \vec{n}\pa_{x_j}V\bigg)\pa_{x_j}V\bigg\} \label{3.etvecw} \\
&\phantom{xxm}{}+ \vec{\Omega}_{\rm e}\times\vec{W} = -\frac{\vec{W}}{\tau_{\rm sf}}.
\nonumber
\end{align}
Given $(n_0,\vec{n},W_0)$, we define the spin-up/spin-down densities $n_\pm$
and the temperature $T$ by
\begin{equation}\label{3.npm}
n_\pm = n_0\pm|\vec{n}|, \quad W_0 = \frac32 n_0T.
\end{equation}
We also introduce the Gaussian with standard deviation $\theta>0$,
\begin{equation}\label{3.gT}
g_\theta(k) = (2\pi\theta)^{-3/2}\exp\bigg(-\frac{|k|^2}{2\theta}\bigg),
\end{equation}
whose moments are given by
\begin{equation}\label{3.int.gT}
\int_{\R^3}g_\theta(k)\begin{pmatrix} 1 \\ |k|^2/2 \\ |k|^4/6 \end{pmatrix}dk
= \begin{pmatrix} 1 \\ 3\theta/2 \\ 5\theta^2/2 \end{pmatrix}.
\end{equation}
\subsection{First model}\label{sec.et1}
\begin{theorem}[Spin energy-transport model with $\vec{c}=0$]\label{thm.czero}
For $\vec{c}=0$, system \eqref{3.etn0}-\eqref{3.etvecw} can be written in
the variables $(n_0,T,\vec{n})$ as \eqref{1.et1.n0}-\eqref{1.et1.vecn}.
\end{theorem}
\begin{proof}
Under the assumption $\vec{c}=0$, the higher-order moments
in \eqref{3.etw0}-\eqref{3.etvecw} can be computed explicitly. Indeed,
the Pauli expansion of the Maxwellian \eqref{2.MPauli} simplifies to
$$
M_0 = e^{a_0+c_0|k|^2/2}\cosh|\vec{a}|, \quad
\vec{M} = e^{a_0+c_0|k|^2/2}\sinh|\vec{a}|\frac{\vec{a}}{|\vec{a}|}.
$$
Observe that $c_0<0$ is necessary to ensure the integrability of $M_0$ and
$\vec{M}$. The above expressions can be reformulated by introducing the
new Lagrange multipliers
$$
\kappa_\pm := \bigg(\frac{2\pi}{-c_0}\bigg)^{3/2}e^{a_0\pm|\vec{a}|}, \quad
\theta := -\frac{1}{c_0}, \quad \vec{\gamma} := \frac{\vec{a}}{|\vec{a}|}.
$$
Then $M_0=\frac12(\kappa_+ + \kappa_-)g_\theta(k)$,
$\vec{M}=\frac12(\kappa_+ - \kappa_-)g_\theta(k)\vec{\gamma}$,
where $g_\theta$ is defined in \eqref{3.gT}.
As a consequence, we have
\begin{align*}
& n_0 = \int_{\R^3}M_0 dk = \frac12(\kappa_+ + \kappa_-), \quad
\vec{n} = \int_{\R^3}\vec{M}dk = \frac12(\kappa_+ - \kappa_-)\vec{\gamma}, \\
& W_0 = \frac12\int_{\R^3}M_0|k|^2 dk = \frac34\theta(\kappa_+ + \kappa_-),
\end{align*}
and we infer from \eqref{3.npm} that $\kappa_\pm = n_\pm$,
$\vec{\gamma}=\vec{n}/|\vec{n}|$, and $\theta=T$.
Then the Pauli coefficients become $M_0=n_0 g_T(k)$, $\vec{M}=\vec{n}g_T(k)$
and
$$
\vec{W} = \frac12\int_{\R^3}\vec{M}|k|^2 dk = \frac32\vec{n}T, \quad
\frac16\int_{\R^3}M_0|k|^4 dk = \frac52 n_0T^2.
$$
Inserting these expressions into \eqref{3.etn0}-\eqref{3.etvecw} shows the result.
\end{proof}
\begin{remark}\label{rem.et1}\rm
The derivation of model \eqref{1.et1a.n0}-\eqref{1.et1a.vecn} is similar to
that one in \cite{BeEl09}, therefore we sketch it only.
The Maxwellian is here given by
\begin{align*}
& M[F](k) = (2\pi\theta[F])^{-3/2}e^{-|k|^2/(2\theta[F])}\int_{\R^3} F(k')dk', \\
& \mbox{where }
\theta[F] = \frac13\frac{\int_{\R^3}\operatorname{tr}(PF(k))|k|^2dk}{\int_{\R^3}
\operatorname{tr}(PF(k))dk}.
\end{align*}
The formal limit $\eps\to 0$ in \eqref{2.be} gives $Q(F^0)=0$, where
$F^0=\lim_{\eps\to 0}F_\eps$, showing that $F^0=M[F^0]$. Next, we perform
a Hilbert expansion $F_\eps=M[F]+\eps F^1+O(\eps^2)$ and assume that $F^1$
is odd with respect to $k$. Since $1$, $|k|^2/2$ are even functions, $F^1$
does not contribute to the moments $n=\int_{\R^3}Fdk$,
$W=\frac12\int_{\R^3}F|k|^2dk$. It holds that
$W=\frac32 nT$, where $T:=\theta[F^0]$.
After a computation which is similar to the
derivation of the semiclassical energy-transport equations, we obtain the
moment equations
\begin{align*}
& \pa_t n + \diver G_n + \mathrm{i}[n,\vec{\Omega}\cdot\vec{\sigma}]
= \frac12\operatorname{tr}(n)-n, \quad
G_n = -P^{-1/2}\big(\na(nT) + n\na V\big)P^{-1/2}, \\
& \frac32\pa_t(nT) + \diver G_W + G_n\cdot\na V = 0, \quad
G_W = -\frac53 P^{-1/2}\big(\na(nT^2) + nT\na V\big)P^{-1/2}.
\end{align*}
In order to formulate these equations in the Pauli components,
we observe that for any $2\times 2$
Hermitian matrix $A=a_0\sigma_0+\vec{a}\cdot\vec{\sigma}$, it holds that
$P^{1/2}AP^{1/2}=b_0\sigma_0+\vec{b}\cdot\vec{\sigma}$, where
$$
\begin{pmatrix} b_0 \\ \vec{b}\end{pmatrix}
= \eta^{-2}\begin{pmatrix} 1 & -p\vec{\Omega}^\top \\
-p\vec{\Omega} & (1-\eta)\vec{\Omega}\otimes\vec{\Omega}+\eta\sigma_0\end{pmatrix}
\begin{pmatrix} a_0 \\ \vec{a}\end{pmatrix}, \quad \eta=\sqrt{1-p^2}.
$$
We omit the calulcation and only note that
this leads to \eqref{1.et1a.n0}-\eqref{1.et1a.vecn}.
\qed
\end{remark}
\subsection{Second model}\label{sec.et2}
\begin{theorem}[Spin energy-transport model with $\vec{a}=0$, version I]\sloppy
\label{thm.azero}
For $\vec{a}=0$, system \eqref{3.etn0}-\eqref{3.etvecw} can be written in
the variables $(n_0,T,\vec{n})$ as \eqref{1.et2.n0}-\eqref{1.et2.vecn},
where the diffusion coefficient $D(n_+,n_-)$ and the polarization factor
$p(n_+,n_-)$ are defined by
\begin{equation}\label{32.Dp}
D(n_+,n_-) = \frac{2n_0(n_+^{7/3}+n_-^{7/3})}{(n_+^{5/3}+n_-^{5/3})^2}, \quad
p(n_+,n_-) = \frac{n_+^{5/3}-n_-^{5/3}}{n_+^{5/3}+n_-^{5/3}},
\end{equation}
and the spin-up/spin-down densities are given by $n_\pm=n_0\pm|\vec{n}|$.
\end{theorem}
\begin{proof}
For $\vec{a}=0$, the Pauli components of the Maxwellian take the form
\begin{equation}\label{32.M}
M_0 = e^{a_0+c_0|k|^2/2}\cosh\bigg(|\vec{c}|\frac{|k|^2}{2}\bigg), \quad
\vec{M} = e^{a_0+c_0|k|^2/2}\sinh\bigg(|\vec{c}|\frac{|k|^2}{2}\bigg)
\frac{\vec{c}}{|\vec{c}|}.
\end{equation}
The integrability of $M_0$ and $\vec{M}$ implies that $c_0\pm|\vec{c}|<0$.
In the new Lagrange multiplier variables
\begin{equation}\label{32.K}
K := (2\pi)^{3/2}e^{a_0}, \quad \theta_\pm := -\frac{1}{c_0\pm|\vec{c}|}, \quad
\vec{\gamma} := \frac{\vec{c}}{|\vec{c}|}
\end{equation}
these components can be rewritten as
$$
M_0 = \frac{K}{2}\big(\theta_+^{3/2}g_{\theta_+}(k) + \theta_-^{3/2}g_{\theta_-}(k)
\big), \quad
\vec{M} = \frac{K}{2}\big(\theta_+^{3/2}g_{\theta_+}(k)
- \theta_-^{3/2}g_{\theta_-}(k)\big)\vec{\gamma}.
$$
Taking into account \eqref{3.int.gT}, this shows that
\begin{align*}
& n_0 = \int_{\R^3}M_0 dk = \frac{K}{2}\big(\theta_+^{3/2} + \theta_-^{3/2}\big),
\quad \vec{n} = \int_{\R^3}\vec{M}dk
= \frac{K}{2}\big(\theta_+^{3/2} - \theta_-^{3/2}\big)\vec{\gamma}, \\
& W_0 = \frac12\int_{\R^3}M_0|k|^2 dk
= \frac{3K}{4}\big(\theta_+^{5/2} + \theta_-^{5/2}\big),
\end{align*}
and consequently, $n_\pm:=n_0\pm|\vec{n}|=K\theta_\pm^{3/2}$,
$\vec{\gamma}=\vec{n}/|\vec{n}|$.
This implies that $W_0=\frac34(n_+\theta_+ + n_-\theta_-)$ and
$n_-/n_+ = (\theta_-/\theta_+)^{3/2}$. Hence,
\begin{align*}
\frac32 n_0T &= W_0 = \frac34\frac{\theta_+}{n_+^{2/3}}\bigg(n_+^{5/3}
+ \bigg(\frac{n_+}{n_-}\bigg)\frac{\theta_+}{\theta_-}n_-\bigg) \\
&= \frac{3\theta_+}{4n_+^{2/3}}\big(n_+^{5/3} + n_-^{5/3}\big)
= \frac{3\theta_-}{4n_-^{2/3}}\big(n_+^{5/3} + n_-^{5/3}\big).
\end{align*}
We obtain the following form for the Pauli components of $M$:
$$
M_0 = \frac12\bigg(n_+g_{\theta_+}(k)+n_-g_{\theta_-}(k)\bigg), \quad
\vec{M} = \frac12\bigg(n_+g_{\theta_+}(k)+n_-g_{\theta_-}(k)\bigg)
\frac{\vec{n}}{|\vec{n}|}.
$$
It remains to compute the higher-order moments:
\begin{align*}
\vec{W} = \frac12\int_{\R^3}\vec{M}|k|^2 dk
&= \frac34(n_+\theta_+ - n_-\theta_-)\frac{\vec{n}}{|\vec{n}|}
= \frac32n_0T\frac{n_+^{5/3} - n_-^{5/3}}{n_+^{5/3} + n_-^{5/3}}
\frac{\vec{n}}{|\vec{n}|}, \\
\frac16\int_{\R^3}M_0|k|^4 dk &= \frac54(n_+\theta_+^2 + n_-\theta_-^2)
= 5n_0^2T^2\frac{n_+^{7/3} + n_-^{7/3}}{(n_+^{5/3} + n_-^{5/3})^2}.
\end{align*}
Inserting these expressions into \eqref{3.etn0}-\eqref{3.etw0} concludes the proof.
\end{proof}
\begin{remark}\rm\label{rem.D}
Equations \eqref{1.et2.n0}-\eqref{1.et2.vecn} are fully coupled since the diffusion
coefficient $D(n_+,n_-)$ depends on the spin vector density through
$|\vec{n}| = (n_+ - n_-)/2$. However, it turns out that $1\le D(n_+,n_-)\le 1.1$
for $|\vec{n}|\le n_0$, which means that the dependence of the energy $\frac32 n_0T$
on the spin vector density $\vec{n}$ is in fact very weak.
When the spin vector density vanishes, $\vec{n}=0$, it follows that $n_+=n_-=n_0$
and $D(n_+,n_-)=1$, and we recover the classical energy-transport model.
\qed
\end{remark}
The model in Theorem \ref{thm.czero} can be equivalently formulated in the variables
$(n_0,W_0,\vec{W})$, and this formulation is used below in the existence analysis.
\begin{theorem}[Spin energy-transport model with $\vec{a}=0$, version II]
\label{thm.azero2}\sloppy
For $\vec{a}=0$, system \eqref{3.etn0}-\eqref{3.etvecw} can be written in
the variables $(n_0,T,\vec{W})$ as
\begin{align}
& \pa_t n_0 - \diver\big(\na(n_0T)+n_0\na V\big) = 0, \label{3.et2.n02} \\
& \frac32\pa_t(n_0T) - \diver\bigg(\na Z_0+\frac52 n_0T\na V\bigg)
- \big(\na(n_0T)+n_0\na V\big)\cdot\na V = 0, \label{3.et2.n0T2} \\
& \pa_t\vec{W} - \sum_{j=1}^3\pa_{x_j}\bigg(\pa_{x_j}\vec{Z}+\frac53\vec{W}\pa_{x_j}V
\bigg) - \sum_{j=1}^3\bigg(\frac23\pa_{x_j}\vec{W}
+ \vec{n}\na_{x_j}V\bigg)\pa_{x_j}V \label{3.et2.vecw2} \\
&\phantom{xx}{}+ \vec{\Omega}_{\rm e}\times\vec{W} = -\frac{\vec{W}}{\tau_{\rm sf}},
\nonumber
\end{align}
where the spin-vector density $\vec{n}$ and the auxiliary quantities
$Z_0$ and $\vec{Z}$ are given by
\begin{align}
\vec{n} &= n_0\frac{W_+^{3/5}-W_-^{3/5}}{W_+^{3/5}+W_-^{3/5}}
\frac{\vec{W}}{|\vec{W}|}, \nonumber \\
Z_0 &= \frac{5}{18n_0}\big(W_+^{3/5}+W_-^{3/5}\big)\big(W_+^{7/5}+W_-^{7/5}\big),
\label{32.Z0} \\
\vec{Z} &= \frac{5}{18n_0}\big(W_+^{3/5}+W_-^{3/5}\big)
\big(W_+^{7/5}-W_-^{7/5}\big)\frac{\vec{W}}{|\vec{W}|}, \label{32.vecZ}
\end{align}
and $W_\pm=W_0\pm|\vec{W}|$, $W_0=\frac32n_0T$.
\end{theorem}
\begin{proof}
With the new Lagrange multipliers introduced in the proof of Theorem
\ref{thm.czero}, we find that
\begin{align}
n_0 &= \int_{\R^3}M_0 dk = \frac{K}{2}\big(\theta_+^{3/2}+\theta_-^{3/2}\big),
\quad W_0 = \frac12\int_{\R^3}M_0|k|^2 dk
= \frac{3K}{4}\big(\theta_+^{5/2}+\theta_+^{5/2}\big), \label{32.n0} \\
\vec{W} &= \frac12\int_{\R^3}\vec{M}|k|^2 dk
= \frac{3K}{4}\big(\theta_+^{5/2}-\theta_-^{5/2}\big)\vec{\gamma}. \label{32.vecw}
\end{align}
As $c_0<0$ is required to ensure integrability of the Maxwellian, it holds that
$\theta_+\ge\theta_-$, such that we deduce from \eqref{32.vecw}
that
\begin{equation}\label{32.gamma}
\vec{\gamma} = \frac{\vec{W}}{|\vec{W}|}, \quad
|\vec{W}| = \frac{3K}{4}(\theta_+^{5/2}-\theta_-^{5/2}).
\end{equation}
Let $W_\pm=W_0\pm|\vec{W}|$. Then
$$
W_\pm = \frac{3K}{4}\big(\theta_+^{5/2}+\theta_+^{5/2}\big)
\pm \frac{3K}{4}\big(\theta_+^{5/2}-\theta_-^{5/2}\big)
= \frac{3K}{2}\theta_\pm^{5/2},
$$
which is equivalent to $\theta_\pm = (2W_\pm/(3K))^{2/5}$. Inserting this
expression into the first equation of \eqref{32.n0}, we obtain
$$
n_0 = \frac{K}{2}\bigg(\bigg(\frac{2W_+}{3K}\bigg)^{3/5}
+ \bigg(\frac{2W_-}{3K}\bigg)^{3/5}\bigg)
= \frac{K^{2/5}}{2^{2/5}3^{3/5}}\big(W_+^{3/5} + W_-^{3/5}\big).
$$
Thus, the constant $K$ can be written as
\begin{equation}\label{32.K2}
K = 2\cdot 3^{3/2}n_0^{5/2}(W_+^{3/5}+W_-^{3/5})^{-5/2},
\end{equation}
and we can eliminate $K$ in the formulation of $\theta_\pm$:
\begin{equation}\label{32.thetapm}
\theta_\pm = \bigg(\frac{2W_\pm}{3K}\bigg)^{2/5}
= \frac{W_\pm^{2/5}}{3n_0}\big(W_+^{3/5} + W_-^{3/5}\big).
\end{equation}
The spin-vector density is then computed as follows:
\begin{align*}
\vec{n} &= \int_{\R^3}\vec{M}dk
= \frac{K}{2}\big(\theta_+^{3/2}-\theta_-^{3/2}\big)\frac{\vec{W}}{|\vec{W}|} \\
&= \frac{3^{3/2}n_0^{5/2}}{(W_+^{3/5}+W_-^{3/5})^{5/2}}
\bigg(\frac{W_+^{3/5}+W_-^{3/5}}{3n_0}\bigg)^{3/2}
\big(W_+^{3/5}-W_-^{3/5}\big)\frac{\vec{W}}{|\vec{W}|} \\
&= n_0\frac{W_+^{3/5}-W_-^{3/5}}{W_+^{3/5}+W_-^{3/5}}\frac{\vec{W}}{|\vec{W}|}.
\end{align*}
It remains to compute the fourth-order moments.
Using $W_\pm=\frac32 K\theta_\pm^{5/2}$
and \eqref{32.thetapm}, we have
\begin{align*}
\frac16\int_{\R^3}M_0|k|^4 dk &= \frac{5K}{4}\big(\theta_+^{7/2}+\theta_-^{7/2}\big)
= \frac56(\theta_+W_+ + \theta_- W_-) \\
&= \frac{5}{18n_0}\big(W_+^{3/5}+W_-^{3/5}\big)\big(W_+^{7/5}+W_-^{7/5}\big).
\end{align*}
In an analogous way, we calculate
$$
\frac16\int_{\R^3}\vec{M}|k|^4 dk
= \frac{5}{18n_0}\big(W_+^{3/5}+W_-^{3/5}\big)\big(W_+^{7/5}-W_-^{7/5}\big)
\frac{\vec{W}}{|\vec{W}|}.
$$
Inserting these expressions into \eqref{3.etn0}-\eqref{3.etvecw}, the result
follows.
\end{proof}
\begin{remark}\rm
If $\vec{W}=0$, it follows that $W_\pm=W_0=\frac32n_0T$, $\vec{n}=0$,
$Z_0=\frac52n_0T^2$, and we recover the semiclassical energy-transport model.
It is possible to see that $1\le Z_0/(\frac52n_0T^2)\le 1.08$, which shows that
the coupling is rather weak. This is expected since the coupling
in system \eqref{1.et2.n0}-\eqref{1.et2.vecn} is weak too.
\qed
\end{remark}
\subsection{Third model}\label{sec.et3}
\begin{theorem}[Spin energy-transport model for $\vec{a}=\lambda\vec{c}$]
\label{thm.ac}
Under the assumption $\vec{a}=\lambda\vec{c}$ for some $\lambda=\lambda(x,t)\ge 0$,
system \eqref{3.etn0}-\eqref{3.etvecw} can be written in the variables
$(n_\pm,W_\pm,\vec{s})$ as \eqref{1.et3.npm}-\eqref{1.et3.J},
where $(n_\pm,T_\pm,\vec{s})$ are linked to $(n_0,\vec{n},W_0,\vec{W})$ via
\begin{equation}\label{3.nmp}
n_\pm = n_0\pm|\vec{n}|, \quad \frac32 n_\pm T_\pm = W_0\pm|\vec{W}|, \quad
\vec{s}=\frac{\vec{n}}{|\vec{n}|}.
\end{equation}
\end{theorem}
\begin{proof}
First, we compute the moments in order to make system \eqref{3.etn0}-\eqref{3.etvecw}
explicit. Under the assumption that $\vec{a}=\lambda\vec{c}$ for some
$\lambda\ge 0$, the Pauli components of the Maxwellian become
\begin{align*}
M_0 &= \frac12\exp\bigg(a_0 + \lambda|\vec{c}| + \frac12(c_0+|\vec{c}|)|k|^2\bigg)
+ \frac12\exp\bigg(a_0 - \lambda|\vec{c}| + \frac12(c_0-|\vec{c}|)|k|^2\bigg), \\
\vec{M} &= \frac12\bigg\{\exp\bigg(a_0 + \lambda|\vec{c}|
+ \frac12(c_0+|\vec{c}|)|k|^2\bigg) - \exp\bigg(a_0 - \lambda|\vec{c}|
+ \frac12(c_0-|\vec{c}|)|k|^2\bigg)\bigg\}\frac{\vec{c}}{|\vec{c}|}.
\end{align*}
Introducing the new Lagrange multipliers
$$
\kappa_\pm := (2\pi\theta_\pm)^{3/2}e^{a_0\pm\lambda|\vec{c}|}, \quad
\theta_\pm := -\frac{1}{c_0\pm|\vec{c}|}, \quad
\vec{\gamma} := \frac{\vec{c}}{|\vec{c}|},
$$
the Pauli components of $M$ can be rewritten as
$$
M_0 = \frac12(k_+g_{\theta_+} + k_- g_{\theta_-}), \quad
\vec{M} = \frac12(k_+ g_{\theta_+} - k_- g_{\theta_-})\vec{\gamma},
$$
where $g_{\theta_\pm}$ is defined in \eqref{3.gT}. Since the Maxwellian
has to be integrable, we have $c_0+|\vec{c}|<0$ and consequently,
$\theta_+\ge \theta_->0$ and $\kappa_+\ge \kappa_->0$. It follows that
\begin{align*}
n_0 &= \frac12(\kappa_+ + \kappa_-), & \vec{n}
&= \frac12(\kappa_+ - \kappa_-)\vec{\gamma}, \\
W_0 &= \frac34(\kappa_+\theta_+ + \kappa_-\theta_-), &
\vec{W} &= \frac34(\kappa_+\theta_+ - \kappa_-\theta_-)\vec{\gamma}.
\end{align*}
These expressions allow us to identify the new Lagrange multipliers with
$n_\pm=n_0\pm|\vec{n}|$, $W_\pm=W_0\pm|\vec{W}|$, and $\vec{s}=\vec{n}/|\vec{n}|$:
$$
n_\pm = k_\pm, \quad W_\pm = \frac32 k_\pm\theta_\pm, \quad
\vec{s} = \frac{\vec{n}}{|\vec{n}|} = \frac{\vec{W}}{|\vec{W}|} = \vec{\gamma}.
$$
The last expression represents a constraint of the spin part of the particle
density and energy. Moreover, the definition $T_\pm = 2W_\pm/(3n_\pm)$ implies that
$T_\pm = \theta_\pm$. Thus, the Pauli components of the Maxwellian take the form
\begin{equation}\label{3.max3}
M_0 = \frac12(n_+ g_{T_+} + n_- g_{T_-}), \quad
\vec{M} = \frac12(n_+ g_{T_+} - n_- g_{T_-})\vec{s}.
\end{equation}
Computing the higher-order moments
\begin{align*}
\frac16\int_{\R^3}M_0|k|^4 dk &= \frac{1}{12}\int_{\R^3}
(n_+ g_{\theta_+} + n_- g_{\theta_-})|k|^4 dk = \frac54(n_+ T_+^2 + n_- T_-^2), \\
\frac16\int_{\R^3}\vec{M}|k|^4 dk &= \frac54(n_+ T_+^2 - n_- T_-^2)\vec{s},
\end{align*}
system \eqref{3.etn0}-\eqref{3.etvecw} becomes
\begin{align}
& \pa_t n_0 - \diver\bigg(\frac23\na W_0 + n_0\na V\bigg) = 0, \label{3.aux1} \\
& \pa_t\vec{n} - \diver\bigg(\frac23\na\vec{W} + \vec{n}\na V\bigg)
+ \vec{\Omega}_{\rm e}\times\vec{n} = -\frac{\vec{n}}{\tau_{\rm sf}},
\label{3.aux2} \\
& \pa_t W_0 - \diver\bigg(\frac59\na\bigg(\frac{W_+^2}{n_+} + \frac{W_-^2}{n_-}
\bigg) + \frac53 W_0\na V\bigg) - \bigg(\frac23\na W_0 + n_0\na V\bigg)\cdot\na V
= 0, \label{3.aux3} \\
& \pa_t\vec{W} - \diver\bigg(\frac59\na
\bigg(\bigg(\frac{W_+^2}{n_+} + \frac{W_-^2}{n_-}\bigg)\vec{s}\bigg)
+ \frac53 \vec{W}\na V\bigg) - \bigg(\frac23\na\vec{W} + \vec{n}\na V\bigg)
\cdot\na V \label{3.aux4} \\
&\phantom{xxm}{}+ \vec{\Omega}_{\rm e}\times\vec{W}
= -\frac{\vec{W}}{\tau_{\rm sf}}. \nonumber
\end{align}
The next step is to reformulate this system in terms of $(n_\pm,W_\pm,\vec{s})$.
First, we derive \eqref{1.et3.npm}. For this, we take the scalar product of
\eqref{3.aux2} and
$\vec{s}=\vec{n}/|\vec{n}|=\vec{W}/|\vec{W}|$, leading to
\begin{equation}\label{3.aux5}
\pa_t|\vec{n}| - \diver\bigg(\frac23\na|\vec{W}| + |\vec{n}|\na V\bigg)
+ \na\vec{s}\cdot\bigg(\frac23\na\vec{W} + \vec{n}\na V\bigg)
= -\frac{|\vec{n}|}{\tau_{\rm sf}}.
\end{equation}
Observing that $|\vec{s}|=1$ implies that $\na\vec{s}\cdot\vec{s}=0$, we find that
$\na\vec{s}\cdot\na\vec{W} = \na\vec{s}\cdot\na(|\vec{W}|\vec{s}) = |\vec{W}|
|\na\vec{s}|^2$ and $\na\vec{s}\cdot\vec{n}=0$. Hence, \eqref{3.aux5} becomes
$$
\pa_t|\vec{n}| - \diver\bigg(\frac23\na|\vec{W}| + |\vec{n}|\na V\bigg)
+ \frac23|\vec{W}||\na\vec{s}|^2 = -\frac{|\vec{n}|}{\tau_{\rm sf}}.
$$
Taking the sum and difference of equation \eqref{3.etn0} for $n_0$
and the previous equation,
we obtain \eqref{1.et3.npm} using $n_\pm=n_0\pm|\vec{n}|$ and
$|\vec{W}|=\frac34(n_+T_+ - n_-T_-)$.
Second, we derive \eqref{1.et3.nT}. Multiplying \eqref{3.aux4} by
$\vec{s}=\vec{W}/|\vec{W}|$ yields
\begin{align*}
\pa_t|\vec{W}| &- \diver\bigg(\frac59\na\bigg(\frac{W_+^2}{n_+}-\frac{W_-^2}{n_-}
\bigg) + \frac53|\vec{W}|\na V\bigg) \\
&{}+ \na\vec{s}\cdot\bigg(\frac59\na\bigg(\bigg(\frac{W_+^2}{n_+}-\frac{W_-^2}{n_-}
\bigg)\vec{s}\bigg) + \frac53|\vec{W}|\na V\bigg) \\
&{}- \vec{s}\cdot\bigg(\frac23(\na V\cdot\na)\vec{W} + \vec{n}|\na V|^2\bigg)
= -\frac{|\vec{W}|}{\tau_{\rm sf}},
\end{align*}
and adding and subtracting this equation from \eqref{3.aux3} and employing
$\vec{s}\cdot\vec{n}=|\vec{n}|$ shows that
$\frac32 n_\pm T_\pm=W_\pm=W_0\pm|\vec{W}|$ solves \eqref{1.et3.nT}.
Third, we derive \eqref{1.et3.s}. We take the product of
$P:=({\mathbb I}-\vec{s}\otimes\vec{s})/|\vec{n}|$ and \eqref{3.aux2}
(here, $\mathbb I$ is the unit matrix in $\R^{3\times 3}$.)
This matrix has the following properties: $P\vec{n}=0$,
$P\pa_t\vec{n}=\pa_t\vec{s}$, and $P\na\vec{n}=\na\vec{s}$.
A computation shows that
\begin{equation}\label{3.aux6}
\pa_t\vec{s} - \diver\bigg(P\bigg(\frac23\na\vec{W}+\vec{n}\na V\bigg)\bigg)
+ \na P\cdot\bigg(\frac23\na\vec{W}+\vec{n}\na V\bigg) + \vec{\Omega}_{\rm e}
\times\vec{s} = 0.
\end{equation}
We reformulate the second and third term:
\begin{align*}
P\bigg(\frac23\na\vec{W}+\vec{n}\na V\bigg)
&= \frac23\frac{|\vec{W}|}{|\vec{n}|}\frac{1}{|\vec{W}|}
({\mathbb I}-\vec{s}\otimes\vec{s})\na\vec{W}
= \frac23\frac{|\vec{W}|}{|\vec{n}|}\na\vec{s}, \\
(\na P\cdot\na\vec{W})_i &= \sum_{j=1}^3\na P_{ij}\cdot\na W_j \\
&= \sum_{j=1}^3\bigg(\frac{1}{|\vec{n}|^2}(\delta_{ij}-s_is_j)\na|\vec{n}|
- \frac{1}{|\vec{n}|}(s_i\na s_j+s_j\na s_i)\bigg)\cdot\na W_j \\
&= -\frac{1}{|\vec{n}|^2}|\vec{W}|\na|\vec{n}|\cdot\na s_i
- \frac{1}{|\vec{n}|}|\vec{W}||\na \vec{s}|^2 s_i
- \frac{1}{|\vec{n}|}\na|\vec{W}|\na s_i \\
&= -\frac{|\vec{W}|}{|\vec{n}|}\na\log(|\vec{n}||\vec{W}|)\cdot\na s_i
- \frac{|\vec{W}|}{|\vec{n}|}|\na\vec{s}|^2 s_i, \\
\na P\cdot\vec{n}\na V &= (\na V\cdot\na)(P\vec{n})
- P(\na V\cdot\na)\vec{n} = -\na V\cdot\na\vec{s}.
\end{align*}
Therefore, \eqref{3.aux6} becomes
\begin{align*}
\pa_t\vec{s} &= \diver\bigg(\frac23\frac{|\vec{W}|}{|\vec{n}|}\na\vec{s}\bigg)
+ \bigg(\frac23\frac{|\vec{W}|}{|\vec{n}|}\na\log(|\vec{n}||\vec{W}|)
+ \na V\bigg)\cdot\na\vec{s} + \frac23\frac{|\vec{W}|}{|\vec{n}|}|\na\vec{s}|^2
\vec{s} - \vec{\Omega}_{\rm e}\times\vec{s} \\
&= \frac23\frac{|\vec{W}|}{|\vec{n}|}(\Delta\vec{s}+|\na\vec{s}|^2\vec{s})
+ \bigg\{\na\bigg(\frac23\frac{|\vec{W}|}{|\vec{n}|}\bigg)
+ \frac23\frac{|\vec{W}|}{|\vec{n}|}\na\log(|\vec{n}||\vec{W}|) + \na V\bigg\}
\cdot\na\vec{s} - \vec{\Omega}_{\rm e}\times\vec{s} \\
&= \frac23\frac{|\vec{W}|}{|\vec{n}|}\vec{s}\times(\Delta\vec{s}\times\vec{s})
+ \bigg(\frac43\frac{\na|\vec{W}|}{|\vec{n}|} + \na V\bigg)\cdot\na\vec{s}
- \vec{\Omega}_{\rm e}\times\vec{s} \\
&= \frac23\frac{W_+ - W_-}{n_+ - n_-}\vec{s}\times(\Delta\vec{s}\times\vec{s})
+ \bigg(\frac43\frac{\na(W_+ - W_-)}{n_+ - n_-} + \na V\bigg)\cdot\na\vec{s}
- \vec{\Omega}_{\rm e}\times\vec{s}.
\end{align*}
Then, using $W_\pm=\frac32n_\pm T_\pm$, equation \eqref{1.et3.s} follows.
\end{proof}
\begin{remark}\label{rem.LLG}\rm
If the temperature is constant, $T_+=T_-=1$, equation \eqref{1.et3.s} for
the spin accumulation vector becomes
$$
\pa_t\vec{s} - \vec{s}\times(\Delta\vec{s}\times\vec{s})
= \na(\log|\vec{n}|^2 + V)\cdot\na\vec{s} - \vec{\Omega}_{\rm e}\times\vec{s}.
$$
If $\vec{\Omega}_{\rm e}=\Delta\vec{s}$, this resembles the Landau-Lifshitz
equation with the exception of the first term on the right-hand side,
which provides an additional field contribution. Note that this term does not
vanish in termal equilibrium where $V=-\log n_0$.
\qed
\end{remark}
\section{Entropy structure}\label{sec.ent}
In this section, we investigate the entropy structure of
the spin energy-transport equations derived in the previous section.
Recall that the entropy of the general model is given by
$$
H = \int_{\R^3}\int_{\R^3}\operatorname{tr}(M\log M)dkdx,
$$
where $M=M_0\sigma_0 + \vec{M}\cdot\vec{\sigma}$ is the Maxwellian.
We introduce $M_\pm=M_0\pm|\vec{M}|$ and
$P_\pm=\frac12(\sigma_0\pm(\vec{M}/|\vec{M}|)\cdot\vec{\sigma})$.
Then $(P_+,P_-)$ is a set of complete orthogonal projections since
$P_\pm^2=P_\pm$, $P_+P_-=0$, and $P_+ + P_-=\sigma_0$. Therefore, for any
function $f:\R\to\R$,
\begin{align*}
f(M) &= f(M_+)P_+ + f(M_-)P_- \\
&= \frac12\big(f(M_+)+f(M_-)\big) \sigma_0
+ \frac12\big(f(M_+)-f(M_-)\big)\frac{\vec{M}}{|\vec{M}|}\cdot\vec{\sigma}.
\end{align*}
In particular, since the Pauli matrices are traceless,
\begin{equation}\label{4.H}
H = \frac12\int_{\R^3}\int_{\R^3}(M_+\log M_+ + M_-\log M_-)dkdx.
\end{equation}
\subsection{Entropy inequality for the first model}\label{sec.ent1}
We wish to explore the entropy structure of the first model
\eqref{1.et1.n0}-\eqref{1.et1.vecn} ($\vec{c}=0$), neglecting the electric field:
\begin{equation}
\pa_t n_0 = \Delta(n_0T), \quad \frac32\pa_t(n_0T) = \frac52\Delta(n_0T^2), \quad
\pa_t\vec{n} = \Delta(\vec{n}T) - \vec{\Omega}_{\rm e}\times\vec{n}
- \frac{\vec{n}}{\tau_{\rm sf}}, \label{4.m1}
\end{equation}
where $x\in\R^3$, $t>0$.
We claim that the entropy is given by \eqref{1.H1}.
Indeed, since $\vec{c}=0$ by assumption,
$M=g_T(k)(n_0\sigma_0 + \vec{n}\cdot\vec{\sigma})$, where $g_T(k)$ is defined
in \eqref{3.gT} (see the proof of Theorem \ref{thm.czero}).
Then $M_\pm = g_T(k)n_\pm$ and \eqref{4.H} shows that
\begin{align*}
H_1 &= \frac12\int_{\R^3}\int_{\R^3}g_T(k)\big(n_+\log(n_+ g_T(k))
+ n_- \log(n_- g_T(k))\big)dxdk \\
&= \frac12\int_{\R^3}(n_+\log n_+ + n_-\log n_-)dx
+ \int_{\R^3}(n_+ + n_-)\int_{\R^3}g_T(k)\log g_T(k)dk dx \\
&= \frac12\int_{\R^3}(n_+\log n_+ + n_-\log n_-)dx
- \int_{\R^3}(n_+ + n_-)\bigg(\frac32 + \frac32\log(2\pi T)\bigg)dx.
\end{align*}
Thus, since $\int_{\R^3}(n_+ + n_-)dx$ is constant in time, we find that,
up to a constant,
$$
H_1 = \int_{\R^3}\big(n_+\log(n_+ T^{-3/2})+n_-\log(n_- T^{-3/2})\big)dx,
$$
which is exactly \eqref{1.H1}. Recall that $n_\pm=n_0\pm|\vec{n}|$.
\begin{proposition}[Entropy inequality for system \eqref{4.m1}]\label{prop.ent1}
The entropy \eqref{1.H1}, considered as a function of time, is nonincreasing
along (smooth) solutions $(n_0,T,\vec{n})$ to \eqref{4.m1}, and
\begin{align}\label{41.ent1}
\frac{dH_1}{dt} &+ 4\int_{\R^3}\big(|\na\sqrt{n_+ T}|^2 + |\na\sqrt{n_- T}|^2\big)dx
+ 20\int_{\R^3}n_0|\na\sqrt{T}|^2\big)dx \\
&{}+ \frac12\int_{\R^3}(n_+ - n_-)
(\log n_+ - \log n_-)\bigg(\frac{1}{\tau_{\rm sf}}
+ T\bigg|\na\frac{\vec{n}}{|\vec{n}|}\bigg|^2\bigg)dx = 0. \nonumber
\end{align}
\end{proposition}
\begin{proof}
We compute
\begin{align}
\frac{dH_1}{dt} &= \int_{\R^3}\sum_{s=\pm}\bigg(\log(n_s T^{-3/2})\pa_t n_s
- \frac32\frac{1}{T}\pa_t(n_s T)\bigg)dx \nonumber \\
&= \int_{\R^3}\bigg(\log\big((n_0+|\vec{n}|)T^{-3/2}\big)\pa_t(n_0+|\vec{n}|)
- \frac32\frac{1}{T}\pa_t(n_0T+|\vec{n}|T) \nonumber \\
&\phantom{xx}{}+ \log\big((n_0-|\vec{n}|)T^{-3/2}\big)\pa_t(n_0-|\vec{n}|)
- \frac32\frac{1}{T}\pa_t(n_0T-|\vec{n}|T)\bigg)dx \nonumber \\
&= \int_{\R^3}\bigg\{\log\bigg(\frac{n_0^2-|\vec{n}|^2}{T^3}\bigg)\pa_t n_0
+ \log\bigg(\frac{n_0+|\vec{n}|}{n_0-|\vec{n}|}\bigg)\frac{\vec{n}}{|\vec{n}|}\cdot
\pa_t\vec{n} - \frac{2}{T}\pa_t\bigg(\frac32 n_0T\bigg)\bigg\}dx. \label{41.aux}
\end{align}
Inserting \eqref{1.et1.n0} in the first term and integrating by parts, we find that
$$
\int_{\R^3}\log\bigg(\frac{n_0^2-|\vec{n}|^2}{T^3}\bigg)\pa_t n_0 dx
= -\int_{\R^3}\na\log\bigg(\frac{n_0^2-|\vec{n}|^2}{T^3}\bigg)\cdot\na(n_0T)dx.
$$
Furthermore, using \eqref{1.et1.vecn} in the second term on the right-hand side
of \eqref{41.aux} and integrating by parts gives
\begin{align*}
\int_{\R^3} & \log\bigg(\frac{n_0+|\vec{n}|}{n_0-|\vec{n}|}\bigg)
\frac{\vec{n}}{|\vec{n}|}\cdot\pa_t\vec{n}dx
= -\int_{\R^3}\na\bigg(\log\bigg(\frac{n_0+|\vec{n}|}{n_0-|\vec{n}|}\bigg)
\bigg)\frac{\vec{n}}{|\vec{n}|}\cdot\na(\vec{n}T)dx \\
&{}- \int_{\R^3}\log\bigg(\frac{n_0+|\vec{n}|}{n_0-|\vec{n}|}\bigg)
\na\frac{\vec{n}}{|\vec{n}|}\cdot\na(\vec{n}T)dx
- \frac{1}{\tau_{\rm sf}}\int_{\R^3}|\vec{n}|
\log\bigg(\frac{n_0+|\vec{n}|}{n_0-|\vec{n}|}\bigg)dx.
\end{align*}
Since $\na\vec{n}\cdot\vec{n}=0$ and
\begin{align*}
\na\frac{\vec{n}}{|\vec{n}|}\cdot\na(\vec{n}T)
&= \na\frac{\vec{n}}{|\vec{n}|}\cdot\na\bigg(|\vec{n}|T\frac{\vec{n}}{|\vec{n}|}
\bigg) = |\vec{n}|T\bigg|\na\frac{\vec{n}}{|\vec{n}|}\bigg|^2, \\
\frac{\vec{n}}{|\vec{n}|}\cdot\na(\vec{n}T)
&= \frac{\vec{n}}{|\vec{n}|}\cdot(T\vec{n} + \vec{n}\na T)
= T\na|\vec{n}| + |\vec{n}|\na T = \na(|\vec{n}|T),
\end{align*}
it follows that
\begin{align*}
\int_{\R^3} & \log\bigg(\frac{n_0+|\vec{n}|}{n_0-|\vec{n}|}\bigg)
\frac{\vec{n}}{|\vec{n}|}\cdot\pa_t\vec{n}dx
= -\int_{\R^3}\log\bigg(\frac{n_0+|\vec{n}|}{n_0-|\vec{n}|}\bigg)
\cdot\na(|\vec{n}|T)dx \\
&{}- \int_{\R^3}\log\bigg(\frac{n_0+|\vec{n}|}{n_0-|\vec{n}|}\bigg)
|\vec{n}|T\bigg|\na\frac{\vec{n}}{|\vec{n}|}\bigg|^2dx
- \frac{1}{\tau_{\rm sf}}\int_{\R^3}|\vec{n}|
\log\bigg(\frac{n_0+|\vec{n}|}{n_0-|\vec{n}|}\bigg)dx.
\end{align*}
Finally, we employ \eqref{1.et1.n0T} to reformulate the last term on the
right-hand side of \eqref{41.aux}:
\begin{align*}
-\int_{\R^3}\frac{2}{T}\pa_t\bigg(\frac32 n_0T\bigg)dx
&= 5\int_{\R^3}\na\frac{1}{T}\cdot\na(n_0T^2)dx \\
&= -5\int_{\R^3}\na\log T\cdot\na(n_0T)dx
- 5\int_{\R^3}\frac{n_0}{T}|\na T|^2 dx.
\end{align*}
Summarizing these expressions, we have
\begin{align*}
\frac{dH_1}{dt}
&= -\int_{\R^3}\bigg\{
\na\log\bigg(\frac{n_0^2-|\vec{n}|^2}{T^3}\bigg)\cdot\na(n_0T)dx
+\na\log\bigg(\frac{n_0+|\vec{n}|}{n_0-|\vec{n}|}\bigg)\cdot
\na(|\vec{n}|T) \\
&\phantom{xx}{}+ 5\na\log T\cdot\na(n_0T) + 5\frac{n_0}{T}|\na T|^2\bigg\}dx \\
&\phantom{xx}{}- \int_{\R^3}\bigg\{
\log\bigg(\frac{n_0+|\vec{n}|}{n_0-|\vec{n}|}\bigg)
|\vec{n}|T\bigg|\na\frac{\vec{n}}{|\vec{n}|}\bigg|^2
+ \frac{1}{\tau_{\rm sf}}|\vec{n}|
\log\bigg(\frac{n_0+|\vec{n}|}{n_0-|\vec{n}|}\bigg)
\bigg\}dx \\
&= I_1 + I_2.
\end{align*}
The integrals in $I_2$ correspond, up to the minus sign, the second and third
integrals in \eqref{41.ent1}. It remains to show that $I_1$ corresponds to
the first integral in \eqref{41.ent1}, up to the sign. Indeed, since
$\log(n_0^2-|\vec{n}|^2)=\log n_+ + \log n_-$ and
$\log((n_0+|\vec{n}|)/(n_0-|\vec{n}|))=\log n_+ - \log n_-$, we have
\begin{align*}
I_1 &= -\int_{\R^3}\na\log(n_0^2-|\vec{n}|^2)\cdot\na(n_0T)dx \\
&\phantom{xx}{}- \int_{\R^3}\na\log\bigg(\frac{n_0+|\vec{n}|}{n_0-|\vec{n}|}\bigg)
\cdot\na(|\vec{n}|T)dx - 2\int_{\R^3}\na\log T\cdot\na(n_0T)dx \\
&= -\int_{\R^3}\big(\na\log n_+\cdot\na(n_+T) + \na\log n_-\cdot\na(n_-T)
+ \na\log T\cdot\na(n_+T + n_-T)\big)dx \\
&= -\int_{\R^3}\big(\na\log(n_+T)\cdot\na(n_+T) + \na\log(n_-T)\cdot\na(n_-T)
\big)dx.
\end{align*}
This ends the proof.
\end{proof}
\begin{remark}\label{rem.ent1}\rm
When system \eqref{1.et1.n0}-\eqref{1.et1.vecn} includes the electric field,
a computation similar to the proof of Proposition \ref{prop.ent1}
shows that the entropy-production identity reads as
\begin{align*}
\frac{dH_1}{dt} &+ \int_{\R^3}\bigg(
\frac{|\na(n_+ T) + n_+T\na V|^2}{n_+T}
+ \frac{|\na(n_- T) + n_-T\na V|^2}{n_-T}\bigg)dx \\
&{}+ 10\int_{\R^3}(n_+ + n_-)|\na\sqrt{T}|^2\big)dx \\
&{}+ \frac12\int_{\R^3}(n_+ - n_-)
(\log n_+ - \log n_-)\bigg(\frac{1}{\tau_{\rm sf}}
+ T\bigg|\na\frac{\vec{n}}{|\vec{n}|}\bigg|^2\bigg)dx = 0.
\end{align*}
Thus, the presence of the electric field complicates the existence of a priori
bounds.
\qed
\end{remark}
\subsection{Entropy inequality for the second model}\label{sec.ent2}
We show that there exists an entropy
for the second model \eqref{3.et2.n02}-\eqref{3.et2.vecw2} ($\vec{a}=0$)
for vanishing electric field,
\begin{equation}\label{41.m2}
\pa_t n_0 = \Delta(n_0T), \quad \frac32\pa_t(n_0T) = \Delta Z_0, \quad
\pa_t\vec{W} = \Delta \vec{Z} - \vec{\Omega}_{\rm e}\times\vec{W}
- \frac{\vec{W}}{\tau_{\rm sf}},
\end{equation}
where $x\in\R^3$, $t>0$, and
$(Z_0,\vec{Z})$ are defined in \eqref{32.Z0}-\eqref{32.vecZ}, i.e.
\begin{align*}
Z_0 &= \frac{5}{18n_0}\big(W_+^{3/5}+W_-^{3/5}\big)\big(W_+^{7/5}+W_-^{7/5}\big), \\
\vec{Z} &= \frac{5}{18n_0}\big(W_+^{3/5}+W_-^{3/5}\big)
\big(W_+^{7/5}-W_-^{7/5}\big)\frac{\vec{W}}{|\vec{W}|}.
\end{align*}
We claim that the general entropy \eqref{1.H}
becomes an entropy for the second model when
the Maxwellian $M=M_0\sigma_0+\vec{M}\cdot\vec{\sigma}$ is given by \eqref{32.M},
and this entropy equals, up to a constant, \eqref{1.H2}.
Note that if $\vec{W}=0$, we obtain $W_\pm=W_0=\frac32n_0T$ and
$H_2=\int_{\R^d}n_0\log(n_0T^{-3/2})dx$, up to a constant. This function
corresponds to the entropy of the semiclassical energy-transport model
\cite[Chapter~6]{Jue09}.
To show that \eqref{1.H} reduces to \eqref{1.H2},
we may employ \eqref{4.H} but we prefer to proceed in a slightly different way.
We observe that the Pauli matrices are traceless and we employ the formula
$(\vec{c}\cdot\vec{\sigma})(\vec{M}\cdot\vec{\sigma})
= (\vec{c}\cdot\vec{M})\sigma_0 + i(\vec{c}\times\vec{M})\cdot\vec{\sigma}$
(see \cite[(7)]{PoNe11}) to infer that
\begin{align*}
H_2 &= \frac12\operatorname{tr}\int_{\R^3}\int_{\R^3}
(M_0+\vec{M}\cdot\vec{\sigma})
\bigg(a_0\sigma_0 + (c_0\sigma_0+\vec{c}\cdot\vec{\sigma})
\frac{|k|^2}{2}\bigg)dkdx \\
&= \int_{\R^3}\int_{\R^3}\bigg(a_0M_0 + c_0M_0\frac{|k|^2}{2}
+ \vec{c}\cdot\vec{M}\frac{|k|^2}{2}\bigg)dkdx \\
&= \int_{\R^3}\big(a_0n_0 + c_0W_0 + \vec{c}\cdot\vec{W}\big)dx.
\end{align*}
The Lagrange multiplier $a_0$ can be written in the following way, using
the first equation in \eqref{32.K} and \eqref{32.K2}:
$$
a_0 = \log\frac{K}{(2\pi)^{3/2}}
= \frac52\log n_0 - \frac52\log(W_+^{3/5}+W_-^{3/5})
+ \log(2\cdot 3^{3/2}(2\pi)^{-3/2}).
$$
Observing that $\int_{\R^3}n_0 dx$ is constant in time, it holds that,
up to a constant,
$$
\int_{\R^3}a_0n_0 dx = \frac52\int_{\R^3}n_0\log\frac{n_0}{W_+^{3/5}+W_-^{3/5}}dx.
$$
By the second equation in \eqref{32.K}, we have $c_0\pm|\vec{c}|=-1/\theta_\pm$,
which yields
$$
c_0 = -\frac12\bigg(\frac{1}{\theta_+} + \frac{1}{\theta_-}\bigg), \quad
|\vec{c}| = \frac12\bigg(\frac{1}{\theta_+} - \frac{1}{\theta_-}\bigg).
$$
Furthermore, employing the third equation in \eqref{32.K} and \eqref{32.gamma},
we have $\vec{c}/|\vec{c}|=\vec{\gamma}=\vec{W}/|\vec{W}|$ which shows that
$\vec{c}\cdot\vec{W}=|\vec{c}||\vec{W}|$. Thus, replacing $\theta_\pm$
by the expression in \eqref{32.thetapm},
\begin{align*}
2(c_0W_0+\vec{c}\cdot\vec{W})
&= -\bigg(\frac{1}{\theta_+} + \frac{1}{\theta_-}\bigg)W_0
+ \bigg(\frac{1}{\theta_+} - \frac{1}{\theta_-}\bigg)|\vec{W}| \\
&= -\frac{3n_0W_0}{W_+^{3/5}+W_-^{3/5}}\bigg(\frac{1}{W_+^{2/5}}
+ \frac{1}{W_-^{2/5}}\bigg) + \frac{3n_0|\vec{W}|}{W_+^{3/5}+W_-^{3/5}}
\bigg(\frac{1}{W_+^{2/5}} - \frac{1}{W_-^{2/5}}\bigg) \\
&= -\frac{3n_0}{W_+^{3/5}+W_-^{3/5}}\bigg(\frac{W_0+|\vec{W}|}{W_+^{2/5}}
+ \frac{W_0-|\vec{W}|}{W_-^{2/5}}\bigg) = -3n_0.
\end{align*}
Neglecting this contribution as well as the constant in the expression for $a_0$,
this shows the claim.
We show now that the entropy \eqref{1.H2} is nonincreasing in time and
that it provides some gradient estimates.
\begin{proposition}[Entropy inequality for system \eqref{41.m2}]\label{prop.ent2}
The entropy \eqref{1.H2}, considered as a function of time, is nonincreasing
along (smooth) solutions $(n_0,T,\vec{W})$ to \eqref{41.m2} in $\R^3$,
where $W_\pm=W_0\pm|\vec{W}|$ and $W_0=\frac32 n_0T$. Furthermore, it holds
\begin{equation}\label{41.ent}
\frac{dH_2}{dt} + c\int_{\R^3}\big(|\na\sqrt{W_+}|^2 + |\na\sqrt{W_-}|^2
+ T|\na\sqrt{n_0}|^2 + W_0^{-1}|(\na \vec{W})^\top|^2\big) dx \le 0,
\end{equation}
where $c>0$ is a constant and $(\na\vec{W})^\top
= ({\mathbb I}-|\vec{W}|^{-2}\vec{W}\otimes\vec{W})\na\vec{W}$.
\end{proposition}
\begin{proof}
First, we perform some auxiliary computations:
\begin{align*}
\frac{\pa}{\pa n_0}\bigg(\frac52 n_0\log\frac{n_0}{W_+^{3/5}+W_-^{3/5}}\bigg)
&= \frac52\bigg(\log n_0 - \log(W_+^{3/5}+W_-^{3/5}) + 1\bigg), \\
\frac{\pa}{\pa W_0}\bigg(\frac52 n_0\log\frac{n_0}{W_+^{3/5}+W_-^{3/5}}\bigg)
&= -\frac32 n_0\frac{W_+^{-2/5}+W_-^{-2/5}}{W_+^{3/5}+W_-^{3/5}}, \\
\frac{\pa}{\pa \vec{W}}\bigg(\frac52 n_0\log\frac{n_0}{W_+^{3/5}+W_-^{3/5}}\bigg)
&= -\frac32 n_0\frac{W_+^{-2/5}-W_-^{-2/5}}{W_+^{3/5}+W_-^{3/5}}
\frac{\vec{W}}{|\vec{W}|}.
\end{align*}
Using these expressions and equations \eqref{41.m2}, it follows that
\begin{align*}
\frac{dH_2}{dt} &= \int_{\R^3}\bigg\{\frac52\big(\log n_0
- \log(W_+^{3/5}+W_-^{3/5}) + 1\big)\pa_t n_0 \\
&\phantom{xx}{}- \frac32n_0\frac{W_+^{-2/5}+W_-^{-2/5}}{W_+^{3/5}+W_-^{3/5}}\pa_t W_0
- \frac32n_0\frac{W_+^{-2/5}-W_-^{-2/5}}{W_+^{3/5}+W_-^{3/5}}
\frac{\vec{W}}{|\vec{W}|}\cdot\pa_t\vec{W}\bigg\}dx \\
&= -\frac53\int_{\R^3}\na\log\frac{n_0}{W_+^{3/5}+W_-^{3/5}}\cdot\na W_0 dx \\
&\phantom{xx}{}
+ \frac{5}{12}\int_{\R^3}\na\frac{n_0(W_+^{-2/5}+W_-^{-2/5})}{W_+^{3/5}+W_-^{3/5}}
\cdot\na\bigg(\frac{W_+^{3/5}+W_-^{3/5}}{n_0}(W_+^{7/5}+W_-^{7/5})\bigg)dx \\
&\phantom{xx}{}+ \frac{5}{12}\int_{\R^3}\na\bigg(
\frac{n_0(W_+^{-2/5}-W_-^{-2/5})}{W_+^{3/5}+W_-^{3/5}}\frac{\vec{W}}{|\vec{W}|}
\bigg)\cdot\na\bigg(\frac{W_+^{3/5}+W_-^{3/5}}{n_0}(W_+^{7/5}-W_-^{7/5})
\frac{\vec{W}}{|\vec{W}|}\bigg)dx \\
&\phantom{xx}{}+ \frac{3}{2\tau_{\rm sf}}\int_{\R^3}
\frac{n_0(W_+^{-2/5}-W_-^{-2/5})}{W_+^{3/5}+W_-^{3/5}}|\vec{W}|dx.
\end{align*}
Setting $\lambda:=n_0/(W_+^{3/5}+W_-^{3/5})$, we can rewrite $dH_2/dt$ as follows:
\begin{align*}
\frac{dH_2}{dt} &= -\frac53\int_{\R^3}\lambda^{-1}\na\lambda\cdot\na W_0 dx \\
&\phantom{xx}{}+ \frac{5}{12}\int_{\R^3}\na\big(\lambda(W_+^{-2/5}+W_-^{-2/5})\big)
\cdot\na\big(\lambda^{-1}(W_+^{7/5}+W_-^{7/5})\big)dx \\
&\phantom{xx}{}+ \frac{5}{12}\int_{\R^3}\na\bigg(\lambda(W_+^{-2/5}-W_-^{-2/5})
\frac{\vec{W}}{|\vec{W}|}\bigg)\cdot\na\bigg(\lambda^{-1}(W_+^{7/5}-W_-^{7/5})
\frac{\vec{W}}{|\vec{W}|}\bigg)dx \\
&\phantom{xx}{}+ \frac{3}{2\tau_{\rm sf}}\int_{\R^3}\lambda|\vec{W}|
(W_+^{-2/5}-W_-^{-2/5})dx \\
&= I_1+I_2+I_3+I_4.
\end{align*}
Using $W_0=\frac12(W_++W_-)$, the first integral becomes
$$
I_1 = -\frac56\int_{\R^3}\sum_{s=\pm}\frac{\na\lambda}{\lambda}\cdot\na W_s dx.
$$
By the product rule, the third integral $I_3$ is computed as
\begin{align*}
I_3 &= \frac{5}{12}\int_{\R^3}\na\big(\lambda(W_+^{-2/5}-W_-^{-2/5})\big)
\cdot\na\big(\lambda^{-1}(W_+^{7/5}-W_-^{7/5})\big)dx \\
&\phantom{xx}{}+ \frac{5}{12}\int_{\R^3}\big(\lambda(W_+^{-2/5}-W_-^{-2/5})\big)
\big(\lambda^{-1}(W_+^{7/5}-W_-^{7/5})\big)
\bigg|\na\frac{\vec{W}}{|\vec{W}|}\bigg|^2 dx,
\end{align*}
where the mixed terms vanish since
$\na(\vec{W}/|\vec{W}|)\cdot(\vec{W}/|\vec{W}|)=0$ (which is a
consequence of $\na|\vec{W}/|\vec{W}||^2=0$).
Expanding the products in the first integral
on the right-hand side and in $I_2$, some terms cancel, and we end up with
\begin{align*}
I_2+I_3 &=
\frac56\int_{\R^3}\big(\na(\lambda W_+^{-2/5})\cdot\na(\lambda^{-1}W_+^{7/5})
+ \na(\lambda W_-^{-2/5})\cdot\na(\lambda^{-1}W_-^{7/5})\big)dx \\
&\phantom{xx}{}+ \frac{5}{12}\int_{\R^3}(W_+^{-2/5}-W_-^{-2/5})
(W_+^{7/5}-W_-^{7/5})\bigg|\na\frac{\vec{W}}{|\vec{W}|}\bigg|^2 dx \\
&= \frac56\int_{\R^3}\sum_{s=\pm}\bigg(-\frac{14}{25}\frac{|\na W_s|^2}{W_s}
+ \frac95\frac{\na\lambda}{\lambda}\cdot\na W_s
- \frac{W_s}{\lambda^2}|\na\lambda|^2\bigg)dx \\
&\phantom{xx}{}+ \frac{5}{12}\int_{\R^3}(W_+^{-2/5}-W_-^{-2/5})
(W_+^{7/5}-W_-^{7/5})\bigg|\na\frac{\vec{W}}{|\vec{W}|}\bigg|^2 dx.
\end{align*}
Finally, the fourth integral is nonpositive since $0\le W_-\le W_+$, i.e.\ $I_4\le 0$.
Combining these results, we find that
\begin{align}
\frac{dH_2}{dt} &\le -\frac56\int_{\R^3}\sum_{s=\pm}\bigg(
\frac{14}{25}\bigg|\frac{\na W_s}{\sqrt{W_s}}\bigg|^2
- \frac45\frac{\na W_s}{\sqrt{W_s}}\cdot\frac{\sqrt{W_s}}{\lambda}\na\lambda
+ \bigg|\frac{\sqrt{W_s}}{\lambda}\na\lambda\bigg|^2\bigg)dx \nonumber \\
&\phantom{xx}{}- \frac{5}{12}\int_{\R^3}(W_-^{-2/5}-W_+^{-2/5})
(W_+^{7/5}-W_-^{7/5})\bigg|\na\frac{\vec{W}}{|\vec{W}|}\bigg|^2 dx \nonumber \\
&= J_1 + J_2. \label{41.J12}
\end{align}
First, we consider the first integral $J_1$.
The quadratic form in $J_1$ is positive definite and the eigenvalues of the
associated matrix are larger than $1/5$, so
\begin{align}
J_1 &\le -\frac15\int_{\R^3}\bigg(|\na\sqrt{W_+}|^2 + |\na\sqrt{W_-}|^2
+ (W_+ + W_-)\bigg|\frac{\na\lambda}{\lambda}\bigg|^2\bigg)dx \nonumber \\
&\le -\frac15\int_{\R^3}\bigg(|\na\sqrt{W_+}|^2 + |\na\sqrt{W_-}|^2
+ 2\eps W_0\bigg|\frac{\na\lambda}{\lambda}\bigg|^2\bigg)dx, \label{41.J1}
\end{align}
where we replaced $W_+ + W_-$ by $2W_0$ and introduced some $\eps\in(0,1)$.
The last term can be reformulated in terms of $W_0=\frac12(W_+ + W_-)$ and
$n_0=(W_+^{3/5}+W_-^{3/5})\lambda$, using the elementary inequalities
$(a-b)^2\ge \frac12 a^2-b^2$ and $-(a+b)^2\ge -2(a^2+b^2)$:
\begin{align*}
W_0\bigg|\frac{\na\lambda}{\lambda}\bigg|^2
&= W_0\bigg|\frac{\na n_0}{n_0}
- \frac35\frac{W_+^{-2/5}\na W_+}{W_+^{3/5}+W_-^{3/5}}
- \frac35\frac{W_-^{-2/5}\na W_-}{W_+^{3/5}+W_-^{3/5}}\bigg|^2 \\
&\ge \frac12 W_0\bigg|\frac{\na n_0}{n_0}\bigg|^2
- \frac{18}{25}W_0\bigg(\frac{W_+^{-4/5}|\na W_+|^2}{(W_+^{3/5}+W_-^{3/5})^2}
+ \frac{W_-^{-4/5}|\na W_-|^2}{(W_+^{3/5}+W_-^{3/5})^2}\bigg).
\end{align*}
Employing $W_+^{3/5}+W_-^{3/5}\ge (W_++W_-)^{3/5}=(2W_0)^{3/5}$ and
$W_\pm^{1/5}\le (2W_0)^{1/5}$, we can estimate as follows:
\begin{align*}
W_0\bigg|\frac{\na\lambda}{\lambda}\bigg|^2
&\ge \frac12 W_0\bigg|\frac{\na n_0}{n_0}\bigg|^2
- \frac{18}{25}W_0\bigg(\frac{4W_+^{1/5}|\na \sqrt{W_+}|^2}{(2W_0)^{6/5}}
+ \frac{4W_-^{1/5}|\na W_-|^2}{(2W_0)^{6/5}}\bigg) \\
&= \frac12 W_0\bigg|\frac{\na n_0}{n_0}\bigg|^2
- \frac{18}{25}\frac{2^{4/5}}{W_0^{1/5}}\big(W_+^{1/5}|\na\sqrt{W_+}|^2
+ W_-^{1/5}|\na\sqrt{W_-}|^2\big) \\
&\ge \frac12 W_0\bigg|\frac{\na n_0}{n_0}\bigg|^2
- \frac{36}{25}\big(|\na\sqrt{W_+}|^2 + |\na\sqrt{W_-}|^2\big).
\end{align*}
Then, with the relation $W_0=\frac32 n_0T$,
$$
W_0\bigg|\frac{\na\lambda}{\lambda}\bigg|^2
\ge 3T|\na\sqrt{n_0}|^2
- \frac{36}{25}\big(|\na\sqrt{W_+}|^2 + |\na\sqrt{W_-}|^2\big).
$$
Inserting this expression into \eqref{41.J1} and choosing $\eps>0$
sufficiently small, we arrive at
\begin{equation}\label{41.J11}
J_1 \le -c\int_{\R^3}\big(|\na\sqrt{W_+}|^2 + |\na\sqrt{W_-}|^2
+ T|\na\sqrt{n_0}|^2\big)dx
\end{equation}
for some number $0<c<1/5$.
Next, we estimate the second integral $J_2$ in \eqref{41.J12}.
By the mean-value theorem, there exist $\xi$, $\eta\in[W_-,W_+]$ such that
\begin{align*}
(W_-^{-2/5} & - W_+^{-2/5})(W_+^{7/5}-W_-^{7/5})
= (W_+W_-)^{-2/5}(W_+^{2/5}-W_-^{2/5})(W_+^{7/5}-W_-^{7/5}) \\
&= \frac{14}{25}(W_+W_-)^{-2/5}\xi^{-3/5}\eta^{2/5}(W_+ - W_-)^2
\ge \frac{14}{25}W_+^{-1}(W_+ - W_-)^2
\ge \frac{28}{25}\frac{|\vec{W}|^2}{W_0},
\end{align*}
where we used that $W_+\le 2W_0$ and $W_+ - W_-=2|\vec{W}|$. Consequently,
$$
J_2 \ge \frac{28}{25}\int_{\R^3}\frac{|\vec{W}|^2}{W_0}
\bigg|\na\frac{\vec{W}}{|\vec{W}|}\bigg|^2 dx
= \frac{28}{25}\int_{\R^3}\frac{1}{W_0}
\bigg|\bigg({\mathbb I}-\frac{\vec{W}\otimes\vec{W}}{|\vec{W}|^2}
\bigg)\na\vec{W}\bigg|^2 dx.
$$
Combining this inequality and \eqref{41.J11} with \eqref{41.J12},
the result follows.
\end{proof}
\subsection{Entropy inequality for the third model}\label{sec.ent3}
We show that there exists an entropy for the third model
\eqref{1.et3.npm}-\eqref{1.et3.s} ($\vec{a}=\lambda\vec{c}$) for vanishing
electric fields, i.e.
\begin{align}
& \pa_t n_\pm - \Delta(n_\pm T_\pm) = \mp\frac{1}{2\tau_{\rm sf}}(n_+ - n_-)
\mp \frac12(n_+T_+ - n_-T_-)|\na\vec{s}|^2, \label{43.eq1} \\
& \frac32\pa_t(n_\pm T_\pm) - \frac52\Delta(n_\pm T_\pm^2)
= \mp\frac{3}{4\tau_{\rm sf}}(n_+T_+ - n_-T_-)
\mp \frac54(n_+T_+^2 - n_-T_-^2)|\na\vec{s}|^2, \label{43.eq2} \\
& \pa_t\vec{s} - \frac{n_+T_+ - n_-T_-}{n_+ - n_-}\vec{s}\times
(\Delta\vec{s}\times\vec{s}) = 2\frac{\na(n_+T_+ - n_-T_-)}{n_+ - n_-}
\cdot\na\vec{s} - \vec{\Omega}_{\rm e}\times\vec{s}, \label{43.eq3}
\end{align}
where $x\in\R^3$, $t>0$. As in Section \ref{sec.ent2}, we make first explicit
the entropy functional \eqref{1.H}, where the Maxwellian is given by its
Pauli components \eqref{3.max3}. A computation shows that
$M_\pm=n_\pm g_{T_\pm}(k)\sigma_0$, so \eqref{4.H} yields immediately \eqref{1.H3}.
\begin{proposition}[Entropy inequality for system \eqref{43.eq1}-\eqref{43.eq3}]
\label{prop.ent3}
The entropy \eqref{1.H3}, considered as a function of time, is nonincreasing
along (smooth) solutions $(n_\pm,T_\pm,\vec{s})$ to \eqref{43.eq1}-\eqref{43.eq3}
in $\R^3$, and there exists a number $c>0$ such that
$$
\frac{dH_3}{dt} + c\int_{\R^3}\sum_{s=\pm}\big(T_s|\na\sqrt{n_s}|^2
+ n_s|\na\sqrt{T_s}|^2\big)dx \le 0.
$$
\end{proposition}
\begin{proof}
Before computing the derivative $dH_3/dt$, let us consider the semiclassical
energy-transport system
$$
\pa_t n = \Delta(nT), \quad \frac32\pa_t(nT) = \frac52\Delta(nT^2)
\quad\mbox{in }\R^3,
$$
which is known to dissipate the entropy $H_0=\int_{\R^3}n\log(nT^{-3/2})dx$.
Indeed, a computation shows that
\begin{align*}
\frac{dH_0}{dt} &= -\int_{\R^3}\bigg(\na(nT)\cdot\na(nT^{-3/2})
- \frac52\na\frac{1}{T}\cdot\na(nT^2)\bigg)dx \\
&= -4\int_{\R^3}\bigg(|\sqrt{T}\na\sqrt{n}|^2 + 2\sqrt{T}\na\sqrt{n}\cdot
\sqrt{n}\na\sqrt{T} + \frac72|\sqrt{n}\sqrt{T}|^2\bigg)dx.
\end{align*}
The quadratic form in the variables $\sqrt{T}\na\sqrt{n}$ and
$\sqrt{n}\na\sqrt{T}$ is positive definite and the eigenvalues of the associated
matrix are larger than $1/2$, so
$$
\frac{dH_0}{dt} + 2\int_{\R^3}\big(|\sqrt{T}\na\sqrt{n}|^2
+ |\sqrt{n}\na\sqrt{T}|^2\big)dx \le 0.
$$
The similarity in structure between $H_3$ and $H_0$ as well as between the
spin and semiclassical energy-transport system allows us to deduce that, for some
number $c>0$,
\begin{align*}
\frac{dH_3}{dt} & + c\int_{\R^3}\sum_{s=\pm}\big(T_s|\na\sqrt{n_s}|^2
+ n_s|\na T_s|^2\big)dx \\
&\le - \frac{1}{2\tau_{\rm sf}}
\int_{\R^3}\bigg(\log\frac{n_+T_+^{-3/2}}{n_-T_-^{-3/2}}(n_+ - n_-)
+ \frac32\frac{T_+ - T_-}{T_+T_-}(n_+T_+ - n_-T_-)\bigg)dx \\
&\phantom{xx}{}- \frac12\int_{\R^3}\bigg(\log\frac{n_+T_+^{-3/2}}{n_-T_-^{-3/2}}
(n_+T_+ - n_-T_-)
+ \frac52\frac{T_+ - T_-}{T_+T_-}(n_+T_+^2 - n_-T_-^2)\bigg)|\vec{s}|^2dx \\
&= I_1 + I_2.
\end{align*}
We claim that $I_1\le 0$ and $I_2\le 0$ which concludes the proof.
First, we prove that $I_1\le 0$. It holds that
\begin{align*}
I_1 &= -\frac{1}{2\tau_{\rm sf}}\int_{\R^3}(n_+ - n_-)(\log n_+ - \log n_-)dx \\
&\phantom{xx}{}- \frac{3}{4\tau_{\rm sf}}
\int_{\R^3}\bigg(-(n_+ - n_-)\log\frac{T_+}{T_-}
+ \frac{T_+ - T_-}{T_+T_-}(n_+T_+ - n_-T_-)\bigg)dx \\
&\le -\frac{3}{4\tau_{\rm sf}}\int_{\R^3}\bigg(-(n_+ - n_-)\log\frac{T_+}{T_-}
+ \frac{T_+ - T_-}{T_+T_-}(n_+T_+ - n_-T_-)\bigg)dx.
\end{align*}
Because of $T_-\le T_+$ and $n_-\ge 0$, we have $n_+T_+ - n_-T_-\ge (n_+ - n_-)T_+$
which shows that
\begin{align*}
I_1 &\-e -\frac{3}{4\tau_{\rm sf}}\int_{\R^3}\bigg(-(n_+ - n_-)\log\frac{T_+}{T_-}
+ \frac{1}{T_-}(n_+ - n_-)(T_+ - T_-)\bigg)dx \\
&= -\frac{3}{4\tau_{\rm sf}}
\int_{\R^3}(n_+ - n_-)\bigg(\frac{T_+}{T_-} - 1 - \log\frac{T_+}{T_-}
\bigg)dx \le 0.
\end{align*}
In a similar way as above, we find that $n_+T_+^2 - n_-T_-^2\ge (n_+T_+ - n_-T_-)T_+$
and
\begin{align*}
I_2 &= -\frac12\int_{\R^3}(n_+T_+ - n_-T_-)(\log(n_+T_+)-\log(n_-T_-))dx \\
&\phantom{xx}{}- \frac54\int_{\R^3}\bigg(-(n_+T_+ - n_-T_-)\log\frac{T_+}{T_-}
+ \frac{T_+ - T_-}{T_+T_-}(n_+T_+^2 - n_-T_-^2)\bigg)|\vec{s}|^2dx \\
&\le -\frac54\int_{\R^3}\bigg(-(n_+T_+ - n_-T_-)\log\frac{T_+}{T_-}
+ \frac{1}{T_-}(n_+T_+ - n_-T_-)(T_+ - T_-)\bigg)|\vec{s}|^2dx \\
&= -\frac54\int_{\R^3}(n_+T_+ - n_-T_-)
\bigg(\frac{T_+}{T_-} - 1 - \log\frac{T_+}{T_-}\bigg)dx \le 0.
\end{align*}
This finishes the proof.
\end{proof}
\section{Existence analysis of the second model}\label{sec.ex}
We show the existence of weak solutions to a time-discrete version
of the second model in the formulation \eqref{3.et2.n02}-\eqref{3.et2.vecw2}
for vanishing electric field. Replacing $W_0=\frac32 n_0T$ and $Z_0$, $\vec{Z}$ by
\eqref{32.Z0}, \eqref{32.vecZ}, respectively, we obtain system
\eqref{12.n0}-\eqref{12.vecw}. We recall that $h>0$ is the time step
size, $(n_0,W_0,\vec{W})$ are the unknowns, and $(n_0^0,W_0^0,\vec{W}^0)$
are the moments at the previous time step (supposed to be given).
\begin{theorem}[Existence for the time-discrete second model]\label{thm.ex}
Let $\dom\subset\R^d$ ($d\le 3$) be a bounded domain and let $n_0^0$,
$W_0^0\in L^2(\dom)$,
$n_0^D$, $W_0^D\in H^1(\dom)\cap L^\infty(\dom)$,
$\vec{W}^D\in H^1(\dom;\R^3)\cap L^\infty(\dom;\R^3)$,
$\vec{W}^0\in L^2(\dom;\R^3)$
satisfy $\sup_{\pa \dom}|\vec{W}^D|/W_0^D<1$ and
$$
n_0^0>0, \ W_0^0>0\quad\mbox{in }\dom, \quad \inf_{D}\frac{W_0^0}{n_0^0}>0,
\quad \sup_{\dom}\frac{|\vec{W}^0|}{W_0^0} < 1.
$$
Then there exists a solution $(n_0,W_0,\vec{W})\in H^1(\dom;\R^5)$ to
\eqref{12.n0}-\eqref{12.bc} such that
$$
n_0>0, \ W_0>0\quad\mbox{in }\dom, \quad \inf_{D}\frac{W_0}{n_0}>0,
\quad \sup_{\dom}\frac{|\vec{W}|}{W_0} < 1.
$$
\end{theorem}
\begin{proof}
The proof is inspired by the techniques employed in \cite{ZaJu15}.
The idea is to introduce new variables to make the differential operator
linear and to truncate the nonlinearities. We proceed in several steps.
{\em Step 1: new variables.} Let $W_\pm=W_0\pm|\vec{W}|$. We define
\begin{align*}
& u := \frac23 W_0, \quad
v_0 := \frac{5}{18n_0}(W_+^{3/5}+W_-^{3/5})(W_+^{7/5}+W_-^{7/5}), \\
& \vec{v} := \frac{5}{18n_0}(W_+^{3/5}+W_-^{3/5})(W_+^{7/5}-W_-^{7/5})
\frac{\vec{W}}{|\vec{W}|}.
\end{align*}
Observe that $\sup_{\pa \dom}|\vec{W}^D|/W_0^D<1$ implies that
$\inf_{\pa \dom}W_\pm>0$ and $\sup_{\pa \dom}|\vec{v}|/v_0<1$.
Furthermore,
\begin{align*}
& |\vec{v}| = \frac{5}{18n_0}(W_+^{3/5}+W_-^{3/5})(W_+^{7/5}-W_-^{7/5}), \quad
\frac{\vec{v}}{|\vec{v}|} = \frac{\vec{W}}{|\vec{W}|}, \\
& v_\pm := v_0\pm|\vec{v}| = \frac{5}{9n_0}(W_+^{3/5}+W_-^{3/5})W_\pm^{7/5}.
\end{align*}
This shows that $v_+/v_- = (W_+/W_-)^{7/5}$ or equivalently,
$W_+/W_-=(v_+/v_-)^{5/7}$. We rewrite the variables in terms of $v_\pm$,
observing that $v_+ + v_- = 2v_0$:
\begin{align}
v_0 &= \frac{5}{18}\frac{W_-^2}{n_0}\bigg(1+\bigg(\frac{v_+}{v_-}\bigg)^{3/7}
\bigg)\bigg(1+\frac{v_+}{v_-}\bigg)
= \frac{5}{18}\frac{W_+^2}{n_0}\bigg(1+\bigg(\frac{v_-}{v_+}\bigg)^{3/7}
\bigg)\bigg(1+\frac{v_-}{v_+}\bigg), \nonumber \\
W_\pm &= \bigg(\frac{18}{5}n_0v_0\bigg)^{1/2}v_\pm^{5/7}
(v_+^{3/7}+v_-^{3/7})^{-1/2}(v_++v_-)^{-1/2} \label{42.Wpm}\\
&= \bigg(\frac95 n_0\bigg)^{1/2}v_\pm^{5/7}(v_+^{3/7}+v_-^{3/7})^{-1/2}
\nonumber \\
u &= \frac13(W_++W_-) = \bigg(\frac25n_0v_0\bigg)^{1/2}
(v_+^{5/7}+v_-^{5/7})(v_+^{3/7}+v_-^{3/7})^{-1/2}(v_+ + v_-)^{1/2} \nonumber \\
&= \bigg(\frac{n_0}{5}\bigg)^{1/2}
(v_+^{5/7}+v_-^{5/7})(v_+^{3/7}+v_-^{3/7})^{-1/2}. \nonumber
\end{align}
Solving the last expression for $n_0$ yields
\begin{equation}\label{42.fct.n0}
n_0 = 5u^2\frac{v_+^{3/7}+v_-^{3/7}}{(v_+^{5/7}+v_-^{5/7})^2},
\end{equation}
and inserting this equation into \eqref{42.Wpm} gives
$W_\pm = 3uv_\pm^{5/7}/(v_+^{5/7}+v_-^{5/7})$.
Because of $\vec{v}/|\vec{v}|=\vec{W}/|\vec{W}|$, it follows that
\begin{equation}\label{42.fct.w0}
W_0 = \frac12(W_+ + W_-) = \frac32 u, \quad
\vec{W} = \frac32u\frac{v_+^{5/7}-v_-^{5/7}}{v_+^{5/7}+v_-^{5/7}}
\frac{\vec{v}}{|\vec{v}|}.
\end{equation}
We infer that system \eqref{12.n0}-\eqref{12.vecw} can be written as
\begin{align}
n_0(u,v_0,\vec{v}) - h\Delta u &= n_0^0, \label{42.n02} \\
W_0(u,v_0,\vec{v}) - h\Delta v_0 &= W_0^0, \label{42.w02} \\
\bigg(1+\frac{h}{\tau_{\rm sf}}\bigg)\vec{W}(u,v_0,\vec{v})
- h\Delta\vec{v} &= \vec{W}^0\quad\mbox{in }\dom,
\end{align}
where $n_0(u,v_0,\vec{v})$, $W_0(u,v_0,\vec{v})$, and
$\vec{W}(u,v_0,\vec{v})$ are given by \eqref{42.fct.n0}-\eqref{42.fct.w0}.
{\em Step 2: truncation.} We introduce for $\eps>0$ the truncation operator
$$
[f]_\eps := \left\{\begin{array}{ll}
0 &\quad\mbox{for }f\le 0, \\
f &\quad\mbox{for }0<f\le 1/\eps, \\
1/\eps &\quad\mbox{for }f>1/\eps,
\end{array}\right.
$$
and the auxiliary functions
\begin{align*}
\lambda(\xi,v_+,v_-)
&:= \frac52\xi\frac{(v_+^{3/7}+v_-^{3/7})(v_+ + v_-)}{(v_+^{5/7}+v_-^{5/7})^2}, \\
\mu(\xi,v_+,v_-)
&:= \frac32\bigg(1+\frac{h}{\tau_{\rm sf}}\bigg)\xi
\frac{v_+^{5/7}-v_-^{5/7}}{v_+^{5/7}+v_-^{5/7}}.
\end{align*}
These definitions imply that
$$
n_0(u,v_0,\vec{v}) = \lambda(u/v_0,v_+,v_-)u, \quad
\vec{W}(u,v_0,\vec{v}) = \mu(u/v_0,v_+,v_-)v_0\frac{\vec{v}}{|\vec{v}|}.
$$
We claim that the following estimate holds for $\lambda$ and $\mu$:
\begin{equation}\label{42.lamu}
\frac52\xi\le\lambda(\xi,v_+,v_-) \le 6\xi, \quad
0\le\mu(\xi,v_+,v_-) \le\frac32\bigg(1+\frac{h}{\tau_{\rm sf}}\bigg)\xi
\end{equation}
for all $\xi\ge 0$, $v_+\ge v_-\ge 0$.
Indeed, the bounds for $\mu$ are obvious. In order to prove the upper bound for
$\lambda$, we observe that
$$
(v_+^{3/7}+v_-^{3/7})(v_+ + v_-)
= v_+^{10/7} + v_-^{10/7} + v_+^{3/7}v_- + v_-^{3/7}v_+.
$$
By Young's inequality,
$$
v_+^{3/7}v_- \le \frac{3}{10}v_+^{10/7} + \frac{7}{10}v_-^{10/7}
\le \frac{7}{10}\big(v_+^{10/7} + v_-^{10/7}\big),
$$
and the same bound holds for $v_-^{3/7}v_+$ such that
$$
(v_+^{3/7}+v_-^{3/7})(v_+ + v_-) \le \frac{12}{5}\big(v_+^{10/7} + v_-^{10/7}\big)
\le \frac{12}{5}\big(v_+^{5/7} + v_-^{5/7}\big)^2.
$$
Inserting this estimate into the definition of $\lambda$, the upper bound
follows. The lower bound is equivalent to
$(v_+^{3/7}+v_-^{3/7})(v_+ + v_-)\ge (v_+^{5/7}+v_-^{5/7})^2$ which follows from
\begin{align*}
\big(v_+^{5/7}&+v_-^{5/7}\big)^2 - \big(v_+^{3/7}+v_-^{3/7}\big)(v_+ + v_-)
= 2v_+^{5/7}v_-^{5/7} - v_+^{3/7}v_- - v_-^{3/7}v_+ \\
&= 2(v_+v_-)^{5/7}\bigg(1 - \frac12\bigg(\frac{v_-}{v_+}\bigg)^{2/7}
- \frac12\bigg(\frac{v_+}{v_-}\bigg)^{2/7}\bigg) \le 0.
\end{align*}
This completes the proof of \eqref{42.lamu}.
With the above truncation, we wish to prove the existence of a weak solution
to
\begin{align}
\lambda\big([u/v_0]_\eps,v_+,v_-\big)u - h\Delta u &= n_0^0, \label{42.eps1} \\
\frac32[u/v_0]_\eps v_0 - h\Delta v_0 &= W_0^0, \label{42.eps2} \\
\mu\big([u/v_0]_\eps,v_+,v_-\big)v_0\frac{\vec{v}}{|\vec{v}|} - h\Delta\vec{v}
&= \vec{W}^0\quad\mbox{in }\dom, \label{42.eps3}
\end{align}
where, slightly abusing the notation, $v_\pm$ is here defined by
$v_\pm=\max\{0,v_0\pm|\vec{v}|\}$.
Since we will prove below that $v_0\pm|\vec{v}|\ge 0$, this notation is consistent.
The boundary conditions are
\begin{equation}\label{42.bc}
u = u^D:=\frac23 W_0^D, \quad v_0 = v_0^D, \quad \vec{v}=\vec{v}^D
\quad \mbox{on }\pa \dom,
\end{equation}
where
\begin{align*}
v_0^D &:= \frac{5}{18n_0^D}((W_+^D)^{3/5}+(W_-^D)^{3/5})
((W_+^D)^{7/5}+(W_-^D)^{7/5}), \\
\vec{v}^D &:= \frac{5}{18n_0^D}((W_+^D)^{3/5}+(W_-^D)^{3/5})
((W_+^D)^{7/5}-(W_-^D)^{7/5})\frac{\vec{W}^D}{|\vec{W}^D|},
\end{align*}
and $W_\pm^D:=W_0^D\pm|\vec{W}^D|$.
{\em Step 3: existence of solutions to the truncated problem.}
The existence of a solution to \eqref{42.eps1}-\eqref{42.eps3} is shown using
the Leray-Schauder fixed-point theorem. For this, we define the mapping
$F:L^2(\dom;\R^5)\times[0,1]\to L^2(\dom;\R^5)$, $F(\rho,\nu_0,\vec{\nu};\sigma)
= (u/v_0,v_0,\vec{v})$, auch that
\begin{align}
\sigma\lambda\big([\rho]_\eps,\nu_+,\nu_-\big)u - h\Delta u &= n_0^0
\quad\mbox{in }\dom, \quad u=u^D\quad\mbox{on }\pa \dom, \label{42.lin1} \\
\frac32\sigma[\rho]_\eps v_0 - h\Delta v_0 &= W_0^0
\quad\mbox{in }\dom, \quad v_0=v_0^D\quad\mbox{on }\pa \dom, \label{42.lin2} \\
\sigma\mu\big([\rho]_\eps,\nu_+,\nu_-\big)\nu_0
\frac{\vec{\nu}}{|\vec{\nu}|} - h\Delta \vec{v} &= \vec{W}^0
\quad\mbox{in }\dom, \quad \vec{v}=\vec{v}^D\quad\mbox{on }\pa \dom,
\label{42.lin3}
\end{align}
where $\nu_\pm := \max\{0,\nu_0\pm|\vec{\nu}|\}$. We first show that
$F$ is well defined, i.e.\ $u/v_0\in L^2(\dom)$. Standard eliptic regularity
implies that $u$, $v_0\in H^2(D)\subset L^\infty(\dom)$ (here we use $d\le 3$).
By Stampacchia's truncation technique, we infer that $u$ and $v_0$ are
strictly positive (see, e.g., Step 2 in \cite[Section~2]{ZaJu15}). We deduce
that $u/v_0\in H^1(\dom)$, and $F$ is well defined. Since $\vec{v}\in H^2(\dom;\R^3)$
by elliptic regularity again, the range of $F$ lies in $H^1(\dom;\R^5)$.
Employing $u$, $v_0$, $\vec{v}$, respectively, as test functions in the weak
formulation of \eqref{42.lin1}-\eqref{42.lin3} and using the Poincar\'e
inequality (note that $(u,v_0,\vec{v})$ are bounded functions),
we obtain for some constant $C>0$,
$$
\|F(\rho,\nu_0,\vec{\nu};\sigma)\|_{H^1(\dom;\R^5)}
\le C\big(\|(n_0^0,W_0^0,\vec{W}^0)\|_{L^2(\dom;\R^5)}
+ \|(\rho,\nu_0,\vec{\nu})\|_{L^2(\dom;\R^5)}\big).
$$
Standard arguments show that $F$ is continuous. Then the Sobolev embedding
$H^1(\dom)\hookrightarrow L^2(\dom)$ implies that $F$ is compact.
Moreover, $F(\cdot;0)$ is constant.
It remains to derive uniform a priori estimates for all fixed points of
$F(\cdot;\sigma)$. Let $(\rho,\nu_0,\vec{\nu})\in L^2(\dom;\R^5)$ be such a fixed
point. Then $(\rho,\nu_0,\vec{\nu})\in H^1(\dom;\R^5)$ and $u=\rho \nu_0$.
Employing $u-u^D$, $v_0-v_0^D$ as test functions in the weak formulation of
\eqref{42.lin1}-\eqref{42.lin2}, respectively, and the Poincar\'e
inequality, we find that
$$
\|u\|_{H^1(\dom)} + \|v_0\|_{H^1(\dom)}
\le ch^{-1/2}\big(\|n_0^0\|_{L^2(\dom)} + \|W_0^0\|_{L^2(\dom)}\big),
$$
where here and in the following, $c>0$ denotes a generic constant independent
of the solutions (and of $\eps$).
Similarly, with the test function $\vec{v}-\vec{v}^D$ in the weak formulation of
\eqref{42.lin3}, using the nonnegativity of $\nu_0$ and $\mu$,
$$
\|\vec{v}\|_{H^1(\dom)} \le Ch^{-1/2}\|\vec{W}^0\|_{L^2(\dom)}.
$$
These estimates provides the uniform bound in $L^2(\dom;\R^5)$ for all
fixed points of $F(\cdot,\sigma)$. By the Leray-Schauder fixed-point theorem,
we infer the existence of a weak solution to \eqref{42.eps1}-\eqref{42.eps3}.
{\em Step 4: removing the truncation.} We prove that that there exists
a positive lower bound for $u/v_0$ which is independent of $\eps$.
As a consequence, the truncation in \eqref{42.eps1}-\eqref{42.eps3} can
be removed for sufficiently small values of $\eps>0$, giving a solution
to \eqref{12.n0}-\eqref{12.vecw}.
We choose $\eps:=\min\{\inf_{\dom}(W_0^0/n_0^0),(\sup_\dom(u^D/v_0^D))^{-1}\}$,
which is positive by assumption,
and define $\phi(z)=\max\{0,z-1/\eps\}$. We use the (admissible) test functions
$v_0\phi(u/v_0)$, $u\phi(u/v_0)$ in \eqref{42.eps1}, \eqref{42.eps2},
respectively, and take the difference of the resulting equations:
\begin{align}
\int_{\dom} & \bigg(\lambda\big([u/v_0]_\eps,v_+,v_-\big)
- \frac32[u/v_0]_\eps\bigg)uv_0\phi(u/v_0)dx \nonumber \\
&\phantom{xx}{}+ h\int_{\dom}\big(\na(v_0\phi(u/v_0))\cdot\na u
- \na(u\phi(u/v_0))\cdot\na v_0\big)dx \label{42.aux}\\
&= \int_{\dom}(v_0n_0^0-uW_0^0)\phi(u/v_0)dx. \nonumber
\end{align}
By \eqref{42.lamu}, the first integral on the left-hand side can be estimated from
below,
$$
\int_{\dom} \bigg(\lambda\big([u/v_0]_\eps,v_+,v_-\big)
- \frac32[u/v_0]_\eps\bigg)uv_0\phi(u/v_0)dx
\ge \int_{\dom}[u/v_0]_\eps uv_0\phi(u/v_0)dx \ge 0.
$$
The second integral on the left-hand side of \eqref{42.aux} is nonnegative since
\begin{align*}
\int_{\dom} & \big(\na(v_0\phi(u/v_0))\cdot\na u
- \na(u\phi(u/v_0))\cdot\na v_0\big)dx \\
&= \int_{\dom}\big(v_0\na\phi(u/v_0)\cdot\na u - u\na\phi(u/v_0)\cdot\na v_0
\big)dx \\
&= \int_{\dom}(v_0\na u-u\na v_0)\cdot\na(u/v_0)\phi'(u/v_0)dx
= \int_{\dom}v_0^2|\na(u/v_0)|^2\phi'(u/v_0)dx \ge 0.
\end{align*}
Finally, because of $\phi(u/v_0)=0$ if $v_0/u\le\eps$ and $\eps\le W_0^0/n_0^0$,
the integral on the right-hand side of \eqref{42.aux} becomes
\begin{align*}
\int_{\dom}(v_0n_0^0-uW_0^0)\phi(u/v_0)dx
&= \int_{\dom}un_0^0\bigg(\frac{v_0}{u}-\frac{W_0^0}{n_0^0}\bigg)\phi(u/v_0)dx \\
&\le \int_{\dom}un_0^0\bigg(\eps-\frac{W_0^0}{n_0^0}\bigg)\phi(u/v_0)dx \le 0.
\end{align*}
Therefore, \eqref{42.aux} implies that
$$
0\le \int_{\dom}uv_0\phi(u/v_0)dx\le 0,
$$
from which we deduce that $\phi(u/v_0)=0$ a.e.\ in $\dom$ and consequently,
$u/v_0\le 1/\eps$ a.e.\ in $\dom$. Hence, $[u/v_0]_\eps=u/v_0$ and we can remove
the truncation in \eqref{42.eps1}-\eqref{42.eps3}.
{\em Step 5: proof of $v_0>|\vec{v}|$ in $\dom$.}
More precisely, we show that $(1-\delta)v_0-|\vec{v}|\ge 0$ for
$$
0 < \delta < \min\bigg\{1-\sup_{\dom}\frac{|\vec{W}^0|}{W_0^0},
1-\sup_\dom\frac{|\vec{v}^D|}{v_0^D},\bigg(\frac16\bigg)^{7/5}\bigg\}.
$$
Note that such a choice is possible because of our assumptions.
To prove the claim, we use $w:=\min\{0,(1-\delta)v_0-|\vec{v}|\}$ and
$\vec{w}:=w\vec{v}/|\vec{v}|$ as test functions
in the weak formulations of \eqref{42.eps2} and \eqref{42.eps3}, respectively.
Note that, since $v_0$ is strictly positive, $\vec{w}$ vanishes in a neighborhood
of $\vec{v}=0$, so $\vec{w}\in H^1(\dom)$. By definition of $\delta$, it holds that
$w=0$ on $\pa \dom$, so $w$, $\vec{w}\in H_0^1(\dom)$.
We find that
\begin{align*}
\frac32\int_{\dom}uw dx + h\int_{D}\na v_0\cdot\na w dx
&= \int_{\dom}W_0^0wdx, \\
\frac32\bigg(1+\frac{h}{\tau_{\rm sf}}\bigg)\int_{\dom}
\frac{v_+^{5/7}-v_-^{5/7}}{v_+^{5/7}+v_-^{5/7}}uwdx
+ h\int_{\dom}\na\vec{v}\cdot\na\vec{w}dx
&= \int_{\dom}\vec{W}^0\cdot\vec{w}dx.
\end{align*}
We take the difference between the first equation, multiplied by $1-\delta$,
and the second equation:
\begin{align}
\int_{\dom} & \bigg((1-\delta)-\frac32\bigg(1+\frac{h}{\tau_{\rm sf}}\bigg)
\frac{v_+^{5/7}-v_-^{5/7}}{v_+^{5/7}+v_-^{5/7}}\bigg)uw dx \label{42.aux2} \\
&{}+ h\int_{\dom}\big((1-\delta)\na v_0\cdot\na w - \na\vec{v}\cdot\na\vec{w}\big)dx
= \int_{\dom}\bigg((1-\delta)W_0^0 - \frac{\vec{v}}{|\vec{v}|}\cdot\vec{W}^0
\bigg) w dx. \nonumber
\end{align}
We deduce from the definition of $\delta$ that for any $z\ge 1-\delta$,
$$
\frac{(1+z)^{5/7}-\max\{0,1-z\}^{5/7}}{(1+z)^{5/7}+\max\{0,1-z\}^{5/7}}
= 1 - \frac{2\max\{0,1-z\}^{5/7}}{(1+z)^{5/7}+\max\{0,1-z\}^{5/7}}
\ge 1 - 2\delta^{5/7} > \frac23.
$$
Thus, since $v_\pm=\max\{0,v_0\pm|\vec{v}|\}$ and taking $z=|\vec{v}|/v_0\ge
1-\delta$ on $\{w\le 0\}$, the first integral on the
left-hand side of \eqref{42.aux2} is estimated as
\begin{align*}
\int_{\dom} & \bigg((1-\delta)-\frac32\bigg(1+\frac{h}{\tau_{\rm sf}}\bigg)
\frac{v_+^{5/7}-v_-^{5/7}}{v_+^{5/7}+v_-^{5/7}}\bigg)uw dx \\
&\ge \int_{\dom}\bigg(1 - \frac32\frac{(1+|\vec{v}|/v_0)^{5/7}
-\max\{0,1-|\vec{v}|/v_0\}^{5/7}}{(1+|\vec{v}|/v_0)^{5/7}
+ \max\{0,1-|\vec{v}|/v_0\}^{5/7}}\bigg)uwdx \\
&\ge -c_\delta\int_{\dom}uwdx
= -c_\delta\int_{\dom}u\max\{0,(1-\delta)v_0-|\vec{v}|\}dx,
\end{align*}
where $c_\delta=\frac32(1-2\delta^{5/7})-1=\frac12-3\delta^{5/7}>0$.
The second integral on the left-hand side of \eqref{42.aux2} equals
\begin{align*}
\int_{\dom} & \bigg((1-\delta)\na v_0\cdot w - \na\vec{v}\cdot
\na\bigg(w\frac{\vec{v}}{|\vec{v}|}\bigg)\bigg)dx \\
&= \int_{\dom}\bigg((1-\delta)\na v_0\cdot w - \na|\vec{v}|\cdot\na w
- w\na\vec{v}\cdot\na\frac{\vec{v}}{|\vec{v}|}\bigg)dx \\
&= \int_{\dom}\bigg(|\na w|^2 - |\vec{v}|w\bigg|\na\frac{\vec{v}}{|\vec{v}|}\bigg|^2
\bigg)dx \ge 0,
\end{align*}
using the fact that $w\le 0$. Finally, by the definition of $\delta$,
the integral on the right-hand side of \eqref{42.aux2} is nonpositive,
$$
\int_{\dom} \bigg((1-\delta)W_0^0 - \frac{\vec{v}}{|\vec{v}|}\cdot\vec{W}^0
\bigg) w dx
\le \int_{\dom}\big((1-\delta)W_0^0 - |\vec{W}^0|\big) w dx \le 0.
$$
Summarizing these estimates, \eqref{42.aux2} implies that
$$
-c_\delta\int_{\dom}u\min\{0,(1-\delta)v_0-|\vec{v}|\}dx
= -c_\delta\int_{\dom}uw dx \le 0
$$
and hence, $(1-\delta)v_0-|\vec{v}|\ge 0$ a.e.\ in $\dom$, which proves the claim.
\end{proof}
\section{Numerical experiments}\label{sec.num}
We perform some numerical simulations using the first model
\eqref{1.et1a.n0}-\eqref{1.et1a.vecn} with the spin polarization matrix,
We consider, as in \cite{PoNe11},
three- and five-layer structures that consist of alternating nonmagnetic and
ferromagnetic layers. Multilayer structures are promising for applications in
micro-sensor and high-frequency devices. In this paper, they serve to illustrate
the solution behavior rather than to model practical devices.
\subsection{Numerical scheme}
We solve equations \eqref{1.et1a.n0}-\eqref{1.et1a.vecn}
on the finite interval $[0,1]$ which is divided in
$m$ equal subintervals $K$ of length $\triangle x=1/m$. The finite-volume method is
employed and the generic unknown $u_K$ is an approximation of the integral
$\int_K udx$. The difference quotient
$\DD u_{K,\sigma}/(\triangle x):=(u_{K,\sigma}-u_K)/(\triangle x)$ approximates
the gradient of $u$ in the subinterval $K$, where $u_{K,\sigma}$ is the value
in the neighboring element $K'$ such that
$\overline{K}\cap\overline{K'}=\{\sigma\}$. Then the
flux $J_u=-(\na(uT)+u\na V)$ through the point $\sigma$ can be approximated
by
\begin{equation}\label{6.J}
J_{u,K,\sigma}=-\frac{1}{\triangle x}\bigg(\DD(uT)_{K,\sigma}
+\frac12(u_K+u_{K,\sigma})\DD V_{K,\sigma}\bigg).
\end{equation}
Special care has to be taken for the discretization of the Joule heating term
$\J_n\cdot\na V$. We suggest to approximate it according to
$$
\int_K \J_n\cdot\na V dx \approx
\frac{1}{2\triangle x}\sum_{\sigma} \triangle x \J_{n,K,\sigma}\DD V_{K,\sigma},
$$
where the sum is (here and in the following)
over the two end points of the interval $K$.
The values $C_K$, $\vec{\Omega}_K$, $p_K$ are given by the
integrals of $C(x)$, $\vec{\Omega}(x)$, $p(x)$ over $K$, respectively, and
the values $\vec{\Omega}_\sigma$, $p_\sigma$ are the arithmetic averages of
$\vec\Omega$, $p$ in the neighboring subintervals of the intersecting point
$\sigma$, respectively. Finally, we set
$\eta_\sigma=\sqrt{1-p_\sigma^2}$.
The stationary solution is computed as the limit $t_k=k\triangle t\to\infty$ from
the implicit Euler finite-volume discretization of
\eqref{1.et1a.n0}-\eqref{1.et1a.vecn}. We solve first the Poisson equation
for the electric potential $V^k$ with the charge density from the previous time
step $k-1$, solve then the moment equations for $(n_0^k,W_0^k,\vec{n}^k)$,
and update finally the temperature. Given
$(n_{0,K}^{k-1},\vec{n}_K^{k-1},T_K^{k-1})$ and
$W_{0,K}^{k-1}=\frac32 n_{0,K}^{k-1}T_K^{k-1}$, the numerical scheme reads as
\begin{align*}
& -\frac{\lambda_D^2}{\triangle x}\sum_\sigma \DD V_{K,\sigma}^k
= \triangle x(n_{0,K}^{k-1}-C_K), \\
& \frac{\triangle x}{\triangle t}(n_{0,K}^k - n_{0,K}^{k-1})
+ \sum_\sigma \J_{n,K,\sigma}^k = 0, \\
& \frac{\triangle x}{\triangle t}(W_{0,K}^{k}-W_{0,K}^{k-1})
+ \sum_\sigma \J_{W,K,\sigma}^k + \frac{1}{2\triangle x}\sum_\sigma\triangle x
\J_{n,K,\sigma}^k \DD V_{K,\sigma}^k = 0, \\
& \frac{\triangle x}{\triangle t}(\vec{n}_K^k - \vec{n}_K^{k-1})
+ \sum_\sigma \vec{\J}_{K,\sigma}^k
+ \gamma\triangle x(\vec{\Omega}_K\times\vec{n}_K^k)
= -\frac{\triangle x}{\tau_{\rm sf}}\vec{n}_K^k, \\
& T_K^k = \frac23 \frac{W_{0,K}^{k}}{n_{0,K}^k},
\end{align*}
and the discrete fluxes are defined by
\begin{align*}
\J_{n,K,\sigma}^k &= -D_0\eta^{-2}_\sigma\big(J_{n,K,\sigma}^k
- p_\sigma\vec{\Omega}_\sigma\cdot\vec{J}_{n,K,\sigma}^k\big), \\
\J_{W,K,\sigma}^k &= -\frac53 D_0\eta_\sigma^{-2}\big(J_{W,K,\sigma}^k
- p\vec{\Omega}_\sigma\cdot\vec{J}_{W,K,\sigma}\big), \\
\vec\J_{K,\sigma}^k &= -D_0\eta_\sigma^{-2}
\big(-p_\sigma\vec{\Omega}_\sigma J_{n,K,\sigma}^k
+ (1-\eta_\sigma)\vec{\Omega}_\sigma\otimes\vec{\Omega}_\sigma
\cdot\vec{J}_{n,K,\sigma}^k + \eta_\sigma\vec{J}_{n,k,\sigma}^k\big),
\end{align*}
and the fluxes $J_{n,K,\sigma}^k$, $\J_{W,K,\sigma}^k$, and
$\vec{J}_{K,\sigma}^k$ are discretized according to \eqref{6.J} with the
exception that the temperature and the densities in the drift term are
explicit, i.e.
$$
J_{u,K,\sigma}^k = -\frac{1}{\triangle x}\bigg(\DD(u^kT^{k-1})_{K,\sigma}
+\frac12(u_K^{k-1}+u^{k-1}_{K,\sigma})\DD V^k_{K,\sigma}\bigg).
$$
Note that we have introduced the scaled diffusion coefficient $D_0$ and the
parameter $\gamma$, which come from the scaling of the equations.
The values are $D_0\approx 6.9\cdot 10^{-4}$ and $\gamma=4$.
The scaled Debye length equals $\lambda_D\approx 1.2\cdot 10^{-4}$.
We have chosen the (scaled) boundary conditions
$n_0=1$, $\vec{n}=0$, and $V=V_D$ at $x=0,1$ with $V_D(0)=0$ and $V_D(1)=U/U_T$.
Here, $U_T=0.026\,$V is the thermal voltage at room temperature.
The discrete linear system is solved for each time step $k$ until the maximum norm
of the difference between two consecutive solutions is smaller than a predefined
threshold ($10^{-8}\ldots 10^{-10}$). This solution is considered as a steady state.
The numerical parameters are $\triangle x=0.003$, $\triangle t=5\cdot 10^{-4}\ldots
10^{-3}$, and the (unscaled) physical parameters are $D=10^{-3}\,$m$^2$s$^{-1}$
(diffusion coefficient), $\tau_{\rm sf}=10^{-12}\,$s, and $U=-1\,$V (applied
bias).
\subsection{Three-layer structure}\label{sec.3}
As the first numerical experiment, we consider a three-layer structure
which consists of a nonmagnetic layer sandwiched between two ferromagnetic layers;
see Figure \ref{fig.3}. This structure may be regarded as a diode with ferromagnetic
source and drain regions. The length of the diode is $L=1.2\,\mu$m, the
ferromagnetic layers have length $\ell=0.2\,\mu$m, and the doping concentrations
are $C=10^{23}$\,m$^{-3}$ in the highly doped regions and
$C=4\cdot 10^{20}$\,m$^{-3}$ in the lowly doped region.
\begin{figure}[ht]
\centering\includegraphics[width=0.6\textwidth]{fnf_structure.eps}
\caption{Geometry of the three-layer structure with ferromagnetic ({\bf F})
highly doped ($n^+$) source and drain regions and nonmagnetic ({\bf N})
lowly doped ($n$) channel region.}
\label{fig.3}
\end{figure}
The local magnetization in the side regions is aligned with the $z$-axis
(orthogonal to the diode), $\vec{\Omega}(x)=(0,0,1)^\top$ for
$x\in[0,\ell]\cup[L-\ell,L]$ and $\vec\Omega(x)=0$ else.
The polarization in the ferromagnetic regions equals $p=0.66$.
Figure \ref{fig.3n} shows the stationary charge density $n_0$ (left panel)
and the spin density $\vec{n}=(0,0,n_3)$ (right panel),
compared with the solution to the corresponding
spinorial drift-diffusion model (with constant temperature). As expected, the
charge densities are similar with some small differences close to the junction of
the drain region. The spin component $n_3$ exhibits some peaks around the
junctions which can be explained by the discontinuity of $p(x)$ (and hence
$\eta(x)$) at the junctions \cite[Sec.~8.1]{PoNe11}. The peaks are smaller
in the energy-transport model which may be due to thermal diffusion.
\begin{figure}[ht]
\centering\small
\input{n0_fnf.tikz}\input{n3_fnf.tikz}
\caption{Charge density $n_0$ (left) and spin density $n_3$ (right) in the
three-layer structure computed from the spin energy-transport model
($T\neq\mbox{const.}$) and from the corresponding spin drift-diffusion model
($T=1$).}
\label{fig.3n}
\end{figure}
The temperature for different values of the polarization $p$ is illustrated
in Figure \ref{fig.3T}. The case $p=0$ corresponds to a nonmagnetic diode.
The temperature maximum increases with $p$ but the temperature decreases with $p$
in the drain region. Possibly, higher values of $p$ lead to stronger heat fluxes
increasing the temperature in the channel region.
\begin{figure}[ht]
\centering\small\input{temper_fnf_3.tikz}
\caption{Temperature in the three-layer structure for various
polarizations $p$.}
\label{fig.3T}
\end{figure}
\subsection{Five-layer structure}
The five-lyer structure is composed of two ferromagnetic layers sandwiched between
two nonmagnetic layers and separated by a thin nonmagnetic layer in the middle
of the structure; see Figure \ref{fig.5}.
The choice of the lengths $L$ and $\ell$ and of the doping
concentrations is as in Subsection \ref{sec.3}. The middle region has the
thickness $d=L/21\approx 60\,$nm. Again we take $p=0.66$. The local
magnetization is different in the two layers:
$\vec\Omega(x)=(0,0,1)^\top$ for $x\in[L/6,10L/21]$,
$\vec\Omega(x)=(0,1,0)^\top$ for $x\in[11L/21,5L/6]$, and
$\vec\Omega(x)=0$ else.
\begin{figure}[ht]
\includegraphics[width=0.6\textwidth]{5layer_structure.eps}
\caption{Geometry of the five-layer structure with
ferromagnetic ({\bf F}$_1$, {\bf F}$_2$) lowly doped ($n$) regions and
nonmagnetic ({\bf N}) regions. The source and drain regions are highly doped $(n^*$),
while the middle region is lowly doped.}
\label{fig.5}
\end{figure}
The effect of the temperature is now stronger than in the three-layer structure.
The charge density $n_0$ and temperature $T$ are presented
in Figure \ref{fig.5nT}. The interplay of the charge and spin densities in the
nonmagnetic middle region causes a small hump in $n_0$
and a more significant increase before the drain junction, compared to
Figure \ref{fig.3n} (left). The hump is larger when the electric potential is
a linear function and the temperature is constant; see Figure 3 in \cite{PoNe11}.
The temperature maximum decreases with $p$,
opposite to the situation in the three-layer structure. We observe that
the polarization strongly influences the temperature.
When $p=0$, we obtain the same curve as in Figure \ref{fig.3T} since
this describes the same nonmagnetic diode.
\begin{figure}[ht]
\centering\small
\input{n0_5layers.tikz}\input{temper_5layers_3.tikz}
\caption{Charge density $n_0$ (left) and temperature $T$ (right)
in the five-layer structure.}
\label{fig.5nT}
\end{figure}
In contrast to the three-layer structure, all components of the spin vector
density are nonzero. However, the component $n_1$ is relatively small. We
present the remaining components $n_2$ and $n_3$ in Figure \ref{fig.5n23}.
The temperature causes a significant smoothing of the peaks between the
magnetic/nonmagnetic junctions.
\begin{figure}[ht]
\centering\small\input{spin_5layers.tikz}
\caption{Spin density components $n_2$ and $n_3$ in the
five-layer structure computed from the spin energy-transport model
($T\neq\mbox{const.}$) and from the corresponding spin drift-diffusion model
($T=1$).}
\label{fig.5n23}
\end{figure}
|
\section{Introduction}
Let $X$ be a normal variety. Tamely ramified covers of $X$ are easy to understand. This is because locally these covers are determined by the ramification index. But this is not at all true for wildly ramified covers of $X$. This makes the study of wild ramification very tedious. In this paper we define a structure $P$ on $X$ called the branch data (see Section \ref{sec:branch-data}). When $X$ is a curve over an algebraically closed field then these objects were defined and studied in \cite{orbifold.bundles}. For a closed point $x\in X$, $P(x)$ is just a finite Galois extension of the fraction field of $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$ like in \cite{orbifold.bundles} but for higher dimensional $X$ the definition of branch data is slightly more intricate (see Definition \ref{def:branch-data}). The pair $(X,P)$ is called a formal orbifold. These objects provide a framework to study wild ramification in a relatively organised way.
Section \ref{sec:local-theory} develops ramification theory for excellent normal rings $R$ of arbitrary dimension. Some variants of which can be found in \cite{abhyankar}. Lemma \ref{compositum-wild-ramification} is the main result of this section which generalizes \cite[Lemma 3.1]{killwildram} to higher dimension. In section \ref{sec:branch-data} branch data on $X$ is defined and some of its basic properties are studied. Every finite dominant separable morphism from $Y\to X$ give rise to a Branch data on $X$ (Proposition \ref{B_f}). Formal orbifolds are defined in section \ref{sec:formal-orbifolds} to be normal varieties $X$ together with a branch data $P$. Coverings, \'etale and flat covers of formal orbifolds are also studied in this section. Fiber products of coverings and their properties are also discussed. It is shown that fiber product of \'etale coverings of formal orbifolds is an \'etale covering (Corollary \ref{fiber-product-etale}).
The \'etale fundamental group of formal orbifolds are defined in section \ref{sec:etale-pi_1}. Their basic properties which are analogous to fundamental groups of schemes are also proved. The following nice property about them are proved.
\begin{thm}(see Corollary \ref{pi_1-finite-rank})
Let $(X,P)$ be a connected formal orbifold with $X$ projective over $\spec(k)$ where the field $k$ is such that the absolute Galois group $G_k$ has finite rank then $\pi_1(X,P)$ has finite rank.
\end{thm}
It is also shown that they approximate the fundamental group of a normal variety.
\begin{thm}(see Theorem \ref{approximation})
Let $X$ be a normal connected variety over a perfect field or $\spec(\mathbb{Z}} \newcommand{\Aff}{\mathbb{A})$ and $U$ an open subset of $X$. Then $\pi_1(U)\cong \varprojlim\pi_1(X,P)$ where $P$ runs over all the branch data on $X$ such that $\BL(P)\subset X\setminus U$.
\end{thm}
The above two results applied together implies that $\pi_1(U)$ for $U$ quasiprojective variety over $k$ is the inverse limit of finite rank profinite groups which have a geometric interpretation.
In section \ref{sec:site-sheaves} \'etale site, presheaves and sheaves on formal orbifolds are defined. Structure sheaf of formal orbifolds are defined and their stalks have been computed. Note that a formal orbifold $(X,O)$ where $O$ is the trivial branch data is essentially the same as the normal variety $X$. In particular the \'etale site on $(X,O)$ is the same as the small \'etale site on $X$ (and hence $\pi_1(X,O)=\pi_1(X)$). A geometric formal orbifold is a formal orbifold $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}=(X,P)$ which admits a finite Galois \'etale morphism $f:(Y,O)\to (X,P)$ (in the sense of formal orbifold) for some $Y$ with trivial branch data $O$. In such a situation cohomology groups of $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ can be computed using the cohomology groups of $Y$ by a spectral sequence (Proposition \ref{spectral-sequence}).
In section \ref{sec:BK-filtration} using swan conductors of local fields defined by Kato and Matsuda a divisor $Sw(X,P)$ is associated to branch data $P$ on $X$ whose branch locus has irreducible components of pure codimension one in $X$. The abelianized fundamental group parameterizing covers with certain bounded ramification $\pi_1^{ab}(X,D)$ defined by Kerz and Saito in \cite{Kerz-Saito.CLT} and \cite{Kerz-Saito.Lefschetz} for an effective Cartier divisor $D$ on $X$ is also shown to be the inverse limit of $\pi_1^{ab}(X,P)$ where $P$ varies over branch data with $Sw(X,P)\le D$. This leads to questions such as whether some version of class field theory holds for formal orbifolds (\ref{Q:CFT}) and whether a version of Lefschetz's theorem for fundamental groups is true for formal orbifolds (\ref{Q:Lefschetz}).
In section \ref{sec:Lefschetz} we make some progress towards the later. Note that Lefschetz theorem for fundamental group is false for affine varieties in positive characteristic. Though Lefschetz theorem holds if one restricts to prime-to-p \'etale fundamental group or more generally tame fundamental group (\cite{Esnault-Kindler}). To allow wild ramification as well, one has to bound the ramification in some sense. In \cite{Kerz-Saito.Lefschetz} Kerz and Saito prove Lefschetz theorem for $\pi_1^{ab}(X,D)$. The definition of $\pi_1^{ab}(X,D)$ is the dual of the first cohomology group and their proof is cohomological in nature. Here we follow the method adopted in \cite[Chapter XII]{SGA2}, \cite[4.3]{Grothendieck-Murre} and \cite{Esnault-Kindler}. More precisely, we show the following results.
\begin{pro}(Proposition \ref{formal-fullyfaithful})
Let $(X,P)$ be a projective formal orbifold over a perfect field $k$ of dimension at least two, $Y$ be a normal hypersurface of $X$ which intersects $\BL(P)$ transversally and the divisor $[Y]$ is a very ample divisor on $X$. Then the functor $\Cov(X,P)\to \Cov(\widehat X_Y,\hat P)$ is fully faithful. Here $\widehat X_Y$ is the completion $X$ along $Y$ and $\hat P$ is the branch data on $\widehat X_Y$ induced from $P$.
\end{pro}
\begin{thm}(Theorem \ref{GM-wild})
Under the Hypothesis \ref{nonsplit}, the functor $\Cov(\widehat{X}_Y,\hat P) \to \Cov(Y,P_{|Y})$ is an equivalence.
\end{thm}
The Hypothesis \ref{nonsplit} essentially says that the formal orbifold $(X,P)$ is geometric, irreducible, smooth and projective over $k$; $Y$ is a smooth irreducible hypersurface of $X$ not contained in $\BL(P)$ such that for any point $y\in \BL(P)\cap Y$ there is only one point lying above it in the cover obtained from taking the normalization of a formal local neighbourhood $\widehat U_y$ of $y$ in $P(y,U)$. As a consequence of the above two results we get the following:
\begin{cor} (Corollary \ref{Lefschetz-thm})
Let $(X,P)$ be a smooth irreducible projective formal orbifold over a perfect field $k$ of dimension at least two. The functor from $\Cov(X,P)\to \Cov(Y,P_{|Y})$ is fully faithful if $Y$ satisfies Hypothesis \ref{nonsplit}. In particular the map natural map $\pi_1(Y,P_{|Y})\to \pi_1(X,P)$ is an epimorphism.
\end{cor}
The above is a wild analogue of \cite[4.3.7]{Grothendieck-Murre}.
In section \ref{sec:l-adic} $l$-adic sheaves on $X^o$ with normal compactification $X$ is analyzed in the language of formal orbifolds. It is shown that a locally constant sheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ on $X^o$ extends to a locally constant sheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ on a geometric formal orbifold $(X,P)$ for some branch data $P$ with branch locus contained in the boundary. It is also shown that if the ramification of $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ is bounded by a Galois \'etale cover $f:Y^o\to X^o$ (in the sense of \cite{Drinfeld}, \cite{Esnault-Kerz.Deligne}, \cite{Esnault}, etc.) then one could choose $P$ such that the branch data $f^*P$ on the normalization $Y$ of $X$ in $k(Y^o)$ is curve-tame. This allows us to observe that a lisse $l$-adic sheaf on $X^o$ has ramification bounded by a morphism $f$ then it has ramification bounded by any other morphism whose branch data is same as the branch data associated to $f$ up to tame part (Corollary \ref{lisse-bounded-ramification}).
\section*{Acknowledgements}
The author thanks Suresh Nayak for some useful discussions and an anonymous referee for useful suggestions.
\section{Local Theory} \label{sec:local-theory}
We begin with some results on ramification theory. Proposition \ref{basic-ramification} and \ref{unramified-closed-points} below are variants of results in Section 7 of \cite{abhyankar} where the treatment is for arbitrary normal local domains and hence the comparison with completion of the rings are missing.
For a ring $R$ and a prime ideal $P$, let $\widehat R^P$ denote the $P$-adic completion of $R$. For a local ring $R$, $\widehat R$ denotes the completion of $R$ at the maximal ideal. For an integral domain $R$, $\QF(R)$ denotes the field of fractions (=quotient field) of $R$.
We recall the definition of decomposition group and inertia group for finite extension of normal domains. \cite[page 35-37]{abhyankar}
\begin{df}
Let $R$ be an excellent normal domain with fraction field $K$, $L$ a finite $G$-Galois extension of $K$ and $S$ the integral closure of $R$ in $L$. Let $Q\subset S$ be a prime ideal of $S$ and $P=Q\cap R$.
\begin{enumerate}
\item Define the \emph{decomposition group} $D(Q)=\{\sigma\in G: \sigma(Q) \subset Q\}$
\item Define the \emph{inertia group} $I(Q)=\{\sigma\in G: \sigma(\alpha)-\alpha\in Q \text{ for all } \alpha\in S \}$. Note that $I(Q)\subset D(Q)$.
\end{enumerate}
\end{df}
The following result is well known but a precise reference is difficult to find in the literature.
\begin{pro}\label{basic-ramification}
Let $R$ be an excellent normal domain with fraction field $K$, $L$ a finite separable extension of $K$ and $S$ the integral closure of $R$ in $L$. Let $Q\subset S$ be a prime ideal of $S$ and $P=Q\cap R$. Let $\widehat K_P=\QF(\widehat R_P)$, $\widehat L_Q=\QF(\widehat S_Q)$, $\widehat K^P=\QF(\widehat R^P)$ and $\widehat L^Q=\QF(\widehat L^Q)$. Then the following holds:
\begin{enumerate}
\item The field extensions $\widehat L_Q/\widehat K_P$ and $\widehat L^Q/\widehat K^P$ are finite separable.
\item If $L/K$ is Galois then so are $\widehat L_Q/\widehat K_P$ and $\widehat L^Q/\widehat K^P$.
\item If $G=\Gal(L/K)$ then $\Gal(\widehat L_Q/\widehat K_P)$ is isomorphic to the subgroup $D(Q)$ and $\Gal(\widehat L_Q/\widehat K_P)\le \Gal(\widehat L^Q/K^P)$.
\item Moreover, if $Q'$ is another prime ideal of $S$ lying above $P$ then $D(Q)$ and $D(Q')$ are conjugates in $G$.
\end{enumerate}
\end{pro}
\begin{proof}
Since $R_P$ and $S_Q$ are excellent normal local domains, $\widehat R_P$ and $\widehat S_Q$ are also complete local normal domains containing $R_P$ and $S_Q$ respectively (\cite[7.8.3(v)]{ega4.2}). Also note that $\widehat R^P \subset \widehat R_P$ and $\widehat S^Q \subset \widehat S_Q$.
Hence $L$, $\widehat K^P$ and $\widehat K_P$ are subfields of $\widehat L_Q$, $\widehat L^Q=\widehat K^PL$ and $\widehat L_Q=\widehat K_P L$. So $\widehat L_Q/\widehat K_P$ is separable because $L/K$ is separable and $K\subset \widehat K_P$. The same proof says if $L/K$ is a normal extension then so is $\widehat L_Q/\widehat K_P$. Hence if $L/K$ is Galois then so is $\widehat L_Q/\widehat K_P$.
By definition of $D(Q)$, if $a\in Q^n$ then $ga\in Q^n$ for every $g\in D(Q)$. Hence given a Cauchy sequence $(\alpha_i)_{i\in \NN}\in L$ and $g\in D(Q)$ then sequence $(g\alpha_i)_{i\in \NN}$ is also a Cauchy sequence. In particular $D(Q)$ acts on $\widehat L_Q$. Also it fixes $\widehat K_P$. So $D(Q)\into \Gal(\widehat L_Q/\widehat K_P)$ is a monomorphism.
Let $\sigma \in \Gal(\widehat L_Q/\widehat K_P)$. Note that $L/K$ is Galois and $\sigma_{|K}=id_K$. Hence $\sigma(L)=L$. Since $\widehat S_Q$ is the integral closure of $\widehat R_P$ in $\widehat L_Q$, $\sigma(\widehat S_{Q})=\widehat S_{Q}$. But $S_Q=\widehat S_Q\cap L$, so $\sigma(S_Q)=S_{Q}$. Since $\sigma$ is a ring automorphism of a local ring, $\sigma(Q)=Q$. In particular $\sigma_{|L}\in D(Q)$. Hence $D(Q) \cong \Gal(\widehat L_Q/\widehat K_P)$.
To see the last statement, let $Q'$ be another prime ideal of $S$ lying above $P$. We have that $S_{Q'}\subset \widehat S_{Q'}$ and hence $L\subset \widehat L_{Q'}$. Let $M$ and $M'$ be the algebraic closure of $\widehat L_Q$ and $\widehat L_{Q'}$ then both $M$ and $M'$ are algebraic closure of $\widehat K_P$. So there exists a $\widehat K_P$-isomorphism $\phi:M\to M'$. Since $L/K$ is a Galois extension and $K\subset \widehat K_P$, $\phi(L)=L$. Note that $\widehat L_Q$ and $\widehat L_{Q'}$ are splitting fields of the polynomial $f(Z)$ over $\widehat K_P$, hence $\phi(\widehat L_Q)=\widehat L_{Q'}$. Since $\widehat S_Q$ and $\widehat S_{Q'}$ are integral closures of $\widehat R_P$ in $\widehat L_Q$ and $\widehat L_{Q'}$ respectively, $\phi(\widehat S_{Q})=\widehat S_{Q'}$. But $S_Q=\widehat S_Q\cap L$, so $\phi(S_Q)=S_{Q'}$. Hence $\phi\in \Gal(L/K)$ and $\phi(Q)=Q'$. In particular $\phi^{-1}D(Q')\phi=D(Q)$.
\end{proof}
\begin{pro}\label{decomposition-variation}
Let $R$ be an excellent normal domain with fraction field $K$, $L$ a finite separable extension of $K$ and $S$ the integral closure of $R$ in $L$. Let $Q_2\subsetneq Q_1\subset S$ be prime ideals of $S$ and $P_i=Q_i\cap R$. Then $\widehat K^{P_2} \subset \widehat K^{P_1}$ and $\widehat L^{Q_1}=L\widehat K^{P_1}=\widehat L^{Q_2}\widehat K^{P_1}$.
\end{pro}
\begin{proof}
Note that $\widehat R^{P_2}$, the $P_2$-adic completion of $R$, contains $R$ since $R$ is noetherian and hence $P_2$-adically separated. Note that $P_2$-adic completion of $P_1$ is $P_1\widehat R^{P_2}$ is a prime ideal of $\widehat R^{P_2}$ and $\widehat R^{P_1}$ is also the $P_1\widehat R^{P_2}$-adic completion of $\widehat R^{P_2}$.
Hence $\widehat R^{P_2}\subset \widehat R^{P_1}$. Hence $\widehat K^{P_2} \subset \widehat K^{P_1}$. Similarly $\widehat L^{Q_2} \subset \widehat L^{Q_1}$. Since $S$ is a finite $R$-module, $\widehat S^{Q_1}$ is a finite $\widehat R^{P_1}$-module with the same generators. Hence $\widehat L^{Q_1}=L\widehat K^{P_1}=\widehat L^{Q_2}\widehat K^{P_1}$.
\end{proof}
\begin{rmk}\label{inertia-variation}
Let $Q_2\subsetneq Q_1\subset S$ be prime ideals of $S$ and $P_i=Q_i\cap R$. If $\sigma \in I(Q_2)$ then $\sigma{\alpha}-\alpha\in Q_2\subset Q_1$ for all $\alpha\in R$. Hence $I(Q_2)\subset I(Q_1)$. (Also see \cite[Proposition 1.50]{abhyankar})
\end{rmk}
\begin{rmk}\label{inertia-kernel}
Let $Q\subset S$ be a prime ideal of $S$ and $P=Q\cap R$. Then $I(Q)$ is the kernel of the natural epimorphism from $\phi:D(Q) \to \Aut(k_Q/k_P)$ where $k_Q=\QF(S/Q)$, $k_P=\QF(R/P)$ and for $g\in D(Q)$, $a\in S_Q$ and its image $\overline a\in k_Q$, $\phi(g)(\overline a)=\overline{ga}$.
\end{rmk}
The following is a consequence of \cite[Theorem 1.47 and 1.48]{abhyankar} but we include a direct proof for brevity and convenience of the reader.
\begin{pro}\label{unramified-closed-points}
Let $(R,m)$ be a complete local normal domain and $(S,n)$ be the integral closure $R$ in a finite Galois extension of $\QF(R)$. Then $I(n)$ is trivial iff $S/n$ is a finite separable extension of $R/m$ and $mS=n$.
\end{pro}
\begin{proof}
Let $k_n=S/n$, $k_m=R/m$, $L=\QF(S)$ and $K=\QF(R)$. Since $L/K$ is Galois, the field extension $k_n/k_m$ is normal. If $I(n)$ is trivial then $\Gal(L/K)=D(n)\cong \Aut(k_n/k_m)$. Let $f$ be the cardinality of this group. Since $S$ is a torsion free $R$-module, the vector space dimension of $S\otimes_R k_m$ is at most $[L:K]$. Hence $\dim_{k_m}(S/mS)\le f$. Since $mS\subset n$, $$f=|Aut(k_m/k_n)|\le \dim_{k_m}(S/n)\le \dim_{k_m}(S/mS)\le f.$$
Hence $k_m/k_n$ is Galois extension and $mS=n$.
Conversely, by Cohen structure theorem $S=S_0[[y_1,\ldots,y_s]]$ and the subring $R=R_0[[x_1,\ldots,x_r]]$ where $R_0$ and $S_0$ are coefficient rings and $R_0\subset S_0$. Since $mS=n$, $S=S_0[[x_1,\ldots,x_r]]$. If $R_0$ is a field then $R_0=k_m$ and $S_0=k_n$. So $S=R\otimes_{k_m}k_n$ and hence $S$ is a free $R$-module of rank $[k_n:k_m]$. So $|D(n)|=[L:K]=[k_n:k_m]=|\Gal(k_n/k_m)|$. So the natural epimorphism from $D(n)\to \Gal(k_n/k_m)$ is an isomorphism. Hence $I(n)$ is trivial.
Suppose $R_0$ is not a field. Since $R$ and $S$ are integral domains $R_0$ and $S_0$ are characteristic zero dvrs with residue fields $K_m$ and $k_n$ are of characteristic $p>0$. Also by Cohen structure theorem, $pR_0$ and $pS_0$ are maximal ideals of $R_0$ and $S_0$ respectively. Hence $S_0$ is finite \'etale extension of $R_0$. Since $R_0$ is a dvr, $S_0$ is free $R_0$-module. Hence $S$ is a free $R$-module of rank $[L:K]$. This similarly implies that $I(n)$ is the trivial group.
\end{proof}
\begin{df}
Let $R$ be an excellent normal domain with fraction field $K$ and $L/K$ be a finite separable extension. Let $S$ be the integral closure of $R$ in $L$, prime ideal $Q$ of $S$ and $P=Q\cap R$.
The prime ideal $Q$ is said to be \emph{unramified} in the extension $S/R$ or $L/K$ if $PS_Q=QS_Q$ and $S_Q/QS_Q$ is a finite separable extension of $R_P/PR_P$. In this scenario we will also say $S_Q/R_P$ is an unramified extension. If every $Q$ lying over $P$ is unramified then $P$ (or $R_P$ ) is said to be non-branched in $L$ otherwise $P$ (or $R_P$) is said to be a \emph{branched} in $L$.
\end{df}
\begin{rmk}
By flatness of localization and completion $S_Q/R_P$ is unramified is equivalent to $\widehat S_Q/\widehat R_P$ is unramified. In the complete local ring set-up if the ring is understood from the context we may simply say $\QF(\widehat S_Q)/\QF(\widehat R_P)$ is unramified to mean $\widehat R_P$ is unramified in the field extension $\QF(\widehat S_Q)/\QF(\widehat R_P)$. By the Proposition \ref{unramified-closed-points} when $L/K$ is a Galois extension then $I(Q)$ is trivial iff then $Q$ is unramified in $L/K$.
\end{rmk}
The following is a generalization of \cite[Lemma 3.1]{killwildram} to higher dimension.
\begin{lemma} \label{compositum-wild-ramification}
Let $R$ be a normal local excellent domain and $K$ be the quotient field of $R$. Let $L$ and $M$ be finite separable extensions of $K$ and $\Omega=LM$ their compositum. Let $A_s$ be the integral closure $R$ in $\Omega$ and $A$ be the localization of $A$ at a maximal ideal of $A_s$. Then $S=A\cap L$ and $T=A\cap M$ are normal local excellent domains. Let $\widehat K$, $\widehat L$, $\widehat M$ and $\widehat \Omega$ be the quotient field of the complete local rings $\widehat R$, $\widehat S$, $\widehat T$ and $\widehat A$ respectively. Here all fields are viewed as subfields of an algebraic closure of $\widehat K$. The following holds:
\begin{enumerate}
\item If $A/m_A$ is compositum of $S/m_S$ and $T/m_T$ then $\widehat \Omega = \widehat L \widehat M$.
\item \label{eq2:compositum-wild-ramification} If $A/m_A$ is a separable extension of $S/m_S$ then $\widehat \Omega$ is an unramified extension of $\widehat L \widehat M$.
\end{enumerate}
\end{lemma}
\begin{proof}
Note that $A_s$ is a semilocal ring and a finite $R$-module (since excellent rings are Nagata). Let $m_R$ be the maximal ideal of $R$. Note that $\widehat A$ is a homomorphic image of $\widehat A_s$, the $m_R$-adic completion of $A_s$. So $\widehat A_s$ and hence $\widehat A$ are finite $\widehat R$-modules.
Note that $S$ and $T$ are also a localization at maximal ideals of the integral closures of $R$ in $L$ and $M$ (respectively) dominated by $A$. Hence $\widehat S$ and and $\widehat T$ are finite $\widehat R$-modules. By definition $A$, $S$, $T$ are normal local domains and they are excellent because they are localization of a finite type ring over an excellent ring.
Note that $\widehat L$ and $\widehat M$ are contained in $\widehat \Omega$. So $\widehat L\widehat M \subset \widehat \Omega$. If $A/m_A$ is the compositum of $S/m_S$ and $T/m_T$ then there exist $\alpha_1,\ldots,\alpha_l\in T$ such that $A/m_A=(S/m_S)[\bar\alpha_1,\ldots,\bar\alpha_l]$. Let $\widehat S_1$ be the integral closure of $\widehat S[\alpha_1,\ldots,\alpha_l]$ in the fraction field. Then $\widehat L \subset\QF(\widehat S_1) \subset \widehat LM$. Also $\widehat S_1/m_{\widehat S_1}=A/m_A$ and $\widehat S_1$ is a normal complete local domain between $\widehat S$ and $\widehat A$. So by replacing $\widehat S$ by $\widehat S_1$, we may assume $A/m_A=S/m_S$.
Let $m_A=(a_1,\ldots,a_n)$ for $a_i\in A\subset \widehat A$. Then $\widehat S[a_1,\ldots,a_n]$ is a finite $\widehat S$-module because $\widehat A$ is finite over $\widehat R$ and $\widehat R\subset \widehat S$. Hence $\widehat S[a_1,\ldots, a_n]$ is a complete local ring by \cite[Theorem 7]{Coh} with maximal ideal $m$ (say). Also $\widehat S\subset \widehat S[a_1,\ldots, a_n]\subset \widehat A$ are extensions of local rings with $\widehat S/m_{\widehat S}=\widehat A/m_{\widehat A}$. Hence the $\widehat S[a_1,\ldots,a_n]$ and $\widehat A$ have the same residue field. Also $m_{\widehat A}=m_{\widehat S}\widehat A$ since $m_{\widehat A}\supset m \supset m_A$ and $m_A\widehat A=m_{\widehat A}$. Hence by \cite[Corollary to Theorem 8]{Coh}, $\widehat S[a_1,\ldots, a_n]=\widehat A$. So $\widehat \Omega=\widehat L[a_1\ldots,a_n]\subset \widehat LM\subset \widehat L\widehat M$. This completes the proof of the first part.
Let $\widehat B$ be the integral closure of $\widehat S$ in $\widehat L\widehat M$. Since $\widehat \Omega\supset \widehat L\widehat M$, $\widehat A\supset\widehat B$ and $\widehat A$ is a finite $\widehat B$-module (as $\widehat B$ contains $\widehat S$). So $m_{\widehat B}=m_{\widehat A}\cap \widehat B$. Note that $a_1,\ldots a_n \in m_{\widehat B}$ since $a_1,\ldots,a_n\in m_A\subset LM\subset \widehat L \widehat M$. So $m_{\widehat B}\widehat A=m_{\widehat A}$. Moreover $\widehat S/m_{\widehat S} \subset \widehat B/m_{\widehat B} \subset \widehat A /m_{\widehat A}$ and the hypothesis for \eqref{eq2:compositum-wild-ramification} implies $\widehat A/m_{\widehat A}$ is a separable extension of $\widehat B/m_{\widehat B}$. Hence by Proposition \ref{unramified-closed-points} $\widehat A$ is an unramified extension of $\widehat B$, i.e. $\widehat \Omega$ is an unramified extension of $\widehat L\widehat M$.
\end{proof}
\begin{cor}
Let the notation be as in the above lemma. If $\widehat L\subset \widehat M$ then $A/T$ is an unramified extension.
\end{cor}
\begin{proof}
Since $\Omega/M$ is a finite extension, so is $\widehat \Omega/\widehat M$. Hence $\widehat A$ is a finite $\widehat T$-module. The above lemma and the hypothesis implies that $\widehat \Omega=\widehat M$. So $\widehat A=\widehat T$, i.e. $A/T$ is unramified.
\end{proof}
\section{Branch data}\label{sec:branch-data}
For an excellent normal scheme $X$ and $x\in X$, let $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}$ be the fraction field of $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$. Let $\bar x$ denote the closure of $\{x\}$ in $X$. Let $\widehat X_{\bar x}$ be the formal scheme obtained by the completion of $X$ along $\bar x$. For an open affine connected subset $U$ of $X$ containing $x$, let $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(U)=\QF(\widehat R^I)$ where the coordinate ring of $U$ is $R$ and $I$ is the (prime) ideal of $R$ defining $x$. Note that $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(U)=\QF(\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X_{\bar x}}(U\cap \bar x))$.
\begin{pro}\label{open-subsets-okay}
In the above setup, for $x\in X$ and $U\subset V$ be two affine open connected neighbourhood of $x$ in $X$, $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X_{\bar x}}(U\cap \bar x) \supset \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X_{\bar x}}(V\cap \bar x)$ and the completion of $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X_{\bar x},x}$ at the maximal ideal is $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$.
In particular we have the inclusion of fields $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(V)\subset \mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(U) \subset \mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}$.
\end{pro}
\begin{proof}
The first statement follows from (\cite[Proposition 10.1.4]{ega1}) and noting that $U$ and $V$ are affine integral schemes. Since $X$ is normal excellent schemes, all the three rings are integral domains (\cite[7.8.3]{ega4.2}) and hence admit fraction fields.
\end{proof}
\begin{pro}\label{local-ramified}
In the above setup let $L/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(U)$ be a finite Galois extension and $R=\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X_{\bar x}}(U\cap \bar x)$. Let $S$ be the integral closure of $R$ in $L$. Let $y\in \Spec(S)$ be a point lying above $x\in \Spec(R)$ and $I$ and $J$ be the ideals defining $x\in \Spec(R)$ and $y\in \Spec(S)$ respectively. The morphism $\Spec(S)\to \Spec(R)$ is unramified at $x$ iff $\widehat S_J/\widehat R_I$ is an unramified extension of complete local rings. In particular under the assumption that $L/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(U)$ is Galois, $x$ is not branched in the morphism $\Spec(S)\to \Spec(R)$ iff $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$ is unbranched in the extension $L\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}$.
\end{pro}
\begin{proof}
By definition the morphism $\Spec(S)\to \Spec(R)$ is unramified at $x$ iff $IS_J=JS_J$ and $S_J/JS_J$ is a separable extension of $R_I/IR_I$. But passing to the completion does not change the residue fields and the identity $I\widehat S_J=J\widehat S_J$ also holds. Hence $\widehat S_J/\widehat R_I$ is unramified extension. If $L/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(U)$ is Galois then $x$ is not branched in the morphism $\Spec(S)\to \Spec(R)$ iff $\widehat S_J/\widehat R_I$ is an unramified extension (as all the points lying above $x$ are conjugates). But $\widehat R_I=\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$ and $\QF(\widehat S_J)=L\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}$.
\end{proof}
\begin{df}\label{def:branch-data}
A \emph{quasi-branch data} on an excellent normal scheme $X$ is a function $P$ which to every point $x\in X$ of codimension at least one and an open affine connected $U\subset X$ containing $x$, assigns a finite Galois extension $P(x,U)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(U)$ in some fixed algebraic closure of $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(U)$ such that $P(x_1,U)=P(x_2,U)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^{x_1}(U)$ whenever $x_1\in \overline{\{x_2\}}$ and for $x\in V\subset U\subset X$ with $V$ affine open connected $P(x,V)=P(x,U)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(V)$.
We let $P(x)=P(x,U)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}$. The \emph{branch locus of $P$}, $\BL(P)=\{x\in X:\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x} \text{ is branched in } P(x) \}$. The function $P$ will be called a \emph{branch data} if $\BL(P)$ is a closed subset of $X$ of codimension at least one. The branch data in which all the finite extensions are trivial is called the \emph{trivial branch data} and is denoted by $O$. A branch data with empty branch locus is called an {essentially trivial branch data}.
Note that when $x\in X$ is a closed point then $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(U)$ is independent of the of the choice of $U$ and hence this definition of branch data agrees with \cite[Definition 2.1]{orbifold.bundles} when $X$ is of dimension one.
\end{df}
\begin{cor}\label{specialization-okay}
Let $X$ be a normal integral excellent scheme with function field $K$ and $L/K$ be a finite separable extension. Let $Y$ be the normalization of $X$ in $L$ and $f:Y\to X$ be the corresponding morphism. Let $y_1, y_2$ be points of $Y$ such that $y_1\in\overline{\{y_2\}}$ and let $x_i=f(y_i)$ for $i=1,2$. Let $U$ be an open affine connected neighbourhood of $x$ and $V=f^{-1}(U)$. Then $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^{x_2}(U)\subset \mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^{x_1}(U)$ and $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^{y_1}(V)=L\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^{x_1}(U)=\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^{y_2}(V)K_X^{x_1}(U)$.
\end{cor}
\begin{proof}
This is a translation of Proposition \ref{decomposition-variation}.
\end{proof}
Some of the notions and properties of branch data (\cite[2.3,2.4,2.5]{orbifold.bundles}) which hold for curves extend to higher dimension as shown below.
\begin{pro} \label{B_f}
Let $X$ be a normal integral excellent scheme with function field $K$ and $L/K$ be a finite Galois extension. Let $Y$ be the normalization of $X$ in $L$ and $f:Y\to X$ be the corresponding morphism. For $x\in X$ of codimension at least one and $U$ an open affine connected neighbourhood of $x$, let $y\in Y$ be such that $f(y)=x$ and $V=f^{-1}(U)$, define $B_f(x,U)=\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^y(V)$. Then $B_f$ is a branch data on $X$. Moreover if $X$ is nonsingular then $\BL(B_f)$ is either empty or pure of co-dimension one.
\end{pro}
\begin{proof}
Since $L/K$ is a Galois extension, all points in $f^{-1}(x)$ for any point $x\in X$ are conjugates and $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^y(V)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(U)$ are isomorphic Galois extensions for every $y\in f^{-1}(x)$. Hence $B_f(x,U)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(U)$ is a Galois extension and it is independent of the choice of $y\in Y$ lying above $x$. That $B_f$ is a quasi branch data follows from Corollary \ref{specialization-okay} and Proposition \ref{open-subsets-okay}.
The ramification locus of $f$ is a proper closed subset of $Y$ and $f$ is a proper morphism. Hence the branch locus of $f$ in $X$ is a proper closed subset. Hence $B_f$ is a branch data. The moreover part follows from Zariski's purity of branch locus.
\end{proof}
\begin{df}
Let $P$ and $Q$ be quasi-branch data on $X$. Define their intersection $(P\cap Q)(x,U)=P(x,U)\cap Q(x,U)$ and their compositum $(PQ)(x,U)=P(x,U)Q(x,U)$ for all $x\in X$ of codimension at least one and $U$ any affine open neighbourhood of $x$.
\end{df}
\begin{lemma}\label{compositum-branch-data}
Compositum of two (quasi-)branch data is a (quasi-)branch data.
\end{lemma}
\begin{proof}
Note that the compositum of two Galois extensions are Galois. So it follows that if $P$ and $Q$ are quasi-branch data then so is $PQ$.
Moreover $\BL(PQ)=\BL(P)\cup\BL(Q)$. So if $P$ and $Q$ are branch data then so is $PQ$.
\end{proof}
\begin{pro}\label{pull-back-branch-data}
Let $P$ be a branch data on $X$ and $f:Y\to X$ be a quasi-finite dominant separable morphism between normal excellent schemes. For $y\in Y$, let $U$ be an affine open connected neighbourhood of $f(y)$ so that $P(f(y),U)$ is a finite Galois extension of $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^{f(y)}(U)$. Let $V$ be an affine open connected neighbourhood of $y$ contained in $f^{-1}(U)$ and $Q(y,V)=\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^y(V)P(f(y),U)$. Then $Q$ is a branch data on $Y$ and will be denoted by $f^*P$.
\end{pro}
\begin{proof}
Let $y\in Y$ and $x=f(y)$ and $U$ be an affine open connected neighbourhood of $x$ for which $P(x,U)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(U)$ is a Galois extension. Since $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^x(U)\subset \mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^y(V)$ for any $V$ affine open subset of $f^{-1}(U)$ containing $y$, $Q(y,V)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^y(V)$ is a Galois extension. Also if $y_1\in \overline{ \{ y_2\}}$ then $f(y_1)\in \overline{ \{f(y_2)\}}$. Hence for some affine open connected neighbourhood $U$ of $f(y_1)$, $P(f(y_1),U)=P(f(y_2),U)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^{f(y_1)}(U)$. So for $V$ an affine open connected subset of $f^{-1}(U)$ containing $y_1$, $Q(y_1,V)=\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^{y_1}(V)P(f(y_1),U) = \mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^{y_1}(V)P(f(y_2),U)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^{f(y_1)}(U) = \mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^{y_1}(V)P(f(y_2),U)$.
By Proposition \ref{decomposition-variation} $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^{y_2}(V)\subset \mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^{y_1}(V)$ so $Q(y_1,V)=\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^{y_1}(V)P(f(y_2),U)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^{y_2}(V)$. Hence $Q(y_1,V)=Q(y_2,V)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^{y_1}(V)$.
Finally by Remark \ref{inertia-variation} if $y\in\BL(Q)$ then every point in $\overline{ \{y\}}$ is in $\BL(Q)$. Hence $\BL(Q)$ is a closed subset of $f^{-1}(\BL(P))$. Hence $Q$ is a branch data.
\end{proof}
\begin{df}
Let $P$ and $Q$ be two branch data on a normal excellent scheme $X$. We say $P$ is less than or equal to $Q$ (and write $P\le Q$) if for all points $x\in X$ of codimension at least one and an affine open connected neighbourhood $U$ of $x$, $P(x,U)\subset Q(x,U)$. In particular $P(x)\subset Q(x)$ or all points $x\in X$ of codimension at least one.
\end{df}
\begin{notation}
Let $x\in X$ be a point and $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}\subset L_1 \subset L_2$ be finite field extension. Then we say the extension $L_2/L_1$ is ramified (or unramified) if integral closure of $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$ in $L_2$ is ramified (or unramified) extension of integral closure of $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$ in $L_1$.
\end{notation}
\section{Formal orbifolds} \label{sec:formal-orbifolds}
Now we are ready to extend the definition of formal orbifolds for curves and morphisms between them in \cite[Definition 2.1(3), 2.6]{orbifold.bundles} to arbitrary dimension and many of the basic properties also extend. Another difference from \cite{orbifold.bundles} in the treatment is that we allow morphisms to be quasi finite (as opposed to finite morphisms).
\begin{df}\label{df:main}
A \emph{formal orbifold} is a pair $(X,P)$ where $X$ is a finite type reduced normal scheme over a perfect field $k$ or $\spec(\mathbb{Z}} \newcommand{\Aff}{\mathbb{A})$ and $P$ is a branch data on $X$.
\begin{enumerate}
\item An admissible morphism of formal orbifolds $f:(Y,Q)\to (X,P)$ is a quasi-finite dominant separable morphism $f:Y\to X$ of normal excellent schemes such that $Q(y,f^{-1}(U))\supset P(f(y),U)$ for all points $y\in Y$ of codimesion at least one and for some $U$ affine open connected neighbourhood of $f(y)$ with $f^{-1}(U)$ affine. \\
\item An admissible morphism $f$ is called flat morphism if $f:Y\to X$ is flat away from $f^{-1}(\BL(P))$.\\
\item An admissible morphism $f$ is said to be unramified or \'etale at $y$ if the extension $Q(y)/P(f(y))$ is unramified and $f$ is called \'etale morphism if $f$ is unramified for all $y\in Y$.
\item An admissible morphism is called a covering morphism if it is also proper (and hence finite).
\item A covering morphism $f$ is called an \'etale cover if $f$ is an \'etale covering morphism.
\end{enumerate}
\end{df}
\begin{pro}\label{composition-etale}
Composition of admissible (respectively \'etale) morphisms is admissible (respectively \'etale).
\end{pro}
\begin{proof}
Let $f:(Y,Q)\to (X,P)$ and $g:(Z,B)\to (Y,Q)$ be admissible morphism of formal orbifolds. Then $f\circ g$ is a quasi-finite dominant separable morphism as these properties are preserved under composition. Since $f$ and $g$ are admissible, for any $z\in Z$ there exists $U$ affine open connected neighbourhood of $g(z)$ such that $g^{-1}(U)$ is affine and $B(z,g^{-1}(U))\supset Q(g(z),U)$. Similarly there exists $V$ affine open connected neighbourhood of $f\circ g(z)$ such that $f^{-1}(V)$ is affine and $Q(g(z),f^{-1}(V))\supset P(f\circ g (z),V)$. Shrinking $V$ if necessary we may assume $f^{-1}(V)$ is an affine open subset of $U$ and $W=g^{-1}(f^{-1}(V)$ is affine. Now $B(z,W)=B(z,g^{-1}(U))\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Z^z(W)\supset Q(g(z),U)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^{g(z)}(f^{-1}(V))=Q(g(z),f^{-1}(V))$ and hence $B(z,W)\supset P(f\circ g (z),V)$. Hence $f\circ g$ is an admissible morphism.
Note that being unramified is preserved under composition, hence if $f$ and $g$ are unramified at all points then so is $f\circ g$.
\end{proof}
The following is a known result but perhaps not written down explicitly.
\begin{pro}
Let $f:Y\to X$ be a quasi-finite dominant morphism between normal schemes which is unramified at $y\in Y$. Then $f$ is flat at $y$.
\end{pro}
\begin{proof}
Let $y\in Y$ and $x=f(y)$. Let $A$ be the strict henselianization of $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$ then $A$ is a normal domain faithfully flat over $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$. Now $C=A\otimes_{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}} \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Y,y}$ is a finite unramified extension of $A$ and $A$ is a strictly henselian integral domain, hence $C$ is a free $A$-module and hence flat. Since $A/\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$ is faithfully flat, the original extension $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Y,y}/\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$ is flat.
\end{proof}
\begin{cor}
Let $f:(Y,Q)\to (X,P)$ be an \'etale morphism. Then $f$ is flat away from $f^{-1}(\BL(P))$.
\end{cor}
\begin{proof}
Let $y\in Y$ be such that $y\notin f^{-1}(\BL(P))$ and let $x=f(y)$. Then $P(x)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}$ is unramified. Since $f$ is \'etale $Q(y)/P(x)$ is unramified. Hence $Q(y)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}$ is unramified which implies $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Y,y}/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}$ is unramified. Hence $f:Y\to X$ is unramified at $y$ and $X$ is normal. This implies $f$ is flat at $y$ by the above proposition.
\end{proof}
\begin{pro}
Let $f:(Y,Q)\to (X,P)$ and $g:(Z,B)\to (Y,Q)$ be flat morphisms of formal orbifolds such that $Q/f^*P$ or equivalently $id: (Y,Q)\to (Y,f^*P)$ is unramified. Then $f\circ g$ is flat.
\end{pro}
\begin{proof}
Note that $\BL(Q)=\BL(f^*P)$ and by Proposition \ref{pull-back-branch-data} $\BL(f^*P)\subset f^{-1}(\BL(P))$. Hence $(f\circ g)^{-1}(\BL(P))=g^{-1}(f^{-1}(\BL(P)))\supset g^{-1}(\BL(Q))$. So if $z\notin (f\circ g)^{-1}(\BL(P))$ then $z\notin g^{-1}(\BL(Q))$, hence $g$ is flat (as morphism of schemes) at $z$ and $g(z)\notin f^{-1}(\BL(P))$. Hence $f$ is flat at $g(z)$ which implies $f\circ g$ is flat at $z$.
\end{proof}
\begin{df}
Let $f:(Y,Q)\to (X,P)$ be a covering morphism of formal orbifolds. The ramification locus of $f$ is $\{y\in Y: Q(y)/P(f(y))\text{ is a ramified extension}\}$. Its image in $X$ is called the branch locus of $f$.
\end{df}
\begin{lemma}\label{branch-locus-closed}
Let $f:(Y,Q)\to (X,P)$ be a covering morphism of formal orbifolds then the ramification locus and the branch locus of $f:(Y,Q)\to (X,P)$ are closed.
\end{lemma}
\begin{proof}
Since $f$ is proper it is enough to show that the ramification locus is closed. Let $y\in Y$ be in the ramification locus of $f$ and $y_0\in \overline{ \{y\}}$ be a point. Let $x=f(y)$ and $x_0=f(y_0)$. Note that $x_0$ is in the closure of $x$. Let $U$ be an affine open connected neighbourhood of $x_0$ and $V=f^{-1}(U)$. Since $f$ is ramified at $y$, by Proposition \ref{local-ramified} $y$ is ramified in the field extension $Q(y,V)/P(x,U)$. Also $P(x_0,U)=P(x,U)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X}^{x_0}(U)$ and $Q(y_0,V)=Q(y,V)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Y}^{y_0}(V)$. So we have
\begin{align*}
Q(y,V)P(x_0,U)&=Q(y,V)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X}^{x_0}(U)\\
&=Q(y,V)K_Y^y(V)K_X^{x_0}(U)\\
&=Q(y,V)K_Y^{y_0}(V) \text{ (by Proposition \ref{decomposition-variation}).}\\
&=Q(y_0,V)
\end{align*}
Let $A_0$ be the normalization of $\widehat{\mathcal{O}} \newcommand{\cP}{\mathcal{P}}_{X,x_0}$ in $P(x_0)$ and $B_0$ be the normalization of $A_0$ in $Q(y_0)$. Let $I$ be the ideal of $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_X(U)$ defining the point $x$ and $J$ be the ideal of $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_Y(V)$ defining $y$. Note that $J\cap \mathcal{O}} \newcommand{\cP}{\mathcal{P}_X(U)=I$. Let $A$ be the normalization of $\widehat{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_X(U)}^I$ in $P(x,U)$ and $B$ be the normalization of $A$ in $Q(y,V)$ (which is same as the normalization of $\widehat{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_Y(V)}^J$). Note that $A_0$ is the completion of the stalk of $\spec(A)$ at a point lying above $x_0$ and similarly $B_0$.
\[
\xymatrix{
B\ar@/^1pc/@{-->}[rrr] & & & B_0\\
\widehat{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_Y(V)}^J\ar[u]\ar@/^1pc/ @{-->}[rrr] & A\ar[ul]\ar@{-->}[r] & A_0\ar[ru] & \widehat\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Y,y_0}\ar[u]\\
& \widehat{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_X(U)}^I\ar[lu]\ar[u]\ar@{-->}[r] & \widehat\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x_0} \ar[u]\ar[ru]
}
\]
Hence there are prime ideals in $B$ denoted by $\tilde J\subset \tilde J_0$ which corresponds to points $y$ and $y_0$ of $Y$. Moreover $\tilde J$ and $\tilde J_0$ lie over prime ideals in $A$ which corresponds to points $x$ and $x_0$ of $X$ respectively. Now using Remark \ref{inertia-variation}, the inertia group $I(\tilde J)$ in the extension $B/A$ is a subgroup of $I(\tilde J_0)$. Since $Q(y)/P(x)$ is ramified $I(\tilde J)$ is a nontrivial group and hence $I(\tilde J_0)$ is also a nontrivial group. This implies $\tilde J_0$ is ramified in $B/A$ and passing to the completion at $\tilde J_0$ one gets $Q(y_0)/P(y_0)$ is ramified. So $y_0$ is in the ramification locus of $f:(Y,Q)\to X,P)$. Hence the ramification locus is closed.
\end{proof}
\begin{lemma}
Let $(Y,Q)$ and $(X,P)$ be formal orbifolds. Let $f:Y\to X$ be a finite morphism such that for all codimension one point $y\in Y$ and some affine open connected neighbourhood $U$ of any $x_0\in \overline{\{f(y)\}}$, $Q(y,f^{-1}(U))\supset P(f(y),U)$. Then $f:(Y,Q)\to (X,P)$ is a covering morphism of formal orbifolds.
\end{lemma}
\begin{proof}
Let $y_0$ be a point of $Y$ of codimension at least two and $y_1$ be a codimension one point of $Y$ such that $y_0\in \overline{\{y_1\}}$. Let $x_i=f(y_i)$ for $i=0,1$ and $U$ be an affine open connected neighbourhood of $x_0$ such that $Q(y_1,V)\supset P(x_1,U)$ where $V=f^{-1}(U)$. Since $P,Q$ are branch data, $Q(y_0,V)=Q(y_1,V)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^{y_0}(V)$ and $P(x_0,U)=P(x_1,U)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^{x_0}(U)$. By assumption $Q(y_1,V)\supset P(x_1,U)$ and since $f$ is a finite morphism $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^{y_0}(V)\supset \mathcal{K}} \newcommand{\cmm}{\mathrm{m}_X^{x_0}(U)$. Hence $Q(y_0,V)\supset P(x_0,U)$.
\end{proof}
\begin{df}
A formal orbifold $(X,P)$ is called a geometric formal orbifold if there exists an \'etale cover $f:(Y,Q)\to (X,P)$ where $Q$ is an essentially trivial branch data on $Y$. In this case $P$ is called a geometric branch data on $X$.
\end{df}
The following analogue of \cite[Lemma 2.12]{orbifold.bundles} holds in higher dimension as well with essentially the same proof.
\begin{pro}\label{unramified-criterion}
Let $(X,P)$ be an integral formal orbifold with function field $K$ and $f:Y\to X$ be a finite covering where $Y$ is normal. Then for a branch data $Q$ on $Y$, $Q\ge f^*P$ iff $f:(Y,Q)\to (X,P)$ is a morphism of formal orbifolds. Moreover if $Q=f^*P$ then $f$ is unramified iff $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Y,y}P(f(y))/P(f(y))$ is an unramified extension for all $y\in Y$.
\end{pro}
\begin{rmk}
Let $(X,P)$ be a formal orbifold, $f:Y\to X$ be a cover and $Q=f^*P$. If $y\in \BL(Q)$ then $Q(y)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Y,y}$ is ramified. But $Q(y)=P(f(y))\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Y,y}$, hence $P(f(y))/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,f(y)}$ is ramified. Hence $f(y)\in \BL(P)$, i.e., $\BL(Q)\subset f^{-1}(\BL(P))$
\end{rmk}
\begin{cor}\label{B_f-geometric}
Let $f:Y\to X$ be a finite covering of normal varieties. Then $(Y,O)\to (X,B_f)$ is \'etale.
\end{cor}
\begin{proof}
By Proposition \ref{B_f}, $(X,B_f)$ is a formal orbifold. Moreover by definition of $B_f$, $B_f(f(y),f^{-1}(U))=\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_Y^{y}(f^{-1}(U))$ for all $y\in Y$ and $U$ an affine open connected neighbourhood of $f(y)$. Note that $f^*B_f=O$. Hence by the previous proposition $(Y,O)\to (X,B_f)$ is unramified at all $y\in Y$. Hence the morphism $(Y,O)\to (X,B_f)$ of formal orbifolds is \'etale.
\end{proof}
\begin{pro}
Let $(X,P)$ be a formal orbifold. There exists a closed subset $Y$ in $X$ of codimension at least two and an open cover $\{U_i\}$ of $X\setminus Y$ such that $(U_i,P|_{U_i})$ is a geometric formal orbifold.
\end{pro}
\begin{proof}
We may assume $X$ is connected and hence integral. Let $B_1,\ldots,B_r$ be the irreducible component of $\BL(P)$ of codimension one in $X$. Let $x_1,\ldots,x_r$ be the generic points of $B_1,\ldots,B_r$. Let $L_i/k(X)$ be a finite separable field extension such that $L_i\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x_i}=P(x_i)$. Let $f_i:V_i\to X$ be the normalization of $X$ in $L_i$ and $Q_i=f_i^*P$. By construction $f_i:(V_i,Q_i)\to (X,P)$ is unramified above $x_i$ and $\BL(Q_i)$ does not contain $x_i$. Let $Z_i$ be the branch locus of $f_i:(V_i,Q_i)\to(X,P)$. Let $U_i=X\setminus (f_i(\BL(Q_i))\cup Z_i)$. Then $x_i\in U_i$. Let $U_0=X\setminus \BL(P)$. Note that $(U_i,P|_{U_i})$ is a geometric formal orbifold for $i=0,1,\ldots,r$ (for $i=0$, $id_{U_0}$ is \'etale and the branch data $P|_{U_0}$ is essentially trivial; for other $U_i$'s $f_i|_{f_i^{-1}(U_i)}$ are \'etale coverings of formal orbifolds and $Q_i|_{f_i^{-1}(U_i)}$ are essentially trivial branch data). Note that $\cup_{i=0}^r U_i$ is the complement of a codimension 2 subset of $X$.
\end{proof}
\begin{rmk}
A formal orbifold which has an open cover by geometric formal orbifolds can possibly be interpreted as Deligne-Mumford stacks. But viewing them as varieties with branch data is more natural and useful to study the ramification theoretic properties of the varieties. This point of view is also more concrete and elementary.
\end{rmk}
\begin{lemma}\label{fiber-product-branch-data}
Let $f:(Y,P)\to (X,B)$ and $g:(Z,Q)\to (X,B)$ be admissible morphisms between formal orbifolds. Let $W$ be the normalization of $Y\times_X Z$ and $p_Y:W\to Y$ and $p_Z:W\to Z$ be the projection morphisms and let $A=p_Y^*Pp_Z^*Q$. Then $A$ is a branch data on $W$. For a point $w\in W$, let $y=p_Y(w)$, $z=p_Z(w)$ and $x=f(y)=g(z)$. If $w$ is a closed point then $A(w)$ is an unramified extension of $P(y)Q(z)$.
\end{lemma}
\begin{proof}
Since $p_Y$ and $p_Z$ are quasi-finite dominant separable morphisms $p^*_YP$ and $p^*_ZQ$ are branch data on $W$ by Proposition \ref{pull-back-branch-data}. Hence $A$ being compositum of two branch data is a branch data (Lemma \ref{compositum-branch-data}). For $w\in W$ a closed point, $p_Y^*P(w)=P(y)K_{W,w}$ and $p_Z^*Q(w)=Q(z)K_{W,w}$. Hence $A(w)=P(y)Q(z)K_{W,w}$. As $w$ is a closed point of $W$ and $W$ is a finite type scheme over a perfect field or $\spec(\mathbb{Z}} \newcommand{\Aff}{\mathbb{A})$, the residue field $k(w)$ is a separable extension of $k(y)$. So by Lemma \ref{compositum-wild-ramification} $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{W,w}/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Y,y}\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Z,z}$ is an unramified extension. Hence by base change $A(w)/P(y)Q(z)$ is an unramified extension.
\end{proof}
\begin{pro}\label{fiber-product}
In the above setup, $p_Y:(W,A)\to (Y,P)$, $p_Z:(W,A)\to (Z,Q)$ are admissible morphisms and $(W,A)$ is the fiber product in the category of formal orbifolds where morphisms are admissible morphisms.
\end{pro}
\begin{proof}
Since $f:Y\to X$ and $g:Z\to X$ are quasi finite dominant morphisms their base change $p_Y$ and $p_Z$ are also quasi finite dominant morphism. Also by definition of $A$, $A(w,p_Y^{-1}(U)) \supset P(p_Y(w),U)$ for some affine open connected neighbourhood $U$ of $p_Y(w)$. Hence $p_Y$ and $p_Z$ are morphisms of formal orbifold.
Note that the normalized fiber product has the universal property of the fiber product in the category of normal schemes. This together with the definition of $A$ implies that $(W,A)$ is the fiber product of $f$ and $g$.
\end{proof}
\begin{pro}\label{base-change-unramified}\label{base-change-etale}
Let $f:(Y,P)\to (X,B)$ be an \'etale morphism and $g:(Z,Q)\to (X,B)$ is an admissible morphism. Then pullback of $g$, $p_Z:(W,A)\to (Z,Q)$ is \'etale where $(W,A)$ is the formal orbifold fiber product of $f$ and $g$.
\end{pro}
\begin{proof}
By Lemma \ref{branch-locus-closed} to check whether $p_Z$ is \'etale it is enough to check that $p_Z$ is unramified at the closed points of $W$. Let $w\in W$ be a closed point, $z=p_Z(w)$, $y=p_Y(w)$ and $x=f(y)=g(z)$. By hypothesis $P(y)/B(x)$ is an unramified extension so $P(y)Q(z)/Q(z)$ is also unramified. Since $w$ is a closed point of $W$ by Lemma \ref{fiber-product-branch-data} $A(w)/P(y)Q(z)$ is unramified. Hence $A(w)/Q(z)$ is unramified.
\end{proof}
\begin{cor} \label{fiber-product-etale}
The fiber product of two \'etale covering morphisms is \'etale.
\end{cor}
\begin{proof}
This follows from Proposition \ref{base-change-etale} and Proposition \ref{composition-etale}.
\end{proof}
\section{\'Etale fundamental group}\label{sec:etale-pi_1}
Once we have the category of \'etale coverings of a formal orbifold. The usual technique introduced by Grothendieck in \cite{sga1} (and also used in \cite[Section 2.2]{orbifold.bundles}) can be used to define the \'etale fundamental group of a connected formal orbifold. The results in this section are also generalization of some of the results in \cite[Section 2.2]{orbifold.bundles} on fundamental group of formal orbifold curves over algebraically closed fields to higher dimension formal orbifolds. The proofs are also along the same lines using higher dimensional analogue of the required results proved in the previous sections and some minor modifications.
\begin{df}
Let $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}=(X,P)$ be a connected formal orbifold and let $Cov(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$ be the category of all finite \'etale covers of $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$.
Let $\tilde \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ be the inverse limit of the inverse system $\{(Y_i,Q_i)\in Cov(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})\}_{i\in I}$ of connected finite \'etale covers of $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$. Given a geometric point $x$ of $X$ such that its image in $X$ is not in $\supp(P)$ and $\tilde x\in \tilde \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ lying above $x$. The fiber functor $F_x$ from the category of finite \'etale covers $Cov(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$ to the category of sets is pro-representable by $\tilde\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ via $\tilde x$. So the group of automorphism of $F_x$ is isomorphic to $\Aut(\tilde \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}/X)$.
Define the \'etale fundamental group of $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ to be $\Aut(\tilde \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}/X)$ which is same as $\displaystyle{ \varprojlim_{i\in I} \Aut(Y_i/X)}$ over all connected \'etale covers $(Y_i,Q_i)\to \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$. This group will be denoted by $\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},x)$ or simply $\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$.
\end{df}
\begin{pro}\label{pi-is-functorial}
Let $f:\scrY\to \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ be a covering morphism of formal orbifolds. Then $f$ induces a homomorphism of their fundamental group $\pi_1(f):\pi_1(\scrY)\to \pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$. This makes $\pi_1$ a functor from connected pointed formal orbifolds to groups.
Moreover if $f:\scrY\to\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ is \'etale then $\pi_1(f)$ is injective.
\end{pro}
\begin{proof}
The proof is same as that of \cite[Proposition 2.26]{orbifold.bundles}.
\end{proof}
\begin{rmk}\label{Rem:pi_1.of.identity}
Let $P_1\ge P_2$ be branch data on connected $X$. Then $id:(X,P_1)\to (X,P_2)$ is a covering morphism of orbifolds. The induced map on their fundamental groups $\pi_1(id):\pi_1(X,P_1)\to \pi_1(X,P_2)$ is an epimorphism.
\end{rmk}
\begin{thm}\label{approximation}
Let $X$ be a normal connected variety over a perfect field or $\spec(\mathbb{Z}} \newcommand{\Aff}{\mathbb{A})$ and $U$ an open subset of $X$. Then $\pi_1(U)\cong \varprojlim\pi_1(X,P)$ where $P$ runs over all the branch data on $X$ such that $\BL(P)\subset X\setminus U$.
\end{thm}
\begin{proof}
Let $D=X\setminus U$. Since compositum $P_0$ of two branch data $P_1$, $P_2$ is a branch data on $X$ with $P_0\ge P_i$, $i=1,2$ and $\BL(P_1P_2)=\BL(P_1)\cup \BL(P_2)$. The collection of branch data with $\BL(P)\subset D$ is a projective system. Also if $P_1\ge P_2$ are two branch data on $X$ then the $id_X:(X,P_2)\to (X,P_1)$ is a covering morphism. By functoriality (Proposition \ref{pi-is-functorial}) it induces a group homomorphism $\pi_1(X,P_2)\to \pi_1(X,P_1)$. Hence $\pi_1(X,P)$ where $P$ runs over all the branch data on $X$ such that $\BL(P)\subset D$ is an inverse system of groups.
Note that $\pi_1(U)=\varprojlim\Aut(L/k(U))$ where $L$ varies over all finite field extensions $L/k(U)$ (in a fixed separable closure) such that the normalization $V$ of $U$ in $L$ is \'etale over $U$. Any such extension $L/k(U)$ correspond to a finite morphism $f:Y\to X$ which extends $V\to U$. Note that $f: (Y,O)\to (X,B_f)$ is an \'etale covering morphism by Corollary \ref{B_f-geometric} and $\BL(B_f)\subset D$ as it is the branch locus of $f$ and $f$ is \'etale over $U$. Conversely given an \'etale covering morphism $f: (Y,Q)\to (X,P)$ with $\BL(P)\subset D$, $f$ restricted to $V:=f^{-1}(U)$ is \'etale. Hence the two inverse limits are isomorphic.
\end{proof}
\begin{pro}\label{product-geometric}
If $(X,P_1)$ and $(X,P_2)$ are geometric formal orbifolds then so is $(X,P_1P_2)$.
\end{pro}
\begin{proof}
Let $f_1:(Y_1,Q_1)\to (X,P_1)$ and $f_2:(Y_2,Q_2)\to (X,P_2)$ be \'etale covering morphisms with $Q_1$ and $Q_2$ essentially trivial branch data. Let $P=P_1P_2$ and $R_i=f_i^*P$. Then $f_i:(Y_i,R_i)\to (X,P)$ are both \'etale. Let $(W,A)$ be the fiber product of $(Y_i,R_i)\to (X,P)$ for $i=1,2$. For a point $w$ in $W$ with images $y_i$ in $Y_i$, $i=1,2$ and $x\in X$, $A(w)=R_1(y_1)R_2(y_2)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{W,w}$. For $i=1,2$, since $Q_i$ is essentially trivial branch data on $Y_i$, $Q_i(y_i)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Y,y_i}$ is unramified and hence $Q_i(y_i)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{W,w}/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{W,w}$ is unramified. So the compositum $Q_1(y_1)Q_2(Y_2)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{W,w}$ is an unramified extension of $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{W,w}$. But $R_i(y_i)\subset Q_i(y_i)$. Hence $R_1(y_1)R_2(y_2)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{W,w}/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{W,w}$ is unramified. Hence $A$ is essentially trivial branch data and by Corollary \ref{fiber-product-etale} $(W,A)\to (X,P)$ is \'etale.
\end{proof}
\begin{pro}\label{approximate-orbifold}
Let $(X,P)$ be a connected formal orbifold. There exists $Q \le P$ a (unique) branch data on $X$ such that $(X,Q)$ is a geometric formal orbifold and $Q$ is maximal with these properties. The natural homomorphism $\pi_1(X,P)\to\pi_1(X,Q)$ is an isomorphism.
\end{pro}
\begin{proof}
Let $f:(Y,R)\to (X,P)$ be a connected Galois \'etale covering morphism. Let $B_f$ be the branch data on $X$. Then $B_f\le P$.
Let $p_1,\ldots, p_r$ be the irreducible components of $\supp(P)$. Let $Q(p_j)$ be the compositum of all $B_f(p_j)$ where $f:(Y,R)\to (X,P)$ is Galois \'etale. Then for all $1\le j\le r$, $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,p_j} \subset Q(p_j)\subset P(p_j)$ and $Q(p_j)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,p_j}$ is a finite Galois extension. So there exist finitely many $f_i:(Y_i,R_i)\to (X,P)$ \'etale connected Galois covering such that $Q(p_j)=B_{f_1}(p_j)\ldots B_{f_n}(p_j)$ for $1\le j\le r$. Let $Q=B_{f_1}\ldots B_{f_n}$. Then $Q\le P$, $Q$ is a geometric branch data by Proposition \ref{product-geometric} and Corollary \ref{B_f-geometric}. By construction of $Q$ it is maximal geometric branch data bounded by $P$ and the homomorphism $\pi_1(X,P)\to \pi_1(X,Q)$ is an isomorphism.
\end{proof}
\begin{cor}
Let $(X,P)$ be a connected formal orbifold then $\pi_1(X,P)$ is an extension of a finite group by $\pi_1(X')$ the \'etale fundamental group of a connected normal variety $X'$.
\end{cor}
\begin{proof}
By Proposition \ref{approximate-orbifold} there exists a geometric branch data $Q$ on $X$ such that $\pi_1(X,P)=\pi_1(X,Q)$. Since $(X,Q)$ is a geometric formal orbifold there exists a finite \'etale Galois covering $f:(Y,R)\to (X,Q)$ (with Galois group $G$ say) where $R$ is an essentially trivial branch data. Then $\pi_1(Y,R)$ is a normal subgroup of $\pi_1(X,Q)$ with quotient isomorphic to $G$ (Proposition \ref{pi-is-functorial}). Since $R$ is essentially trivial branch data $\pi_1(Y,R)=\pi_1(Y)$.
\end{proof}
Recall that a profinite group $\Pi$ is said to be of finite rank if there exists a finite subset $S$ of $\Pi$ such that the subgroup generated by $S$ is dense in $\Pi$.
\begin{cor}\label{pi_1-finite-rank}
Let $(X,P)$ be a connected formal orbifold with $X$ projective over $\spec(k)$ where the field $k$ is such that the absolute Galois group $G_k$ has finite rank then $\pi_1(X,P)$ has finite rank.
\end{cor}
\begin{proof}
It follows from the above corollary and the fact that $\pi_1(X')$ is topologically finitely generated for any connected normal projective variety $X'$ over $\spec(k)$. (This is true for curves via Grothendieck lifting. For higher dimensional normal projective variety $X'$ one uses Lefschetz's theorem for fundamental groups, i.e. there exists a general projective curve $C$ in $X'$ such that $\pi_1(C)\to \pi_1(X')$ is surjective.)
\end{proof}
\section{ \'Etale Sheaves and cohomology}\label{sec:site-sheaves}
In this section using the notion of \'etale morphism for formal orbifolds we briefly define small \'etale site on formal orbifolds, sheaves on them and their cohomology groups using the standard technique (see \cite[Chapter II and III]{Milne-etale-cohomology} or \cite[Chapter 20 and 21]{stacks.project}). We also prove some of the results in the formal orbifold setup which will be used in the later sections. Note that even if $f:(Y,Q)\to (X,P)$ is an \'etale morphism of formal orbifolds, $f:Y\to X$ viewed as a morphism of varieties need not be flat.
Let $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}=(X,P)$ be a formal orbifold. An \'etale $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$-formal orbifold is an \'etale morphism $f:(Y,Q)\to \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ and morphisms between \'etale $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$-formal orbifolds is an \'etale $X$-morphism. This category will be denoted by $E/\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$. An open \'etale cover of $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ is a collection of \'etale morphisms $\{f_i:(U_i,Q_i)\to \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}, i\in I\}$ such that $\cup_{i\in I}f_i(U_i)=X$. This defines an \'etale topology on the category of \'etale $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$-formal orbifolds. In other words this defines a \emph{small \'etale site} $E/\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ on $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$.
As usual a \emph{presheaf} on $E/\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ is defined to be a contravariant functor from $E/\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ to the category of abelian groups. A morphism $\phi$ of presheaves $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ and $\scrG$ is a natural transformation of functors where maps $\phi_U:\mathcal{F}}\newcommand{\scrG}{\mathcal{G}(U)\to \scrG(U)$ for an object $U$ in $E/\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ is a group homomorphism. Note that the category of presheaves is an abelian category. The argument is same as in the usual Grothendieck topology on schemes and just uses the fact that this category of functors shares most of the properties of the category of abelian groups.
A \emph{sheaf} $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ is a presheaf such that for any $\scrU$ in $E/X$ and any \'etale cover $\{f_i:\scrU_i\to \scrU\}$, the following sequence is exact.
\begin{equation}\label{eq:gluing}
F(\scrU)\to \Pi_i F(\scrU_i)\rightrightarrows \Pi_{i,j} F(\scrU_i\times_{\scrU}\scrU_j)
\end{equation}
\begin{ex}\label{constant-sheaf}
Let $A$ be an abelian group. Consider the presheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}_A$ on $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ which sends $\scrU\to \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ to $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}(\scrU)=\{s:\scrU\to A| s \text{ is continuous}\}$ where we give $A$ the discrete topology and $\scrU=(U,P)$ the Zariski topology on $U$. And which sends an \'etale $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$-morphism between \'etale $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$-formal orbifolds $f:\scrU\to \mathcal{V}}\newcommand{\scrU}{\mathcal{U}$ to the group homomorphism $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}_A(f):\mathcal{F}}\newcommand{\scrG}{\mathcal{G}_A(\mathcal{V}}\newcommand{\scrU}{\mathcal{U})\to\mathcal{F}}\newcommand{\scrG}{\mathcal{G}_A(\scrU)$ where $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}_A(f)(s)=s\circ f$. The gluing condition \eqref{eq:gluing} for such a presheaf is automatic hence it is a sheaf and it will be denoted by $A$ as well and will be called a \emph{constant sheaf}. Note that $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}_A(\scrU)$ is isomorphic to $r$ copies of $A$ where $r$ is the number of connected components of $\scrU$.
\end{ex}
\subsection{\v Cech cohomology}
Let $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ be a presheaf on $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ and $\mathscr{U}=\{\scrU_i\to\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}\}$ be a covering. We define the \v Cech cohomology groups $\check H^*(\mathscr{U},\mathcal{F}}\newcommand{\scrG}{\mathcal{G})$ of $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ with respect to the covering $\mathscr{U}$ in the usual way. For $n\ge0$, let $\scrU_{i_0,\ldots,i_n}=\scrU_{i_0}\times_{\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}}\scrU_{i_1}\times_{\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}}\ldots\times_{\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}}U_{i_n}$ denote the $n$-fold intersection. Consider the \v Cech complex $C^*(\mathscr{U},\mathcal{F}}\newcommand{\scrG}{\mathcal{G})$ whose $n^{\text{th}}$ term is $C^n=\Pi_{i_0<\ldots<i_n}\mathcal{F}}\newcommand{\scrG}{\mathcal{G}(\scrU_{i_0,\ldots,i_n})$.
The boundary maps $d:C^n\to C^{n+1}$ are given by the alternating sum of the natural maps $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}(\scrU_{i_0,\ldots,\hat i_k,\ldots,i_n})\to\mathcal{F}}\newcommand{\scrG}{\mathcal{G}(\scrU_{i_0,\ldots,i_n})$ induced from the natural projection morphism $\scrU_{i_0,\ldots,i_n}\to \scrU_{i_0,\ldots,\hat i_k,\ldots,i_n}$.
The homology of this complex is $\check H^*(\mathscr{U},\mathcal{F}}\newcommand{\scrG}{\mathcal{G})$. If $\cV=\{\mathcal{V}}\newcommand{\scrU}{\mathcal{U}_i\to \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}\}$ is another covering of $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ and a refinement of $\mathscr{U}$. Then there is a map of complexes $C^*(\mathscr{U},\mathcal{F}}\newcommand{\scrG}{\mathcal{G})\to C^*(\cV,\mathcal{F}}\newcommand{\scrG}{\mathcal{G})$ which induces maps on the cohomology groups $\check H^*(\mathscr{U},\mathcal{F}}\newcommand{\scrG}{\mathcal{G})\to \check H^*(\cV,\mathcal{F}}\newcommand{\scrG}{\mathcal{G})$. This forms a directed system of groups as the coverings of $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ vary. Define \v Cech cohomology groups of $X$ for a presheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ as:
$$\check H^*(X,\mathcal{F}}\newcommand{\scrG}{\mathcal{G})=\varinjlim_{\mathscr{U}}H^*(\mathscr{U},\mathcal{F}}\newcommand{\scrG}{\mathcal{G}).$$
Note that for a sheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$, $H^0(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},\mathcal{F}}\newcommand{\scrG}{\mathcal{G})=\mathcal{F}}\newcommand{\scrG}{\mathcal{G}(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$. For a presheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$, define $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^+$ to be the functor $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^+(\scrU)=\check H^0(\scrU,\mathcal{F}}\newcommand{\scrG}{\mathcal{G}|_{\scrU})$. There is a natural map of presheaves $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}\to\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^+$.
\begin{thm} \cite[Theorem 7.10.10]{stacks.project}\label{sheafification}
Let $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ be a presheaf on $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$. Then
\begin{enumerate}
\item The presheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^+$ is a separated presheaf.
\item If $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ is a separated presheaf then $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^+$ is a sheaf and the natural map $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}\to\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^+$ is injective.
\item If $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ is a sheaf then the natural map $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}\to\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^+$ is an isomorphism.
\item The presheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^{++}$ is always a sheaf and $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}\to\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^{++}$ is called the \emph{sheafification} of $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$.
\end{enumerate}
\end{thm}
Let $A$ be an abelian group. The constant presheaf described in Example \ref{constant-sheaf} is a sheaf. So $\check H^0(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},A)=A^r$ where $r$ is the number of connected component of $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$.
\begin{pro}\label{H^1-pi_1-duality}
Let $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}=(X,P)$ be a formal orbifold such that $X$ is connected and projective over a field $k$ and $G_k$ is a finite rank profinite group. Then $\check H^1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},A)\cong\Hom(\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}),A)$ for any finite abelian group $A$.
\end{pro}
\begin{proof}
Since $A$ is a finite abelian group and $\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$ is finite rank (by Corollary \ref{pi_1-finite-rank}) $\Hom(\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}),A)$ is a finite group. Hence there exists a finite $G$-Galois \'etale cover $\scrY\to \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ such that every element of $\Hom(\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}),A)$ factors through $G$. As in \cite[Chapter III, Example 2.6, page 99]{Milne-etale-cohomology} the \v Cech complex with respect to the cover $\{\scrY\to \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}\}$ of $A$ is isomorphic to cochain complex used to compute the group cohomology $H^*(G,A)$. Hence $H^1(\scrY\to\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},A)\cong H^1(G,A)$. Since $A$ is a constant sheaf $G$ acts trivially on $A$ and hence $H^1(G,A)=\Hom(G,A)$. But $\Hom(G,A)$ is same as $\Hom(\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}),A)$ by choice of $Y$ and $G$.
Note that any refinement of $\scrY\to \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ has a further refinement by a $G'$-Galois cover $\scrY'\to\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ and hence dominates $\scrY\to\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$. So by the same argument $\check H^1(\scrY'\to\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},A)\cong Hom(\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}),A)$. Hence $\check H^1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},A)\cong Hom(\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}),A)$.
\end{proof}
\begin{rmk}
This result holds without the assumption on the base field and the assumption on $X$ is projective. Note that in absence of these assumptions $\Hom(\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}),A)$ will not be a finite group. But $\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$ is a Galois group of an infinite Galois extension. Hence one has to work with a inverse system of finite Galois covers and modify the argument in \cite[Chapter III, Example 2.6, page 99]{Milne-etale-cohomology} to get the result in this general setup.
\end{rmk}
\subsection{Structure sheaf}
\begin{lemma}
Let $A\to B$ be a finite separable extension of normal domains. Then the sequence $A\to B\rightrightarrows B\times_A B$ is exact.
\end{lemma}
\begin{proof}
Since $A\to B$ is generically \'etale there exists a multiplicative subset $S$ in $A$ such that $S^{-1}A\to S^{-1}B$ is a finite \'etale morphism. Hence the sequence $S^{-1}A\to S^{-1}B\rightrightarrows S^{-1}B\otimes_{S^{-1}A}S^{-1}B$ is exact.
Note that $A$ is contained in the kernel of the map $B\to B\otimes_A B$ which sends $b\in B$ to $1\otimes b-b\otimes 1$. So it is enough to show that if $b\in B$ is such that $b\otimes 1 - 1 \otimes b=0$ in $B\otimes_A B$ then $b\in A$. But for such a $b$, the exactness after localization implies that $b\in S^{-1}A$. But $b$ is integral over $A$ and $A$ is normal implies that $b\in A$.
\end{proof}
Let $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}=(X,P)$ be a formal orbifold. Consider the structure presheaf $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}}$ which sends $\scrU=(U,Q)$ to $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_U(U)$.
\begin{pro}
The structure presheaf $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}}$ of a formal orbifold is a sheaf.
\end{pro}
\begin{proof}
Let $(Y_i,Q_i)\to (X,P)$ be a covering then $\coprod Y_i\to X$ is a finite separable morphism of normal schemes. Hence the exactness of the sheaf condition for the structure presheaf follows from the above lemma and \cite[Chapter II, Proposition 1.5]{Milne-etale-cohomology}.
\end{proof}
Once the structure sheaf of a formal orbifold $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ is defined, sheaf of $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}}$-modules are simply sheaf of abelian groups $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ such that $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}(\scrU)$ is an $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}}(\scrU)$-module for every \'etale morphism $\scrU\to \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$.
\subsection{Pullback and pushforward}
The pullback and the pushforward of sheaves on formal orbifolds with respect to admissible morphisms of formal orbifolds can be defined in the same way as for the schemes in \cite[Chapter II]{Milne-etale-cohomology}.
Let $f:\scrY\to\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ be an admissible morphism of formal orbifolds. Let $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ be a presheaf on $\scrY$ then $f_*\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ is the presheaf given by the functor which sends $\scrU$ in $E/\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ to $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}(\scrU\times_{\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}}\scrY)$. This functor from the category of presheaves on $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ to the category of presheaves on $\scrY$ is called a direct image functor. Its adjoint $f^p$ is a functor from presheaves on $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ to presheaves on $\scrY$ called the inverse image functor. If $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ is a sheaf then $f_*\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ is also a sheaf (cf. \cite[Chapter II, Proposition 2.7]{Milne-etale-cohomology}). The sheaf $f_*\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ is also called the pushforward of $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$. But $f^p$ need not send sheaves to sheaves and hence the pullback is defined as the sheafification of the inverse image functor.
\subsection{Sheaf cohomology}
The \'etale site $E/\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ on a formal orbifold $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ has a final object and hence the global section functor $\Gamma(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},-)$ from the category of sheaves of abelian groups on $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$, $\Sh(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$ to the category of abelian groups $Ab$ is given by $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}\mapsto \mathcal{F}}\newcommand{\scrG}{\mathcal{G}(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$. By \cite[Theorem 19.7.4]{stacks.project} there are enough injectives in $\Sh(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$. Hence we can define the sheaf cohomology $H^i(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},\mathcal{F}}\newcommand{\scrG}{\mathcal{G})$ as the right derived functor of the global section functor. As usual the \v Cech cohomology and the sheaf cohomology agree for degree 0 and 1 (\cite[Chapter III, Corollary 2.10]{Milne-etale-cohomology}). Hence in view of Theorem \ref{H^1-pi_1-duality} we get that $H^1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},A)\cong\Hom(\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}),A)$.
One could directly show the isomorphism $H^1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},A)\cong\Hom(\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}),A)$. This can be done using Hochschild-Serre spectral sequence imitating the proof in the \'etale case as carried out in \cite[Chapter III, Theorem 2.20 and Remark 2.21(b)]{Milne-etale-cohomology}.
\begin{pro}\label{spectral-sequence}
Let $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}=(X,P)$ be a geometric formal orbifold and $f:(Y,O)\to (X,P)$ be a finite \'etale Galois $G$-cover. Let $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ be a sheaf on $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$. Then there is a spectral sequence
$$H^p(G,H^q(Y,\mathcal{F}}\newcommand{\scrG}{\mathcal{G}|_Y))\Rightarrow H^{p+q}(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},\mathcal{F}}\newcommand{\scrG}{\mathcal{G})$$
Here $H^q(Y,\mathcal{F}}\newcommand{\scrG}{\mathcal{G}|_Y)$ is the usual \'etale cohomology.
\end{pro}
\begin{proof}
The global section functor $\Gamma(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},-)$ from $\Sh(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$ to abelian groups is the composition $(-)^G\circ\Gamma(Y,-)$ of global sections over $Y$ followed by $G$-invariants. Note that $G$ acts naturally of $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}|_Y$ and hence $\Gamma(Y,-)$ is a functor from $\Sh(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$ to $G$-modules. Note that $\Gamma(Y,-)$ takes injective objects in $\Sh(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$ to injective objects in the category of $G$-modules. The result now follows from Grothendieck spectral sequence.
\end{proof}
\begin{rmk}
Since $Y$ has finite cohomological dimension. This is a bounded spectral sequence.
\end{rmk}
\begin{cor}
Let $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ be a proper geometric formal orbifold and $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ on $X$ be such that $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}|_Y$ is coherent for some \'etale Galois cover $(Y,O)\to \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$. Then $H^i(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},\mathcal{F}}\newcommand{\scrG}{\mathcal{G})$ is finite dimensional for all $i$.
\end{cor}
\begin{proof}
Note that if $X$ is proper over $k$ then $Y$ is also proper over $k$. In this situation, $H^q(Y,\mathcal{F}}\newcommand{\scrG}{\mathcal{G}|_Y)$ are finite dimensional if $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}|_Y$ is coherent and hence $H^i(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},\mathcal{F}}\newcommand{\scrG}{\mathcal{G})$ are also finite dimensional.
\end{proof}
\section{Brylinski-Kato filtration} \label{sec:BK-filtration}
We recall the Brylinski-Kato filtration on the ring of finite length Witt vectors over a henselian discrete valuation field $K$ of characteristic $p$ from \cite{Kato}, \cite{matsuda} and \cite{Kerz-Saito.CLT}. For $m\ge 0$,
$$fil_m^{log}W_s(K)=\{(a_{s-1},\ldots,a_0)\in W_s(K)| p^i\ord_K(a_i)\ge -n \forall i\}$$
Note that this is an increasing filtration with $fil_0^{log}W_s(K)=W_s(\mathcal{O}} \newcommand{\cP}{\mathcal{P}_K)$. A modification of this filtration by Matsuda was used in \cite{Kerz-Saito.CLT}. Let $V:W_s(K)\to W_{s+1}(K)$ be the function sends $(a_{s-1},\ldots,a_0)$ to $(0,a_{s-1},\ldots,a_0)$ called the Verschiebung. Let $s'=\min(\ord_p(m+1),s)$ then define
$$fil_mW_s(K)=V^{s-s'}fil_{m+1}^{log}W_{s'}(K)+fil_m^{log}W_s(K).$$
Let $\delta_s:W_s(K)/(Frob-Id)\to H^1(K,\mathbb{Z}} \newcommand{\A}{\mathbb{A}/p^s\mathbb{Z}} \newcommand{\A}{\mathbb{A})$ be the isomorphism given by Artin-Schreier-Witt correspondence. The filtration on the Witt rings induce a filtration on $H^1(K):=H^1(K,\Q/\mathbb{Z}} \newcommand{\A}{\mathbb{A})$ as follows:
$$fil_m H^1(K)=H^1(K)(p')+\cup_{s\ge 1}\delta_s(fil_m W_s(K)) \text{ for }m\ge 1.$$
Let $fil_0 H^1(K)$ be the subgroup of unramified characters. This filtration has a shift in numbering from \cite{matsuda} but it is consistent with \cite{Kerz-Saito.CLT} and \cite{Kerz-Saito.Lefschetz}.
\begin{df}
\begin{enumerate}
\item For a finite abelian field extension $L/K$ of $p$-exponent less than $n$, let $W_L$ be the subgroup of $W_n(K)/Frob-Id$ corresponding to the $p$-part of the extension $L/K$ via the Artin-Schreier-Witt theory. Define the swan conductor $$Sw(L/K)=\min\{m: W_L\subset fil_m W_n(K)/(Frob-Id)\}.$$
\item For a branch data $P$ on a normal variety $X$, define the swan divisor of $(X,P)$ $$Sw(X,P)=\sum_{x\in X^{(1)}}Sw(P(x)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x})x,$$ where $X^{(1)}$ is the set of codimension one points in $X$.
\end{enumerate}
\end{df}
Let $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}=(X,P)$ be a formal orbifold over a perfect field $k$. Assume that $P(x)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}$ is an abelian extension for all $x\in X$. Let $U=X\setminus \BL(P)$.
Set $H^1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}):=\varprojlim_n H^1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},\mathbb{Z}} \newcommand{\A}{\mathbb{A}/n\mathbb{Z}} \newcommand{\A}{\mathbb{A})$. Note that $\pi_1^{ab}(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})\cong\Hom(H^1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}),\QQ/\mathbb{Z}} \newcommand{\Aff}{\mathbb{A})$ by Pontriagan duality. Let $D$ be an effective Cartier divisor on $X$ supported on $\BL(P)$. We recall the definition of $fil_D H^1(U)$ as in \cite{Kerz-Saito.Lefschetz}.
\begin{df}
For $\chi \in H^1(U)$ to be in $fil_D H^1(U)$ the following must be true. For all integral curves $Z$ in $X$ not contained in $\BL(P)$ and for any closed point $x$ in the normalization $\bar Z$ of $Z$ which lies above $Z\cap \BL(P)$, $\chi|G_x \in fil_{m(x,D)} H^1(\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{\bar Z,x})$. Here $G_x=\Gal(\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{\bar Z,x}^s/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{\bar Z,x})$ and $m(x,D)$ is the multiplicity of $x$ in the pullback of $D$ under the composition $\bar Z\to Z\to X$.
\end{df}
\begin{df}
Define $\pi_1^{ab}(X,D)= \Hom(fil_D H^1(U),\Q/\mathbb{Z}} \newcommand{\A}{\mathbb{A})$. This is a quotient of $\pi_1^{ab}(U)$ and corresponds to abelian covers of $X$ \'etale over $U$ whose ramification over $\BL(P)$ is ``bounded by $D$''.
\end{df}
\begin{thm}
Let $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}=(X,P)$ be a proper connected formal orbifold such that $Z=\BL(P)$ is a simple normal crossing divisor on $X$ and let $U=X\setminus Z$.
The image of the inclusion $H^1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})\to H^1(U)$ lies in $fil_D H^1(U)$ where the divisor $D$ on $X$ is given by
$D=Sw(X,P)$. Moreover for a Cartier divisor $D$ on $X$ whose support is a normal crossing divisor, $$\pi_1^{ab}(X,D)=\varprojlim \pi_1^{ab}(X,Q)$$ where $Q$ varies over all branch data such that $Q$ is abelian and $Sw(X,Q) \le D$.
\end{thm}
\begin{proof}
Let $\chi$ be in the image of $H^1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})\to H^1(U)$. Let $K=k(U)$, $K^{ur,\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},ab}$ be the compositum of function fields of abelian \'etale covers of $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ and $K^{ur,U,ab}$ be the compositum of function fields of abelian \'etale covers of $U$. Then $\pi_1^{ab}(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})=\Gal(K^{ur,\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},ab}/K)$ and $\pi_1^{ab}(U)=\Gal(K^{ur,U,ab}/K)$.
The hypothesis on the character $\chi\in \Hom(\pi_1^{ab}(U),\Q/\mathbb{Z}} \newcommand{\A}{\mathbb{A})$ implies that it factors through $\pi_1^{ab}(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$. Let $x\in X$ be a codimension one point lying in $\BL(P)$. Note that the abelian part of the decomposition group at $x$, $G_x=\Gal(\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}K^{ur,U,ab}/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}) \le \pi_1^{ab}(U)$. Note that the natural map $H^1(U)\to H^1(\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x})$ is given by $\chi\mapsto \chi_x:=\chi|_{G_x}$.
In view of \cite[Proposition 2.5]{Kerz-Saito.Lefschetz}, to show that $\chi\in fil_D H^1(U)$, it is enough to show $\chi_x\in fil_{m_x} H^1(\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x})$ where $m_x=Sw(P(x)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x})$. Again since $\chi$ factors through $\pi_1^{ab}(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$, $\chi_x$ factors through $\Gal(\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}K^{ur,\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},ab}/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x})$. But $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}K^{ur,\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},ab}=P(x)L$ where $L/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}$ is an unramified extension (over $\widehat\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$). Hence $$\chi_x \in \cup_s\delta_s(W_{P(x)})+fil_0 H^1(\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x})$$ because by definition of Brylinski-Kato filtration on $H^1(\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x})$ the unramified characters make up $fil_0 H^1(\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x})$. Hence $\chi_x\in fil_m H^1(U)$ if $W_{P(x)}\subset fil_m W_s(\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x})$ for some $s$. And this happens if $m\ge m_x=Sw(P(x)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x})$.
For the moreover part, let $U=X\setminus \supp(D)$. Note that given any $n\ge 1$ and any $\alpha\in fil_DH^1(U,\mathbb{Z}} \newcommand{\A}{\mathbb{A}/n\mathbb{Z}} \newcommand{\A}{\mathbb{A})$ there exists a branch data $Q$ on $X$ with $Sw(X,Q)\le D$ such that $\alpha$ is the image of $H^1((X,Q),\mathbb{Z}} \newcommand{\A}{\mathbb{A}/n\mathbb{Z}} \newcommand{\A}{\mathbb{A})\to H^1(U,\mathbb{Z}} \newcommand{\A}{\mathbb{A}/n\mathbb{Z}} \newcommand{\A}{\mathbb{A}))$. The result now follows by taking the limit and applying Pontriagan duality.
\end{proof}
It leads to some natural questions for formal orbifolds.
\begin{question}\label{Q:CFT}
Let $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ be a geometrically connected proper geometric formal orbifold over a finite field. Does class field theory hold for for $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$?
\end{question}
A geometric definition of chow groups (of zero cycles) for formal orbifolds is needed to make this more precise. One way to approach this problem is to realize that $\pi_1^{ab}(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$ is a quotient of $\pi_1^{ab}(X,D)$ for $D=Sw(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$. So by Kerz-Saito's class field theory chow groups of zero cycles on $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ should be an appropriate quotient of chow groups of $X$ with modulus as defined in \cite{Kerz-Saito.CLT}. And one could try to provide a geometric or hopefully a motivic interpretation of the this quotient group directly in terms of $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$.
It will be desirable to obtain a class field theory for formal orbifolds such that the inverse limits of the cycle class maps yield the cycle class map of Kerz and Saito's class field theory. A starting point would be to show a version Lefschetz's theorem on fundamental groups for formal orbifolds. For $\pi_1^{ab}(X,D)$ it was proved by Kerz and Saito in \cite{Kerz-Saito.Lefschetz}.
\section{Grothendieck-Lefschetz theorem for fundamental groups} \label{sec:Lefschetz}
For a formal orbifold $(X,P)$, let $\Cov(X,P)$ denote the category of finite \'etale covers $(X,P)$.
The question of interest in this section is the following:
\begin{question}\label{Q:Lefschetz}
Let $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}=(X,P)$ be a geometrically connected projective smooth geometric formal orbifold of dimension $n\ge 2$ over a perfect field $k$. Does there exist a connected smooth hypersurface $Y$ on $X$ with a geometric branch data $Q$ such that the functor from $\Cov(X,P)\to \Cov(Y,Q)$, given by the normalized pullback, is fully faithful? In particular, is the induced homomorphism $\pi_1(Y,Q)\to \pi_1(X,P)$ surjective? Moreover, if dimension $n>2$ then can one find a $(Y,Q)$ such that the functor $\Cov(X,P)\to \Cov(Y,Q)$ is an equivalence? In particular, is the map $\pi_1(Y,Q)\to \pi_1(X,P)$ an isomorphism?
\end{question}
The above question can be considered as the Grothendieck-Lefschetz theorem for wildly ramified covers. In this section we make some progress towards answering this question.
Let $Y$ be a normal connected hypersurface in $X$ not contained in $\BL(P)$. Let $\scrp$ be the ideal sheaf on $X$ defining $Y$. Since $Y$ is normal and hence unibranched for any codimension one point $x\in Y$ and any affine connected neighbourhood $U$ of $x$ in $X$, the ideal $\scrp\widehat{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X}(U)}^x$ is a prime ideal (defining $Y$ in the formal neighborhood of $x$). Let $R$ be the integral closure of $\widehat{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X}(U)}^x$ in $P(x,U)$ and $\scrq_1,\ldots,\scrq_r$ be the prime ideals of $R$ lying above $\scrp$. Define $Q'(x,U\cap Y)$ for $x\in Y$ of codimension at least one to be the compositum of the Galois extensions $\QF(R/\scrq_i)$ of $\QF(\widehat{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_X(U)}^x/\scrp)$. Then it is easy to see that $Q'$ is a branch data on $Y$.
\begin{df}
The branch data $Q'$ on $Y$ is called the restriction of the branch data $P$ and is denoted by $P_{|Y}$.
\end{df}
\begin{pro}\label{etale-pullback-hypersurface}
Let $(X,P)$ be a formal orbifold and $Y$ be a normal connected hypersurface in $X$ not contained in $\BL(P)$. Let $Q$ be the maximal geometric branch data on $Y$ which is less than or equal to $P_{|Y}$ (obtained using Proposition \ref{approximate-orbifold}). Let $h:(Z,O)\to (X,P)$ be an \'etale covering. Let $W=Y\times_X Z$, $\tilde W$ the normalization of $W$ and $g:\tilde W\to Y$ the natural projection morphism then the induced morphism $g:(\tilde W,g^*Q)\to (Y,Q)$ is \'etale.
\end{pro}
\begin{proof}
In view of Proposition \ref{unramified-criterion}, it is enough to show that for any point $w\in \tilde W$ of codimension at least one $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{\tilde W,w}Q(g(w))/Q(g(w))$ is an unramified extension. Let $x$ and $z$ be the images of $w$ in $X$ and $Z$ respectively under the natural map. Note that $x\in Y$ and $g(w)=h(z)=x$. Note that $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\tilde W,w}$ is the normalization of $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Y,x}\otimes_{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}}\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Z,z}$. Since $\scrp$ is the defining ideal of $Y$ in $X$, $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Y,x}\otimes_{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}}\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Z,z}\cong \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Z,z}/\scrp\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Z,z}$. Hence $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\tilde W,w}$ is the normalization $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Z,z}/\scrp\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Z,z}$. Since $Y\nsubseteq \BL(P)$ and $\scrq_1,\ldots,\scrq_r$ are the primes in $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Z,z}$ lying above $\scrp$, $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\tilde W,w}$ is the normalization of $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Z,z}/\scrq_i$ for some $i$. Hence $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{\tilde W,w}=\QF(\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Z,z}/\scrq_i)\subseteq P_{|Y}(x)$. Since $Q$ is the maximal geometric branch data on $Y$ among those less than or equal to $P_{|Y}$, $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{\tilde W,w}\subseteq Q(x)$.
\end{proof}
Let $\widehat X$ be a normal excellent formal scheme. A branch data $\hat P$ on $\widehat X$ is defined in the same way as for schemes as follows. Let $x$ be a codimension one point of $\widehat X$ (i.e. codimension one in the closed fiber) and $\widehat U$ be an open affine neighbourhood of $x$ in $\widehat X$ given by $\spf(A)$ then set $\hat P(x, \widehat U)$ is a finite Galois extension of $\QF(\widehat{A}^x)$ where $\widehat A^x$ is the completion of $A$ w.r.t the prime ideal of $A$ defining the point $x$. The assignment $\hat P$ is called a quasi branch data on $\widehat X$ if $\hat P$ is compatible with affine open neighbourhoods of $x$, $\widehat V\subset \widehat U \subset \hat X$ and with respect to specialization $x_1\subset \overline{\{x_2\}}$ of codimension at least one points of $\widehat X$ in the same way as in Definition \ref{def:branch-data}. The definition of branch locus $\BL(\hat P)$ is also the same as in Definition \ref{def:branch-data} and similarly a quasi branch data $\hat P$ on $\widehat X$ is called a branch data if $\BL(\hat P)$ is closed in the $\widehat X$.
Note that for a point $x\in \spf(A)$, $I\subset A$ be the ideal of definition of $\spf(A)$ and $I(x)$ be the ideal of definition of $x$ then $I(x)\supset I$. Let $A$ be a normal excellent ring and $J\supset I$ be ideals of $A$ then $\widehat{\widehat A^I}^J\cong \widehat A^J$. Let $(X,P)$ be a formal orbifold and $Y \subset X$ be a closed irreducible subset not contained in $\BL(P)$. Let $\widehat X_Y$ be the completion of $X$ along $Y$. The branch data $P$ induces a branch data $\widehat P$ on the formal scheme $\widehat X_Y$. More precisely for a point $y\in Y$ of codimension at least one and $U\subset X$ an affine connected neighbourhood of $y$, define $\widehat P(y, U\cap Y)=P(y,U)$. Note that $\widehat{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_X(U)}^y=\widehat{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X_Y}(U\cap Y)}^y$, so $\widehat P(y,U)$ is a finite Galois extension of $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{\widehat X_Y}(U\cap Y)^y=\QF(\widehat{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_X(U)}^y)$. Note that $\BL(\widehat P)=\BL(P)\cap Y$.
\begin{df}
We will call the pair $(\widehat X_Y,\hat P)$ as $Y$-adic completion of $(X,P)$.
Let $\widehat X$ be an excellent normal formal scheme and $\hat P$ be a branch data of $\hat X$. Like in \cite[3.1.6]{Grothendieck-Murre} a finite morphism of formal scheme is an adic morphism (i.e. pull back of a sheaf of ideal of definition is a sheaf of ideal of definition) of formal schemes which induces a finite morphism on the closed fibers. As mentioned in loc. cit. the category of finite coverings of $\widehat X$ is equivalent to the category of sheaf of finite $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X}$-algebras $\mathcal{A}$ on $\widehat X$. Let $f: \widehat Y\to \widehat X$ be a finite morphism of excellent normal formal schemes and let $\hat P$ and $\hat Q$ be branch data on $\widehat X$ and $\widehat Y$ respectively. Like in Definition \ref{df:main}, $f:(\widehat Y, \hat Q)\to (\widehat X,\hat P)$ is said to be a cover if for all $y\in \widehat Y$ of codimension at least one and some open affine neighbourhood $U$ of $f(y)$, $\hat Q(y,f^{-1}(U))\supset \hat P(f(y),U)$. Moreover the above cover is said to be an \'etale cover if $\hat Q(y)=\hat P(f(y))$ for all $y\in \widehat Y$ of codimension at least one. The category of \'etale covers of the pair $(\widehat X,\hat P)$ will be denoted by $\Cov(\widehat X,\hat P)$.
\end{df}
\subsection{The functor $\Cov(\widehat{X}_Y,\hat P)$ to $\Cov(Y,P_{|Y})$}
The pullback along the natural morphism $Y\to \widehat X_Y$ defines a functor from $\Cov(\widehat X_Y,\hat P)\to \Cov(Y,P_{|Y})$ (follows in the same way as Proposition \ref{etale-pullback-hypersurface}). We shall show that this functor is an equivalence of category when the following hypothesis holds:
\begin{hypothesis}\label{nonsplit}
The formal orbifold $(X,P)$ is geometric, irreducible, smooth and projective over $k$; $Y$ is a smooth irreducible hypersurface of $X$ not contained in $\BL(P)$ (with the ideal sheaf $I_Y$); and for any $y\in \BL(\hat P)$ and $U\subset X$ an affine connected neighbourhood of $y$, the ideal $I_Y(U)R(U,y)$ is a prime ideal of $R(U,y)$ where $R(U,y)$ is the integral closure of $\widehat{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X}(U)}^y$ in $P(y,U)$.
\end{hypothesis}
\begin{rmk}
Note that under the Hypothesis \ref{nonsplit} on $(X,P)$ and $Y$, for $y\in Y$ of codimension at least one $P_{|Y}(y)$ is the fraction field of $R(U,y)/(I_Y(U))$ where $R(U,y)$ is the integral closure of $\widehat{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_X(U)}^y$ in $P(y,U)$. The hypothesis can be thought of as a variant of Hilbert irreducibility theorem as well in local setup.
\end{rmk}
\begin{ex}
Let $X=\mathbb{P}} \newcommand{\FF}{\mathbb{F}^n_k$ with homogeneous coordinates $x_0,\ldots x_n$, $f:Z\to X$ be the normalization of $X$ in $k(x_1/x_0,\ldots x_n/x_0)[z]/(z^p-z-x_n/x_0)$ and the branch data $P=B_f$. Let $1\le i \le n-1$ be an integer, $Y$ be the hypersurface in $\mathbb{P}} \newcommand{\FF}{\mathbb{F}^n$ defined by $x_i=0$. Then it is easy to check that $(X,P)$ and $Y$ satisfy Hypothesis \ref{nonsplit}
\end{ex}
Let the formal orbifold $(X,P)$ and the hypersurface $Y$ satisfy Hypothesis \ref{nonsplit}. For a closed point $y\in \widehat X_Y$ and an affine neighbourhood $\widehat U_y \subset \widehat X_Y$ of $y$, define $A(\widehat U_y)$ to be the integral closure of $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X_Y}(\widehat U_y)$ in $P(\eta_Y,U_y)$ where $U_y\subset X$ is an affine neighbourhood of $y$ viewed as a point in $X$ whose completion along $Y\cap U_y$ is $\widehat U_y$. Let $\mathcal{A}_{\widehat U_y}$ be the sheaf of algebras on $\widehat U_y$ associated to $A(\widehat U_y)$. Note that $\scrU=\{\widehat U_y:y\in Y \text{ closed point} \}$ is an open cover of $\widehat X_Y$ and $P$ being branch data there are natural isomorphisms between $\mathcal{A}_{U_1}(U_1\cap U_2)$ and $\mathcal{A}_{U_2}(U_1\cap U_2)$ for all $U_1, U_2 \in \scrU$ and they behave well with triple intersections. Hence there is a sheaf of algebras $\mathcal{A}$ on $\widehat X_Y$ whose restriction to $\widehat U_y$ is $\mathcal{A}_{\widehat U_y}$. Note that $\mathcal{A}$ is a sheaf of finite coherent $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X_Y}$-algebras.
\begin{df}\label{df:normalization}
Let $\widehat Z=\spf(\mathcal{A})$ be the formal scheme associated to $\mathcal{A}$ and $c:\widehat Z\to \widehat X_Y$ be the structure morphism. We shall call $\widehat Z$ to be the normalization of $\widehat X_Y$ in $P$. Note that $\widehat Z$ is normal and $c$ is a finite morphism.
\end{df}
\begin{pro}\label{P-cover}
Let $(X,P)$ and $Y$ satisfy the Hypothesis \ref{nonsplit}. Let $F$ be the residue field of the local ring $\overline{\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,\eta_Y}}^{P(\eta_Y)}$ where $\eta_Y$ is the generic point of $Y$. Then $F/k(Y)$ is a Galois extension with $\Gal(F/k(Y))=\Gal(P(\eta_Y)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,\eta_Y})$. Let $\widehat Z$ be the normalization of $\widehat X_Y$ in $P$ (in the sense of the above definition) and $c_0:Z_0\to Y$ be the normalized pull-back of $c:\widehat Z\to \widehat X_Y$ along $Y\to \widehat X_Y$ then $Z_0$ is the normalization of $Y$ in $F$. Moreover, the morphisms $(\widehat Z,O)\to (\widehat X_Y,\hat P)$ and $(Z_0,O)\to (Y,P_{|Y})$ are \'etale morphisms.
\end{pro}
\begin{proof}
Note that $P(\eta_Y)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,\eta_Y}$ is a Galois extension and the point $\eta_Y$ is not in $\BL(P)$ so the residue field extension $F/k(Y)$ is Galois with an epimorphism from $\Gal(P(\eta_Y)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,\eta_Y})\to \Gal(F/k(Y))$. Let $I_Y$ be the sheaf of ideals on $X$ defining $Y$ and $I_{Y,\eta_Y}$ be the prime ideal of $\widehat{\mathcal{O}} \newcommand{\cP}{\mathcal{P}}_{X,\eta_Y}$generated by the stalk of $I_Y$ at $\eta_Y$. Note that the Hypothesis \ref{nonsplit} ensures that there is only one prime ideal lying above $I_{Y,\eta_Y}$ in $\overline{\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,\eta_Y}}^{P(\eta_Y)}$ and $I_{Y,\eta_Y}$ is unbranched in the extension $\overline{\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,\eta_Y}}^{P(\eta_Y)}/\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,\eta_Y}$. Hence the degree of the residue extension $F/k(Y)$ is same as that of $P(\eta_Y)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,\eta_Y}$. Hence the two Galois groups are isomorphic.
Note that $\widehat Z\to \widehat X_Y$ is generically \'etale and $\eta_Y$ is unramified and non-split in this cover. Hence the closed fiber, i.e., the pull-back of the formal scheme $\widehat Z$ along $Y\to \widehat X_Y$ is an integral scheme and its function field is $F$. Hence $Z_0$ is the normalization of the closed fiber of $\widehat Z$. Since the closed fiber of $Z$ is a finite cover of $Y$, $Z_0$ is the normalization of $Y$ in $F$.
For a point $z$ of $\widehat Z$ of codimesion at least one in the closed fiber, let $x$ denote its image in $\widehat X_Y$. Then $x$ is of codimension at least one in $Y$. Note that $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Z,z}=\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{\widehat Z,z}$ is the fraction field of the completion of $\overline{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X_Y,x}}^{P(\eta_Y)}$ along the prime ideal $I_z$ corresponding to the point $z$. But this ring is same as the integral closure of $\widehat\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X_Y,x}$ in $P(\eta_Y)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}$. Hence $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Z,z}=P(\eta_Y)\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x}=P(x)$. This proves $(Z,O)\to (\widehat X_Y,P)$ is \'etale.
Let $z_0\in Z_0$ be a point of codimension at least one and $y\in Y$ be its image. Then $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Z_0,z_0}=\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Y,y}F$ since $F$ is the function field of $Z_0$. But $F=\overline{\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,\eta_Y}}^{P(\eta_Y)}/(I_{Y,\eta_Y})$ as the Hypothesis \ref{nonsplit} implies that $I_{Y,\eta_Y}$ generates the maximal ideal of $\overline{\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,\eta_Y}}^{P(\eta_Y)}$. Now,
\begin{align*}
\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Z_0,z_0}&=\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Y,y}\overline{\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,\eta_Y}}^{P(\eta_Y)}/(I_{Y,\eta_Y}) \\
&=\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Y,y}\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat Z,\eta_Y}/(I_{Y,\eta_Y})\\
&=\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Y,y}\QF(\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat V}/(I_Y)) \text{ where $\widehat V\subset \widehat Z$ is an affine open neighbourhood of $\eta_Y$}\\
&=\QF(\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat V, z}/(I_{Y,z}))\text{ where $z$ is the image of $z_0$ in $\widehat Z$}\\
&=\QF(\overline{\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X_Y, y}}^{P(y)}/(I_{Y,y}))\\
&=P_{|Y}(y)
\end{align*}
Hence $(Z_0,O)\to (Y,P_{|Y})$ is \'etale.
\end{proof}
Now we proceed following the strategy in \cite[Section 4.3]{Grothendieck-Murre} to show that the functor $\Cov(\widehat{X}_Y,\hat P) \to \Cov(Y,P_{|Y})$ is an equivalence of category.
\begin{pro}
Under the Hypothesis \ref{nonsplit}, the functor $\Cov(\widehat{X}_Y,\hat P) \to \Cov(Y,P_{|Y})$ is faithful.
\end{pro}
\begin{proof}
Let $f,g:\scrU\to\mathcal{V}}\newcommand{\scrU}{\mathcal{U}$ be morphisms in $\Cov(\widehat X_Y,\hat P)$ and $u:\scrU\to (\widehat X_Y,\hat P)$ and $v:\mathcal{V}}\newcommand{\scrU}{\mathcal{U}\to (\widehat X_Y,\hat P)$ be \'etale morphism. Assume $f_0=g_0:\scrU_0\to\mathcal{V}}\newcommand{\scrU}{\mathcal{U}_0$ where $\scrU_0$ and $\mathcal{V}}\newcommand{\scrU}{\mathcal{U}_0$ are the normalized pullback of $\scrU$ and $\mathcal{V}}\newcommand{\scrU}{\mathcal{U}$ along $Y\to \widehat X_Y$. We wish to show $f=g$. Let $f^*$ and $g^*$ from $\scrU^*\to \mathcal{V}}\newcommand{\scrU}{\mathcal{U}^*$ be the pullback of $f$ and $g$ respectively along $(Z,O)\to (\widehat X_Y,\hat P)$ of the above proposition. Note that the branch data on $\scrU^*$ and $\mathcal{V}}\newcommand{\scrU}{\mathcal{U}^*$ are trivial (as $(Z,O)$ has trivial branch data and $u$, $v$ are \'etale). Also $\scrU^*\to (Z,O)$ and $\mathcal{V}}\newcommand{\scrU}{\mathcal{U}^*\to (Z,O)$ are \'etale morphisms. Let $(f_0)^*=(g_0)^*$ be the morphism $\scrU_0^*\to \mathcal{V}}\newcommand{\scrU}{\mathcal{U}_0^*$ where $\scrU_0^*$ and $\mathcal{V}}\newcommand{\scrU}{\mathcal{U}_0^*$ are the normalized pull-backs of $\scrU_0$ and $\mathcal{V}}\newcommand{\scrU}{\mathcal{U}_0$ along $Z_0\to Y$. Observe that the normalization of the closed fibers of $\scrU^*$ and $\mathcal{V}}\newcommand{\scrU}{\mathcal{U}^*$ are same as $\scrU_0^*$ and $\mathcal{V}}\newcommand{\scrU}{\mathcal{U}_0^*$ respectively. Also note that $(f^*)_0=(f_0)^*=(g_0)^*=(g^*)_0$ where $(f^*)_0$ and $(g^*)_0$ are morphisms between the normalization of the closed fibers of $\scrU^*$ and $\mathcal{V}}\newcommand{\scrU}{\mathcal{U}^*$. Hence $f^*=g^*$ by \cite[\'etale case]{Grothendieck-Murre}. Now away from the branch locus $Z\to \widehat X_Y$ is \'etale, hence by applying flat descent on this locus there exists an open dense $W \subset \widehat X_Y$ such that $f=g$ when restricted to $u^{-1}(W)$. But $u^{-1}(W)$ is dense in $\scrU$, hence $f=g$.
\end{proof}
\begin{pro}
Under the Hypothesis \ref{nonsplit}, the functor $\Cov(\widehat{X}_Y,\hat P) \to \Cov(Y,P_{|Y})$ is fully faithful.
\end{pro}
\begin{proof}
Again we use the argument similar to \cite[4.3.6]{Grothendieck-Murre}. Let $Z\to \widehat X_Y$ and $Z_0\to Y$ be the covers in Proposition \ref{P-cover} and $G$ denote their common Galois group. Let $u:\scrU\to (\widehat X_Y,\hat P)$ and $v:\mathcal{V}}\newcommand{\scrU}{\mathcal{U}\to (\widehat X_Y,\hat P)$ be \'etale covers and $g_0:\scrU_0\to \mathcal{V}}\newcommand{\scrU}{\mathcal{U}_0$ be a morphism in $\Cov(Y,P_{|Y})$. Let $g_0^*:\scrU_0^*\to \mathcal{V}}\newcommand{\scrU}{\mathcal{U}_0^*$ be the morphism obtained by pulling back $g_0$ to $Z_0$. Now $g_0^*$ is \'etale and the branch data on $\scrU_0^*$ and $\mathcal{V}}\newcommand{\scrU}{\mathcal{U}_0^*$ are trivial. Rest of the proof is same as \cite[4.3.6]{Grothendieck-Murre} with $\mu_n$ replaced by $G$.
\end{proof}
\begin{thm}\label{GM-wild}
Under the Hypothesis \ref{nonsplit}, the functor $\Cov(\widehat{X}_Y,\hat P) \to \Cov(Y,P_{|Y})$ is an equivalence.
\end{thm}
\begin{proof}
Here also the proof is same as in \cite[4.3.7]{Grothendieck-Murre} with appropriate modifications, i.e. the Kummer covers being replaced by the covers $Z\to \widehat X_Y$ and $Z_0\to Y$ of Proposition \ref{P-cover}.
\end{proof}
\subsection{The functor $\Cov(X,P)$ to $\Cov(\widehat X_Y, \hat P)$}
We need the following lemma.
\begin{lemma}\label{depth}
Let $R$ be a ring and $M$, $N$ be $R$-modules, let $r_1,r_2$ be a regular sequence on $N$ then $r_1, r_2$ is a regular sequence on $\Hom_R(M,N)$. In particular, if depth of $N$ is at least 2 then depth of $\Hom_R(M,N)$ is also at least 2.
\end{lemma}
\begin{proof}
Let $f\in \Hom_R(M,N)$ and $r_1f=0$ then $r_1f(m)=0$ for all $m\in M$. But $r_1$ is regular on $N$ implies $f(m)=0$ for all $m\in M$, i.e. $f=0$. Hence $r_1$ is a nonzero divisor on $\Hom_R(M,N)$.
Let $\bar g\in \Hom_R(M,N)/r_1\Hom_R(M,N)$ be the image of $g\in \Hom_R(M,N)$. We need to show that if $r_2\bar g=0$ then $g\in r_1\Hom_R(M,N)$. Note that $r_2\bar g=\overline{r_2 g}=0$ implies $r_2g\in r_1\Hom_R(M,N)$. Hence there exists $f\in \Hom_R(M,N)$ such that $r_2g(m)=r_1f(m)$ for all $m\in M$. Hence $g(m)\in r_1N$ for all $m\in M$. But $r_1, r_2$ is a regular sequence on $N$, so $g(m)\in r_1N$ for all $m\in M$. Hence $g\in r_1\Hom_R(M,N)$.
\end{proof}
The pullback along the natural morphism $\widehat X_Y \to X$ defines a functor from $\Cov(X,P) \to \Cov(\widehat X_Y,\hat P)$.
\begin{pro}\label{formal-fullyfaithful}
Let $(X,P)$ be a projective formal orbifold over $k$ of dimension at least two, $Y$ be a normal hypersurface of $X$ which intersects $\BL(P)$ transversally and the divisor $[Y]$ is a very ample divisor on $X$. Then the functor $\Cov(X,P)\to \Cov(\widehat X_Y,\hat P)$ is fully faithful.
\end{pro}
\begin{proof}
Let $u:\scrZ \to (X,P)$ and $v:\mathcal{W}}\newcommand{\scrC}{\mathcal{C}\to (X,P)$ be in $\Cov(X,P)$. It is enough to show that $\Hom_X(Z,W)\cong \Hom_{\widehat X_Y}(Z_Y,W_Y)$ where $Z_Y$ and $W_Y$ are the pullback of $u$ and $v$ to $\widehat X_Y$. Note that $Z_Y$ and $W_Y$ are normal. Note that $\Hom_X(Z,W)$ are same as homomorphisms between sheaf of $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_X$-algebras $v_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_W\to u_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_Z$ as $u$, $v$ and every $X$-morphism from $Z$ to $W$ are finite (and hence affine). Since $Z$ and $W$ are normal of dimension at least 2, $u_*O_Z$ has depth at least 2 and hence by Lemma \ref{depth} coherent sheaf of $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_X$-modules $\underline{\Hom}_{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_X}(v_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_W,u_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_Z)$ has depth at least 2 (here we consider all $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_X$-module homomorphism and not just algebra homomorphism).
Using \cite[Chapter XII, Corollary 2.2]{SGA2}, we obtain that $\Hom_{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_X}(v_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_W,u_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_Z)\cong \Hom_{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X_Y}}(\widehat {v_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_W},\widehat{u_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_Z})$ but the right side equals $\Hom_{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X_Y}}(v_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat W_Y},u_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat Z_Y})$. Also since $\widehat X_Y \to X$ is flat $\Hom$ behaves well with tensor product. So the bijection takes an algebra homomorphism between $v_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_W$ and $u_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_Z$ to an algebra homomorphism between $v_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat W_Y}$ and $u_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat Z_Y}$. Hence the functor is fully faithful.
\end{proof}
In fact like in \cite[Chapter XII]{SGA2}, even the following is true.
\begin{pro}\label{nbh-faithful}
Let $U$ be an open neighborhood of $Y$. Then the functors $\Cov(X,P)\to \Cov(U, P_{|U})$ and $\Cov(U, P_{|U})\to \Cov(\widehat X_Y,\hat P)$ are fully faithful.
\end{pro}
\begin{proof}
Note that the composition of these two functors is the functor in the above proposition. We use the notation of the above proof. Since $\underline{\Hom}_{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_X}(v_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_W,u_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_Z)$ has depth at least 2 (Lemma \ref{depth}), it is torsion free. Hence the homomorphisms $\Hom_{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_X}(v_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_W,u_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_Z)\to \Hom_{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_U}(v_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{W_U},u_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Z_U})$ and $\Hom_{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_U}(v_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{W_U},u_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Z_U})\to \Hom_{\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat X_Y}}(v_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat W_Y},u_*\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\widehat Z_Y})$ are injective (for the injectivity of the second map use the argument in \cite[Chapter XII, Corollary 2.4]{SGA2}). By the above proposition the composition is an isomorphism hence the two maps are isomorphisms.
\end{proof}
As a consequence of Theorem \ref{GM-wild} and Proposition \ref{formal-fullyfaithful} we get the following corollary.
\begin{cor}\label{Lefschetz-thm}
Let $(X,P)$ be a smooth irreducible projective formal orbifold over a perfect field $k$ of dimension at least two. The functor from $\Cov(X,P)\to \Cov(Y,P_{|Y})$ is fully faithful if $Y$ satisfies Hypothesis \ref{nonsplit}. In particular the map natural map $\pi_1(Y,P_{|Y})\to \pi_1(X,P)$ is an epimorphism.
\end{cor}
\section{Locally constant $l$-adic sheaf}\label{sec:l-adic}
Let $X$ be a normal geometrically connected variety over a field $k$ of characteristic $p$. Recall that given a finite locally constant sheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ on $X$ with stalk $A$
it corresponds to a representation $\rho_{\mathcal{F}}\newcommand{\scrG}{\mathcal{G}}:\pi_1(X,x)\to \Aut(A)$ where $x$ is a geometric point of $X$. The converse also holds. This result and its lisse $l$-adic version hold for geometric formal orbifolds as well.
\begin{df}
Let $l\ne p$ be a prime number. An $l$-adic sheaf is a locally constant sheaf of $R$-modules where $R$ is the integral closure of $\mathbb{Z}} \newcommand{\A}{\mathbb{A}_l$ in a finite extension $K$ of $\Q_l$. Note that $R$ is a complete DVR and let $\mathfrak{m}$ denote its maximal ideal. A lisse $l$-adic sheaf of $R$-modules is a compatible system of locally constant sheaves $(\mathcal{F}}\newcommand{\scrG}{\mathcal{G}_n)_{n\ge 0}$ where $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}_n$ is a locally constant $R_n=R/\mathfrak{m}^{n+1}$-module and $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}_{n+1}\otimes_{R_{n+1}}R_n\cong \mathcal{F}}\newcommand{\scrG}{\mathcal{G}_n$. The morphisms in this category are defined to be compatible system of morphisms. For more details see \cite[Chapter 1, Section 12]{FK}. The category of lisse $K$-sheaf consist of lisse $l$-adic sheaf of $R$-modules as objects and the morphisms are given by $Hom_K(\mathcal{F}}\newcommand{\scrG}{\mathcal{G},\mathcal{F}}\newcommand{\scrG}{\mathcal{G}'):=\Hom(\mathcal{F}}\newcommand{\scrG}{\mathcal{G}',\mathcal{F}}\newcommand{\scrG}{\mathcal{G}')\otimes_R K$.
\end{df}
\begin{pro}\label{l-adicsheaf.Galois-repr}
Let $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ be a finite locally constant sheaf with stalk $A$ on a geometric formal orbifold $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}=(X,P)$. Let $X^o=X\setminus \BL(P)$. The restriction $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o=\mathcal{F}}\newcommand{\scrG}{\mathcal{G}_{|X^o}$ is a locally constant sheaf and hence $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ correspond to a representation $\rho:\pi_1(X^o,x)\to Aut(\mathcal{F}}\newcommand{\scrG}{\mathcal{G}_x)$ where $x\in X^o$ is a geometric point. Then $\rho$ factors through $\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},x)$ to give a continuous representation $\bar \rho:\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},x)\to \Aut(\mathcal{F}}\newcommand{\scrG}{\mathcal{G}_x)$. Conversely given a continuous representation $\bar \rho:\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},x)\to \Aut(A)$ it induces a finite locally constant sheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ on $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ with stalk $A$. And the two functors are inverse to each other.
\end{pro}
\begin{proof}
Since $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}=(X,P)$ is a geometric formal orbifold and $X$ is geometrically connected there exists a finite Galois \'etale cover of formal orbifolds $h:(Z,O)\to \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$, with $Z$ geometrically connected.
Since $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ is a locally constant sheaf on $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ so is $h^*\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$. The \'etale site on $(Z,O)$ is the usual \'etale site on $Z$. Hence there exists an \'etale Galois cover $g:Y\to Z$ with $Y$ connected such that the pull back $g^*h^*\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ is constant. Let $f=h\circ g$ and passing to Galois closure we may assume $f$ is a Galois cover. Let $Y^o=f^{-1}(X^o)$. The restriction of $f^*\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ to $Y^o$ is constant. Hence $\rho$ factors through $\pi_1(X^o)/\pi_1(Y^o)$ which is same as $\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})/\pi_1(Y)$. Hence $\rho$ factors through $\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$.
Conversely, let $\bar \rho:\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y},x)\to Aut(A)$ be a continuous representation. Since $A$ is finite, $\bar \rho$ factors through a finite quotient of $\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})$ say $G$. This finite quotient correspond to a $G$-Galois \'etale cover $f:(Y,Q)\to \mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ and we may assume $Q$ is the trivial branch data. Consider the constant sheaf $A_Y$ on $Y$. The group homomorphism $G\to Aut(A)$ makes $A_Y$ into a $G$-sheaf. In other words the action of $G$ on $Y$ lifts to $A_Y$ via the group homomorphism $G\to A_Y$. Then $f_*A_Y$ is a sheaf on $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ with a $G$-action. Set $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}:=(f_*A_Y)^G$. Then $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ is a locally constant sheaf on $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$.
The two functors are inverse to each other can be seen by using the corresponding result in the variety case.
\end{proof}
\begin{cor}
The category of lisse $l$-adic sheaf of $K$-modules on $\mathcal{X}}\newcommand{\scrY}{\mathcal{Y}$ is equivalent to the category of continuous representations $\rho:\pi_1(\mathcal{X}}\newcommand{\scrY}{\mathcal{Y})\to \GL_N(K)$ for any $K/\Q_l$ a finite field extension.
\end{cor}
\begin{proof}
In view of the above proposition, the proof is same as the case of normal varieties.
\end{proof}
We collect some definitions on tameness and bounded ramification of $l$-adic sheaves from \cite{Drinfeld}, \cite{Esnault} and \cite{Esnault-Kerz.Deligne}.
\begin{df}
Let $X$ be a normal geometrically connected variety over $k$ and $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ a locally constant sheaf on $X$.
\begin{enumerate}
\item If $\dim(X)=1$ then $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ is called tame if $\rho_{\mathcal{F}}\newcommand{\scrG}{\mathcal{G}}$ factors through the tame quotient of the fundamental group $\pi_1^t(X,x)$.
\item For $X$ of arbitrary dimension, $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ is tame if for any geometrically irreducible curve $C$ in $X$ with normalization $\tilde C$, the pull back of $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ to $\tilde C$ is tame.
\item A lisse $l$-adic sheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}=(\mathcal{F}}\newcommand{\scrG}{\mathcal{G}_n)$ on $X$ is called tame if for all $n$, $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}_n$ are tame on $X$.
\item A lisse $l$-adic sheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ on $X$ is said to have ramification bounded by $f:Y\to X$ a finite dominant morphism of normal varieties if $f^*\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ is tame on $Y$.
\end{enumerate}
\end{df}
The following notions of tameness of a branch data are defined in analogy with \cite{Kerz-Schmidt.tame}.
\begin{df}
Let $P$ be a branch data on a normal variety $X$.
\begin{enumerate}
\item For a point $x\in X$ of codimension at least one, $P$ is called numerically-tame at $x$ if the inertia group $I(P(x)/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{X,x})$ is of order prime to $p$. The branch data $P$ is called numerically-tame if $P$ is numerically tame for all points $x\in X$ of codimension at least one. It is enough to check numerically-tame for all closed points.
\item For a closed point $x\in X$, $P$ is called curve-tame at $x$ if the following holds: For any codimension one prime ideal $\scrp$ in $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$ not in $\BL(P)$ and for any codimension one prime ideal $\scrq$ in the integral closure $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{P(x)}$ of $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$ in $P(x)$ lying above $\scrp$, let $R$ and $S$ be the normalization of $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}/\scrp$ and $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{P(x)}/\scrq$ respectively. Then $S/R$ is at most tamely ramified extension. The branch data $P$ is called curve-tame if it is curve-tame for all closed points $x\in X$.
\end{enumerate}
\end{df}
\begin{pro}
Let $X$ be a proper normal variety over $k$ and $f:Y\to X$ be a Galois cover which is \'etale over $X^o$ an open subset of regular locus of $X$. The branch data $B_f$ is curve-tame iff $f$ is curve-tame.
\end{pro}
\begin{proof}
Assume $f$ is curve-tame. Let $x\in X$ be a closed point. Let $\scrp$ be a codimension one prime ideal of $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$ not in $\BL(B_f)$ and $\scrq$ be a codimension one prime ideal in the integral closure $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{B_f(x)}$ of $\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}$ in $B_f(x)$ lying above $\scrp$. Then $\scrp$ defines an integral curve $C$ in $X$ passing through $x$ which intersects $X^o$ and $C$ is unibranched at $x$. Let $\tilde C$ be the normalization of $C$ and $\tilde x$ be the point in $\tilde C$ lying above $x\in C$. Let $Y_C= \widetilde{ Y\times_X \tilde C}$ be the normalized fiber product. Since $f$ is curve-tame, $Y_C \to \tilde C$ is at most tamely ramified. Note that there exists $y\in Y$ lying above $x$ such that $\widehat\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Y,y}=\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{B_f(x)}$. The normalization $S$ of $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{Y,y}/\scrq$ is same as $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{D,z}$ where $D$ is a connected component of $Y_C$ and $z$ is a point on $Y_C$ lying above $(y,\tilde x)$ in the fiber product. Since $Y_C \to \tilde C$ is at most tamely ramified, the extension $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{D,z}/\widehat\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\tilde C,\tilde x}$ is at most tamely ramified. But $\widehat\mathcal{O}} \newcommand{\cP}{\mathcal{P}_{\tilde C,\tilde x}$ is the normalization of $\widehat \mathcal{O}} \newcommand{\cP}{\mathcal{P}_{X,x}/\scrp$. Hence $B_f$ is curve tame at $x$.
The converse is also a translation between algebra and geometry and follows after noting that the tameness of ramification does not change when passed to completion.
\end{proof}
The following result is a direct consequence of \cite[Theorem 5.3, Theorem 5.4]{Kerz-Schmidt.tame}.
\begin{pro}\label{tame.covers.equivalence}
Let $(X,P)$ be a proper formal orbifold with $P$ a numerically-tame branch data and $X^o=X\setminus \BL(P)$ regular. Let $f:(Y,O)\to(X,P)$ be an \'etale Galois cover. Then $f:Y\to X$ is curve-tame. In other words $P$ is curve tame.
The converse hold if $X$ is regular and $\BL(P)$ is a normal crossing divisor.
\end{pro}
\begin{proof}
The cover $f:(Y,O)\to (X,P)$ is an \'etale cover implies that $f:Y\to X$ is \'etale over $X^o$ and numerically tamely ramified cover w.r.t to the normal compactification $X$. Now the result follows from \cite[Theorem 5.3, Theorem 5.4]{Kerz-Schmidt.tame}
\end{proof}
\begin{pro}
Let $X$ be a normal connected proper variety and $X^o$ be an open subset of the regular locus of $X$. Let $f:Y\to X$ be a Galois cover \'etale over $X^o$. Any finite locally constant $l$-adic sheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ on a geometric formal orbifold $(X,P)$ where $P\ge B_f$ with $\BL(P)\cap X^o=\emptyset$ and $P(x)/B_f(x)$ at most curve tamely ramified for all closed points $x\in X$ restricts to a locally constant finite $l$-adic sheaf on $X^o$ whose ramification is bounded by $f$.
\end{pro}
\begin{proof}
Let $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o=\mathcal{F}}\newcommand{\scrG}{\mathcal{G}|_{X^o}$. Let $g:(Z,O)\to (X,P)$ be an \'etale cover such that $g^*\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ is a constant sheaf. Let $(W,O)$ be the fiber product of $g$ and $f:(Y,f^*P)\to(X,P)$ and $h:(W,O)\to (Y,f^*P)$ be the projection map. Note that $h$ is \'etale and $f^*P$ is a curve-tame branch data since $P(x)/B_f(x)$ is curve-tamely ramified for all $x\in X$. So $h:W\to Y$ is a curve-tamely ramified cover. Now $f^*\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ is a locally constant sheaf on $Y^o=f^{-1}(X^o)$ and $h^*f^*\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o=g^*\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ is a constant sheaf. Hence $f^*\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ is tame $l$-adic sheaf.
\end{proof}
The converse also holds.
\begin{pro}
Let $X$ be a normal connected proper variety and $X^o$ be an open subset of the regular locus of $X$. Let $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ be a locally constant finite $l$-adic sheaf on $X^o$ whose ramification is bounded by a Galois cover $f:Y\to X$ which is \'etale over $X^o$. Let $B_f$ be the branch data on $X$ associated to $f$. Then $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ extends to a finite locally constant $l$-adic sheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ on $(X,P)$ for some geometric branch data $P\ge B_f$ with $\BL(P)\cap X^o=\emptyset$ and $P(x)/B_f(x)$ at most curve-tamely ramified for all closed points $x\in X$.
\end{pro}
\begin{proof}
By Proposition \ref{l-adicsheaf.Galois-repr} a finite locally constant $l$-adic sheaf $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ on $X^o$ correspond to a continuous representation $\rho:\pi_1(X^o,x)\to \Aut(\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o_x)$. Since ramification of $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ is bounded by $f$, $f^*\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ is tame finite locally constant sheaf. So there exists a finite curve-tamely ramified Galois cover $h':Y'\to Y$ \'etale over $X^o$ such that $h^*f^*\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ is a constant sheaf. Let $g:Z\to X$ be the Galois closure of $f\circ h': Y'\to X$. Then $g$ is \'etale over $X^o$ and the natural map $h:Z\to Y$ is curve tamely ramified (being compositum of covers isomorphic to $h':Y'\to Y$ which which is curve-tamely ramified). Let $P=B_g$ then $g:(Z,O)\to (X,P)$ is \'etale, $P$ is a geometric branch data, $\BL(P)\cap X^o=\emptyset$, $P\ge B_f$ and $\rho$ factors through $\pi_1((X,P),x)$. Let $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}$ be the extension of $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ to $(X,P)$ (obtained from Proposition \ref{l-adicsheaf.Galois-repr}). The extension $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Z,z}/\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Y,h(z)}$ is at most curve-tamely ramified for all closed points $z\in Z$ since $h$ is curve-tamely ramified. But $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Z,z}=P(g(z))$ and $\mathcal{K}} \newcommand{\cmm}{\mathrm{m}_{Y,h(z)}=B_f(f(h(z)))=B_f(g(z))$, so $P(x)/B_f(x)$ is at most curve-tamely ramified for all closed points $x\in X$.
\end{proof}
\begin{cor} \label{lisse-bounded-ramification}
Let $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ be a lisse $l$-adic sheaf on $X^o$. Let $X$ be a normal compactification of $X^o$. For $i=1,2$ let $f_i:Y_i\to X$ be Galois covers of normal varieties \'etale over $X^o$ such that $Q_1B_{f_1}=Q_2B_{f_2}$ where $Q_1$ and $Q_2$ are curve-tame branch data on $X$ with branch locus disjoint with $X^o$. Then the ramification of $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o$ is bounded by $f_1$ iff it is bounded by $f_2$.
\end{cor}
\begin{proof}
Let $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o=(\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o_n)_{n\ge 0}$ where $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o_n$ are compatible finite locally constant $l$-adic sheaves. For $i=1,2$, by the above proposition the ramification of $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o_n$ is bounded by $f_i$ iff $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o_n$ extends to a locally constant sheaf on $(X,P)$ for some $P\ge B_{f_i}$ with $\BL(P)\cap X^o=\empty$ and $P(x)/B_{f_i}(x)$ at most tamely ramified for all $x\in X$. Since $Q_1$ and $Q_2$ are tame branch data on $X$, for $i=1,2$, $P(x)Q_i(x)/B_{f_i}(x)Q_i(x)$ is at most tamely ramified iff $P(x)/B_{f_i}(x)$ is at most tamely ramified for all $x\in X$. Since $Q_1B_{f_1}=Q_2B_{f_2}$ we obtain that $\mathcal{F}}\newcommand{\scrG}{\mathcal{G}^o_n$ is bounded by $f_1$ iff it is bounded by $f_2$.
\end{proof}
In particular the above means that the local property at the boundary of an \'etale morphism $f:Y^o\to X^o$ decides whether an $l$-adic lisse sheaf on $X^o$ has ramification bounded by $f$.
|
\section{Computing TPS Coefficients}
\label{sec:TPS}
Given a regular grid points $\{\bm{x}_i\}$ and deformed grid points $\{\bm{x}'_i\}$, $i = 1, \dots, K^2$, the TPS transformation from the regular grid coordinate frame to the deformed grid coordinate frame for the $x$-coordinates is given by
\begin{align}
T_{\theta_x}(\bm{x}) &= \sum_{j = 0}^3 a^x_j\phi_j(\bm{x}) +
\sum_{i=1}^{K^2}w^x_i U(||\bm{x}, \bm{x}_i||), \label{eq:1} \\
\text{s.t.}\quad& \sum_{i=1}^{K^2}w^x_i = 0,\quad \sum_{j=1}^2\sum_{i=1}^{K^2}w^x_ix_j = 0,\nonumber
\end{align}
where $\phi_0 = 1$, $\phi_j(\bm{x}_i) = x_j$, $U(r) = r^2\log r^2$. A similar transformation may be expressed for the $y$-coordinate, denoted $T_{\theta_y}(\bm{x})$, with coefficients $\bm{w}^y$ and $\bm{a}^y$. The final transformation is $T_\theta(\bm{x}) = [T_{\theta_x}(\bm{x}), T_{\theta_y}(\bm{x})]$. With the interpolation conditions $T_\theta(\bm{x}_i) = \bm{x}'_i$, we can write the TPS coefficients $\theta =
\begin{pmatrix}
\bm{w}^x & \bm{w}^y\\
\bm{a}^x & \bm{a}^y
\end{pmatrix}$ as the solution to a system of linear equations:
\begin{equation}
\label{eq:linsys}
L \theta = \begin{pmatrix}
\bm{x}' \\ 0
\end{pmatrix},
\end{equation}
where
$ L = \begin{pmatrix} K & P \\ P^T & 0 \end{pmatrix}$, $K_{ij} = U(||\bm{x}_i - \bm{x}_j||)$ and row $i$ of $P$ is $(1, x_i, y_i)$. As discussed in \cite{bookstein}, $L$ is non-singular, invertible and only needs to be computed once, since the regular grid $\bm{x}$ is fixed for our application. Thus, computing the TPS coefficients from a deformed grid is a linear operation $\theta = L^{-1}\bm{x}'_i$ with weights, $L^{-1}$, computed once in the beginning of the training.
\section{Conclusions and Future Work}
\vspace{-0.2cm}
We introduce a framework for matching and reconstruction in fine-grained datasets that avoids the expense and scalability challenges of part annotations.
The core of our approach is a novel deep learning \new{architecture}
that predicts a function to warp one object into another. We show that our network can be trained without supervised part annotations by exploiting the structure of fine-grained datasets and use its output as a spatial prior for accurate matching.
Our approach achieves significant improvements over prior state-of-the-art without using part annotations and we show reconstructions of similar quality as supervised methods. Key challenges for future work are to determine optimal subsets of images for reconstruction and a good order for adding images that allows incremental reconstruction with bundle adjustment.
\vspace{-0.2cm}
\paragraph{Acknowledgments}
This work was part of A.~Kanazawa's internship at NEC Labs America, in
Cupertino. A.~Kanazawa and D.~Jacobs were also supported by the National Science
Foundation under Grant No. 1526234.
\section{Experiments}
\label{sec:experiments}
\vspace{-0.2cm}
We perform experiments on the CUB-200-2011 dataset which contains 11788 images
of 200 bird categories, with 15 parts annotated \cite{Wah}. We
reconstruct without part annotation, assuming
objects are localized within a bounding box. We quantitatively
evaluate our matches using and extending the part annotations. \new{Next, we evaluate
the effectiveness of WarpNet as a spatial prior} and analyze the choice of transformations for creating the artificial training dataset. Finally, we demonstrate the efficacy of our framework with several examples of unsupervised single-view reconstruction.
\subsection{Experimental Details}
\label{exp}
\vspace{-0.2cm}
We create the pose graph of \cite{Krause} using the \texttt{conv4} feature of AlexNet trained on ILSVRC2012 \cite{Alex}. For creating the artificial dataset, we only use the training data ($\sim$6000 images) and create $m=9$ copies of each image using our exemplar-TPS.
We resize all images to $224 \times 224$.
This results in approximately 120k image pairs, each with $n = 100$ point correspondences. Following \cite{Dosovitskiy}, we apply spatial and chromatic data augmentation on-the-fly during training.
We use the VGG-M architecture of \cite{Chatfield} until the \texttt{pool5} layer as the feature extraction component of WarpNet. The point transformer consists of C512-C256-F1024-D-Op using the notation of \cite{Pulkit}. Both convolutional layers use 3x3 kernel, stride 1 with no padding, with ReLU non-linearity. The output layer is a regressor on the grid coordinates, with grid size $K=10$. The feature extraction weights are initialized with weights pre-trained on the ILSVRC classification task, following prior state-of-the-art for correspondence \cite{jlong}.
For matching and reconstruction, images are resized with aspect ratio intact and the smallest side $224$ pixels. We uniformly sample points on the foreground with a stride of 8 as keypoints for matching. For all experiments we use L2-normalized \texttt{conv4} features extracted at the keypoints using the hole algorithm \cite{Chen} for computing the appearance term in \eqref{eq:score}. Hyperparameters used for matching are $\sigma_f=1.75$, $\sigma_w=18$, $\lambda=0.3$, tuned using the artificial dataset.
\subsection{Match Evaluation}
\vspace{-0.2cm}
We compare our approach with ILSVRC pre-trained VGG-M \texttt{conv4} \cite{Chatfield}, SIFT at radius 8 \cite{lowe2004} and matches from the deformable spatial pyramid (DSP) \cite{Jaechul}.
Only the appearance term in \eqref{eq:score} is used for computing matches with
VGG-M \texttt{conv4} and SIFT. For computing the matches with DSP, we mask out
the background prior to extracting SIFT features following \cite{VVN} and only
keep matches of the keypoints. For this experiment, the set of keypoints to
match includes the locations of annotated parts.
\new{In order to evaluate WarpNet as a stand-alone learned spatial prior, we compare WarpNet with DSP by replacing the
SIFT features in DSP with VGG features. We call this method \emph{VGG+DSP}. We
further evaluate WarpNet against the original DSP by using WarpNet as a spatial
prior for SIFT matches, where the unary term $d_f$ in \eqref{eq:score} is computed with SIFT features. We call
this method \emph{SIFT+WarpNet}.}
\new{As discussed in Section \ref{sec:making}, the only supervision required in
training WarpNet is the segmentation mask to mine exemplar-TPS
transformations. We also evaluate the robustness of WarpNet using co-segmentation outputs of \cite{Krause}, called
\emph{VGG+coseg}.}
\vspace{-0.4cm}
\paragraph{Test set}
We evaluate on 5000 image pairs that are within 3 nearest neighbors apart on the pose graph, comprising more than 50k ground truth matches. \footnote{Please see supplementary materials for results on a test set with 1-nearest neighbors, where we observe similar trends but with higher PCKs.}
Due to the unsupervised nature of the pose graph, these pairs exhibit significant articulation, viewpoint and appearance variations (see Figures \ref{fig:open}, \ref{fig:networkout}).
We remove severely occluded pairs with less than 7 parts visible in both images and pairs whose TPS warp computed from part annotations have very high bending energy. None of the test images were used to train WarpNet.
\vspace{-0.4cm}
\paragraph{Evaluation metrics}
We evaluate the accuracy of matches with the percentage of correct keypoints (PCK) metric \cite{Yang}, where a match is considered correct if the predicted point is within $\alpha * L$ of the ground-truth correspondence.
Following \cite{Pulkit}, we chose $L$ to be the mean diagonal length of the two images.
We also compute the precision-recall (PR) curve adopting the procedure of \cite{Mikolajczyk}. A match is considered a true positive within a radius $\alpha = 0.05$, otherwise it is a false positive.
In this setup, a recall of 1 is obtained only if all the matches retrieved are correct, that is, $100\%$ $\alpha$-PCK. We compute PR curves using the ratio-test values described in Section \ref{sec:matchcost} for ranking the matches and report AP. For DSP, we use its matching cost for ranking instead of the ratios, since second closest matches are not available.
\begin{figure}[!!t]
\subfloat[]{\label{fig:pr1}\hspace{0em}\includegraphics[width=0.5\linewidth]{figures/for_camready/pr_curve_camready_all.eps}}
\subfloat[]{\label{fig:pr2}\includegraphics[width=0.5\linewidth]{figures/for_camready/pr_curve_pseudo-gt_camready_all.eps}}
\vspace{-0.3cm}
\caption{\small Precision-Recall curves for matching points between neighboring images on the pose graph. We evaluate points with \protect\subref{fig:pr1} human-annotated correspondences and \protect\subref{fig:pr2} expanded pseudo-ground-truth correspondences.}
\label{fig:pr}
\vspace{-0.3cm}
\end{figure}
\vspace{-0.4cm}
\paragraph{Results}
Figure \ref{fig:pr}\subref{fig:pr1} shows the obtained PR curves. WarpNet
achieves an AP of $53.4\%$, an $13.6\%$ increase over matches using just the
appearance feature of VGG-M \texttt{conv4}. WarpNet achieves a much higher
recall due to its spatial prior, learned without using any part annotations. As
a side note, \texttt{conv4} features of WarpNet alone achieve very similar
performance to the VGG-M \texttt{conv4}.
\new{In all cases, WarpNet outperforms DSP as a spatial prior and changing SIFT
to VGG features yields around 5\% improvement in the final recall. \emph{WarpNet-coseg} still outperforms the baseline
VGG-M by $10.8\%$, showing our approach is applicable even without ground truth segmentations. }
Figure \ref{fig:pck}\subref{fig:pck1} shows the PCK as a function of $\alpha$,
where WarpNet consistently outperforms other methods. We observe that VGG-M
\texttt{conv4} and DSP perform similarly, showing that while \new{DSP obtains
low recall at high precision,
its overall} match quality is similar to CNN features, an observation in line with \cite{VVN}. Since only high precision matches are
useful for reconstruction where outliers need to be avoided, we show the same
curves thresholded at $85\%$ precision in Figure \ref{fig:pck}\subref{fig:pck2}
for VGG-M and our method. \new{Note that some methods in black have zero recall at this
precision.} The growing gap between WarpNet and VGG-M \texttt{conv4} as $\alpha$ increases suggests that, unlike WarpNet, appearance features alone make grossly wrong matches (see Figures \ref{fig:open} and \ref{fig:qual_match}).
\begin{figure}[!!t]
\centering
\subfloat[]{\label{fig:pck1}\hspace{0em}
\includegraphics[width=0.45\linewidth]{figures/for_camready/mean_pck_over_alpha_cleaneduntil3_cameready_ordered.eps}}
\subfloat[]{\label{fig:pck2}\includegraphics[width=0.45\linewidth]{figures/for_camready/mean_pck_at_85_cleaneduntil3_camready.eps}}
\vspace{-0.3cm}
\caption{\small PCK (higher the better) over varying definition of correctness $\alpha$. \protect\subref{fig:pck1} Mean PCK of all retrieved matches regardless of ratio score. \protect\subref{fig:pck2} Mean PCK with matches thresholded at $85\%$ precision, which are the matches used for reconstruction.}
\label{fig:pck}
\vspace{-0.3cm}
\end{figure}
\vspace{-0.4cm}
\paragraph{Expanding the set of part annotations}
\begin{figure}[!!t]
\begin{center}
\includegraphics[width=0.8\linewidth]{figures/tri1.eps}
\end{center}
\vspace{-0.5cm}
\caption{\small Illustration of the pseudo-gt correspondences. We triangulate each image using the annotated keypoints (colored points). The match for the big red dot in the left image is found by looking at points within the same triangle (small pink dots) in the right image and picking the closest point in terms of barycentric coordinates.
}
\label{fig:pseudo}
\vspace{-0.3cm}
\end{figure}
A caveat of the CUB-200-2011 for our task is that part annotations are
sparse and concentrated on semantically distinct parts such as eyes
and beaks around the head region, with only four points on the bird
body that are often not all visible. To investigate matching
performance more densely, we carefully expand the ground-truth matches
using the annotated parts. This process is illustrated in Figure
\ref{fig:pseudo}. Given a pair of images $I_1$ and $I_2$, we Delaunay
triangulate each image independently using the parts visible in both
as vertices. For a point $u$ within a triangle in $I_1$, we consider
points in $I_2$ that are within the \emph{same} triangle as possible
candidates (shown as pink dots in Figure \ref{fig:pseudo}), find the
point that is closest to $u$ in terms of barycentric coordinates and
accept this as a new pseudo ground-truth match if the distance is less than $0.1$. Figure \ref{fig:pr}\subref{fig:pr2} shows the PR curve obtained using the pseudo-ground truth matches (in addition to the annotated parts). We see the same trends as Figure \ref{fig:pr}\subref{fig:pr1}, but with a wider gap between the baselines and our method. This is reasonable given that bird bodies usually consist of flat or repeated textures that are challenging to match with local appearances alone, highlighting the efficacy of WarpNet's spatial prior.
\subsection{Choice of Transformations}
\vspace{-0.2cm}
\begin{figure}
\centering
\subfloat[PR]{\label{fig:aff1}\hspace{0em}\includegraphics[width=0.45\linewidth]{figures/for_camready/pr_curve_camready_waffine.eps}}
\subfloat[PCK@85\%]{\label{fig:aff2}\includegraphics[width=0.45\linewidth]{figures/for_camready/mean_pck_at_85_cleaneduntil3_camready_waffine.eps}}
\vspace{-0.3cm}
\caption{\small Comparing results for WarpNet trained on artificial data created using affine-spatial transformations with \protect\subref{fig:aff1} PR curves and \protect\subref{fig:aff2} PCK over $\alpha$. WarpNet trained with exemplar-TPS is more effective in terms of recall and precision.}
\label{fig:affineNet}
\vspace{-0.4cm}
\end{figure}
We now analyze the choice of exemplar TPS transformations for creating the artificial dataset. We train another WarpNet under the same settings, but on an artificial dataset created using only affine spatial transformations, which we refer to as AffineNet. Note that AffineNet's output is still a TPS transformation, thus, it has the same capacity as the original WarpNet. Figure \ref{fig:affineNet}\subref{fig:aff1} shows the PR curve of AffineNet in comparison to WarpNet and VGG-M \texttt{conv4}. WarpNet outperforms AffineNet in all aspects. While AffineNet has a higher final recall (that is PCK of all matches) than VGG-M \texttt{conv4}, its recall at high precision is slightly lower than that of VGG-M \texttt{conv4}. This is highlighted in Figure \ref{fig:affineNet}\subref{fig:aff2}, which shows PCK of matches at $85\%$ precision over $\alpha$, where AffineNet performs on par with VGG-M \texttt{conv4}. This indicates that the warps predicted by AffineNet are helpful in a general sense, but not precise enough to improve the recall at high precision. This experiment shows that using exemplar-TPS transformations for creating the artificial dataset is critical for training a useful WarpNet.
\begin{figure*}
\begin{center}
\vspace{-0.1cm}
\includegraphics[width=0.93\linewidth]{figures/reconst_wbox.pdf}
\end{center}
\vspace{-0.5cm}
\caption{\small Sample reconstructions showing 3 views for each
method: The camera viewpoint followed by the $45^{\circ}$ azimuth in
counter-clockwise direction (top right) and $45^{\circ}$ elevation
(bottom right). Colors show the depth where yellow is closer and
blue is farther. The supervised method uses the spatial prior computed from annotated part correspondences, which can be seen as an upper bound. No part correspondences were used for the last three methods. WarpNet consistently obtains reconstructions most similar to the supervised method.}
\label{fig:reconst}
\vspace{-0.4cm}
\end{figure*}
\subsection{Single-view Object Reconstruction}
\vspace{-0.2cm}
We compare our method with three other matching methods. One is a supervised
matching approach similar to \cite{VVN}, where the network predicted TPS warp
$T_\theta$ in \eqref{eq:warpcost} is replaced by the supervised TPS warp
computed using the annotated keypoints. We call this approach
\texttt{supervised} and it is an upper-bound to our method since ground-truth
part annotations are used for reconstruction. We also perform reconstructions
with VGG-M \texttt{conv4} features alone and DSP. We do not include the mirrored
image as another viewpoint of the target object, since bilateral symmetry does
not hold for articulated objects. For post-processing we use the xy-snapping method proposed in \cite{VVN}, which only uses the $z$-component from the reconstructed shape, while fixing the $x$, $y$ coordinates. We do not resample the target objects multiple times prior to factorization since it did not seem to make a difference.
Figure \ref{fig:reconst} shows reconstructions for various types of birds using the four methods from three viewpoints: camera view, $45^{\circ}$ azimuth and $45^{\circ}$ elevation. The colors indicate depth values (yellow is close, blue is far), with range fixed across all methods. WarpNet produces reconstructions that are most consistent with the \texttt{supervised} approach. Reconstructions from VGG-M and DSP are noisy due to errors in matching and often produce extreme outlier points that had to be clipped for ease of visualization. Articulated parts such as tails and wings are particularly challenging to match, where VGG-M and DSP often fail to recover consistent depths.
A weakness of our method is that the TPS prior may sometimes hallucinate birds of similar pose even with wide baseline. This may be avoided by better choice of images for reconstruction. Please see supplementary material for more results, qualitative matches and reconstruction videos.
\section{Introduction}
\begin{figure}
\begin{center}
\includegraphics[width=\linewidth]{figures/opening3.pdf}
\end{center}
\vspace{-0.5cm}
\caption{\small Given a single image of an object, we propose a novel deep learning framework for obtaining keypoint matches to other objects in a fine-grained dataset, without using any part annotations. The output of our network is used as spatial prior for matching across variations in appearance, pose and articulation (bottom), which is not possible with appearance features alone (top). Our match quality is high enough to be propagated across images to be used for
\new{single-view reconstruction without using any manually annotated keypoints} (right).
}
\label{fig:open}
\vspace{-0.3cm}
\end{figure}
\begin{figure*}
\begin{center}
\includegraphics[width=\linewidth]{figures/overview_camready.pdf}
\end{center}
\vspace{-0.5cm}
\caption{\small Overview of our framework. (a) Lacking part annotations, we
exploit the fine-grained dataset to create artificial correspondences. (b)
These are used to train our novel deep learning \new{architecture}
that learns to warp one object into another. (c) The output of the network is used as a spatial prior to match across appearance and shape variations. (d) Our high-quality matches can be propagated across the dataset. We use the WarpNet output and the structure of fine-grained categories to perform single-view reconstruction without part annotations.}
\label{fig:overview}
\vspace{-0.3cm}
\end{figure*}
Reconstructing an object \new{from} a single image is a significant challenge, that can be tackled by matching keypoints to other instances in a fine-grained dataset. However, such datasets exhibit large intra-class shape variations or inter-class appearance variations, which cannot be handled by traditional features such as SIFT \cite{lowe2004}.
Recently, methods have been proposed to match instances across categories,
relying on supervision in the form of part (keypoint) annotations
\cite{VVN,Kar,Vincente} or 3D CAD models \cite{Bao,Cashman} to augment
appearance information with shape priors. Such annotations are labor-intensive,
thus, too sparse for reconstruction and not scalable. Further, it can be quite difficult
to obtain human-labeled annotations for parts that are not nameable.
In contrast, this paper presents a framework to match images of objects with some degree of non-rigidity and articulation, across category and pose variations, without requiring supervised annotations. We then present an approach to the challenging novel problem of unsupervised single-view object reconstruction.
We postulate that the structure of fine-grained datasets, combined with the power of convolutional neural networks (CNNs), allows matching instances of different categories without supervised annotation. Fine-grained datasets for objects such as birds can be analyzed along two dimensions -- appearance and shape. Instances within the same category that are imaged in different poses can be matched by appearance similarity, while instances with similar pose or viewpoint from different categories can be matched through similarity in global shape. Instances with both appearance and shape variations may then be matched by propagation (Fig. \ref{fig:intuition}). In Section \ref{sec:learning}, we demonstrate a practical realization of this intuition by introducing a deep learning architecture, {\em{WarpNet}}, that learns to warp points on one object into corresponding ones on another (from a possibly different category or pose), without requiring supervised annotations.
WarpNet is a Siamese network that accepts two images as input (Section \ref{sec:architecture}). To overcome the absence of annotated keypoints, our training presents an image and a warped version related by a known thin-plate spline (TPS) transformation, which yields artificial correspondences.
We assume the object bounding box and foreground segmentation are known, which
can be obtained through state-of-the-art segmentation \cite{Chen} or
co-segmentation methods \cite{Krause}. \new{We experiment using both ground truth and co-segmentation outputs.}
In Section \ref{sec:making}, we exploit neighborhood relationships within the dataset through the pose graph of Krause \etal \cite{Krause} to compute exemplar TPS transformations between silhouettes, from which our artificial transformations are sampled.
A point transformer layer inspired by \cite{Jaderberg} is used to compute the warp that aligns keypoints without supervision, which provides a spatial prior for matching (Section \ref{sec:matching}).
We show that WarpNet generalizes well to match real images with distinct shapes and appearances at test time. In particular, it achieves matching accuracy over $13.6\%$ higher than a baseline ILSVRC CNN \cite{Chatfield}.
Establishing matches between a given instance and other objects in the dataset
opens the door to a novel problem -- \new{weakly supervised} reconstruction in fine-grained datasets. Several sub-problems must be solved to achieve this goal, such as match propagation and image subset selection. Prior works such as \cite{VVN,Vincente} approach these sub-problems, but the absence of supervised annotations poses new challenges. In Section \ref{sec:reconstruction}, we suggest ways to overcome them through the use of matches from our WarpNet, the pose graph and heuristics that exploit the structure of fine-grained datasets. We demonstrate reconstructions that are nearly as good as those obtained using supervised annotations and better than those from appearance-only CNNs or unsupervised baselines such as deformable spatial pyramids \cite{Jaechul}.
To summarize, our key contributions are:
\vspace{-0.15cm}
\begin{itemize}
\setlength\itemsep{-0.1cm}
\item A novel deep learning \new{architecture}
, WarpNet, that predicts a warp for establishing correspondences between two input images across category and pose variations.
\item A novel exemplar-driven mechanism to train WarpNet without requiring supervised keypoint annotations.
\item An approach to unsupervised single-view object reconstruction that exploits the structure of the fine-grained dataset to yield reconstructions of birds nearly on par with the method that uses supervised part annotations.
\end{itemize}
\begin{figure}[!!t]
\begin{center}
\includegraphics[width=0.85\linewidth]{figures/intuition.pdf}
\end{center}
\vspace{-0.6cm}
\caption{\small Intuition for matching in fine-grained datasets without supervised point annotations. Matching within a category exploits appearance similarity, while matching instances across related categories is possible through global shape similarity. By propagation, one may match across variations in both appearance and shape.}
\label{fig:intuition}
\vspace{-0.4cm}
\end{figure}
\section{Learning without Part Annotations}
\label{sec:learning}
\vspace{-0.2cm}
We present a deep learning framework, {\emph{WarpNet}}, that learns the correspondence from one image to another without requiring part annotations. Given two images $I_1$ and $I_2$, our network outputs a function that takes points in $I_1$ to points in $I_2$. We parameterize this function as a thin-plate spline (TPS) transformation since it can capture shape deformations well \cite{BelongieSC}. Inspired by Dosovitskiy \etal \cite{Dosovitskiy}, we generate artificial correspondences by applying known transformations to an image. However, our approach is distinct in using the structure afforded by fine-grained datasets and dealing with non-rigidity and articulations. Our network generalizes well to instances of different categories at test time and we use its output as a spatial prior in computing a match between two objects. Figure \ref{fig:overview} gives an overview of our approach. We discuss each step in detail below.
\subsection{Generating Unsupervised Correspondences}
\label{sec:making}
\vspace{-0.1cm}
\begin{figure}[!!t]
\begin{center}
\includegraphics[width=0.9\linewidth]{figures/jitter.png}
\end{center}
\vspace{-0.5cm}
\caption{\small Sample exemplar-TPS warped images used for training our WarpNet. Left: original images, right: artificial versions made by applying exemplar TPS warp + chromatic transformation. Notice changes in shape and articulations at the head and the tail. }
\label{fig:jitter}
\vspace{-0.3cm}
\end{figure}
Since we do not have annotated point correspondences, we create artificial ones by applying random spatial and chromatic transformations to images. The key requirement is that the spatial transformations applied are complex enough to learn meaningful correspondences, while producing transformed images that are reflective of actual image pairs to match at test time. For instance, affine transformations are not expressive enough to capture non-rigid deformations and articulations in birds. Instead, we use TPS transformations and exploit the fine-grained dataset to generate exemplar warps that span a realistic range of transformations.
We use the pose graph of Krause \etal \cite{Krause}, whose edge weights are determined by the cosine distance of the fourth-layer of a pre-trained ILSVRC CNN, which captures abstract concepts such as class-independent shape.
We compute shape context TPS warps \cite{BelongieSC} between the silhouettes of images that are within 3 nearest-neighbors apart on the pose graph.
We sort the TPS warps using the mean of their bending and affine energy, retaining only those between the 50th and 90th percentiles to avoid warps that are too trivial or too drastic. We create $m$ transformed versions of every image by sampling from this set of TPS warps. We sample $n$ points uniformly on the foreground, which we use as correspondences. Figure \ref{fig:jitter} shows the effect of transformations sampled from the exemplar-TPS warps. The images on the left are the originals and the ones on the right are transformed versions. Notice how the transformation induces changes in shape and articulations around the head and the tail, which validates the utility of our exemplar TPS warps.
\subsection{WarpNet Architecture}
\label{sec:architecture}
\vspace{-0.1cm}
Our proposed WarpNet is a Siamese network \cite{chopra} that takes two images related by an exemplar TPS transformation, $I_1$ and $I_2$, along with the corresponding $n$ keypoint locations, as inputs during training (at test time, the input consists only of two images from possibly different categories and poses that must be matched). The main objective of WarpNet is to compute a function that warps points $\bm{p}_2$ in $I_2$ to image coordinates in $I_1$, such that after warping the L2 distance to the corresponding points $\bm{p}_1$ in $I_1$ is minimized. Figure \ref{fig:network} illustrates the architecture of WarpNet.
First, the input images are passed through convolution layers with tied weights. The extracted features are then combined by element-wise subtraction of the feature maps. We subtract rather than concatenate the feature maps along the channels, since concatenation significantly increases the number of parameters in the network making it unstable to train. The combined feature maps are passed through a point transformer, similar to \cite{Jaderberg}, which regresses on the $(x,y)$ coordinates of a deformed $K\times K$ grid. The output grid, normalized to a range of $[-1, 1]\times [-1,1]$, acts as the control points for computing a grid-based TPS transformation from $I_2$ to $I_1$. This involves solving a system of linear equations, handled by the TPS layer. Please see the supplementary materials for details. The predicted TPS transformation is applied to the keypoints of $I_2$ generating the transformed version $T_\theta(\bm{p}_2)$, which finally gets sent to the L2 loss layer along with $\bm{p}_1$. Since every step consist of linear operations, the whole network can be trained with backpropagation.
\begin{figure}
\begin{center}
\includegraphics[width=\linewidth]{figures/arch.pdf}
\end{center}
\vspace{-0.4cm}
\caption{\small WarpNet architecture. Visual features are extracted from two input images using a Siamese CNN. They are combined to predict a deformed grid that parameterizes a TPS transformation. The network objective is to minimize the distance between corresponding points $\bm{p}_1$ and $\bm{p}_2$ of the image pair after applying the predicted transformation to $\bm{p}_2$. }
\label{fig:network}
\vspace{-0.4cm}
\end{figure}
We implicitly train the warp parameters in terms of distance between
corresponding points rather than direct supervision against the TPS warp
coefficients. This provides a natural distance between warps, where we can train the network without knowing the exact transformation parameters used.
Figure \ref{fig:networkout} illustrates the output of the trained network given two real images as input, denoted source and target. Despite the fact that the network has never seen objects of different instances, it is able to compute warps between the two objects. Note that WarpNet accounts for variations in shape (fat to skinny, small to large birds), articulation (such as the orientation of the head or the tail) and appearance.
\begin{figure}
\begin{center}
\includegraphics[width=0.85\linewidth]{figures/tpsout.pdf}
\end{center}
\vspace{-0.4cm}
\caption{\small Visualizations of the network output. WarpNet takes two images, source and target, as inputs and produces a 10x10 deformed lattice (last column) that defines a TPS warp from target to source. The third column shows the warped source image according to the network output. Notice how the network accounts for articulations at the tail and the head as well as differences in shape of the birds. WarpNet is trained in an unsupervised manner and none of these images were seen by the network during training.}
\label{fig:networkout}
\vspace{-0.4cm}
\end{figure}
\section{Matching and Reconstruction}
\label{sec:matching}
\vspace{-0.1cm}
\subsection{Matching with WarpNet}
\label{sec:matchcost}
\vspace{-0.2cm}
Given two images $I_i$ and $I_j$, a match for a point $u_i$ in $I_i$ is the most similar point $v_j$ in $I_j$ using the similarity score consisting of an appearance term and a spatial term:
\vspace{\eqs}
\begin{equation}
s(u_i, v_j) = \exp \left( \frac{-d_f(u_i, v_j)}{\sigma_f} \right) + \lambda \exp \left( \frac{-d_w(u_i, v_j)}{\sigma_w} \right),
\label{eq:score}
\vspace{\eqs}
\end{equation}
where $d_f(u,v)$ is the L2 distance of appearance features extracted at $u_i$ and $v_j$, while $d_w$ is a symmetric spatial prior:
\vspace{\eqs}
\begin{equation}
d_w(u,v) = \frac{1}{2} (||\bm{x}_i^u -T_{\theta_{ij}}(\bm{x}_j^v)|| +
||\bm{x}_j^v - T_{\theta_{ji}}(\bm{x}_i^u)||).
\label{eq:warpcost}
\vspace{\eqs}
\end{equation}
We use WarpNet to compute $T_{\theta_{\cdot, \cdot}}$ in both directions.
The matches are then ranked by the ratio-test strategy
\cite{lowe2004}, which allows discarding points in $I_i$ that are similar to many other points in $I_j$. Since the keypoints are extracted densely on the foreground, we compute the similarity score ratio between the first and second nearest neighbors that are at least 10 pixels away. Figure \ref{fig:qual_match} shows a few qualitative matching results comparing the baseline CNN and WarpNet.
\begin{figure}[!!t]
\begin{center}
\includegraphics[width=0.85\linewidth]{figures/qual_match2.pdf}
\end{center}
\vspace{-0.5cm}
\caption{\small Sample matches obtained by ILSVRC trained CNN versus WarpNet, where WarpNet's relative robustness to variations in appearance, pose and articulation may be noted.}
\label{fig:qual_match}
\vspace{-0.5cm}
\end{figure}
\subsection{Single-View Object Reconstruction}
\label{sec:reconstruction}
\vspace{-0.2cm}
Obtaining good matches is a critical first step towards 3D reconstruction. While
single-view 3D reconstruction methods in the past have relied on expensive
supervised inputs such as part annotations or CAD models, our matching enables a
first approach towards a challenging new problem, namely, \new{part annotation
free} single-view reconstruction. We discuss initial approaches to variants of existing supervised methods or structure from motion (SFM) pipelines that may be used to solve this problem without requiring annotations.
\vspace{-0.4cm}
\paragraph{Propagating correspondences}
In the CUB-200-2011 dataset, there are only 60 images for each
category. Moreover, birds are often imaged from preferred viewpoints,
but it is critical for reconstruction to obtain matches across a
well-distributed set of viewpoints. On the other hand, deformations may be very high even within a category (open wings as opposed to closed), which makes straightforward matching within a category challenging. Inspired by the work of Carreira \etal \cite{VVN}, we use a shortest path method to propagate matches across objects of similar shapes in the dataset, in order to obtain a denser set of tracks. However, note that we lack the initial set of point annotations as well as the camera poses obtained through part annotations in \cite{VVN,Vincente}, who also manually select a subset of keypoints to eliminate articulations. Instead, we determine unsupervised matches purely through our WarpNet and rely on the pose graph to determine nearest neighbors for propagation.
\vspace{-0.4cm}
\paragraph{Choosing a subset for reconstruction}
A key problem we encounter is the choice of images for reconstruction. In previous works on reconstruction within PASCAL VOC \cite{VVN,Vincente}, it has been possible to use the entire dataset since it contains less than 1000 images for birds. In contrast, CUB-200-2011 contains nearly 12000 images, which poses computational challenges and requires greater vigilance against outliers. Moreover, annotations in \cite{VVN,Vincente} preclude the need for algorithmic considerations on baseline or shape variations in choosing the image set. For instance, to reconstruct a sitting bird imaged from a frontal view, we must propagate matches to side views of sitting birds in other categories to ensure a good baseline, while avoiding images of flying birds.
Given a collection of images, several heuristics have been proposed for selecting the right subset or order for multiview rigid-body reconstruction \cite{Snavely,SSS}. However, those are not directly applicable for single-view reconstruction of deformable objects. Instead, we propose three heuristics that utilize the structure of fine-grained bird datasets:
\begin{itemize}
\setlength\itemsep{-0.15cm}
\item Use images from categories that share a keyword (for example, all ``warblers'', or all ``sparrows'').
\item Use images from categories that are related by an ornithological taxonomy, as defined by \cite{BNA}.
\item Use images from the five nearest neighbor subcategories on a similarity tree of bird species \cite{Thomas}.
\vspace{-0.15cm}
\end{itemize}
The above heuristics perform comparably and address the same goal -- introduction of matched keypoints from more than one subcategory to ensure good viewpoint coverage.
\vspace{-0.4cm}
\paragraph{Reconstruction}
Given an image of a target object from one particular class, we consider images from several other categories using one of the above heuristics. We compute pairwise matches at $85\%$ precision threshold between all pairs of images whose distance on the pose graph is less than $4$. We ignore pairs that have less than $50$ surviving matches. We then set up a virtual view network \cite{VVN} to propagate matches across all the selected images.
We use scores from \eqref{eq:score}, bounded between $[0, 1]$, as
weights on the graphs connecting the keypoints. After propagation, we
discard as spurious any propagated matches with shortest path distance
more than $0.4$ and remove all images that have less than $30$ matches
with the target object. We then create the measurement matrix of
tracked keypoints of the target object. We only consider keypoints
visible in at least $10\%$ of the images as stable enough for
reconstruction. We finally send the observation matrix to the rigid
factorization method of \cite{Marques}, which robustly handles missing
data, to obtain 3D shape.\footnote{A rigid factorization suffices to
produce good reconstructions since the dataset is large enough, but
non-rigid methods alternately could be used.}
\section{Related Work}
\vspace{-0.2cm}
\paragraph{Supervised matching}
Several recent approaches use deep learning to learn a similarity metric between image patches in a supervised manner \cite{Xufeng,zagoruyko}. These works focus on matching images of the same instance (for example, the Statue of Liberty \cite{UBCdata}) from various viewpoints, while we match deformable objects of different instances exhibiting a wide variety of appearances. Our task requires semantic understanding of object shape, beyond just local appearance. A CNN framework to predict dense optical flow on general scenes is proposed by \cite{FlowNet}, but in a supervised manner.
Matching or keypoint localization may be improved by augmenting appearance similarity with spatial priors. Supervised methods often use a dataset with labeled parts to obtain a non-parametric prior on keypoint locations \cite{coe,jlong,Tulsiani}. These priors may be learned from data \cite{tompson}, but require supervised part annotations during training. Such annotation is laborious and consequently available only for a few nameable parts, which might be too sparse for reconstruction.
\vspace{-0.4cm}
\paragraph{Unsupervised matching}
Also related to our approach are methods that use unsupervised spatial priors for dense matching \cite{Jaechul,sift-flow}. Unlike our work, these methods are purely geometric and do not learn category-specific semantic properties. Recently, \cite{FlowWeb} proposes an unsupervised approach for dense alignment of image sets. But while their focus is global consistency, our emphasis is on pairwise matching through the WarpNet framework (for which they use flow). Thus, our contribution is complementary and may be used by their framework. We evaluate quantitatively on deformable bird categories, while they use rigid categories on PASCAL.
\vspace{-0.4cm}
\paragraph{Single-view reconstruction}
A new challenge in computer vision is to reconstruct a target object
from a single image, using an image collection of similar objects. The
seminal work of \cite{Vincente} demonstrates the possibility of a solution, but relies on ground truth part annotations to establish correspondences. The subsequent works of \cite{Kar,VVN} take a step further in using part annotations only during training. In contrast, we do not require part annotations at either train or test time.
\vspace{-0.4cm}
\paragraph{CNNs for learning transformations}
Similar to the recent work of \cite{Pulkit}, we use a Siamese network to predict transformations. The key difference is that predicting the ego-motion transformation in \cite{Pulkit} is a pretext for feature learning, while we directly use the predicted transformation as well as its appearance features for matching. Further, they require ground truth transformation parameters in order to train their network, while we use the structure of the fine-grained dataset to generate artificial correspondences and implicitly optimize the parameters.
Finally, rigid transformations in \cite{Pulkit} are discretized in bins and the task is posed as classification, while our network outputs continuous thin-plate spline transformation parameters with a matching objective.
Our architecture is inspired by the recent spatial transformer network of Jaderberg \etal \cite{Jaderberg}, which introduces a deep learning module to predict a spatial transformation. This acts as an attention mechanism driven by a classification objective.
We extend the idea further to predict a warping function that aligns two object instances in an unsupervised manner. Our approach is in line with the recent work of \cite{Dosovitskiy}, which demonstrates that CNNs can be trained without supervised labels by treating an image patch and its transformed versions as a ``surrogate'' class. However similar to \cite{Pulkit}, the unsupervised training objective of classifying the surrogate class is geared towards learning good features, while we show that the output of our network trained by an artificial dataset actually generalizes to matching real image pairs.
|
\section{Introduction}
\par Robust link dimensioning is the periodic task where operators of carrier-class IP networks make provisions for sudden traffic bursts and network failures to assure congestion-free operations. Network operators are required to provision -- in addition to possibly deployed backup capacities in the physical layer -- working capacities with noticeable amounts of \emph{headroom}, i.e., fractions of the capacities that are unused under normal conditions to avoid over-utilization (and thus a degradation of network service quality) in case of a network failure. An essential asset for the calculation of the required headroom is the exact knowledge about the behavior of the control plane in case of sudden events. In the legacy networks this is Open Shortest Path First (OSPF). Today, more and more efforts concentrate on the so-called \emph{hybrid} networking paradigm~\cite{hybrid_1, hybrid_2, hybrid_3, hybrid_4, Brockners, Vissicchio2, tamal_ICC} combining OSPF with Software-Defined Networking (SDN), not the least as it provides advantages of both the legacy- and SDN-based routing.
\par In case of failures, distributed routing protocols, like the legacy OSPF, provide an automatic (autonomous and thus not manipulable) routing convergence and have proven their reliable operation over decades, but require significant over-provisioning of link capacities (e.g., link utilizations of $<50\%$ in the Internet2 backbone~\cite{internet2}). SDN on the other hand provides complete programmability (if desired) that allows for an optimal load-balancing, which in case of failure would require significantly less headroom. Restoration techniques in SDN are to be implemented in the central controller or as an application on top of the controller, like~\cite{ciena-protect}. Therefore, approaches for a hybrid SDN/OSPF control plane appear attractive from the perspective of capacity headroom: they provide the automatic convergence of OSPF, while requiring potentially less link capacity headroom, like in SDN. What the exact benefits of hybrid networking are for fault tolerance, however, has not been studied yet.
\par In this paper, we analyze the problem precisely, and provide a quantitative comparison focused on headroom requirements for various hybrid networks. We study typical hybrid control planes that follow a "ships-passing-in-the-night'' strategy, whereby legacy routing and SDN control paradigms are oblivious to what the other one configures. We additionally consider our in~\cite{divideandconquer} proposed new scheme for hybrid SDN/OSPF operation called \emph{SDN Partitioning}, where SDN switches are used as invisible border nodes to \emph{partition} the OSPF routing domains. In this scheme, SDN nodes \emph{appear} to their legacy neighbors as regular OSPF routers, while they actually act as simple protocol repeaters that forward all OSPF messages to the centralized SDN controller. Based on a new iterative heuristic for fault-tolerant capacity planning, we show that hybrid networking in general requires less headroom than OSPF. In addition, we show that our idea of \emph{SDN Partitioning} requires the least amount of spare capacity compared to legacy protocols or other hybrid schemes, outperformed only by full SDN deployment.
\par The rest of the paper is organized as follows: Section~\ref{relatedwork} discusses the related work. Section~\ref{arch-section} presents the technological background of hybrid networking. The fault-tolerant capacity planning is detailed in Section~\ref{math-section}. Our numerical study is presented in Section~\ref{results-sect} and Section~\ref{conclusions} concludes the paper.
\begin{figure*}[t] \center
\includegraphics[width=1.0\textwidth]{./architectures2.pdf}
\caption{The architectures of the two analyzed control planes: a)~\emph{stacked hybrid} and b)~\emph{SDN Partitioning}.}
\label{arch} \end{figure*}
\section{Related Work and Our Contribution}\label{relatedwork}
The problem of determining a sufficient amount of spare capacities considering network failures is not new and has for instance been solved for circuit switched telecommunication backbone networks in~\cite{alrumaih} based on genetic algorithms. In relationship to our approach, the basic principles and best practices of core network capacity planning are explained in~\cite{cisco_cap_planning}. However, hybrid SDN/OSPF networking wasn't considered. It was discussed in~\cite{Kirstaedter} how the increased resilience requirements of new Internet services in IP backbone networks can be met based on MPLS.
\par Hybrid SDN/OSPF networking has been analyzed and explained to a great extent in~\cite{hybrid_1, hybrid_2, hybrid_3, hybrid_4, Brockners, Vissicchio2, tamal_ICC}, however previous work did not focus on fault tolerance. In a hybrid network, the capability of the SDN controller to insert higher priority rules into the forwarding tables is a powerful new feature which in~\cite{steroids} has been coined as ``policy based routing on steroids''. We refer to this control plane approach as the \emph{stacked hybrid} model. ``Fibbing'', proposed in~\cite{fibbing1} and~\cite{fibbing2}, shares with SDN Partitioning the idea of steering the legacy routing protocol by introducing \emph{fake} information, but differs significantly from our approach regarding the mode of operation. This paper is the first to extend our previous work on SDN Partitioning~\cite{divideandconquer, caria_HPSR, caria_TNSM} with an analysis of the required link capacities for fault tolerant operation.
\section {Background}\label{arch-section}
OSPF is a distributed routing protocol that requires its local implementation in every router. This provides that all routers in the network can exchange topology information, which in turn allows each router to locally determine for each destination the most suitable port to forward packets by processing a shortest path algorithm. OSPF's information updates are referred to as Link State Advertisements (LSAs) and a router participating in OSPF distributes all its topological information by flooding LSAs throughout the entire network. In case of a network failure, the routers adjacent to that failure start flooding the according topology updates. Each router that receives such an update instantly recomputes its routing and reconfigures its packet forwarding accordingly. This process is referred to as OSPF convergence and may take tens of seconds~\cite{ospf_convergence} in large IP networks.
SDN, in contrast, centralizes (logically) the control over the configuration of the routing in the network, i.e., it separates the control plane from the data plane, which allows to substitute complex routers with dumb forwarding boxes. All SDN switches in the network set up an OpenFlow (i.e., control) channel to the central controller to provide their device and connectivity status information and to receive routing configuration rules. All prominent SDN controller implementations provide some sort of northbound interface to provide access to network management applications, which are used by restoration applications like~\cite{ciena-protect}.
Both control plane mechanisms -- the centralized SDN and the distributed OSPF -- are deployed in a hybrid SDN/OSPF network. Figure~\ref{arch} depicts the two analyzed hybrid control architecture, the stacked hybrid (Figure~\ref{arch}a) and SDN Partitioning (Figure~\ref{arch}b). As it can be seen in both architectures, the actual network includes both OSPF and SDN-enabled (i.e., OpenFlow or hybrid) nodes. SDN-enabled nodes are connected to the central SDN controller. Because OSPF's unimpeded functioning is crucial for hybrid operation, the processing of the LSAs must either be performed at the SDN-enabled nodes, which is required in Figure~\ref{arch}a with all hybrid nodes having OSPF fully implemented, or at the central controller, which is required in Figure~\ref{arch}b. The latter case requires that the SDN controller configures all OpenFlow switches to simply forward (without any processing) all received LSAs to the central controller, which in turn provides it to the network management application that implements the SDN Partitioning scheme and OSPF.
SDN Partitioning, if deployed like in Figure~\ref{arch}b, allows to advertise routing updates individually customized for each of the three sub-domains, which in turn enables to control the routing of traffic flows between these sub-domains. It should be noted that the OSPF routing of sub-domain-internal traffic is not affected at all, but can therefore also not be controlled by the network management application. To enable SDN Partitioning's separation of the OSPF domain into distinct sub-domains, a few SDN-enabled routers must be placed in strategic positions in the network, such that their removal cuts the topology into disconnected components. Obviously, the way the network is clustered into sub-domains is determined solely by the operator's choice of nodes that will be exchanged with SDN nodes, i.e., the sub-domains are determined only once in the beginning and can be changed only by adding new or changing the position of existing SDN nodes. In graph theory parlance, this means that the SDN-enabled routers must constitute a vertex separator. The three example networks used in the numerical evaluation have been partitioned with the algorithm that we introduced in~\cite{caria_TNSM}.
\begin{figure*}[t] \center
\includegraphics[width=1.0\textwidth]{./routing.pdf}
\caption{The routing capabilities of the two analyzed control planes: a)~\emph{stacked hybrid} and b)~\emph{SDN Partitioning}.}
\label{routing} \end{figure*}
\begin{figure}[t] \center
\includegraphics[width=0.9\columnwidth]{./netwPlanning.pdf}
\caption{The calculation of network capacities and the information it depends on.}
\label{netwPlanning} \end{figure}
\section{Robust Capacity Dimensioning}\label{math-section}
Capacity dimensioning is a periodic network management task, where the links of a network (and the according interfaces of the routers) are dimensioned by the operator for robust operation, i.e., to accommodate the network capacity to the changing traffic demands and events like sudden traffic surges and possible network failures for the next planning period. Like depicted in Figure~\ref{netwPlanning}, capacity dimensioning is a planning process that requires a demand forecast, which extrapolates the demand at the end of the next planning period based on the current demand (which is monitored constantly by the operator) and a forecast model (i.e., statistical methods to estimate the increase of traffic demands based on historical monitoring data). Capacity planning additionally requires topology and capacity information from the network, which is typically available from the network management system in place. Finally, mapping the forecast demand to the links based on the routing model is an optimization process with the objective to minimize the cost of the required capacity upgrades.
\subsection{Traffic Demand Forecasting}
Backbone traffic demand is subject to two kinds of variations relevant for demand forecasting, which are defined by the observed time frame: a)~Daily pattern: Traffic variations on backbone links show a strong daily pattern with typically low utilization in the early morning and maximum utilization during the evening. b)~Annual increase: Traffic demands increase in the long term on average with an annual growth rate that is known to be relatively predictable at least for the next few years. Traffic forecasting has to take both time scales into consideration: The future size of a traffic flow is estimated based on its current daily maximum (a), and upscaled with the annual increase rate (b) till the end of the next planning period. A more sophisticate approach may take flow characteristics of individual demands into consideration, which is however here out of scope, and we assume that we have an exact demand forecast available as input data for the capacity dimensioning process.
\subsection{Overprovisioning} Demand measurements are always averaged over a specific sample interval (e.g., five minute averages). They therefore lack information on the variation \emph{within} each interval that is caused by micro bursts. These bursts can cause short-term congestions, which in turn cause jitter, increased delay, or even packet loss, even though the link may not be highly utilized on average. The relation between the average link load and the required link capacity -- that reduces the frequency of short-term congestions according to the targeted level of network service quality -- is referred to as overprovisioning factor.
\subsection{Routing Model}
The routing model to be used in capacity planning needs to reflect the actual routing configuration capabilities of the network. In case of fixed (i.e., non-dynamic) OSPF link metrics (which is the common case and assumed in our OSPF model), routing changes in an OSPF network are completely predetermined for all network failures, whereas dynamic reactions on sudden traffic changes are impossible. Our OSPF model therefore represents the absolute zero on network programmability. A complete SDN deployment, on the other hand, provides complete freedom regarding the configuration of routing paths, which allows to efficiently load-balance the traffic. SDN therefor represents the full level of network programmability (along with other networking schemes like MPLS or Policy Based Routing).
Hybrid SDN/OSPF operation provides routing configuration capabilities somewhere between these two levels, depending on the number of SDN nodes and their locations, and the used routing model (i.e., stacked hybrid or SDN Partitioning). A valid routing path in such a network is a concatenation of OSPF paths and SDN links, whereas the particular notion of the terms OSPF path and SDN link differs here from common usage: An SDN link is here defined as a directional connection from an SDN router to any other router. An OSPF path is defined as the unique least cost path between an OSPF router and any other (SDN or OSPF) router that doesn't traverse any intermediate SDN node. Figure~\ref{routing} depicts the routing models of the stacked hybrid (\ref{routing}a) scheme and SDN Partitioning (\ref{routing}b) in illustrative example networks. It can be seen in Figure~\ref{routing}a that in a stacked hybrid network, a traffic flow can exit the original OSPF least cost path only when it traverse an SDN node, which can be configured by the central controller to forward the according packets on an arbitrary port.
Figure~\ref{routing}b illustrates SDN Partitioning's additional capability to control routing: The source node $S$ has a distinct least cost path to each SDN border node ($W$ and $X$) in its sub-domain. Thus, the route from $S$ to $D$ starts either with OSPF path $P1$ or $P2$, depending on the aggregated cost metric for the routing to $D$, i.e., the aggregated metrics along $P1$ plus the metric advertised by $W$ for reaching $D$, and the aggregated metrics along $P2$ plus the metric advertised by $X$ for reaching $D$. This example demonstrates that, in contrast to the stacked hybrid scheme, SDN Partitioning provides an additional lever for routing control, which is the metric advertised by the SDN border nodes for each sub-domain external destination.
\begin{figure}[b!] \center
\includegraphics[width=\columnwidth]{./algo.pdf}
\caption{The heuristic algorithm for robust link capacity dimensioning.}
\label{algo} \end{figure}
\subsection{Iterative Greedy Algorithm}\label{algo_subsec}
We use a simple heuristic based on an iterative greedy algorithm to determine sufficient link capacities in respect of a predefined set of network failures and the capabilities of the deployed control plane to reroute traffic. The algorithm is depicted as a flow chart in Figure~\ref{algo}, where the boxes in the \emph{Processing Steps} container represent algorithmic states and the boxes in the \emph{Data} container represent working copies of information retrieved from the network management system like explained above. We used black arrows to indicate state transitions of the algorithm, red arrows to indicate write access of a processing step on a data set, and blue arrows to indicate read access. The algorithm consists of two stacked iterations: The inner one iterates over all network failures (depicted as the set $NF$) and applies the routing model to each resulting network scenario (i.e., it tries to load balance the forecast load in the network assuming that the particular failure occurred) to determine the most critical link (which is the one with the largest overload). That link is stored for each failure scenario in the set $CL$. After the inner loop has iterated over all network failures, the algorithm performs one cycle of the outer iteration, where the worst case of all critical links in $CL$ is chosen to be capacity increased (for now only in the working copy of the algorithm) to the next capacity granularity (e.g., from 10~Gbps to 40~Gbps). The algorithm automatically stops when the working copy of the link capacities have been increased to the point where the routing scheme can handle all network failures without overload on any link. The output of the algorithm is the working copy of link capacities that now contains the desired link capacities required for redimensioning the network.
\begin{figure}[t] \center
\includegraphics[width=\columnwidth]{./results.pdf}
\caption{Capacity requirements to accommodate link failures for the analyzed routing models.}
\label{result1} \end{figure}
\section{Performance Evaluation}\label{results-sect}
For our performance analysis, we used the Nobel-EU (28 nodes, 41 links), the Cost266 (37 nodes, 57 links), and the Janos-US-CA (39 nodes, 61 links) topologies from the SNDlib library~\cite{sndlib}. Figure~\ref{result1} shows the results of our first experiment, where we used our heuristic for robust link capacity planning. All results are normalized with the capacity requirements of an OSPF-controlled network. Native OSPF is taken as reference scenario, as its routing model provides no load balancing whatsoever, whereas all other operational schemes allow to optimize the routing to improve resource utilization and to reroute traffic more efficiently in case of a failure, which in turn allows to reduce the required link capacities. We compare the capacity requirements of OSPF, full SDN deployment, and the two hybrid control planes: stacked hybrid and SDN Partitioning, whereas the latter is furthermore classified depending on the number of sub-domains in which the initial topology was partitioned. The Cost266 topology was partitioned into 2, 4, and 10 sub-domains, the Janos-US-CA topology was partitioned into 2, 4, 6, and 10 sub-domains, and the Nobel-EU topology was partitioned into 2, 4, and 6 sub-domains.
For the stacked hybrid scheme we assumed that (at least) 50\% of all nodes are SDN-enabled and the optimal locations of these nodes were determined based on the location optimization method in~\cite{hybrid_2}. The actual number of SDN-enabled and legacy OSPF nodes is given in Figure~\ref{result1}. The overlaid (darker) bars show the minimum capacity requirements of a routing scheme without any provisions for network failures. These values have been taken to initialize the capacity planning heuristic (from Subsection~\ref{algo_subsec}). The capacity requirements for fault tolerant operation determined by the heuristic under consideration of all single fiber cuts in the network are shown as the bars in brighter colors, including the relative requirements (in percent) compared to OSPF. Traffic was assumed to be uniformly distributed among all node pairs scaled such that the maximum link load in the OSPF case without link failures was 40~Gbps. Link capacities were available in 10~Gbps, 40~Gbps, and 100~Gbps.
\begin{figure}[b!] \center
\includegraphics[width=1.0\columnwidth]{./result2.pdf}
\caption{Number of congested links in the Nobel-EU topology with a single link failure in case of sudden traffic surges.}
\label{result2} \end{figure}
It can be seen from Figure~\ref{result1} that all hybrid schemes require significantly less capacities than native OSPF for fault tolerant operation, whereas SDN Partitioning requires significantly less SDN-enabled devices to be deployed in the network to achieve results comparable to the stacked hybrid scheme. Even very few SDN nodes operated in SDN Partitioning mode suffice to provide a level of routing control that clearly reduces the capacity requirements. Finally, our results suggest that our method is unsusceptible against the topology of the network, considering the similarities of the results in the three different networks.
Figure~\ref{result2} shows our second experiment, in which we analyzed the behavior of the different routing schemes when sudden traffic surges occur in the coincidental case of a single fiber cut in the network. We here used the Nobel-EU topology with link capacities dimensioned for fault tolerant OSPF operation, and increased the traffic between the two node pairs Madrid - Stockholm and Athens - Glasgow in both directions. The node pairs have been chosen such that they are most distant (geographically and in terms of hop count), thus we stressed the network with four sudden elephant flows with each of them traversing the complete diameter of the network. The original traffic flows between these node pairs were increased with the scaling factors given at the x-axis of Figure~\ref{result2}, and the y-axis (in base-10 log scale) shows the probable number of congested links. The result of this experiment confirms what the previous experiment suggested: The level of routing control in hybrid SDN/OSPF networks provides a significant advantage over native OSPF operation without the investments required for a full SDN deployment. Again, SDN Partitioning outperforms the other hybrid mode with comparably few SDN nodes. It can be seen that the capability of a network operated in native OSPF can not handle elephant flows properly and the probability of congested links in case of a link failure is increasing rapidly with the size of the flows, which suggests that traffic forecasts should rather be upscaled significantly before capacity planning is carried out. Full SDN deployment, on the contrary, appears to be unsusceptible to traffic surges, as in our experiment it required to scale up the four original flows with factor 32 to see at least any congestion.
\section{Conclusions}\label{conclusions}
We proposed for the first time a method for robust link capacity dimensioning for hybrid SDN/OSPF networks and compared different control plane schemes for a hybrid SDN/OSPF operation. We have detailed the differences of the analyzed hybrid network architectures, and explained the prerequisites, required input data, and functional
blocks of the proposed capacity planning algorithm. We used the proposed heuristic to compare various control plane schemes regarding their capacity requirements in case of a single link failure in the network and analyzed their capabilities to handle sudden traffic bursts. The results of our numerical evaluation suggest that the requirements of networks operated in legacy OSPF can significantly be reduced be deploying just a few SDN-enabled routers. The low number of required SDN routers especially in case of the SDN Partitioning scheme allows that a relatively high number of nodes can remain in a \emph{configure-once-never-touch-again} operation, which is a known and desired feature of OSPF. Finally, SDN Partitioning showed superior performance in almost all cases of both experiments that were carried out in the course of this work, outperformed only by full SDN deployment, which not only eliminates legacy protocols, which no operator can easily commit to, but also requires significant investments in new networking equipment.
|
\section{Preliminaries}\label{section1}
Let $\pi: TM \rightarrow M $ be a tangent bundle of connected smooth Finsler manifold $M$ of odd-dimension $m=2n+1$.
We denote by $v= (x,y)$ the points in $TM$ if $y\in \pi^{-1}(x)= T_{x}M$. We denote by $O(M)$ the zero section of $TM$,
and by $TM_{0}$ the slit tangent bundle $ TM\setminus O(M)$. We introduce a coordinate system on $TM$ as follows.
Let $U\subset M$ be an open set with local coordinate $(x^{1},...,x^{m})$.
By setting $v= y^{i}\frac{\partial}{\partial x^{i}}$ for every $v\in\pi^{-1}(U) $, we introduce a
local coordinate $(x,y)=(x^{1},...,x^{m},y^{1},...,y^{m})$ on $\pi^{-1}(U)$.
\begin{definition}{\rm
A function $F: TM \rightarrow [0,+\infty[$ is called a Finsler structure or Finsler metric on $M$ if:
\begin{enumerate}
\item[(i)] $F\in C^{\infty}(TM_{0})$,
\item[(ii)] $F(x,\lambda y)= \lambda F(x,y)$, for all $ \lambda > 0$,
\item[(iii)] The $m\times m$ Hessian matrix $( g_{ij})$, where
$
\displaystyle\label{ft} g_{ij}:= \frac{1}{2}(F^{2})_{y^{i}y^{j}}
$
is positive-definite at all $(x,y)$ of $TM_{0}$.
\end{enumerate}
}
\end{definition}
The pair $(M, F )$ is called \textit{Finsler manifold}. The pulled-back bundle $\pi^{\ast}TM$ is a vector bundle over the slit tangent bundle $ TM_{0}$,
defined by
\begin{equation}
\pi^{\ast}TM:= \{(x,y,v)\in TM_{0}\times TM: v \in T_{\pi(x,y)}M \}.
\end{equation}
By the objects (\ref{ft}), the pulled-back vector bundle $\pi^{\ast}TM$ admits a natural Riemannian metric
\begin{equation}
g:= g_{ij}dx^{i}\otimes dx^{j}.
\end{equation}
This is the Finslerian fundamental tensor in a sense that we will specify later. Likewise, there is the Finslerian Cartan tensor
\begin{equation}\label{Atensor}
A= A_{ijk}dx^{i}\otimes dx^{j}\otimes dx^{k},\;\;\mbox{with}\;\; A_{ijk}:= \frac{F}{2}\frac{\partial g_{ij}}{\partial y^{k}}.
\end{equation}
Note that, with a slight abuse of notation, $\frac{\partial}{\partial x^{i}}$ and $dx^{i}$ are regarded as sections
of $\pi^{\ast}TM$ and $\pi^{\ast}T^{\ast}M$, respectively.
Now we will give some geometric tools for understanding the intrinsic formulation of geometric objects that we used in this paper.
It is well know that, the kernel of $\pi_{\ast}$, spanned the vertical subbundle $\mathcal{V}$ of $TTM_{0}$. An Ehresmann
connection is the choice of the horizontal complementary $\mathcal{H}\subset TTM_{0}$ such that
\begin{equation}\label{dec}
TTM_{0} = \mathcal{H} \oplus \mathcal{V}.
\end{equation}
In this paper, we shall consider the choice of Ehresmann connection which arises from the Finsler structure $F$,
constructed as follows. Recall that \cite{AF} every Finslerian structure $F$ induces a spray
$$
G= y^{i}\frac{\partial}{\partial x^{i}}- 2 G^{i}(x,y)\frac{\partial}{\partial y^{i}},
$$
in which the spray coefficients $G^{i}$ are defined by
\begin{equation}
G^{i}(x,y):= \frac{1}{4}g^{il}\left[2 \frac{\partial g_{jl}}{\partial x^{k}}(x,y)-
\frac{\partial g_{jk}}{\partial x^{l}}(x,y)\right]y^{j}y^{k},
\end{equation}
where the matrix $(g^{ij})$ means the inverse of $(g_{ij})$.
Define a $\pi^{\ast}TM$-valued smooth form on $TM_{0}$ by
\begin{equation}\label{teta}
\theta = \frac{\partial}{\partial x^{i}}\otimes \frac{1}{F}(dy^{i}+N_{j}^{i}dx^{j}),
\end{equation}
where functions $N^{i}_{j}(x,y)$ are given by
$
\displaystyle N^{i}_{j}(x,y):= \frac{\partial G^{i}}{\partial y^{j}}(x,y).
$
This $\pi^{\ast}TM$-valued smooth form $\theta$ is globally well defined on $TM_{0}$ \cite{AC}.
By the form $\theta$, defined in (\ref{teta}) which is called Finsler-Ehresmann form, we can define a Finsler-Ehresmann connection as follow.
\begin{definition}{\rm
A Finsler-Ehresmann connection of the submersion $\pi:TM_{0}\rightarrow M$ is the subbundle $\mathcal{H}$ of $TTM_{0}$
given by $ \mathcal{H} = \ker \theta $, where $\theta : TTM_{0}\rightarrow \pi^{\ast}TM$ is the bundle morphism defined in (\ref{teta}),
and which is complementary to the vertical subbundle $\mathcal{V}$.}
\end{definition}
It is well know that, $\pi^{\ast}TM$ can be naturally identified with the horizontal subbundle $\mathcal{H}$ and the vertical one
$\mathcal{V}$ \cite{AE}.
Thus, any section $\overline{X}$ of $\pi^{\ast}TM$ is considered as a section of $\mathcal{H}$ or a section of $\mathcal{V}$.
We denote by $\overline{X}^{H}$ and $\overline{X}^{V}$ respectively, the section
of $\mathcal{H}$ and the section of $\mathcal{V}$ corresponding to $\overline{X}\in \Gamma (\pi^{\ast}TM)$:
\begin{equation}\label{tr}
\overline{X}= \frac{\partial}{\partial x^{i}}\otimes \overline{X}^{i}\in \pi^{\ast}TM
\Longleftrightarrow \overline{X}^{H}=\frac{\delta}{\delta x^{i}}\otimes \overline{X}^{i} \in \Gamma(\mathcal{H}),
\end{equation}
and
\begin{equation}
\overline{X}= \frac{\partial}{\partial x^{i}}\otimes \overline{X}^{i}\in \pi^{\ast}TM
\Longleftrightarrow \overline{X}^{V}=F\frac{\partial}{\partial y^{i}}\otimes \overline{X}^{i} \in \Gamma(\mathcal{V}),
\end{equation}
where
$$
\{F\frac{\partial}{\partial y^{i}}:= (\frac{\partial}{\partial x^{i}})^{V}\}_{i= 1,...,m}\;\;\mbox{and}\;\;\{\frac{\delta}{\delta x^{i}}:=\frac{\partial}{\partial x^{i}} - N_{j}^{i}\frac{\partial}{\partial y^{i}} = (\frac{\partial}{\partial x^{i}})^{H}\}_{i= 1,...,m},
$$
are the vertical and horizontal lifts of natural local frame field $\{ \frac{\partial}{\partial x^{1}},..., \frac{\partial}{\partial x^{m}}\}$ with respect to the Finsler-Ehresmann connection $\mathcal{H}$, respectively.
\begin{proposition} \label{PropIso}\cite{AE}
The bundle morphism $\pi_{\ast}$ and $\theta$ satisfy
$$
\pi_{\ast}(\overline{X}^{H})= \overline{X}, \;\;\; \pi_{\ast}(\overline{X}^{V})= 0 \; \; \mbox{and}\;\; \theta(\overline{X}^{H})= 0, \;\;\; \theta(\overline{X}^{V})= \overline{X}
$$
for every $\overline{X} \in \Gamma(\pi^{\ast}TM)$.
\end{proposition}
The Proposition \ref{PropIso} means that $\mathcal{H} T M_{0}$, as well as $\mathcal{V} T M_{0}$, can be naturally identified with the bundle $\pi^{*} T M$, that is,
\begin{equation}\label{Isomorphs}
\mathcal{H} T M_{0}\cong \pi^{*} T M\;\;\mbox{and}\;\; \mathcal{V} T M_{0}\cong \pi^{*} T M.
\end{equation}
Next, we recall the definition of the Chern connection on the pulled-back bundle which is going to be used throughout the paper. This connection is symmetric but not always compatible with the metric of the underlying manifold.
\begin{theorem} \cite{mb1}\label{th1}
Let $(M,F)$ be a Finsler manifold, $g$ a fundamental tensor of $F$ and $\theta$ the vector form defined in (\ref{teta}). There exist a unique linear connection $\nabla$ on $\pi^{\ast}TM$ such that, for all $X,Y \in \Gamma(TTM_{0})$ and $\overline{Y}, \overline{Z} \in \Gamma(\pi^{\ast}TM)$, we have,
\begin{enumerate}
\item[(a)] Symmetry
\begin{equation}\label{et1}
\nabla_{X}\pi_{\ast}Y - \nabla_{Y}\pi_{\ast}X = \pi_{\ast}[X,Y],
\end{equation}\label{A-comp}
\item[(b)] Almost $g$-compatibility
\begin{equation}\label{et2}
(\nabla_{X} g)(,\overline{Y},\overline{Z})= 2A(\theta(X),\overline{Y},\overline{Z}),
\end{equation}
where $A$ is the Cartan tensor defined in (\ref{Atensor}).
\end{enumerate}
\end{theorem}
A tensor field $T$ of type $(p_{1},p_{2};q)$ on $(M,F)$ is a map:
$$T:\Gamma((\pi^{\ast}TM )^{p_{1}})\times\Gamma((TTM_{0})^{p_{2}})\longrightarrow \Gamma((\pi^{\ast}TM)^{q}),$$
which is $C^{\infty}(TM_{0})$-linear in each arguments.
In the sequel, we denote by $\mathcal{T}^{(p,q;r)}$ the space of Finslerian tensor of type $(p,q;r)$. By the Finsler-Ehresmann connection, the exterior differential
\begin{equation}
d: \mathcal{T}^{(p,0;0)} \longrightarrow \mathcal{T}^{(p+1,0;0)}
\end{equation} is decomposed into the horizontal part $d^{H}$ and vertical part $d^{V}$
according to the decomposition (\ref{dec}). Here $d^{H}$ is exterior differential along $\mathcal{H}$ and $d^{V}$ the one along $\mathcal{V}$. These exterior differentials are related to the Chern connection as follows.
\begin{definition}[Horizontal and vertical exterior differential]{\rm
Let $T$ be a $(p,0;0)$-Finslerian tensor. Then the horizontal and vertical exterior differentials $d^{H}T$ and $d^{V}T$ of $T$
are the $(p+1,0;0)$-Finslerians tensor given, respectively, by
\begin{align} \label{dex}
& d^{H}T(\overline{X}_{1},...,\overline{X}_{p+1}) = \frac{1}{p+1}
\sum_{i=1}^{p+1} (-1)^{i+1}\nabla_{\overline{X}_{i}^{H}}T(\overline{X}_{1},..., \breve{\overline{X}}_{i},...,\overline{X}_{p+1})\nonumber\\
&+ \frac{1}{p+1}\sum_{1\leq i<j \leq p+1} (-1)^{i+j} T(\pi_{\ast}[\overline{X}_{i}^{H}, \overline{X}_{j}^{H}],
\overline{X}_{1},..., \breve{\overline{X}}_{i},...,\breve{\overline{X}_{j}},..., \overline{X}_{p+1} ),
\end{align}
and
\begin{align}
& d^{V}T(\overline{X}_{1},...,\overline{X}_{p+1}) = \frac{1}{p+1}
\sum_{i=1}^{p+1} (-1)^{i+1}\nabla_{\overline{X}_{i}^{V}}T(\overline{X}_{1},..., \breve{\overline{X}}_{i},...,\overline{X}_{p+1} )\nonumber\\
&+ \frac{1}{p+1}\sum_{1\leq i<j \leq p+1} (-1)^{i+j} T(\theta([\overline{X}_{i}^{V}, \overline{X}_{j}^{V}]),
\overline{X}_{1},..., \breve{\overline{X}}_{i},...,\breve{\overline{X}_{j}},..., \overline{X}_{p+1}).\nonumber
\end{align}
}
\end{definition}
In a similar way, for all $\overline{X} \in \Gamma(\pi^{\ast}TM)$ the Lie derivative $\mathcal{L}_{\overline{X}}$ of the $(p,0;r)$-Finslerian
tensor, is decomposed into the horizontal $\mathcal{L}_{\overline{X}}^{H}$ and vertical $\mathcal{L}_{\overline{X}}^{V}$. Note that, for $f \in C^{\infty}(TM_{0})$, and $\overline{Y} \in \Gamma(\pi^{\ast}TM)$, we have
\begin{align}
\mathcal{L}_{\overline{X}}^{H}f = \overline{X}^{H}(f), \;\; \mathcal{L}_{\overline{X}}^{V}f = \overline{X}^{V}(f),\;\;
\mathcal{L}_{\overline{X}}^{H}\overline{Y} = \pi_{\ast}[\overline{X}^{H},\overline{Y}^{H}],\;\;\; \mathcal{L}_{\overline{X}}^{V}\overline{Y} = \theta[\overline{X}^{V},\overline{Y}^{V}].\nonumber
\end{align}
Now more generaly for the $(p,0;r)$-Finslerian
tensor we have,
\begin{definition} [Horizontal and vertical Lie derivative]{\rm
Let $\overline{X} \in \Gamma(\pi^{\ast}TM)$, and $T \in \mathcal{T}^{(p,0;r)}$,
the horizontal and vertical Lie derivative of $T$ relative to $\overline{X}$ are given
respectively by
\begin{align}\label{rlh}
& \left(\mathcal{L}_{\overline{X}}^{H}T\right)(\overline{Y_{1}},..., \overline{Y_{p}}, \alpha_{1},..., \alpha_{r}) =
\overline{X}^{H}\left(T(\overline{Y_{1}},..., \overline{Y_{p}},\alpha_{1},..., \alpha_{r})\right) \nonumber\\
&- \sum_{i=1}^{p}T(\overline{Y_{1}},...,\mathcal{L}_{\overline{X}}^{H}\overline{Y_{i}},...,\overline{Y_{p}},\alpha_{1},..., \alpha_{r})\nonumber\\
&- \sum_{j=1}^{p}T(\overline{Y_{1}},...,\overline{Y_{i}},...,\overline{Y_{p}},\alpha_{1},...,
\mathcal{L}_{\overline{X}}^{H}\alpha_{i},... \alpha_{r}),
\end{align}
and
\begin{align}\label{rlv}
&\left(\mathcal{L}_{\overline{X}}^{V}T\right)(\overline{Y}_{1},..., \overline{Y}_{p},\alpha_{1},..., \alpha_{r})=
\overline{X}^{V}\left(T(\overline{Y}_{1},...,\overline{Y}_{p},\alpha_{1},..., \alpha_{r})\right) \nonumber\\
&- \sum_{i=1}^{p}T(\overline{Y}_{1},...,\theta[\overline{X}^{V},\overline{Y}_{i}^{V}],...,\overline{Y}_{p},\alpha_{1},..., \alpha_{r})\nonumber\\
&- \sum_{j=1}^{p}T(\overline{Y_{1}},...,\overline{Y_{i}},...,\overline{Y_{p}},\alpha_{1},...,
\mathcal{L}_{\overline{X}}^{V}\alpha_{i},... \alpha_{r}),
\end{align}
where
\begin{align}
(\mathcal{L}_{\overline{X}}^{H}\alpha_{i})(\overline{Y}) & = \overline{X}^{H}\alpha_{i}(\overline{Y})- \alpha_{i}(\pi_{\ast}[\overline{X}^{H}, \overline{Y}^{H}]),\nonumber\\
\mbox{and}\;\; (\mathcal{L}_{\overline{X}}^{V}\alpha_{i})(\overline{Y}) &= \overline{X}^{V}\alpha_{i}(\overline{Y})- \alpha_{i}(\theta[\overline{X}^{V}, \overline{Y}^{V}]).\nonumber
\end{align}
}
\end{definition}
The covariant derivative of the Chern connection is defined by the following.
\begin{definition}[Covariant Chern derivative]{\rm
Let $T$ a Finslerian tensor of type $(p,q;r)$ and let $X \in \Gamma(TTM_{0})$. Then, we define the covariant Chern derivative of $T$ in the direction of $X$ by the formula
\begin{align}\label{CovaDer1}
(\nabla_{X}T)&(\overline{Y}_{1}, \ldots ,\overline{Y}_{p}, X_{1},\ldots,X_{q}, \alpha_{1},\ldots, \alpha_{r}) \nonumber\\
&=
X( T(\overline{Y}_{1},\ldots,\overline{Y}_{p}, X_{1},...,X_{q},\alpha_{1},\ldots, \alpha_{r}))\nonumber\\
&- \sum_{i=1}^{p}(\overline{Y}_{1},\ldots,\nabla_{X}\overline{Y}_{i},\ldots,\overline{Y}_{p}, X_{1},\ldots,X_{q},
\alpha_{1},\ldots, \alpha_{r})\nonumber\\
&- \sum_{j=1}^{q} T(\overline{Y}_{1},\ldots,\overline{Y}_{p}, X_{1},\ldots,(\nabla_{X}\pi_{\ast}X_{j})^{H},\ldots,X_{q},
\alpha_{1},\ldots, \alpha_{r})\nonumber\\
&- \sum_{j=1}^{q}T(\overline{Y}_{1},\ldots,\overline{Y}_{p}, X_{1},\ldots,(\nabla_{X}\theta X_{j})^{V},\ldots,X_{q}, \alpha_{1},\ldots,
\alpha_{r})\nonumber\\
& - \sum_{k=1}^{r}T(\overline{Y}_{1},\ldots,\overline{Y}_{p}, X_{1},\ldots,X_{q}, \alpha_{1},\ldots,\nabla_{X}\alpha_{k},\ldots, \alpha_{r}),
\end{align}
where $X_{i}\in \Gamma(TTM_{0}),\: i=1,\ldots,p$; $\overline{Y}_{j} \in \Gamma(\pi^{\ast}TM), \: j= 1,\ldots,q$; $\alpha_{k} \in \Gamma (\pi^{\ast}T^{\ast}M),\: k= 1,\ldots,r$, and each of the quantities $\nabla_{X}\alpha_{k}$ is evaluated by
$
(\nabla_{X}\alpha_{k})(\overline{Y} )= X \alpha_{k}(\overline{Y})- \alpha_{k}(\nabla_{X}\overline{Y}).
$
}
\end{definition}
\section{Almost contact Finsler structures}\label{Almost}
In this section, we adapt the definition of almost contact structures given in \cite{bl} in the case of Finsler.
Let $\phi$, $\xi$ and $\eta$ be the $(1,0;1)$-, $(1,0;0)$- and $(0,0;1)$-Finslerians tensor, respectively, such that
\begin{equation} \label{Ac1}
\phi^{2} = - \mathbb{I} +\eta \otimes \xi \;\;\mbox{and}\;\;
\eta (\xi) = 1.
\end{equation}
Then, the triplet $(\phi, \eta, \xi)$ is called an almost contact Finsler structure on $\pi^{\ast}TM$ and $(\pi^{\ast}TM, \phi, \eta, \xi)$ is called almost contact Finsler pulled-back bundle.
First of all, we prove the following.
\begin{proposition}\label{ExtAlmo}
Let $(\pi^{\ast}TM, \phi, \eta, \xi)$ be an almost contact Finsler pulled-back bundle. Then,
$$
\phi(\xi)= 0\;\;\;\mbox{and}\;\;\;\eta \circ \phi = 0.
$$
Moreover, $\phi$ is of rank $2n$.
\end{proposition}
\begin{proof}
The assertion (i) is as follows. By definition of Almost contact Finsler structure, i.e., the relations (\ref{Ac1}) , we have
$
\phi^{2} \xi = -\xi+ \eta(\xi)\xi = 0.
$
Then, $\phi(\xi)= 0$ or $\phi(\xi)$ is a non trivial eigenvector of $\phi$ corresponding to eigenvalue $0$. By (\ref{Ac1}) again, we have
\begin{equation}\label{r1}
\phi^{2}\phi(\xi)=0 \Longleftrightarrow \phi(\xi)=\eta(\phi(\xi))\xi.
\end{equation}
As $\phi(\xi)$ is a non trivial eigenvector of $\phi$ corresponding to the eigenvalue $0$, we have $\eta(\phi (\xi))\neq 0$.
Thus by (\ref{r1}) we have
$
0=\phi(\phi(\xi))=\eta(\phi(\xi))\phi(\xi)=\left(\eta(\phi(\xi))\right)^{2}\xi \neq 0,
$
which is a contradiction. Therefore,
$
\phi(\xi)=0.
$
Now let us prove (ii). Using (\ref{Ac1}), we observe that, for all $\overline{X}\in \Gamma(\pi^{\ast}TM)$,
$
\phi^{2}(\overline{X})=-\overline{X} + \eta(\overline{X}) \xi.
$
Applying $\phi$ to this equation, one obtains
\begin{equation}\label{rp3}
\phi^{3}(\overline{X})= -\phi(\overline{X}).
\end{equation}
From (\ref{Ac1}) and using (\ref{rp3}) , we have
$
\eta(\phi(\overline{X})) \xi = \phi^{3}(\overline{X})+ \phi(\overline{X})=0.
$
Hence $\eta \circ \phi = 0$. The last assertion is proven as follows. For all $(x,y) \in TM_{0}$, $ (\pi^{\ast}TM)\lvert_{(x,y)}$ is of odd dimension, i.e., $2n+1$. Therefore, it is sufficient to show that $\ker \phi = < \xi >$. Since $\phi(\xi)=0$, we have $ < \xi > \subseteq \ker \phi$. Now let $\overline{\xi} \in \ker \phi$. Then $\phi(\overline{\xi})= 0$, and using the relation (\ref{Ac1}), one gets
$
\overline{\xi}= \eta(\overline{\xi})\xi,
$
It follows that, $\ker \phi\subseteq < \xi >$. Thus
$
\ker \phi= < \xi >,
$
which completes the proof.
\end{proof}
Note that the Proposition \ref{ExtAlmo} is a Finsler pulled-back bundle extension to the one of the tangent bundle given in \cite{bl}.
Now, we define the normality condition on an almost contact Finsler structures on $(\pi^{\ast}TM, \phi, \eta, \xi)$. Let $T$ be a $(1,0;1)$-Finslerian tensor. The Nijenhuis torsion of $T$, is the $(2,0;1)$-Finslerian tensor decomposed into the horizontal and vertical part $N_{T}^{H}$ and $N_{T}^{V}$ given, respectively, by
\begin{eqnarray}
N_{T}^{H}(\overline{X}, \overline{Y}) &=& T^{2}\pi_{\ast}[\overline{X}^{H}, \overline{Y}^{H}] + \pi_{\ast}[(T\overline{X})^{H}, (T\overline{Y})^{H}]
- T \pi_{\ast}[(T\overline{X})^{H}, \overline{Y}^{H}]\cr
& &- T\pi_{\ast}[\overline{X}^{H}, (T\overline{Y})^{H}],
\end{eqnarray}
and
\begin{eqnarray}
N_{T}^{V}(\overline{X}, \overline{Y}) &=& T^{2}\theta[\overline{X}^{V}, \overline{Y}^{V}] + \theta[(T\overline{X})^{V}, (T\overline{Y})^{V}]
- T \theta[(T\overline{X})^{V}, \overline{Y}^{V}]\cr
& &- T\theta[\overline{X}^{V}, (T\overline{Y})^{V}],
\end{eqnarray}
for any $\overline{X}, \overline{Y} \in \Gamma(\pi^{\ast}TM)$.
\begin{definition}{\rm
The almost contact Finsler structure $(\phi, \eta, \xi)$ on pulled-back bundle $\pi^{\ast}TM$ is horizontally normal if
\begin{equation}
\mathcal{N}_{H}^{(1)}(\overline{X}, \overline{Y})= N_{\phi}^{H}(\overline{X}, \overline{Y}) +2 d^{H}\eta(\overline{X}, \overline{Y})\xi = 0,
\end{equation}
and it is vertically normal if
\begin{equation}
\mathcal{N}_{V}^{(1)}(\overline{X}, \overline{Y})= N_{\phi}^{V}(\overline{X}, \overline{Y}) +2 d^{V}\eta(\overline{X}, \overline{Y})\xi = 0,
\end{equation}
for any $\overline{X}, \overline{Y} \in \Gamma(\pi^{\ast}TM)$.
}
\end{definition}
Next, we give some equivalent conditions for horizontal and vertical normality of the structure $(\phi, \eta, \xi)$. For this reason, we introduce
six tensors $\mathcal{N}_{H}^{(2)} $, $\mathcal{N}_{V}^{(2)} $, $\mathcal{N}_{H}^{(3)} $, $\mathcal{N}_{V}^{(3)}$, $ \mathcal{N}_{H}^{(4)}$ and
$\mathcal{N}_{V}^{(4)}$ given by
\begin{eqnarray}
\mathcal{N}_{H}^{(2)}(\overline{X}, \overline{Y})&:=& (\mathcal{L}_{\phi\overline{X}}^{H}\eta)\overline{Y}-
(\mathcal{L}_{\phi\overline{Y}}^{H}
\eta)\overline{X},\\
\mathcal{N}_{V}^{(2)}(\overline{X}, \overline{Y})&:=& (\mathcal{L}_{\phi\overline{X}}^{V}\eta)\overline{Y}-(\mathcal{L}_{\phi\overline{Y}}^{V}
\eta)\overline{X},\\
\mathcal{N}_{H}^{(3)} &:=& (\mathcal{L}_{\xi}^{H}\phi)\overline{X},\\
\mathcal{N}_{V}^{(3)} &:=& (\mathcal{L}_{\xi}^{V}\phi)\overline{X},\\
\mathcal{N}_{H}^{(4)} &:=& (\mathcal{L}_{\xi}^{H}\eta)\overline{X},\\
\mathcal{N}_{V}^{(4)} &:=& (\mathcal{L}_{\xi}^{V}\eta)\overline{X},
\end{eqnarray}
for all $\overline{X}, \overline{Y} \in \Gamma(\pi^{\ast}TM)$.
\begin{theorem}
For an almost contact Finsler structure $(\phi, \eta, \xi)$, the vanishing of $\mathcal{N}_{H}^{(1)}$, implies the vanishing of
$\mathcal{N}_{H}^{(2)}$, $ \mathcal{N}_{H}^{(3)}$ and $ \mathcal{N}_{H}^{(4)}$. Likewise, the vanishing of $ \mathcal{N}_{V}^{(1)}$
implies the vanishing of $ \mathcal{N}_{V}^{(2)}$,$ \mathcal{N}_{V}^{(3)}$ and $ \mathcal{N}_{V}^{(4)}$.
\end{theorem}
\begin{proof}
The proof is similar to the one given in Riemannian case, by Blair in \cite{bl}.
\end{proof}
Now, let $(\phi,\eta, \xi)$ an almost contact Finsler structure on $\pi^{\ast}TM$. When, the fundamental tensor $g$ of the Finslerian
structure $F$, satisfy
\begin{equation}
g(\phi \overline{X}, \phi \overline{Y}) = g(\overline{X}, \overline{Y}) -\eta(\overline{X})\eta(\overline{Y}),
\end{equation}
for any sections $\overline{X}$ and $\overline{Y}$ on $\pi^{\ast}TM$, we said that $g$ is compatible with the structure $(\phi,\eta, \xi)$. In this case, $(\pi^{\ast}TM,\phi,\eta, \xi,g)$ is called an almost
contact metric Finsler pulled-back bundle.
Moreover, we define the generalized second fundamental $2$-form $\Phi$ by:
\begin{equation}
\Phi(\overline{X},\overline{Y}):= g(\overline{X},\phi\overline{Y}),\quad\quad \overline{X},\overline{Y} \in \Gamma(\pi^{\ast}TM).
\end{equation}
Because of the isomorphisms in (\ref{Isomorphs}), we defined an almost contact metric Finsler structure as follows.
\begin{definition}{\rm
An almost contact metric Finsler structure $(\phi,\eta, \xi,g)$ is called \textit{contact Finsler structure} if
\begin{equation}\label{ct1}
\Phi=2d^{H}\eta, \;\;\mbox{or}\;\;\Phi = 2d^{V}\eta.
\end{equation}
}
\end{definition}
Let $(\phi,\eta, \xi,g)$ be a contact metric Finsler structure on $\pi^{\ast}TM$. A section $\overline{X} \in \Gamma(\pi^{\ast}TM) $,
is horizontally Killing and vertically Killing, if it satisfies, respectively
\begin{equation}
\mathcal{L}^{H}_{\overline{X}}g = 0\;\;\mbox{and}\;\; \mathcal{L}^{V}_{\overline{X}}g = 0,
\end{equation}
respectively.
If $\xi$ is horizontally Killing (resp. vertically Killing), then $(\phi,\eta, \xi,g)$ is called horizontal $K$-contact Finsler structure (resp. vertical $K$-contact Finsler structure).
\begin{definition}{\rm
Let $(\phi,\eta, \xi,g)$ be a contact metric Finsler structure. If $\xi$ is horizontally Killing (resp. vertically Killing), then $(\phi,\eta, \xi,g)$ is called horizontal $K$-contact Finsler structure (resp. vertical $K$-contact Finsler structure).
}
\end{definition}
\begin{theorem}\label{theofdci}
Let $(\phi,\eta, \xi,g)$ be a contact metric Finsler structure on $\pi^{\ast}TM$. Then
\begin{equation}
\mathcal{N}_{H}^{(4)}=\mathcal{N}_{V}^{(4)} = 0,\quad\quad \mathcal{N}_{H}^{(2)}=\mathcal{N}_{V}^{(2)}=0.
\end{equation}
Moreover
$\mathcal{N}_{H}^{(3)}$ vanish if and only if $\xi$ is horizontally Killing and $\mathcal{N}_{V}^{(3)}$
vanish if and only if $\xi$ is vertically Killing.
\end{theorem}
\begin{proof}
The proof is similar to the one for the Riemannian case in \cite{bl}.
\end{proof}
\begin{lemma}\label{lemfdci}
For an almost contact metric Finsler structure $(\phi,\eta,\xi,g)$ on $\pi^{\ast}TM$ with identification $\pi^{\ast}TM\cong \mathcal{H}T M_{0}$, the covariant derivative of $\phi$
with respect to the Chern connection is given by
\begin{align} \label{dcfi}
2g((\nabla_{X}\phi)\overline{Y}, \overline{Z})&= 3 d^{H}\Phi(\pi_{\ast}X, \phi\overline{Y},\phi\overline{Z})-
3d^{H}\Phi(\pi_{\ast}X,\overline{Y},\overline{Z})\nonumber\\
&+ g(\mathcal{N}_{H}^{(1)}(\overline{Y},\overline{Z}),\phi \pi_{\ast}X)
+ \mathcal{N}_{H}^{(2)}(\overline{Y},\overline{Z})\eta(\pi_{\ast}X)\nonumber\\
& + 2 d^{H}\eta(\phi \overline{Y}, \pi_{\ast}X)\eta(\overline{Z})- 2 d^{H}\eta(\phi \overline{Z}, \pi_{\ast}X)\eta(\overline{Y})\cr
&- 2A(\theta(X), \phi\overline{Y}, \overline{Z})- 2A(\theta(X), \overline{Y}, \phi \overline{Z}),
\end{align}
where $X\in\Gamma(TTM_{0})$ and $\overline{Y},\overline{Z} \in \Gamma(\pi^{\ast}TM)$.
\end{lemma}
\begin{proof}
For $X,Y,Z \in \Gamma(TTM_{0})$, it is well know, by the Chern connection, that \cite{mb1}
\begin{align}\label{et4}
2g(\nabla_{X}\pi_{\ast}Y, \pi_{\ast}Z)&= X.g(\pi_{\ast}Y,\pi_{\ast}Z) + Y.g(\pi_{\ast}Z,\pi_{\ast}X)
- Z.g(\pi_{\ast}X,\pi_{\ast}Y)\cr
& + g(\pi_{\ast}[X,Y], \pi_{\ast}Z) -g(\pi_{\ast}[Y,Z], \pi_{\ast}X)+ g(\pi_{\ast}[Z,X], \pi_{\ast}Y)\nonumber\\
& -2\mathcal{A}(X,Y,Z),
\end{align}
where
\begin{equation}
\mathcal{A}(X,Y,Z)= A(\theta(X),\pi_{\ast}Y,\pi_{\ast}Z))+A(\theta(Y),\pi_{\ast}Z,\pi_{\ast}X))- A(\theta(Z),\pi_{\ast}X,\pi_{\ast}Y)).
\end{equation}
Now,
\begin{align}\label{mdfi}
& 2g((\nabla_{X}\phi)\overline{Y}, \overline{Z}) = 2g(\nabla_{X}\phi(\overline{Y}),\overline{Z})
+ 2 g(\nabla_{X}\overline{Y},\phi(\overline{Z}))\nonumber\\
&= X \Phi(\overline{Z},\overline{Y}) + \phi\overline{Y}^{H}\left(\Phi(\overline{Z}, \pi_{\ast}X)+
\eta(\overline{Z})\eta(\pi_{\ast}X)\right)- \overline{Z}^{H}\Phi(\pi_{\ast}X, \overline{Y})\nonumber\\
&- \Phi(\pi_{\ast}[X,\phi\overline{Y}^{H}], \phi \overline{Z})+ \eta(\pi_{\ast}[X,\phi\overline{Y}^{H}])\eta(\overline{Z})
- g(\phi\pi_{\ast}[\phi \overline{Y}^{H}, \overline{Z}^{H}], \phi\pi_{\ast}X)\nonumber\\
&- \eta(\pi_{\ast}[\phi \overline{Y}^{H}, \overline{Z}^{H}])\eta(\pi_{\ast}X)+ \Phi(\pi_{\ast}[\overline{Z}^{H},X], \overline{Y})
-2A(\theta(X), \phi \overline{Y}, \overline{Z})\nonumber\\
&+ X \Phi(\phi\overline{Y}, \phi\overline{Z})- \overline{Y}^{H}\Phi(\overline{Z},\pi_{\ast}X)-
\phi \overline{Z}^{H}\left(\Phi(\phi \overline{Y}, \pi_{\ast}X)+ \eta(\pi_{\ast}X, \eta(\overline{Y})\right)\nonumber\\
&+ \Phi(\pi_{\ast}[X,\overline{Y}^{H}],\overline{Z}^{H})- g(\phi\pi_{\ast}[\overline{Y}^{H}, \phi\overline{Z}^{H}], \phi\pi_{\ast}X)
- \eta(\pi_{\ast}[\overline{Y}^{H}, \phi\overline{Z}^{H}])\eta(\pi_{\ast}X)\nonumber\\
&- \Phi( \pi_{\ast}[\phi\overline{Z}^{H}, X], \phi \overline{Y}) + \eta(\pi_{\ast}[\phi\overline{Z}^{H}, X])\eta(\overline{Y})
-2 A(\theta(X), \overline{Y},\phi\overline{Z})\nonumber\\&+
\Phi(\pi_{\ast}[\overline{Y}^{H},\overline{Z}^{H}], \pi_{\ast}X)-
g((\pi_{\ast}[\overline{Y}^{H},\overline{Z}^{H}], \phi\pi_{\ast}X)) - \Phi(\pi_{\ast}[\phi\overline{Y}^{H},\phi\overline{Z}^{H}], \pi_{\ast}X)\nonumber\\
&+g((\pi_{\ast}[\phi\overline{Y}^{H},\phi\overline{Z}^{H}], \phi\pi_{\ast}X))+ g(2d^{H}\eta(\overline{Y},\overline{Z})\xi, \phi \pi_{\ast}X).
\end{align}
Noted that, the sum of the last five terms of (\ref{mdfi}) is zero, and is maintained to write this expression in terms of horizontal exterior
differential of $\Phi$, and the tensors $\mathcal{N}_{H}^{(1)}$ and $\mathcal{N}_{H}^{(2)}$.
It follows that
\begin{align}
& 2g((\nabla_{X}\phi)\overline{Y}, \overline{Z}) = X \Phi(\phi\overline{Y},\phi\overline{Z}) + \phi\overline{Y}^{H}\Phi(\phi\overline{Z}, \pi_{\ast}X)
+\phi\overline{Z}^{H}\Phi( \pi_{\ast}X,\phi\overline{Y})\nonumber \\
& - \Phi(\pi_{\ast}[X,\phi\overline{Y}^{H}], \phi \overline{Z}) - \Phi(\pi_{\ast}[\phi\overline{Y}^{H},\phi\overline{Z}^{H}], \pi_{\ast}X)
- \Phi(\pi_{\ast}[\phi\overline{Z}^{H},X], \phi \overline{Y})\nonumber \\
&-X \Phi(\overline{Y},\overline{Z})-\overline{Y}^{H}\Phi(\overline{Z}, \pi_{\ast}X)-
\overline{Z}^{H}\Phi( \pi_{\ast}X,\overline{Y})+ \Phi(\pi_{\ast}[X,\overline{Y}^{H}],\overline{Z})\nonumber \\
& + \Phi(\pi_{\ast}[\overline{Y}^{H},\overline{Z}^{H}],\pi_{\ast}X)+ \Phi(\pi_{\ast}[\overline{Z}^{H}, X], \overline{Y})+
\phi\overline{Y}^{H}\eta(\overline{Z})\eta(\pi_{\ast}X)\nonumber \\
&- \eta(\pi_{\ast}[\phi\overline{Y}^{H}, \overline{Z}^{H}])\eta(\pi_{\ast}X)+\phi\overline{Z}^{H}\eta(\overline{Y})\eta(\pi_{\ast}X)
- \eta(\pi_{\ast}[\overline{Y}^{H}, \phi\overline{Z}^{H}])\eta(\pi_{\ast}X)\nonumber \\
&- g(\phi\pi_{\ast}[\phi\overline{Y}^{H}, \overline{Z}^{H}], \phi \pi_{\ast}X)
-g(\phi\pi_{\ast}[\overline{Y}^{H}, \phi\overline{Z}^{H}], \phi \pi_{\ast}X)- g(\pi_{\ast}[\overline{Y}^{H},\overline{Z}^{H}], \phi\pi_{\ast}X)
\nonumber \\
&+ g(\pi_{\ast}[\phi\overline{Y}^{H},\phi\overline{Z}^{H}], \phi \pi_{\ast}X) + g(2d^{H}\eta(\overline{Y}, \overline{Z})\xi, \phi\pi_{\ast}X)
+ \eta(\pi_{\ast}[X, \phi \overline{Y}^{H}])\eta(\overline{Z})\nonumber \\
& + \eta(\pi_{\ast}[\phi\overline{Z}^{H}, X])\eta(\overline{Y})
-2(A(\theta(X), \phi \overline{Y}, \overline{Z})+ A(\theta(X), \overline{Y}, \phi \overline{Z}))
\nonumber \\
&= 3 d^{H}\Phi(\pi_{\ast}X, \phi\overline{Y},\phi\overline{Z})-
3d^{H}\Phi(\pi_{\ast}X,\overline{Y},\overline{Z})+ \mathcal{N}_{H}^{(2)}(\overline{Y},\overline{Z})\eta(\pi_{\ast}X)\nonumber\\
&+ g(\mathcal{N}_{H}^{(1)}(\overline{Y},\overline{Z}),\phi \pi_{\ast}X)
+ 2 d^{H}\eta(\phi \overline{Y}, \pi_{\ast}X)\eta(\overline{Z})- 2 d^{H}\eta(\phi \overline{Z}, \pi_{\ast}X)\eta(\overline{Y})
\nonumber \\& -2(A(\theta(X), \phi \overline{Y}, \overline{Z})+ A(\theta(X), \overline{Y}, \phi \overline{Z})).
\end{align}
Which completes the proof.
\end{proof}
The relation (\ref{dcfi}) generalizes the one given by Blair in \cite[page 82]{bl} for the case of almost contact metric structure $(\phi, \xi, \eta, g)$. Indeed, when the Finsler structure $F$ is Riemannian, the Cartan tensor vanishes and the Chern Connection reduces to the Levi-Civita connection of $g$.
\begin{corollary}
For an almost contact metric Finsler structure $(\phi, \eta, \xi, g)$ on $\pi^{\ast}TM$ with identification $\pi^{\ast}TM\cong \mathcal{H}T M_{0}$, the horizontal and vertical covariant derivative of $\phi$, are given
respectively by:
\begin{align}
2g((\nabla^{H}_{X}\phi)\overline{Y}, \overline{Z})&= 3 d^{H}\Phi(\pi_{\ast}X, \phi\overline{Y},\phi\overline{Z})-
3d^{H}\Phi(\pi_{\ast}X,\overline{Y},\overline{Z})\nonumber\\
&+ g(\mathcal{N}_{H}^{(1)}(\overline{Y},\overline{Z}),\phi \pi_{\ast}X) + \mathcal{N}_{H}^{(2)}(\overline{Y},\overline{Z})\eta(\pi_{\ast}X)\nonumber\\
& + 2 d^{H}\eta(\phi \overline{Y}, \pi_{\ast}X)\eta(\overline{Z})
- 2 d^{H}\eta(\phi \overline{Z}, \pi_{\ast}X)\eta(\overline{Y})
\end{align}
and
\begin{equation}
2g((\nabla^{V}_{X}\phi)\overline{Y}, \overline{Z})=
- 2 \left(A(\theta(X), \phi\overline{Y}, \overline{Z})+A(\theta(X), \overline{Y}, \phi \overline{Z})\right),
\end{equation}
where $\nabla^{H}_{X}= \nabla_{X^{H}}$ and $ \nabla^{V}_{X}= \nabla_{X^{V}}$.
\end{corollary}
\begin{proof}
The proof follows from a straightforward calculation using Lemma \ref{lemfdci}.
\end{proof}
\begin{definition}{\rm
The horizontal normal contact Finsler structures $(\phi,\eta, \xi,g)$ are called \textit{horizontal Sasakian Finsler structures}, and the vertical
ones are called \textit{vertical Sasakian Finsler structures}.}
\end{definition}
\begin{theorem}\label{dcphi}
An almost contact metric Finsler structure $(\phi, \eta, \xi, g)$ on $\pi^{\ast}TM$, with identification $\pi^{\ast}TM\cong \mathcal{H}T M_{0}$, is horizontally Sasakian if and only if
\begin{equation}
(\nabla_{X}\phi)\overline{Y}= g(\pi_{\ast}X,\overline{Y})\xi-\eta(\overline{Y})\pi_{\ast}X +
\phi A^{\sharp}(\theta(X), \overline{Y}, \bullet)-A^{\sharp}(\theta(X), \phi \overline{Y}, \bullet),\nonumber
\end{equation}
where
\begin{equation}
g( A^{\sharp}(\theta(X), \overline{Y}, \bullet), \overline{Z}) = A(\theta(X), \overline{Y},\overline{Z}), \nonumber
\end{equation}
for all $X\in \Gamma(TTM_{0})$ and $\overline{Y}, \overline{Z} \in \Gamma(\pi^{\ast}TM)$.
\end{theorem}
\begin{proof}
Suppose that $(\phi, \eta, \xi, g)$ is horizontally Sasakian, then by Lemma \ref{lemfdci},
\begin{align}
2g((\nabla_{X}\phi)\overline{Y}, \overline{Z})&=
2 d^{H}\eta(\phi \overline{Y}, \pi_{\ast}X)\eta(\overline{Z})- 2 d^{H}\eta(\phi \overline{Z}, \pi_{\ast}X)\eta(\overline{Y})\cr
&- 2A(\theta(X), \phi\overline{Y}, \overline{Z})- 2A(\theta(X), \overline{Y}, \phi \overline{Z})\cr
&= 2g( \overline{Y}, \pi_{\ast}X)\eta(\overline{Z})-2 g(\pi_{\ast}X, \overline{Z})\eta(\overline{Y})
\cr & - 2g(A^{\sharp}(\theta(X), \phi\overline{Y}, \bullet), \overline{Z})- 2g(A^{\sharp}(\theta(X), \overline{Y}, \bullet), \phi\overline{Z})\cr
&= 2g(g(\overline{Y}, \pi_{\ast}X)\xi-\eta(\overline{Y})\pi_{\ast}X
+ \phi A^{\sharp}(\theta(X), \overline{Y}, \bullet),\overline{Z})\cr
&-2g(A^{\sharp}(\theta(X), \phi\overline{Y}, \bullet), \overline{Z}).\nonumber
\end{align}
From which the result follows. Conversely assuming that
\begin{equation}
(\nabla_{X}\phi)\overline{Y}= g(\pi_{\ast}X,\overline{Y})\xi-\eta(\overline{Y})\pi_{\ast}X +
\phi A^{\sharp}(\theta(X), \overline{Y}, \bullet)-A^{\sharp}(\theta(X), \phi \overline{Y}, \bullet),\nonumber
\end{equation}
and taking $\overline{Y}= \xi$, we have
\begin{equation}
(\nabla_{X}\phi)\xi = \eta(\pi_{\ast}X)\xi-\pi_{\ast}X + \phi A^{\sharp}(\theta(X), \xi,\bullet). \nonumber
\end{equation}
Hence
\begin{equation}
\nabla_{X}\xi= -\phi\pi_{\ast}X + \phi^{2} A^{\sharp}(\theta(X), \xi, \bullet).\nonumber
\end{equation}
Therefore
\begin{align}
d^{H}\eta(\overline{X}, \overline{Y})&= \frac{1}{2} ( g(\overline{Y}, \nabla_{\overline{X}^{H}}\xi) - g(\overline{X}, \nabla_{\overline{Y}^{H}}\xi))\nonumber\\
&= g(\overline{X}, \phi\overline{Y}) = \Phi(\overline{X}, \overline{Y}). \nonumber
\end{align}
Thus $(\phi, \xi, \eta, g)$ is a contact metric Finsler structure.
Now, by definition,
\begin{align}
N^{H}_{\phi}(\overline{X}, \overline{Y})= \phi(\nabla_{\overline{Y}^{H}}\phi)\overline{X}- \phi(\nabla_{\overline{X}^{H}}\phi)\overline{Y}
+ (\nabla_{(\phi \overline{X})^{H}}\phi)\overline{Y}-(\nabla_{(\phi \overline{Y})^{H}}\phi)\overline{X},\nonumber
\end{align}
and using the hypothesis, we obtain
\begin{align}
N^{H}_{\phi}(\overline{X}, \overline{Y})= -2 d^{H}\eta(\overline{X}, \overline{Y})\xi,\nonumber
\end{align}
which completes the proof.
\end{proof}
\begin{corollary}
For an almost contact metric Finsler structure $(\phi, \eta, \xi, g)$ on $\pi^{\ast}TM$, with identification $\pi^{\ast}TM\cong \mathcal{H}T M_{0}$, the following holds:
\begin{equation}
\nabla_{\xi^{H}}\phi = 0\;\;\mbox{and}\;\; (\nabla_{\xi^{V}}\phi)\overline{Y} = \phi A^{\sharp}(\theta(\xi^{V}), \overline{Y},
\bullet)-A^{\sharp}(\theta(\xi^{V}), \phi \overline{Y},\bullet),\nonumber
\end{equation}
for all $\overline{Y} \in \Gamma(\pi^{\ast}TM)$.
\end{corollary}
\begin{lemma}\label{cordcx}
For a contact metric Finsler structure $(\phi,\eta,\xi, g)$ on $\pi^{\ast}TM$, with identification $\pi^{\ast}TM\cong \mathcal{H}T M_{0}$, the following holds:
\begin{align} \label{corf}
&2g((\nabla_{X}\phi)\overline{Y}, \overline{Z}) = g(\mathcal{N}_{H}^{(1)}(\overline{Y},\overline{Z}),\phi \pi_{\ast}X)
+ 2 d^{H}\eta(\phi \overline{Y}, \pi_{\ast}X)\eta(\overline{Z})\nonumber\\
&- 2 d^{H}\eta(\phi \overline{Z}, \pi_{\ast}X)\eta(\overline{Y})
- 2\left(A(\theta(X), \phi\overline{Y}, \overline{Z})+A(\theta(X), \overline{Y}, \phi \overline{Z})\right).
\end{align}
\end{lemma}
\begin{proof}
The proof is obtained by Lemma \ref{lemfdci} and Theorem \ref{theofdci}.
\end{proof}
On a contact metric Finsler structure (Theorem \ref{theofdci}), $\mathcal{N}^{(3)}_{H}=0$ if and only if
$\xi$ is horizontally Killing, and $\mathcal{N}^{(3)}_{V}=0$ if and only if $\xi$ is vertically Killing. Then the horizontal Sasakian Finsler
structure is horizontal K-contact structure and the vertical Sasakian Finsler structure is vertical K-contact structure.
Due to the use of tensors $\mathcal{N}_{H}^{(3)}$ and $\mathcal{N}_{V}^{(3)}$, it would be important to investigate some properties of these tensors.
Let
\begin{eqnarray}
\mathbf{h}= \frac{1}{2}\mathcal{N}_{H}^{(3)}= \frac{1}{2}\mathcal{L}_{\xi^{H}}\phi \quad \hbox{ and} \quad \mathbf{v}= \frac{1}{2} \mathcal{N}_{V}^{(3)}
=\frac{1}{2}\mathcal{L}_{\xi^{V}}\phi.
\end{eqnarray}
We firstly notice that
\begin{equation}
\mathbf{h}\xi= 0 \quad \hbox{and} \quad \mathbf{v}\xi= 0.
\end{equation}
\begin{proposition}
For a contact metric Finsler $(\phi, \eta, \xi, g)$, $\mathbf{h}$ is a symmetric operator, whereas $\mathbf{v}$ is a symmetric operator
if
\begin{equation}
A(\theta(\overline{X}^{V}\!), \xi, \phi\overline{Y}) + A(\theta(\phi\overline{X}^{V}\!), \xi,\overline{Y}) =
A(\theta(\overline{Y}^{V}\!), \xi, \phi\overline{X}) + A(\theta(\phi\overline{Y}^{V}\!), \xi, \overline{X}),\nonumber
\end{equation}
for all $\overline{X},\overline{Y} \in \Gamma(\pi^{\ast}TM)$.
\end{proposition}
\begin{proof}
Let $\overline{X},\overline{Y} \in \Gamma(\pi^{\ast}TM)$, we have
\begin{align}
2g(\mathbf{h}\overline{X}, \overline{Y})&= g((\mathcal{L}_{\xi^{H}}\phi)\overline{X},\overline{Y})= g(\pi_{\ast}[\xi^{H}, (\phi\overline{X})^{H}]-\phi(\pi_{\ast}[\xi^{H}, \overline{X}^{H}]), \overline{Y})\cr
&= g(-\nabla_{(\phi\overline{X})^{H}}\xi+ \phi(\nabla_{\overline{X}^{H}}\xi), \overline{Y}).\nonumber
\end{align}
It follows that if $\overline{X}$ or $\overline{Y}$ is equal to $\xi$ then $g(\mathbf{h}\overline{X}, \overline{Y})=0$. Recall that $\mathcal{N}_{H}^{(2)}= 0$ for contact metric Finsler structures. Then for $\overline{X}$ and $\overline{Y}$ orthogonal to $\xi$,
\begin{eqnarray}
0&=&\mathcal{N}_{H}^{(2)}=(\mathcal{L}_{(\phi \overline{X})^{H}}\eta)\overline{Y}-(\mathcal{L}_{(\phi \overline{Y})^{H}}\eta)\overline{X}\cr
&=& \eta(\pi_{\ast}[(\phi \overline{Y})^{H}, \overline{X}^{H}])- \eta(\pi_{\ast}[(\phi\overline{X})^{H},\overline{Y}^{H}]).
\end{eqnarray}
Thus
\begin{eqnarray}\label{dcx}
\eta(\nabla_{(\phi\overline{X})^{H}}\overline{Y})+ \eta(\nabla_{\overline{X}^{H}}\phi \overline{Y})=
\eta(\nabla_{(\phi\overline{Y})^{H}}\overline{X})+ \eta(\nabla_{\overline{Y}^{H}}\phi \overline{X}).
\end{eqnarray}
On the other hand, $g(\xi, \overline{Y})= 0$ implies that
$
g(\xi, \nabla_{(\phi\overline{X})^{H}}\overline{Y})= - g(\nabla_{(\phi \overline{X})^{H}}\xi,
\overline{Y}),
$
so we have
\begin{align}
2g(\mathbf{h}\overline{X}, \overline{Y})&= g(-\nabla_{(\phi\overline{X})^{H}}\xi+ \phi(\nabla_{\overline{X}^{H}}\xi), \overline{Y})\cr
&= \eta(\nabla_{(\phi\overline{X})^{H}}\overline{Y})+ \eta(\nabla_{\overline{X}^{H}}\phi \overline{Y})\cr
&= \eta(\nabla_{(\phi\overline{Y})^{H}}\overline{X})+ \eta(\nabla_{\overline{Y}^{H}}\phi \overline{X})\cr
&= 2g(\mathbf{h}\overline{Y}, \overline{X}),\nonumber
\end{align}
which proves that $\mathbf{h}$ is symmetric. For the operator $\mathbf{v}$, using the fact that (see \cite{AE} for details)
\begin{equation}
\nabla_{X}\theta(Y)-\nabla_{Y}\theta(X)= \theta([X,Y]), \nonumber
\end{equation}
we obtain
\begin{eqnarray}\label{dcxv}
\eta(\nabla_{(\phi\overline{X})^{V}}\overline{Y})+ \eta(\nabla_{\overline{X}^{V}}\phi \overline{Y})=
\eta(\nabla_{(\phi\overline{Y})^{V}}\overline{X})+ \eta(\nabla_{\overline{Y}^{V}}\phi \overline{X}).
\end{eqnarray}
By observing that
\begin{equation}
g(\xi, \nabla_{\overline{X}^{V}}\phi \overline{Y})+ g(\nabla_{\overline{X}^{V}}\xi, \phi\overline{Y})
= 2A(\theta(\overline{X}^{V}), \xi, \phi \overline{Y})),
\end{equation}
one gets
\begin{align}
&2g(\mathbf{v}\overline{X},\overline{Y}) = g(\xi, \nabla_{(\pi\overline{X})^{V}}\overline{Y})+
g(\xi, \nabla_{\overline{X}^{V}}\phi\overline{Y}) -2 A((\phi\overline{X})^{V},\xi, \overline{Y})\cr
& -2 A(\theta(\overline{X}^{V}), \xi, \phi\overline{Y})\nonumber\\
&= \eta(\nabla_{(\pi\overline{X})^{V}}\overline{Y})+ \eta(\nabla_{\overline{X}^{V}}\phi\overline{Y})
-2 (A((\phi\overline{X})^{V},\xi, \overline{Y})+A(\theta(\overline{X}^{V}), \xi, \phi\overline{Y}) )\cr
&=
\eta(\nabla_{(\pi\overline{Y})^{V}}\overline{X})+ \eta(\nabla_{\overline{Y}^{V}}\phi\overline{X})
-2 (A((\phi\overline{X})^{V},\xi, \overline{Y})+A(\theta(\overline{X}^{V}), \xi, \phi\overline{Y})). \nonumber
\end{align}
Then, $\mathbf{v}$ is a symmetric operator if
\begin{eqnarray}
A(\theta(\overline{X}^{V}), \xi, \phi\overline{Y}) + A(\theta(\phi\overline{X}^{V}), \xi,\overline{Y})=
A(\theta(\overline{Y}^{V}), \xi, \phi\overline{X}) + A(\theta(\phi\overline{Y}^{V}), \xi, \overline{X}).\nonumber
\end{eqnarray}
This completes the proof.
\end{proof}
\begin{lemma}\label{dch}
For a contact metric Finsler structure $(\phi,\eta,\xi,g)$, the covariant derivative of $\xi$ in the direction
of $X \in \Gamma(TTM_{0})$ is given by:
\begin{equation}
\nabla_{X}\xi= -\phi\mathbf{h}(\pi_{\ast}X)-\phi\pi_{\ast}X+ A^{\sharp}(\theta(X),\xi,\bullet)-2A(\theta(X),\xi,\xi)\xi
\end{equation}
where,
\begin{equation}
g(A^{\sharp}(\theta(X),\xi,\bullet),\overline{Z})= A(\theta(X),\xi, \overline{Z}),
\end{equation}
for all $\overline{Z} \in \Gamma(\pi^{\ast}TM)$.
\end{lemma}
\begin{proof}
By Lemma \ref{cordcx}, we have
\begin{align}
&2g((\nabla_{X}\phi)\xi,\overline{Z}) = g(\mathcal{N}_{H}^{(1)}(\xi,\overline{Z}), \phi\pi_{\ast}X)-2 d^{H}\eta(\phi\overline{Z}, \pi_{\ast}X)
-2 A(\theta(X),\xi,\phi\overline{Z})\cr
&= -g((\mathcal{L}_{\xi^{H}}\phi)\overline{Z}, \pi_{\ast}X)-2g(\overline{Z},\pi_{\ast}X)+ 2g(\overline{Z},\eta(\pi_{\ast}X)\xi)-2
A(\theta(X),\xi,\phi\overline{Z})\cr
&= -2g(\mathbf{h}\overline{Z},\pi_{\ast}X)-2g(\overline{Z},\pi_{\ast}X)+ 2g(\overline{Z},\eta(\pi_{\ast}X)\xi)-2
A(\theta(X),\xi,\phi\overline{Z}).\nonumber
\end{align}
Thus, by symmetry of $\mathbf{h}$ we have
\begin{eqnarray}
\phi\nabla_{X}\xi= \mathbf{h}\pi_{\ast}X+ \pi_{\ast}X- \eta(\pi_{\ast}X)\xi+ \phi A^{\sharp}(\theta(X), \xi,\bullet).\nonumber
\end{eqnarray}
Applying $\phi$ to this equation, one has
\begin{equation}
\nabla_{X}\xi= -\phi\mathbf{h}(\pi_{\ast}X)-\phi\pi_{\ast}X+ A^{\sharp}(\theta(X),\xi,\bullet) -2A(\theta(X),\xi,\xi)\xi\nonumber
\end{equation}
which completes the proof.
\end{proof}
\begin{corollary}\label{ach}
Let $(\phi,\eta,\xi,g)$ be a contact metric structure. Considering the identification $\pi^{\ast}TM\cong \mathcal{H}TM_{0}$, the operator $\mathbf{h}$ anti-commutes with $\phi$ and
\begin{equation}
trace_{g}\mathbf{h}= 0.
\end{equation}
\end{corollary}
\begin{proof}
For all $\overline{X}, \overline{Y} \in \Gamma(\pi^{\ast}TM)$, we have
\begin{align}
2g(\overline{X},\phi\overline{Y})&= g(\nabla_{\overline{X}^{H}}\xi, \overline{Y})-g(\nabla_{\overline{Y}^{H}}\xi, \overline{X})\cr
&= g(-\phi\mathbf{h}(\overline{X})-\phi\overline{X}, \overline{Y})
-g(-\phi\mathbf{h}(\overline{Y})-\phi\overline{Y}, \overline{X})\cr
&= 2g(\overline{X},\phi\overline{Y}) - g(\phi\mathbf{h}(\overline{X}), \overline{Y}) +
g(\phi\mathbf{h}(\overline{Y}), \overline{X}).
\end{align}
Consequently,
\begin{eqnarray}
- g(\phi\mathbf{h}(\overline{X}), \overline{Y}) +
g(\phi\mathbf{h}(\overline{Y}), \overline{X})= 0,
\end{eqnarray}
and we obtain
\begin{equation}
\mathbf{h}\phi + \phi\mathbf{h}=0
\end{equation}
So $\mathbf{h}$ anti-commutes with $\phi$. For the last assertion, if $\mathbf{h}\overline{X}= \lambda \overline{X}$, then
\begin{equation}
\mathbf{h}\phi\overline{X} = -\phi\mathbf{h}\overline{X} = -\lambda \phi\overline{X}.
\end{equation}
Thus if $\lambda$ is an eigenvalue of $\mathbf{h}$, so is $- \lambda$ and hence $ trace_{g}\mathbf{h}=0$.
\end{proof}
Now, we discuss some aspects of the hh-curvature $R$, with respect to the Chern connection of contact metric Finsler
pulled-back bundle $(\pi^{\ast}TM, \phi, \eta, \xi,g)$.
\begin{proposition}\label{proric}
On contact metric Finsler pulled-back bundle $(\pi^{\ast}TM, \phi, \eta, \xi,g)$, we have:
\begin{eqnarray}\label{cxh}
\left(\nabla_{\xi^{H}}\mathbf{h}\right)\pi_{\ast}X = \phi\pi_{\ast}X -\mathbf{h}^{2}\phi \pi_{\ast}X+ \phi R(\xi^{H},X)\xi +
\phi A^{\sharp}(\theta [\xi^{H}, X], \xi, \bullet),
\end{eqnarray}
and
\begin{align}\label{cxh1}
& \frac{1}{2}\left(R(\xi^{H},X)\xi- \phi R(\xi^{H}, (\phi \pi_{\ast}X)^{H})\xi \right) = \mathbf{h}^{2} \pi_{\ast}X
+ \frac{1}{2}\phi^{2}A^{\sharp}(\theta([\xi^{H}, X]), \xi, \bullet)\cr
&\quad + \phi^{2}\pi_{\ast}X + \frac{1}{2}\phi A^{\sharp}(\theta([\xi^{H}, (\phi\pi_{\ast}X)^{H}]),\xi,\bullet).
\end{align}
\end{proposition}
\begin{proof}
The fact that $\nabla_{\xi^{H}}\xi= 0$, we have
\begin{eqnarray}
R(\xi^{H}, X)\xi &=& \nabla_{\xi^{H}}\nabla_{X}\xi- \nabla_{[\xi^{H}, X]}\xi.\nonumber
\end{eqnarray}
Then, by Lemma \ref{dch} we obtain
\begin{eqnarray}\label{hhc}
R(\xi^{H}, X)\xi &=& -\phi\nabla_{\xi^{H}}\mathbf{h}(\pi_{\ast}X)-\phi \nabla_{\xi^{H}}\pi_{\ast}X+ \phi \mathbf{h}(\pi_{\ast}[\xi^{H}, X])
+ \phi\pi_{\ast}[\xi^{H}, X]\cr && + A^{\sharp}(\theta([\xi,^{H}X]),\xi,\bullet)-2A(\theta([\xi,^{H}X]),\xi,\xi)\xi.
\end{eqnarray}
Applying $\phi$ to the equation (\ref{hhc}), and using the fact that $\nabla_{\xi^{H}}\phi=0$
we have,
\begin{align}
\phi R(\xi^{H}, X)\xi &= \nabla_{\xi^{H}}(\pi_{\ast}X + \mathbf{h}\pi_{\ast}X)- \eta(\nabla_{\xi^{H}}(\pi_{\ast}X+
\mathbf{h}\pi_{\ast}X))\xi -\mathbf{h} \pi_{\ast}[\xi^{H},X] \cr
& + \eta(\pi_{\ast}[\xi^{H},X])\xi -\pi_{\ast}[\xi^{H},X]+\phi A^{\sharp}(\theta ([\xi^{H}, X], \xi, \bullet)\cr
&= \nabla_{\xi^{H}}(\pi_{\ast}X + \mathbf{h}\pi_{\ast}X)-\mathbf{h} \pi_{\ast}[\xi^{H},X] -\pi_{\ast}[\xi^{H},X]\cr
&+\phi A^{\sharp}(\theta ([\xi^{H}, X], \xi, \bullet)\nonumber
\end{align}
By Corollary \ref{ach} and the fact that
$\eta(\nabla_{\xi^{H}}\mathbf{h}\pi_{\ast}X= 0$, we obtain
\begin{align}\label{hccf}
\phi R(\xi^{H}, X)\xi &= (\nabla_{\xi^{H}}\mathbf{h})\pi_{\ast}X - \phi \pi_{\ast}X + \mathbf{h}^{2}\phi \pi_{\ast}X \cr & -
\phi A^{\sharp}(\theta ([\xi^{H}, X], \xi, \bullet),
\end{align}
which leads to the relation (\ref{cxh}). Now, from (\ref{hccf}) we have
\begin{align}\label{for1}
\phi R(\xi^{H}, ( \phi(\pi_{\ast}X))^{H})\xi
&= (\nabla_{\xi^{H}}\mathbf{h})\phi(\pi_{\ast}X) - \phi^{2}(\pi_{\ast}X) + \mathbf{h}^{2}\phi^{2}\pi_{\ast}X \cr & -
\phi A^{\sharp}(\theta ([\xi^{H},(\phi(\pi_{\ast}X))^{H}], \xi, \bullet)\cr
&= -\phi(\nabla_{\xi^{H}}\mathbf{h})(\pi_{\ast}X ) - \mathbf{h}^{2}\pi_{\ast}X-\phi^{2}\pi_{\ast}X \cr & -
\phi A^{\sharp}(\theta ([\xi^{H}, (\phi(\pi_{\ast}X))^{H}], \xi, \bullet),
\end{align}
and,
\begin{align}\label{for2}
R(\xi^{H}, X)\xi &= -\phi((\nabla_{\xi^{H}}\mathbf{h})\pi_{\ast}X)+\phi^{2}(\pi_{\ast}X)+\mathbf{h}^{2}\pi_{\ast}X \cr
& - \phi^{2}(A^{\sharp}(\theta([\xi^{H}, X], \xi, \bullet)).
\end{align}
Subtracting (\ref{for2}) by (\ref{for1}), we get (\ref{cxh1}).
\end{proof}
Recall that the pulled-back bundle $\pi^{\ast}TM$ is locally of dimension $2n+1$. Then, as in Riemannian case, we have a $\phi$-basis
of $\pi^{\ast}TM$ given by
\begin{equation}
\left\{\partial_{i},\;\; \partial_{i^{\ast}}:= \phi\partial_{i},\;\; \xi\right\}_{i=1\cdots n}.
\end{equation}
It is well know that (see \cite{mb2} for more details), by the trace of hh-curvature of Chern connection, we have a Finslerian analogous of Ricci tensor, called
horizontal Ricci (1,1;0)-tensor, denoted $Ric^{H}$ and given by
\begin{equation}\label{tra}
Ric^{H}(\overline{Z},X)= trace_{g}( \overline{Y}\mapsto R(X,\overline{Y}^{H})\overline{Z}),
\end{equation}
where $X\in \Gamma(TTM_{0})$ and $\overline{Y}, \overline{Z} \in \Gamma(\pi^{\ast}TM)$.
\begin{proposition}\label{hkcs}
On contact metric Finsler pulled back bundle $(\pi^{\ast}TM, \phi, \eta, \xi,g)$, the horizontal Ricci $(1,1;0)$-tensor curvature
with respect to $\xi$ and $\xi^{H}$, is given by:
\begin{align}
Ric^{H}(\xi,\xi^{H}) & = - 2n + 2 trace_{g}\mathbf{h}^{2} + \sum_{i=1}^{n}\frac{1}{2}\left\{A(\theta([\xi^{H}, \delta_{i}]), \xi,\partial_{i})\right.\nonumber\\
&\left.-A(\theta([\xi^{H}, \delta_{i^{\ast}}]), \xi,\phi\partial_{i})\right\},
\end{align}
where $\delta_{i}= \partial_{i}^{H}$ and $\delta_{i^{\ast}}= \partial_{i^{\ast}}^{H}$, for all $i=1,\cdots,n$.
\end{proposition}
\begin{proof}
By (\ref{tra}), and the fact that $R(\xi^{H}, \xi^{H})\xi=0$ we have
\begin{eqnarray}
Ric^{H}(\xi, \xi^{H})&=&\sum_{i=1}^{n}\left[g(R(\xi^{H},\delta_{i})\xi, \partial_{i})
+g(R(\xi^{H},\delta_{i^{\ast}})\xi, \partial_{i^{\ast}})\right]\cr
&=& \sum_{i=1}^{n}\left[g(R(\xi^{H},\delta_{i})\xi-\phi R(\xi^{H},\phi\delta_{i})\xi, \partial_{i})\right].\nonumber
\end{eqnarray}
Then, by Proposition \ref{proric}, we obtain
\begin{align}
Ric^{H}(\xi, \xi^{H})&= \sum_{i=1}^{n}2g\left( \mathbf{h}^{2}\partial_{i}
+ \phi^{2}\partial_{i} + \frac{1}{2} \phi^{2}A^{\sharp}(\theta([\xi^{H}, \delta_{i}]), \xi, \bullet), \partial_{i}\right)\cr
& +\sum_{i=1}^{n}g\left(\phi A^{\sharp}(\theta([\xi^{H}, \phi \delta_{i}],\xi,\bullet)), \partial_{i}\right),\nonumber
\end{align}
which proves the assertion.
\end{proof}
\begin{theorem}
A contact metric Finsler pulled back bundle $(\pi^{\ast}TM, \phi, \eta, \xi,g)$ is horizontally k-contact if and only if
\begin{equation}
Ric^{H}(\xi,\xi^{H}) = - 2n + \sum_{i=1}^{n}\left(A(\theta([\xi^{H}, \delta_{i}]), \xi,\partial_{i})
-A(\theta([\xi^{H}, \delta_{i^{\ast}}]), \xi,\phi\partial_{i})\right).\nonumber
\end{equation}
\end{theorem}
\begin{proof}
The proof is derived from Proposition \ref{hkcs} and the fact that, $\mathbf{h}=0$ for the horizontal $K$-contact metric Finsler structures.
\end{proof}
In case of the flag curvature \cite{AA}, we have a Finslerian
analogous part of Hatakeyama, Ogawa and Tanno's result \cite{HOT}.
\begin{theorem}
Let $(\pi^{\ast}TM, \phi, \eta, \xi,g)$ be a horizontally K-contact metric Finsler pulled back bundle. Then, the flag curvature with the transverse edge $\xi$ is equal to $1$.
\end{theorem}
\begin{proof}
Assume that $(\pi^{\ast}TM, \phi, \eta, \xi,g)$ is horizontally
K-contact then $\mathbf{h}= 0$. On the other hand, the flag
curvature with the transverse edge $\xi$ is given by
\begin{align}
K(l,\xi)&= g(R(l^{H}, \xi^{H})\xi, l) = g (\phi
\nabla_{\xi^{H}}\mathbf{h}l-\phi^{2}l-\mathbf{h}^{2}l-\phi^{2}A^{\sharp}(\theta[\xi^{H},l^{H}],\xi,\bullet),l )\nonumber\\
&= -g(\nabla_{\xi^{H}}\mathbf{h}l,\phi l)+ 1- g(\mathbf{h}^{2}l,l),\nonumber
\nonumber
\end{align}
and the assertion follows by hypothesis.
\end{proof}
\section*{Acknowledgments}
The second author would like to thank the University of KwaZulu-Natal for financial support.
\bibliographystyle{plain}
|
\section{Introduction}
\vskip -0.2cm
The analysis of the microwave to sub-mm sky plays a crucial role not only for the cosmological information contained in the cosmic microwave background (CMB)
but also for the wealth of astrophysical information it provides.
The {\it Planck} Collaboration has recently released maps in temperature (resp. polarization) at nine (resp. seven) frequency bands between 30 and 857 GHz (resp. 353 GHz)
reprocessing the data from the Low (up to 70 GHz) and High (from 100 GHz) Frequency Instruments (LFI and HFI).
To extract
relatively bright variable sources, the diffuse Zodiacal Light Emission and solar system bodies,
a comparison between data taken at different times or maps derived from different surveys is performed,
since signal dependence on time and/or on the relative observer-source or -interplanetary dust cloud positions.
The separation of all the other astrophysical emissions and of CMB anisotropies is
carried out on
maps averaged over advantageous sets of surveys
applying, respectively for point-like sources and diffuse emissions, dedicated filters, possibly complemented by external catalogs, and algorithms
exploiting frequency dependence and angular correlation, possibly in combination with templates at other frequency bands.
\section{Catalogs of sources and clusters of galaxies}
\vskip -0.2cm
The Second {\it Planck} Catalogue of Compact Sources (PCCS2), both Galactic and extragalactic, consists of (many tens of thousands) sources detected in single-frequency maps, combined from all {\it Planck} mission data
over the entire sky, through the Mexican Hat Wavelet 2 algorithm (see Fig. \ref{srcsz}).
Four different flux-density estimates have been validated by simulations (internal validation) and comparison with other astrophysical data (external validation).
Compact sources detected at lower (resp. higher) frequencies are assigned to the PCCS2 (resp. to the PCCS2 or PCCS2E sub-catalogues,
depending on their sky positions). The PCCS2 covers most of the sky and allows to extract subsamples at higher reliabilities than the target 80\% integral reliability of the catalogue.
The PCCS2E contains sources whose detection reliability is affected by diffuse emission.
Both catalogs include polarized flux densities, or upper limits, and orientation angles at frequencies 30 GHz $\le \nu \le$ 353 GHz for many hundreds sources.
The spectral index proves the source nature: the low (resp. high) frequency channels are dominated by synchrotron (resp. dusty galaxies) sources.
A significant steepening at $\nu \sim$ 50 GHz is found in blazar spectra and the bright tail of extragalactic source counts at high frequency (at least for $\nu \le 217$ GHz) is dominated
by synchrotron emitters, not by dusty galaxies.
The Second {\it Planck} catalog of SZ galaxy clusters (PSZ2), with 1653 detections, is the largest SZ-selected sample and the deepest all-sky catalogue of galaxy clusters.
They have been analyzed with observations in other wavebands (radio to IR, optical and X-rays) and 1203 of them have counterparts in datasets external to {\it Planck}.
A population of low-redshift X-ray under-luminous clusters has been revealed by SZ selection. They appear in optical and SZ surveys with consistent mass properties,
but are almost absent in ROSAT X-ray selected samples.
Fig. \ref{srcsz} compares PSZ2 with deeper SZ catalogs obtained with South Pole and Atacama Cosmology Telescopes (SPT and ACT) on selected areas.
Microwave and X-ray cluster data have been jointly used to independently constrain cosmological parameters.
In particular, the evolution of galaxy cluster abundance with mass and redshift set constraints on the matter density fluctuation normalization,
the mean matter density, the dark energy density and equation of state, and on extensions of the minimal cosmological model,
including e.g. massive neutrinos and modified gravity.
Integrated information on cluster physics and cosmological evolution comes from the Comptonization parameter, $y$, fluctuations over all-sky {\it Planck} maps\cite{planck2015XXII} other than
observing it as SZ effect towards specific clusters. The analysis of sub-millimeter/far-IR background fluctuations, carried out mainly in selected {\it Planck}
areas, proves high-$z$ galaxy evolution and star formation history\cite{planck2013XXX}.
These themes are also probed by large scale CMB polarization, sensitive to cosmic reionization history\cite{trombettiburigana,planck2015I}
related to structure and star formation/evolution and their production of ionizing photons in the intergalactic medium.
\begin{figure}[t]
\begin{minipage}{6cm}
\centering
\includegraphics[height =3.7cm,width=6cm]{fig1a.pdf}
\end{minipage}
\begin{minipage}{6cm}
\centering
\includegraphics[height =3.7cm,width=6cm]{fig1b.pdf}
\end{minipage}
\vskip -0.3cm
\caption{Left panel: sensitivity (the flux density at 90\% completeness) of the PCCS2, compared with PCCS, ERCSC, WMAP and others.
For the LFI channels, the sensitivities refer to the full sky.
For the HFI channels, the 90\% completeness limits plotted for the PCCS were evaluated in a selected extragalactic zone;
the regions of sky to which the 90\% completeness limits apply are similar but not identical to those of the PCCS2.
From Ref. [1].
Right panel: distribution of PSZ2 clusters with associated redshift in the mass-redshift (M500 -- $z$) plane compared to SPT
and ACT
catalogues. Black circles: PSZ2 clusters; red (green) filled circles: common SPT/PSZ2 (ACT/PSZ2) clusters.
Red (green) empty squares: the remaining SPT (ACT) clusters not detected by {\it Planck}. See also the text.
From Ref. [2].
}
\label{srcsz}
\vskip -0.55cm
\end{figure}
\section{Galactic diffuse components}
\vskip -0.2cm
Astrophysical diffuse components and CMB anisotropies have been separated from {\it Planck} multifrequency maps by means of four algorithms. SEVEM and COMMANDER work in real space, NILC in
real and harmonic (needlet) space and SMICA in harmonic or needlet domain.
The CMB maps extracted with these methods are in remarkable agreement, implying that the overall foreground emission
is analogously well set. COMMANDER, based on a-priori knowledge of foreground components characterized by parameters to be reconstructed with Bayesian methods in real space independently for each resolution element, has been found particularly suitable for characterizing astrophysical emissions varying across the sky.
For temperature analysis, {\it Planck} data have been combined with WMAP\cite{wmap} and
408 MHz\cite{haslam} maps
to jointly extract CMB, synchrotron, free-free, spinning dust, CO, line emission in the 94 and 100 GHz channels, and thermal dust emission.
Fig. \ref{mapsrms} shows the Stokes Q and U parameter maps for the synchrotron and thermal dust emissions, the only diffuse astrophysical components faithfully extracted in polarization.
Another important emission clearly appears close to the Galactic center in {\it Planck} low frequency maps:
the so-called ``haze'' component, whose full comprehension -- related to astrophysics and/or dark matter phenomena -- is still controversial.
From the various source maps it is possible to quantify the contribution of each component to sky fluctuations, displayed in Fig. \ref{mapsrms}.
A remarkable result of {\it Planck} is the assessment of the microwave sky complexity, calling for even more frequency channels for future CMB projects aimed
at precise characterization of all components and of tiny CMB polarization features, such as primordial B-modes.
Note also the change of paradigm with respect to WMAP results in the relative weights of the various components. In temperature, synchrotron emission fluctuations are less than
those of both free-free and spinning dust emissions around 30 GHz. The angular power spectrum (APS) of synchrotron and dust polarized emissions has been properly characterized
on various wide sky areas \cite{planck2015X} and the synchrotron frequency behavior has been studied as function of the Galactic latitude \cite{planck2015XXV}.
Polarized emission from Galactic dust, the main foreground above 70 GHz, is important (and sometimes underestimated
in previous analyses) essentially everywhere in the sky. {\it Planck} maps provided new insights into interstellar dust physics
and a precise determination of the contamination level in the CMB APS \cite{planckPIPXXX} for polarization experiments,
allowing for a proper analysis of BICEP2 and {\it Keck} array observations\cite{B2KP}.
\vskip -0.2cm
\begin{figure}[t]
\begin{minipage}{5.cm}
\centering
\hskip -0.3cm
\includegraphics[height =4cm,width=5cm]{fig2a.pdf}
\end{minipage}
\begin{minipage}{7.5cm}
\hskip -0.7cm
\centering
\includegraphics[height =4cm,width=7.2cm]{fig2b.pdf}
\end{minipage}
\vskip -0.3cm
\caption{Maps: Stokes Q and U parameters for the synchrotron ($s$; at 30 GHz) and thermal dust ($d$; at 353 GHz) polarization.
Panels: brightness temperature rms as a function of frequency and component for temperature (left),
where each component is smoothed to an angular resolution of $1^{\circ}$ FWHM and the lower and upper edges of each line are defined by masks covering respectively
81\% and 93\% of the sky, and polarization (right), where the corresponding smoothing scale is 40$'$ and the sky fractions are 73\% and 93\%.
From Ref. [3].
}
\label{mapsrms}
\vskip -0.55cm
\end{figure}
{\small
\section*{Acknowledgments}
\vskip -0.2cm
We acknowledge the use of the NASA Legacy Archive for Microwave Background Data Analysis
and of the ESA {\it Planck} Legacy Archive.
The ASI/INAF Agreement 2014-024-R.0 for the {\it Planck} LFI Activity of Phase E2 is acknowledged.
Some results of this paper have been derived using HEALPix \cite{Gor05} package.
}
{\small
|
\section{Introduction}
\label{sec:intro}
An ongoing computational challenge within Artificial Intelligence (AI) has been the combinatorial explosion.
In response, AI has developed, and continues to develop, many powerful techniques to address this challenge.
One technique, originating from theoretical computer science but currently becoming popular in AI, is that of the theory of fixed parameter tractable (FPT) algorithms, which is concerned with parametrisation of hard problems that can reveal new ways in which they are tractable (in the FPT sense).
In this paper, we are linking together AI and FPT results and applying them to an important access control problem arising in many organisations.
Specifically, many organisations often have to solve `workflow' problems in which multiple sets of tasks, or \emph{steps} need to be assigned to workers, or \emph{users}, subject to constraints that are designed to ensure effective, safe and secure processing of the tasks.
For example, security might require that some sets of tasks are performed by a small group of workers or maybe just one worker.
Alternatively, some sets might need to be performed by at least two users, for example, so as to ensure independent processing or cross-checking of work, etc.~\cite{BaBuKa14,CrGuYe13,Roy2015,WaLi10}.
Furthermore, different users have different capabilities and security permissions, and will generally not be authorised to process all of the steps.
In the \emph{Workflow Satisfiability Problem} (WSP), the aim is to assign authorised users to the steps in a workflow specification, subject to constraints arising from business rules and practices.
(Note the term ``workflow'' originally arose from the flow of the steps between users, however, in this context, the time ordering is not relevant -- there is no `flow' but the challenge is to plan by making feasible assignments for all the steps.)
The WSP has important applications and has been extensively studied in the security research community~\cite{BaBuKa14,BeFeAt99,ValuedWSP-SACMAT,Cr05,WaLi10}.
However, the WSP is NP-complete, and despite the practical importance of the problem, it has been difficult to solve even some moderate-sized instances~\cite{JOCO2014,Roy2015}.
Work in WSP has attempted to render solving of the WSP practical by finding a subclass of problems that admit \emph{fixed parameter tractable} (FPT) algorithms; informally speaking, meaning that there is a small parameter $k$ such that the problem is exponential in $k$ but polynomial in the size of the problem.
In the case of the WSP, the small parameter $k$ is the number of steps as it was observed that in real instances the number $k$ of steps is usually much smaller than the number $n$ of users~\cite{WaLi10}.
It has been shown~\cite{CoCrGaGuJo14} that the WSP is FPT if the set of constraints is restricted to the so-called \emph{user-independent} (UI) constraints, i.e.\ constraints whose satisfaction does not depend on specific user identities.
Then existing methods~\cite{JOCO2014} achieve a runtime that is polynomial in $n$, and exponential only in $k$.
Since in practice, we can generally assume, and exploit, that $k \ll n$, this is a very significant improvement over direct search.
(Constraints described in the WSP literature are relatively simple, so it was assumed in \cite{CoCrGaGuJo14} that every constraint can be checked in polynomial time.
We will use the same assumption in this paper.
We will also assume that an authorisation test $s \in A(u)$ takes constant time, as we store authorisation lists in memory.)
This paper has three major, interacting components:
\begin{enumerate}
\item
A highly effective procedural method PBT based on a two level decomposition of the problem, and a specialised backtracking search supported by heuristics and pruning.
\item
A declarative method from a pseudo-boolean \cite{BorosHammer2002:PBO,BePa10} formulation `PBPB' which also exploits the two level decomposition of the problem.
\item
Experimental studies of the algorithm performances, but focussing on average case complexity, and supported by Phase Transition (PT) phenomena \cite{Bollobas:book,Huberman87:phase,cheeseman91where,mitchell92hard} in a fashion extended and adapted for the needs of an FPT study.
\end{enumerate}
To fully exploit the two level decomposition of the problem we use special structures that we call \emph{patterns}.
Patterns capture the decisions concerned with UI constraints but generally do not fix user assignment.
In particular, they specify which steps are to be performed by the same user and which steps are to be performed by different users.
The notion of patterns is a convenient tool for handling the decomposition of WSP into two levels: upper level corresponding to UI constraints, where the decisions can be encoded with a pattern, and lower level corresponding to user assignment.
This is used in our two-level algorithm which we call Pattern Backtracking (PBT)\@.
Its upper level implements a tree search in the space of patterns (thus not fixing user assignments), and the lower level searches for a user assignment restricted by a pattern.
The space of upper level solutions has size exponential in $k$ (and not depending on $n$), and the lower level can be reduced to a bipartite matching problem, i.e.\ admits polynomial algorithms. Thus, PBT has running time exponential in $k$ only.
We will show that PBT is not only FPT but also has polynomial space usage
\footnote{
Note that, the complexity class FPT does not in itself directly restrict the space usage; the previous algorithms had a space usage that was also exponential in $k$, and this restricted their application to (roughly) $k \le 20$.}
Moreover, due to the two-level structure of PBT, together with careful design of pruning methods and branching heuristics, the resulting implementation is many orders of magnitude faster than previous methods, with much improved scaling behaviour.
The reachable values of $k$, i.e.\ the number of steps in the workflow, jump from about $k \le 20$ to about $k \le 50$; the reachable number of users is also now extended to being thousands, and so the problem is much larger than the parameter $k$ would suggest.
This is a significant achievement for an NP-complete problem, and also can be expected to be sufficient for practical-sized WSP instances.
In addition to the new efficient FPT algorithm PBT, we provide a new Pseudo-Boolean (PB) formulation `PBPB' of the problem.
Existing PB or integer programming encodings of the WSP with UI constraints \cite{JOCO2014,WaLi10} are based on the binary decision variables $x_{su}$, indicating whether step $s$ is assigned to user $u$ (we refer to these encodings as `UDPB' for ``user-dependent PB" encodings)\@.
Since we deal with user-independent constraints, it is clearly not suitable to express solution methods for this type of problem in terms of direct branching only on these $x$-variables as they explicitly depend on the users.
Therefore, in the PBPB formulation of the problem, we also use a set of $M$-variables:
\begin{equation}
M_{ij} = 1 \mbox{ iff steps $i$ and $j$ are assigned to the same user, $0$ otherwise.}
\end{equation}
Setting $M_{ij} = 1$ or $M_{ij} = 0$ roughly corresponds to how the patterns are used in PBT\@.
The $M$-variables in the PBPB formulation are used to allow an `off-the-shelf' PB solver to better exploit the two-level decomposition of the problem -- branching on $M$-variables captures the UI property of the constraints and corresponds to the upper level of the search (in the space of patterns).
Notice that such variables have also been used extensively in powerful semi-definite programming approaches to graph colouring \cite{Lovasz1979:shannon}, e.g.\ see \cite{DukanovicRendl2008:SDP-heuristic-GCP}, where they are referred to as the `colouring matrix'.
By using a generic PB solver, SAT4J~\cite{BePa10}, we show that performance of the new PBPB formulation is several orders of magnitude better than the previous UDPB formulation. Moreover, PBPB can even compete with PBT in terms of scaling behaviour, in some circumstances, though not in terms of constant factors.
This substantial progress in comparison to UDPB can be explained by the ability of PBPB to exploit the FPT nature of the problem.
Another interesting observation is that the WSP is basically the constraint satisfaction problem (CSP), where for each variable $s$ (called a step in WSP terminology) we have an arbitrary unary constraint (called an authorisation) that assigns possible values (called users) for $s$.
(It is important to remember that for the WSP we do not use the term `constraint' for authorisations. So, when we define special types of constraints, we do not extend these types to authorisations, which remain arbitrary.)
However, the approach in WSP is different: in CSP, the number of variables is usually much larger than the number of values (size of the domains), whereas in the WSP viewed as a CSP, usually the number of steps (number of variables) is much smaller than the number of users (size of the domains).
To the best of our knowledge, WSP is the first application of such CSPs\@.
However, there are only a few studies that consider relevant cases.
One of the most closely related ones is~\cite{Fellows2011} which discusses the ``all different'' constraints, requiring that all the variables in the scope are assigned different values. From the WSP point of view, it is a special kind of UI constraint.
Among other results, it is shown in~\cite{Fellows2011} that CSP with ``all different'' constraints parametrised by the number of variables admits FPT algorithms.
However, our study considers a much more general class of constraints. Moreover, it is concerned with practical considerations such as practically efficient algorithms and average case empirical analysis.
Regarding the computational complexity, usually, FPT problems and algorithms have been studied from the perspective of worst case analysis.
This is appropriate for initial studies, however, it is well-known that worst-case analysis can often be over-pessimistic (and sometimes wildly so).
Hence, in terms of the study of the potential practical usages of proposed algorithms, it is vital to perform some study of the performance averaged over different instances.
One approach to doing this is of course to set up a benchmark suite of real instances. However, in the case of WSP, there is not yet any such suite publicly available, and even if it were, then it would probably not be suitable for scaling studies due to the diverse nature of instances in such suites.
Hence, as commonly accepted, we use a generator of artificial instances.
However, in this case, we need to have a systematic way to decide on the parameters used in the generation of instances, and in a fashion that gives the best chance of obtaining a meaningful and reliable insight into the behaviour of different FPT algorithms.
With these motivations, in the second half of the paper we study the WSP from the perspective of phase transition or threshold phenomena.
It has long been known that complex systems can exhibit threshold phenomena, see e.g.~\cite{Bollobas:book,
Huberman87:phase,
cheeseman91where,
mitchell92hard,
SelmanKirkpatrick1996:AIJ-critical-behavior,
MonassonEtal1999:Nature:determining-complexity-from-PT,
Achlioptas2001:lower-bounds-r3SAT,
mezard2005clustering,
FanShen2011:AIJ-PT-in-random-CSP}.
They are characterised by a sharp change, or phase transition (PT), in the properties of problem instances when a parameter in the instance generation is changed.
An important discovery was that such thresholds are also associated with decision problems that are the most challenging for search: The PT is the source of hard instances of the associated decision problem.
In the context of NP-complete problems, this means the average time complexity $t(n)$ is exponential in the PT region, i.e. it has a form that matches the worst case expectations, though usually with a reduced coefficient in the exponent.
Outside of the PT region, the average complexity can drop, and so be substantially better, possibly even polynomial, for sufficiently under-constrained instances.
Testing on instances without study of the associated PT properties has the danger of accidentally picking an easy region and, as a result, obtaining overly optimistic results.
Since the WSP is a decision problem, a fair and effective testing of the scaling of the algorithms is best done by focussing on the scaling within the phase transition region.
(We also argue later that real instances are likely to be close the PT region.)
In order to do this we will show how the generator we use for the WSP instances leads to behaviour that is expected from a phase transition.
We will also show that empirical average case analysis of FPT algorithms is more difficult than a typical PT study, since FPT problems have not just one but several size parameters.
Then a good study has to consider different regions of this multi-dimensional size space.
To the best of our knowledge this `empirical average case' has not previously been systematically organised for the case of FPT studies.
\subsection{Contributions and highlights}
The contributions of this paper are hence:
\begin{itemize}
\item
A clear split of WSP with UI constraints into two levels by means of patterns, and a pattern-based search method, PBT, that effectively exploits this two-level split.
Also an efficient implementation of PBT\footnote{The PBT implementation presented in this paper is a significant improvement over the algorithm introduced in the preliminary report~\cite{KaGaGu}.
The new version still fundamentally exploits the upper/lower decomposition and pattern based search (introduced in \cite{KaGaGu}) but employs numerous algorithmic enhancements demonstrating better worst-case time and space complexity, and is faster by about an order of magnitude according to our computational experiments.}, with evidence that it successfully tackles much larger problems than previously possible.
Moreover, it is the first WSP algorithm that is not only FPT but runs in polynomial space.
\item
A new Pseudo-Boolean (PB) encoding, PBPB, (Section~\ref{sec:PB-form}), that captures the key ideas of the PBT method by introduction of auxiliary variables.
This raises a new direction of research concerned with formulations of FPT problems that can be solved by general purpose solvers in FPT time and, thus, giving a new approach to prototyping or even developing solution methods for such problems.
\item
A study of the phase transition properties of a generator of WSP instances, giving evidence of it, and studying some standard properties expected from a phase transition.
We also discuss how a standard methodology to predict analytically the point of the phase transition needs to be adjusted because of the FPT nature of the problem.
\item
An FPT-aware phase transition study of the empirical properties of the algorithms:
\begin{itemize}
\item
An approach to empirical average case study of FPT problems, based on the standard PT study adjusted to the multi-dimensional size space of an FPT problem.
We suggest to measure scaling of algorithms along one-dimensional `slices' through the size space.
We raise and leave open an associated question of selecting other appropriate slices.
\item
Empirical evidence that the scaling of the average runtime is indeed exponential only in $k$, consistent with the expectations from the worst-case FPT analysis.
\item
Empirical evidence that away from the PT region, the complexity drops rapidly.
This matches the usual ``easy-hard-easy'' pattern expected in phase transitions \cite{cheeseman91where}.
\end{itemize}
\end{itemize}
A contributions of this work is to show that the WSP problem with UI constraints is FPT due to a particular `layer structure', and that this structure is compatible with, and complementary to, exploitation by standard AI search techniques, as well as logical representational schemes such as PB\@.
Hence, enabling a mix of AI and FPT algorithmic and analysis techniques may give another tool to combat the combinatorial explosion challenges that arise within AI.
\subsection{Structure of the paper}
Section~\ref{sec:background} gives the needed background on the theory of FPT, and the WSP\@.
Section~\ref{sec:WSP-FPT} describes the notions of patterns central for the discussed algorithms.
Section~\ref{sec:algorithm} gives the new PBT algorithm in detail and demonstrates that it is FPT\@.
Section~\ref{sec:PB-form} gives the new PB formulation PBPB of the WSP\@.
(Associated with this, \ref{ap:encoding-constraints} gives details of encoding of various UI constraints.)
Section~\ref{sec:analysis-of-approaches} gives a descriptive comparison of the workings of the PBT algorithm, the existing algorithm~\cite{JOCO2014} which we call here Pattern User-Iterative (PUI), and the PBPB encoding.
Section~\ref{sec:testbed} introduces the instance generator that we use for the experiments and shows how there is a phase transition, that has the expected properties of a standard phase transition.
Some more technical aspects related to the PT are given in two appendices:
\ref{ap:estimated-PT} gives an analytical computation to estimate the location of the phase transition;
\ref{ap:PT-forced} gives empirical evidence of freezing of variables around the PT region, i.e.\ of variables whose values are forced by the instance -- a phenomenon expected from PT\@.
Section~\ref{sec:experiments} gives the results of empirical comparisons of the algorithms and their scaling behaviours with reference to the PT, with some more results reported in \ref{sec:100k}.
Finally, in Section~\ref{sec:conclusion} we discuss overall conclusions and potential for future work.
\section{Background}
\label{sec:background}
In this section, and to help the paper be reasonably self-contained, we provide the needed background, and discussion of existing related work, for the topics of FPT and WSP.
\subsection{The complexity class: Fixed Parameter Tractable (FPT)}
\label{subsec:FPT}
The key idea is that there is a parameter $k$ and once the value of $k$ is fixed then the complexity becomes `easy' and in particular fixed order polynomial.
There are various equivalent definitions of what it means for a problem to be FPT, but a standard one is that it can be solved in time $f(k) n^{O(1)}$ for some computable function $f(k)$.
The FPT literature also uses the notation ``O$^*$'' to denote a version of big-Oh that suppresses polynomial factors (in the same fashion that the $\tilde{O}$ notation suppresses logarithmic factors), and so can write $f(k) n^{O(1)}$ as $O^*( f(k) )$.
Observe that the exponent of the $n$ is a constant not dependent on $k$, and so the complexity is polynomial in $n$.
There is a general expectation that a problem admitting an FPT algorithm is ``easy'' as very high-order polynomials are not so likely to occur.
However, it is important to note that for a problem to be in FPT, it is not enough to just require that ``at any fixed $k$ the problem is polynomial'', because this would also allow high order polynomials which would not be practical.
(In fact, the associated class of problems solvable in time $O(n^{g(k)})$, where $g(k)$ is an arbitrary computable function of $k$ only, is a larger class called \textbf{XP}.)
\subsection{The WSP}
\label{subsec:WSP}
In the WSP, we are given a set $U$ of \emph{users}, a set $S$ of \emph{steps}, a set $\mathcal{A} = \set{A(u) \subseteq S : u \in U}$ of \emph{authorisation lists}, and a set $C$ of \emph{(workflow) constraints}.
In general, a \emph{constraint} $c \in C$ can be described as a pair $c = (T_c, \Theta_c)$, where $T_c \subseteq S$ is the \emph{scope} of the constraint and $\Theta_c$ is a set of functions from $T_c$ to $U$ which specifies those assignments of steps in $T_c$ to users in $U$ that satisfy the constraint (authorisations disregarded).
If $W = (S, U, \mathcal{A}, C)$ is the \emph{workflow} and $T \subseteq S$ is a set of steps then we say that a function $\pi : T \rightarrow U$ is a \emph{plan}.
A plan is called
\begin{itemize}
\item \emph{authorised} if $\pi^{-1}(u) \subseteq A(u)$ for all $u \in U$ (each user is authorised to the steps they are assigned), and
\item \emph{eligible} if for all $c \in C$ such that $T_c \subseteq T$, $\pi|_{T_c} \in \Theta_c$ (every constraint with scope contained in $T$ is satisfied).
\end{itemize}
A plan that is both authorised and eligible is called \emph{valid plan}.
If $T = S$ then the plan is \emph{complete}.
A workflow $W$ is \emph{satisfiable} if and only if there exists a complete valid plan.
\begin{figure}[htb]
\newcommand{+}{+}
\newcommand{--}{--}
\centering
\begin{tikzpicture}[
scale=2.5,
thick,
vertex/.style={circle, draw},
edges/.style={ultra thick}]
\node[vertex] (1) at (-1, 0) {$s_1$};
\node[vertex] (2) at (-1, 1) {$s_2$};
\node[vertex] (3) at (0, 1) {$s_3$};
\node[vertex] (4) at (0, 0) {$s_4$};
\node[vertex] (5) at (1, 1) {$s_5$};
\path[edges, blue] (1) edge node[fill=white]{$=$} (2);
\path[edges, red] (2) edge node[fill=white]{$\neq$} (3);
\path[edges, red] (1) edge node[fill=white]{$\neq$} (3);
\path[edges, red] (3) edge node[fill=white]{$\neq$} (4);
\path[edges, red] (3) edge node[fill=white]{$\neq$} (5);
\node[anchor=west] at (2, 0.5)
{
\begin{tabular}{@{} c @{\quad\quad} ccccc @{}}
\toprule
user & $s_1$ & $s_2$ & $s_3$ & $s_4$ & $s_5$ \\
\midrule
$u_1$ & -- & -- & + & -- & --\\
$u_2$ & -- & + & -- & -- & --\\
$u_3$ & + & + & -- & + & +\\
$u_4$ & + & -- & -- & -- & --\\
$u_5$ & -- & -- & + & + & +\\
$u_6$ & + & -- & + & -- & --\\
\bottomrule
\end{tabular}
};
\end{tikzpicture}
\caption{
An example of a WSP instance with $k = 5$ and $n = 8$.
On the left, each step is represented with a node, and each constraint with an edge (in general, a constraint is represented with a hyper-edge but in this example all the constraints have scopes of size two).
Red edges (marked with ``$\neq$'') represent not-equals constraints, and blue edges (marked with ``$=$'') represent equals constraints.
The table on the right gives authorisations $A(u)$, where `+' means authorised and `$-$' means unauthorised.
}
\label{fig:wsp-example}
\end{figure}
Consider an example of a WSP instance with UI constraints on Figure~\ref{fig:wsp-example}.
In this particular instance it includes just two types of constraints: ``equals'', defined for a scope of two steps, that requires those two steps to be assigned the same user; and ``not-equals'', also defined for a scope of two steps, that requires those two steps to be assigned different users.
Then the following are three examples of complete plans for this instance:
\begin{align}
& \pi(s_1) = u_1,\
\pi(s_2) = u_1,\
\pi(s_3) = u_2,\
\pi(s_4) = u_1: \text{ eligible, non-authorised;}\\
& \pi(s_1) = u_1,\
\pi(s_2) = u_3,\
\pi(s_3) = u_2,\
\pi(s_4) = u_2: \text{ ineligible, authorised;}\\
\label{eq:valid-plat-example}
& \pi(s_1) = u_3,\
\pi(s_2) = u_3,\
\pi(s_3) = u_7,\
\pi(s_4) = u_2: \text{ authorised, eligible, i.e.\ valid.}
\end{align}
The existence of a valid plan (\ref{eq:valid-plat-example}) implies that this instance is satisfiable.
Clearly, not every workflow is satisfiable, and hence it is important to be able to determine whether a workflow is satisfiable or not and, if it is satisfiable, to find a valid complete plan.
Unfortunately, the WSP is NP-hard~\cite{WaLi10}.
However, since the number $k$ of steps is usually relatively small in practice (usually $k \ll n = |U|$ and we assume, in what follows, that $k < n$), Wang and Li~\cite{WaLi10} introduced its parameterisation\footnote{We use terminology of the recent monograph~\cite{DoFe13} on parameterised algorithms and complexity.} by $k$.
Algorithms for this parameterised problem were also studied in~\cite{CoCrGaGuJo14,JOCO2014,CrGuYe13}.
While in general the WSP is W[1]-hard~\cite{WaLi10} (this means the WSP, in general, is very unlikely to be FPT as it is widely believed that FPT$\neq$W[1] (similar to P$\neq$NP)~\cite{DowneyFellows99}), the WSP restricted\footnote{While we consider special families of constraints, we do not restrict authorisation lists.} to some practically important families of constraints is FPT~\cite{CoCrGaGuJo14,CrGuYe13,Roy2015,WaLi10}.
Many business rules are not concerned with the identities of the users that perform a set of steps.
Accordingly, we say a constraint $c = (T,\Theta)$ is user-independent (UI) if, whenever $\theta \in \Theta$ and $\phi: U \rightarrow U$ is a permutation, then $\phi \circ \theta \in \Theta$.
In other words, given a complete plan $\pi$ that satisfies $c$ and any permutation $\phi: U \rightarrow U$, the plan $\pi' : S \rightarrow U$, where $\pi'(s) = \phi(\pi(s))$, also satisfies $c$.
The class of UI constraints is general enough in many practical cases; for example, all the constraints defined in the ANSI RBAC standard \cite{ansi-rbac04} are UI\@.
Most of the constraints studied in \cite{JOCO2014,CrGuYe13,WaLi10} and other papers are also UI\@.
Classical examples of UI constraints are the requirements that two steps are performed by either two different users (\emph{separation-of-duty}), or the same user (\emph{binding-of-duty}).
More complex constraints can state that at least/at most/exactly $r$ users are required to complete some sensitive set of steps (these constraints belong to the family of \emph{counting} constraints), where $r$ is usually small.
Such constraints are called \emph{at least-$r$}, \emph{at most-$r$}, and \emph{exactly-$r$}, respectively.
\subsection{Analogy with Graph Colouring} \label{sec:WSP-and-colouring}
We note here that the WSP with UI constraints can be considered as an extension of the hypergraph list colouring problem, where steps correspond to the hypergraph vertices, users to the colours, and user-step authorisations define colours lists.
Each constraint $(T_c, \Theta_c)$ then defines a hyperedge connecting vertices $T_c$, but the logic of colouring a hyperedge can be arbitrarily sophisticated as long as it is colour-symmetric.
This colour symmetry is exactly the requirement implied by UI constraints, while the general WSP does not restrict the colouring logic at all.
\section{Patterns}
\label{sec:WSP-FPT}
In this section, we discuss the concept of patterns as these capture equivalence classes under the permutation of users and form a vital part of the PBT algorithm presented in the next section.
\subsection{Equivalence Classes and Patterns}
\label{sec:patterns-and-ui}
We define an \emph{equivalence relation} on the set of all plans.
We say that two plans $\pi : T \rightarrow U$ and $\pi' : T' \rightarrow U$ are \emph{equivalent}, denoted by $\pi \approx \pi'$, if and only if $T = T'$, and $\pi(s) = \pi(t)$ if and only if $\pi'(s) = \pi'(t)$ for every $s, t \in T$.\footnote{This is a special case of an equivalence relation defined in~\cite{CoCrGaGuJo14}.}
To handle equivalence classes of plans, we introduce a notion of pattern.
Let a \emph{pattern} $\ensuremath{\mathcal{P}}$ (on $T$) be a partition of $T$ into non-empty sets called \emph{blocks}.\footnote{Patterns were first introduced in~\cite{CoCrGaGuJo14}; we follow the definition of patterns from~\cite{ValuedWSP-SACMAT}.}
A pattern prescribes groups (blocks) of steps to be assigned the same user, and requiring that steps from different blocks are assigned different users.
In other words, a pattern $\ensuremath{\mathcal{P}}$ requires that $\pi(s) = \pi(t)$ if and only if $s, t \in B$ for some $B \in \ensuremath{\mathcal{P}}$.
Directly from the definition, if
$B_1 \neq B_2 \in \ensuremath{\mathcal{P}}$, then $\pi(B_1) \neq \pi(B_2)$, where $\pi(B)$ is the user assigned to every step within block $B$.
Patterns also provide a convenient way to test equivalence of plans.
Let $\ensuremath{\mathcal{P}}(\pi)$ be the pattern describing the equivalence class of the plan $\pi$; it can be computed as $\ensuremath{\mathcal{P}}(\pi) = \{\pi^{-1}(u):\ u \in U,\ \pi^{-1}(u) \neq \emptyset\}$.
Then $\pi \approx \pi'$ if and only if $\ensuremath{\mathcal{P}}(\pi) = \ensuremath{\mathcal{P}}(\pi')$ \cite{CoCrGaGuJo14}, see Figure~\ref{fig:equivalent-plans-example} for an example.
\begin{figure}[htb]
\centering
\begin{tabular}{ccccc}
$\pi_1$
&&
$\pi_2$
\\
\\
\begin{tabular}{cc}
\toprule
Step & User \\
\midrule
$s_1$ & $u_3$ \\
$s_2$ & $u_3$ \\
$s_3$ & $u_7$ \\
$s_4$ & $u_5$ \\
$s_5$ & $u_5$ \\
\bottomrule
\end{tabular}
&
$\approx$
&
\begin{tabular}{cc}
\toprule
Step & User \\
\midrule
$s_1$ & $u_3$ \\
$s_2$ & $u_3$ \\
$s_3$ & $u_6$ \\
$s_4$ & $u_1$ \\
$s_5$ & $u_1$ \\
\bottomrule
\end{tabular}
\\
\\
$\ensuremath{\mathcal{P}}(\pi_1) = \set{ \set{s_1, s_2},\ \set{s_3}, \set{s_4, s_5} }$
&&
$\ensuremath{\mathcal{P}}(\pi_2) = \set{ \set{s_1, s_2},\ \set{s_3}, \set{s_4, s_5} }$
\\
\end{tabular}
\caption{
An example of two equivalent plans $\pi_1$ and $\pi_2$, eligible for the instance defined in Figure~\ref{fig:wsp-example}.
The patterns $\ensuremath{\mathcal{P}}(\pi_1)$ and $\ensuremath{\mathcal{P}}(\pi_2)$ are equal.
Note that $\pi_1$ is authorised while $\pi_2$ is not.
}
\label{fig:equivalent-plans-example}
\end{figure}
In the language of graph list-colouring, a plan is a partial colouring, a block is a set of vertices which are required to to have the same colour, and a pattern is a set of blocks with a requirement that all the blocks are assigned different colours ignoring the concrete assignment of colours.
The idea of patterns is somewhat related to the Zykov's method~\cite{Dutton1981} (for the graph colouring problem) as they both are designed to effectively exploit the colour symmetry of the problems.
Although in WSP this ``colour symmetry'' is broken by the authorisation lists, we still exploit similar approach to tackle constraints $C$ which are symmetric in WSP with UI constraints.
\subsection{Finding an authorised plan within an equivalence class}
\label{sec:pattern-validity}
In this section we will describe an algorithm for finding an authorised plan $\pi$ such that $\ensuremath{\mathcal{P}}(\pi) = \ensuremath{\mathcal{P}}$ for a given pattern $\ensuremath{\mathcal{P}}$ or detecting that such a plan does not exist.
\begin{definition}
For a given pattern $\ensuremath{\mathcal{P}}$, an \emph{assignment graph} $G(\ensuremath{\mathcal{P}})$ is a bipartite graph $(V_1 \cup V_2, E)$, where $V_1 = \ensuremath{\mathcal{P}}$ (i.e.\ each vertex in $V_1$ represents a block in the partition $\ensuremath{\mathcal{P}}$), $V_2 = U$ and $(B, u) \in E$ if and only if $B \in \ensuremath{\mathcal{P}}$, $u \in U$ and $B \subseteq A(u)$.
\end{definition}
We can now formulate a necessary and sufficient condition for authorisation of a pattern.
\begin{proposition}
\label{prop:matching}
A pattern $\ensuremath{\mathcal{P}}$ is authorised if and only if $G(\ensuremath{\mathcal{P}})$ has a matching covering every vertex in $V_1$.
\end{proposition}
Proposition~\ref{prop:matching} implies that, to determine whether an eligible pattern $\ensuremath{\mathcal{P}}$ is valid, it is enough to construct the assignment graph $G(\ensuremath{\mathcal{P}})$ and find a maximum size matching in $G(\ensuremath{\mathcal{P}})$.
It also provides an algorithm for converting a matching $M$ of size $|\ensuremath{\mathcal{P}}|$ in $G(\ensuremath{\mathcal{P}})$ into a valid plan $\pi$ such that $\ensuremath{\mathcal{P}}(\pi) = \ensuremath{\mathcal{P}}$.
An example of how Proposition~\ref{prop:matching} can be applied to obtain a plan from a pattern is shown in Figure~\ref{fig:assignment-graph}.
\begin{figure}[tbh]
\centering
\begin{subfigure}{0.45\textwidth}
\centering
\begin{tikzpicture}[
xscale=0.7,
yscale=1.2,
thick,
main node/.style={rounded corners, draw, very thick, blue, text=black},
user node/.style={circle, draw, very thick, blue, text=black},
secondary/.style={thick, gray}]
\node[main node] (12) at (0, 4.5) {$\set{s_1, s_2}$};
\node[main node] (3) at (0, 3.5) {$\set{s_3}$};
\node[main node] (45) at (0, 2.5) {$\set{s_4, s_5}$};
\node[user node] (u1) at (4, 6) {$u_1$};
\node[user node, secondary] (u2) at (4, 5) {$u_2$};
\node[user node] (u3) at (4, 4) {$u_3$};
\node[user node, secondary] (u4) at (4, 3) {$u_4$};
\node[user node] (u5) at (4, 2) {$u_5$};
\node[user node, secondary] (u6) at (4, 1) {$u_6$};
\path[green]
(3) edge (u5)
(3) edge (u6)
(45) edge (u3);
\path[ultra thick, red]
(12) edge (u3)
(3) edge (u1)
(45) edge (u5);
\node at (8, 3.5) {
\begin{tabular}{cc}
\toprule
Step & User \\
\midrule
$s_1$ & $u_3$ \\
$s_2$ & $u_3$ \\
$s_3$ & $u_1$ \\
$s_4$ & $u_5$ \\
$s_5$ & $u_5$ \\
\bottomrule
\end{tabular}
};
\end{tikzpicture}
\caption{
Satisfiable example.
Every block is matched (red edges) to a user. The plan corresponding to this matching is shown on the right.}
\label{fig:assignment-graph-sat}
\end{subfigure}
%
\hspace{0.04\textwidth}
%
\begin{subfigure}{0.45\textwidth}
\centering
\begin{tikzpicture}[
xscale=0.7,
yscale=1.2,
thick,
main node/.style={rounded corners, draw, very thick, blue, text=black},
user node/.style={circle, draw, very thick, blue, text=black},
secondary/.style={thick, gray}]
\node[main node] (12) at (0, 4.5) {$\set{s_1, s_2}$};
\node[main node, secondary] (3) at (0, 3.5) {$\set{s_3}$};
\node[main node] (4) at (0, 2.5) {$\set{s_4}$};
\node[main node] (5) at (0, 1.5) {$\set{s_5}$};
\node[user node, secondary] (u1) at (4, 5.5) {$u_1$};
\node[user node, secondary] (u2) at (4, 4.5) {$u_2$};
\node[user node] (u3) at (4, 3.5) {$u_3$};
\node[user node, secondary] (u4) at (4, 2.5) {$u_4$};
\node[user node] (u5) at (4, 1.5) {$u_5$};
\node[user node, secondary] (u6) at (4, 0.5) {$u_6$};
\path[green]
(3) edge (u1)
(3) edge (u5)
(3) edge (u6);
\path[ultra thick, blue]
(12) edge (u3)
(4) edge (u3)
(5) edge (u3)
(4) edge (u5)
(5) edge (u5);
\end{tikzpicture}
\caption{
Unsatisfiable example.
Three blocks on the left (highlighted) can only match two users on the right (highlighted).
Thus, at most two of these three blocks can be assigned distinct users.}
\label{fig:assignment-graph-unsat}
\end{subfigure}
\caption{
Two examples of assignment graphs for eligible patterns $\ensuremath{\mathcal{P}}_1 = \set{ \set{1, 2},\ \set{3},\ \set{4}, \set{5}}$ (Figure (a)), and $\ensuremath{\mathcal{P}}_2 = \set{ \set{1, 2},\ \set{3},\ \set{4,5}}$ (Figure (b)).
(The WSP instance is defined in Figure~\ref{fig:wsp-example}.)
The matching in Figure (a) is of the maximum possible size $|\ensuremath{\mathcal{P}}_1| = 3$, and hence $\ensuremath{\mathcal{P}}_1$ is authorised.
There exists no matching of size $|\ensuremath{\mathcal{P}}_2| = 4$, and hence $\ensuremath{\mathcal{P}}_2$ is unauthorised, i.e.\ there exists no valid plan within the corresponding equivalence class.
}
\label{fig:assignment-graph}
\end{figure}
Depending on the algorithm employed, it takes $O(n^{2.5})$ or $O(n^3)$ time to solve the maximum matching problem, where $n$ is the number of vertices in the graph.
However, the assignment graph is usually highly unbalanced since $|\ensuremath{\mathcal{P}}| \le k$ and $|U| \gg k$.
As the maximum size of $M$ is at most $|\ensuremath{\mathcal{P}}|$ and the maximum length of an augmenting path\footnote{For a matching $M$ in a graph $G$, a path $P$ is called $M$-\emph{augmenting} if the edges of $P$ alternate between edges in $M$ and edges not in $M$ and, moreover, the first and last edges of $P$ are not in $M$.~\cite{Ahuja1993}.} in $G$ is $O(k)$, the time complexity of the Hungarian and Hopcroft-Karp methods are $O(k^3)$ and $O(k^{2.5})$, respectively~\cite{Ahuja1993}.
In other words, finding an authorised plan within an equivalence class is not only polynomial in $n$ but it is actually polynomial in a usually smaller $k$.
\section{The New PBT Algorithm}
\label{sec:algorithm}
In this section we first give the core PBT algorithm, and then give some improvements, including branching heuristics that significantly improved the performance.
\subsection{Pattern-Backtracking Algorithm (PBT)}
\label{sec:pbt}
We call our new method \emph{Pattern-Backtracking} (PBT) as it uses the backtracking approach to browse the search space of patterns.
The key idea behind the PBT algorithm is that it is not necessary to search the space of plans; it is sufficient to search the space of patterns checking, for each eligible complete pattern, if there are any valid plans in its equivalence class.
The algorithm is FPT for parameter $k$, as the size of the space of patterns is a function of $k$ only, and finding a valid plan within an equivalence class (or detecting that the equivalence class does not contain any valid plans) takes time polynomial in $n$.
This separation helps to focus on the most important decisions first (as the search for eligible complete patterns is the hardest part of the problem) significantly speeding up the algorithm.
\begin{figure}[htb]
\centering
\begin{tikzpicture}[
tree node/.style={rounded corners, draw, anchor=west, very thick, blue, text=black}
]
\node[tree node] (root) at (0, 0) {$\big\{ \big\}$};
\node[tree node] (1n1) at (1.5, 0) {$\big\{ \{ s_1 \} \big\}$};
\node[tree node] (2n1) at (4, 0.7) {$\big\{ \{ s_1, s_2 \} \big\}$};
\node[tree node] (2n2) at (4, -0.7) {$\big\{ \{ s_1 \},\ \{ s_2 \} \big\}$};
\node[tree node] (3n1) at (7.5, 2.2) {$\big\{ \{ s_1, s_2, s_3 \} \big\}$};
\node[tree node] (3n2) at (7.5, 1.2) {$\big\{ \{ s_1, s_2 \},\ \{ s_3 \} \big\}$};
\node[tree node] (3n3) at (7.5, 0) {$\big\{ \{ s_1, s_3 \},\ \{ s_2 \} \big\}$};
\node[tree node] (3n4) at (7.5, -1) {$\big\{ \{ s_1 \},\ \{ s_2, s_3 \} \big\}$};
\node[tree node] (3n5) at (7.5, -2) {$\big\{ \{ s_1 \},\ \{ s_2 \},\ \{ s_3 \} \big\}$};
\path[red, very thick, ->]
(root) edge (1n1)
(1n1) edge (2n1)
(1n1) edge (2n2)
(2n1) edge (3n1)
(2n1) edge (3n2)
(2n2) edge (3n3)
(2n2) edge (3n4)
(2n2) edge (3n5);
\end{tikzpicture}
\caption{Illustration of the backtracking mechanism within PBT.}
\label{fig:backtracking}
\end{figure}
The basic version of PBT is a backtracking algorithm traversing the space of patterns, see Figure~\ref{fig:backtracking}.
The search starts with an empty pattern $\ensuremath{\mathcal{P}}$, and then, at each forward iteration, the algorithm adds one step to $\ensuremath{\mathcal{P}}$.
Let $S(\ensuremath{\mathcal{P}})$ denote the steps included in $\ensuremath{\mathcal{P}}$.
The branching captures the simple notion that any step $s$ not in $S(\ensuremath{\mathcal{P}})$ must either be placed in some block of $\ensuremath{\mathcal{P}}$, or else form a new block.
These choices are disjoint and so it follows that the search tree is indeed a tree; the same pattern cannot be produced in different ways.
Hence the tree can be searched using depth-first search (DFS)\@.
\DXKii{Place the sentences about Zykov's method here?}
Pruning in the basic version is based on constraint violations only.
Hence, any leaf node at level $k$ in the basic version corresponds to an eligible complete pattern.
Using Proposition~\ref{prop:matching}, the algorithm verifies the authorisation of the pattern.
Once an eligible authorised (i.e.\ valid) complete pattern is found, the algorithm terminates returning the corresponding valid complete plan.
In practice, we interleave the backtracking with authorisation tests.
The real PBT uses an improved branch pruning that takes into account both constraints and authorisation.
In particular, for every node of the search tree the algorithm attempts to find a feasible assignment of users and, if such an assignment does not exist, then that branch of the search tree is pruned.
\SetKwInOut{Input}{input}
\SetKwInOut{Output}{output}
\begin{algorithm}[tb]
\caption{Backtracking search initialisation (entry procedure of PBT)
\label{alg:start}}
\Input {WSP instance $W = (S, U, \mathcal{A}, C)$}
\Output {Valid plan $\pi$ or UNSAT}
Initialise $\ensuremath{\mathcal{P}}, G, M \gets \emptyset$,
$\pi \gets \text{Recursion}(\ensuremath{\mathcal{P}}, G, M)$\;
\Return{$\pi$} ($\pi$ may be UNSAT here)\;
\end{algorithm}
\begin{algorithm}[tb]
\caption{Recursion$(\ensuremath{\mathcal{P}}, G, M)$ (recursive function for backtracking search)
\label{alg:recursion}}
\Input {Pattern $\ensuremath{\mathcal{P}}$, authorisation graph $G = G(\ensuremath{\mathcal{P}})$ and a matching $M$ in $G$ of size $|\ensuremath{\mathcal{P}}|$}
\Output {Valid plan or UNSAT if no valid plan exists in this branch of the search}
\If {$S(\ensuremath{\mathcal{P}}) = S$}
{
\Return {plan $\pi$ defined by matching $M$}\;
}
\Else
{
Select an unassigned step $s \in S \setminus S(\ensuremath{\mathcal{P}})$ that maximises $\rho(s, \ensuremath{\mathcal{P}})$ (for details see Section~\ref{sec:branching-heuristic})\; \label{line:select-s}
Compute all the eligible patterns $X$ extending $\ensuremath{\mathcal{P}}$ with step $s$ (for details see Section~\ref{sec:constraints-pruning})\; \label{line:extend-pattern}
\ForEach {$\ensuremath{\mathcal{P}}' \in X$}
{
Produce an assignment graph $G' = G(\ensuremath{\mathcal{P}}')$ (for details see Section~\ref{sec:authorisations-pruning})\; \label{line:assignment-graph}
\If {there exists a matching $M'$ of size $|\ensuremath{\mathcal{P}}'|$ in $G'$ \label{line:matching}}
{
$\pi \gets \text{Recursion}(\ensuremath{\mathcal{P}}', G', M')$\;
\If {$\pi \neq \text{UNSAT}$}
{
\Return{$\pi$}\;
}
}
}
}
\Return{UNSAT (for a particular branch of recursion; does not mean that the whole instance is unsat)}\;
\end{algorithm}
The calling procedure for the PBT algorithm is shown in Algorithm~\ref{alg:start}, which in turn calls the recursive search function in Algorithm~\ref{alg:recursion}.
The recursive function tries all possible extensions $\ensuremath{\mathcal{P}}'$ of the current pattern $\ensuremath{\mathcal{P}}$ with step $s \notin S(\ensuremath{\mathcal{P}})$.
The step $s$ is selected heuristically (line~\ref{line:select-s}) using the empirically-tuned function $\rho(s, \ensuremath{\mathcal{P}})$, which indicates the importance of step $s$ in narrowing down the search space.
The implementation of $\rho(s, \ensuremath{\mathcal{P}})$ depends on the specific types of constraints involved in the instance and should reflect the intuition regarding the structure of the problem.
See function (\ref{eq:rho}) in Section~\ref{sec:branching-heuristic} for a particular implementation of $\rho(s, \ensuremath{\mathcal{P}})$ for the types of constraints we used in our computational study.
Authorisation tests are implemented in lines~\ref{line:assignment-graph} and~\ref{line:matching} and discussed in more detail in Section~\ref{sec:authorisations-pruning}.
All the propagation and eligibility tests are implemented in line~\ref{line:extend-pattern} and discussed in Section~\ref{sec:constraints-pruning}.
\subsection{Authorisation-Based Pruning}
\label{sec:authorisations-pruning}
Although it would be sufficient to check authorisations of complete patterns only, testing authorisations at each node allows us to prune branches if they contain no authorised plans.
In doing so, it is not necessary to generate the assignment graph from scratch in every node:
\begin{itemize}
\item
If $\ensuremath{\mathcal{P}}'$ is obtained from $\ensuremath{\mathcal{P}}$ by extending some block $B \in \ensuremath{\mathcal{P}}$ then $G'$ can be obtained by removing all existing edges $(B, u)$, $u \in U$, and adding edges $(B', u)$ such that $B' \subseteq A(u)$, where $B'$ is the extended block.
One may note that the edge set $(B', u)$, $u \in U$, is a subset of the edge set $(B, u)$, $u \in U$; however, as we will explain below, we do not store the entire set of edges $(B, u)$, $u \in U$, and hence cannot exploit this property.
\item
If $\ensuremath{\mathcal{P}}'$ is obtained from $\ensuremath{\mathcal{P}}$ by adding a new block $\set{s}$ then $G'$ can be obtained by adding a new vertex $B = \set{s}$ to $G$ and adding the edge $(B, u)$, for each $u \in U$ such that $s \in A(u)$.
\end{itemize}
Similarly, it is possible to recover $G$ from $G'$; hence, we can reuse the same data structure updating it in every node, with updates taking only $O(kn)$ time.
It is also not necessary to compute the maximum matching $M'$ in $G'$ from scratch.
We can obtain matching $M'$ in $G'$ from matching $M$ in $G$ in $O(kn)$ time.
Indeed, if a new block is added then a maximum matching of $G'$ can have at most one edge more than $M$.
If an existing block in $G$ is extended, we can remove the old edge from $M$ adjacent to the extended block, and then again a maximum matching can have at most one edge more than the updated $M$.
By Berge's Augmenting Path Theorem, $G'$ has a matching of size $|M|+1$ if and only if $G'$ has an $M$-augmenting path~\cite{West}.
Thus, we only need to try to find an $M$-augmenting path in $G'$.
The augmenting algorithm requires time $O(|V(G')|+|E(G')|)=O(kn). $
In fact, we will never need more than $k \ge |\ensuremath{\mathcal{P}}|$ edges from a vertex $B \in \ensuremath{\mathcal{P}}$ of the assignment graph.
Hence, when calculating the edge set for a $B \in \ensuremath{\mathcal{P}}$, we can terminate when reaching $k$ edges.
As a result, we only need $O(k^2)$ time to update/extend the matching $M$, but we still need $O(kn)$ time to update or extend the assignment graph.
Note that incremental maintenance of the matching $M$ in every node of the search tree actually improves the worst-case time complexity compared to computation of $M$ in the leaf nodes only, despite incremental maintenance being unable to take advantage of the Hopcroft-Karp method.
Indeed, in the worst case (when the search tree is of its maximum size), each internal node of the tree has at least two children.
Hence, the total number of nodes is at most twice the number of leaf nodes.
Then the total time spent by PBT on authorisation validations is $O((kn + k^2) p)$, where $p$ is the total number of complete patterns.
Observe that validation of authorisations of complete patterns only, as in the basic version of PBT, would take $O((kn + k^{2.5}) p)$ time.
When updating the assignment graph, we have to compute the edge set for a block $B \in \ensuremath{\mathcal{P}}$, and this takes $O(kn)$ time, i.e.\ relatively expensive due to the potentially large $n$.
Since, during the search, we are likely to compute the edge set for many of the blocks $B$ multiple times, we cache these edge sets for each block $B$.
The number of blocks generated during the search (bounded by $2^k$) can be prohibitive for caching all the edge sets, and, thus, we erase the cache every time it reaches 16\,384 records (this constant was obtained by parameter tuning).
\subsection{Eligibility-Based Pruning}
\label{sec:constraints-pruning}
While much of the implementation of PBT is generic enough to handle any UI constraints, some heuristics make use of our knowledge about the types of constraints present in our test instances.
In particular, we assume that the instances include only not-equals, at-most and at-least constraints, as in \cite{Basin2012,JOCO2014,Roy2015,WaLi10}.
Note that all of the methods discussed in this paper make use of this information -- which is a common practice when developing decision support systems.
Hence, this makes our experiments more realistic and also helps to fairly compare all the approaches, as the old ones were already specialised.
Since all our constraints are counting (i.e.\ restricting the number of distinct users to be assigned to the scope), we implemented incremental maintenance of corresponding counters for each at-most and at-least constraint.
The implementation of line~\ref{line:extend-pattern} scans all the constraints with scopes including step $s$ and verifies which of the blocks in $\ensuremath{\mathcal{P}}$ can be extended with $s$ without violating the constraint.
Similarly, the algorithm considers creation of a new block $\{ s \}$.
Note that pruning based on some constraint $c$ does not always require that $T_c \subseteq S(\ensuremath{\mathcal{P}}')$.
For example, an at-most-3 constraint with scope $\set{ s_1, s_2, \ldots, s_5 }$ can be used to prune pattern $\set{ \set{s_1}, \set{s_2}, \set{s_3}, \set{s_4} }$.
Our implementation of PBT produces extensions that will not immediately break any constraint (disregarding authorisations).
\subsection{Branching Heuristic}
\label{sec:branching-heuristic}
This section essentially describes line~\ref{line:select-s} of Algorithm~\ref{alg:recursion}.
As standard in tree-based search, the selection of the branch variable, or step $s$ in PBT, can make a big difference to the size of the search tree.
The selection is performed by taking the step with the highest value of a score $\rho(s, \ensuremath{\mathcal{P}})$.
The score is designed with the intention to measure the potential branching in $s$ for encouraging pruning of the search tree in the context of the current pattern $\ensuremath{\mathcal{P}}$ .
In order to define components of the score function $\rho(s, \ensuremath{\mathcal{P}})$, we split the constraints $C$ into the not-equals, $C_{\neq}$, the at-most $C_\le$, and at-least $C_\ge$.
Different constraints have different strengths in terms of the pruning of the search, and so are permitted to be counted with different weights.
Specifically:
\begin{equation}
\label{eq:rho}
\rho(s, \ensuremath{\mathcal{P}}) = \alpha_{\neq} \rho_{\neq}(s) + \alpha_{\neq, \le} \rho_{\neq, \le}(s) + \alpha_{\ge, \le} \rho_{\ge, \le}(s) + \alpha^0_\leq \rho^0_\leq(s, \ensuremath{\mathcal{P}}) + \alpha^1_\leq \rho^1_\leq(s, \ensuremath{\mathcal{P}}) + \alpha^2_\leq \rho^2_\leq(s, \ensuremath{\mathcal{P}}),
\end{equation}
where the $\alpha$'s are numeric weights, and
\begin{itemize}
\item
$\rho_{\neq}(s) = |\set{ c :\; c \in C_{\neq},\ s \in T_c }|$ is the number of not-equals constraints $c$ that cover step $s$.
The more constraints cover a step, the more important it is in general.
\item
$\rho_{\neq, \le}(s) = \{ c :\; c \in C_{\neq},\ s \in T_c,\ \exists c' \in C_\le,\ T_c \subseteq T_{c'} \}$ is the count of the not-equals constraints $c$ covering $s$ and also covered by some at-most constraint $c'$.
Not-equals and at-most constraints are in conflict, and their interaction is likely to further restrict the search.
\item
$\rho_{\ge, \le}(s) = | \set{ c \in C_{\le},\ c' \in C_{\ge} :\; |T_{c} \cap T_{c'}| \ge 3 } |$ is the number of pairs of constraints (at-least, at-most) with intersections of at least 3 steps.
Large intersections of at-most and at-least constraints are rare but do significantly reduce the search space.
\item
$\rho^i_\leq(s, \ensuremath{\mathcal{P}}) = | \set{c :\; c \in C_{\le},\ s \in T_c,\ |T_c \cap S(\ensuremath{\mathcal{P}})| = r - i} |$, where $r$ is the parameter of the at-most-$r$ constraint, is the number of at-most-$r$ constraints such that they can cover at most $i$ new blocks of the pattern.
For example, $i = 0$ means that $r$ distinct users are already assigned to the scope $T_c$ and, hence, the choice of users for $s$ is limited to those $r$ users.
\end{itemize}
We emphasise that these terms might seem `quirky', but they are the result of extensive experimentation with many different ideas, and they represent the best choices found.
Space precludes discussion of other possibilities that were tried but not found to be effective in our instances.
Note that $\rho_{\neq}$, $\rho_{\neq, \le}(s)$, $\rho{\ge, \le}(s)$ do not depend on the state of the search and, hence, can be pre-calculated.
Also note that $\rho^i_{\le}(s, \ensuremath{\mathcal{P}})$ can make use of the counters that we maintain to speed-up eligibility tests (see above).
The values of parameters $\alpha_{\neq}$, $\alpha_{\neq, \le}$, $\alpha_{\ge, \le}$, $\alpha^0_\leq$, $\alpha^1_\leq$ and $\alpha^2_\leq$ were selected empirically using automated parameter tuning.
We found out that the algorithm is not very sensitive to the values of these parameters, and we settled at $\alpha_{\neq} = 3$, $\alpha_{\neq, \le} = 4$, $\alpha_{\ge, \le} = 2$,
$\alpha^0_\leq = 40$, $\alpha^1_\leq = 4$ and $\alpha^2_\leq = 0$.
Note that the function does not account for at-least constraints except for rare cases of large intersection of at-least and at-most constraints.
This reflects our empirical observation (also confirmed analytically in \ref{ap:estimated-PT}) that the at-least constraints are usually relatively weak in our instances and rarely help in pruning branches of the search tree.
We conducted direct empirical studies of the branching factor and the depth of the search.
Our results show significant reduction of both parameters when the branching heuristic was enabled, greatly reducing the size of the search trees.
For example, at $k = 40$, with the branching heuristic disabled, the overall number of nodes in the search tree is about $5.7 \cdot 10^{10}$, of which around 90\% were at the depths 23--28.
The average branching factor at each level of the search tree reaches its maximum of 5.55 observed at the depth of 23.
With the branching heuristic enabled, the overall number of nodes is about $1.0 \cdot 10^6$, of which 90\% are at the depths 16--27.
The average branching factor reaches its maximum of 2.56 observed at the depth of 7, from which point it almost monotonically reduces with the depth of the search.
\section{Pseudo-Boolean Formulation}
\label{sec:PB-form}
Firstly, we provide the old pseudo-Boolean formulation~\cite{JOCO2014} to make the paper self-contained.
We then show in Section~\ref{sec:new-formulation} how the old formulation can be extended to exploit the FPT nature of the problem.
\subsection{Old Pseudo-Boolean Formulation (UDPB)}
\label{sec:old-formulation}
The main decision variables in the old formulation are $x_{s, u}$, $s \in S$, $u \in U$, where user $u$ is assigned to step $s$ if and only if $x_{s, u} = 1$.
Because $x_{s, u}$ directly assigns a step to a particular user, we call this formulation \emph{User Driven PB} (UDPB).
We also introduce auxiliary variables $y_{c, u}$ and $z_{c, u}$ for at-least and at-most constraints $c$, respectively.
Variables $y_{c, u}$ and $z_{c, u}$ are used to bound the number of distinct users assigned to the constraints' scopes (recall, see Section~\ref{sec:constraints-pruning}, that our test instances include not-equals, at-least and at-most constraints).
The old formulation is presented below in~(\ref{eq:old-one-user})--(\ref{eq:old-define-x}).
We use notation $A^{-1}(s) = \{ u \in U :\; s \in A(u) \}$ for the set of users authorised for step $s \in S$.
\begin{align}
\label{eq:old-one-user}
& \sum_{u \in U} x_{s, u} = 1
&& \forall s \in S, \\
\label{eq:old-authorisations}
& x_{s, u} = 0
&& \forall s \in S \text{ and } \forall u \in U \setminus A^{-1}(s), \\
\label{eq:old-not-equals}
& x_{s_1, u} + x_{s_2, u} \le 1
&& \forall \text{ not-equals constraint with scope $\set{s_1, s_2}$} \text{ and } \forall u \in U,\\
\label{eq:old-y}
& y_{c, u} \ge x_{s, u}
&& \forall \text{ at-most-$r$ constraints $c$ with scope $T_c$},\ \forall s \in T_c \text{ and } \forall u \in U,\\
\label{eq:old-at-most}
& \sum_{u \in U} y_{c, u} \le r
&& \forall \text{ at-most-$r$ constraint $c$},\\
\label{eq:old-z}
& z_{c, u} \le \sum_{s \in T_c} x_{s, u}
&& \forall \text{ at-least-$r$ constraint $c$ with scope $T_c$}, \text{ and } \forall u \in U,\\
\label{eq:old-at-least}
& \sum_{u \in U} z_{c, u} \ge r
&& \forall \text{ at-least-$r$ constraint $c$}\\
& y_{c, u} \in \{ 0, 1 \}
&& \forall \text{ at-most-$r$ constraint $c$ and } \forall u \in U,\\
& z_{c, u} \in \{ 0, 1 \}
&& \forall \text{ at-least-$r$ constraint $c$ and } \forall u \in U,\\
\label{eq:old-define-x}
& x_{s, u} \in \{ 0, 1 \}
&& \forall s \in S \text{ and } \forall u \in U.
\end{align}
Constraints~(\ref{eq:old-one-user}) guarantee that exactly one user is assigned to each step.
Constraint~(\ref{eq:old-authorisations}) implements authorisations.
Constraints~(\ref{eq:old-not-equals})--(\ref{eq:old-at-least}) define WSP constraints (recall that our test instances include only not-equals, at-least and at-most UI constraints, although the UDPB formulation can obviously encode any computable WSP constraints, whether UI or not).
\subsection{New Pseudo-Boolean Formulation (PBPB)}
\label{sec:new-formulation}
A contribution of this paper is a new pseudo-Boolean formulation (\ref{eq:mx-symmetric})--(\ref{eq:mx-x-define}) exploiting the FPT nature of the problem.
This formulation, which we call \emph{Pattern Based PB} (PBPB), was inspired by formulations of the graph colouring problem \cite{DukanovicRendl2008:SDP-heuristic-GCP,Dutton1981,Lovasz1979:shannon}.
\footnote{The matrix $M$ can be thought of as a `Merge matrix' as it controls whether or not two steps are effectively merged by being required to have the same user.}
In particular, steps $s_1$ and $s_2$ are assigned the same user if and only if $M_{s_1, s_2} = 1$ (we assume $M_{s,s} = 1$ for every $s \in S$).
Such variables are not concerned with the identity of users and, thus, are more effective when handling UI constraints.
This is the same idea as behind colour matrix in~\cite{DukanovicRendl2008:SDP-heuristic-GCP} which preserves the colour symmetry and encapsulates only the decisions that matter at the upper level of the search.
However it extends such usage in two ways. Firstly, WSP with UI constraints has a richer set of constraints, defined on ``hyperedges''.
Secondly, the matrix $M$ is also tightly integrated with the non-UI authorisations.
Thus, we still use the $x$ variables with the same meaning as in the UDPB formulation but complement them with the new variables $M$.
The formulation (\ref{eq:mx-symmetric})--(\ref{eq:mx-x-define}) is given for only the specific constraints (namely, at-most-3 and at-least-3 constraints with scope of size 5, and not-equals constraints); for formulations of other constraints, including general UI constraints, see \ref{ap:encoding-constraints}.
\begin{align}
\label{eq:mx-symmetric}
& M_{s_1, s_2} = M_{s_2, s_1}
&& \forall s_1 \neq s_2 \in S, \\
\label{eq:mx-diagonal}
& M_{s, s} = 1
&& \forall s \in S, \\
\label{eq:mx-link-m1}
& M_{s_1, s_2} \ge M_{s_1, s_3} + M_{s_2, s_3} - 1
&& \forall s_1 \neq s_2 \neq s_3 \in S, \\
\label{eq:mx-link-m2}
& M_{s_1, s_2} \le M_{s_2, s_3} - M_{s_1, s_3} + 1
&& \forall s_1 \neq s_2 \neq s_3 \in S, \\
\label{eq:mx-one-user}
& \sum_{u \in U} x_{s, u} = 1
&& \forall s \in S, \\
\label{eq:mx-link1}
& x_{s_1, u} - x_{s_2, u} \le 1 - M_{s_1, s_2}
&& \forall s_1 \neq s_2 \in S \text{ and } \forall u \in U, \\
\label{eq:mx-link2}
& x_{s_1, u} + x_{s_2, u} \le 1 + M_{s_1, s_2}
&& \forall s_1 \neq s_2 \in S \text{ and } \forall u \in U, \\
\label{eq:mx-authorisations}
& x_{s, u} = 0
&& \forall s \in S \text{ and } \forall u \in U \setminus A^{-1}(s), \\
\label{eq:mx-not-equals}
& M_{s_1, s_2} = 0
&& \forall \text{ not-equals constraint with scope $\set{s_1, s_2}$}, \\
\label{eq:mx-at-most}
& \sum_{s_1 < s_2 \in T} M_{s_1, s_2} \ge 2
&& \forall \text{ at-most-3 constraint with scope $T$}, |T| = 5, \\
\label{eq:mx-at-least}
& \sum_{s_1 < s_2 \in T} M_{s_1, s_2} \le 3
&& \forall \text{ at-least-3 constraint with scope $T$, } |T| = 5, \\
& M_{s_1, s_2} \in \{ 0, 1 \}
&& \forall s_1, s_2 \in S,\\
\label{eq:mx-x-define}
& x_{s, u} \in \{ 0, 1 \}
&& \forall s \in S \text{ and } \forall u \in U.
\end{align}
To define authorisations in (\ref{eq:mx-authorisations}), we still need the $x_{s, u}$ variables, which have to be linked to the $M_{s_1, s_2}$ variables.
In particular, if $M_{s_1, s_2} = 1$ then we require that $x_{s_1, u} = x_{s_2, u}$ for every $u \in U$, see (\ref{eq:mx-link1}), and if $M_{s_1, s_2} = 0$ then $x_{s_1, u} + x_{s_2, u} \le 1$, i.e.\ at least one of $x_{s_1, u}$ and $x_{s_2, u}$ has to take value 0, see (\ref{eq:mx-link2}).
To improve propagation, we formulate optional (transitive closure) constraints (\ref{eq:mx-link-m1}) and (\ref{eq:mx-link-m2}).
These constraints are entailed by the link between the $M$ and $x$ variables in (\ref{eq:mx-one-user})--(\ref{eq:mx-link2}), but adding them increases the propagation avoiding the cost of extra reasoning involving the $x$ variables.
Constraints (\ref{eq:mx-not-equals}) encode not-equals, (\ref{eq:mx-at-least}) encode at-least-3 and (\ref{eq:mx-at-most}) encode at-most-3 (these are the constraints present in our instances; for details see Section~\ref{sec:instance-generator}).
It is useful that (\ref{eq:mx-not-equals})--(\ref{eq:mx-at-least}) involve only the $M$ variables; together with (\ref{eq:mx-symmetric})--(\ref{eq:mx-link-m2}) they are sufficient that a solution of them corresponds to an eligible pattern.
Hence (\ref{eq:mx-not-equals})--(\ref{eq:mx-at-least}) correspond to the upper level of the search over the space of patterns.
It is easy to observe that any constraint that is expressed only in terms of the $M$'s is automatically UI, as it does not involve the $x$ variables (users), and so cannot change with permutations of them.
The following proposition states that the converse also applies.
\begin{proposition} \label{prop:all-UI-are-M}
On solving an instance of the WSP, the decision variables $M$ are sufficient to encode any UI constraint.
\end{proposition}
\begin{proof}
By definition, any WSP constraint $c = (T_c, \Theta_c)$ can be defined by the set $\Theta_c$ of all the eligible for $C = \set{c}$ plans $\pi : T_c \rightarrow U$.
Moreover, if a constraint $c$ is UI then $\pi \in \Theta_c$ implies that $\pi' \in \Theta_c$ for every $\pi' \approx \pi$.
Then it follows that a UI constraint can be described by listing equivalence classes of plans or, equivalently, patterns on $T_c$.
Recall that a pattern can be uniquely described with the $M$ variables; in particular, a pattern $\ensuremath{\mathcal{P}}$ can be described as $M_{s', s''} = 1$ for every $s', s'' \in B$, $B \in \ensuremath{\mathcal{P}}$, and $M_{s', s''} = 0$ for every $s' \in B'$, $s'' \in B''$ and $B' \neq B'' \in \ensuremath{\mathcal{P}}$.
Then it is easy to exclude a pattern via a linear inequality expressed in variables $M$.
Let $\overline{\mathit{PAT}}$ be the list of all patterns on $T_c$ disobeying a UI constraint $c = (T_c, \Theta_c)$.
Then, in general, we can encode a UI constraint $c$ with constraints (\ref{eq:mx-symmetric}), (\ref{eq:mx-diagonal}) and
\begin{equation}
\sum_{B \in \ensuremath{\mathcal{P}}} \sum_{s' < s'' \in B} (1 - M_{s', s''})
+ \sum_{B' \neq B'' \in \ensuremath{\mathcal{P}}} \sum_{s' \in B'} \sum_{s'' \in B'', s' < s''} M_{s', s''}
\ge 1
\qquad
\forall \ensuremath{\mathcal{P}} \in \overline{\mathit{PAT}} \,.
\label{eq:UI-as-PB}
\end{equation}
\qed
\end{proof}
To illustrate how Proposition~\ref{prop:all-UI-are-M} works, we give the following example.
To require that $\ensuremath{\mathcal{P}} \neq \set{ \set{s_1, s_2}, \set{s_3} }$, or, equally,
$$
M \neq
\left(
\begin{array}{ccc}
1 & 1 & 0 \\
1 & 1 & 0 \\
0 & 0 & 1
\end{array}
\right)
$$
one can write
$$
(1 - M_{12}) + M_{13} + M_{23} \ge 1 \,.
$$
Note that to encode a UI constraint in this way, one may need numerous constraints to prohibit multiple patterns.
This might be impractical if $|\overline{\mathit{PAT}}|$ is large.
In \ref{ap:encoding-constraints} we give more compact approaches to formulate some standard UI constraints and also discuss why our encodings (\ref{eq:mx-at-most}) and (\ref{eq:mx-at-least}) are correct.
\section{Analysis of WSP Solution Approaches}
\label{sec:analysis-of-approaches}
In this section we analyse and compare the existing and new WSP solution approaches.
In Section~\ref{sec:branching-strategies}, we discuss different branching strategies and how they are linked to performance of WSP algorithms.
Section~\ref{sec:worst-case-analysis} gives an asymptotic worst-case analysis of PBT and PUI\@.
Section~\ref{sec:newPB-properties} discusses properties of PBPB with respect to both the upper level search for eligible patterns and of the assignment problems that arise at the lower level.
\subsection{Branching Strategies}
\label{sec:branching-strategies}
In this section, we use the language of patterns and of the PBPB encoding in order to compare and contrast the PBPB formulation with the new PBT algorithm and the previous FPT algorithm PUI\@.
The first key observation is that any pattern can be described with $M_{ij}$ variables.
The matrix of $M$ variables corresponding to a complete pattern is exactly a permutation of block-ones-diagonal matrix, where a block in the matrix corresponds to a block of the pattern.
A pattern as used within PBT is then a set of blocks as shown in Figure~\ref{fig:open-pattern} and with the requirement that the steps in different blocks are assigned different users.%
\footnote{It is important to note that in such figures purely for illustration we are assuming that the rows/columns are permuted to reveal any block-diagonal structure; there is no implication that the steps are processed in a fixed order.}
We will say that such an (incomplete) pattern is `open' as the relation between the steps in the pattern and those not in the pattern is left as undetermined; for a step not in the pattern, the values of $M$ are not yet fixed.
The openness of the pattern corresponds to the open nature of the assignments within PBT\@.
PBT considers steps one at a time, and its branching corresponds to picking a block in the pattern which to extend (or creating a new block).
Figure~\ref{fig:matrix-pbt} illustrates the branching within PBT in terms of the options for extending the value assignments to the $M$ matrix.
\input{fig-open-closed-patterns}
PUI, the previously state-of-the-art FPT algorithm for the WSP with UI constraints~\cite{JOCO2014}, implements a different branching strategy.
It iterates over the set of users $U$ gradually building a set $\mathscr{P}$ of valid patterns.
At an iteration corresponding to some user $u_i \in U$, PUI attempts to extend each $\ensuremath{\mathcal{P}} \in \mathscr{P}$ with exactly one new block $B$, trying each non-empty $B \subseteq A(u_i) \setminus S(\ensuremath{\mathcal{P}})$.
The algorithm guarantees that the new pattern is authorised by construction but needs to verify if the new pattern is eligible and, if so, whether it is already present in $\mathscr{P}$; indeed, PUI may generate the same pattern multiple times.
Observe that, after completion of an iteration corresponding to user $u_i$, set $\mathscr{P}$ includes all the eligible patterns that can be authorised by the already processed users $u_1$, $u_2$, \ldots, $u_i$.
PUI proceeds until it finds a valid complete pattern, or all the users $u \in U$ are tried (by which time $\mathscr{P}$ will contain all valid patterns).
Effectively, PUI branches on the $x$ variables and uses patterns only to `merge' equivalent branches of search.
One may observe that the patterns in PUI have a slightly different interpretation compared to the `open' patterns in PBT\@.
Indeed, a block, once added to a pattern in PUI, will never be extended and in this sense it is `closed', see Figure~\ref{fig:closed-pattern}.
Hence, the two key differences between PBT and PUI branching are:
\begin{description}
\item[Delayed vs.\ immediate user assignment:]
PBT implements delayed assignment of users, branching on user-independent $M$ variables.
In this sense, PBT is driven by the UI constraints.
PUI branches on the $x$ variables, i.e.\ fixes the assignment of users while branching, achieving the FPT running time by merging equivalent branches.
We argue that UI-constraints-driven approach would usually be more effective.
Since there is an efficient procedure to find an authorised plan realising a pattern, there is no difference whether we find a valid pattern or a valid plan.
However, as we will show in \ref{ap:estimated-PT}, a significant portion of patterns is authorised but usually only a few patterns are eligible; hence branching on $M$ variables is, on average, likely to produce smaller search trees.
\item[Open vs.\ closed patterns:]
PBT extends patterns step by step and, hence, allows a block of a pattern to be expanded (open patterns).
PUI extends patterns user by user, with each user corresponding to a new pattern block.
As the block cannot be expanded during the rest of the iterations, PUI searches in the space of closed patterns.
While closed patterns support richer propagation, they also reduce the flexibility of search.
Indeed, a single extension of a closed pattern inevitably fixes many more $M$ variables than that of an open pattern, reducing the ability of the algorithm to focus on the most constrained parts of the problem.
In general, the smaller the decisions are, the more flexibility the search has in ordering them and, hence, prioritising the most important ones.
Thus, we suggest that open patterns are preferable to closed patterns.
\end{description}
It should be noted that it is possible to implement an algorithm with closed patterns and delayed user assignment.
Our attempt to implement such a `closed-pattern-based PBT', however, resulted in an algorithm significantly slower than PBT (although faster than PUI).
It is also possible to implement an open-pattern style search with immediate user assignment.
Indeed, a general purpose PB solver is likely to exploit this strategy when solving UDPB formulation.
However, assignment of some (but not all) $x_{su}$ for a $u \in U$ would mean that subsequent pruning of the branch does not guarantee that the corresponding open pattern is invalid; indeed, a different assignment of $x_{su}$, $s \in S$, may produce a valid plan.
Hence, patterns could not be used to merge branches of the search, and the algorithm would not be FPT\@.
For FPT algorithms with immediate user assignment, it is vital, like in PUI, to try all the authorised combinations of $x_{su}$ for a given $u \in U$ before proceeding to the next $u$; by following this strict sequence, the algorithm guarantees that it finds all the eligible patterns authorisable by processed users.
For the same reason, PUI could not be implemented as a DFS algorithm.
An important observation is that FPT algorithms with immediate user assignments (i.e.\ PUI) are forced to order the branching variables by user whereas algorithms with delayed user assignments and open patterns (i.e.\ PBT) order the branching variables by steps.
In a problem with a relatively small number of steps and a large number of users, it is more likely that the users are relatively uniform compared to the steps, and hence the search is more sensitive to the order of steps than to the order of users.
In other words, branching heuristics in PBT-like algorithms are expected to be more effective compared to branching heuristics in PUI-like algorithms.
Now consider the combination of the PBPB encoding with a DPLL-based PB solver such as SAT4J\@.
Internally, a PB solver on PBPB will need to be making branching decisions.
This is generally done so as to prefer branching on variables that propagate to entail values for other variables, and given the central nature of the $M$ variables, it seems reasonable they would be favoured as branch variables.
As pointed out above, a complete assignment to the variables $M_{s_1, s_2}$, $s_1, s_2 \in S$, and satisfying the constraints~(\ref{eq:mx-symmetric})--(\ref{eq:mx-link-m2}), uniquely defines a complete pattern.
A PB solver will be handling partial assignments to the $M$ variables, but it is still reasonable to ask if they are structured like open or closed patterns.
To address this consider the effects of the transitivity constraints (\ref{eq:mx-link-m1}) and (\ref{eq:mx-link-m2}).
If two $M$ variables sharing a step, e.g.\ $M_{12}$ and $M_{23}$, are set to 1, then (\ref{eq:mx-link-m2}) immediately forces a propagation, $M_{13} = 1$, and similarly for (\ref{eq:mx-link-m1}), so if block-diagonals of 1's happen to overlap then will form into a larger block of 1's.
Hence there is a tendency to complete the blocks in the $M$ matrix, but there will be no reason to close them.
This will tend to drive the partial $M$-assignments to have a structure close to open patterns.
We hence expect that a standard (DPLL-based) PB solver could work on the PBPB formulation in a similar fashion of using open patterns and then extending them.
So we expect that the behaviour of the PB solver with PBPB will be more similar to PBT than to PUI; we will see evidence for this in Section~\ref{sec:experiments} -- a result that initially surprised us.
We also note here, that, unlike the bespoke PBT and PUI algorithms, PBPB solvers have the flexibility to arbitrarily alternate between branching on $M$'s and $x$'s.
In certain cases, when user authorisations are tight, this may lead to superior strategies and hence is a strength of the general purpose solver approach.
\subsection{Worst-Case Analysis of PBT}
\label{sec:worst-case-analysis}
Recall that, in the worst case, the total number of patterns considered by the PBT algorithm is less than twice the number of complete patterns.
Observe that the number of complete patterns equals the number of partitions of a set of size $k$, i.e.\ the $k$'th Bell number $\mathcal{B}_k$ which is $O(2^{k \log_2 k})$.
Finally, observe that the PBT algorithm spends time $O(k^2 + kn)$ on each node of the search tree.\footnote{Assuming that validation of all relevant constraints takes $O(k^2)$ time.}
Thus, the time complexity of the PBT algorithm is $O(\mathcal{B}_k \cdot (k^2 + kn))=O^*(2^{k\log_2 k})$.
In fact, the running time $O^*(2^{k\log_2 k})$ is likely to be optimal, in a sense. Indeed, Gutin and Wahlstr{\"{o}}m \cite{GW2016} proved that unless the Strong Exponential Time Hypothesis \cite{ImPa01} fails, which is quite unlikely, there is no $O^*(c^{k\log_2 k})$-time algorithm for WSP with UI constraints with any $c<2$.
The PBT algorithm follows the depth-first search order and, hence, stores only one pattern at a time.
It also maintains a subgraph of the assignment graph with only $O(k^2)$ edges.\footnote{See Section~\ref{sec:authorisations-pruning} where the upper bound $k$ on the degrees of blocks in the matching graph is explained.}
Hence, the space complexity of the algorithm is $O(k^2)$, i.e.\ smaller than the problem itself ($O(kn)$).
Note that small space complexity is very good for reducing cache misses. Let us compare it to the space complexity of PUI, which was the previously state-of-the-art FPT algorithm for WSP with UI constraints \cite{JOCO2014}.
For PUI the space complexity is exponential, $O(\mathcal{B}_{k + 1} k)$, as PUI needs to store all the valid patterns produced during the search and the total number of (not necessarily complete) patterns is $\mathcal{B}_{k + 1}$.\footnote{
To count the number of patterns, let us temporarily add an extra element $x$ to the set $S$ of steps.
Then there are $\mathcal{B}_{k + 1}$ partitions of this extended set.
Note that by removing the subset containing $x$ from each of these partitions, we get a (not necessarily complete) unique pattern.
Hence, the number of patterns is $\mathcal{B}_{k + 1}$.
}
\subsection{Properties of the New Pseudo-Boolean Formulation PBPB}
\label{sec:newPB-properties}
In this section, we show that the PBPB formulation can also potentially admit FPT running time and polynomial space complexity.
The discussion breaks into the upper level search on the $M$-variables for eligible patterns, and the subsequent lower level matching problems arising from the $x$ variables in the context of a pattern.
For the upper level, there are $O(k^2)$ of the $M$ variables, and so a tree search in PB would have the potential to fully instantiate these before handling the user assignments via the $x$ variables (which is not an unreasonable assumption, see Section~\ref{sec:branching-strategies}), using a tree of worst-case size $2^{O(k^2)}$.
This is FPT, and so whether or not PBPB has a potential to be FPT as a whole depends on the complexity of the user assignments once a complete pattern is reached.
Observe that when all the $M$'s are instantiated, the PBPB formulation (\ref{eq:mx-symmetric})--(\ref{eq:mx-x-define}) reduces to the following:
\begin{align}
\label{eq:sum-x-one}
& \sum_{u \in U} x_{s, u} = 1
&& \forall s \in S, \\
& x_{s, u} = 0
&& \forall s \in S \text{ and } \forall u \in U \setminus A^{-1}(s), \\
\label{eq:substituted-same-user}
& x_{s_1, u} = x_{s_2, u}
&& \forall s_1 \neq s_2 \in B, B \in \ensuremath{\mathcal{P}} \text{ and } \forall u \in U, \\
\label{eq:substituted-diff-user}
& x_{s_1, u} + x_{s_2, u} \le 1
&& \forall B_1 \neq B_2 \in \ensuremath{\mathcal{P}},\ \forall s_1 \in B_1,\ \forall s_2 \in B_2 \text{ and } \forall u \in U, \\
& x_{s, u} \in \{ 0, 1 \}
&& \forall s \in S \text{ and } \forall u \in U.
\label{eq:PHP-x-one}
\end{align}
This is a bipartite matching problem but with blocks of steps being assigned to a user.
However, because of (\ref{eq:substituted-same-user}), when any one step in a block is assigned, some $x_{s,u} = 1$ then all the others in the block are also forced, by propagation, to the same user.
The following proposition shows this can be solved in FPT time by a general purpose PB solver, using standard tree-search methods (branching and propagation), but not introducing new variables during the search process.\footnote{It is important to make this assumption because search or proof methods that are allowed to introduce new variables have the potential to be a lot more powerful e.g. \cite{Razborov2002:Complexity-PHP} but in practice are too difficult to control.}
\begin{proposition}
\label{thm:PB-is-FPT}
The PB formulation (\ref{eq:sum-x-one})--(\ref{eq:PHP-x-one}) can be solved by tree search and propagation (without the introduction of new variables), in polynomial space, and in time exponential in $|\ensuremath{\mathcal{P}}|$ only.\footnote{The proposition is closely related to known methods in kernelisation \cite{Gutin2015}; however, due to the lack of space we do not want to use that here.}
\end{proposition}
\begin{proof}
The PB formulation (\ref{eq:sum-x-one})--(\ref{eq:PHP-x-one}) corresponds to the standard bipartite matching problem on a graph with the vertices of one partition consisting of the blocks of $\ensuremath{\mathcal{P}}$ and the other partition vertices are the users $U$.
Observe that if the degree (number of authorised users) of a block $B \in \ensuremath{\mathcal{P}}$ is greater than the number of blocks in $|\ensuremath{\mathcal{P}}|$, then no set of choices for the other blocks can remove all the options for that block.
Hence, all vertices $B \in \ensuremath{\mathcal{P}}$ of degree $|\ensuremath{\mathcal{P}}|$ or above can be delayed until last in the search tree: if the search does reach them, then they can be given arbitrary values and so will never lead to backtracking.
(An example occurs in Figure~\ref{fig:assignment-graph-sat} in which the block $\{ s_3 \}$ has 3 authorised users; so its assignment can be delayed until after the other 2 blocks.)
Variables within a block are all constrained to be equal, hence, eventually one of them will be picked as the branch variable; at this time the propagation will give values to all the others.
The other members of a block hence will no longer be candidate branch variables, and they will not contribute to the size of the search tree.
Hence in the backtracking portion of the branching, branching factor of the search will be limited by $|\ensuremath{\mathcal{P}}| - 1$, and the depth of the search by $|\ensuremath{\mathcal{P}}|$.
%
Hence the search tree size is $O((|\ensuremath{\mathcal{P}}| - 1)^{|\ensuremath{\mathcal{P}}|})$, and the depth is polynomial.\qed
\end{proof}
The above is sufficient to show that a PB solver based on standard branch-and-propagate methods has the potential to solve the PBPB formulation in FPT time.
Furthermore, the `potential' might well be achieved in practice, as branching on the $M$ variables may well be preferred due to the branch-selection heuristics within standard solvers; see the argument at the end of Section~\ref{sec:branching-strategies}, and also note that in the PBPB formulation each individual $M$ variable tends to occur in more constraints than the individual $x$ variables.
Specifically, from the PB formulation each individual $x_{su}$ variable will occur in just $O(k)$ constraints; whereas each individual $M_{s1,s2}$ variable will occur in $O(n)$ constraints.
However, Proposition~\ref{thm:PB-is-FPT} effectively shows that an unbalanced bipartite matching problem (with parts of size $O(k)$ and $O(n)$, respectively) can be solved by a PB solver in time polynomial in $n$ and exponential in $k$, whereas we know that the Hungarian method is polynomial in both $n$ and $k$.
Although we have not observed difficult matching problems in our experiments with WSP algorithms, it is still natural to discuss the worst case, and consider what are the potential limitations of the PB approach.
For this we will switch to a ``proof theory'' perspective and ask about the sizes of the proofs of unsatisfiability available within the PB representation (note that a proof of satisfiability of the matching problem is trivial in the sense that ii is just the verification of a given witness).
\begin{proposition}
\label{th:matching-polysize}
When the PB formulation (\ref{eq:sum-x-one})--(\ref{eq:PHP-x-one}) is unsatisfiable, then there is a PB proof of that unsatisfiability, without introducing new variables, and that is polynomial in both $|\ensuremath{\mathcal{P}}|$ and $n$.
\end{proposition}
\begin{proof}
Observe that we can take an arbitrary representative, a step, from within each block of the pattern $\ensuremath{\mathcal{P}}$ and use propagation through (\ref{eq:substituted-same-user}) to limit the users permitted for the representative.
Hence the problem (\ref{eq:sum-x-one})--(\ref{eq:PHP-x-one}) is precisely the matching of the selected representative of each block to a permitted user.
The Proposition~\ref{th:matching-polysize} follows from the Hall's marriage theorem \cite{Cameron1994:Combinatorics-book} a matching problem on a bipartite graph $G = (L \cup R, E)$ has a complete matching of the vertices of the partition $L$, if and only if it is true that for all subsets $L'$ of $L$, there are at least $|L'|$ elements in $R$ that may match with some vertex in $L'$.
In WSP language this basically means that the matching problem is unsatisfiable if and only if there is some subset $\mathcal{B}$ of blocks, for which the corresponding set of candidate users is smaller than $|\mathcal{B}|$; for an example, see Figure~\ref{fig:assignment-graph-unsat}.
Such a subset is a constrained form of the pigeon-hole problem (PHP), stating that $|\mathcal{B}|$ blocks cannot be assigned to fewer than $|\mathcal{B}|$ users, and restricting equations (\ref{eq:sum-x-one})--(\ref{eq:PHP-x-one}) to such a subset from the marriage theorem leads to a PB encoding of the PHP\@.
(There are also extra constraints to remove unauthorised assignments within the PHP, but these are not needed, as the counting already suffices.)
Since the PHP is known to have a polynomial size PB proof without the use of new variables, see e.g.~\cite{CookEtal1987:complexity-cutting-plane-proofs,DixonEtal:2004:GenBoolSatI}, it follows there is also a PB proof of (\ref{eq:sum-x-one})--(\ref{eq:PHP-x-one}).
\qed
\end{proof}
Note that Propositions~\ref{thm:PB-is-FPT} and~\ref{th:matching-polysize} are quite different in that the first one is discussing the process of a solution, whereas the second one is about a witness to unsatisfiability but not the time to find it.
Nevertheless we conclude that a PB solver might, at least, be expected to use tree search to solve the assignment problem in time exponential in $k$, but also have the potential to be able to solve it in time polynomial in $k$.
\section{Instance Generator and Phase Transitions}
\label{sec:testbed}
Due to the difficulty of acquiring real-world WSP instances and to support extensive studies of the scaling of the runtimes, similar to other authors~\cite{JOCO2014,Roy2015,WaLi10} we use the synthetic instance generator described in~\cite{JOCO2014}.
In this section, we first present the generator of the WSP instances.
We then empirically study the probability of satisfiability of the instances as we vary the generator parameters.
We give evidence for phase transition (PT), between the satisfiable and unsatisfiable regions.
The overall point is that the resulting instances from the PT region can be expected to be a good test of the effectiveness of solution algorithms.
\subsection{The Instance Generator}
\label{sec:generator}
\label{sec:instance-generator}
Three families of UI constraints are used: \emph{not-equals} (also called \emph{separation-of-duty}), \emph{at-most-$r$} and \emph{at-least-$r$} constraints.
A not-equals constraint with scope $\set{s, t}$ is satisfied by a complete plan $\pi$ if and only if $\pi(s) \neq \pi(t)$.
An at-most-$r$ constraint $c$ with scope $T_c$ is satisfied if and only if $|\pi(T_c)| \le r$.
Similarly, an at-least-$r$ constraint $c$ with scope $T_c$ is satisfied if and only if $|\pi(T_c)| \ge r$.
We do not explicitly consider the widely used binding-of-duty constraints, that require two steps to be assigned to one user, as those can be trivially eliminated during preprocessing.
While the binding-of-duty and separation-of-duty constraints provide the basic modelling capabilities, the at-most-$r$ and at-least-$r$ constraints impose more general ``confidentiality'' and ``diversity'' requirements on the workflow, which can be important in some business environments.
Following~\cite{JOCO2014,KaGaGu,Roy2015}, we decided to focus this study on at-least-3 and at-most-3 constraints with a scope of 5, $|T_c|=5$, as this seemed a reasonable constraint that may occur in practice.
The specific stochastic WSP Instance Generator takes as input four parameters,
\begin{enumerate}
\item $k$, the number of steps;
\item $n$, the number of users;
\item $e$, the number of not-equals constraints;
\item $\gamma$, the number of at-most-3 and also the number of at-least-3 constraints (all with scope 5).
\end{enumerate}
The generator, which we denote as $\mathit{WIG}(k,n,e,\gamma)$, is stochastic, but as usual can be made deterministic by also specifying a value for the random generator seed.
For each user $u \in U$, it generates $A(u)$ such that the size of $A(u)$ is first selected uniformly from $\{ 1, 2, \ldots, \lfloor 0.5 k \rfloor \}$ at random and then the set $A(S)$ itself is selected randomly and uniformly from $S$ with no repetitions.
This results in each step having $n/4$ authorised (random) users on average.
The generator also produces $e$ distinct not-equals, $\gamma$ at-most-3 constraints, and also $\gamma$ at-least-3 constraints uniformly at random.
The PBT algorithm and the test instance generator are available for downloading~\cite{SourceCodes}.
\subsection{Thresholds from the Instance Generator}
\label{sec:setting-density}
In this section, we focus on experiments to study the dependency of instance properties on the parameters of the instance generator, and show that the WSP instances we use exhibit the classic properties expected of such phase transitions.
Figure~\ref{fig:vary-params} shows an example, at $k=40$ and $n=10k=400$, of the running time of PBT and the percentage of unsatisfiable (unsat) instances as they change with variation of parameters $e$ (Figure~\ref{fig:vary-d}) and $\gamma$ (Figure~\ref{fig:vary-alpha}).
As one could expect, the number of unsat instances grows with the number of constraints.
It can also be observed that the hardest instances are those near the 50\% level of the unsat curve.
Following standard arguments, under-constrained instances have a lot of valid plans which makes them relatively easy.
Unsatisfiability of the oversubscribed instances can be proved relatively quickly due to heavy pruning of the branches.
However, instances around the 50\% unsat level are likely to have none to few valid plans making it hard to find valid plans or prove unsatisfiability.
Note that one can argue that real-world instances in many cases are likely to be in the region of 50\% unsatisfiable: Companies are likely to be constraining their workflows up to the point when the workflows become unsatisfiable, or start with unsatisfiable workflows and gradually relax the constraints until obtaining satisfiable problems.
\input{fig-vary-params}
In the comparison of algorithms we use `critical' instances with $\gamma = k$ and $e = e_{50}$, where $e_{50} = e_{50}(k, n, \gamma)$ makes $\mathcal{WIG}(k, n, e_{50}, \gamma)$ instances satisfiable with 50\% probability.
The value of $e_{50}(k, n, \gamma)$ is obtained empirically for each $k$, $n$ and $\gamma$.
Although we do not use it directly, it is also possible to estimate $e_{50}$ analytically based on the instance generator properties.
In \ref{ap:estimated-PT} we give an (approximate) computation in the style of an `annealed estimate' \cite{SelmanKirkpatrick1996:AIJ-critical-behavior} of the average number of solutions given $k$, $n$, $e$ and $\gamma$; with the intent to use it to obtain an approximate value of $e_{50}(k, n, \gamma)$.
The annealed estimate seeks the average number of solutions over all instances, and so gives an upper bound on the PT -- because once the average drops below 0.5 then at least half the instances must be unsatisfiable.
Whether it gives a good estimate depends on the distribution of solutions between instances.
The main novelty of our analysis is that it accounts for the unevenness of distribution of solutions arising from the two-level nature of the problem.
In particular, we observed that a straightforward strategy with counting all the plans and estimating the probability of a single plan being valid does not give a tight estimate in our case.
Indeed, there might be millions of authorised plans per pattern but at the same time the expected number of eligible patterns can be well below one.
In that case, most of the instances will have no valid plans at all but some very rare instances will have millions of valid plans.
Since the straightforward estimation strategy gives the average number of valid plans per instance, its result is likely to be a significant over-estimate of the position of the PT.
In order to estimate the critical point $e_{50}$ more accurately, we have to ask a different question: we need to know when the probability of an instance to have at least one valid plan is 50\%.
To obtain relatively accurate results, we have to estimate the number of eligible patterns and then the probability of a pattern being valid.
This will give us the expected number of valid \emph{patterns} which allows us to more accurately estimate the critical point $e_{50}$.
Lastly, to further support that the observed phenomena have properties expected of a phase transition, we conducted a set of experiments at the critical points and around them.
In particular, we show in \ref{ap:PT-forced} the emergence of \emph{forced variables} similar to~\cite{Culberson2001:frozen-graph-coloring}, i.e.\ the decision variables with values forced by the instance, in the critical region.
We observe that the phase transition coincides with a rapid growth of the number of $M$ variables forced to be either 0 or 1, effectively corresponding to forced (not included explicitly) not-equals or ``equals'' constraints, respectively.
\section{Computational Experiments}
\label{sec:experiments}
In this section, we empirically study the efficiency and scaling behaviour of the new PBT algorithm, and PBPB encoding, and compare with each other and with the existing solvers.
Specifically, we compare the following WSP solvers:
\begin{description}
\item[PBT] The algorithm proposed in this paper;
\item[PUI] The FPT algorithm proposed and evaluated in \cite{JOCO2014};
\item[UDPB (Res)] The old pseudo-Boolean SAT formulation of the problem (see Section~\ref{sec:old-formulation}) solved with SAT4J \cite{BePa10} in the resolution proof system mode.
We also attempted to use the cutting planes mode to solve UDPB but the performance was prohibitively poor for running the experiments.
\item[PBPB (Res)] The new pseudo-Boolean SAT formulation, PBPB, of the problem (see Section~\ref{sec:new-formulation}) solved with SAT4J in the resolution proof system mode.
\item[PBPB (CP)] PBPB solved with SAT4J in the cutting planes proof system mode.
\end{description}
The PBT algorithm is implemented in C\#, and the PUI algorithm is implemented in C++.
Our test machine is based on two Intel Xeon CPU E5-2630 v2 (2.6~GHz) and has 32~GB RAM installed.
Hyper-threading is enabled, but we never run more than one experiment per physical CPU core concurrently, and concurrency is not exploited in any of the tested solution methods.
\subsection{Slices in Studying Algorithm Scaling}
\label{sec:slices}
As discussed in Section~\ref{sec:testbed}, we focus on the phase transition WSP instances in our computational study.
In a standard (non-FPT) study of phase transitions, this is generally straightforward -- at least conceptually, though potentially quite computationally challenging.
For example, consider standard Random-3SAT; the size of the problem is indicated by the number, $n$, of propositional variables.
For each value of $n$, the number of clauses $c$ is selected so that the instances have a 50\%{} probability of being satisfiable, which we might write as ``set $c = c_{50}$''.
Then, to study the algorithm's complexity, one tests it on these phase transition instances.
However, a key aspect of FPT is that, in addition to a main problem size parameter $n$, it also has some other parameter $k$ which is closely involved in the problem complexity.
One will generally wish to study the algorithm's scalability in terms of both $k$ and $n$.
We call $n$ and $k$ \emph{size parameters} following the observation that they control the size of the space of WSP solutions.
Consequently, we say that $(k, n)$ is the \emph{size space}.
The remaining parameters $e$ and $\gamma$ are then \emph{constraint parameters} as they control the number of constraints.
Since $(k, n)$ is two dimensional, studying the performance over the whole size space is computationally expensive and also difficult to analyse.
Accordingly, in this paper, for simplicity and clarity we study the scaling along one-dimensional subspaces of $(k,n)$, which we will refer to as \emph{slices}.
Since the size space is 2-d, we need to study the scaling in at least two independent (not necessarily orthogonal) directions; or along two independent one-dimensional ``slices''.
While studying the FPT properties, it is natural that such slices should also tend to focus on the regions in which $k$ is small compared to $n$.
\begin{figure}[htb]
\begin{center}
\begin{tikzpicture}
\begin{axis}[
compat=newest,
width=10cm,
height=4cm,
legend pos=north west,
xlabel={$n$},
ylabel={$k$},
title={},
grid=none,
axis lines = middle,
ticks=none,
xmin=0,
ymin=0,
xmax=2.9,
ymax=2.5,
legend style={at={(-0.1,0.5)},anchor=east},
legend cell align=left,
]
\addplot[ultra thick, green, domain=0.6:3] {0.6 * x};
\addlegendentry{``vary-$k$'' slice}
\addplot[ultra thick, red, domain=1:3] {1};
\addlegendentry{``fixed-$k$'' slice}
\addplot[opacity=0.2, fill=gray, ultra thick] coordinates {(0,0) (3,3) (3,0)} \closedcycle;
\end{axis}
\end{tikzpicture}
\end{center}
\caption{
Schematic view of the two ``slices'' used in our computational study in order to cover the 2-d size space $(k,n)$ used in order to investigate the empirical FPT properties.
Such FPT studies should naturally focus on the lower right (grey) region in which $k$ is small compared to $n$.
}
\label{fig:slices}
\end{figure}
Many options of choosing the slices are possible, including non-linear slices, however in this paper we will just use two linear slices schematically illustrated in Figure~\ref{fig:slices}, as they give a good and useful insight into the behaviour:
\begin{description}
\item[``vary-$k$'']
Vary the value of $k$, but the value of $n$ is given as a specified function of $k$.
In this paper, following~\cite{JOCO2014,KaGaGu}, we use the choice $n = 10k$.
This gives a simple and clean way of keeping $k$ to be `small' compared to $n$.
We also report the experimental results for the $n = 100k$ slice in \ref{sec:100k}, however the conclusions are very similar.
\item[``fixed-$k$'']
Use a constant value of $k$ and simply vary $n$.
This is a natural slice for a test of FPT performance; recall that the worst-case time complexity grows polynomially with $n$ at a fixed $k$, and one can expect the algorithms to demonstrate good scalability in this slice.
\end{description}
The intent of the PT study is that at each selected $(k,n)$ the remaining parameters $e$ and $\gamma$ of the instance generator will be selected so as to generate instances that have 50\% chance of being satisfiable.
However, then the constraint space $(e, \gamma)$ is also two dimensional, and we again need to reduce this space.
In this paper, we make the choice that we constrain to $\gamma=k$ -- this is somewhat ad hoc, but is designed to be simple, and again we believe it is justified (post hoc) by the results which we will see do indeed give useful insight into the behaviours of the different algorithms.
Finally, as mentioned in Section~\ref{sec:testbed}, at the given values of $(k,n,\gamma)$ the value of $e$ is selected to be $e_{50}(k,n,\gamma)$, the value giving a 50\% chance of the instance being satisfiable -- the actual value of $e_{50}$ is determined empirically.
Values of $e_{50}$ obtained and used in our study are freely available to facilitate future work~\cite{SourceCodes}.
\subsection{Performance Comparison: Slice ``vary-k''}
\label{sec:vary-k-slice}
To compare performance of various WSP algorithms, for each value of $k$ we generated 100 instances using $\mathit{WIG}(k, 10k, e_{50}, k)$.
The empirical number of not-equals constraints $e_{50}$ for each $k$ needed to obtain PT instances is shown on Figure~\ref{fig:density-vs-k}.%
\footnote{
One can observe the `zig-zag' shape of the curve in that the values corresponding to odd $k$'s are greater than the values corresponding to even $k$'s.
This is simply because the size of each authorisation list is randomly drawn by our instance generator from $[1, \lfloor 0.5k - 0.5 \rfloor]$.
As a result, the average number of authorisations in an instance with $k = 2i - 1$ is equal to that in an instance with $k = 2i$, $i \in \mathbb{N}$.
This makes the authorisations in `even' instances slightly more constrained compared to `odd' instances, which is then compensated by reduced number $e$ of not-equals constraints.
}
In fact, determining the parameters needed to give the crossover point was a significant computational effort by itself, using multiple runs of PBT -- a task that would not have been practical without the improved effectiveness of PBT.
\input{fig-performance}
We then simply solved each instance with each of the algorithms and in Figure~\ref{fig:performance} we report the median running time.
We report separate times for the satisfiable and unsatisfiable instances.
Note that the unsatisfiable ones are generally harder, and for PBT are not influenced by the heuristics used to select the order in which search tree branches are explored.
The immediate observations are that all the algorithms demonstrate roughly exponential growth of the running time, but that the performances of all the methods differ widely.
Crucially, the new PBPB (Res) and PBT (Res) both drastically outperform the previous UDPB (Res) and PUI, showing lower growth rate and also being significantly faster even on small instances.
We first look at the scaling of the best performing PBT, on the unsatisfiable instances as the discussion of scaling of satisfiable instances can be obscured by finding solutions early in the search tree.
Although it is not immediately obvious, the scaling of the PBT on unsatisfiable instances in Figure~\ref{fig:performance} is slightly super-exponential; the empirical curve bends slight upwards and so $2^{ak}$, with a constant $a$, does not give a convincing fit.
Deep analysis of the average case effects of heuristic improvements in such tree-based search is currently not yet possible, but generally the expectation, based on experience, is that heuristics will improve the coefficients in the exponents but retain the form.
Given the form of the scaling from the worst-case analysis in Section~\ref{sec:worst-case-analysis} is hence reasonable to compare the empirical scaling to $2^{(k \log_2 k) / b}$ for some empirically determined constant $b$.
To study this further, we scaled the PBT running time by $2^{ak}$ to reduce its variation, and plotted it, along with the [35--65] percentile range, on a logarithmic scale, see Figure~\ref{fig:pbt-unsat-fit-scaled}.
In such a plot, any function of the $2^{ak}$ form would appear as a straight line.
One can see that the PBT running time clearly curves up.
In fact, a good fit to it is a function $2^{k \cdot \log_2 k/13.2}$, confirming our assumption and indicating the effectiveness of the branching heuristics and pruning.
However, note that such heuristics are not in themselves needed for the algorithm to be FPT; this reinforces our point that even after an FPT algorithm is produced for a problem, there is likely to be a significant scope for heuristic improvements, and furthermore that such heuristic improvements can be made without losing the FPT guarantees.
\input{fig-ratio}
\input{fig-correlation}
The next observation is that PBT is faster than PBPB (Res) by one to two orders of magnitude, but that the scaling behaviours are similar.
A more accurate comparison can be done by inspecting Figure~\ref{fig:ratio}.
While the limited range of $k$ and noise do not allow us to convincingly make any conclusions, we hypothesise that the ratio of the runtimes between PBT and PBPB (Res) is close to a constant for large $k$.
Also, PBPB (Res) is relatively slow on small instances, presumably because of an expensive initialisation/preprocessing, normal for an off-the-shelf algorithm, but this does not affect the method's scalability.
The similarity of the scaling on larger instances ($k > 35$) supports our hypothesis from Section~\ref{sec:branching-strategies} that the search processes of PBPB (Res) and PBT could well be similar.
We also observe that the ratio between the solution time of unsatisfiable and satisfiable instances steadily grows for PBPB (Res), while it stays roughly constant for PBT\@.
This may be explained by the fact that the PB solver is likely to employ some heuristics for ordering search branches; these heuristics generally improve the running time of the solver on satisfiable instances while leaving its performance on unsatisfiable instances intact.
PBT does not currently have any such heuristic; our attempts to implement one gave a relative improvement of the algorithm's performance on satisfiable instances but the overheads were comparable to the gain and, thus, we dropped the branch ordering heuristic in our final implementation of PBT\@.
We also directly investigated whether the running times of PBPB (Res) correlate with the running times of PBT, see Figure~\ref{fig:correlation}.
On satisfiable instances the correlation is relatively weak which is natural as the running time depends on the branching decisions which differ in the two algorithms.
On unsatisfiable instances the correlation is much stronger which again shows that, although the individual branching decisions of the two algorithms may be different, the effectiveness of the heuristics is comparable
The resolution proof system (PBPB (Res)) performs clearly better than cutting planes (PBPB (CP)) on the `vary-$k$' slice.
However, this may change with a higher ration between $n$ and $k$, as evident from \ref{sec:100k}, where PBPB (CP) is more competitive, and also from Section~\ref{sec:fixed-steps}, where PBPB (CP) outperforms PBPB (Res) at high $n$ to $k$ ratio.
It would be interesting to develop PB solvers that would automatically get the best of these two regimes; and so the WSP could be a useful benchmark.
The gap between the running times on satisfiable and unsatisfiable instances is relatively small (within one order of magnitude) for all the solvers except for UDPB (Res).
We hypothesise that this difference is due to the inherent symmetry of the UDPB formulation, meaning that there are many valid plans and there is a high probability of finding one well before exhausting the entire search tree.
In contrast, the number of valid patters in a PT instance is likely to be small, and one is likely to be found only after searching a significant part of the search tree.
Note that PBPB (Res) is still superior to UDPB (Res) on satisfiable instances, as the plans search tree is much larger than the patterns search tree when $n \gg k$.
\input{fig-different-beta}
Although we argued that good experiments should seek instances in phase transition region of parameter space, it is still interesting to verify the performance of our approach, implemented in PBT, on under- and over-constrained instances.
To build such instances in a consistent way, we define a new parameter $\beta$, and study instances $\mathit{WIG}(k, 10k, \beta e_{50}(k, 10k, k), \beta k)$, i.e.\ the PT instances with the number of constraints scaled by $\beta$.
Figure~\ref{fig:different-beta} shows how the scaling changes as we move away from the phase transition, $\beta = 1.0$.
It shows the classic so-called ``easy-hard-easy'' behaviour.
Below the phase transition ($\beta < 1$) the runtimes and scaling are very much better than at the phase transition; that is most of the instances are under-constrained, having many solutions, and so solving will terminate early.\footnote{A natural question is whether, at small enough $\beta$ the scaling improves to being polynomial, however, we do not study that question here.}
Above the phase transition ($\beta > 1$) most of the instances are unsatisfiable, but the pruning will increase, and this is reflected in the improved scaling.
\subsection{Performance Comparison: Slice ``fixed-k"} \label{sec:fixed-steps}
All the FPT algorithms discussed in this paper are designed to solve large WSP with relatively small number $k$ of steps.
This reflects the fact that in large organisations there might be thousands of users with only tens of steps in an instance.
Thus, besides looking at the effect of increasing $k$, it is not only of theoretical interest, but also it is practically important to evaluate scalability of the approaches with regards to the number of users $n$.
\input{fig-varyn-loglog}
Figure~\ref{fig:vary-n} reports on a set of experiments with $\mathit{WIG}(18, n, e_{50}, 18)$ instances.
Note that a relatively small value of $k = 18$ was chosen to allow even the slowest algorithms to terminate in reasonable time.
The (impractically large) maximum value of $n$ was simply selected to investigate behaviour of all the algorithms.
Figure~\ref{fig:vary-n-num-e} shows how the value of $e = e_{50}(18, n, 18)$ varies with $n$ so as to remain at the phase transition region.
The corresponding results for the runtimes of the different algorithms are given in Figure~\ref{fig:vary-n-loglog}.
Although all the instances at all values of $n$ are selected from a phase transition region, it seems that there are two regions above and below a dividing value of $n^* \approx 2000$.
For $n < n^*$ the number of not-equals constraints in the graph is increasing with $n$, but for $n > n^*$ the number of the not-equals constraints in the graph is roughly constant, and the properties of the instances are practically independent on $n$.
The simplest behaviour to interpret is that of PUI on unsatisfiable instances, which exhibits a scaling that is approximately proportional to $n^{1.25}$.
This is natural as the algorithm works through the users one at a time, and when highly constrained by the not-equals constraints then the work per user may well become roughly constant, with only a mild accumulation of new patterns and, hence, increase of the patterns pool and associated costs.
On satisfiable instances PUI has a potential to solve the problem after $O(k)$ iterations, i.e.\ with a perfect user ordering heuristic its running time could theoretically be independent on $n$.
However the real user ordering heuristic does not always pick the ``right'' users; as a result the running time mildly increases with $n$.
That is, the PUI's running time matches our expectations.
The running time of PBT shows little dependency on $n$.
Observe that the upper level of the search algorithm in PBT does not depend on $n$.
Due to the heuristic described in Section~\ref{sec:authorisations-pruning}, the size of the assignment graph (the lower level) is bounded by $k^2$, i.e.\ does not generally grow with $n$.
Hence only generation of the assignment graph depends on $n$ in PBT\@.
However, the larger the value of $n$, the less likely that full scans of the list of users are needed.
As a result, PBT demonstrates sub-linear scalability in this experiment, solving instances of size about $10^7$ in under a second.
Even if not directly practical in case of WSP, this result shows that a careful design and implementation of an FPT algorithm has a potential to routinely address very large problems.
In contrast to the experiments along the ``vary-$k$'' slice, the PBPB (Res) scaling on the ``fixed-$k$'' slice is not similar to that of PBT, and is possibly worse than polynomial (as the slope increases on the log-log plot).
On the other hand, the PBPB (CP) shows very good performance, demonstrating sub-linear scaling (roughly $n^{0.9}$), and outperforming PBPB (Res) on large $n$'s.
It is natural to hypothesize that this is because at large $n$ the matching problem becomes ever more important, making the cutting planes proof system more suitable.
Although, as discussed in Section~\ref{sec:newPB-properties}, there is the potential of PB solutions in FPT time even with the resolution proof system, it seems quite possible that the standard PB solver in resolution proof system mode will not be able to find them, and so SAT4J (Res) could not fully exploit the FPT nature of the problem.
On the other hand, the natural expectation, and confirmed by separate experiments, is that at large $n$, the matching problem will be very easy as there is little conflict between users, and simple propagation is usually sufficient to solve the problem.
However, the cause for the relatively poor performance of PBPB (Res) at large $n$ requires future investigation.
\section{Conclusion}
\label{sec:conclusion}
The Workflow Satisfiability Problem (WSP), with User Independent constraints, is of practical importance as it concerns a common problem in large organisation of the assignment of $k$ tasks or 'steps' to a pool of $n$ workers or 'users' in a fashion so as to satisfy a large variety of constraints.
Furthermore, it can be considered as a powerful extension of hypergraph list colouring and, thus, may find other applications.
However, current exact solution methods were only capable of solving cases of up to about $k \approx 20$ and this limited practical applications.
In this paper, we have provided a new algorithm, PBT, and also a new Pseudo-Boolean encoding PBPB, that perform many orders of magnitude better, and allow solving much larger instances ($k \approx 50$ even at the hard PT).
The essential idea underlying PBT, and also inspiring PBPB, is that it is performing search on two levels:
\begin{itemize}
\item
`upper level': solving the UI constraints, by branching as to whether or not steps are assigned to the same user or to different users.
\item `lower level': solving the authorisation constraints, and so performing the assignment of users to steps.
\end{itemize}
The upper level is a heuristic tree-based search over the $k$ steps, and so to take `exponential' time commensurate with the number of patterns, $2^{\Theta(k \log_2 k)}$.
The lower level is a bipartite matching problem and so solvable in polynomial time.
The resulting complexity is $O(f(k) p(n,k))$ and so is FPT.
Although the WSP had been shown to be FPT, the previous FPT algorithm PUI was of limited practicality because of excessive, super-polynomial, memory usage.
The new PBT algorithm is also FPT by construction, but because of the tree search it is also polynomial in memory usage, greatly extending the practical usability.
Although PUI did have a form of the upper/lower split, it was not fully exploited; the PBT and PBPB gain their advantage by raising the upper/lower split to be the primary driving force, and appropriately ordering the branching decisions.
We believe that an important lesson is that having found an FPT algorithm for a problem should be just a starting point for designing a practical algorithm as there are still likely to be many opportunities for significant improvement via the repertoire of intelligent heuristic search mechanisms.
The direct study of algorithms for the WSP was also complemented with a study of phase transitions arising from a generator of WSP instances.
We found strong evidence of phase transition phenomena in the same fashion as previous extensive studies within graph theory and AI\@.
The immediate result of showing NP-hardness can be characterised (roughly) as simple broad-brush statement about the worst case such as ``exponential in $n$''.
The point of work on PTs is that this broad view can be refined to be more specific about which instances show such bad behaviour, and also what the exponential is in practice.
FPT adds a refinement that it now means ``exponential in $k$, but polynomial in $n$''.
As a result, FPT implies that the `size space' of the problem is at least two dimensional, and extended methods are required to study empirical scaling of FPT algorithms.
This paper gives a novel combination of FPT and PT and the use of multiple slices for a thorough empirical study of scaling of algorithms.
In particular, we have chosen the ``vary-$k$'' slice to study the algorithms' scalability in terms of $k$, and the ``fixed-$k$'' slice to test the practical FPT properties of the algorithms.
The ``vary-$k$'' slice revealed that PBT has scaling similar to that of PBPB, and that both algorithms demonstrate scaling having roughly a 13-fold reduction in the exponent compared to that predicted by the worst-case time complexity, significantly extending the range of practically solvable WSP instances.
Note that all the old algorithms showed significantly worse scaling.
The ``vary-$n$'' slice confirmed very good scaling (at least within reasonable values of $n$) of all the FPT algorithms.
One of the long-standing goals of AI has been to have general-purpose declarative representation which allows problems to be encoded and then solved by a general purpose solver, and of course this was one of the motivations for the PBPB formulation.
Naturally it is then of interest as to whether such general-purpose representations for FPT problems also allow FPT algorithms.
Ideally, there ought to be representations, with which off-the-shelf general solvers result in similar scaling to the direct implementations.
We did observe such good behaviour of the PBPB+SAT4J (in resolution proof system mode) combination on the ``vary-$k$'' slice, in which the scaling was roughly as good as the PBT solver, and a lot better than that of the previous solvers.
Although, the constant was by one or two orders of magnitude worse, as might be expected, it indicated that the solver was able to determine a good search strategy.
Furthermore, one may expect some additional efficiencies of PBPB when applied to real instances, as an off-the-shelf solver is more likely to be able to exploit associated structures.
However, behaviour of PBPB solved in the default resolution proof system mode was significantly worse on the ``fixed-$k$'' slice compared to PBT\@.
In such a slice, the PBPB (Res) solver demonstrated, apparently, exponential scaling despite we have shown that a simple tree-based solver is capable of exhibiting FPT time, i.e.\ polynomial scaling in ``fixed-$k$'' slice.
This indicates that there is a room for improvement of current PB solvers, but that they have the potential to compete with bespoke solvers even on such two-level/FPT problems.
\subsection{Future Directions}
\label{sec:future}
A natural direction for future research is to further improve the performance of the PBT algorithm.
One can investigate improving the pruning from the authorisations by adding extra lookahead; further improve the branching heuristics (possibly by exploiting machine learning for adaptive search) and also find branch ordering selections that give a net gain on the satisfiable instances.
It could also be modified to exploit parallel methods and multi-core machines.
A particular important direction arises from noting that PB solvers on the PBPB encoding are likely to be benefiting from learning and storing of no-goods (entailed constraints).
It would be interesting to consider how PBT could be enhanced with such no-good learning, and in such a way that is compatible with FPT -- enhancing the FPT-driven two-layer nature of the solution, rather than breaking it.
The phase transition properties of the set of generated instances should also be mapped in more detail, along with consideration of a wider range of UI constraints.
Such an enhanced studies of the PT properties should be also exploited for further evaluation of proposed algorithms.
Although the combination of PBPB and SAT4J in the resolution proof system mode worked well, there was evidence from the ``fixed-$k$'' that in some regions of the space of instances it was performing less well.
In particular, scaling with $n$ seemed to be non-polynomial, and this deserves further investigation.
Possibly, general PB solution methods need different branching heuristics, or could be extended to better exploit the matching problem (equivalently, list colouring of a clique) that arises as a vital sub-problem when using the PBPB formulation.
We propose this study as a contribution towards ensuring that general purpose solvers are appropriately effective on FPT problems; and give an example of developing a formulation that enables solvers to exploit the inherent FPT properties of the problem. A future challenge in AI may be to study how a general purpose solver can automatically discover such formulations.
An important outcome is that the combination of decomposition and FPT ideas leads to new highly-effective algorithm, and then combining FPT with PT ideas give a powerful framework for empirical study.
Our PT study of WSP also revealed interesting challenges in empirical average time complexity studies for FPT problems.
We proposed using multiple slices through the size space while adjusting other parameters of the instance generator to stay in the PT region.
However, it is still an open question how to best select these slices, or indeed how to do a more integrated study of the effects of the multiple parameters.
Considering the the general interest of the AI community in analysis of a widening range of complexity classes (e.g.~\cite{BaileyEtAl2007:PT-in-PP}) (including studies of FPT problems, see e.g.~\cite{HaanEtal2015:IJCAI-FPT-planning,HaanEtal2013:IJCAI-FPT-planning}) and understanding of practical implications of these complexity classes, we believe that further development of the study of interactions between FPT and PT offers the potential for deeper insight into computational challenges arising in AI.
\bigskip
\paragraph{Acknowledgements}
This research was partially supported by EPSRC grants EP/H000968/1 (for DK and AP) and EP/K005162/1 (for AG and GG).
The source codes of the instance generator and PBT, as well as the experimental data, are publicly available~\cite{SourceCodes}.
\section*{References}
\bibliographystyle{plain}
|
\section{Introduction}
It is well established that giant molecular clouds within the interstellar medium (ISM) are the birthplace of stars and later planetary systems. However, understanding star formation remains one of the outstanding remaining challenges of modern astrophysics. In spite of significant progress in recent years \citep[][]{2010HiA....15..438C}, fundamental questions about the basic physics of star formation remain unanswered.\\
The importance of magnetic fields in regulating the star formation process is still a topic of ongoing research. Self-gravitating clouds have long been believed to reduce support against collapse by magnetic support and triggering star formation \citep[][]{1999osps.conf..305M} with time scales of collapse of up to 10 Myr, assuming ambipolar diffusion \citep[][]{2008A&A...487..247F,2009Sci...324.1408G,2010ApJ...725..466C} indicating a significant influence of magnetic fields on the star formation process. Observations, however, suggest that molecular clouds are shorter lived and the cloud collapse is controlled by turbulence with negligible magnetic contribution \citep[][]{2000ApJ...530..277E, 2004ASPC..322..299K}.\\
Observations of magnetic fields in molecular clouds are essential for understanding their role in the evolution from dense clouds to the formation of stars. One way to improve our knowledge about the involvement of magnetic fields in the star formation process is to trace its morphology with the help of dust grains. In addition to magnetic fields, dust grains also play a central role in the ISM -- from heating and cooling processes, astro-chemistry, to the polarization effects of light \citep[][]{2010MNRAS.404..265D}. Non-spherical rotating dust particles have the tendency to align with their shorter axis along the local magnetic field direction \citep[][]{1974ApJ...187..461M,2012JQSRT.113.2334V}. Therefore, mapping of light that is polarized by elongated and aligned dust grains in the near-infrared to sub-mm \citep[][]{2004MNRAS.352.1347L, 2005AA...430..979G,2011AA...535A..44F} offers one way to obtain information about the magnetic field morphology in regions associated with star formation. Additionally, at optical to near infrared wavelengths, light from embedded stars scattered as dust grains enables us to investigate the spatial structure of star-forming regions and can also constrain the dust properties \citep[][]{1997MNRAS.286..895L}.\\
However, to make comparisons between star formation theories with observational data, one requires an expedient understanding of the intrinsic radiative transfer (RT), the dust properties, and the physics of grain alignment.
Unfortunately, the 3D dust RT problem is nonlinear, which makes it one of the hardest challenges in computational astrophysics. In idealized scenarios, the problem can be solved by using analytical radiative transfer techniques \citep[e.g.][]{1997MNRAS.291..121I,2002A&A...395..373V,2006ApJ...645..920S}. Environments with ongoing star formation, however, are regions where gas and dust density and magnetic fields form complex structures and their physical quantities cover several orders of magnitude. The Monte-Carlo (MC) method is a powerful approach to perform radiative transfer simulations independent of complexity. Here, nature is mimicked by sending photon packages along probabilistic pathways to obtain numerical solutions to RT problems. A broad variety of codes has been developed to cover problems of astrophysical importance such as the heating of dust, photoionization, and the calculation of polarization of scattered radiation {\citep[][]{1999pcim.conf..220J, 1999A&A...349..839W,2002ApJ...574..205W,2001sf2a.conf...65N,2003MNRAS.340.1136E, 2003CoPhC.150...99W,2003ApJ...583L..35S, 2009A&A...497..155M, 2011BASI...39..101W,2011ApJS..196...22B,2012ascl.soft02015D,2013prpl.conf2S001R,2014ascl.soft04006H}}. \\
So far, vital questions concerning dust composition, alignment efficiency, and size distribution are unknown. With forthcoming observational equipment, e.g. SOPHIA/HAWC+ \cite{2013AAS...22134514D} or ALMA \cite{2004...34.555}, the need for accurate and expedient modeling of observational polarimetry data is increasing. Hence, we developed a new RT code from scratch and fully incorporated radiative transfer, dust heating, and polarization algorithms, as well as state-of-the-art dust grain alignment theories. Here, we implemented the classical imperfect Davis-Greenstein (IDG) alignment owing to paramagnetic relaxation \citep[][]{1983ApJ...272..551A,1967ApJ...147..943J}, the radiative torque alignment (RAT) because of radiation-dust interaction \citep[][]{2007AAS...210.7904H}, and considered the effects of mechanical alignment (GOLD) \citep[][]{1952MNRAS.112..215G,1994MNRAS.268..713L,1995ApJ...451..660L} as a result of gas streams. \\
This paper is structured as follows: First, we present the POLARIS code and its basic RT and dust heating algorithm in Sect. \ref{code}. Then, we briefly discuss the applied dust grain model and the implemented polarization and grain alignment features in Sect \ref{sect:dust}. The optimization methods that were considered in the POLARIS code are listed in Sect. \ref{optim}.
We describe the challenges of the scattering process on partially aligned dust grains in Sect \ref{sect:scatter}. To demonstrate the functionality and predictability of POLARIS, we calculate synthetic intensity and polarization maps in Sect. \ref{sect:application}. Here we considered both analytical models and complex MHD-simulations of different stages of the star formation process. Finally, we summarize our results and give a short outlook to future projects in Sect. \ref{sect:sum}.
\section{The code}
\label{code}
POLARIS is a three-dimensional Monte-Carlo (MC) continuum radiative transfer (RT) code dedicated to post-process MHD simulations to determine the observability of the physical quantities. The code can make use of the full parameter set (density, temperature, velocity, and magnetic field distributions) delivered by MHD simulations to perform dust heating and complex polarized radiative transfer (RT) calculations. All RT simulations are performed on an adaptive octree grid, which is optimized to maintain the data structure of certain MHD codes, e.g. FLASH \cite{2010ascl.soft10082F}. The grid allows a time efficient propagation of photon packages and provides a dynamical spatial resolution to resolve regions of high optical depth and simultaneously reduces the amount of required memory. The code is platform independent and completely written in $\rm{C++}$ in a strict object orientated architecture making it easy to develop classes for future purposes such as photoionization, line transfer, or to implement further grid geometries.\\
The code works in three independent main operations modes:
\begin{enumerate}
\item MC simulations of self-consistent heating of the dust grains by an arbitrary number of radiation sources.
\item MC calculation of the mean energy density and anisotropy by the radiation field for radiative torque (RAT) alignment (see Sect. \ref{sect:RAT}).
\item Calculation of spectral energy distributions (SEDs) and synthetic multi-wavelength intensity and polarization maps for statistical analysis.
\end{enumerate}
To access its full functionality, the code POLARIS parses script files. Predefined commands in a pseudo XML-style that is implemented in the code allows the user to create scripts with sequences of operation modes.
\subsection{Radiative transfer}
\label{sq:rad}
Monochromatic photon packages with a fixed energy $\epsilon_{\rm{0}}$ from distinct sources are emitted into the model space. To cover the various radiation-dust interactions in the ISM, we provide classes of point (stars), diffuse (star field), thermal dust re-emission and external (interstellar radiation field and background objects) sources of radiation. Each source has its characteristic spatial emission, energy spectrum, and degree of linear and circular polarization. A higher amount of photon packages leads to an increase in calculation time but also results in a better S/N inherent in the MC process.\\
In the dust heating mode we use a combined algorithm of continuous absorption \citep[][]{1999A&A...344..282L} and immediate temperature correction \citep[][]{2001ApJ...554..615B}. First, the mass specific emissivity
\begin{equation}
j(a,T_{\rm{d}})=\int{C_{\rm{abs,\lambda}}(a)B_{\rm{\lambda}}(T_{\rm{d}})d\lambda}
\label{eq:LucyJ}
\end{equation}
of the entire ensemble of dust grain sizes is pre-calculated and interpolated as a function of dust temperature for a user-defined temperature range using pre-tabulated dust grain properties (see Sect. \ref{sect:application}). Here, $B_{\rm{\lambda}}(T)$ is the Planck function, $T_{\rm{d}}$ is the temperature of the dust, and $C_{\rm{abs,\lambda}}$ the cross-section of absorption. Afterwards, the photon package propagates {a distance $l_{i}$} in the grid between two points of radiation-dust interactions. At each cell wall, the absorption rate per time unit
\begin{equation}
\dot{E} = \frac{\epsilon_{\rm{0}}}{\Delta t} \sum_{\rm{i}}{C_{\rm{abs,\lambda_i}}(a)\times l_{i}} + \Delta \dot{E}
\label{eq:LucyE}
\end{equation}
is updated as presented in \cite{1999A&A...344..282L}, assuming constant temperatures and densities in each cell. {We extended the presented algorithm by an additional therm $\Delta \dot{E}$ to incorporate temperatures provided by MHD simulations into the RT simulations (see Sect. \ref{setupMHDHeat} for detail}). {Since we assume local thermodynamic equilibrium (amount of absorbed energy equals amount of re-emitted energy), the updated dust temperature is provided by solving}
\begin{equation}
j(a,T_{\rm{d}}) = \frac{\dot{E}}{4 \pi V_{\rm{cell}}}
.\end{equation}
The optical depth $\tau$ is integrated over the passed distance $l$ up to the next interaction ($\tau>\tau_{\rm{max}}$). The interaction distance is determined by $\tau_{\rm{max}} = -\log_{10}(1-z)$ \citep[see][]{2003CoPhC.150...99W}. In this paper, $z$ donates a randomly generated number with $z \in [0;1[$. At each point of interaction the scattering-absorption probability is determined by the albedo $C_{\rm{sca}}/C_{\rm{ext}}$. In the case of scattering ($C_{\rm{sca}}/C_{\rm{ext}}$<z), a new direction $(\vartheta', \varphi')$ is sampled from the phase function of the dust grain. POLARIS uses optionally isotropic scattering, full Mie-scattering or, alternatively, the inverted Henyey-Greenstein phase function
\begin{equation}
\cos(\vartheta') = \begin{cases} \frac{1}{2g} \left[1+g^2-\left(\frac{1-g^2}{1-g+2g\times z}\right)\right] &\mbox{if } g \neq 0 \\ 1-2\times z & \mbox{if } g=0 \end{cases}
\label{eq:HG}
\end{equation}
with
\begin{equation}
\varphi' = 2\pi \times z
,\end{equation}
as presented in \cite{1941ApJ....93...70H}. For the latter, the probability distribution of scattering is described by one parameter, the anisotropy $g=\left\langle cos(\vartheta')\right\rangle \in [-1, 1]$, $g=0$ means isotropic scattering, where $g=-1$ backward scattering, and $g=1$ forward scattering, respectively. The anisotropy parameter $g$ and the full scattering matrix (see \ref{sect:scatter}) are pre-calculated with DDSCAT (\cite{2013arXiv1305.6497D}, see Sect. \ref{sect:RAT} and Sect. \ref{sect:application}) and is a function of grain size, grain orientation, and wavelength. Although alternative phase functions are currently discussed \citep[see][]{2008ApJS..177..546S}, the HG phase function still provides a good approximation for the scattering probability. During all dust-heating calculations, the dust grain orientation is assumed to be random.\\
The dust temperature $T_{\rm{d}}$ is the essential parameter for thermal radiation. Hence, the case of an absorption and immediate thermal re-emission event is treated by the instantaneous temperature correction technique of \cite{2001ApJ...554..615B}. A photon package absorbed by dust will be immediately re-emitted, assuming a blackbody spectrum. The new wavelength $\lambda_{i}$ of the thermal dust photon emitted in the $i - th$ cell is determined by
\begin{equation}
z = \frac{\int_{\lambda_{\rm{min}}}^{\lambda_{i}}{C_{\rm{abs,\lambda}} \frac{dB_{\rm{\lambda}}(T_{\rm{d,i}})}{dT} d\lambda }}{\int_{\lambda_{\rm{min}}}^{\lambda_{\rm{max}}}{C_{\rm{abs,\lambda}} \frac{dB_{\rm{\lambda}}(T_{\rm{d,i}})}{dT} d\lambda}}
\label{eq:BW}
\end{equation}
to ensure thermal equilibrium. This process is repeated until the photon package reaches the boundary of the grid.Once the correct dust temperature is achieved by the dust heating algorithm, intensity and polarization maps can be calculated. \\
The multi-wavelength MC RT polarization simulation, including scattering, are calculated similarly to dust heating and can be performed in a monochromatic or multi-wavelength mode. In the case of polarization calculations, the dust temperature now remains constant and different dust-grain alignment mechanisms can be applied.
\subsection{Dust modeling and alignment}
\label{sect:dust}
Interstellar dust grains consist of silicate and carbon compounds and make up only about $1\%$ of total mass of the ISM. However, the extinction of dust grains can lead to significant degrees of linear and circular polarization from the optical to millimeter regime because of scattering, dichroic extinction, and thermal re-emission. \\
POLARIS considers the dust as a mixture of different dust components. Each component consist of its own material, size distribution, sublimation temperature, and alignment behavior. When the dust temperature exceeds the sublimation temperature of a certain material, this component will be removed from the cell. {For the mixing of different dust materials, the distinct cross-sections can simply be multiplied with their ratio of abundance and added up \citep[see e.g.][]{2010MNRAS.404..265D}.}\\
Non-spherical spinning dust grains align with their shorter axis, which is parallel to the local magnetic field direction. Thus, they preferentially block light perpendicular to the magnetic field direction, which results in a polarization parallel to the magnetic field while re-emitted light is polarized perpendicularly. The radiation emitted by dust will mostly be found in the mid-infrared, for a given dust temperature. Hence, the orientation of polarized light is related to the direction of the projected underlying magnetic field morphology, leading to a characteristic polarization pattern.\\
The implemented RT equations for extinction and polarization \citep[][]{2002ApJ...574..205W} require the sum and difference of cross-sections ($C=\pi a^2 \times Q$) parallel $C_{\rm{ext,||}}$ and perpendicular $C_{\rm{ext,\bot}}$ to the direction of the magnetic field \citep[see][for detail]{2014A&A...566A..65R}. Here, $a$ is the effective radius of the spherical grain with equivalent volume to that of a spheroid grain and $Q$ is the efficiency of interaction.\\
We use the Stokes vector $ S = (I,Q,U,V)^T$ to describe the change in intensity and degree of polarization where $I$ is intensity, $Q$ and $U$ quantify the linear polarization, and $V$ the circular polarization. {Writing the radiative transfer equation in the Stokes vector formalism allows to calculate the effects of dichroic extinction, thermal re-emission (\cite{1974ApJ...187..461M}) with:}
\begin{equation}
\frac{\rm{d}}{n_{\rm{d}}ds}\begin{pmatrix} I\\ Q \\ U \\ V \end{pmatrix}=-\begin{pmatrix} \overline{C}_{\rm{\rm{ext}}} & \overline{C}_{\rm{pol}} & 0 & 0 \\ \overline{C}_{\rm{pol}} & \overline{C}_{\rm{\rm{ext}}} & 0 & 0\\ 0 & 0 & \overline{C}_{\rm{\rm{ext}}} & - \overline{C}_{\rm{circ}} \\ 0 & 0 & \overline{C}_{\rm{circ}} & \overline{C}_{\rm{pol}} \end{pmatrix}\begin{pmatrix} I\\ Q \\ U \\ V \end{pmatrix} + B_{\rm{\lambda}}(T_{\rm{d}})\begin{pmatrix} \overline{C}_{\rm{abs}}\\ \Delta \overline{C}_{\rm{abs}} \\ \Delta \overline{C}_{\rm{abs}} \\ 0 \end{pmatrix},
\label{eq:radtrans}
\end{equation}
where $T_{\rm{d}}$ and $n_{\rm{d}}$ are the temperature and number density, respectively, of the dust. In this paper $\overline{X}$ denotes the averaging over grain size distribution and $\left\langle X \right\rangle$ over orientation. So far, POLARIS is optimized for oblate dust grains but adjustments for arbitrary shapes can easily be applied.
In Eq. \ref{eq:radtrans}, the required matrix of cross-sections depends on grain size, orientation, and wavelength. The matrix elements are determined by the values along the minor axis ($C_{\rm{ext,||}}$) and major axis ($C_{\rm{ext,\bot}}$), and are calculated for each dust grain size in each RT simulation with
\begin{equation}
C_{\rm{ext,x}}= \left\langle C_{\rm{ext}} \right\rangle+\frac{1}{3} R\times \left( C_{\rm{ext,||}}-C_{\rm{ext,\bot}} \right)
\end{equation}
\begin{equation}
C_{\rm{ext,y}}= \left\langle C_{\rm{ext}} \right\rangle+\frac{1}{3}R \times \left( C_{\rm{ext,||}}-C_{\rm{ext,\bot}} \right)\left( 1- 3 \sin^2(\vartheta) \right)
\label{eq:cross}
.\end{equation}
The angle $\vartheta$ is between incident light and magnetic field direction (see Fig. \ref{Fig:Ang}). For oblate dust grains
\begin{equation}
C_{\rm{ext}}=0.5(C_{\rm{ext,x}}+C_{\rm{ext,y}}),
\label{eq:Cext}
\end{equation}
\begin{equation}
C_{\rm{pol}}=0.5(C_{\rm{ext,x}}-C_{\rm{ext,y}}),
\label{eq:Cpol}
\end{equation}
and
\begin{equation}
\left\langle C_{\rm{ext}} \right\rangle = \left(2C_{\rm{ext,||}}+C_{\rm{ext,\bot}}\right)/3.
\end{equation}
The Rayleigh reduction factor $R$ \citep[][]{1968nim..book..221G} is introduced to take care of imperfect grain alignment and is defined as
\begin{equation}
R=\left\langle G\left(\cos^2(\beta)\right) G\left(\cos^2(\zeta)\right) \right\rangle
.\end{equation}
Here, $\beta$ is the alignment cone angle between the angular momentum $\vec{J}$ and magnetic field $\vec{B}$ and $\zeta$ is the internal alignment angle between the axis of the largest moment of inertia $\vec{I_{\rm{||}}}$ and $\vec{J}$, while $G(x)=1.5x - 0.5$. The Rayleigh reduction factor is defined as $R \in [-0.5;1],$ where positive values correspond to an alignment with the longer grain axis that is perpendicular to the magnetic field direction and vice versa for negative values. We note that the Rayleigh reduction factor can also be a function of wavelength and effective dust grain radius. Consequently, grain alignment and, subsequently, polarization is completely determined by first order moments weighted over a distribution function defined by $\left\langle \cos^2(x) \right\rangle = \int{f(x)\sin(x)dx}$. Unfortunately, alignment and internal alignment do not work independently. For exact solutions, a simultaneous integration of both distribution functions $f(\beta)$ and $f(\zeta)$ over cone angle $\beta$ and angle $\zeta$, respectively, is required. Depending on the considered grain alignment mechanism, the distribution functions, in turn, are also functions of density, temperature, magnetic field strength, velocity, and direction of the incident light (see Sect. \ref{sect:IDG}, \ref{sect:GOLD} and \ref{sect:RAT}). Because of the enormous parameter space, the reduction in polarization cannot be pre-calculated without losing precision. The exact calculations that are required, however, for each photon package-dust interaction results in a further burden to 3D MC-RT simulations. Therefore, in POLARIS we approximate
\begin{equation}
\left\langle G\left(X\right) G\left(Y\right) \right\rangle \approx \left\langle G\left(X\right) \right\rangle \times \left\langle G\left(Y\right) \right\rangle \left(1+f_{\rm{c}}\right)
\end{equation}
with a correlation factor $f_{\rm{c}}$ where $f_{\rm{c}} = 0$ stands for no correlation \citep[][]{2013ApJ...779..152H,2014ApJ...790....6H}. The correlation factor is of minor influence to the net polarization, meaning that this approach is well justified.\\
Once, the Rayleigh reduction factor is known, the exact cross-sections for the RT simulation can be calculated with Eqs. \ref{eq:Cext} and \ref{eq:Cpol} for a given size distribution $n(a)$ between a minimal $a_{\rm{min}}$ and maximal $a_{\rm{max}}$ grain size with
\begin{equation}
\overline{C}_{\rm{ext}}= \int_{a_{\rm{min}}}^{a_{\rm{max}}} {C}_{\rm{ext}}(a) n(a) da
\label{eq:avg}
\end{equation}
\begin{equation}
\overline{C}_{\rm{pol}}= \int_{a_{\rm{min}}}^{a_{\rm{max}}} {C}_{\rm{pol}}(a) n(a) da
.\end{equation}
The same procedure is used for the cross-sections of scattering $\overline{C}_{\rm{sca}}$, absorption $\overline{C}_{\rm{abs}}$, and circular polarization $\overline{C}_{\rm{circ}}$ to obtain the matrix required in Eq. \ref{eq:radtrans}.
\begin{figure}[]
\centering
\includegraphics[width=0.45 \textwidth]{ang.pdf}
\caption{\small Geometrical configuration of a dust grain partially aligned with its angular momentum $\vec{J}$ to the magnetic field direction $\vec{B}$. The precession of $\vec{J}$ around $\vec{B}$ defines the cone angle $\beta,$ and the precession of maximum moment of inertia $\vec{I}$ around $\vec{J}$ defines the angle of internal alignment $\zeta$. Here, the angle $\vartheta$ is defined as being between the direction of incident light $\vec{k}$ and $\vec{B}$. The angles $\alpha$ and $\epsilon$ are between the direction of the supersonic velocity stream $\vec{v_{\rm{g}}}$ and $\vec{B}$ and between the anisotropy $\vec{u}_{\rm{\lambda}}$ in the radiation field and $\vec{B}$, respectively. The vector $\vec{v'_{\rm{rel}}}$ is the projection of $\vec{v_{\rm{g}}}$ on the direction of the magnetic field direction $\vec{B}$. }
\label{Fig:Ang}
\end{figure}
\subsubsection{Imperfect internal (II) alignment}
\label{sect:IDG}
The cause of internal alignment \citep[see][]{1979ApJ...231..404P} is the Barnett effect \citep[][]{B1915}. Any change in angular momentum (e.g. gas-dust collisions) forces free electrons in the paramagnetic dust grain material to align their spin parallel to the axis of grain rotation. This induces a net magnetic moment and, subsequently, grain alignment. However, this net magnetic moment is not constant because of thermal fluctuations inside the dust grain. Subsequently, thermal fluctuations are transferred into a wobbling motion, leading to a precession of the largest moment of inertia $\vec{I_{\rm{||}}}$ arround $\vec{J}$. The distribution function for imperfect internal alignment is
\begin{equation}
f(\zeta)=N\times \exp \left(-\frac{J_{eff}-^2}{2I_{\rm{||}}k_{\rm{B}} T_{\rm{d}}} \left[1+(h-1)\sin^2(\zeta)\right]\right)
\label{eq.distr}
\end{equation}
\citep[][]{1996ASPC...97..425L}, where $h=I_{\rm{||}}/I_{\rm{\bot}}$ is the ratio of the momenta of inertia, $J_{eff}$ is the rms value of the angular momentum, and $N$ is a normalizing constant (see App. \ref{apA} for details).
\subsubsection{Imperfect Davis-Greenstein (IDG) alignment}
\label{sect:IDG}
For the IDG, the alignment mechanism is paramagnetic relaxation \citep[][]{1951ApJ...114..206D,1967ApJ...147..943J,1979ApJ...231..404P,1979ApJ...231..417S}. In rotating non-spherical paramagnetic dust grains the electrons' spin axis follows the external magnetic field direction. However, for a sufficiently high angular velocity, the electrons cannot fully respond. Spin-lattice interaction transfers the component of angular velocity perpendicular to the magnetic field into internal heat. In the ISM, paramagnetic relaxation and subsequently perfect alignment of the dust grains is opposed by random gas bombardment.\\
The ratio of the characteristic timescales of paramagnetic relaxation and gas-dust collisions provides a threshold for the effective grain radius $a$ up to which dust grains align
\begin{equation}
\delta_{\textit{0}} = 2.07\times 10^{20}\frac{B^2}{n_{\textit{g}} T_{\textit{d}} \sqrt{T_{\textit{g}}}}[m],
\label{eq:delta}
\end{equation}
where $T_{\rm{g}}$ is the gas temperature and $n_{\rm{g}}$ is the number density of the gas.
Dust grains with radii $a$ above $\delta_{\textit{0}}$ no longer significantly contribute to polarization. For the IDG, an analytical function for the distribution of the opening angle $\beta$ \citep[see][]{1979ApJ...231..417S} allows us to calculate
\begin{equation}
\left\langle \cos^2(\beta) \right\rangle= \left(1 - \sqrt{\frac{\xi^2(a)}{1-\xi^2(a)}} \right) \arcsin{\frac{\sqrt{1 - \xi^2(a)}}{1 - \xi^2(a)}}
\label{eq:IDGfinal}
\end{equation}
\citep[][]{1983ApJ...272..551A}, with
\begin{equation}
\xi^2(a) = \frac{a+\delta_ {\textit{0}}\times \frac{T_{\textit{d}}}{T_{\textit{g}}}}{a+\delta_{\textit{0}}}
\label{eq:IDGzetha}
\end{equation}
and subsequently the Rayleigh reduction factor. To calculate the internal alignment, we use the approximation from \cite{1997ApJ...484..230L} for the angular momentum
\begin{equation}
J_{eff}^2\approx \sqrt{\left(1+0.5 s^{-2}\right) \left(1+T_{\rm{d}} / T_{\rm{g}} \right)} \times J_{\rm{th}}^2
\end{equation}
where $J^2_{\rm{th}} \approx 2 I_{\rm{||}}k_{\rm{B}}T_{\rm{g}}$ is the thermal angular momentum obtained from gas-dust collisions and $s$ is the aspect ratio of the grains. This approach delivers reliable values in the limit of thermal equilibrium ($T_{\rm{d}}/T_{\rm{g}}=1$). However it slightly underestimates the internal alignment for $s<0.5$ and $T_{\rm{d}}/T_{\rm{g}}<0.2$.
\subsubsection{Gold (magneto mechanical) alignment}
\label{sect:GOLD}
The alignment of dust grains by purely mechanical alignment was proposed by \cite{1952MNRAS.112..215G}. This mechanism requires a predominant direction in the velocity field of the gas. The dust grains align with their longer axis parallel to the gas flow. In magneto-mechanical alignment \citep[][]{1994MNRAS.268..713L,1995ApJ...451..660L,1997ApJ...483..296L}, the alignment behavior depends on both gas flow and magnetic field. Here, the reference frame is determined by the Barnett effect and, subsequently, the magnetic field direction, but not the gas stream. In this paper we also refer to magneto-mechanical alignment as GOLD alignment. The gas flow must be supersonic, otherwise the dust grain orientation remains randomized \citep[see][]{1952MNRAS.112..215G,1995ApJ...451..660L}.\\
A distribution function for the cone angle $\beta$ was derived by \cite{1976Ap&SS..43..291D}. For spheroidal dust grains, the first order moment $\left\langle \cos^2(\beta) \right\rangle$ is completely defined by the anisotropy in the gas stream
\begin{equation}
s = -\frac{1}{2}\frac{ \left\langle \vec{v_{\rm{rel}}} \right\rangle -3 \left\langle \vec{v'_{\rm{rel}}} \right\rangle }{ \left\langle \vec{v_{\rm{rel}}} \right\rangle - \left\langle \vec{v'_{\rm{rel}}} \right\rangle }
,\end{equation}
where $\vec{v'_{\rm{rel}}}$ is the part of the relative drift velocity $\vec{v_{\rm{rel}}}$ projected on the magnetic field direction and $g = h^{-1}$ is the grain non-sphericity \citep[][]{1994MNRAS.268..713L}. In the case of oblate dust grains, $g$ is negative and
\begin{equation}
\left\langle \cos^2(\beta) \right\rangle = \begin{cases} \frac{\sqrt{-g} \arcsin(\sqrt{-s/(1 + g))}}{s \arctan{\sqrt{sg/(1 + s + g)}}} - 1/s &\mbox{if } s<0 \\
\frac{\sqrt{-g} \sinh^{-1}(\sqrt{s/(1 + g))}}{s \tanh^-{1}(\sqrt{-sg/(1 + s + g))}} - 1/s & \mbox{if } s > 0 \end{cases}
\label{eq:gold}
.\end{equation}
Here, the Rayleigh reduction factor is independent of wavelength and grain size. The polarization can change sign for an angle $\alpha$ between magnetic field and a predominant gas stream lower than $54^{\circ}$ (see Fig. \ref{Fig:Ang}). For other grain shapes we refer to \cite{1996ASPC...97..425L}.\\
For the internal alignment the angular momentum can be approximated \citep[][]{1997ApJ...483..296L} by
\begin{equation}
J_{eff}^2 \approx k_{\rm{B}} I_{\rm{||}}(2/h+1)\left( \frac{T_{\rm{g}}+T_{\rm{d}}}{2} + \frac{\mu m_{\rm{H}} v_{\rm{rel}}^2}{6 k_{\rm{B}}}\right)
\label{eq:goldJ}
,\end{equation}
with the molecular mass $\mu m_{\rm{H}}$ of the gas. For the required conditions of supersonic velocity we locally calculate the Mach-number in each cell with
\begin{equation}
M= \frac{v_{\rm{rel}}}{\sqrt{k_{\rm{B}}T_{\rm{g}} /\mu m_{\rm{H}}}}
\label{eq:mach}
\end{equation}
and demand $M>1$. Otherwise, we consider the dust grains to be randomized.\\
Possible mechanical alignment of helical dust grains in sub-sonic environments is currently being discussed \citep[e.g.][]{2007ApJ...669L..77L} but is not yet in POLARIS.
\subsubsection{Radiative torque (RAT) alignment}
\label{sect:RAT}
It was noticed by \cite{1976Ap&SS..43..291D} that radiation can both spin up and align dust grains. The alignment mechanism is also known as the Barnett effect.\\
Based on a numerical approach and the DDSCAT Code \citep[][]{1993ApJ...405..685D,1994ApJ...405..685D, 2000ascl.soft08001D,2013arXiv1305.6497D}. \cite{1996ApJ...470..551D,1997ApJ...480..633D,2003ApJ...589..289W} demonstrate that RATs can significantly align a number of different grain shapes. The spin up of dust grains is also supported by laboratory experiments \citep[see][]{2004ApJ...614..781A}. Later, the analytical framework for RAT alignment was developed in \cite{2007AAS...210.7904H, 2007AAS...210.7901H}, where they reproduced the numerical findings from \cite{2003ApJ...589..289W}.\\
With increasingly effective dust grain radius $a$, RATs become more efficient and the dust grains get suprathermally spun up. Analytical models by \cite{2007AAS...210.7904H, 2007AAS...210.7901H} show grain alignment at attractor points with high angular momentum (high-J) and low angular momentum (low-J). The high-J attractor point is stable and, with supra-thermal rotation ($\omega_{\rm{rad}} > 3\times\omega_{\rm{th}}$), dust grains can be considered to be perfectly aligned. Most dust grains drift to the unstable low-J attractor, where they are prone to thermal fluctuations and are subsequently partially disaligned. To determine the effective radius ($a_{\rm{alg}}$) at which the dust grains start to align, we follow the procedure described in \cite{2007ApJ...663.1055B} with
\begin{equation}
\left(\frac{\omega_{\rm{rad}}}{\omega_{\rm{gas}}}\right)^2 = \frac{ a \rho_{\rm{d}}}{\delta m_{\rm{H}}}\left[\frac{\int Q_{\Gamma}(\epsilon)\lambda\gamma_{\rm{\lambda}} \overline{u}_{\rm{\lambda}} d\lambda}{n_{\rm{g}}k_{B} T_{\rm{g}}} \frac{1}{1+\frac{t_{\rm{gas}}}{t_{\rm{rad}}}} \right]^2.
\label{eq:omega}
\end{equation}
Here, $Q_{\Gamma}(\epsilon)$ is the alignment efficiency of the RAT, which depends on the angle $\epsilon$ between the predominate direction in the radiation field and the magnetic field direction. The alignment efficiency $Q_{\Gamma}(\epsilon)$ is also a function of grain size, wavelength, and grain composition, and can be pre-calculated. The shape-dependent parameter $\delta,$ as well as the characteristic timescales of gas bombardment $t_{\rm{gas}}$ and radiation $t_{\rm{rad}}$ acting on the dust grains are introduced in detail in \cite{1996ApJ...470..551D, 1997ApJ...480..633D}. Checking for supra-thermal conditions also requires information about the local anisotropy $\gamma_{\rm{\lambda}}$ and the mean energy density $\overline{u}_{\rm{\lambda}}$ of the radiation field.\\
These quantities can be determined with POLARIS by a MC mode, where we store the energy density direction $\vec{u}_{\rm{\lambda}}$ in each cell. In this mode we consider all radiation sources including thermal dust re-emission. Following \cite{1999A&A...344..282L} for the mean energy density per path length and wavelength we derive
\begin{equation}
\vec{u}_{\lambda,i} d \lambda = \frac{\epsilon_{\rm{0}} }{c \Delta t V_{\rm{cell}}} \frac{\vec{k}\times l_{\rm{i} }}{\left|\vec{k}\right|}d \lambda
\label{eq:LucyEnDens}
.\end{equation}
This allows us to calculate the mean energy density
\begin{equation}
\overline{u}_{\rm{\lambda}} = \sum_{i=1}{ \left| \vec{u}_{\rm{\lambda,i}}\right| }
\label{eq:EnDens}
\end{equation}
and the anisotropy parameter determined by
\begin{equation}
\gamma_{\rm{\lambda}} = \frac{1}{\overline{u}_{\rm{\lambda}} } \left|\sum_{i=1} \vec{u}_{\rm{\lambda,i}}\right| \in \left[0; 1\right] .
\end{equation}
With RATs, gas bombardment can even increase grain alignment by lifting grains from the low-J to the high-J attractor point. At the current stage of its development no analytical function for the distribution of the cone angle $\beta$ is available. While perfect alignment can be assumed at both high-J and low-J attractor points, internal aligned is just given for suprathermally rotating grains. At low-J the angular momentum can be assumed to be thermal \citep[][]{2009ApJ...697.1316H} and the distribution of internal alignment (Eq. \ref{eq.distr}) becomes a function of grain geometry alone because of $h$. Now, for the Rayleigh reduction factor, only the moment $\left\langle G_{\rm{low-J}}\left(\cos^2(\zeta)\right) \right\rangle$ remains of relevance. When we consider $f_{\rm{high-J}}$ to be the fraction of dust grain aligned at the high-J attractor point the Rayleigh reduction factor is\begin{equation}
R = \begin{cases} f_{\rm{high-J}}+(1-f_{\rm{high-J}})\left\langle G_{\rm{low-J}}\left(\cos^2(\zeta)\right) \right\rangle &\mbox{if } a\geq a_{\rm{alg}} \\0 & \mbox{if } a < a_{\rm{alg}} \end{cases}
\label{eq:Rrat}
.\end{equation}
So far, $f_{\rm{high-J}}$ cannot be exactly determined \citep[][]{2009ApJ...697.1316H} and remains a free parameter.\\
Once, a dust grain starts to tumble in the presence of a magnetic field a Larmor precession acts on the grains because of the Barnett effect. For the RATs to work, the magnetic field strength has to be sufficiently high to resist disaligment by gas-dust interactions. This requires the characteristic timescale for Larmor precession ($t_{\rm{L}}$) to be lower than the gas dumping time ($t_{\rm{gas}}$): $t_{\rm{L}}<t_{\rm{gas}}$ \citep[][]{2009ApJ...704.1204H, 2009ApJ...697.1316H}, which gives us a limit of
\begin{equation}
\left| \vec{B} \right| > 4.1\times 10^{-9} a \frac{n_g \sqrt{T_{\rm{g}}} T_{\rm{d}}}{s^2} [T]
\label{eq:larm}
\end{equation}
for the magnetic field strength. This limitation is similar in nature to that of Eq. \ref{eq:delta}. Since the coupling with the magnetic field is also the Barnett effect, the same limitation for the field strength is applied to RT simulations with GOLD alignment.
\subsection{Scattering on partially aligned dust grains}
\label{sect:scatter}
For each scattering event the coordinate system of the dust grain is determined by the magnetic field direction. The coordinate system of the Stokes vector must be transformed into the dust reference frame. For scattering from one direction $(\vartheta, \varphi)$ to a new direction $(\vartheta', \varphi')$, the Stokes vector $S$ is modified via a 4x4 scattering matrix $\hat{M}$ by $S' = \hat{M}S$. Non-spherical, partially aligned dust grains can require a full 16-element matrix and an asymmetry factor $g$, with both dependent on direction of inclination, scattering direction, wavelength, and grain size, which makes scattering a multi-dimensional problem that is fully supported by POLARIS.\\
The scattering matrix $\hat{M}$ and asymmetry factor $g$ can be pre-calculated with DDSCAT. For imperfectly aligned wobbling dust grains the incident $(\vartheta, \varphi)$ and scattering angles $(\vartheta', \varphi')$ become functions of alignment angles $\beta$ and $\zeta$, respectively. To obtain an exact scattering matrix for an average-sized dust grain one has to integrate the alignment distribution functions $f(\beta)$ and $ f(\zeta)$, respectively, as well as the grain size distribution $n(a)$ simultaneously. Here, we face the same problem as for the calculation of cross-sections in Sec. \ref{sect:dust}. In the current stage of development, the exact distribution function for RAT alignment is still missing. Solving the exact integrals for GOLD or IDG alignment would push the timescales of 3D MC-RT simulations beyond accessible computational equipment. To handle the scattering on non-spherical imperfectly aligned dust grains, we apply the following approximation:
\begin{equation}
\begin{split}
\hat{M}_{ij}(\lambda, R,a, \vartheta, \varphi, \vartheta', \varphi') \approx \\
R(a)\times \hat{M_{ij}}(a,\lambda, \vartheta,\varphi, \vartheta', \varphi') + \left(1-R(a)\right) \left\langle \hat{M_{ij}}(a,\lambda, \vartheta', \varphi')\right\rangle .
\end{split}
\label{eq.aprox}
\end{equation}
The same approximation is used for the orientation and size-dependent asymmetry parameter $g$ of the HG-Phase function (see Eq. \ref{eq:HG}):
\begin{equation}
\begin{split}
g(\lambda, R,a, \vartheta, \varphi) \approx \\
R(a)\times g(a,\lambda, \vartheta,\varphi) + \left(1-R(a)\right) \left\langle g(a,\lambda, \vartheta, \varphi)\right\rangle
\end{split}
\label{eq.aproxG}
,\end{equation}
where $\left\langle \hat{M_{ij}}(a,\lambda, \vartheta', \varphi')\right\rangle$ and $\left\langle g(a,\lambda, \vartheta, \varphi)\right\rangle$ are the entries of the scattering matrix and the asymmetry factor, respectively, for randomly aligned dust grains. With increasing efficiency in dust grain alignment the Rayleigh reduction factor reaches unity and the dust grains and the contribution of randomly aligned dust grains diminishes.
\begin{figure*}
\centering
\includegraphics[width=1.0\textwidth]{heat.pdf}
\caption{\small Dust temperature distribution in the mid-planes of a 3D MC-RT/MHD collapse simulation. Rows show the results of the same model, but of inclinations differing by $90^{\circ}$. In the left column, the dust was heated by 3D MC-RT simulation alone. The middle column shows the dust temperature distribution as a result of MHD shock heating. The dust temperature combined by offset dust heating, as described in Sect. \ref{setupMHDHeat}, is shown in the right column. The length of $1400\ \rm{AU}$ is for scale. We applied an upper cut-off of 400K (blue regions) to the mid-plane images for better illustration.}
\label{fig:heat}
\end{figure*}
\subsection{Radiative transfer with MHD data}
\label{setupMHDHeat}
The complexity of star formation can not be accurately mapped by simple analytical models. However, with the advantages of high-resolution MHD simulations, e.g. FLASH \cite{2010ascl.soft10082F}, it is possible to provide complex 3D physical data as an input for MC-RT simulations. Not only can this data deliver density, magnetic field, and velocity distributions, but it can also provide the exact parameter of stars appearing in such simulations. This stars have to be considered as additional sources of radiation. For RT simulations with MHD data, we have to take the following into account: For the implemented alignment mechanisms to work, the characteristic timescales have to be taken into account. By post-processing MHD data, the shortest time steps in the MHD simulations must exceed the largest timescale of alignment mechanisms to ensure a steady-state of grain alignment \citep[see][]{1996ApJ...470..551D, 1997ApJ...480..633D, 2003ApJ...589..289W}. \\
Finally, a dust temperature can also be provided by the actual MHD simulations. With temperatures resulting from MHD simulations, we have to deal with two effects of dust heating: RT-heating because of radiation sources and MHD-heating because of the compression and gas-dust interaction \citep[][]{2006MNRAS.373.1091B,2007ApJ...656..959K}. Both temperatures are equally physically well-motivated, however, they are rarely fully implemented in MHD codes. To account for all effects of dust heating, POLARIS optionally performs an extended dust heating algorithm. Originally, the algorithm of \cite{1999A&A...344..282L} assumes a cell's energy content $\dot{E}$ to be empty at the beginning of the radiative dust heating process. Since we have already pre-calculated the emissivity of an ensemble of dust grains with a certain temperature, we can now perform the reverse calculation. Using Eq. \ref{eq:LucyJ}, we determine the offset amount of energy $\Delta \dot{E}$ that corresponds to the dust temperature delivered by the MHD data. We refer to this method as offset dust heating in the following.
\subsection{Code optimization}
\label{optim}
An 3D MC-RT simulation is challenging when it comes to run time and the capabilities of available computational equipment. The POLARIS code is parallelized to run on shared memory machines using the OpenMP library with the propagation of several photon packages simultaneously through the grid. The run-time scales well with the number of used processors. However, complex environments provided by MHD simulations, the physically well-motivated dust models, and alignment mechanisms requires a huge parameter space to solve the RT problem, including polarization in 3D. For this reason POLARIS is equipped with several optimization algorithms to perform RT calculations in a reasonable time. To propagate photon packages in regions with extreme optical depth more efficiently, we implemented the flowing algorithms: The modified random walk (MRW), a technique that uses a diffusion approximation instead of an MC approach \citep[][]{2009A&A...497..155M,2010A&A...520A..70R} for optically thick regions and the forced first scattering \citep[e.g.][]{1970A&A.....9...53M,1999ApJ...525..799W} that increases the signal-to-noise ratio in optically thin dust environments \citep[see][]{1984AIPC..115..665M}. For the calculation of the RAT alignment, the MRW cannot be applied. While the mean energy density is correctly approached, the MRW leads to a loss of information about the anisotropy of the radiation field. However, since the effective grain radii are pre-calculated and therefore discrete values, a far lower amount of photon packages is required to converge against a distinct value of $a_{\rm{alg}}$ in the RAT mode.\\
Furthermore, for synthetic intensity and polarization maps, the S/N can be enhanced with the peel-off technique \citep[][]{1984ApJ...278..186Y} by sending a fraction of the radiation toward the observer at each scattering event. With longer wavelengths, scattering becomes increasingly insignificant and a ray-tracing algorithm can be applied. Here, we simply add up all contributions because of extinction and re-emission along the line of sight. Compared to a radiative transfer with scattering, the ray-tracing approach is more effective and allows us to achieve an excellent S/N \citep[][]{2010A&A...520A..70R,2012ascl.soft02015D}.\\
Radiation sources emit photons in the full wavelength range of its characteristic SED. However, certain wavelengths can be neglected since they do not contribute significantly to dust heating and alignment compared to the total emitted energy of the source. A wavelength range selection algorithm reduces the number of wavelengths considered and subsequently the computational effort.
\section{Applications}
\label{sect:application}
In this section, we show selected applications of the POLARIS code, demonstrating its features and predictive capability. In particular, we show RT simulations in astrophysical environments, representing different stages of star formation on multiple scales. We run 3D MC-RT simulations to calculate temperature distributions and synthetic polarization maps. A benchmark of POLARIS' scattering calculations is provided in appendix \ref{apAA}.\\
The often used dust grain model of \cite{1977ApJ...217..425M} suggests an upper cut-off in grain radius at $a_{\rm{max}} = 250\ \rm{nm. }$ More recent models \citep[e.g.][]{2001ApJ...548..296W}, however, indicate an upper limit with $\rm{\mu m}$-radii. Since RAT alignment is heavily dependent on the maximum value of grain size, we pre-calculated a database for oblate dust grains with a fixed aspect, $118$ effective radii, and $100$ wavelength logarithmically distributed between $a \in [5\ \rm{nm}: 2\ \rm{\mu m}]$ and $\lambda \in [90\ \rm{nm}:2\ \rm{mm}]$, respectively. Here, we used the program DDSCAT \citep[][]{2013arXiv1305.6497D} and approximated the oblate shape of the dust grains with $171 500$ distinct dipoles and an error tolerance of $8.5 \times 10^{-3}$. As materials, we considered astro-silicate and graphite, used the refraction indices of \cite{2000AAS...197.4207W}, and applied the $1/3-2/3$ approximation to take care of the anisotropic graphite structure \citep[][]{1993ApJ...414..632D}. We weighted the efficiencies for each wavelength according to the power-law distribution to derive the average cross-sections over all effective radii (see Eq. \ref{eq:avg}).\\
Once the photon package escapes the grid, the degree of linear polarization $P_{\rm{l}}$ is determined
by the Stokes vector with
\begin{equation}
P_{\rm{l}}=\sqrt{\frac{Q^2+U^2}{I^2}}
\end{equation}
and its projected position angle $\chi$
\begin{equation}
\chi=\frac{1}{2} \arctan\left( \frac{U}{Q} \right)
.\end{equation}
The aspect ratio of minor axis to major axis remains $s = 0.5$ in all cases. Higher aspect ratios would
result in higher peak values and more contrast in the maps of linear and circular polarization. The dust heating is assumed to be independent of effective radius and aspect ratio, which is in good agreement with the findings of \cite{1980A&A....88..194H} and \cite{1999A&A...349L..25V} within the considered range of parameters.
\subsection{Offset dust heating}
\label{setupHeat}
In this section, we post-processed an MHD collapse simulation with a total mass of $100\ \rm{M_{\odot}}$ \citep[see][for a detailed description]{2011MNRAS.417.1054S}. We took a snapshot after a simulation time of $5000\ \rm{yr}$ and consider just the inner most region of the MHD simulation with an accretion disc of about $1400\ \rm{AU}$. The dust temperature, as well as position, stellar radii, and surface temperatures of the stars were provided by the simulation. For dust material, we use a mixture of $62.5 \%$ astro-silicate and $37.5 \%$ graphite with an an upper cut-off for the size distribution at $a_{\rm{max}}=250\ \rm{nm}$. The highest temperature in these simulations is below the sublimation temperature of the silicate and graphite grains, respectively. First, we ignore the MHD dust temperature and performed a 3D MC-RT simulation, with the stars as radiation sources alone. Then, we adjust the temperature with the method described in Sect \ref{setupMHDHeat}.\\
In Fig. \ref{fig:heat}, we show the resulting dust temperature distributions in the center x-y planes and x-z planes. For the RT simulations with no offset energy (Fig. \ref{fig:heat} left panels), the dust temperature shows a diffuse distribution with the highest temperature near the stars and regions with lowest densities. The dust temperature distribution matches the density structure near the disk region, while the outflow regions remain hidden. Regions with high densities are shielded from stellar radiation and cannot be heated sufficiently. High density regions, however, gain temperature by the dynamical processes of shock heating in MHD simulations (Fig. \ref{fig:heat} middle panels). The MHD dust temperature resembles the dust density in all regions while underestimating the temperature towards the center region of the accretion disk. By considering both RT and MHD leads to a shift in the profitability distribution of the wavelength of re-emission (see Eq. \ref{eq:BW}) towards shorter wavelengths. In this regime of wavelengths, absorption of radiation is more effective because of higher cross-sections of absorption $C_{\rm{abs,\lambda}}$. This results in a net temperature that is higher than single temperatures alone, which would not have been the case by simply adding up the dust temperatures resulting from RT and MHD simulations.
\subsection{Disk models}
\label{setupDisk}
\begin{figure}[]
\begin{minipage}[c]{1.0\linewidth}
\begin{center}
\includegraphics[width=1.0\textwidth]{layer.pdf}
\end{center}
\end{minipage}
\caption{\small Distribution of grain sizes $a_{\rm{alg}}$, where dust particle start to align to the magnetic field direction $\vec{B}$ according to RAT theory. The plane shown is perpendicular to the mid-plane of the disks. The disk model $D03$ with $10^{-3}\ \rm{M_{\odot}}$ is in the left panel and the model $D05$ with $10^{-5}\ \rm{M_{\odot}}$ is in the right panel. Lower values of $a_{\rm{alg}}$ result in higher degrees of linear polarization.}
\label{DiskLayer}
\end{figure}
In this section, we trace the magnetic field morphology in circumstellar disks of different mass with POLARIS. The magnetic field plays an important role in the formation of stars, as well as in the formation and evolution of the circumstellar disk and, subsequently, in the formation of planets. Angular momentum of the gas component of the disk can, effectively, be transferred outwards by magnetic braking and interstellar outflows allow the fall of gas towards the center. Thus, to understand circumstellar disk and planet formation, we need to investigate the properties of the underlying magnetic field that is involved in the formation process.\\
By considering the dust grains to be partially aligned with the direction of the magnetic field, the field morphology may be investigated by polarization observations in the sub-mm regime of wavelength without the contribution of scattering in the polarization signal.
\subsubsection{Model setup}
The density distribution of our disk models are parametrized as presented in \cite{1973A&A....24..337S}. The model assumes the density distribution to follows:
\begin{equation}
n_{\rm{g}}(r,z)=n_{\rm{0}} \left(\frac{r_{\rm{0}}}{r}\right)^\alpha \exp\left( -\frac{1}{2}\frac{z}{h(r)} \right)^2
,\end{equation}
where
\begin{equation}
h(z) = h_{\rm{0}}\left(\frac{r}{r_{\rm{0}}} \right)^\beta .
\end{equation}
Here, $r$ and $z$ are cylindrical coordinates, $h_{\rm{0}}$ is the scale height at $r_{\rm{0}}$ and the quantities $\alpha$ and $\beta$ are parameters that characterize the radial density profile and the disk flaring. We adjusted $n_{\rm{0}}$ for the entire disk mass to range between $10^{-3}\ [\rm{M_{\odot}}]$ and $10^{-6}\ [\rm{M_{\odot}}]$ for the different models.
\begin{table}[]
\begin{tabular}[]{ l | c }
Parameter & Value \\ \hline \hline
$\alpha$ & $2.6$\\
$\beta$ & $1.25$\\
$h_{\rm{0}}\ [\rm{AU}]$ & $10$\\
$r_{\rm{0}}\ [\rm{AU}]$ & $100$\\
$R_{\rm{in}}\ [\rm{AU}]$ & $25$\\
$R_{\rm{out}}\ [\rm{AU}]$ & $280$\\
$M_{\rm{disk}}\ [\rm{M_{\odot}}]$ & $10^{-6}$, $10^{-5}$, $10^{-4}$, $10^{-3}$\\
$R_{\rm{*}}\ [\rm{R_{\odot}}]$ & $6$ \\
$T_{\rm{*}}\ [\rm{K}]$ & $4000$ \\
$T_{\rm{d0}}\ [\rm{K}]$ & $10$ \\
\end{tabular}
\caption{Table of physical quantities for the applied disk models. We consider different disk masses and refer to the models with a total disk mass of $10^{-3}\ \rm{M_{\odot}}$ as $D03$, with $10^{-4}\ \rm{M_{\odot}}$ as $D04$, with $10^{-5}\ \rm{M_{\odot}}$ as $D05$, and with $10^{-6} \rm{M_{\odot}}$ as $D06$, respectively.}
\label{tab:1}
\end{table}
\begin{figure}[]
\begin{minipage}[c]{0.49\linewidth}
\begin{center}
\includegraphics[width=0.9\textwidth]{050024Pl.pdf}\\
\includegraphics[width=0.9\textwidth]{050025Pl.pdf}\\
\includegraphics[width=0.9\textwidth]{050026Pl.pdf}\\
\includegraphics[width=0.9\textwidth]{050027Pl.pdf}\\
\includegraphics[width=0.9\textwidth]{050028Pl.pdf}
\end{center}
\end{minipage}
\begin{minipage}[c]{0.49\linewidth}
\begin{center}
\includegraphics[width=0.9\textwidth]{030024Pl.pdf}\\
\includegraphics[width=0.9\textwidth]{030025Pl.pdf}\\
\includegraphics[width=0.9\textwidth]{030026Pl.pdf}\\
\includegraphics[width=0.9\textwidth]{030027Pl.pdf}\\
\includegraphics[width=0.9\textwidth]{030028Pl.pdf}
\end{center}
\end{minipage}
\caption{\small{Maps with pattern of linear polarization overlaid with normalized orientation vectors at an exemplary wavelength of $\lambda= 515\ \rm{\mu m}$. We applied an offset of $90^{\circ}$ to the orientation vectors to match the projected toroidal magnetic field morphology. The model D03 with $10^{-3}\ \rm{M_{\odot}}$ is in the right column and model D05 with $10^{-5}\ \rm{M_{\odot}}$ is shown in the left column for inclination angles from $ i=30^{\circ}$ (top row) to $i=90^{\circ}$ (bottom row) in steps of $15^{\circ}$.}}
\label{DiscRot}
\end{figure}
Theory and observations show a strong correlation with $n\propto B^{-\kappa}$ between magnetic field strength and density over several orders of magnitude \citep[][]{2011MNRAS.417.1054S,1966MNRAS.133..265M,1999ApJ...520..706C}. Here, we assume $\kappa = 0.6$ to keep the magnetic field strength between $10^{-8}\ \rm{T}$ in the center and $10^{-17}\ \rm{T}$ at the edges of the model space. The magnetic field is assumed to be dragged with the rotation of the disk because of ionized gas. Therefore, the field morphology can be approximated by a toroidal field \citep[see][]{2014A&A...566A..65R}.\\
Here, the considered dust consists of only astro-silicate as material with a cut-off in grain size at $a_{\rm{min}}=5\ \rm{nm}$ and $a_{\rm{max}}=2\ \rm{\mu m}$, respectively with a power-law size distribution of $dn(a)\propto a^{-3.5} da$.\\
For the dust heating, we consider an offset dust temperature of $10\ \rm{K}$ within the boundaries of the disk and post-process the temperature with POLARIS and a central star as a radiation source for all disk models. The offset dust temperature is of minor influence to the following calculations but ensures a non-zero temperature in each cell in the denser regions of the model space, which enables us to reduce the number of photon packages. The model of \cite{1973A&A....24..337S} assumes the dust to be in thermal equilibrium with the gas ($T_{\rm{g}}=T_{\rm{d}}$). In this case, Eq. \ref{eq:IDGzetha} reaches unity and the IDG Rayleigh reduction factor (see Eq. \ref{eq:IDGfinal}) is undefined. Subsequently, the IDG mechanism cannot be applied in the disk models. Hence, in this section, we only consider the effects of grain alignment according to RAT theory and assume the internal alignment to be perfect. As a second step, we apply the RAT mode of POLARIS to calculate the anisotropy and energy density of the radiation field in the disk, as described in Sect. \ref{sect:RAT}, to determine the minimal dust grain radius $a_{\rm{alg}}$ at which the dust grains start to align.\\
\subsubsection{Results}
Fig. \ref{DiskLayer} shows the resulting distribution of the $\rm{D03}$ and $\rm{D05}$ disk models. The distribution of aligned radii is layered with smaller aligned dust grains, which are starting to align at the disk's surface with larger grains towards the center plane. The model with the higher disk mass $\rm{D03}$ on the left hand side of Fig. \ref{DiskLayer} shows a distinct distribution of imperfectly aligned dust grains. In contrast to model $\rm{D03}$ for model $\rm{D05}$ on the right hand side of Fig. \ref{DiskLayer}, smaller dust grains are better aligned at the surface of the disk. However, with decreasing mass, the alignment of dust grains increases quickly towards the center plane and the outer regions. This is because of different dust and stellar contributions to the radiation field as well as a local dust temperature.\\
The optical depth decreases with lower disk mass. Therefore, the surface is more efficiently heated in the disks with higher mass. Whereas the grain alignment is suppressed near the sublimation radius for all models as a result of high temperatures in this region, the stellar radiation becomes more irrelevant in the outer regions of the disk. Consequently, the $\rm{D03}$ model is less influenced by the central star. The radiation in the innermost regions in each disk originates from thermal photons emitted in the hot surface layers and not the star itself. Subsequently, the higher mass model $\rm{D03}$ has aligned dust grains in much deeper layers as the lower mass model $D6$. The resulting layered distribution in dust grain alignment is consistent with the results of \cite{2014MNRAS.438..680H}.\\
In Fig. \ref{DiscRot}, we show the effects of thermal dust re-emission, which is dependent on the total disk mass. We compare the resulting polarization maps for the disk models $\rm{D03}$ and $\rm{D05}$ as a function of inclination angle at an exemplary wavelength of $\lambda = 515\ \rm{\mu m}$. The pattern and orientation of linear polarization in Fig \ref{DiscRot} are in good agreement with the predictions by \cite{2005ApJ...631..361C} and \cite{2007ApJ...669.1085C}. Since all disk models are optically thin at that wavelength, the synthetic polarization maps appear to be symmetric.\\
Because lower values of the characteristic size of aligned grains $a_{\rm{alg}}$ are associated with a higher degree of linear polarization (see Eq. \ref{eq:Rrat}), the $\rm{D03}$ disk model shows a more distinct pattern of linear polarization. A lower degree of linear polarization in low mass disks is consistent with the results shown in Fig. \ref{DiskLayer}. This would also hold even if we considered imperfect internal alignment since the internal distribution function for RATs is independent of the local physical conditions of the disk models and just a function of grain geometry (see Sect. \ref{eq:Rrat}). The pattern in the normalized polarization vectors are identical for all models, which reveals the projected toroidal magnetic field geometry at all inclination angles since the influence of scattering can be neglected at $\lambda = 515\ \rm{\mu m}$. However, just for the $\rm{D03}$ model, the degree of linear polarization ($P_{l}>0.5\%$) should be detectable in the entire disk, even for low inclination angles. \\
The patterns of linear polarization have sharp cut-offs with no polarization at the borders of the model. This is a result of the applied power-law correlation between density and magnetic field strength ($n\propto B^{-\kappa}$). Hence, the magnetic field no longer satisfies the minimal required field strength (see Eq. \ref{eq:larm}) in the thinner disk regions.
\subsubsection{Discussion}
Aligned dust grains as an explanation of polarized radiation in the FIR and submm from disks has already been indicated by the observations of \cite{1999ApJ...525..832T}. However, the extent to which the observation of polarized light reveals the underlying magnetic field morphology is still a matter for debate. Numerical calculations (\cite{2007ApJ...669.1085C,2014MNRAS.438..680H}) predict that polarized radiation should emerge from the circumstantial disk region because of RAT alignment.
In contrast to predictions, observations of circumstellar systems \citep[][]{2009ApJ...704.1204H} show no detectable degree of linear polarization at all. The overestimation of RAT alignment, because of perfect internal alignment in earlier studies \citep[][]{2007ApJ...669.1085C}, cannot account for this finding alone. An internal alignment with a conservative chosen parameter $f_{\rm{high-J}} = 0.25$ would still result in a detectable degree of linear polarization. However, $f_{\rm{high-J}}$ can still not be analytically determined and might also vary depending on the predominant local conditions of each disk. Another explanation might be the shape and composition of the dust grains. We cannot expect a similar amount of non-spherical dust grains that can align to be equally present in all circumstantial disks since this may vary significantly from disk to disk.\\
The distribution of dust grain sizes is also not expected to be equal in the entire disk. Dust grain growth and dust settling are processes that redistribute dust grains of different sizes in the disk \citep[see e.g.][]{2005ApJ...625..414T}. As a result, larger dust grains are more likely near the disk plane. Larger dust is also more likely to be aligned by RATs than smaller dust grains on the disk surface. Dust settling in disks might also help to explain the low amount of linear polarization and need to be considered in future studies with a more sophisticated dust model.
\subsection{Cloud model}
\label{setupCloud}
\begin{table*}[ht]
\begin{center}
\begin{tabular}[l]{ l | c | c | c | c | c | c | p{6.5cm} }
Parameter & $n_{g1}\ [\rm{m^{-3}}]$ & $R_{c1}\ [\rm{ly}]$ & $n_{g2}\ [\rm{m^{-3}}]$ & $R_{c2}\ [\rm{ly}]$ & $R_{\rm{*}}\ [\rm{R_{\odot}}]$ & $T_{\rm{*}}\ [\rm{K}]$ & position of the star $[ly]$ \\ \hline
Value & $10^{13}$ & $0.2$ & $10^{12}$ & $0.1$ & $8$ & $6000$ & C01(-0.53,-0.0,-0.0), $\quad$ C02(0.0,0.0,0.13) \\
\end{tabular}
\end{center}
\caption{Table of physical parameter for the applied cloud models.}
\label{tab:CM}
\end{table*}
\begin{figure*}[]
\begin{minipage}[c]{0.329\linewidth}
\begin{center}
\includegraphics[width=0.99\textwidth]{model01.pdf}
\end{center}
\end{minipage}
\begin{minipage}[c]{0.329\linewidth}
\begin{center}
\includegraphics[width=0.99\textwidth]{model02.pdf}
\end{center}
\end{minipage}
\begin{minipage}[c]{0.329\linewidth}
\begin{center}
\includegraphics[width=0.99\textwidth]{model03.pdf}
\end{center}
\end{minipage}
\caption{{Schematic illustration of the cloud models $\rm{C01}$ (left panel) and $\rm{C02}$ (right panel).} Both models differ only by the position of a single star. The isocontour surface at $log(n_{\rm{d}})=3.27\ \rm{m^{-3}}$ is in dark yellow. The direction of the common gas stream $\vec{v}$ (left panel) toward the center is shown in green lines and the analytical hourglass field morphology is shown in grey. Red lines and blue bars indicate the different angles between the radiation field and the magnetic field direction. The letters $A - D$ indicate areas with expected characteristic features for RAT and GOLD alignment, respectively.}
\label{fig:globModel}
\end{figure*}
\begin{figure*}[]
\begin{center}
\begin{minipage}[c]{0.32\linewidth}
\begin{center}
\includegraphics[width=1.0\textwidth]{idg01.pdf}\\
\includegraphics[width=1.0\textwidth]{idg02.pdf}
\end{center}
\end{minipage}
\begin{minipage}[c]{0.32\linewidth}
\begin{center}
\includegraphics[width=1.0\textwidth]{rat01.pdf}\\
\includegraphics[width=1.0\textwidth]{rat02.pdf}
\end{center}
\end{minipage}
\begin{minipage}[c]{0.32\linewidth}
\begin{center}
\includegraphics[width=1.0\textwidth]{gold01.pdf}\\
\includegraphics[width=1.0\textwidth]{gold02.pdf}
\end{center}
\end{minipage}
\end{center}
\caption{\small Ratio of polarization cross-sections $\log_{10}\left( \left| C_{\rm{x}} / C_{\rm{p}} \right| \right)_{\lambda = 723\ \rm{\mu m}}$ of imperfectly aligned dust grains $C_{\rm{x}}$, to perfectly aligned dust grain $C_{\rm{p}}$ in the mid-plane of the model space for the $C01$ model (top row) and $C02$ model (bottom row). The $x$ stands for IDG alignment (left columns), RAT alignment (middle columns), and GOLD alignment (right columns). In the middle columns, dotted white lines indicate the regions where the alignment efficiency $Q_{\Gamma}(\epsilon)$ is at its minimum. The dotted red lines in the right columns show the transition where GOLD alignment changes the sign of linear polarization. The areas $A - D$ correspond to that of Fig. \ref{fig:globModel}.}
\label{fig:Cross}
\end{figure*}
In this section, we examine the pattern of linear polarization emerging from different grain alignment theories separately. The main focus here is on the ambiguities associated with different grain alignment theories used to infer the underlying magnetic field morphology on a predefined cloud model.\\
Our cloud model consists of two spheres following a Bonnor-Ebert density profile \citep[][]{1955ZA.....37..217E,1956MNRAS.116..351B} with a distance of $0.375\ \rm{ly}$ from each other. The characteristic radii of the density distribution are $0.1\ \rm{ly}$ and $0.2\ \rm{ly}$, with a number density for the gas of $10^{12}\ \rm{m^{-3}}$ and $10^{13}\ \rm{m^{-3}}$, respectively. Density and temperature are chosen to be consistent with theoretical models and observations \citep[][]{1997A&A...326..329L,2011A&A...535A..49S}.
\subsubsection{Model setup}
We modeled an hourglass-shaped magnetic field geometry by using an analytical function \citep[see][]{2014A&A...566A..65R}, with its center in the denser sphere as expected by observations \cite[e.g.][]{1999ApJ...525L.109G,2011AA...535A..44F}. The field strength was assumed to be constant with $\left|\vec{B}\right|=1.5\times 10^{-8} \rm{T}$ \citep[][]{2008A&A...487..247F,2010ApJ...724L.113B}. To compare calculations performed by POLARIS with the expected predictions for the GOLD alignment mechanism, we also assume a supersonic velocity stream $\vec{v}$ with an in-fall direction to the common center of both Bonnor-Ebert spheres. In this section, we also consider the effects of the internal alignment with a correlation factor of $f_{\rm{c}} = 0.6$ and assume $f_{\rm{high-J}}=0.5$. The initial dust temperature is adjusted with a single star as radiation source (see Tab. \ref{tab:CM}). We consider two different configurations concerning the position of the star. In model $C01,$ the star is embedded in the center of the denser Bonnor-Ebert sphere, and in model $C02,$ the star is $0.53\ \rm{ly}$ away from the common center of both spheres. A schematic illustration of the cloud models provided in Fig. \ref{fig:globModel}.\\
For the dust model, we apply a range of effective radii of $ a \in[5\ \rm{nm}: 250\ \rm{nm}]$ with a size distribution of $n_{\rm{d}} \propto a^{-3.5}$ and consider a mixture of $62.5\%$ silicate and $37.5\%$ graphite \citep[][]{1977ApJ...217..425M,2001ApJ...551..807D}. However, just the silicate grains align with the direction of the magnetic field while the graphite remains randomized \citep[][]{1977ApJ...217..425M}. An initial sphere temperature of $T_{\rm{d}} = 10\ \rm{K}$ was used for both cloud models, $C01 $ and $C02,$ and we corrected the temperature according to the method described in Sect. \ref{setupMHDHeat}. Here, we assume dust and gas not to be in thermal equilibrium and assume a correaltion of $T_{\rm{g}} = 10 \times T_{\rm{d}}$. In a final step, we applied the RAT mode of POLARIS to calculate the distribution of the size cutoff $a_{\rm{alg}}$ of dust grains to align. With this configuration the models allow the calculation of the characteristic linear polarization pattern for IDG, RAT, and GOLD alignment mechanism.
\subsubsection{Results}
Fig. \ref{fig:Cross} shows the ratio of cross-sections of partially aligned dust grains to the cross-sections of perfectly aligned dust grain in the mid-plane of both models separately for all alignment mechanisms at an exemplary wavelength of $\lambda = 723\ \rm{\mu m}$. In both cloud models, the surrounding regions of the stars are also the regions of highest dust temperature. The IDG mechanism reacts sensitively to both values, the density, and the temperature, because of the threshold $\delta_{\rm{0}}$ (see Eq. \ref{eq:delta}). Therefore the efficiency of grain alignment is lowest towards the center of the clouds and near the star (see Fig. \ref{fig:Cross} left panels).\\
The expected alignment pattern according to RAT theory is contrary to that of the IDG alignment. The emission of heated dust and stellar radiation contribute to the local energy density $u_\lambda$ and the anisotropy parameter can reach a maximum value up to $\gamma_\lambda = 0.9$ in close proximity to the star. The characteristic dust grain radius $a_{\rm{alg}}$ decreases and dust grains with radii above $a_{\rm{alg}}$ become aligned. Since, the process of determining RAT alignment quantities requires two separate MC simulations (dust heating and calculation of the radiation field), the grain alignment of RATs has an inherent higher amount of noise. This becomes apparent in Fig. \ref{fig:Cross} (middle panel) in the inner cloud regions. Besides the amount of energy density and anisotropy, the grain alignment also highly depends on the RAT alignment efficiency $Q_{\rm{\Gamma}}(\epsilon)$. This parameter, in turn, depends on the chosen dust grain geometry and has, in our dust model of oblate dust grains, its minimum at angles of $\epsilon = 0^{\circ}$ and $\epsilon = 90^{\circ}$ between radiation and magnetic field direction. This leads to areas of reduced grain alignment, indicated by white dotted lines in Fig.\ref{fig:Cross} (middle panel). In Fig.\ref{fig:Cross} (middle top panel), the low degree of grain alignment in the areas $A$ and $C$ is a direct result of the angle dependency of RAT theory because of $Q_{\rm{\Gamma}}(\epsilon)$. However, the low grain alignment on the left half of the panel is a result of the shielding of this region by the dense clouds from stellar radiation and thus the overall energy density $\overline{u}$ remains low. The expected low grain alignment in the area $D$ cannot be found. This is because the overall energy density $\overline{u}$ outweighs the angle dependency in this very thin region. In Fig.\ref{fig:Cross} (middle bottom panel), the low degree of grain alignment in the areas $A - D$ follows the angle between predominant direction of the radiation field and the magnetic field direction more clearly. This result is in excellent agreement with the expectations of the model setup shown in Fig. \ref{fig:globModel} and RAT theory.\\
\begin{figure}[]
\begin{minipage}[c]{0.49\linewidth}
\begin{center}
\includegraphics[width=1.0\textwidth]{idgPl01.pdf}\\
\includegraphics[width=1.0\textwidth]{ratPl01.pdf}\\
\includegraphics[width=1.0\textwidth]{goldPl01.pdf}
\end{center}
\end{minipage}
\begin{minipage}[c]{0.49\linewidth}
\begin{center}
\includegraphics[width=1.0\textwidth]{idgPl02.pdf}\\
\includegraphics[width=1.0\textwidth]{ratPl02.pdf}\\
\includegraphics[width=1.0\textwidth]{goldPl02.pdf}
\end{center}
\end{minipage}
\caption{\small Maps with pattern of linear polarization overlaid with normalized orientation vectors at an exemplary wavelength of $\lambda= 723\ \rm{\mu m}$. We applied an offset of $90^{\circ}$ to the orientation vectors to match the projected hourglass magnetic field morphology. The cloud model (C01) is in the left column and the model (C02) is in the right column for dust grains aligned with the IDG mechanism (top row), RAT mechanism (middle row), and GOLD mechanism (bottom row).}
\label{CloudPolMap}
\end{figure}
\begin{figure*}[]
\begin{minipage}[c]{1.0\linewidth}
\begin{center}
\includegraphics[width=0.85\textwidth]{PI.pdf}
\end{center}
\end{minipage}
\caption{\small Plots of the degree of linear polarization of the $C01$ model (top row) and $C02$ model (bottom row) as a function of normalized intensity (P-I relation). The results with IDG alignment (right column), RAT alignment (middle column), and GOLD alignment (left column). Both models $C01$ and $C02$ (blue dots) were rotated by $90^{\circ}$ around the y-axis of Fig. \ref{fig:globModel} (red dots). }
\label{CloudPI}
\end{figure*}
Since we assume a constant supersonic velocity field, GOLD alignment alone barely depends on temperature and density. However, a dependency exists because of internal alignment (see Eq. \ref{eq:goldJ}) and the Mach-limit (see Eq. \ref{eq:mach}). As with RAT alignment, GOLD alignment is also limited by the local magnetic field strength (see Eq. \ref{eq:larm}). Since the internal alignment mechanism is sensitive to high temperatures, this manifests itself as a sphere of completely randomized dust grains in the surrounding regions $B$ (Fig.\ref{fig:Cross} top right panel) and $A$ (Fig.\ref{fig:Cross} bottom right panel) around the star. By comparing Fig.\ref{fig:Cross} (left panels), Fig. \ref{CloudPolMap} (left panels), and Eq. \ref{eq:gold}, we can see that the dominant parameter maintains the angle $\alpha$ between gas stream $\vec{v}$ and magnetic field direction $\vec{B}$. The areas of minimal grain alignment appear along the transition where GOLD alignment changes the sign of the Rayleigh reduction factor, which is shown by red lines in Fig.\ref{fig:Cross} (middle panel).\\
The resulting maps of linear polarization for the cloud models $\rm{C01}$ and $\rm{C02}$ are presented in Fig. \ref{CloudPolMap}. The normalized orientation vectors of linear polarization have an offset angle of $90^{\circ}$ to be parallel with the projected magnetic field direction. For the IDG mechanism (Fig. \ref{CloudPolMap} top row), the center of depolarization moves with the position of the star because of the change in the dust temperature distribution, leading to a nearly rotationally symmetrical pattern in both cases.\\
The polarization pattern for RAT alignment in the middle column of Fig. \ref{fig:Cross} follows the regions of highest radiation. Therefore, a high polarization coincides with the position of the star. The degree of linear polarization is reduced in the $\rm{C01}$ model along the regions of minimal grain alignment efficiency $Q_{\rm{\Gamma}}(\epsilon)$. The same effect can be detected in the polarization map of the $\rm{C02}$ model. However, here this effect is less evident leading to a butterfly-like pattern of linear polarization in the surrounding area of the star. Both, IDG and RAT alignment mechanisms resemble the underlying hourglass field morphology. The GOLD alignment in turn, can change the alignment angle along the line of sight and this, subsequently, changes the polarization direction.\\
A correlation between intensity $I$ and polarization $P_{\rm{l}}$ was recognized in \cite{2001ApJ...561..871H} following the power law $P \propto \left(I / I_{\rm{max}} \right)^{-\alpha}$ where $\alpha$ is a fit parameter.
This finding is consistent in the literature of observations \cite[see][]{2002ApJ...574..822M,2003ApJ...598..392L,2005ApJ...631..361C}. Since the $P- I$ relation is hyperbolic in nature, we expect to find a flat tail when $I / I_{\rm{max}}$ reaches unity, making it an ideal test for different grain alignment theories. Therefore, we calculated the increasing depolarization towards lower intensities for our cloud models $\rm{C01}$ and $\rm{C02,}$ making use of the polarization maps of Fig. \ref{CloudPolMap}. Here, each data point presents a different line of sight. We also calculated the $P - I$ relations for our cloud models rotated by $90^{\circ}$. The $P - I$ relation of the IDG mechanism shown in Fig. \ref{CloudPI} (left column) is consistent with observations. Since the anisotropy in radiation and grain alignment is directly correlated and stellar radiation is the dominant source of radiation in both cloud models, the $P - I$ relation in the RAT case is less definitive. In contrast to the IDG alignment, the $P - I$ relation of RAT alignment starts with an increase in polarization up to a point of $I/I_{\rm{max}} \approx 0.1$ and then remains almost constant at its maximum value. However, the RAT alignment mechanism matches the expected $P - I$ relation curvature in agreement with observations for larger fractions of $I/I_{\rm{max}}$.\\
The GOLD alignment shows an exceptional behavior. In contrast to observational findings, the degree of linear polarization remains constant in the non-rotated case and increases even slightly for the rotated case. Data points show a broader scatter, compared with other alignment mechanisms.\\
The characteristic appearance of each grain alignment theory in the maps of linear polarization is often discussed to account for observational data \citep[see][for review]{2015ASSL..407...59A}. So far, RAT alignment is considered among the most promising theories of grain alignment. The observational fact that grains are better aligned in close proximity to a bright star is a strong indication of RAT alignment \citep[][]{2011PASJ...63L..43M}. A direct correlation between grain alignment and direction, as well as the strength of the radiation field, was also confirmed in \cite{2010ApJ...720.1045A} and \cite{2011A&A...534A..19A} next to the star HD 97300 in the Chamaeleon I star-forming region. These observational findings are in accordance with the results of the synthetic linear polarization maps that were calculated with RAT alignment, as presented in this section.
\subsubsection{Discussion}
The velocity-dependent flip in the orientation of polarization vectors is characteristic of GOLD alignment and may help to determine areas with supersonic gas streams by observations. From the observational point of view, a flip in polarization angles was reported along the direction of molecular outflows \citep[e.g.][]{1998ApJ...502L..75R,2006ApJ...650..246C}. However, the rather unusual pattern of linear polarization, as presented in this section, can so far not be confirmed by observations. This may be a result of the limited set of parameters of the cloud models that were considered. The two main limiting factors are velocity and magnetic field strength (see Eq. \ref{eq:gold} and Eq. \ref{eq:larm}), which were assumed to be constant for simplicity. Recent progress on the field of mechanical grain alignment also indicates that dust-grain alignment may also be efficient in subsonic environments \citep[][]{2007ApJ...669L..77L}.\\
The IDG alignment has still its place in accounting for the observed alignment of small dust grains \cite{1992ApJ...385L..53C,2014ApJ...790....6H}. The maximum values in linear polarization are in good agreement with observations \citep{2005AA...430..979G,2011ApJ...732...97D} for all the applied alignment mechanisms. Taking the maximal degree of linear polarization as a measurement of the prevailing alignment mechanism, the polarization is clearly dominated by IDG in the outer parts followed by RAT near the star. Higher linear polarization degrees can easily be achieved for RATs by increasing the free parameter $f_{\rm{high-J}}$ and the upper cut-off $a_{\rm{max}}$ in the grain size distribution of the applied dust models. However, exact values of these parameter are currently speculative. In contrast to the IDG and RAT alignment, models considering GOLD alignment hold the lowest degree of linear polarization, which indicates that the observable net polarization of the cloud would lack any flip in polarization angles. This is also consistent with the behavior of the calculated $P-I$ relations. Both RAT and GOLD alignment show an unexpected distribution of linear polarization. This uncertainty and the deviations in calculated $P-I$ relations may be resolved with more sophisticated models from dedicated MHD simulations in forthcoming parameter studies.
\section{Summary and outlook}
\label{sect:sum}
We have presented POLARIS (\textbf{POLA}rized \textbf{R}ad\textbf{I}ation \textbf{S}imulator), a newly developed 3D MC-RT radiative transfer code that was designed to perform self-consistent dust heating calculations and polarization simulations. The main novelty of the POLARIS code is the calculation of linear and circular polarization maps considering dichroic extinction, thermal re-emission, birefringence, and scattering on dust grains that are partially aligned with the direction of the magnetic field. In contrast to previous MC codes, POLARIS calculates the impact of imperfect grain alignment on light polarization by considering the major classes of state-of-the-art dust grain alignment theories (alignment owing to paramagnetic relaxation (IDG), alignment because of radiation-dust interaction (RAT), and mechanical alignment (GOLD) as a result of gas streams).\\
To calculate the dust temperature distribution, we use the combined techniques of continuous absorption and immediate re-emission. The code is openMP parallelized and RT simulations are performed in an adaptive octree cartesian grid, which allows for high performance and the consideration of MHD simulations as input data. Further advanced optimization techniques (ray-tracing, wavelength range selection, forced first scattering, peel-off technique, and modified random walk) enable us to perform complex 3D MC-RT simulations, including polarization on dust grains in a reasonable time. The code considers various sources of radiation to cover a broad variety of astrophysical problems.\\
The predictive capability of the POLARIS code was tested to run in specific complex environments resulting from MHD simulations, as well as in case studies with analytical density, temperature, velocity, and magnetic field distributions. Here, we applied a method for combining the dust temperatures. We tested the dust heating algorithm of POLARIS in a complex MHD collapse simulation. The resulting distribution of combined temperatures matches simultaneously the compressed dust distribution and the positions of the considered sources of radiation.\\
The capability to create polarization maps according to the RAT alignment mechanism was tested in circumstellar disk models that were consistent with theoretical predictions. Here, we modeled the disk with an analytical function and applied a toroidal magnetic field geometry. The disk was heated by a central star. Stellar radiation and thermal dust re-emission lead to an anisotropy in the radiation field. This resulted in characteristic layers of dust grain sizes in the disk with larger sizes towards the mid-plane. This is in agreement with RAT alignment theory and verified the predictive capability of of the POLARIS code.\\
Linear polarization greatly depends on the dominant alignment mechanism. Each mechanism has an effect, in a unique way, on the local physical parameter leading to a characteristic pattern of linear polarization. We tested this scenario in an analytical model of two Bonnor- Ebert spheres with their centers close to each other, a constant velocity field, and an hourglass-shaped magnetic field morphology. We heated the dust with a star as the radiation source to calculate the anisotropy in the radiation field for RAT alignment. Finally, we derived synthetic maps of linear polarization, which considered the IDG, GOLD, and RAT grain alignment mechanism. The resulting pattern of linear polarization resembled the physical parameter in accordance with applied grain alignment theories and showed the expected PI-relations known from observations.\\
In forthcoming papers, we will present the code extensions for state-of-the-art radiative line transfer, including Zeeman effect. Furthermore, we will apply POLARIS to interpret observational data by calculating the characteristic polarization pattern in MHD outflow simulations. Here, we follow questions about the potential of multi-wavelength polarization measurements to identify distinct sub-structures of a larger magnetic field morphology.\\
The code is continuously in development to keep up with scientific progress, especially in grain alignment theory. POLARIS is available only on request. However, sample files, scripts and documentation are publicly available from \url{http://www1.astrophysik.uni-kiel.de/~polaris/}.
|
\section{Introduction}
The algebraic Bethe ansatz is an efficient method for finding the spectra of quantum Hamiltonians \cite{FadST79,FadT79,FadLH96}.
It is also known that this method is well suited for calculating correlation functions of quantum models
\cite{BogIK93L,KitMT00,KitKMST12,GohKS04}. The latest problem, within the framework of the algebraic Bethe ansatz reduces to the
calculating scalar products of Bethe vectors.
In their turn, the scalar products mentioned above appear to be a particular case of multiple commutation relations (MCR) of the
monodromy matrix entries. The subject of this paper are MCR in the $\mathfrak{gl}(2|1)$-based models.
In the models solvable by the algebraic Bethe ansatz, the determining is an $RRT$-relation
\begin{equation}\label{L-op-com}
R(u,v)\cdot (T(u)\otimes \mathbb{I})\cdot (\mathbb{I}\otimes T(v))=
(\mathbb{I}\otimes T(v))\cdot (T(u)\otimes \mathbb{I})\cdot R(u,v).
\end{equation}
Here $R(u,v)$ is an $R$-matrix acting in the tensor product $V\otimes V$ of an auxiliary vector spaces $V$. The monodromy matrix $T(u)$ acts
in $V\otimes \mathcal{H}$, where $\mathcal{H}$ is a Hilbert space of a quantum model. Equation \eqref{L-op-com} holds in the tensor
product $V\otimes V\otimes\mathcal{H}$.
It sets the commutation relations between the matrix elements $T_{ij}(u)$ of the monodromy matrix $T(u)$. At the same time, to calculate
scalar products and form factors one should know the MCR of the type
\be{Intr-examp}
[T_{ij}(u_1)\dots T_{ij}(u_n),T_{kl}(v_1)\dots T_{kl}(v_m)].
\end{equation}
Formally, knowing $[T_{ij}(u),T_{kl}(v)]$ one can calculate the commutator in \eqref{Intr-examp}. However, a straightforward use
of the $RTT$-relation in this case, leads to extremely complex expressions that hardly can be used for further analysis.
The MCR in the $\mathfrak{gl}(2)$-invariant models and their $q$-deformations are well known \cite{IzeK84,KitMT00,KitMST02}. Some generalizations
to the models with $\mathfrak{gl}(3)$-invariant $R$-matrix were considered in \cite{BelPRS12c}. In the present paper we deal with the models
based on the superalgebra $\mathfrak{gl}(2|1)$. Among the models described by this algebra, the most famous is the supersymmetric t-J model, which plays an important role in the condensed matter physics \cite{ZhaR88,Sch87}. The algebraic structure of this model as well as the application of the
algebraic Bethe ansatz were considered in \cite{BarB90,Sar91,BarBO91,Sar90,EssK92,FoeK93}.
As explained above, the MCR are needed for calculating the scalar products of Bethe vectors. However, in models with high
rank symmetry, to construct the Bethe vectors is already a non-trivial task. This problem was considered by different approaches
\cite{KhoP05,KhoPT,FraKPR09,BelPR10,TarV13,BelPRS12c}. A generalization of a trace formula for the Bethe vectors \cite{TarV13} for
the case of superalgebras $\mathfrak{gl}(m|n)$ was obtained in \cite{BelR08}. Recently, explicit expressions for the Bethe vectors
in the models with $\mathfrak{gl}(2|1)$ and $\mathfrak{gl}(1|2)$ symmetries were found in \cite{PakRS16a}. In this paper we use a method
of MCR and prove the equivalence of different representations for the $\mathfrak{gl}(2|1)$ Bethe vectors. We also obtain new
formulas for them.
The article is organized as follows. In section~\ref{S-BNN} we introduce the model under consideration and describe
necessary notation. Section~\ref{S-MCR-O} is devoted to the most simple MCR. In section~\ref{S-MCR-T} we formulate more complex
MCR, which allow us to prove different representations for the Bethe vectors in section~\ref{S-DRBV}. In sections~\ref{S-MCRa1},~\ref{S-MCRab} we prove the
MCR formulated in section~\ref{S-MCR-T}. In appendices~\ref{A-ID} and~\ref{A-SM} we gather some
identities necessary for the proof.
\section{Basic notions and notation\label{S-BNN}}
For $\mathfrak{gl}(2|1)$-based models an auxiliary vector space $V$ is a ${\mathbb Z}_2$-graded space ${\mathbb C}^{2|1}$ with a basis $\{{\rm e}_1,
{\rm e}_2,{\rm e}_3\}$. We call the vectors $\{{\rm e}_1,{\rm e}_2\}$ even, while ${\rm e}_{3}$ is odd. Respectively, we introduce a party function on the set of indices as $[1]=[2]=0$ and $\prt{3}=1$.
The $R$-matrix in \eqref{L-op-com} has the form
\begin{equation}\label{DYglmn}
R(u,v)\ =\ \mathbb{I}\otimes\mathbb{I}+g(u,v)\mathbb{P} \qquad g(u,v)=\frac{c}{u-v},
\end{equation}
where $c$ is a constant and $\mathbb{P}$ is a graded permutation matrix \cite{KulS80}. The tensor product in \eqref{L-op-com}
also is graded leading to the set of commutation relations between the monodromy matrix entries $T_{ij}$:
\begin{equation}\label{TM-1}
[T_{ij}(u),T_{kl}(v)\}
=(-1)^{\prt{i}(\prt{k}+\prt{l})+\prt{k}\prt{l}}g(u,v)\Big(T_{kj}(v)T_{il}(u)-T_{kj}(u)T_{il}(v)\Big),
\end{equation}
where we have introduced a graded commutator as
\be{Def-SupC}
[T_{ij}(u),T_{kl}(v)\}= T_{ij}(u)T_{kl}(v) -(-1)^{(\prt{i}+\prt{j})(\prt{k}+\prt{l})} T_{kl}(v) T_{ij}(u).
\end{equation}
Relabeling in \eqref{TM-1} the subscripts $i\leftrightarrow k$, $j\leftrightarrow l$, and replacing $u\leftrightarrow v$ we obtain one
more commutation relation
\begin{equation}\label{TM-2}
[T_{ij}(u),T_{kl}(v)\}=(-1)^{\prt{l}(\prt{i}+\prt{j})+\prt{i}\prt{j}}g(u,v)\Big(T_{il}(u)T_{kj}(v)-T_{il}(v)T_{kj}(u)\Big).
\end{equation}
Relations \eqref{TM-1}, \eqref{TM-2} are the starting point of our study.
Let us describe now the notation used below. We mostly use the same notation as we did in our papers concerning the
models with $\mathfrak{gl}(3)$ symmetry (see e.g. \cite{BelPRS12c}).
Apart from the function $g(x,y)$ we also introduce two functions
\be{univ-not}
f(x,y)=1+g(x,y)=\frac{x-y+c}{x-y}, \qquad h(x,y)=\frac{f(x,y)}{g(x,y)}=\frac{x-y+c}{c}.
\end{equation}
The functions introduced above have the following obvious properties:
\be{propert}
g(x,y)=-g(y,x),\qquad h(x,y)=\frac1{g(x,y-c)},\qquad f(x-c,y)=\frac1{f(y,x)}.
\end{equation}
Extending the $\mathbb{Z}_2$-grading to the operators $T_{ij}$ by
\be{gradT}
[T_{ij}(u)]=[i]+[j],\quad \mod 2,
\end{equation}
we distinguish between even operators (i.e. $[T_{ij}(u)]=0$) and odd operators (i.e. $[T_{ij}(u)]=1$).
It follows from the commutation relations \eqref{TM-1}, \eqref{TM-2} that any even operator $T_{ij}(u)$
commutes with itself for
arbitrary values of the argument $u$. On the other hand, one has for the odd operators $T_{ij}(u)$
\be{odd-comm}
\begin{aligned}
& h(v_1,v_2)T_{j3}(v_1)T_{j3}(v_2)=h(v_2,v_1)T_{j3}(v_1)T_{j3}(v_2),\\
&h(v_2,v_1)T_{3j}(v_1)T_{3j}(v_2)=h(v_1,v_2)T_{3j}(v_2)T_{3j}(v_1),
\end{aligned}
\qquad\qquad j=1,2.
\end{equation}
Therefore it is convenient to introduce symmetric products of the odd operators.
\begin{Def}
Let $\bar v=\{v_1,\dots,v_n\}$. Define
\be{bTc-def}
\mathbb{T}_{j3}(\bar v)= \frac{T_{j3}(v_1)\dots T_{j3}(v_n)}{\prod_{n\ge \ell>m\ge 1} h(v_\ell,v_m)}, \qquad j=1,2,
\end{equation}
and
\be{bTr-def}
\mathbb{T}_{3k}(\bar v)= \frac{T_{3k}(v_1)\dots T_{3k}(v_n)}{\prod_{n\ge \ell>m\ge 1} h(v_m,v_\ell)}, \qquad k=1,2.
\end{equation}
\end{Def}
Obviously, the operator products introduced above are symmetric over the parameters $\bar v=\{v_1,\dots,v_n\}$.
Let us formulate a convention on the notation.
We denote sets of variables by bar: $\bar w$, $\bar u$, $\bar v$ etc. For the sake of generality, we will sometimes use such the notation, even in cases where
the set consists of only one element. Individual elements
of the sets are denoted by Latin subscripts: $w_j$, $u_k$ etc. The subsets complementary to the individual elements
are denoted by $\bar u_k$: $\bar u_k=\bar u\setminus u_k$. As a rule, the number of elements in the
sets is not shown explicitly in the equations, however we give these cardinalities in
special comments to the formulas. The notation $\bar u\pm c$ means that all the elements of the set $\bar u$ are
shifted by $\pm c$: $\bar u\pm c=\{u_1\pm c,\dots,u_n\pm c\}$.
Subsets of variables (including subsets consisting of one element) are labeled by Greek subscripts: $\bar u_{ \alpha}$, $\bar v_{\rm ii}$, $\bar w_{ \beta}$ etc.
The union of the sets is denoted by braces: $\bar w=\{\bar u,\bar v\}$.
A subset complementary to the set $\bar u_{ \alpha}$ is denoted by $\bar u_{\bar \alpha}$: $\bar u_{\bar \alpha}=\bar u\setminus\bar u_{ \alpha}$.
The notation $\bar u\Rightarrow\{\bar u_{ \alpha},\bar u_{\bar \alpha}\}$ means that the
set $\bar u$ is divided into two subsets $\bar u_{ \alpha}$ and $\bar u_{\bar \alpha}$. Similarly, the notation
$\bar v\Rightarrow\{\bar v_{ \alpha},\bar v_{ \beta},\bar v_{ \gamma}\}$ means that the
set $\bar v$ is divided into three disjoint subsets. Hereby, $\{\bar v_{ \alpha},\bar v_{ \beta}\}=\bar v_{\bar \gamma}$,
$\{\bar v_{ \alpha},\bar v_{ \gamma}\}=\bar v_{\bar \beta}$, and $\{\bar v_{ \gamma},\bar v_{ \beta}\}=\bar v_{\bar \alpha}$.
We assume that the elements in every subset of variables are ordered in such a way that the sequence of
their subscripts is strictly increasing. We call this ordering natural order.
In order to avoid too cumbersome formulas we use shorthand notation for products of commuting operators.
Similarly to \eqref{bTc-def}, \eqref{bTr-def} we introduce
\be{SH-prod0}
T_{ij}(\bar u)=\prod_{u_k\in\bar u} T_{ij}(u_k),\qquad \text{for}\quad \prt{i}+\prt{j}=0,\quad \mod 2.
\end{equation}
One should follow the same prescription for the products of the functions $g$, $f$, $h$. Namely, if such the function depends
on a set of variables, this means that one should take the product over the corresponding set.
For example,
\be{SH-prod}
h(v, \bar u)= \prod_{u_j\in\bar u} h(v, u_j);\quad
f(\bar u,\bar v)=\prod_{u_j\in\bar u}\prod_{v_k\in\bar v} f(u_j,v_k);\quad
g(\bar v_{ \alpha},\bar v_{\bar \alpha})=\prod_{v_j\in\bar v_{ \alpha}}\prod_{v_k\in\bar v_{\bar \alpha}} g(v_j,v_k).
\end{equation}
To conclude this section we introduce a partition function of the six-vertex model with domain wall boundary conditions (DWPF) $K(\bar u|\bar v)$ \cite{Kor82,Ize87}.
This function plays an important role in
the MCR. It depends on two sets of variables $\bar u$ and $\bar v$, such that
$\#\bar u=\#\bar v$. By definition $K(\emptyset|\emptyset)=1$. Otherwise, if $\#\bar u=\#\bar v=n$, $n>0$, then the function $K(\bar u|\bar v)$ has the following determinant representation:
\begin{equation}\label{K-def}
K(\bar u|\bar v)
=\Delta'(\bar u)\Delta(\bar v)h(\bar u,\bar v)
\det_n \left(\frac{g(u_j,v_k)}{h(u_j,v_k)}\right),
\end{equation}
where $\Delta'(\bar u)$ and $\Delta(\bar v)$ are
\be{def-Del}
\Delta'(\bar u)=
\prod_{1\le j<k\le n} g(u_j,u_k),\qquad {\Delta}(\bar v)= \prod_{n\ge j>k\ge 1}g(v_j,v_k).
\end{equation}
It is easy to see that $K(\bar u|\bar v)$ is symmetric over $\bar u$ and symmetric over $\bar v$, however $K(\bar u|\bar v)\ne
K(\bar v|\bar u)$. Some useful properties of the DWPF are gathered in appendix~\ref{A-ID}.
\section{MCR of operators belonging to the same row or column \label{S-MCR-O}}
In this section we consider relatively simple MCR. They occur if the
operators $T_{ij}$ and $T_{kl}$ belong to the same row or column of the monodromy matrix, i.e.
either $i=k$ or $j=l$.
\begin{prop}\label{P-ijik}
Let $\#\bar u=n$, $\#\bar v=m$, and $\{\bar u,\bar v\}=\bar w$. Then for $i,j,k<3$
\be{Mult-comTijTik}
T_{ij}(\bar u)T_{ik}(\bar v)=(-1)^{n}\sum K(\bar w_{ \alpha}|\bar u+c)f(\bar w_{\bar \alpha},\bar w_{ \alpha})
T_{ik}(\bar w_{\bar \alpha})T_{ij}(\bar w_{ \alpha}).
\end{equation}
For $i,j<3$
\be{Mult-comTi3Tj3}
\mathbb{T}_{i3}(\bar u)\mathbb{T}_{j3}(\bar v)=(-1)^n h(\bar v,\bar u)\sum K(\bar u|\bar w_{ \alpha}+c)g(\bar w_{ \alpha},\bar w_{\bar \alpha})\mathbb{T}_{j3}(\bar w_{\bar \alpha})\mathbb{T}_{i3}(\bar w_{ \alpha}),
\end{equation}
\be{TijTi3-0}
T_{ij}(\bar u)\mathbb{T}_{i3}(\bar v)=\sum h(\bar w_{\bar \alpha},\bar u)g(\bar w_{\bar \alpha},\bar w_{ \alpha})\mathbb{T}_{i3}(\bar w_{\bar \alpha})T_{ij}(\bar w_{ \alpha}),
\end{equation}
\be{Mult-comTi3Tij}
\mathbb{T}_{i3}(\bar u)T_{ij}(\bar v)=\sum h(\bar v,\bar w_{ \alpha})g(\bar w_{\bar \alpha},\bar w_{ \alpha})T_{ij}(\bar w_{\bar \alpha})\mathbb{T}_{i3}(\bar w_{ \alpha}).
\end{equation}
For $i<3$
\be{T33Ti3-0}
T_{33}(\bar u)\mathbb{T}_{3i}(\bar v)=\sum h(\bar u,\bar w_{\bar \alpha}) g(\bar w_{ \alpha},\bar w_{\bar \alpha})\mathbb{T}_{3i}(\bar w_{\bar \alpha})T_{33}(\bar w_{ \alpha}).
\end{equation}
\be{Mult-comTi3T33}
\mathbb{T}_{3i}(\bar u)T_{33}(\bar v)=\sum h(\bar w_{ \alpha},\bar v)g(\bar w_{ \alpha},\bar w_{\bar \alpha})T_{33}(\bar w_{\bar \alpha})\mathbb{T}_{3i}(\bar w_{ \alpha}),
\end{equation}
All the sums are taken over partitions $\bar w\Rightarrow\{\bar w_{ \alpha},\bar w_{\bar \alpha}\}$ with
$\#\bar w_{ \alpha}=n$ and $\#\bar w_{\bar \alpha}=m$.
\end{prop}
Proposition~\ref{P-ijik} gives us the MCR for the operators belonging to the same row of the
monodromy matrix. In order to obtain the commutation relations for the operators from the same column it is enough to
apply antimorphism of the algebra \eqref{L-op-com}
\cite{PakRS16a}
\be{psi}
\psi\bigl(T_{ij}(u)\bigr)=(-1)^{[i][j]+[i]}T_{ji}(u),\qquad
\psi\bigl(T_{ij}(u)T_{kl}(v)\bigr)=(-1)^{[T_{ij}][T_{kl}]}\psi\bigl(T_{kl}(v)\bigr)\psi\bigl(T_{ji}(u)\bigr).
\end{equation}
Clearly, that after the action of $\psi$ onto equations \eqref{Mult-comTijTik}--\eqref{Mult-comTi3T33} we obtain
MCR for the operators belonging to the same column of the monodromy matrix.
The proofs of \eqref{Mult-comTijTik}--\eqref{T33Ti3-0} are similar one to each other. They use induction over the
numbers of the operators and summation lemmas~\ref{main-ident-C}, \ref{main-ident}. The proof of \eqref{Mult-comTijTik}
(based on lemma~\ref{main-ident}) was given in \cite{BelPRS12c}. In order to show how lemma~\ref{main-ident-C} works we
consider the proof of \eqref{TijTi3-0}.
It follows from the commutation relations \eqref{TM-2} that
\be{TijTi3one}
T_{ij}(u)T_{i3}(v)=f(v,u)T_{i3}(v)T_{ij}(u)+g(u,v)T_{i3}(u)T_{ij}(v).
\end{equation}
It is easy to see that this equation coincides with \eqref{TijTi3-0} for $n=m=1$. Then one can use double induction over
$n$ and $m$. However, for $n=1$ or $m=1$ it is better to apply the standard scheme of the algebraic Bethe ansatz. Let for
definiteness $n=1$ and $m>1$. Then moving the operator $T_{ij}(u)$ through the product $\mathbb{T}_{i3}(\bar v)$ we obtain the
following result
\be{TijTi3many}
T_{ij}(u)\mathbb{T}_{i3}(\bar v)=\Lambda \mathbb{T}_{i3}(\bar v)T_{ij}(u)+\sum_{k=1}^m\Lambda_k \mathbb{T}_{i3}(\{\bar v_k,u\})T_{ij}(v_k).
\end{equation}
Here $\Lambda$ and $\Lambda_k$ are some rational coefficients to be determined, and we recall that $\bar v_k=\bar v\setminus v_k$. Obviously, in order to
obtain the term proportional to $\Lambda$, the operator $T_{ij}(u)$ should go to the right preserving its
original argument. This immediately gives
\be{La}
\Lambda=f(\bar v,u).
\end{equation}
Let us find now $\Lambda_1$. The product $\mathbb{T}_{i3}(\{\bar v_1,u\})T_{ij}(v_1)$ arises if and only if
the operators $T_{ij}(u)$ and $T_{i3}(v_1)$ exchange their arguments:
\be{Lak-1}
T_{ij}(u)\mathbb{T}_{i3}(\bar v)=T_{ij}(u)T_{i3}(v_1)\frac{\mathbb{T}_{i3}(\bar v_1)}{h(\bar v_1,v_1)}=
g(u,v_1)T_{i3}(u)T_{ij}(v_1)\frac{\mathbb{T}_{i3}(\bar v_1)}{h(\bar v_1,v_1)}+UWT,
\end{equation}
where $UWT$ means {\it unwanted terms}. Generically, we call a term unwanted if it does not contribute to the desirable coefficient.
In the case under consideration, the term proportional to $T_{i3}(v_1)T_{ij}(u)$ is unwanted, because moving the operator $T_{ij}(u)$
through the product $\mathbb{T}_{i3}(\bar v_1)$ we cannot obtain $T_{ij}(v_1)$ in the extreme right position.
Now, when the operator $T_{ij}(v_1)$ moves to the right it should preserve its argument $v_1$. This gives us
\be{Lak-2}
T_{ij}(u)\mathbb{T}_{i3}(\bar v)=
g(u,v_1)g(\bar v_1,v_1)T_{i3}(u)\mathbb{T}_{i3}(\bar v_1)T_{ij}(v_1)+UWT,
\end{equation}
where we used $g(\bar v_1,v_1)=f(\bar v_1,v_1)/h(\bar v_1,v_1)$.
It remains to transform the product $T_{i3}(u)\mathbb{T}_{i3}(\bar v_1)$ into $\mathbb{T}_{i3}(\{\bar v_1,u\})$, and we finally obtain
\be{Lak-3}
\Lambda_1=g(u,v_1)g(\bar v_1,v_1)h(\bar v_1,u).
\end{equation}
Due to the symmetry of $\mathbb{T}_{i3}(\bar v)$ over $\bar v$ we conclude that
\be{Lak-4}
\Lambda_k=g(u,v_k)g(\bar v_k,v_k)h(\bar v_k,u).
\end{equation}
Thus,
\be{TijTi3many-1}
T_{ij}(u)\mathbb{T}_{i3}(\bar v)=f(\bar v,u) \mathbb{T}_{i3}(\bar v)T_{ij}(u)+\sum_{k=1}^mg(u,v_k)g(\bar v_k,v_k)h(\bar v_k,u) \mathbb{T}_{i3}(\{\bar v_k,u\})T_{ij}(v_k).
\end{equation}
Comparing equations \eqref{TijTi3many-1} and \eqref{T33Ti3-0} at $n=1$ we see that the first term in \eqref{TijTi3many-1} corresponds
to the partition $\bar w_{ \alpha}=u$ and $\bar w_{\bar \alpha}=\bar v$. The other terms in \eqref{TijTi3many-1} appear if we set $\bar w_{ \alpha}=v_k$ and
$\bar w_{\bar \alpha}=\{\bar v_k,u\}$. Thus, \eqref{T33Ti3-0} is proved for $n=1$ and $m$ arbitrary.
Generalization for $n>1$ can be done via induction over $n$. Suppose that \eqref{T33Ti3-0} holds for some $n-1$. Then acting
successively with $T_{ij}(\bar u_n)$ and $T_{ij}(u_n)$ on the product $\mathbb{T}_{i3}(\bar v)$ we obtain
\be{TijTi3-1}
T_{ij}(u_n)T_{ij}(\bar u_n)\mathbb{T}_{i3}(\bar v)=\sum h(\bar w_{\bar \alpha},\bar u_n)g(\bar w_{\bar \alpha},\bar w_{ \alpha})
h(\bar w_{\rm ii},u_n)g(\bar w_{\rm ii},\bar w_{\rm i})\mathbb{T}_{i3}(\bar w_{\rm ii})T_{ij}(\bar w_{\rm i})T_{ij}(\bar w_{ \alpha}).
\end{equation}
Here we first have partitions of the set
$\{\bar u_n,\bar v\}$ into subsets $\bar w_{ \alpha}$ and $\bar w_{\bar \alpha}$ with $\#\bar w_{ \alpha}=n-1$ and $\#\bar w_{\bar \alpha}=m$. Then we combine $u_n$ and $\bar w_{\bar \alpha}$ and divide this
set into subsets $\bar w_{\rm i}$ and $\bar w_{\rm ii}$ with $\#\bar w_{\rm i}=1$ and $\#\bar w_{\rm ii}=m$. As a result we have divided the set
$\bar w=\{\bar u,\bar v\}$ into three subsets $\{\bar w_{ \alpha},\bar w_{\rm i},\bar w_{\rm ii}\}$ in such a way that $u_n\notin\bar w_{ \alpha}$. Substituting
$\bar w_{\bar \alpha}=\{\bar w_{\rm i},\bar w_{\rm ii}\}\setminus u_n$ into \eqref{TijTi3-1} we arrive at
\begin{multline}\label{TijTi3-2}
T_{ij}(\bar u)\mathbb{T}_{i3}(\bar v)=\sum \frac{h(\bar w_{\rm i},\bar u_n)h(\bar w_{\rm ii},\bar u_n)g(\bar w_{\rm i},\bar w_{ \alpha})g(\bar w_{\rm ii},\bar w_{ \alpha})}
{h(u_n,\bar u_n)g(u_n,\bar w_{ \alpha}) }\\
\times h(\bar w_{\rm ii},u_n)g(\bar w_{\rm ii},\bar w_{\rm i})\mathbb{T}_{i3}(\bar w_{\rm ii})T_{ij}(\bar w_{\rm i})T_{ij}(\bar w_{ \alpha}).
\end{multline}
Here the sum is taken over partitions of the set
$\{\bar u,\bar v\}$ into subsets $\{\bar w_{ \alpha},\bar w_{\rm i},\bar w_{\rm ii}\}$. Observe that we have got rid of the restriction $u_n\notin\bar w_{ \alpha}$.
Indeed, due to the factor $g(u_n,\bar w_{ \alpha})$ in the denominator all the terms of the sum vanish as soon as $u_n\in\bar w_{ \alpha}$.
Let us set $\{\bar w_{ \alpha},\bar w_{\rm i}\}=\bar w_{\mu}$. Then $\bar w_{\rm ii}=\bar w_{\bar\mu}$, and \eqref{TijTi3-2} turns into
\begin{equation}\label{TijTi3-3}
T_{ij}(\bar u)\mathbb{T}_{i3}(\bar v)=\sum \frac{h(\bar w_{\bar\mu},\bar u)h(\bar w_{\mu},\bar u_n)g(\bar w_{\bar\mu},\bar w_{\mu})}
{h(u_n,\bar u_n)g(u_n,\bar w_{\mu}) } \mathbb{T}_{i3}(\bar w_{\bar\mu})T_{ij}(\bar w_{\mu})
\left(g(\bar w_{\rm i},\bar w_{ \alpha})\frac{g(u_n,\bar w_{\rm i})}{h(\bar w_{ \alpha},\bar u_n)}\right).
\end{equation}
One can say that here we first divide the set $\{\bar u,\bar v\}$ into subsets $\{\bar w_{\mu},\bar w_{\bar\mu}\}$, and then
divide the subset $\bar w_{\mu}$ into $\bar w_{ \alpha}$ and $\bar w_{\rm i} $. The sum over partitions
$\bar w_{\mu}\Rightarrow\{\bar w_{ \alpha},\bar w_{\rm i}\} $ (see the terms in the parenthesis in \eqref{TijTi3-3}) can be computed explicitly via
lemma~\ref{main-ident-C}
\be{sum-w0}
\sum g(\bar w_{\rm i},\bar w_{ \alpha})\frac{g(u_n,\bar w_{\rm i})}{h(\bar w_{ \alpha},\bar u_n)}=
-\sum g(\bar w_{\rm i},\bar w_{ \alpha})g(u_n,\bar w_{\rm i})g(\bar w_{ \alpha},\bar u_n-c)=
\frac{h(u_n,\bar u_n)g(u_n,\bar w_{\mu}) } {h(\bar w_{\mu},\bar u_n)}.
\end{equation}
Substituting this into \eqref{TijTi3-3} we finally arrive at
\be{TijTi3-00}
T_{ij}(\bar u)\mathbb{T}_{i3}(\bar v)=\sum h(\bar w_{\bar\mu},\bar u)g(\bar w_{\bar\mu},\bar w_{\mu})\mathbb{T}_{i3}(\bar w_{\bar\mu})T_{ij}(\bar w_{\mu}),
\end{equation}
what coincides with \eqref{TijTi3-0} at $\#\bar u=n$ up to the labels of the subsets.
Other equations of proposition~\ref{P-ijik} can be proved in the similar manner.
\section{MCR of operators belonging to different rows and columns \label{S-MCR-T}}
MCR of the operators belonging to the different rows and columns of the monodromy matrix are
much more sophisticated than the ones considered above. We will consider only one specific example of these MCR.
This example is important, because it allows one to obtain different representations for the
Bethe vectors.
\begin{Def}
For $\#\bar u=a$ and $\#\bar v=b$ define two operators
\be{TPhi-expl1}
X_{a,b}(\bar u,\bar v)=\sum g(\bar v_{ \alpha},\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})h(\bar u_{ \alpha},\bar u_{ \alpha})\;
\mathbb{T}_{13}(\bar u_{ \alpha})\,T_{12}(\bar u_{\bar \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,T_{22}(\bar v_{ \alpha}),
\end{equation}
and
\be{TPhi-expl2}
Y_{a,b}(\bar u,\bar v)=\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})\;
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{equation}
In both equations the sum is taken over partitions $\bar v\Rightarrow\{\bar v_{ \alpha},\bar v_{\bar \alpha}\}$ and $\bar u\Rightarrow\{\bar u_{ \alpha},\bar u_{\bar \alpha}\}$ with the restriction $\#\bar u_{ \alpha}=\#\bar v_{ \alpha}=n$, where $n=0,1,\dots,\min(a,b)$.
\end{Def}
The operator \eqref{TPhi-expl1} was considered in \cite{PakRS16a}. There it was proved that it possesses the following recursion:
\begin{multline}\label{recurs-Phi}
X_{a,b}(\bar u,\bar v) = T_{12}(u_a)\, X_{a-1,b}(\bar u_a,\bar v)\\
+\sum g(\bar v_{\rm i},u_a)f(\bar v_{\rm i},\bar u_a)g(\bar v_{\bar\rm i},\bar v_{\rm i})
\,T_{13}(u_a) X_{a-1,b-1}(\bar u_a,\bar v_{\bar\rm i})T_{22}(\bar v_{\rm i}).
\end{multline}
Here the sum is taken over partitions $\bar v=\{\bar v_{\rm i},\bar v_{\bar\rm i}\}$, where the subset $\bar v_{\rm i}$ consists of one element.
Recall that $\bar u_a=\bar u\setminus u_a$.
\begin{prop}\label{P-MP}
The operator \eqref{TPhi-expl2} satisfies recursion \eqref{recurs-Phi}
\begin{multline}\label{recurs-Y}
Y_{a,b}(\bar u,\bar v) = T_{12}(u_a)\, Y_{a-1,b}(\bar u_a,\bar v) \\
+\sum g(\bar v_{\rm i},u_a)f(\bar v_{\rm i},\bar u_a)g(\bar v_{\bar\rm i},\bar v_{\rm i})
\,T_{13}(u_a) Y_{a-1,b-1}(\bar u_a,\bar v_{\bar\rm i})T_{22}(\bar v_{\rm i}).
\end{multline}
The notation is the same as in \eqref{recurs-Phi}.
\end{prop}
The proof of this proposition will be given in the following sections. Here we would like to
mention only that proposition~\ref{P-MP} yields
\be{Y-Xab}
Y_{a,b}(\bar u,\bar v)=X_{a,b}(\bar u,\bar v),\qquad \forall~ a,\,b.
\end{equation}
Indeed, it is clear that
\be{Y-Phi0}
Y_{0,b}(\emptyset,\bar v)=X_{0,b}(\emptyset,\bar v)=\mathbb{T}_{23}(\bar v),\qquad \forall~ b.
\end{equation}
Then using recursions \eqref{recurs-Phi} and \eqref{recurs-Y} we arrive at \eqref{Y-Xab}.
Equation \eqref{Y-Xab} can be considered as MCR of the operators
$T_{12}(\bar u)$ and $\mathbb{T}_{23}(\bar v)$. Indeed, we have
\be{XY-TT}
\begin{aligned}
X_{a,b}(\bar u,\bar v)&=T_{12}(\bar u)\,\mathbb{T}_{23}(\bar v)+\dots,\\
Y_{a,b}(\bar u,\bar v)&=\mathbb{T}_{23}(\bar v)\,T_{12}(\bar u)+\dots,
\end{aligned}
\end{equation}
where dots mean the terms proportional to the operators $T_{13}$ and $T_{22}$. Thus, equation \eqref{Y-Xab} provides us with
a multiple commutator $[T_{12}(\bar u),\,\mathbb{T}_{23}(\bar v)]$ in terms of the operators $T_{13}$, $T_{22}$, and the products of
$T_{12}$ and $T_{23}$ with less number of arguments.
\section{Different representations for Bethe vectors\label{S-DRBV}}
MCR \eqref{Y-Xab} allow us to find different representations for the
Bethe vectors in the models with $\mathfrak{gl}(2|1)$ symmetry. Recall that Bethe vectors are special polynomials in
operators $T_{ij}(u)$ with $i\le j$ applied to the pseudovacuum vector $\Omega$. This vector possesses the following
properties:
\be{vac}
\begin{aligned}
T_{ii}(u)\Omega&=\lambda_i(u)\Omega,\\
T_{ij}(u)\Omega&=0,\qquad i>j.
\end{aligned}
\end{equation}
Here $\lambda_i(u)$ are some scalar functions depending on a specific model.
The Bethe vectors depend on two sets of variables (Bethe parameters) $\bar u$ and $\bar v$. We denote the Bethe vectors $\Phi_{a,b}(\bar u;\bar v)$.
It was proved in \cite{PakRS16a} that they have the following explicit form:
$\Phi_{a,b}(\bar u;\bar v)=X_{a,b}(\bar u;\bar v)\Omega$, where $X_{a,b}$ is given by \eqref{TPhi-expl1}. As we have proved that
$X_{a,b}(\bar u;\bar v)=Y_{a,b}(\bar u;\bar v)$, we immediately obtain an alternative representation $\Phi_{a,b}(\bar u;\bar v)=Y_{a,b}(\bar u;\bar v)\Omega$,
where $Y_{a,b}$ is given by \eqref{TPhi-expl2}. Thus, we have the following explicit formulas for the Bethe vectors:
\be{BV-1}
\begin{aligned}
\Phi_{a,b}(\bar u,\bar v)&=\sum g(\bar v_{ \alpha},\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})h(\bar u_{ \alpha},\bar u_{ \alpha})\;
\mathbb{T}_{13}(\bar u_{ \alpha})\,T_{12}(\bar u_{\bar \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,\lambda_{2}(\bar v_{ \alpha})\Omega,\\
\Phi_{a,b}(\bar u,\bar v)&=\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})\;
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,T_{12}(\bar u_{\bar \alpha})\,\lambda_{2}(\bar u_{ \alpha})\Omega.
\end{aligned}
\end{equation}
Here we have used that $T_{22}(u)\Omega=\lambda_{2}(u)\Omega$ and extended the convention on the shorthand notation \eqref{SH-prod}
to the products of the functions $\lambda_{2}(u)$.
Due to proposition~\ref{P-ijik} we can easily obtain another representations
\be{BV-2}
\begin{aligned}
\Phi_{a,b}(\bar u,\bar v)&=\sum g(\bar v_{ \alpha},\bar u_{ \alpha}) f(\bar u_{\bar \alpha},\bar u_{ \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})
f(\bar v_{ \alpha},\bar u_{\bar \alpha})h(\bar u_{ \alpha},\bar u_{ \alpha})\\
&\hspace{60mm}\times
T_{12}(\bar u_{\bar \alpha})\,\mathbb{T}_{13}(\bar u_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,\lambda_{2}(\bar v_{ \alpha})\Omega,\\
\Phi_{a,b}(\bar u,\bar v)&=\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha})g(\bar v_{\bar \alpha},\bar v_{ \alpha})f(\bar v_{\bar \alpha},\bar u_{ \alpha})\;
\mathbb{T}_{23}(\bar v_{\bar \alpha})\,\mathbb{T}_{13}(\bar v_{ \alpha})\,T_{12}(\bar u_{\bar \alpha})\,\lambda_{2}(\bar u_{ \alpha})\Omega.
\end{aligned}
\end{equation}
Let us prove, for instance, the second equation \eqref{BV-2}. Consider the sum over partitions
$\bar v\Rightarrow \{\bar v_{ \alpha},\bar v_{\bar \alpha}\}$ in the second equation \eqref{BV-1} for $n=\#\bar v_{ \alpha}$ fixed. Using \eqref{Mult-comTi3Tj3}
we obtain
\begin{multline}\label{A-rep1}
\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})\;
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\\
=(-1)^n\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar v_{\bar \alpha},\bar v_{ \alpha})K(\bar v_{ \alpha}|\bar v_{ \beta}+c)\;g(\bar v_{\bar \beta},\bar v_{ \beta})
\mathbb{T}_{23}(\bar v_{\bar \beta})\,\mathbb{T}_{13}(\bar v_{ \beta}),
\end{multline}
where we have an additional sum over partitions $\bar v\Rightarrow \{\bar v_{ \beta},\bar v_{\bar \beta}\}$.
The partitions $\bar v\Rightarrow \{\bar v_{ \alpha},\bar v_{\bar \alpha}\}$ and $\bar v\Rightarrow \{\bar v_{ \beta},\bar v_{\bar \beta}\}$ are independent
except that $\#\bar v_{ \alpha}=\#\bar v_{ \beta}=n$. Thus, we can take the sum over partitions $\bar v\Rightarrow \{\bar v_{ \alpha},\bar v_{\bar \alpha}\}$
in the r.h.s. of \eqref{A-rep1}. For this we first transform the DWPF $K(\bar v_{ \alpha}|\bar v_{ \beta}+c)$ using \eqref{K-K}
\begin{multline}\label{K-trans}
K(\bar v_{ \alpha}|\bar v_{ \beta}+c)=(-1)^{b-n}K(\{\bar v_{ \alpha},\bar v_{\bar \alpha}\}|\{\bar v_{ \beta}+c,\bar v_{\bar \alpha}+c\})\\
=(-1)^{b-n}K(\{\bar v_{ \beta},\bar v_{\bar \beta}\}|\{\bar v_{ \beta}+c,\bar v_{\bar \alpha}+c\})=
(-1)^{b}K(\bar v_{\bar \beta}-c|\bar v_{\bar \alpha}).
\end{multline}
Substituting this into \eqref{A-rep1} we obtain
\begin{multline}\label{A-rep2}
(-1)^n\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar v_{\bar \alpha},\bar v_{ \alpha})K(\bar v_{ \alpha}|\bar v_{ \beta}+c)=
(-1)^{b-n}\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar v_{\bar \alpha},\bar v_{ \alpha})K(\bar v_{\bar \beta}-c|\bar v_{\bar \alpha})\\
=(-1)^{b} f(\bar v,\bar u_{ \alpha})K(\{\bar u_{ \alpha}-c,\bar v_{\bar \beta}-c\}|\bar v)=f(\bar v_{\bar \beta},\bar u_{ \alpha})K(\bar v_{ \beta}|\bar u_{ \alpha}),
\end{multline}
where we have used \eqref{Sym-Part-old1} and \eqref{K-K}. Substituting this into \eqref{A-rep1} we arrive at
\begin{equation}\label{A-rep3}
\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})\;
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha}
=\sum K(\bar v_{ \beta}|\bar u_{ \alpha})\;f(\bar v_{\bar \beta},\bar u_{ \alpha})g(\bar v_{\bar \beta},\bar v_{ \beta})
\mathbb{T}_{23}(\bar v_{\bar \beta})\,\mathbb{T}_{13}(\bar v_{ \beta}).
\end{equation}
It remains to replace here $\bar v_{ \beta}\to\bar v_{ \alpha}$ and $\bar v_{\bar \beta}\to\bar v_{\bar \alpha}$, and we obtain the second representation
\eqref{BV-2}.
Similarly, starting with the first representation \eqref{BV-1} and using summation formula \eqref{Sym-Part-new1} we find the
first representation \eqref{BV-2}.
To conclude this section we give also explicit representations for the dual Bethe vectors. They belong to the dual space and can be
obtained from \eqref{BV-1}, \eqref{BV-2} via antimorphism \eqref{psi}. This antimorphism sends the pseudovacuum vector to its
dual: $\psi(\Omega)=\Omega^\dagger$. The vector $\Omega^\dagger$ belongs to the dual space and
possesses the properties
\be{dvac}
\begin{aligned}
\Omega^\dagger T_{ii}(u)&=\lambda_i(u)\Omega^\dagger,\\
\Omega^\dagger T_{ij}(u)&=0,\qquad i<j.
\end{aligned}
\end{equation}
Here the functions $\lambda_i(u)$ are the same as in \eqref{vac}.
Acting with $\psi$ onto \eqref{BV-1}, \eqref{BV-2} we find
\be{dBV-1}
\begin{aligned}
\Phi^\dagger_{a,b}(\bar u,\bar v)&=(-1)^{b(b-1)/2}\sum g(\bar v_{ \alpha},\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})h(\bar u_{ \alpha},\bar u_{ \alpha})\\
&\hspace{60mm}\times \lambda_{2}(\bar v_{ \alpha})\Omega^\dagger \,\mathbb{T}_{32}(\bar v_{\bar \alpha})\,T_{21}(\bar u_{\bar \alpha})\mathbb{T}_{31}(\bar u_{ \alpha}),\\
\Phi^\dagger_{a,b}(\bar u,\bar v)&=(-1)^{b(b-1)/2}\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})\\
&\hspace{60mm}\times \lambda_{2}(\bar u_{ \alpha})\Omega^\dagger \,T_{21}(\bar u_{\bar \alpha})\,\mathbb{T}_{32}(\bar v_{\bar \alpha})\mathbb{T}_{31}(\bar v_{ \alpha}),
\end{aligned}
\end{equation}
and
\be{dBV-2}
\begin{aligned}
\Phi^\dagger_{a,b}(\bar u,\bar v)&=(-1)^{b(b-1)/2}\sum g(\bar v_{ \alpha},\bar u_{ \alpha}) f(\bar u_{\bar \alpha},\bar u_{ \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})
f(\bar v_{ \alpha},\bar u_{\bar \alpha})h(\bar u_{ \alpha},\bar u_{ \alpha})\\
&\hspace{60mm}\times \lambda_{2}(\bar v_{ \alpha})\Omega^\dagger \,\mathbb{T}_{32}(\bar v_{\bar \alpha})
\,\mathbb{T}_{31}(\bar u_{ \alpha})T_{21}(\bar u_{\bar \alpha}),\\
\Phi^\dagger_{a,b}(\bar u,\bar v)&=(-1)^{b(b-1)/2}\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha})g(\bar v_{\bar \alpha},\bar v_{ \alpha})f(\bar v_{\bar \alpha},\bar u_{ \alpha})\\
&\hspace{60mm}\times
\,\lambda_{2}(\bar u_{ \alpha})\Omega^\dagger \,T_{21}(\bar u_{\bar \alpha})\mathbb{T}_{31}(\bar v_{ \alpha})\,\mathbb{T}_{32}(\bar v_{\bar \alpha}).
\end{aligned}
\end{equation}
\section{MCR \eqref{Y-Xab} for $a=1$ \label{S-MCRa1}}
For $a=1$ equation \eqref{Y-Xab} takes the form
\begin{equation}\label{Mult-T12T230}
[T_{12}(u),\mathbb{T}_{23}(\bar v)]=\sum g(u,\bar v_{ \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})\Bigl(T_{13}(u)\mathbb{T}_{23}(\bar v_{\bar \alpha})\,T_{22}(\bar v_{ \alpha})-
T_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,T_{22}(u)\Bigr).
\end{equation}
Here the sum is taken over partitions of the set $\bar v$ into subsets $\bar v_{ \alpha}$ and $\bar v_{\bar \alpha}$ with a restriction $\#\bar v_{ \alpha}=1$.
This MCR can be proved via the standard method of the algebraic Bethe ansatz. Indeed, due to \eqref{TM-2} we have
\begin{multline}\label{Mult-T12T231}
[T_{12}(u),\mathbb{T}_{23}(\bar v)]=\prod_{1\le j<l\le b}\frac1{h(v_j,v_l)}\sum_{k=1}^b g(u,v_{k})\\
\times T_{23}(v_1)\dots T_{23}(v_{k-1})\bigl(T_{13}(u)T_{22}(v_k)-
T_{13}(v_k)T_{22}(u)\bigr)T_{23}(v_{k+1})\dots T_{23}(v_{b}).
\end{multline}
Then moving the operator $T_{13}$ to the left and the operator $T_{22}$ to the right we eventually obtain the following result
\begin{multline}\label{Mult-T12T232}
[T_{12}(u),\mathbb{T}_{23}(\bar v)]=\sum_{k=1}^b \Bigl(\Lambda_k T_{13}(u)\mathbb{T}_{23}(\bar v_{k})\,T_{22}(v_k)+\tilde \Lambda_k
T_{13}(v_k)\,\mathbb{T}_{23}(\bar v_{k})\,T_{22}(u)\Bigr)\\
+\sum_{\substack{j,k=1\\ j\ne k}}^b M_{jk} T_{13}(v_j)\mathbb{T}_{23}(\{\bar v_{j,k},u\})\,T_{22}(v_k).
\end{multline}
Here $\Lambda_k$, $\tilde \Lambda_k$, and $M_{jk}$ are some rational coefficients. The set $\bar v_{j,k}$ is $\bar v\setminus\{v_j,v_k\}$. Due
to the symmetry of $\mathbb{T}_{23}(\bar v)$ over $\bar v$ it is enough to find $\Lambda_1$, $\tilde \Lambda_b$, and $M_{21}$.
For this we need particular cases of equations \eqref{Mult-comTijTik}, \eqref{Mult-comTi3Tj3}
\begin{equation}\label{Mult-T22T12}
T_{22}(v)T_{12}(\bar u)=f(v,\bar u)T_{12}(\bar u)T_{22}(v)+\sum g(\bar u_{\rm i},v) f(\bar u_{\rm i},\bar u_{\bar\rm i})T_{12}(v)T_{12}(\bar u_{\bar\rm i})T_{22}(\bar u_{\rm i}),
\end{equation}
\begin{equation}\label{Mult-T23T13}
\mathbb{T}_{23}(\bar u)T_{13}(v)=(-1)^b f(v,\bar u)T_{13}(v)\mathbb{T}_{23}(\bar u)+\sum g(v,\bar u_{\rm i}) g(\bar u_{\bar\rm i},\bar u_{\rm i})h(v,\bar u_{\bar\rm i})
T_{13}(\bar v_{\rm i})\mathbb{T}_{23}(\{v,\bar u_{\bar\rm i}\}).
\end{equation}
Here the sums are taken over partitions $\bar u\Rightarrow\{\bar u_{\rm i},\bar u_{\bar\rm i}\}$ with $\#\bar u_{\rm i}=1$.
Let us find $\Lambda_1$. Then
it is clear that only the term $k=1$ in \eqref{Mult-T12T231} contributes into this coefficient. Indeed, all other terms cannot produce $T_{22}(v_1)$ in the extreme right position.
Thus, presenting $\mathbb{T}_{23}(\bar v)$ as
\begin{equation}\label{Lam-10}
\mathbb{T}_{23}(\bar v)=T_{23}(v_1)\frac{\mathbb{T}_{23}(\bar v_{1})}{h(\bar v_1,v_1)},
\end{equation}
we obtain
\begin{equation}\label{Lam-1}
[T_{12}(u),\mathbb{T}_{23}(\bar v)]=g(u,v_1)\bigl(T_{13}(u)T_{22}(v_1)-
T_{13}(v_1)T_{22}(u)\bigr)\frac{\mathbb{T}_{23}(\bar v_{1})}{h(\bar v_1,v_1)}+UWT.
\end{equation}
Clearly, the product $T_{13}(v_1)T_{22}(u)$ does not contribute to the desirable coefficient. In the remaining product $T_{13}(u)T_{22}(v_1)$
the operator $T_{13}(u)$ should be kept in its extreme left position, while $T_{22}(v_1)$ should be moved to the extreme right position. Hereby,
the argument $v_1$ of $T_{22}$ should be preserved. Then we arrive at
\be{Lam-11}
\Lambda_1=g(u,v_1)g(\bar v_1,v_1).
\end{equation}
Similarly, calculating $\tilde \Lambda_b$ we should consider only the term with $k=b$ in \eqref{Mult-T12T231}
\begin{equation}\label{tLam-1}
[T_{12}(u),\mathbb{T}_{23}(\bar v)]=g(u,v_b)\frac{\mathbb{T}_{23}(\bar v_{b})}{h(v_b,\bar v_b)}\bigl(T_{13}(u)T_{22}(v_b)-
T_{13}(v_b)T_{22}(u)\bigr)+UWT.
\end{equation}
Now $T_{22}(u)$ should be kept in its extreme right position, while $T_{13}(v_b)$ should be moved to the left preserving its argument. We find
\be{tLam-11}
\tilde\Lambda_b=-g(u,v_b)g(\bar v_b,v_b).
\end{equation}
Finally, it is easy to see that $M_{21}=0$. Indeed, in order to obtain $M_{21}$ we should take only the term with $k=1$ in \eqref{Mult-T12T231}.
In other words we arrive at \eqref{Lam-1}. Otherwise we cannot obtain $T_{22}(v_1)$ in the extreme right position. But the operator
$T_{13}$ is already in the extreme left position, hence, it cannot depend on $v_2$. Thus, we conclude that $M_{21}=0$.
Using now the symmetry properties we find
\be{tLamLam-1}
\Lambda_k=g(u,v_k)g(\bar v_k,v_k), \qquad \tilde\Lambda_k=-g(u,v_k)g(\bar v_k,v_k), \qquad M_{jk}=0,
\end{equation}
and hence,
\begin{equation}\label{Mult-T12T23-res}
[T_{12}(u),\mathbb{T}_{23}(\bar v)]=\sum_{k=1}^b g(u,v_k)g(\bar v_k,v_k)\Bigl(T_{13}(u)\mathbb{T}_{23}(\bar v_{k})\,T_{22}(v_k)-
T_{13}(v_k)\,\mathbb{T}_{23}(\bar v_{k})\,T_{22}(u)\Bigr),
\end{equation}
what is equivalent to \eqref{Mult-T12T230}.
\section{MCR \eqref{Y-Xab} for $a$ and $b$ arbitrary \label{S-MCRab}}
In order to show that the operator $Y_{a,b}(\bar u,\bar v)$ satisfies recursion \eqref{recurs-Y} we
act with $T_{12}(u_a)$ on the operator $Y_{a-1,b}(\bar u_a,\bar v)$
\be{act-T12}
T_{12}(u_a)\, Y_{a-1,b}(\bar u_a,\bar v)=
\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})\;
T_{12}(u_a)\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{equation}
Here the sum is taken over partitions $\bar v\Rightarrow\{\bar v_{ \alpha},\bar v_{\bar \alpha}\}$ and $\bar u_a\Rightarrow\{\bar u_{ \alpha},\bar u_{\bar \alpha}\}$.
The goal is to move $T_{12}(u_a)$ to the right in such a way that eventually to have all the operators in the following order:
\be{order}
\mathbb{T}_{13}\;\,\mathbb{T}_{23}\;\;T_{12}\;T_{22}.
\end{equation}
The analysis of the commutation relations shows that moving $T_{12}(u_a)$ to the right we might obtain several types of the operator products
\begin{align}\label{type1}
&\mathbb{T}_{13}(\bar v_{ \beta})\,\mathbb{T}_{23}(\bar v_{ \gamma})\,T_{12}(\bar u_{ \gamma})T_{12}(u_a)\,T_{22}(\bar u_{ \beta}),\\
&\mathbb{T}_{13}(\bar v_{ \beta})\,\mathbb{T}_{23}(\bar v_{ \gamma})\,T_{12}(\bar u_{ \gamma})\,T_{22}(\bar u_{ \beta})T_{22}(u_a),\label{type2}\\
&T_{13}(u_a)\mathbb{T}_{13}(\bar v_{ \beta})\,\mathbb{T}_{23}(\bar v_{ \gamma})\,T_{12}(\bar u_{ \gamma})\,T_{22}(\bar u_{ \beta})T_{22}(\bar v_{\rm i}),\label{type3}\\
&T_{13}(u_a)\mathbb{T}_{13}(\bar v_{ \beta})\,\mathbb{T}_{23}(\bar v_{ \gamma})\,T_{12}(\bar u_{ \gamma})T_{12}(\bar v_{\rm i})\,T_{22}(\bar u_{ \beta}).\label{type4}
\end{align}
The first two types \eqref{type1} and \eqref{type2} coincide with the operator products in the definition of
$Y_{a,b}(\bar u,\bar v)$. We call such term {\it wanted terms} (WT). The remaining terms are unwanted (UWT). We will see that the terms
of the type \eqref{type3} cancel the sum over partitions in \eqref{recurs-Y}, while the terms of the
type \eqref{type4} cancel them selves.
\subsection{Wanted terms}
In this section we pay attention to the wanted terms only. The wanted terms are characterized by the property that
the operators $T_{13}$ and $T_{23}$ depend only on the variables from the set $\bar v$, while the operators $T_{12}$ and $T_{22}$ depend
only on the variables from the set $\bar u$.
Moving $T_{12}(u_a)$ through the product
$\mathbb{T}_{13}(\bar v_{ \alpha})$ we use \eqref{TijTi3-0}. Let us write it in the form
\begin{equation}\label{Mult-T12T13uuu}
T_{12}(u)\mathbb{T}_{13}(\bar v_{ \alpha})=f(\bar v_{ \alpha},u)\mathbb{T}_{13}(\bar v_{ \alpha})T_{12}(u)+\sum g(u,\bar v_{\rm i}) g(\bar v_{\rm ii},\bar v_{\rm i})T_{13}(u)\mathbb{T}_{13}(\bar v_{\rm ii})T_{12}(\bar v_{\rm i}),
\end{equation}
where the sum is taken over partitions $\bar v_{ \alpha}\Rightarrow\{\bar v_{\rm i},\bar v_{\rm ii}\}$ with $\#\bar v_{\rm i}=1$. Substituting this into the
r.h.s. of \eqref{act-T12} we obtain
\begin{multline}\label{WT-1}
T_{12}(u_a)\, Y_{a-1,b}(\bar u_a,\bar v)=
\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})
\Bigl[f(\bar v_{ \alpha},u_a)\mathbb{T}_{13}(\bar v_{ \alpha})T_{12}(u_a)\\
+ g(u_a,\bar v_{\rm i}) g(\bar v_{\rm ii},\bar v_{\rm i})T_{13}(u_a)\mathbb{T}_{13}(\bar v_{\rm ii})T_{12}(\bar v_{\rm i})\Bigr]
\mathbb{T}_{23}(\bar v_{\bar \alpha})\,T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
The second term in the square brackets is unwanted, as it contains $T_{13}(u_a)$. Therefore we postpone its consideration and arrive at
\begin{multline}\label{WT-2}
T_{12}(u_a)\, Y_{a-1,b}(\bar u_a,\bar v)=
\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})f(\bar v_{ \alpha},u_a)\\
\times\mathbb{T}_{13}(\bar v_{ \alpha})T_{12}(u_a) \mathbb{T}_{23}(\bar v_{\bar \alpha})\,T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha})+UWT.
\end{multline}
Now we use \eqref{Mult-T12T230}:
\begin{multline}\label{WT-3}
T_{12}(u_a)\, Y_{a-1,b}(\bar u_a,\bar v)=
\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})f(\bar v_{ \alpha},u_a)\mathbb{T}_{13}(\bar v_{ \alpha})\\
\times\Bigl\{g(u_a,\bar v_{\rm i}) g(\bar v_{\rm ii},\bar v_{\rm i})\Bigl(T_{13}(u_a)\mathbb{T}_{23}(\bar v_{\rm ii})\,T_{22}(\bar v_{\rm i})-
T_{13}(\bar v_{\rm i})\,\mathbb{T}_{23}(\bar v_{\rm ii})\,T_{22}(u_a)\Bigr)\\
+\mathbb{T}_{23}(\bar v_{\bar \alpha})T_{12}(u_a)\Bigr\}
T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha})+UWT.
\end{multline}
Here we have an additional partition $\bar v_{\bar \alpha}\Rightarrow\{\bar v_{\rm i},\bar v_{\rm ii}\}$ with $\#\bar v_{\rm i}=1$.
The contribution proportional to $T_{13}(u_a)\mathbb{T}_{23}(\bar v_{\rm ii})\,T_{22}(\bar v_{\rm i})$ is again unwanted. The term proportional to
$\mathbb{T}_{23}(\bar v_{\bar \alpha})T_{12}(u_a)$ already contains all the operators in the necessary order. Thus, we obtain the first
contribution to the wanted terms
\be{A1}
W_1=\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})f(\bar v_{ \alpha},u_a)\mathbb{T}_{13}(\bar v_{ \alpha})
\mathbb{T}_{23}(\bar v_{\bar \alpha})T_{12}(u_a)T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{equation}
It remains to consider the last contribution in \eqref{WT-3}, which is proportional to the product $T_{13}(\bar v_{\rm i})\,\mathbb{T}_{23}(\bar v_{\rm ii})\,T_{22}(u_a)$.
Substituting
$\bar v_{\bar \alpha} =\{\bar v_{\rm ii},\bar v_{\rm i}\}$ in this term we obtain
\begin{multline}\label{WT-4}
T_{12}(u_a)\, Y_{a-1,b}(\bar u_a,\bar v)-W_1=
\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\rm ii},\bar v_{ \alpha})g(\bar v_{\rm i},\bar v_{ \alpha})f(\bar v_{ \alpha},u_a) \\
\times g(\bar v_{\rm ii},\bar v_{\rm i})g(\bar v_{\rm i},u_a)
\mathbb{T}_{13}(\bar v_{ \alpha})T_{13}(\bar v_{\rm i})\,\mathbb{T}_{23}(\bar v_{\rm ii})\,T_{22}(u_a)
T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha})+UWT.
\end{multline}
In order to complete the calculation we should move $T_{22}(u_a)$ through the product $T_{12}(\bar u_{ \beta})$. However, before doing this
we can take the sum over partitions $\bar v_{\bar\rm ii}\Rightarrow\{\bar v_{ \alpha},\bar v_{\rm i}\}$. Indeed, we have
\be{Comb-T13}
\mathbb{T}_{13}(\bar v_{ \alpha})T_{13}(\bar v_{\rm i})=h(\bar v_{\rm i},\bar v_{ \alpha})\mathbb{T}_{13}(\{\bar v_{ \alpha},\bar v_{\rm i}\})=h(\bar v_{\rm i},\bar v_{ \alpha})\mathbb{T}_{13}(\bar v_{\bar\rm ii}).
\end{equation}
Hence,
\begin{multline}\label{WT-5}
T_{12}(u_a)\, Y_{a-1,b}(\bar u_a,\bar v)-W_1=
\sum \Bigl[ K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar v_{\rm i},\bar v_{ \alpha})f(\bar v_{ \alpha},u_a) g(\bar v_{\rm i},u_a)\Bigr]f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\rm ii},\bar v_{\bar\rm ii})\\
\times
\mathbb{T}_{13}(\bar v_{\bar\rm ii})\,\mathbb{T}_{23}(\bar v_{\rm ii})\,T_{22}(u_a)
T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha})+UWT.
\end{multline}
Thus, the sum over partitions $\bar v_{\bar\rm ii}\Rightarrow\{\bar v_{ \alpha},\bar v_{\rm i}\}$ involves only the rational functions in the square brackets of
\eqref{WT-5}. We have
\begin{multline}\label{Sum-RF1}
\sum_{\bar v_{\bar\rm ii}\Rightarrow\{\bar v_{ \alpha},\bar v_{\rm i}\}}K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar v_{\rm i},\bar v_{ \alpha})f(\bar v_{ \alpha},u_a) g(\bar v_{\rm i},u_a)=
f(\bar v_{\bar\rm ii},u_a)\sum_{\bar v_{\bar\rm ii}\Rightarrow\{\bar v_{ \alpha},\bar v_{\rm i}\}}K(\bar v_{ \alpha}|\bar u_{ \alpha}) \frac{f(\bar v_{\rm i},\bar v_{ \alpha})}{ h(\bar v_{\rm i},u_a)}\\
=-f(\bar v_{\bar\rm ii},u_a)\sum_{\bar v_{\bar\rm ii}\Rightarrow\{\bar v_{ \alpha},\bar v_{\rm i}\}}K(\bar v_{ \alpha}|\bar u_{ \alpha})K(u_a-c|\bar v_{\rm i}) f(\bar v_{\rm i},\bar v_{ \alpha}),
\end{multline}
where we used $K(u_a-c|\bar v_{\rm i})=-1/ h(\bar v_{\rm i},u_a)$. We see that the
sum over partitions is reduced to lemma~\ref{main-ident}. Hence, we arrive at
\begin{equation}\label{Sum-RF1-res}
\sum_{\bar v_{\bar\rm ii}\Rightarrow\{\bar v_{ \alpha},\bar v_{\rm i}\}}K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar v_{\rm i},\bar v_{ \alpha})f(\bar v_{ \alpha},u_a) g(\bar v_{\rm i},u_a)=
K(\bar v_{\bar\rm ii}|\{\bar u_{ \alpha},u_a\}),
\end{equation}
what gives us
\begin{multline}\label{WT-6}
T_{12}(u_a)\, Y_{a-1,b}(\bar u_a,\bar v)-W_1=
\sum K(\bar v_{ \alpha}|\{\bar u_{ \alpha},u_a\}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})\\
\times
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,T_{22}(u_a)
T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha})+UWT.
\end{multline}
Here we have relabeled $\bar v_{\rm ii}$ by $\bar v_{\bar \alpha}$ and $\bar v_{\bar\rm ii}$ by $\bar v_{ \alpha}$.
It remains to move the operator $T_{22}(u_a)$ through the product $T_{12}(\bar u_{\bar \alpha})$.
It can be done via \eqref{Mult-comTijTik}.
In our case this equation takes the form
\begin{equation}\label{Mult-T22T12uuu}
T_{22}(u_a)T_{12}(\bar u_{\bar \alpha})=f(u_a,\bar u_{\bar \alpha})T_{12}(\bar u_{\bar \alpha})T_{22}(u_a)+
\sum g(\bar u_{\rm i},u_a) f(\bar u_{\rm i},\bar u_{\rm ii})T_{12}(u_a)T_{12}(\bar u_{\rm ii})T_{22}(\bar u_{\rm i}),
\end{equation}
where the sum is taken over partitions $\bar u_{\bar \alpha}\Rightarrow\{\bar u_{\rm i},\bar u_{\rm ii}\}$ with $\#\bar u_{\rm i}=1$.
Substituting this equation to \eqref{WT-6} we find
\begin{equation}\label{WT-A2A3}
T_{12}(u_a)\, Y_{a-1,b}(\bar u_a,\bar v)-W_1=W_2+W_3+UWT,
\end{equation}
where
\begin{equation}\label{A2}
W_2=
\sum K(\bar v_{ \alpha}|\{\bar u_{ \alpha},u_a\}) f(\bar u_{ \alpha},\bar u_{\bar \alpha})f(u_a,\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,
T_{12}(\bar u_{\bar \alpha})\,T_{22}(u_a)T_{22}(\bar u_{ \alpha}),
\end{equation}
and
\begin{multline}\label{A3}
W_3= \sum K(\bar v_{ \alpha}|\{\bar u_{ \alpha},u_a\}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha}
\, g(\bar u_{\rm i},u_a) f(\bar u_{\rm i},\bar u_{\rm ii})\\
\times
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,
T_{12}(u_a)T_{12}(\bar u_{\rm ii})T_{22}(\bar u_{\rm i}) T_{22}(\bar u_{ \alpha}).
\end{multline}
Observe that the contribution $W_2$ can be written in the form
\begin{equation}\label{A2-new}
W_2=\sum_{u_a\in\bar u_{ \alpha}} K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,
T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{equation}
Here, in distinction of the original formula \eqref{act-T12} we have the sum over partitions of the complete set $\bar u$ (i.e. including $u_a$). However,
we have the restriction $u_a\in\bar u_{ \alpha}$.
In \eqref{A3} we can take the sum over partitions $\bar u_{\bar\rm ii}\Rightarrow\{\bar u_{ \alpha},\bar u_{\rm i}\}$. Setting there $\{\bar u_{ \alpha},\bar u_{\rm i}\}=\bar u_{\bar\rm ii}$ we obtain
\begin{multline}\label{A3-1}
W_3= \sum \Bigl[ K(\bar v_{ \alpha}|\{\bar u_{ \alpha},u_a\})g(\bar u_{\rm i},u_a)f(\bar u_{ \alpha},\bar u_{\rm i})\Bigr] f(\bar u_{\bar\rm ii},\bar u_{\rm ii}) g(\bar v_{\bar \alpha},\bar v_{ \alpha}) \\
\times
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,
T_{12}(u_a)T_{12}(\bar u_{\rm ii}) T_{22}(\bar u_{\bar\rm ii}),
\end{multline}
The sum of the terms in the square brackets can be computed via \eqref{Ident-1}
\be{Sum-RF2}
\sum_{\bar u_{\bar\rm ii}\Rightarrow\{\bar u_{ \alpha},\bar u_{\rm i}\}}K(\bar v_{ \alpha}|\{\bar u_{ \alpha},u_a\})g(\bar u_{\rm i},u_a)f(\bar u_{ \alpha},\bar u_{\rm i})=
\Bigl(f(\bar u_{\bar\rm ii},u_a)-f(\bar v_{ \alpha},u_a)\Bigr)K(\bar v_{ \alpha}|\bar u_{\bar\rm ii}).
\end{equation}
%
Thus, we arrive at
\begin{multline}\label{A3-2}
W_3= \sum K(\bar v_{ \alpha}|\bar u_{ \alpha})\Bigl(f(\bar u_{ \alpha},u_a)-f(\bar v_{ \alpha},u_a)\Bigr) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha}) \\
\times
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,
T_{12}(u_a)T_{12}(\bar u_{\bar \alpha}) T_{22}(\bar u_{ \alpha}),
\end{multline}
where we relabeled $\bar u_{\bar\rm ii}$ by $\bar u_{ \alpha}$ and $\bar u_{\rm ii}$ by $\bar u_{\bar \alpha}$.
We see that
\begin{multline}\label{A1A3}
W_1+W_3=\sum K(\bar v_{ \alpha}|\bar u_{ \alpha})f(\bar u_{ \alpha},u_a) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,
T_{12}(u_a)T_{12}(\bar u_{\bar \alpha}) T_{22}(\bar u_{ \alpha})\\
=\sum_{u_a\in\bar u_{\bar \alpha}} K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,
T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
Thus, we have again the sum over partitions of the complete set $\bar u$, however,
now the restriction is $u_a\in\bar u_{\bar \alpha}$. Hence all together we obtain
\begin{equation}\label{A1A2A3}
\sum_{k=1}^3W_k
=\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{ \alpha})
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})\,
T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha})= Y_{a,b}(\bar u,\bar v).
\end{equation}
Thus, we have shown that the contribution of the wanted terms to the action of the operator $T_{12}(u_a)$ onto $ Y_{a-1,b}(\bar u_a,\bar v)$
produces the operator $Y_{a,b}(\bar u,\bar v)$. It remains to prove that the unwanted terms do not contribute to the final
result.
\subsection{Cancellation of unwanted terms\label{A-CUT}
We focus now at the unwanted terms. We denote their contributions by symbols $U_k$. Later we shell split these
contributions into two groups: the terms of the type \eqref{type3} will be denoted by $Z_k$;
the terms of the type \eqref{type4} will be denoted by $\bar Z_k$.
\subsubsection{First contribution}
We start with term proportional to $T_{13}(u_a)\mathbb{T}_{23}(\bar v_{\rm ii})\,T_{22}(\bar v_{\rm i})$ in \eqref{WT-3}. Substituting there
$\bar v_{\bar \alpha}=\{\bar v_{\rm ii},\bar v_{\rm i}\}$ we obtain
\begin{multline}\label{B1-1}
U_1=
\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\rm i},\bar v_{ \alpha})g(\bar v_{\rm ii},\bar v_{ \alpha})f(\bar v_{ \alpha},u_a)g(u_a,\bar v_{\rm i}) g(\bar v_{\rm ii},\bar v_{\rm i})\\
\times \mathbb{T}_{13}(\bar v_{ \alpha})T_{13}(u_a)\mathbb{T}_{23}(\bar v_{\rm ii})\,T_{22}(\bar v_{\rm i}) T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
Moving $T_{13}(u_a)$ to the left via
\be{Mov-T13}
\mathbb{T}_{13}(\bar v_{ \alpha})T_{13}(u_a)=T_{13}(u_a)\mathbb{T}_{13}(\bar v_{ \alpha})\frac{h(u_a,\bar v_{ \alpha})}{h(\bar v_{ \alpha},u_a)},
\end{equation}
we find
\begin{multline}\label{B1-2}
U_1=T_{13}(u_a)
\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha})
g(\bar v_{\bar\rm i},\bar v_{\rm i})g(\bar v_{\rm ii},\bar v_{ \alpha})f(u_a,\bar v_{ \alpha})g(u_a,\bar v_{\rm i}) \\
\times \mathbb{T}_{13}(\bar v_{ \alpha})\mathbb{T}_{23}(\bar v_{\rm ii})\,T_{22}(\bar v_{\rm i}) T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
Now we move the operator $T_{22}(\bar v_{\rm i})$ through the product $T_{12}(\bar u_{\bar \alpha})$ via \eqref{Mult-T22T12}
\begin{multline}\label{B1-3}
U_1=T_{13}(u_a)
\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar\rm i},\bar v_{\rm i})g(\bar v_{\rm ii},\bar v_{ \alpha})f(u_a,\bar v_{ \alpha})g(u_a,\bar v_{\rm i}) \mathbb{T}_{13}(\bar v_{ \alpha})\mathbb{T}_{23}(\bar v_{\rm ii}) \\
\times \Bigl[f(\bar v_{\rm i},\bar u_{\bar \alpha}) T_{12}(\bar u_{\bar \alpha})T_{22}(\bar v_{\rm i})+ g(\bar u_{\rm iii},\bar v_{\rm i})f(\bar u_{\rm iii},\bar u_{\mu})
T_{12}(\bar v_{\rm i})T_{12}(\bar u_{\mu})T_{22}(\bar u_{\rm iii})\Bigr]\,T_{22}(\bar u_{ \alpha}).
\end{multline}
Here we have an additional sum over partitions $\bar u_{\bar \alpha}\Rightarrow\{\bar u_{\mu},\bar u_{\rm iii}\}$ with $\#\bar u_{\rm iii}=1$. The first term in the square brackets contributes to the
type \eqref{type3}:
\begin{multline}\label{Z1}
Z_1=T_{13}(u_a)
\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar\rm i},\bar v_{\rm i})
g(\bar v_{\rm ii},\bar v_{ \alpha})f(u_a,\bar v_{ \alpha})f(\bar v_{\rm i},\bar u_{\bar \alpha})g(u_a,\bar v_{\rm i}) \\
\times \mathbb{T}_{13}(\bar v_{ \alpha})\mathbb{T}_{23}(\bar v_{\rm ii}) T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha})T_{22}(\bar v_{\rm i}).
\end{multline}
The second term in the square brackets contributes to the
type \eqref{type4}. Substituting there
$\bar u_{\bar \alpha}=\{\bar u_{\mu},\bar u_{\rm iii}\}$ we obtain
\begin{multline}\label{W1-1}
\bar Z_1=T_{13}(u_a)
\sum \Bigl[ K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\rm iii}) g(\bar u_{\rm iii},\bar v_{\rm i})\Bigr] f(\bar u_{ \alpha},\bar u_{\mu}) f(\bar u_{\rm iii},\bar u_{\mu}) g(\bar v_{\bar\rm i},\bar v_{\rm i})g(\bar v_{\rm ii},\bar v_{ \alpha})
\\
\times f(u_a,\bar v_{ \alpha}) g(u_a,\bar v_{\rm i})
\mathbb{T}_{13}(\bar v_{ \alpha})\mathbb{T}_{23}(\bar v_{\rm ii})T_{12}(\bar v_{\rm i})T_{12}(\bar u_{\mu})T_{22}(\bar u_{\rm iii})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
Here the sum over partitions $\bar u_{\bar\mu}\Rightarrow\{\bar u_{ \alpha},\bar u_{\rm iii}\}$ can be taken. The product $ f(\bar u_{ \alpha},\bar u_{\mu}) f(\bar u_{\rm iii},\bar u_{\mu})$
combines into $f(\bar u_{\bar\mu},\bar u_{\mu})$,
while the sum of the terms in the square brackets is a particular case of lemma~\ref{main-ident}:
\be{W1sub-sum}
\sum_{\bar u_{\bar\mu}\Rightarrow\{\bar u_{ \alpha},\bar u_{\rm iii}\}} K(\bar v_{ \alpha}|\bar u_{ \alpha})g(\bar u_{\rm iii},\bar v_{\rm i}) f(\bar u_{ \alpha},\bar u_{\rm iii})=-f(\bar u_{\bar\mu},\bar v_{\rm i})
K(\{\bar v_{\rm i}-c,\bar v_{ \alpha}\}|\bar u_{\bar\mu}).
\end{equation}
Substituting this into \eqref{W1-1} and relabeling $\bar u_{\bar\mu}$ by $\bar u_{ \alpha}$ and $\bar u_{\mu}$ by $\bar u_{\bar \alpha}$ we find
\begin{multline}\label{W1-2}
\bar Z_1=-T_{13}(u_a)
\sum f(\bar u_{ \alpha},\bar v_{\rm i})
K(\{\bar v_{\rm i}-c,\bar v_{ \alpha}\}|\bar u_{ \alpha})
f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar\rm i},\bar v_{\rm i})g(\bar v_{\rm ii},\bar v_{ \alpha})
\\
\times f(u_a,\bar v_{ \alpha}) g(u_a,\bar v_{\rm i})
\mathbb{T}_{13}(\bar v_{ \alpha})\mathbb{T}_{23}(\bar v_{\rm ii})T_{12}(\bar v_{\rm i})T_{12}(\bar u_{\bar \alpha})T_{22}(\bar u_{ \alpha}).
\end{multline}
\subsubsection{Second contribution}
We now turn back to the term with $T_{13}(u_a)$ in \eqref{WT-1}. Substituting there
$\bar v_{ \alpha}=\{\bar v_{\rm ii},\bar v_{\rm i}\}$ we obtain
\begin{multline}\label{UWT-1}
U_2=T_{13}(u_a)\sum K(\{\bar v_{\rm ii},\bar v_{\rm i}\}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha})
g(\bar v_{\bar \alpha},\bar v_{\rm ii}) g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})\\
\times \mathbb{T}_{13}(\bar v_{\rm ii})T_{12}(\bar v_{\rm i}) \mathbb{T}_{23}(\bar v_{\bar \alpha})\,T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
Now we move $T_{12}(\bar v_{\rm i})$ through the product $\mathbb{T}_{23}(\bar v_{\bar \alpha})$ via \eqref{Mult-T12T230}
\begin{multline}\label{UWT-2}
U_2=T_{13}(u_a)\sum K(\{\bar v_{\rm ii},\bar v_{\rm i}\}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha})
g(\bar v_{\bar \alpha},\bar v_{\rm ii})g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})\\
\times \mathbb{T}_{13}(\bar v_{\rm ii})\Bigl\{
g(\bar v_{\rm i},\bar v_{\rm iii}) g(\bar v_{\mu},\bar v_{\rm iii})\Bigl[ T_{13}(\bar v_{\rm i})\mathbb{T}_{23}(\bar v_{\mu})\,T_{22}(\bar v_{\rm iii})-
T_{13}(\bar v_{\rm iii})\,\mathbb{T}_{23}(\bar v_{\mu})\,T_{22}(\bar v_{\rm i})
\Bigr]\\
+ \mathbb{T}_{23}(\bar v_{\bar \alpha})\,T_{12}(\bar v_{\rm i})\Bigr\}\,T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
Here we have an additional sum over partitions $\bar v_{\bar \alpha}\Rightarrow\{\bar v_{\mu},\bar v_{\rm iii}\}$, where $\bar v_{\rm iii}$ consists of one element.
The term with the product $\mathbb{T}_{23}(\bar v_{\bar \alpha})\,T_{12}(\bar v_{\rm i})$ gives direct contribution to the type \eqref{type4}
\begin{multline}\label{W-2}
\bar Z_2=T_{13}(u_a)\sum K(\{\bar v_{\rm ii},\bar v_{\rm i}\}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha})
g(\bar v_{\bar \alpha},\bar v_{\rm ii})g(\bar v_{\bar\rm i},\bar v_{\rm i})
g(u_a,\bar v_{\rm i})\\
\times \mathbb{T}_{13}(\bar v_{\rm ii})\mathbb{T}_{23}(\bar v_{\bar \alpha})\,T_{12}(\bar v_{\rm i})\,T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
In the remaining terms of \eqref{UWT-2} we can partly take the sums over partitions. Consider the first term in the square brackets in \eqref{UWT-2}
setting there $\bar v_{\bar \alpha}=\{\bar v_{\mu},\bar v_{\rm iii}\}$
\begin{multline}\label{UWT-3}
U_2^{(1)}=T_{13}(u_a)\sum K(\{\bar v_{\rm ii},\bar v_{\rm i}\}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\mu},\bar v_{\rm ii})g(\bar v_{\rm iii},\bar v_{\rm ii})g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})\\
\times
g(\bar v_{\rm i},\bar v_{\rm iii}) g(\bar v_{\mu},\bar v_{\rm iii}) \mathbb{T}_{13}(\bar v_{\rm ii})T_{13}(\bar v_{\rm i})\mathbb{T}_{23}(\bar v_{\mu})\,T_{22}(\bar v_{\rm iii})
\,T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
In this formula the set $\bar v$ is divided into four subsets $\{\bar v_{\rm iii},\bar v_{\rm i},\bar v_{\rm ii},\bar v_{\mu}\}$ with $\#\bar v_{\rm iii}=\#\bar v_{\rm i}=1$. Combining $\{\bar v_{\rm ii},\bar v_{\rm i}\}$ into $\bar v_{ \gamma}$ we obtain
\begin{multline}\label{UWT-4}
U_2^{(1)}=T_{13}(u_a)\sum K(\bar v_{ \gamma}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\mu},\bar v_{ \gamma})g(\bar v_{\bar\rm iii},\bar v_{\rm iii})
\Bigl[ f(\bar v_{\rm i},\bar v_{\rm ii})g(\bar v_{\rm iii},\bar v_{\rm i})g(u_a,\bar v_{\rm i})\Bigr] \\
\times
\mathbb{T}_{13}(\bar v_{ \gamma})\mathbb{T}_{23}(\bar v_{\mu})\,T_{22}(\bar v_{\rm iii})
\,T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
The sum over partitions $\bar v_{ \gamma}\Rightarrow\{\bar v_{\rm ii},\bar v_{\rm i}\}$ (see the terms in the square brackets) can be easily computed via contour integration:
\be{Con-int0}
\sum_{\bar v_{ \gamma}\Rightarrow\{\bar v_{\rm ii},\bar v_{\rm i}\}}f(\bar v_{\rm i},\bar v_{\rm ii})g(\bar v_{\rm iii},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
=\frac1{2\pi i c}\oint f(z,\bar v_{ \gamma})g(\bar v_{\rm iii},z)g(u_a,z)\,dz,
\end{equation}
where the integration contour surrounds the points $\bar v_{ \gamma}$. Taking this integral by the residues outside the contour we find
\be{Con-int}
\sum_{\bar v_{ \gamma}\Rightarrow\{\bar v_{\rm ii},\bar v_{\rm i}\}}f(\bar v_{\rm i},\bar v_{\rm ii})g(\bar v_{\rm iii},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
=g(u_a,\bar v_{\rm iii})\bigl(f(\bar v_{\rm iii},\bar v_{ \gamma})-f(u_a,\bar v_{ \gamma})\bigr).
\end{equation}
Substituting this into \eqref{UWT-4} we obtain
\begin{multline}\label{UWT-5}
U_2^{(1)}=T_{13}(u_a)\sum K(\bar v_{ \gamma}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\mu},\bar v_{ \gamma})g(\bar v_{\bar\rm iii},\bar v_{\rm iii})
g(u_a,\bar v_{\rm iii})\bigl(f(\bar v_{\rm iii},\bar v_{ \gamma})-f(u_a,\bar v_{ \gamma})\bigr)\\
\times
\mathbb{T}_{13}(\bar v_{ \gamma})\mathbb{T}_{23}(\bar v_{\mu})\,T_{22}(\bar v_{\rm iii})
\,T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
The second term in the square brackets of \eqref{UWT-2} can be treated similarly. Again setting $\bar v_{\bar \alpha}=\{\bar v_{\mu},\bar v_{\rm iii}\}$
we obtain
\begin{multline}\label{UWT-7}
U_2^{(2)}=T_{13}(u_a)\sum K(\{\bar v_{\rm ii},\bar v_{\rm i}\}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\mu},\bar v_{\rm ii})g(\bar v_{\rm iii},\bar v_{\rm ii})g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})\\
\times g(\bar v_{\rm iii},\bar v_{\rm i}) g(\bar v_{\mu},\bar v_{\rm iii})
\mathbb{T}_{13}(\bar v_{\rm ii})T_{13}(\bar v_{\rm iii})\,\mathbb{T}_{23}(\bar v_{\mu})\,T_{22}(\bar v_{\rm i})
T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
This time we combine $\{\bar v_{\rm ii},\bar v_{\rm iii}\}$ into $\bar v_{ \gamma}$ and find
\begin{multline}\label{UWT-8}
U_2^{(2)}=T_{13}(u_a)\sum \Bigl[K(\{\bar v_{\rm ii},\bar v_{\rm i}\}|\bar u_{ \alpha}) f(\bar v_{\rm iii},\bar v_{\rm ii})g(\bar v_{\rm iii},\bar v_{\rm i})\Bigr]
f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\mu},\bar v_{ \gamma})g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
\\
\times
\mathbb{T}_{13}(\bar v_{ \gamma})\,\mathbb{T}_{23}(\bar v_{\mu})\,T_{22}(\bar v_{\rm i})
T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
The sum over partitions $\bar v_{ \gamma}\Rightarrow\{\bar v_{\rm ii},\bar v_{\rm iii}\}$ (see the terms in the square brackets) can be computed via \eqref{Ident-2}
\be{sum-forget}
\sum_{\bar v_{ \gamma}\Rightarrow\{\bar v_{\rm ii},\bar v_{\rm iii}\}}K(\{\bar v_{\rm ii},\bar v_{\rm i}\}|\bar u_{ \alpha}) f(\bar v_{\rm iii},\bar v_{\rm ii})g(\bar v_{\rm iii},\bar v_{\rm i})=
K(\bar v_{ \gamma}|\bar u_{ \alpha})\bigl(f(\bar v_{\rm i},\bar u_{ \alpha})-f(\bar v_{\rm i},\bar v_{ \gamma})\bigr).
\end{equation}
Substituting this into \eqref{UWT-8} we arrive at
\begin{multline}\label{UWT-9}
U_2^{(2)}=T_{13}(u_a)\sum K(\bar v_{ \gamma}|\bar u_{ \alpha})\bigl(f(\bar v_{\rm i},\bar u_{ \alpha})-f(\bar v_{\rm i},\bar v_{ \gamma})\bigr)
f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\mu},\bar v_{ \gamma})g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
\\
\times
\mathbb{T}_{13}(\bar v_{ \gamma})\,\mathbb{T}_{23}(\bar v_{\mu})\,T_{22}(\bar v_{\rm i})
T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
It remains to combine the contributions \eqref{UWT-9} and \eqref{UWT-5} (relabeling $\bar v_{\rm iii}$ by $\bar v_{\rm i}$ in \eqref{UWT-5}), what gives us
\begin{multline}\label{B2-fin}
U_2^{(1)}+U_2^{(2)}=T_{13}(u_a)\sum K(\bar v_{ \gamma}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\mu},\bar v_{ \gamma})g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
\\
\times \bigl(f(\bar v_{\rm i},\bar u_{ \alpha})-f(u_a,\bar v_{ \gamma})\bigr)
\mathbb{T}_{13}(\bar v_{ \gamma})\,\mathbb{T}_{23}(\bar v_{\mu})\,T_{22}(\bar v_{\rm i})
T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha}).
\end{multline}
\subsubsection{Final cancellations}
To achieve our goal we should move $T_{22}(\bar v_{\rm i})$ in \eqref{B2-fin} through the product $T_{12}(\bar u_{\bar \alpha})$ via \eqref{Mult-T22T12}
\begin{multline}\label{FS-1}
U_2^{(1)}+U_2^{(2)}=T_{13}(u_a)\sum K(\bar v_{ \gamma}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\mu},\bar v_{ \gamma})g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
\\
\times \bigl(f(\bar v_{\rm i},\bar u_{ \alpha})-f(u_a,\bar v_{ \gamma})\bigr)
\mathbb{T}_{13}(\bar v_{ \gamma})\,\mathbb{T}_{23}(\bar v_{\mu})
\Bigl[ f(\bar v_{\rm i},\bar u_{\bar \alpha})T_{12}(\bar u_{\bar \alpha})T_{22}(\bar v_{\rm i})\\
+g(\bar u_{\rm i},\bar v_{\rm i}) f(\bar u_{\rm i},\bar u_{\rm ii})T_{12}(\bar v_{\rm i})T_{12}(\bar u_{\rm ii})T_{22}(\bar u_{\rm i})\Bigr]
\,T_{22}(\bar u_{ \alpha}).
\end{multline}
Here we obtain additional partitions $\bar u_{\bar \alpha}\Rightarrow\{\bar u_{\rm ii},\bar u_{\rm i}\}$, where $\bar u_{\rm i}$ consists of one element. The first term
in the square brackets contributes to the terms of the type \eqref{type3}
\begin{multline}\label{Z2}
Z_2=T_{13}(u_a)\sum K(\bar v_{ \gamma}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) f(\bar v_{\rm i},\bar u_{\bar \alpha})
g(\bar v_{\mu},\bar v_{ \gamma})g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
\\
\times \bigl(f(\bar v_{\rm i},\bar u_{ \alpha})-f(u_a,\bar v_{ \gamma})\bigr)
\mathbb{T}_{13}(\bar v_{ \gamma})\,\mathbb{T}_{23}(\bar v_{\mu})
T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha})T_{22}(\bar v_{\rm i}).
\end{multline}
Replacing here $\bar v_{ \gamma}\to\bar v_{ \alpha}$ and $\bar v_{\mu}\to\bar v_{\rm ii}$ we obtain
\begin{multline}\label{Z2-d}
Z_2=T_{13}(u_a)\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) f(\bar v_{\rm i},\bar u_{\bar \alpha})
g(\bar v_{\rm ii},\bar v_{ \alpha})g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
\\
\times \bigl(f(\bar v_{\rm i},\bar u_{ \alpha})-f(u_a,\bar v_{ \alpha})\bigr)
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\rm ii})
T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha})T_{22}(\bar v_{\rm i}).
\end{multline}
Combining this contribution with \eqref{Z1} we find
\begin{multline}\label{FS-2}
Z_1+Z_2=T_{13}(u_a)\sum K(\bar v_{ \alpha}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\rm ii},\bar v_{ \alpha})f(\bar v_{\rm i},\bar u_a)
g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
\\
\times
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\rm ii})
T_{12}(\bar u_{\bar \alpha})\,T_{22}(\bar u_{ \alpha})T_{22}(\bar v_{\rm i}),
\end{multline}
and hence,
\be{FS-22}
Z_1+Z_2=\sum g(u_a,\bar v_{\rm i})f(\bar v_{\rm i},\bar u_a)g(\bar v_{\bar\rm i},\bar v_{\rm i})\;T_{13}(u_a)Y_{a-1,b-1}(\bar u_a,\bar v_{\bar\rm i})T_{22}(\bar v_{\rm i}).
\end{equation}
We see that this contribution cancels the sum over partitions in the recursion \eqref{recurs-Y}.
The second term in the square brackets of \eqref{FS-1}
contributes to the terms of the type \eqref{type4}, therefore we denote
it by $\bar Z_3$. We have
\begin{multline}\label{FS-3}
\bar Z_3=T_{13}(u_a)\sum K(\bar v_{ \gamma}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\rm ii})f(\bar u_{ \alpha},\bar u_{\rm i}) g(\bar v_{\mu},\bar v_{ \gamma})
g(\bar u_{\rm i},\bar v_{\rm i}) f(\bar u_{\rm i},\bar u_{\rm ii})g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
\\
\times \bigl(f(\bar v_{\rm i},\bar u_{ \alpha})-f(u_a,\bar v_{ \gamma})\bigr)
\mathbb{T}_{13}(\bar v_{ \gamma})\,\mathbb{T}_{23}(\bar v_{\mu})
T_{12}(\bar v_{\rm i})T_{12}(\bar u_{\rm ii})T_{22}(\bar u_{\rm i})
\,T_{22}(\bar u_{ \alpha}),
\end{multline}
where we substituted $\bar u_{\bar \alpha}=\{\bar u_{\rm ii},\bar u_{\rm i}\}$. Combining
$\{\bar u_{ \alpha},\bar u_{\rm i}\}$ into $\bar u_{\mu}$ we obtain
\begin{multline}\label{FS-4}
\bar Z_3=T_{13}(u_a)\sum \Bigl[ K(\bar v_{ \gamma}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\rm i})g(\bar u_{\rm i},\bar v_{\rm i}) \Bigr]
f(\bar u_{\mu},\bar u_{\rm ii})g(\bar v_{\mu},\bar v_{ \gamma}) g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
\\
\times \bigl( f(\bar v_{\rm i},\bar u_{ \alpha})-f(u_a,\bar v_{ \gamma})\bigr)
\mathbb{T}_{13}(\bar v_{ \gamma})\,\mathbb{T}_{23}(\bar v_{\mu})
T_{12}(\bar v_{\rm i})T_{12}(\bar u_{\rm ii})
\,T_{22}(\bar u_{\mu}).
\end{multline}
We see that we can take the sum over partitions $\bar u_{\mu}\Rightarrow\{\bar u_{ \alpha},\bar u_{\rm i}\}$.
This sum involves the terms in the square brackets and the product $f(\bar v_{\rm i},\bar u_{ \alpha})$. Thus, we have two contributions.
The first one comes from the sum
\be{LC-1}
\sum_{\bar u_{\mu}\Rightarrow\{\bar u_{ \alpha},\bar u_{\rm i}\}}K(\bar v_{ \gamma}|\bar u_{ \alpha})f(\bar u_{ \alpha},\bar u_{\rm i})g(\bar u_{\rm i},\bar v_{\rm i})=-f(\bar u_{\mu},\bar v_{\rm i})
K(\{\bar v_{\rm i}-c,\bar v_{ \gamma}\}|\bar u_{\mu}),
\end{equation}
where we have used lemma~\ref{main-ident}. The second contribution comes from the sum
\begin{multline}\label{LC-2}
\sum_{\bar u_{\mu}\Rightarrow\{\bar u_{ \alpha},\bar u_{\rm i}\}}K(\bar v_{ \gamma}|\bar u_{ \alpha})f(\bar u_{ \alpha},\bar u_{\rm i})g(\bar u_{\rm i},\bar v_{\rm i})f(\bar v_{\rm i},\bar u_{ \alpha})
=-f(\bar v_{\rm i},\bar u_{\mu})\sum_{\bar u_{\mu}\Rightarrow\{\bar u_{ \alpha},\bar u_{\rm i}\}}K(\bar v_{ \gamma}|\bar u_{ \alpha})\frac{f(\bar u_{ \alpha},\bar u_{\rm i})}
{h(\bar v_{\rm i},\bar u_{\rm i})}\\
=f(\bar v_{\rm i},\bar u_{\mu})\sum_{\bar u_{\mu}\Rightarrow\{\bar u_{ \alpha},\bar u_{\rm i}\}}K(\bar v_{ \gamma}|\bar u_{ \alpha})K(\bar u_{\rm i}|\bar v_{\rm i}+c)f(\bar u_{ \alpha},\bar u_{\rm i})=
-K(\{\bar v_{\rm i},\bar v_{ \gamma}\}|\bar u_{\mu}),
\end{multline}
where again we have used lemma~\ref{main-ident} and $1/h(\bar v_{\rm i},\bar u_{\rm i})=-K(\bar u_{\rm i}|\bar v_{\rm i}+c)$.
The sum \eqref{LC-1} produces the contribution
\begin{multline}\label{FS-40}
\bar Z_3^{(1)}=T_{13}(u_a)\sum \Bigl[K(\{\bar v_{\rm i}-c,\bar v_{ \gamma}\}|\bar u_{\bar\rm ii})f(\bar u_{\bar\rm ii},\bar v_{\rm i})f(u_a,\bar v_{ \gamma})\Bigr]
f(\bar u_{\bar\rm ii},\bar u_{\rm ii})g(\bar v_{\mu},\bar v_{ \gamma}) g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
\\
\times
\mathbb{T}_{13}(\bar v_{ \gamma})\,\mathbb{T}_{23}(\bar v_{\mu})
T_{12}(\bar v_{\rm i})T_{12}(\bar u_{\rm ii})
\,T_{22}(\bar u_{\bar\rm ii}),
\end{multline}
where we used $\bar u_{\mu}=\bar u_{\bar\rm ii}$. After relabeling the subsets $\bar v_{ \gamma}\to\bar v_{ \alpha}$, $\bar v_{\mu}\to\bar v_{\rm ii}$, $\bar u_{\rm ii}\to\bar u_{\bar \alpha}$, and
$\bar u_{\bar\rm ii}\to\bar u_{ \alpha}$ we arrive at
\begin{multline}\label{FS-41}
\bar Z_3^{(1)}=T_{13}(u_a)\sum \Bigl[K(\{\bar v_{\rm i}-c,\bar v_{ \alpha}\}|\bar u_{ \alpha})f(\bar u_{ \alpha},\bar v_{\rm i})f(u_a,\bar v_{ \alpha})\Bigr]
f(\bar u_{ \alpha},\bar u_{\bar \alpha})g(\bar v_{\rm ii},\bar v_{ \alpha}) g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
\\
\times
\mathbb{T}_{13}(\bar v_{ \alpha})\,\mathbb{T}_{23}(\bar v_{\rm ii})
T_{12}(\bar v_{\rm i})T_{12}(\bar u_{\bar \alpha})
\,T_{22}(\bar u_{ \alpha}).
\end{multline}
Comparing this equation with \eqref{W1-2} we see that $\bar Z_3^{(1)}=-\bar Z_1$.
Similarly,
the sum \eqref{LC-2} produces the term
\begin{multline}\label{FS-6}
\bar Z_3^{(2)}=-T_{13}(u_a)\sum K(\{\bar v_{\rm i},\bar v_{ \gamma}\}|\bar u_{\bar\rm ii}) f(\bar u_{\bar\rm ii},\bar u_{\rm ii}) g(\bar v_{\mu},\bar v_{ \gamma})
g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
\\
\times
\mathbb{T}_{13}(\bar v_{ \gamma})\,\mathbb{T}_{23}(\bar v_{\mu})
T_{12}(\bar v_{\rm i})T_{12}(\bar u_{\rm ii})
\,T_{22}(\bar u_{\bar\rm ii}).
\end{multline}
Here we again relabel the subsets $\bar v_{ \gamma}\to\bar v_{\rm ii}$, $\bar v_{\mu}\to\bar v_{\bar \alpha}$, $\bar u_{\rm ii}\to\bar u_{\bar \alpha}$, and
$\bar u_{\bar\rm ii}\to\bar u_{ \alpha}$, what gives us
\begin{multline}\label{FS-66}
\bar Z_3^{(2)}=-T_{13}(u_a)\sum K(\{\bar v_{\rm i},\bar v_{\rm ii}\}|\bar u_{ \alpha}) f(\bar u_{ \alpha},\bar u_{\bar \alpha}) g(\bar v_{\bar \alpha},\bar v_{\rm ii})
g(\bar v_{\bar\rm i},\bar v_{\rm i})g(u_a,\bar v_{\rm i})
\\
\times
\mathbb{T}_{13}(\bar v_{\rm ii})\,\mathbb{T}_{23}(\bar v_{\bar \alpha})
T_{12}(\bar v_{\rm i})T_{12}(\bar u_{\bar \alpha})
\,T_{22}(\bar u_{ \alpha}).
\end{multline}
Comparing this expression with \eqref{W-2} we see that $\bar Z_3^{(2)}=-\bar Z_2$. Thus, the terms of the type \eqref{type4} do cancel them selves,
and we see that unwanted terms do not contribute to the final result.
Thus, we have proved, that the operator $Y_{a,b}(\bar u,\bar v)$ satisfies recursion \eqref{recurs-Y}.
\section*{Acknowledgements}
It is a great pleasure for me to thank my colleagues S.~Pakuliak and \'E.~Ragoucy for numerous
and fruitful discussions. This work was supported by the Russian Science Foundation under a grant 14-50-00005.
|
\section{Introduction}
\label{sec:intro}
As modern control systems increasingly rely on information and communication technology (ICT) infrastructures to exchange real-time measurements and actuator signals, their exposure to malicious cyber threats also grows: each measurement and actuator signal may be compromised and altered by a skillful cyber adversary.
Therefore, cyber security and resilience with respect to attacks are important properties of modern control systems that are tightly coupled to ICT infrastructures.
Some of the main challenges in designing cyber-secure control systems are related to: analyzing the risk of cyber attacks; devising protection mechanisms to prevent and remove high-risk threats; and also to timely detect and mitigate on-going attacks. While the first two challenges relate to conventional ICT cyber security approaches ({\it i.e., } risk management~\cite{teixeira+15}), the third approach is closely related to the well-known control field of fault diagnosis. Although both relate to detecting anomalies, there exist subtle differences between classical fault diagnosis and attack detection in cyber security.
Classical control-theoretic approaches to anomaly detection ({\it e.g., } fault detection, isolation, and identification) typically deal with independent disturbances and faults; thus they typically do not consider possibly colluding malicious cyber attacks, which may even attempt to hide the attacks by mimicking physical disturbances and faults. In fact, this paper addresses the latter scenario, discussing detectability conditions of sparse attacks that may be masked by plausible disturbances, and connecting the results to fundamental limitations well-known in the controls literature, in terms of fault detection and identification~\cite{ding08} and input reconstruction~\cite{patton+99}.
The topic of cyber-secure control systems has been receiving increasing attention recently. An overview of existing cyber threats and vulnerabilities in networked control systems is presented in \cite{cardenas+08,Teixeira_Automatica2015}. Rational adversary models are highlighted as one of the key items in security for control systems, thus making adversaries endowed with intelligence and intent, as opposed to faults. Therefore, these adversaries may exploit existing vulnerabilities and limitations in the traditional anomaly detection mechanisms and remain undetected, or indistinguishable from disturbances and process noise. In fact,~\cite{pasqualetti+13} uses such fundamental limitations to characterize a set of undetectable attack policies for networked systems modeled by differential-algebraic equations. Related undetectable attack policies were also considered in \cite{Teixeira_Automatica2015,smith+15}. A common thread within these approaches is that undetectable attacks are constrained to be entirely decoupled from the anomaly detector's output.
Detectability conditions of undetectable false-data injection attacks to control systems are closely examined in~\cite{Teixeira_Allerton2012}, where it is shown that mismatches between the system's and the attack policy's initial conditions may lead to detectable attacks. Additionally, modifications to the system dynamics, input, and output matrices that reveal stealthy data attacks were also characterized.
Other work has analyzed undetectable attacks with respect to the amount of effort they require, {\it i.e., } the number of attack signals that must be injected by the adversary to remain undetected. As discussed in~\cite{teixeira+15}, such analysis provides insight into the likelihood of such attacks occurring, which is a core component of determining the risk ({\it i.e., } impact and likelihood) of such threat scenarios.
For static systems,~\cite{sandberg+10} first proposed a security index for measurement attacks, which corresponds to the minimum number of measurements that need to be corrupted as to ensure undetectability. The computation of the security index involves solving an NP-hard problem, in general, which has later been investigated by~\cite{sou+12,hendrickx+14,kosut14,yamaguchi+15}.
Under certain structures of the problem, this work proposed efficient algorithms to compute the security index in polynomial time.
Related problems have been investigated for dynamical systems. The work in~\cite{fawzi+14} characterizes the number of corrupted sensor channels that cannot be detected during a finite time-interval. For sensor attacks that can be detected, a resilient state estimation scheme inspired by compressed sensing is proposed. The work in~\cite{sundaram+11} explored the notion of strong observability to characterize the conditions for which the initial state can be recovered under the presence of sparse unknown input signals. For sensor attack scenarios, \cite{chen+15} determines the
smallest number of sensors needed for undetectable attacks. The notion of security index for dynamical system under sensor and actuator attacks was also extended to dynamical systems at steady-state and for finite-time intervals in~\cite{teixeira+13}.
This work investigates the notion of security index for dynamical systems under both attacks and disturbances. In particular, we consider the case where attacks are said to be undetectable if they can be masked (explained) by a disturbance signal. The formulation of the security index is related to well-known limitations in the fault detection literature, and the complexity of computing these indices for special cases is discussed and related to the literature. For detectable attacks, the concept of identifiable attacks is defined, as well as a weaker notion of identifiability where only certain entries of the attack signal can be uniquely determined. Connections between these definitions and the security index are investigated, based on which attacks with sufficiently high sparsity are shown to be identifiable. Finally, for identifiable attacks, an attack reconstruction procedure is proposed.
The outline of this paper is as follows. The dynamical system under the influence of disturbances and attacks is described in Section~\ref{sec:prel}, where undetectable attacks, potentially masked by disturbances, are defined. Section~\ref{sec:index} formulates the security index for dynamical systems under the influence of both disturbances and attacks, and discusses important special cases and their connection to the literature.
The role of security indices in (possibly partial) attack identification under disturbances is examined in Section~\ref{sec:identification}, whereas concluding remarks are given in Section~\ref{sec:conclusion}.
\subsubsection*{Notation}
For a set $I$, $|I|$ denotes its cardinality. For a vector $a\in\mathbb{C}^m$, we denote
its $i$-th element by $a_i$. By $a^i \in \mathbb{C}^m$, we mean a vector whose $i$-th element is non-zero, {\it i.e., } $a_i \neq 0$, and the other elements are arbitrary.
The support of $a\in\mathbb{C}^m$, $\text{supp}(a)$, is the set of indices $i$ where $a_i \neq 0$, and $\|a\|_0:=|\text{supp}(a)| $ is the number of non-zero elements in $a$. Similar notations are used for discrete-time signals $a$, where $a(k)\in\mathbb{C}^m$, $k=0,1,2,\ldots$ A discrete-time linear system $G\in\mathcal{R}_p^{p\times m}(z)$ has a rational proper transfer matrix $G(z)$ of dimension $p \times m$. We also define ${\mathrm{normalrank}\,} [G(z)] := \max_z {\mathrm{rank}\,} [G(z)]$.
\section{Preliminaries}
\label{sec:prel}
Let us consider the discrete-time system $y=G_d d + G_a a$, $G_d\in\mathcal{R}_p^{p\times o}(z)$ and $G_a\in\mathcal{R}_p^{p\times m}(z)$, with a realization
\begin{equation}
\begin{aligned}
x(k+1) & = Ax(k) + B_d d(k) + B_a a(k) \\
y(k) & = Cx(k) + D_d d(k) + D_a a(k),
\end{aligned}
\label{eq:G}
\end{equation}
for times $k =0,1,2\ldots$
Here $x(k)\in {\mathbb{R}}^n$ is the state vector, $d(k)\in{\mathbb{R}}^o$ are unknown disturbance (or fault) signals, $a(k)\in{\mathbb{R}}^{m}$ are potential attack signals, and $y(k)\in{\mathbb{R}}^{p}$ are the measurements available to the operator of the system.
Additionally, we assume to have distinct measurement, attack, and disturbances signals, in the sense that
\begin{equation*}
\begin{aligned}
{\mathrm{rank}\,}\begin{bmatrix}
B_d \\
D_d
\end{bmatrix} &= o,\quad
{\mathrm{rank}\,}\begin{bmatrix}
B_a \\
D_a
\end{bmatrix} = m, \quad
{\mathrm{rank}\,} \left[C\right] = p.
\end{aligned}
\end{equation*}
It turns out that the value of the initial state, $x(0)$, is important in the following, but initially we will let it be a free variable.
The system model \eqref{eq:G} is similar to those studied in the fault detection and diagnosis literature, see, {\it e.g., } \cite{patton+99,ding08}. The signals $d$ and $a$ represent different types of anomalies that can occur in the system, although of different nature. We next want to determine when we can detect and distinguish between these anomalies.
We could think of $d$ as natural disturbances, or faults, that are to be expected, and that have no malicious intent. They could represent measurement and process noise, for example. One important aspect is that a malicious attacker could use such disturbances to hide his or her attack $a$ from being seen in the output $y$. We will typically let $d$ be a free variable, where the only available knowledge about the disturbance signals amounts to their signature matrices, $B_d$ and $D_d$. Thus, to ensure robustness with respect to disturbances, an anomaly detection algorithm wishing to detect potential attack signals must be designed so that it is decoupled from $B_d$ and $D_d$.
Under this disturbance model, we check whether a disturbance exists that will "mask" the attack. If this is the case, the operator is not able to distinguish between attacks and disturbances, and cannot conclude whether an attack is present, or not.
\begin{rem}
Naturally, several other disturbance models exist, such as assuming known upper bounds on the disturbance signal's energy or instantaneous peak, or constraining the disturbance to belong to a given class of signals, {\it e.g., } constant or sinusoidal signals. In particular, the results in this paper can be straightforwardly extended to disturbances modeled as the output of an autonomous discrete-time system
\begin{equation*}
\begin{aligned}
x_d(k+1) & = A_d x_d(k) \\
d(k) & = C_d x_d(k),
\end{aligned}
\label{eq:Disturbance}
\end{equation*}
which is parametrized by a free initial condition $x_d(0)$.
\end{rem}
The attack can potentially occur in $m$ different locations in the system ($a(k)\in\mathbb{R}^m$), and we will be concerned about the possibility for the operator with access to the above model and the signal $y$ to detect an attack signal $a\neq 0$. We make the following definitions to formalize these ideas.
\begin{defn}
An attack signal $a$ is \emph{persistent} when $a(k) \not \rightarrow 0$ as $k\rightarrow \infty$.
\end{defn}
In this paper, we are mainly concerned with persistent attacks, since they have non-vanishing impact.
\begin{defn}
A (persistent) attack signal $a$ is
\begin{itemize}
\item[(i)] \emph{undetectable} if there exists a simultaneous (masking) disturbance signal $d$ and initial state $x(0)$ such that $y(k)=0$, $k\geq 0$;
\item[(ii)] \emph{asymptotically undetectable} if there exists a simultaneous (masking) disturbance signal $d$ and initial state $x(0)$ such that $y(k)\rightarrow 0$, $k\rightarrow \infty$.
\end{itemize}
\end{defn}
Note that the definition of undetectable attacks is the same as in~\cite{pasqualetti+13}, if we assume there are no disturbances in the system~\eqref{eq:G}. The reason for calling the disturbance "masking" comes from linearity of the system: If $0=G_a a + G_d d$, then clearly $y=G_a a = -G_d d$, and it is impossible to in the output distinguish between the undetectable attack and the masking disturbance, if they occur by themselves without the other.
We will next be interested in quantifying the minimal resources needed by the attacker to achieve undetectability, when he or she want to target a specific attack element $a_i$, $i\in\{1,\ldots,m\}$. Hence, we will search for sparse signals $a^i$ satisfying the above conditions.
\section{The Dynamical Security Index}
\label{sec:index}
For an attack signal $a$ to be undetectable, we need to ensure there exists a masking disturbance $d$ and an initial state $x(0)$ resulting in zero output. Existence of such a signal can easily be checked by considering the matrix pencil (the Rosenbrock system matrix)
\begin{equation*}
P(z) = \begin{bmatrix} A-zI & B_d & B_a \\ C & D_d & D_a \end{bmatrix},
\end{equation*}
see~\cite{ZDG96}. An attack signal $a(k)=z_0^k a_0$, $a_0\in\mathbb{C}^m$, $z_0\in\mathbb{C}$, is undetectable iff there exists
$x_0\in\mathbb{C}^n$ and $d_0\in\mathbb{C}^o$ such that
\begin{equation}
P(z_0)\begin{bmatrix} x_0 \\ d_0 \\ a_0\end{bmatrix} = 0, \label{eq:z0}
\end{equation}
{\it i.e., } $P(z_0)$ should not have full column rank. The undetectable attack is also persistent iff $|z_0|\geq 1$.
\begin{rem}
Note that, if the initial state $x(0)\neq x_0$, the attack signal $a(k)=z_0^k a_0$ may actually be detectable. Following the analysis in~\cite{Teixeira_Allerton2012}, if $A$ is Schur ($\rho(A)<1$), the attack signal is only \emph{asymptotically} undetectable, since there will be a vanishing transient visible in the output. This transient can be made arbitrarily small by the attacker choosing $a_0$ small. Hence, the difference between asymptotically undetectable and undetectable attacks may not be very large in practice.
\end{rem}
If the attacker would like to target the element $i$, {\it i.e., } $a_i\neq 0$, and remain undetected, he or she needs to
find a vector $a_0^i\in\mathbb{C}^m$
satisfying \eqref{eq:z0}. In general, this may require the attacker to target several elements
$a_j$, $j\neq i$. To measure the minimal number of elements required to achieve this, we introduce the following \emph{security index} $\alpha_i$, which generalizes a concept first introduced for non-dynamical systems in \cite{sandberg+10}:
\begin{equation}
\begin{aligned}
\alpha_i := & \min_{|z_0|\geq 1,x_0,d_0,a_0^i} && \|a_0^i\|_0 \\
& \mathrm{subject \, to} & & P(z_0)\begin{bmatrix} x_0 \\ d_0 \\ a_0^i\end{bmatrix} = 0.
\end{aligned}
\label{eq:alpha}
\end{equation}
Note that for all $i$ it holds $\alpha_i \geq 1$, and if there is no feasible solution, we define $\alpha_i = +\infty.$
Note also that this is a combinatorial optimization problem, because of the objective function $\|a_0^i\|_0$,
and in general is hard to solve~\cite{hendrickx+14}. However, in several cases of interest, it has a simple solution, as discussed below.
We can think of the signals $a^i(k)= z_0^k a_0^i$ resulting from \eqref{eq:alpha}
as the sparsest possible persistent undetectable attacks against an element $i$.
These signals should be of interest to both the operator and the attacker, in the sense that they show how the attacker can modify the solutions to the system equations~\eqref{eq:G}, without modifying the measurable output $y$. Also, if the number $\alpha_i$ is large, it indicates that it will require significant coordinated resources by the attacker to accomplish undetectable attacks against $a_i$.
An operator can thus use the
index in performing a quantitative risk assessment, as illustrated in, {\it e.g., } \cite{teixeira+15}. The index $\alpha_i$ also has implications for the possibility of the operator to reconstruct ("identify") a detectable attack $a^i$, as will be further explored in Section~\ref{sec:identification}.
\begin{rem}
There are some concepts in the literature that are similar to $\alpha_i$ above.
In power system observability analysis, a related concept is that of critical $k$-tuples, see, {\it e.g., } \cite{sou+12}. For sensor attack scenarios, \cite{chen+15} determines the
smallest number of sensors needed for undetectable attacks. There are also close connections to the spark of a matrix, used in compressed sensing, see, {\it e.g., } \cite{donoho+03}. Also, in \cite{teixeira+13}, an optimization problem related to \eqref{eq:alpha} was studied.
Some further connections are made in the special cases considered in the following subsections.
\end{rem}
\subsection{Critical Attack Signals ($\alpha_i = 1$)}
A particularly serious situation is when $\alpha_i=1$, since the attacker then can target element $i$ undetected without the need to access any other resources. Let us denote
\begin{equation*}
\begin{aligned}
P_i(z) & = \begin{bmatrix} A-zI & B_d & B_{a,i} \\ C & D_d & D_{a,i} \end{bmatrix} \in\mathbb{C}^{(n+p)\times (n+o+1)}, \\
P_d(z) & = \begin{bmatrix} A-zI & B_d \\ C & D_d \end{bmatrix} \in\mathbb{C}^{(n+p)\times (n+o)},
\end{aligned}
\end{equation*}
where $B_{a,i},D_{a,i}$ are the $i$-th columns of $B_a,D_a$.
If there is a $z_0\in\mathbb{C}$, $|z_0|\geq 1$, such that
\begin{equation*}
{\mathrm{rank}\,} [P_d(z_0)] = {\mathrm{rank}\,} [P_i(z_0)],
\end{equation*}
then $\alpha_i= 1$. An even more serious situation occurs when
\begin{equation}
{\mathrm{normalrank}\,} [P_d(z)] = {\mathrm{normalrank}\,} [P_i(z)].
\label{eq:seriousrank}
\end{equation}
If this easily checked condition is fulfilled, it is possible to find an undetectable attack signal $a^i(k)=z_0^k a_0^i $ of cardinality one, using any complex frequency $z_0$.
Note that \eqref{eq:seriousrank} holds when there are many disturbances in relation to the number of available measurements,
{\it i.e., } $o\geq p$.
\subsection{Transmission Zeros}
If the Rosenbrock system matrix $P(z)$ has full column normal rank and the realization is minimal, the only solutions to \eqref{eq:z0} that exist correspond to the system's finite number of transmission zeros, see, {\it e.g., } \cite{ZDG96}. Hence, to find $\alpha_i$ we only need to inspect the corresponding system zero directions. When the zero directions are all one-dimensional, the computation of $\alpha_i$ becomes especially simple. Generically, one would expect the zero directions to be one-dimension, but there are several interesting situations where this is not the case, as we shall see below (although these will be invariant zeros, and not transmission zeros).
\subsection{Sensor Attacks}
\label{sec:sensattack}
The situation where the system is subjected to sensor attacks have received particular interest in the literature, see, {\it e.g., } \cite{fawzi+14,chen+15,lee+15}. In this case we have $B_d=B_a=0$, and in \eqref{eq:z0} we only need to consider $z_0\in\{\lambda_1(A),\ldots,\lambda_n(A)\}$, {\it i.e., } the eigenvalues of $A$, where $x_0$ are eigenvectors of $A$. If the eigenvalues are simple, the eigenspace corresponding to each eigenvalue is one-dimensional, and again the computation of $\alpha_i$ is simplified.
As a further special case, suppose all sensors are potentially attackable and there are no disturbances, and so $D_a=I_p$ and $D_d=0$. Also suppose that
the operator has high redundancy in the system in the sense that
the realization \eqref{eq:G} is observable using any one of the outputs $y_i$, $i\in\{1,\ldots,p\}$, by itself.
Considering the PBH test~\cite{ZDG96}, this means that any one of the eigenmodes $z_0^kx_0$ is visible in all the sensors, and all elements in the vector $C x_0$ are non-zero. Thus an undetectable attack ($Cx_0+a_0^i=0)$ must involve all the signals in $a$, and for all $i$ the security index must be $\alpha_i = m = p$ (or $\alpha_i = +\infty$ if $A$ is Schur).
Hence, one way to make undetectable attacks hard is to
install many redundant sensors, each of which with the individual power to observe the entire system state with little noise, which is in agreement with \cite{fawzi+14}.
\subsection{Sensor Attacks for Static Systems}
If we assume $A=I$, $B_d=B_a=D_d=0$ (only sensors attacked), we have essentially recovered the original security index $\alpha_i$, as defined in \cite{sandberg+10}. The motivation for the index there was to quantify the vulnerability of power system state estimators to false data injection attacks. Note that because $A=I$ and $B_d=B_a=0$, this problem only concerns systems in steady-state. Perhaps one would think that this makes the problem \eqref{eq:alpha} easier, but in fact the problem can be significantly harder in practice. This is because the dimension of the eigenspace corresponding to the sole eigenvalue is of dimension $n$, and not one-dimensional as is frequently the case in the previous examples.
Intuitively, one can understand this since the attacker here has no constraints in time to fulfill and thus has many more options for being undetectable. This fact together with the potentially high dimension $n$ in a power system has spurred several investigations on the efficient computation of $\alpha_i$. The problem in general is NP-hard~\cite{hendrickx+14}, but in the examples deriving from power systems the matrix $C$ has a useful structure that can be exploited. In particular, \cite{hendrickx+14,kosut14,yamaguchi+15} show how max-flow min-cut algorithms can be used to solve the problem in polynomial time.
Under slightly different assumptions on the structure of $C$, \cite{sou+13} shows how $\ell_1$-relaxation can also exactly solve the problem in polynomial time.
\section{Attack Identification and Decoupling}
\label{sec:identification}
In this section, we turn to the related problem of attack identification, which concerns the
possibilities to reconstruct elements of an attack signal from the measured output.
\subsection{Attack Identification}
To formalize the attack identification problem, the following definitions are made.
\begin{defn}
A (persistent) attack signal $a$ is
\begin{itemize}
\item[(i)] \emph{identifiable} if for all attack signals $\tilde a\neq a$, and all corresponding disturbances $d$ and $\tilde d$ and initial states $x(0)$ and $\tilde x(0)$, we have $\tilde y \neq y$;
\item[(ii)] \emph{asymptotically} \emph{identifiable} if for all attack signals $\tilde a(k)\not\rightarrow a(k)$, and all corresponding disturbances $d$ and $\tilde d$ and initial states $x(0)$ and $\tilde x(0)$, we have $\tilde y(k)\not \rightarrow y(k)$, as $k\rightarrow \infty$.
\end{itemize}
\end{defn}
Identifiable attack signals $a$ excite the output $y$ in a unique way that cannot be achieved by any other attack $\tilde a$.
This is equivalent to the system possessing a certain left inverse, as will be explored in Section~\ref{sec:decouple}.
Note that identifiability of $a$ is a much stronger requirement than detectability of $a$ (which means that the attack $a$ is such that $y\neq 0$ for all disturbances $d$ and initial states $x(0)$). Since identifiability is such a strong requirement, we will also be interested in the following weaker notion.
\begin{defn}
A (persistent) attack signal $a$ is
\begin{itemize}
\item[(i)] $i$-\emph{identifiable} if for all attack signals $\tilde a$ with $\tilde a_i\neq a_i$, and all corresponding disturbances $d$ and $\tilde d$ and initial states $x(0)$ and $\tilde x(0)$,
we have $\tilde y \neq y$;
\item[(ii)] \emph{asymptotically} $i$-\emph{identifiable} if for all attack signals $\tilde a$ with $\tilde a_i(k)\not\rightarrow a_i(k)$, and all corresponding disturbances $d$ and $\tilde d$ and initial states $x(0)$ and $\tilde x(0)$, we have $\tilde y(k)\not \rightarrow y(k)$, as $k\rightarrow \infty$.
\end{itemize}
\end{defn}
This notion is weaker than identifiability since an attack $a$ can be $i$-identifiable even if there exists
another attack $\tilde a \neq a$, with $a_i=\tilde a_i$, such that $y=\tilde y$.
Hence, $i$-identifiability concerns only the sensitivity of the output $y$ with respect to
the $i$-th element in $a$. Identifiability is therefore the same as $i$-identifiability for all $i$.
Interestingly, there is a tight connection between detectability, identifiability, and the
previously introduced security index.
\begin{thm}
Suppose that the initial state $x(0)$ is unknown to the operator (and can take any value), and that the attacker can manipulate at most $q$
attack elements simultaneously ($\|a\|_0\leq q$).
\begin{itemize}
\item[(i)] There exists persistent undetectable attacks $a^i$ iff $q\geq \alpha_i$;
\item[(ii)] All persistent attacks are $i$-identifiable iff $q < \alpha_i/2$;
\item[(iii)] All persistent attacks are identifiable iff $q < \min_i \alpha_i/2$.
\end{itemize}
\label{thm:alpha}
\end{thm}
\begin{proof}
(i): Follows directly from the definition of $\alpha_i$, where we pick $x(0)=x_0$.
(ii): Consider first two attacks $a$ and $\tilde a$, both of cardinality $q<\alpha_i/2$, such that $a_i\neq \tilde a_i$. Let $y=G_d d +G_a a$ and $\tilde y = G_d \tilde d + G_a \tilde a$ and suppose that $y = \tilde y$, in contradiction to the theorem. This implies that $0 = G_d (d-\tilde d)+ G_a (a-\tilde a)$. Since $a_i\neq \tilde a_i$, the attack signal $a-\tilde a$ would constitute an undetectable attack against element $i$. Furthermore,
the cardinality of this signal is strictly smaller than $\alpha_i/2 + \alpha_i/2$, which is a contradiction to the optimality of security index $\alpha_i$. Hence, we must have $\tilde y \neq y$, and the attack $a$ is $i$-identifiable. Conversely, assume that
$q\geq \alpha_i/2$ and let us construct two attacks $a$ and $\tilde a$ that are not $i$-identifiable. Suppose first that $\alpha_i$ is even and that $q=\alpha_i/2$. There exists an undetectable attack $a^\star$, targeting element $i$, with support in an index set $I$, $|I|=\alpha_i$. Thus $0 = G_d d^\star + G_a a^\star$.
Let us split $I$ into two disjoint sets, $J$ and $K$ of equal size, $I=J\cup K$, $|J|=|K|=\alpha_i/2$. In a corresponding manner we can make the split $a^\star = a - \tilde a$, where $a$ and $\tilde a$ have support in $J$ and $K$, respectively. It is now clear that
$0 \neq y = G_d d^\star + G_a a = G_a \tilde a = \tilde y$, and since $a_i\neq \tilde a_i$ this is an example of a non $i$-identifiable attack $a$. A similar argument can be applied when $\alpha_i$ is odd, concluding the proof.
(iii): Follows since identifiability is the same as $i$-identifiability for all $i$.
\end{proof}
In some cases it may be more realistic to assume that the operator actually knows the
initial state of the system~\eqref{eq:G}. We can then state the following corollary to the above theorem, which
applies in the asymptotic limit when $k\rightarrow \infty$.
\begin{cor}
Suppose that $A$ is Schur, that the initial state $x(0)$ is known to the operator, and that the attacker can manipulate at most $q$
attack elements simultaneously ($\|a\|_0\leq q$).
\begin{itemize}
\item[(i)] There exists persistent asymptotically undetectable attacks $a^i$ iff $q\geq \alpha_i$;
\item[(ii)] All persistent attacks are asymptotically $i$-identifiable iff $q < \alpha_i/2$;
\item[(iii)] All persistent attacks are asymptotically identifiable iff $q < \min_i \alpha_i/2$.
\end{itemize}
\label{cor:q}
\end{cor}
\begin{proof}
The only difference to the proof of Theorem~\ref{thm:alpha}
is that we need to add a transient term $y_\text{trans}(k) = CA^{k}(x(0)-x_0)$
to all outputs, see~\cite{Teixeira_Allerton2012}. Here $x_0$ is an initial state rendering the relevant attack undetectable.
Since $\rho(A)<1$ by assumption, this term decays to zero exponentially and the asymptotic results follow.
\end{proof}
We note that other papers have previously pointed out the connection
between detectability and identifiability of attacks, see, {\it e.g., } \cite{pasqualetti+13}. The main contribution here is to introduce $i$-identifiability and show the relation to the security index $\alpha_i$.
As an example, assume that $\alpha_1 = 1$, $\alpha_2 = 3$, and that $q=1$. Then there will exist attacks against $a_1$ that are not visible in $y$, but all attacks against $a_2$ will not only be visible but also identifiable through $y$.
How to possibly conduct the identification is discussed next.
\subsection{Decoupling the Attacks from the Disturbances}
\label{sec:decouple}
To identify attacks $a$ in the output $y$, there are several useful results in the fault detection literature, see, {\it e.g., } \cite{patton+99,ding08}. In particular, we will use a result on the existence of decoupling filters, which isolate the influence of the attack from that of the disturbance. A key result towards identification is the existence of certain left inverses.
\addtolength{\textheight}{-5.5cm}
\begin{defn}
\label{def:leftinv}
Consider the linear system $y=Gu$ with $m$ inputs, $p$ outputs, and with realization
\begin{equation*}
\begin{aligned}
x(k+1) & = Ax(k)+Bu(k) \\
y(k) & = Cx(k) + Du(k).
\end{aligned}
\end{equation*}
Then
$G$ has a \emph{left inverse} when $y(k)=0$, $k\geq 0$, implies that $u(k)=0$, $k \geq 0$, provided $x(0)=0$.
\end{defn}
The following condition for existence of a left inverse is well known, see, {\it e.g., } \cite{moylan77,hou+98}.
\begin{lem}
\label{lem:leftinv}
A linear system $G\in\mathcal{R}_p^{p\times m}(z)$
has a \emph{left inverse} iff ${\mathrm{normalrank}\,} G(z)=m$.
\end{lem}
From fault detection \cite{ding08}, it is known that if $G_d,G_a\in \mathcal{R}_{p}(z)$ and
\begin{equation}
\begin{aligned}
{\mathrm{normalrank}\,} [G_d(z)] & = m', \\ {\mathrm{normalrank}\,} [G_d(z)\,\, G_a(z)] & = m'+m'',
\end{aligned}
\label{eq:rankcond}
\end{equation}
then there exists a post-filter $R\in \mathcal{R}_{p}^{p\times p}(z)$ (of full normal rank) such that we can decouple the effects of the attacks and the disturbances in the following way:
\begin{equation}
\begin{bmatrix} r \\ y' \end{bmatrix} =R(G_d d+ G_a a) = \begin{bmatrix} 0 & \Delta \\ G_d' & G_a' \end{bmatrix} \begin{bmatrix} d \\ a \end{bmatrix},
\label{eq:decouple}
\end{equation}
where ${\mathrm{normalrank}\,} [G_d'(z)]= {\mathrm{normalrank}\,} [G_d'(z) \, G'_a(z)] = m'$ and ${\mathrm{normalrank}\,} [\Delta(z)]=m''$. Note that if all attacks are undetectable in the sense of \eqref{eq:seriousrank}, then $m''=0$, and
$\Delta$ will be the empty matrix. On the other hand, if for some $i$, $\alpha_i>1$, then $m''>0$ and there is a non-trivial system $\Delta$.
The residual signal $r$ is only influenced by the attack $a$, and we can use it to detect and potentially identify $a$. Notice that for all attacks $a$ there exists a disturbance $d$ such that $0=y'=G_d'd+G_a'a$, so that $r=\Delta a$ is the only reliable source of information in regards to $a$. We have the following proposition on the relation between the measured output $y$ and
the filtered version $r$.
\begin{prop}
Let the initial state of the decoupling filter $R$ be chosen to $x_R(0)=0$. Suppose the initial state $x(0)$ is unknown to the operator (and can take any value), and that the attacker can manipulate at most $q$
attack elements simultaneously ($\|a\|_0\leq q$).
\begin{itemize}
\item[(i)] There exists persistent undetectable attacks $a^i$ in the signal $r$ iff $q\geq \alpha_i$;
\item[(ii)] All persistent attacks are $i$-identifiable in the signal $r$ iff $q < \alpha_i/2$;
\item[(iii)] All persistent attacks are identifiable in the signal $r$ iff $q < \min_i \alpha_i/2$.
\end{itemize}
\label{prop:R}
\end{prop}
\begin{proof}
Recalling that $R$ has full normal rank, we can use Lemma~\ref{lem:leftinv} and Definition~\ref{def:leftinv} to conclude that
$Ry=0$ is equivalent to $y=0$. Since there is always a $d$ such that $y'=0$ in \eqref{eq:decouple},
the undetectability and identifiability properties of $a$ in $y=G_d d+G_a a$ must
carry over to the relation $r=\Delta a$, to which we can apply Theorem~\ref{thm:alpha}.
\end{proof}
If we suppose that $q<\min_i \alpha_i/2$, all persistent attacks are identifiable.
A procedure to identify $a$ could include the following steps (we leave the details for future work):
First apply the post-filter $R$ to $y$ to obtain the relation $r = \Delta a$. The initial state $x(0)$ is unknown, and could cause a non-zero transient in $r$ even in the absence of an attack $a$. However, the dynamics of the transients are known, and can be filtered out from $r$ to obtain a new transient-free residual $r'$. The signal $r'$ is identically zero if $r$ can be completely explained by a transient $y_\text{trans}(k) = CA^{k}x(0)$.
Undetectable attacks could also be also "hiding" in the transient, and by forming $r'$ the visible effects of such possible attacks also disappear. However, since we know that $q<\min_i \alpha_i$, there are no such persistent attacks affecting $a$, and so to identify $a$ we can equally well use the relation $r' = \Delta a$, where the initial state of $\Delta$ is zero, $x_\Delta(0)=0$.
To find $a$, we can form the systems $\Delta_I:=[\Delta_i]_{i\in I}$ out of the columns $\Delta_i$ of $\Delta$, for all subsets
$|I|\leq q$, $I\subseteq \{1,\ldots,m\}$. Since all attacks are identifiable, these $\Delta_I$ are left invertible, and give each rise to an attack estimation $\hat a_I$. From identifiability of $a$ it follows that any estimate $\hat a_I$
satisfying $r'=\Delta \hat a_I$ is actually equal to the real persistent attack $a$, which concludes the procedure.
Note that the real bottleneck here is the number of systems $\Delta_I$ that need to be formed and inverted. The problem is in fact essentially the same as in compressed sensing, see, {\it e.g., } \cite{donoho+03}. Finally, we remark that the procedure can be modified to handle attacks that are only $i$-identifiable, but the estimates $\hat a_I$ will then only necessarily correctly identify element $a_i$.
\section{Conclusion}
\label{sec:conclusion}
In this paper, we have studied detectability and identifiability of attacks on dynamical systems that are also subjected
to disturbances. For this purpose, we generalized the concept of security index, which was previously introduced for
static systems in~\cite{sandberg+10}. In particular, the index exactly quantifies the resources necessary for targeted attacks to be undetectable and unidentifiable in the presence of disturbances.
Such information is relevant for both risk assessment and for the design of anomaly detectors.
We also discussed how these concepts relate to recent other work on attack detection and identification. Finally, we showed how techniques from the fault detection literature can be exploited to identify attacks under certain sparsity constraints.
\bibliographystyle{IEEEtran}
\input{SoSCYPS_Sandberg_Teixeira.bbl}
\end{document}
|
\section{Introduction}
Many problems of science and engineering lead to different types of differential equations and it is still very hard to solve them in the presence of strong nonlinearity.
In order to cope with this issue, there has been much attention devoted to investigate better and more efficient solution techniques such as homotopy decomposition method \cite{atangana2013analytical,atangana2013solving}, auxiliary equation method \cite{pinar2015observations,pinar2015analytical},homotopy perturbation method \cite{sakar2016numerical,elbeleze2013homotopy},Taylor collocation method \cite{bildik2015comparison,deniz2014comparison,sezer1994taylor},Sumudu transform method\cite{bulut2013analytical} and Adomian decomposition method \cite{bulut2004numerical,abbasbandy2003improving,bildik2006use,bildik2006solution}.
Emden-Fowler equation is one of the most important differential equations of mathematical physics. It distinctively characterizes many scientific phenomena. The generalized Emden-Fowler equation is defined in the following form
\begin{equation}\label{Generalform}
{y}''+\alpha (x){y}'+\beta (x)\gamma (y)=0
\end{equation}
\noindent where $\alpha (x),\beta (x),\gamma (y)$ are some arbitrary functions.For different $\gamma(y)$, the Eq. (\ref{Generalform}) has been subject of many studies in the literature such as the theory of stellar structure, thermionic currents and isothermal gas spheres. When $\alpha (x)=\frac{k}{x},\beta (x)={{\beta }_{0}}{{x}^{r}},\gamma (y)={{y}^{s}}$ ($k$ and ${{\beta }_{0}}$ are constants, $s$ and $r$ are real numbers), Eq.(\ref{Generalform}) reduces to the classic Emden-Fowler equation:
\begin{equation}\label{classicEmdenFowlerequation}
{y}''+\frac{k}{x}{y}'+{{\beta }_{0}}{{x}^{r}}{{y}^{s}}=0.
\end{equation}
\noindent Furthermore, by choosing $r=0$ and $k=2$ , we get the standard Lane-Emden equation
\begin{equation}\label{standardLaneEmdenequation}
{y}''+\frac{2}{x}{y}'+{{\beta }_{0}}{{y}^{s}}=0
\end{equation}
\noindent which arises in astrophysics. Eq. (\ref{classicEmdenFowlerequation}) is also used to model the thermal behavior of a spherical cloud of gas acting under the mutual attraction of its molecules. Many analytical techniques have been considered by various researchers to obtain the approximate solutions for these types of equations \cite{liao2003new,he2003variational,parand2010approximation,wong1975generalized}.
Perturbation iteration method has been developed recently by Pakdemirli et al and it has been successfully implemented to some strongly nonlinear systems\cite{aksoy2010new,aksoy2012new,csenol2013perturbation,timuccin2013new}.In this paper, new optimal perturbation iteration algorithms(OPIA) are constructed based on perturbation iteration method. Then the simplest OPIA is applied to obtain reliable approximate solutions to the Lane-Emden equations
\begin{equation}\label{LaneEmdenequation}
{y}''+\frac{2}{x}{y}'+\beta (x)\gamma (y)=0
\end{equation}
with different choices of $\beta(x),\gamma(y)$. It is also proved that this method enables us to control the convergence of solution series for the given illustrations.
\section{Optimal Perturbation Iteration Algorithms}
In this section, the following formulation is given to explain the basic concept of OPIAs for second order differential equations.
\textbf{(a)} Write the governing differential equation as:
\begin{equation} \label{governingdifferential}
F({y}'',{y}',y,\varepsilon )=A(y)+g(x)=0
\end{equation}
\noindent where $\varepsilon$ is the auxiliary perturbation parameter, $y=y(x)$ is the unknown function and $g(x)$ is the source term. Furthermore,(\ref{governingdifferential}) can be decomposed into $A(y)=L(y)+N(y)$ where $L,N$ are linear and nonlinear parts respectively. Here we have a great freedom to choose linear part $L$.
\vglue0.2cm
\textbf{(b)} Approximate solution is taken as
\begin{equation} \label{approximatesolution}
{y_{n+1}}={y_{n}}+\varepsilon{\left( {y_c} \right)}_{n}
\end{equation}
\noindent with one correction term in the perturbation expansion. Substituting the Eq. (\ref{approximatesolution}) into (\ref{governingdifferential}) and expanding Taylor series will create the algorithms. OPIAs are classified with respect to the degrees of derivatives in the Taylor expansions($m$). Briefly, this process is represented as OPIA-$m$. OPIA-1 and OPIA-2 are constructed below.
\vglue0.2cm
\textit{\underbar{OPIA-$1$ }}\underbar{}
\vglue0.2cm
\noindent Inserting (\ref{approximatesolution}) into the nonlinear part of the (\ref{governingdifferential}) and expanding in a Taylor series with first derivatives yields
\begin{eqnarray} \label{fOPIA1}
N({y_n}^{\prime \prime},{y_n}^{\prime},y_n,0)+N_y{(y_c)_n}\varepsilon +N_{y'}{(y_c')}_n\varepsilon+N_{y''}{(y_c'')}_n\varepsilon +N_{\varepsilon}\varepsilon=0
\end{eqnarray}
\noindent or by reorganizing
\begin{eqnarray} \label{OPIA1}
{{\left( {y_c}^{\prime \prime}\right)}_{n}}+\frac{{{N}_{{{y}'}}}}{{{N}_{{{y}''}}}}{{\left( {{y}_{c}}^{\prime } \right)}_{n}}+\frac{{{N}_{y}}}{{{N}_{{{y}''}}}}{{\left( {{y}_{c}} \right)}_{n}}=-\frac{\frac{N}{\varepsilon }+{{N}_{\varepsilon }}}{{{N}_{{{y}''}}}}.
\end{eqnarray}
\textit{\underbar{OPIA-$2$}}\underbar{}
\vglue0.2cm
\noindent Using the second order derivatives, we get
\begin{equation}
\begin{array}{l} N(y_{n} ^{''} ,y_{n} ^{'} ,y_{n} ,0)+N_{y} (y_{c} )_{n} \varepsilon+ N_{y'}(y_{c} ^{{'}})_{n} \varepsilon +N_{y''}(y_{c} ^{{'} {'} } )_{n} \varepsilon + N_{\varepsilon } \varepsilon +\frac{1}{2} \varepsilon ^{2} N_{y''y''} (y_{c} ^{{'} {'} } )_{n}^{2}
+\frac{1}{2} \varepsilon ^{2} N_{y'y'}(y_{c} ^{{'} } )_{n}^{2} +\frac{1}{2} \varepsilon ^{2} N_{yy} (y_{c} )_{n}^{2} + \\
\varepsilon ^{2} N_{y''y'} (y_{c} ^{{'} {'} } )_{n} (y_{c} ^{{'} } )_{n}+\varepsilon ^{2} N_{y'y} (y_{c} ^{{'} } )_{n} (y_{c} )_{n}
+\varepsilon ^{2} N_{y''y} (y_{c} ^{{'} {'} } )_{n} (y_{c} )_{n}+N_{\varepsilon y''} (y_{c} ^{{'} {'} } )_{n} \varepsilon ^{2}
+N_{\varepsilon y'} (y_{c} ^{{'} } )_{n} \varepsilon ^{2}+N_{\varepsilon y} (y_{c} )_{n} \varepsilon ^{2}
+\frac{1}{2} \varepsilon ^{2} N_{\varepsilon \varepsilon }=0
\end{array}
\end{equation}
\noindent or by rearranging we obtain
\begin{equation} \label{OPIA2}
\begin{array}{l} (y_{c} ^{''} )_{n} \left(\varepsilon N_{y''} +\varepsilon ^{2} N_{\varepsilon y''} \right)+(y_{c} ^{'} )_{n} \left(\varepsilon N_{y'} +\varepsilon ^{2} N_{\varepsilon y'} \right)+(y_{c} )_{n} \left(\varepsilon N_{y} +\varepsilon ^{2} N_{\varepsilon y} \right)+(y_{c} )_{n}^{2} \left(\frac{\varepsilon ^{2} }{2} N_{yy} \right)+
(y_{c} ^{''} )_{n}^{2} \left(\frac{\varepsilon ^{2}}{2} N_{y''y''} \right) \\
+(y_{c} ^{{'} } )_{n}^{2} \left(\frac{\varepsilon ^{2} }{2} N_{y'y'} \right)+(y_{c} )_{n} (y_{c} ^{'})_{n} \left(\varepsilon ^{2} N_{y'y} \right)+(y_{c} ^{{'} {'} } )_{n} (y_{c} ^{{'} } )_{n} \left(\varepsilon ^{2} N_{y'y''} \right)+(y_{c} ^{{'} {'} } )_{n} (y_{c} )_{n} \left(\varepsilon ^{2} N_{yy''} \right)=-N-N_{\varepsilon } \varepsilon -\frac{\varepsilon ^{2} N_{\varepsilon \varepsilon } }{2}. \end{array}
\end{equation}
\noindent It should be emphasized that all derivatives and functions are calculated at $\varepsilon=0$. To describe the iterative scheme, first correction terms $(y_c)_0$ can be computed from (\ref{OPIA1}) and (\ref{OPIA2}) by using an initial guess $y_0$.
The Eqs. (\ref{OPIA1}) and (\ref{OPIA2}) may seem very complicated at first, but it should not be forgotten that we use the general form of the differential equations of second order to illustrate the proposed method. Actually, most differential equations in literature contain only some of the nonlinear terms $y,y',y''$. So,the Eqs.(\ref{OPIA1}) and (\ref{OPIA2}) reduce to some simple mathematical expressions in many cases.
\vglue0.2cm
\textbf{c)} After obtaining $(y_c)_{0}$ for each OPIA-$m$, we use the following equation
\begin{equation} \label{formula}
{{y}_{n+1}}={{y}_{n}}+{{S}_{n}}(\varepsilon ){{\left( {{y}_{c}} \right)}_{n}}
\end{equation}
\noindent to increase the accuracy of the results and effectiveness of the method. Here $S_{n}(\varepsilon)$ is an auxiliary function which provides us to adjust the convergence. The choices of functions $S_{n}(\varepsilon)$ could be exponential, trigonometric,polynomial,etc. In this study, we select auxiliary function in the form
\begin{equation} \label{auxiliaryfunction}
{{S}_{n}}(\varepsilon )={{C}_{0}}+\varepsilon {{C}_{1}}+{{\varepsilon }^{2}}{{C}_{2}}+{{\varepsilon }^{3}}{{C}_{3}}+\cdots =\sum\limits_{i=0}^{n}{{{\varepsilon }^{i}}{{C}_{i}}}
\end{equation}
\noindent where $C_1,C_2,\ldots $ are constants which are to be determined later. \\
Substituting $(y_c)_{0}$ into Eq.(\ref{formula}) yields:
\begin{equation} \label{EQ13}
{{y}_{1}}={{y}_{0}}+{{S}_{0}}(\varepsilon ){{\left( {{y}_{c}} \right)}_{0}}={{y}_{0}}+{{C}_{0}}{{\left( {{y}_{c}} \right)}_{0}}.
\end{equation}
\noindent By using initial and boundary conditions , the first approximate result is obtained:
\begin{equation} \label{far}
{{y}_{1}}=y(x,{{C}_{0}}).
\end{equation}
\noindent Repeating the similar steps by using the Eq.(\ref{far}) and setting $\varepsilon=1$, other approximate results are found as:
\begin{equation} \label{ars}
\begin{array}{l} {y_2(x,{{C}_{0}},{{C}_{1}})={{y}_{1}}+{{S}_{1}}(\varepsilon ){{\left( {{y}_{c}} \right)}_{0}}={{y}_{1}}+\left( {{C}_{0}}+{{C}_{1}} \right){{\left( {{y}_{c}} \right)}_{1}}} \\
y_3(x,{{C}_{0}},{{C}_{1}},{{C}_{2}})={{y}_{2}}+\left( {{C}_{0}}+{{C}_{1}}+{{C}_{2}} \right){{\left( {{y}_{c}} \right)}_{2}} \\
\qquad \vdots \\
y_m(x,{{C}_{0}},\ldots ,{{C}_{m-1}})={{y}_{m-1}}+\left( {{C}_{0}}+\cdots +{{C}_{m-1}} \right){{\left( {{y}_{c}} \right)}_{m-1}} \end{array}
\end{equation}
\textbf{d)} Substitute $y_m$ into the Eq.(\ref{governingdifferential}) and the general problem results in the following residual:
\begin{equation} \label{residual}
R(x,{{C}_{1}},\ldots ,{{C}_{m-1}})=L\left( {{y}_{m}}(x,{{C}_{1}},\ldots ,{{C}_{m-1}}) \right)+N\left( {{y}_{m}}(x,{{C}_{1}},\ldots ,{{C}_{m-1}}) \right) +g(x).
\end{equation}
\noindent Obviously, when $R(x,{{C}_{1}},\ldots ,{{C}_{m-1}})=0$ then the approximation ${{y}_{m}}(x,{{C}_{1}},\ldots ,{{C}_{m-1}})$ will be the exact solution. Generally it doesn't occur in nonlinear equations. To obtain the optimum values of ${{C}_{1}},{{C}_{2}},\ldots $; one may use the method of least squares:
\begin{equation} \label{ls}
J({{C}_{1}},\ldots ,{{C}_{m-1}})=\int\limits_{a}^{b}{{{R}^{2}}}(x,{{C}_{1}},\ldots ,{{C}_{m-1}})dx
\end{equation}
\noindent where $a$ and $b$ are selected from the domain of the problem.
The constants ${{C}_{1}},{{C}_{2}},\ldots $ can also be defined from
\begin{equation} \label{als}
R({{x}_{1}},{{C}_{i}})=R({{x}_{2}},{{C}_{i}})=\cdots =R({{x}_{m}},{{C}_{i}})=0,i=1,2,\ldots ,m
\end{equation}
\noindent where ${{x}_{i}}\in (a,b)$. Putting these constants into the last one of the Eqs. (\ref{ars}), the approximate solution of order $m$ is determined.
\section{Applications}
In this section, we only consider OPIA-1 to solve the problems. Obtained results show that even the simplest algorithm gives better solutions when compared with many other methods.
\begin{example}
Consider the following homogeneous Lane-Emden type equation \cite{yildirim2009solutions,yildirim2007solutions}:
\begin{equation} \label{Ex1}
{y}''+\frac{2}{x}y'-(4x^2+6)y=0,y(0)=1,y'(0)=0, 0 \leq x \leq 1.
\end{equation}
\vglue0.3cm
\noindent Rewrite the Eq. (\ref{Ex1}) as:
\begin{equation} \label{Eq1}
F(y'',{y}',y,\varepsilon )={y}''+\varepsilon\left(\frac{2}{x}y'-(4x^2+6)y\right)=L(y)+N(y)=0
\end{equation}
where $L={y}''$ and $N(y)=\varepsilon\left(\frac{2}{x}y'-(4x^2+6)y\right)$. Eq. (\ref{fOPIA1}) simplifies to:
\begin{equation} \label{Eq2}
N({{y}_{n}},0)+{N_y}({y_c})_{n}\varepsilon+{N_{y'}}{({y_{c}}')}_{n}\varepsilon+{{N}_{\varepsilon }}\varepsilon =0
\end{equation}
\noindent Using the linear terms with Eqs. (\ref{approximatesolution}), (\ref{Eq2}) and setting $\varepsilon=1$ yields
\begin{equation} \label{firstalgorithm}
{(y_c)''}_n=-(y_n)''-\frac{2}{x}(y_n)'+(4x^2+6)y_n.
\end{equation}
\noindent One may select $y_0=1$ as a starting guess which satisfies the given initial conditions. Using the Eqs. (\ref{formula})and (\ref{firstalgorithm}),we have
\begin{equation}\label{frstapprsolution}
{{y}_{1}}=1+{C_0}\left(\frac{x^4}{3}+3 x^2\right).
\end{equation}
\noindent It should be emphasized that $y_1$ does not represent the first correction term; rather it is the approximate solution after the first iteration. By using the procedure mentioned in Section 2, one obtains the following approximate solutions:
\begin{equation}\label{EQ26}
y_2=1+{C_0}\left(\frac{x^4}{3}+3 x^2\right)+{\left(C_0+C_1\right)}\left[\frac{x^2}{630} \left(15 C_0 x^6+294 C_0 x^4+595 C_0 x^2-5670 C_0+210 x^2+1890\right)\right]
\end{equation}
\begin{equation}\label{thrdappr}
\begin{array}{l}
y_3=1+{C_0}\left(\frac{x^4}{3}+3 x^2\right)+{\left(C_0+C_1\right)}\left[\frac{x^2}{630} \left(15 C_0 x^6+294 C_0 x^4+595 C_0 x^2-5670 C_0+210 x^2+1890\right)\right]+\\
\begin{array}{l}
\frac{{\left(C_0+C_1+C_2\right)}x^2}{727650} \times \left[\begin{array}{l}
525 C_0^2 x^{10}+525 C_0 C_1 x^{10}+16247 C_0^2 x^8+16247 C_0 C_1 x^8+63195 C_0^2 x^6+34650 C_0 x^6+\\
63195 C_0 C_1 x^6+17325 C_1 x^6-1211133 C_0^2 x^4+679140 C_0 x^4-1211133 C_0 C_1 x^4\\
+339570 C_1 x^4-4419800 C_0^2 x^2+1374450 C_0 x^2-4419800 C_0 C_1 x^2+687225 C_1 x^2\\
+19646550 C_0^2-13097700 C_0+19646550 C_0 C_1-6548850 C_1+242550 x^2+2182950
\end{array}
\right]
\end{array}
\end{array}
\end{equation}
\noindent Unknown constants can be obtained from the residual
\begin{equation}\label{residual1}
R(x,{{C}_{0}},{{C}_{1}},{{C}_{2}})=L\left( {{y}_{3}}(x,{{C}_{0}},{{C}_{1}},{{C}_{2}}) \right)+N\left( {{y}_{3}}(x,{{C}_{0}},{{C}_{1}},{{C}_{2}}) \right)
\end{equation}
\noindent for the third order approximation. Using the Eq. (\ref{als}) with $x=0.3,0.6,0.9$ yields
\begin{equation}\label{constants1}
C_0=0.3342343984217452,C_1=0.31859877627965916,C_2=0.20764389922289617
\end{equation}
\noindent Substituting these constants into the Eq.(\ref{thrdappr}), the approximate solution of the third order is obtained as:
\begin{equation}\label{expsolu}
\begin{array}{l}
{y_3}(x)=1.000000000101 + 1.0040975062848503x^2 + 0.48364749266573837x^4 +\\
0.18568062044855377x^6 + 0.04172402028090389x^8 + 0.00419221270969861x^{10}\\ + 0.00013546572737070046x^{12}.
\end{array}
\end{equation}
\noindent Repeating the same steps one can get the following approximations:
\begin{equation}\label{iter4}
\begin{array}{l}
{y_4}(x)=1.000000000002862+0.9999999996360626x^2+0.5000000125635662x^4 \\
+0.1666664827590984x^6+0.0416680355705590x^8 + 0.0083276885417629x^{10}\\
+0.00140218809407533x^{12}+0.0001808480143782x^{14}+0.0000365711746672x^{16}.
\end{array}
\end{equation}
\begin{equation}\label{iter5}
\begin{array}{l}
{y_5}(x)=1.000000000000001+0.9999999999998731x^2+0.5000000000060835x^4\\
+0.166666666533135x^6+0.04166666825594757x^8+0.00833332219438660x^{10}\\
+0.001388937204147727x^{12} + 0.00019828100274015x^{14}+0.000025026069221009x^{16}\\
+2.5264083250622193\times 10^{-6}x^{18}+4.007880863972304\times 10^{-7}x^{20}.
\end{array}
\end{equation}
\end{example}
\noindent Exact solution of the problem is $y=e^{x^2}$ .This problem has been investigated by Ozis et al using variational iteration method(VIM) and homotopy perturbation method (HPM) \cite{yildirim2009solutions,yildirim2007solutions}. Figures 3.1, 3.2 and Table 1 give important information on the convergence of the absolute errors of OPIAs and other approximate solutions in literature. It is clear that the results obtained by OPIM are more accurate than those in \cite{yildirim2009solutions,yildirim2007solutions} .
\begin{table}\caption{Comparison of absolute errors for Example 1 at different orders of approximations.}
\centering
\begin{tabular}{|p{0.15in}|p{1in}|p{1in}|p{1in}|p{1in}|} \hline
\textit{x} & \multicolumn{2}{|p{2in}|}{ Errors for OPIA-1} & \multicolumn{2}{|p{2in}|}{Errors for VIM and HPM} \\ \hline
& $\left|y_{exact}-y_{4} \right|$ & $\left|y_{exact}-y_{5} \right|$ & $\left|y_{exact}-y_{4} \right|$ & $\left|y_{exact}-y_{5} \right|$ \\ \hline
0.1 & 3.08426$\times$10${}^{-13}$ & 2.22045$\times$10${}^{-16}$ &1.11022$\times$10${}^{-15}$ & 1.00128$\times$10${}^{-16}$ \\
0.2 & 3.85914$\times$10${}^{-13}$ & 2.22045$\times$10${}^{-16}$ &5.72165$\times$10${}^{-12}$ & 3.26406$\times$10${}^{-14}$ \\
0.3 & 5.62883$\times$10${}^{-13}$ & 1.00025$\times$10${}^{-17}$ &7.47710$\times$10${}^{-10}$ & 9.59788$\times$10${}^{-12}$ \\
0.4 & 9.64347$\times$10${}^{-13}$ & 2.44249$\times$10${}^{-15}$ &2.38451$\times$10${}^{-8}$ & 5.43454$\times$10${}^{-10}$ \\
0.5 & 1.95532$\times$10${}^{-12}$ & 1.50998$\times$10${}^{-14}$ &3.51584$\times$10${}^{-7}$ & 1.24994$\times$10${}^{-8}$ \\
0.6 & 4.77649$\times$10${}^{-12}$ & 1.01037$\times$10${}^{-13}$ &3.18608$\times$10${}^{-6}$ &1.62772$\times$10${}^{-7}$ \\
0.7 & 5.45375$\times$10${}^{-11}$ & 5.02709$\times$10${}^{-13}$ & 0.0000206568 &1.43282$\times$10${}^{-6}$ \\
0.8 & 2.78031$\times$10${}^{-11}$ & 2.05902$\times$10${}^{-12}$ & 0.000104921 &9.47740$\times$10${}^{-6}$ \\
0.9 & 3.08426$\times$10${}^{-10}$ & 6.38223$\times$10${}^{-12}$ & 0.000442699 & 0.000050436 \\
1 & 2.10201$\times$10${}^{-9}$ & 2.90235$\times$10${}^{-12}$ & 0.00161516 & 0.000226273 \\ \hline
\end{tabular}
\end{table}
\begin{figure}
\begin{subfigure}{.5\textwidth}
\centering
\includegraphics[width=.9\linewidth]{Ex1-Exact-OPIA2}
\caption{OPIA-1 solution of second order.($\bullet$)}
\end{subfigure
\begin{subfigure}{.5\textwidth}
\centering
\includegraphics[width=.9\linewidth]{Ex1-Exact-VIM2}
\caption{VIM solution of second order.($\bullet$)}
\end{subfigure}
\caption{Comparison with the exact solution(--) for
Example 1.}
\end{figure}
\begin{figure}
\begin{subfigure}{.5\textwidth}
\centering
\includegraphics[width=.9\linewidth]{Ex1-OPIM}
\caption{OPIA-1 solution of fifth order.}
\end{subfigure
\begin{subfigure}{.5\textwidth}
\centering
\includegraphics[width=.9\linewidth]{Ex1-VIM}
\caption{VIM solution of fifth order.}
\end{subfigure}
\caption{Absolute errors for OPIA-1 and the variational iteration method for Example 1.}
\end{figure}
\begin{example}
Consider the Lane-Emden type equation \cite{khan2012solving,parand2010approximation,dehghan2008approximate}:
\begin{equation} \label{Ex2}
{y}''+\frac{2}{x}y'+e^y=0,y(0)=y'(0)=0
\end{equation}
which represents the isothermal gas spheres equation in the case that the temperature stays constant.
\vglue0.3cm
\noindent Reconsider the Eq. (\ref{Ex2}) as:
\begin{equation} \label{REx2}
F(y'',y',y,\varepsilon )={y}''+(\frac{2\varepsilon}{x}y'+e^{\varepsilon y})=L(y)+N(y)=0
\end{equation}
\noindent where $L={y}''$ and $N(y)=(\frac{2\varepsilon}{x}y'+e^{\varepsilon y})$. By using the Eqs. (\ref{approximatesolution}), (\ref{Eq2}),(\ref{REx2}) and setting $\varepsilon=1$, we have
\begin{equation} \label{Ex2algorithm}
{(y_c)''}_n=-(y_n)''-\frac{2}{x}(y_n)'-y_n-1.
\end{equation}
\noindent By choosing $y_0=0$ as a starting guess, using the Eqs. (\ref{formula}), (\ref{Ex2algorithm}) with initial conditions, we get
\begin{equation}\label{Ex2as1}
y_1=\frac{-C_0}{2} (x^2)
\end{equation}
\begin{equation}\label{Ex2as2}
y_2=\frac{-C_0}{2} (x^2)+\frac{1}{24} \left(C_0+C_1\right) x^2 \left(C_0 x^2+36 C_0-12\right)
\end{equation}
\begin{equation}\label{Ex2as3}
\begin{array}{l}
y_3=\displaystyle\frac{-C_0}{2} (x^2)+\frac{1}{24} \left(C_0+C_1\right) x^2 \left(C_0 x^2+36 C_0-12\right)+\\
\displaystyle\frac{C_0+C_1+C_2}{720} \left[\begin{array}{l}-C_0^2 x^6-C_0 C_1 x^6-140 C_0^2 x^4+60 C_0 x^4-140 C_0 C_1 x^4+30 C_1 x^4\\
-3240 C_0^2 x^2+2160 C_0 x^2-3240 C_0 C_1 x^2+1080 C_1 x^2-360 x^2\end{array} \right]
\end{array}
\end{equation}
\begin{equation}\label{Ex2as4}
\begin{array}{l}
y_4=\displaystyle\frac{-C_0}{2} (x^2)+\frac{1}{24} \left(C_0+C_1\right) x^2 \left(C_0 x^2+36 C_0-12\right)+\\
\displaystyle\frac{C_0+C_1+C_2}{720} \left[\begin{array}{l}-C_0^2 x^6-C_0 C_1 x^6-140 C_0^2 x^4+60 C_0 x^4-140 C_0 C_1 x^4+30 C_1 x^4\\
-3240 C_0^2 x^2+2160 C_0 x^2-3240 C_0 C_1 x^2+1080 C_1 x^2-360 x^2\end{array} \right]+\\[0.5cm]
\displaystyle\frac{C_0+C_1+C_2+C_3}{604800} \left[\begin{array}{l}
15 C_0^3 x^8+15 C_0 C_1^2 x^8+30 C_0^2 C_1 x^8+15 C_0^2 C_2 x^8+15 C_0 C_1 C_2 x^8+5096 C_0^3 x^6-2520 C_0^2 x^6+\\
5096 C_0 C_1^2 x^6-840 C_1^2 x^6+10192 C_0^2 C_1 x^6-3360 C_0 C_1 x^6+5096 C_0^2 C_2 x^6-1680 C_0 C_2 x^6\\
+5096 C_0 C_1 C_2 x^6-840 C_1 C_2 x^6+422800 C_0^3 x^4-352800 C_0^2 x^4+422800 C_0 C_1^2 x^4-117600 C_1^2 x^4\\
+75600 C_0 x^4+845600 C_0^2 C_1 x^4-470400 C_0 C_1 x^4+50400 C_1 x^4+422800 C_0^2 C_2 x^4-2352C_2 x^4+\\
422800 C_0 C_1 C_2 x^4-117600 C_1 C_2 x^4+25200 C_2 x^4+8164800 C_0^3 x^2-8164800 C_0^2 x^2+816C_0 C_1^2 x^2\\
-2721600 C_1^2 x^2+2721600 C_0 x^2+16329600 C_0^2 C_1 x^2-10886400 C_0 C_1 x^2+1814400 C_1 x^2\\
-5443200 C_0 C_2 x^2+8164800 C_0 C_1 C_2 x^2-2721600 C_1 C_2 x^2+907200 C_2 x^2-302400 x^2\end{array} \right]\\
\vdots
\end{array}
\end{equation}
\end{example}
\noindent Using the Eq. (\ref{als}) with the residual
\begin{equation}\label{residual2}
R(x,C_0,C_1,C_2,C_3)=L\left( {{y}_{4}}(x,{{C}_{0}},{{C}_{1}},{{C}_{2}},C_3) \right)+N\left( {{y}_{3}}(x,{{C}_{0}},{{C}_{1}},{{C}_{2}},C_3) \right)
\end{equation}
\noindent the unknown constants are obtained as
\begin{equation}\label{Ex2constants1}
C_0=2.0203622551,C_1=-1.0201147822,C_2=-0.9963202221,C_3=0.020789994
\end{equation}
\noindent for the fourth order approximation.
\noindent Substituting the Eq.(\ref{Ex2constants1}) into (\ref{Ex2as4}) yields:
\begin{equation}\label{Ex2expsolu}
\begin{array}{l}
{y_4}(x)=-0.15989962328x^2 + 0.007920058473x^4 + -0.005608897215631x^6 + 0.000039055217456x^8.
\end{array}
\end{equation}
\noindent Figure 3.3 is sketched for comparison of the higher order approximate solutions of OPIM and analytical results given by other methods in literature \cite{khan2012solving,wazwaz2011comparison}.It is also clear from the Figure 3.3 that OPIA-1 solutions are valid in larger region.
\begin{figure}
\centering
\includegraphics[width=.8\linewidth]{Ex2}
\caption{Comparison between the results obtained by OPIM,ADM,DTM and the numerical results for
Example 2.}
\end{figure}
\section{Conclusion}
In this paper, OPIM is applied for the first time to investigate the new approximate solutions for Lane-Emden type differential equations. This new technique provides us to optimally control the convergence of solution series. Also,it gives a very good approximation even in a few terms to these kinds of nonlinear equations. The results obtained in this paper proves that the OPIM is a very effective technique for differential equations. It is worth mentioning that, a symbolic program is necessary for successive calculations after a few iterations.Mathematica 9 has been used to overcome the complicated calculations for this present research.
\vglue1cm
\bibliographystyle{plain}
|
\section{Introduction}
Observations have found luminous quasars at $z > 6$,
with masses of supermassive black holes (SMBHs) estimated at $\sim 10^{9} M_\odot$ \citep{Mortlock11, Wu15}.
Larger SMBH masses at higher redshifts require either
(i) relatively heavier seed black holes (BHs) with $\sim 10^5 M_\odot$
\citep[e.g.,][]{LN06}, or
(i\hspace{-.1em}\nobreak i) super-Eddington accretion for rapid growth of BHs
\citep{Rees92, Kawaguchi03}.
Both these mechanisms are potentially possible:
(i) The massive seed BHs
can be formed as the end products of gas collapse
with virial temperatures $\geq 10^4$ K without molecular cooling \citep{BVR06}.
(i\hspace{-.1em}i) Estimations of accretion rates
and duration of the super-Eddington accreting active galactic nuclei (AGNs),
together with the observed trend of higher Eddington ratios
at higher redshift \citep[e.g.,][]{MD04,Nobuta12},
indicate that BHs have grown via super-Eddington accretion
in early universe \citep{Kawaguchi04June}.
These two mechanisms have been actively discussed.
Because of the uncertainty of the BH formation mechanism
and limited computational resources,
most cosmological hydrodynamic simulations and
semi-analytic models of galaxy formation (hereafter SA models)
have treated the formation of BHs
by putting a seed BH with a set mass at the centre of each galaxy.
For example, in \cite{Barber16}, who use the EAGLE simulation,
a seed BH of $10^5 h^{-1} M_\odot$ is placed
by converting the bound gas particle with the highest density
when a collapsed halo with $\geq 10^{10}h^{-1}M_\odot$ contains no BHs.
\cite{Okamoto08M}, on the other hand, employ a seed BH mass
with $10^{2} M_\odot$ and place the seed at the stellar density maxima
when a virialized dark matter halo that consists of more than
1000 dark matter particles does not contain any BHs.
Other cosmological simulations \citep[e.g.,][]{BS09} assume that
the seed BH mass is proportional to the gas mass in the host halo.
SA models treat the birth of BHs in mainly two different ways.
In the first, a central BH is born
when a galaxy initially merges with other galaxies \citep[e.g.,][]{KH00,Enoki03,Malbon07,Lagos09}.
In these models, the initial BH mass depends on the amount of the cold gas in the merging system.
In the second method, a seed BH of a fixed mass is placed immediately after a galaxy forms:
$10^{2} M_\odot$ \citep{Menci03}, $10^{3} M_\odot$ \citep{FMS15},
or $10^{5} M_\odot$ \citep{nu2gc}.
For a deeper understanding of seed BHs from SA models,
\cite{PVS16} and \cite{Valiante16J} focus on BH growth
only in early universe ($z \gtrsim 5$) and suggest that
100 $M_\odot$ seed BHs at $z \gtrsim 23$ accretes gas via
major mergers at super-Eddington rates, forming
$10^5 M_\odot$ BHs at $z \sim 17$.
The mass of the seed BHs has previously been presumed to have only a small impact on the statistical properties
of galaxies, AGNs and SMBHs, unless the mass accretion rate depends on black hole mass
and a large amount of gas from their host galaxies is accreted by the BHs.
Many observations \citep[e.g.,][]{KR95, HR04, MM13, Magorrian98}
have suggested that
the mass of SMBHs ($M_\mathrm{BH}$) correlates with
the stellar mass of their host bulges ($M_\mathrm{bulge}$)
at $z \sim 0$ (hereafter the $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation).
They indicate a nearly proportional $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation.
The $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation may suggest
that SMBHs have co-evolved with their host galaxies.
This co-evolution of BH and host galaxies have motivated
theoretical studies investigating the mechanism of BH feeding, AGN activities,
and the energetic feedback from AGNs in the context of the galaxy formation
\citep[see, however, ][]{JM11}.
It is worth noting that recent observational studies
\citep[e.g.,][]{Graham12F, SGS13} have suggested
that for $M_\mathrm{bulge} \lesssim 10^{10} M_\odot$,
the $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation becomes
quadratic instead of the linear relation
found for more massive bulges.
It has also suggested that this quadratic relation continues
down to $M_\mathrm{BH} \sim 10^{5} M_\odot$.
In this {\it Letter}, we investigate whether the mass of seed BHs
affects model predictions of the local $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation
at $M_\mathrm{bulge} \lesssim 10^{10} M_\odot$
by using an SA model.
In Section 2 we briefly review our models regarding the growth of SMBHs.
In Section 3 we present our results.
We summarize and discuss the results in Section 4.
\section{Methods}
\label{sec:methods}
We employ a revised version of the SA model,
``{\it New Numerical Galaxy Catalogue''} ({\scriptsize$\nu^{2}$GC}; \citealt[][hereafter M16]{nu2gc}),
where the SMBH growth and AGN properties are summarized by
\cite{Enoki03}, \cite{Enoki14}, and \cite{Shirakata15}.
The revised model differs from \citetalias{nu2gc} in the following points;
(i) the model of merger driven spheroid formation and
(i\hspace{-.1em}\nobreak i) the growth of spheroids via disc instability.
Further details are given in Sec. 2.1
Despite these changes, we will show later that
the main result of this {\it Letter}
remains unchanged even if we use the \citetalias{nu2gc} model.
We create merging histories of dark matter haloes from
state-of-the-art cosmological $N$-body simulations \citep{Ishiyama15},
which have a high mass resolution and large volume compared to previous simulations
(e.g., 4 times better mass resolution
compared with Millennium simulations, \citealt{Springel05June}).
Table \ref{tab:N-body} summarizes basic properties of the simulations used in this {\it Letter}.
The {\scriptsize$\nu^{2}$GC}~-L simulation has $16^3$ times larger volume
and the same mass resolution compared with the {\scriptsize$\nu^{2}$GC}~-SS simulation.
When calculating the SMBH mass function at $z \sim 6$, we use the {\scriptsize$\nu^{2}$GC}~-L
since SMBHs in the early universe are rare.
The {\scriptsize$\nu^{2}$GC}~-H2 simulation has the same box size and $\sim 64$ times higher mass resolution
compared with the {\scriptsize$\nu^{2}$GC}~-SS simulation.
Since we are interested in small galaxies in this {\it Letter},
we employ the {\scriptsize$\nu^{2}$GC}~-H2 simulation in most cases, while
the {\scriptsize$\nu^{2}$GC}~-SS simulation is used for resolution studies.
The details of the merger trees are given in \cite{Ishiyama15}.
We consider mergers of galaxies, atomic gas cooling, gas heating by UV feedback
and feedbacks via supernovae and AGNs, and the growth of SMBHs by coalescence and gas fueling.
More detailed descriptions are available in \citetalias{nu2gc}.
Throughout this {\it Letter}, we assume a $\Lambda$CDM universe with
the following parameters:
$\Omega_{0}=0.31$, $\lambda_{0}=0.69$,
$\Omega_\mathrm{b} = 0.048$,
$\sigma_8 = 0.83$, $n_\mathrm{s} = 0.96$, and a Hubble constant of
$H_0 = 100~h~\mathrm{km}~\mathrm{s}^{-1}$~Mpc$^{-1}$, where $h=0.68$
\citep{Planck}.
\begin{table*}
\centering
\begin{tabular}{lllccc}
\hline
Name & $N$ & $L$~[$h^{-1}$ Mpc] & $m~[h^{-1} M_\odot]$ & $M_\mathrm{min}~[h^{-1} M_\odot]$ & $M_\mathrm{max}~[h^{-1} M_\odot]$ \\
\hline
{\scriptsize$\nu^{2}$GC} {\scriptsize -L} & $8192^3$ & 1120.0 & $2.20\times 10^8 $ & $8.79\times 10^9$ & $4.11\times 10^{15}$ \\
{\scriptsize$\nu^{2}$GC} {\scriptsize -SS} & $512^3$ & 70.0 & $2.20\times 10^8 $ & $8.79\times 10^9$ & $6.58\times 10^{14}$ \\
{\scriptsize$\nu^{2}$GC} {\scriptsize -H2} & $2048^3$ & 70.0 & $3.44\times 10^6 $ & $1.37\times 10^8$ & $4.00\times 10^{14}$ \\
\hline
\end{tabular}
\caption{Properties of the {\scriptsize$\nu^{2}$GC}~simulations. $N$ is the number of simulated particles, $L$ is the comoving box size,
$m$ is the individual mass of a dark matter particle, $M_\mathrm{min}$ is the mass of the smallest haloes ($= 40\times m$) which corresponds to
the mass resolution, and $M_\mathrm{max}$ is the mass of the largest halo in each simulation.}
\label{tab:N-body}
\end{table*}
\subsection{Spheroid formation}
\label{sec:spheroid}
We assume that the spheroid within galaxies grows
via starbursts and the migration of disc stars.
In the \citetalias{nu2gc} model,
we considered starbursts only triggered in the major mergers of galaxies.
Such a model, however, cannot reproduce AGN luminosity functions at low and high redshifts simultaneously
\citep[e.g.,][]{Enoki14}.
In the revised version of the model in {\scriptsize$\nu^{2}$GC},
we therefore assume that starbursts are triggered not only by
major mergers of galaxies but also by minor mergers and disc instability.
For mergers, we introduce the model of merger driven-spheroid
formation proposed by \cite{Hopkins09F} based on hydrodynamic simulations,
similar to the SA model by \cite{Somerville15}.
After dark matter haloes merge together, we regard the central galaxy in the most massive
progenitor halo as the new central galaxy in the combined halo.
We next consider a merger of two galaxies
\footnote{ We consider galaxy mergers via dynamical friction (central-satellite mergers)
and via random collisions (satellite-satellite merger)
without following subhalo orbits.
We use the merging rate by the random collision estimated by \cite{MH97}.
The detailed descriptions of these mergers are found in Sec. 2.5 in \citetalias{nu2gc}.}
where the primary galaxy has a larger baryon mass (cold gas $+$ stars)
than a secondary galaxy.
In all such merger events, we assume that all stars in the secondary are absorbed in the bulge of the primary,
and a part of the disc (cold gas $+$ stars) of the primary is also turned into the bulge component.
We assume that cold gas that falls into the primary's bulge
is consumed by a starburst.
Similarly to \citetalias{nu2gc}, we assume that the starburst
and the gas accretion onto the SMBH start at the same time.
The beginning time is assigned randomly within the timestep.
We also introduce the spheroid formation by disc instability
in order to form SMBHs at $z \sim 6$.
The spheroids formed through this mechanism might become so-called `pseudo bulges',
although we do not differentiate bulges formed by this process
from those formed by mergers.
The inclusion of disc instabilities are important as
strongly self-gravitating galactic discs are likely to be dynamically unstable.
Moreover, without the disc instability,
we cannot form high redshift ($z \sim 6$) SMBHs with
$M_\mathrm{BH} \gtrsim 10^9 M_\odot$.
Following \cite{MMW98} and \cite{Cole00},
a galactic disc becomes unstable when
\begin{equation}
f_\mathrm{DI} \equiv \frac{V_\mathrm{d}}{(GM_\mathrm{disc}/r_\mathrm{disc})^{1/2}} < f_\mathrm{DI, crit},
\end{equation}
where $G$ is the gravitational constant, $V_\mathrm{d}$, $M_\mathrm{disc}$, and $r_\mathrm{d}$
are the rotation velocity, the mass of cold gas $+$ stars, and the half mass radius of the galactic disc, respectively.
Since $f_\mathrm{DI,crit}$ depends on the gas fraction and density profile of a galactic disc
\citep[e.g.,][]{Efstathiou82,CST95},
we consider $f_\mathrm{DI,crit}$ as an adjustable parameter,
whose value is chosen so as to reproduce the observed stellar mass function of bulges at $z \sim 0$.
We assume that an unstable disc is completely destroyed and reforms into a bulge with a starburst.
\subsection{Growth of SMBHs}
\label{sec:SMBH}
When galaxies merge with each other or the galactic disc becomes dynamically unstable,
a starburst occurs and a small fraction of cold gas gets accreted by the SMBH via the following relation:
\begin{equation}
M_\mathrm{acc} = f_\mathrm{BH}~~\Delta M_\mathrm{*,burst},
\end{equation}
where $M_\mathrm{acc}$ is the accreted cold gas mass which is proportional to
the stellar mass newly formed by a starburst, $\Delta M_\mathrm{*,burst}$.
In this {\it Letter}, we set $f_\mathrm{BH} = 0.01$
and assume that the accretion rate onto an SMBH is not limited by the Eddington accretion rate.
SMBHs also grow when BH-BH coalesce as their host galaxies merge.
The timescale of the coalescence is difficult to determine.
Similar to earlier work \citep[e.g.,][]{KH00, Enoki03, Somerville08},
we thus assume BHs merge instantaneously
when their host galaxies merge.
We also consider radio-mode AGN feedback process as in \cite{Bower06}.
Namely, when the halo cooling time becomes
longer than the free-fall time at the cooling radius, and the cooling luminosity
becomes smaller than the accretion luminosity,
a hot halo gas is prevented from cooling.
\subsection{Seed Black Holes}
\label{sec:seed}
We place a seed BH immediately after a galaxy forms.
In this {\it Letter},
we present results with $M_\mathrm{BH,seed} = 10^3 M_\odot$
(hereafter `light seed model') where $M_\mathrm{BH,seed}$ is the seed BH mass,
and $10^5 M_\odot$ (`massive seed model').
We also test the case
in which $M_\mathrm{BH,seed}$ takes uniformly random values
in the logarithmic scale in the
range of $3 \leq \log(M_\mathrm{BH,seed}/M_\odot) \leq 5$
(hereafter `random seed model').
A galaxy is born when hot gas in the host halo
cools efficiently.
The hot gas cools by atomic cooling when
the virial temperature, $T_\mathrm{vir}$, is larger than $10^{4}$ K.
We also consider the heating effect by the UV background.
We employ fitting formulae of the characteristic halo mass, $M_c (z)$,
obtained from \cite{Okamoto08N},
below which haloes become baryon deficient.
We find that runs {\scriptsize$\nu^{2}$GC}~-SS and -L do not resolve haloes with
$M_c (z)$ in any redshift, while the {\scriptsize$\nu^{2}$GC}~-H2 does resolve haloes with $M_c (z)$
at $z \lesssim 5$ and those with $T_\mathrm{vir} < 10^4$ K at $z \lesssim 3$.
This difference, however, does not affect the main conclusion
of this {\it Letter} as we will show later.
\section{Results}
\label{sec:results}
In this section we present the effect of the seed BH mass
on the $M_\mathrm{BH}-M_\mathrm{bulge}$ relation at $z \sim 0$.
Our model reproduces the observed galaxy luminosity functions, HI,
BH, and bulge stellar mass functions at $z \sim 0$.
Values of the model parameters used in this {\it Letter} are listed in Table~\ref{table:parameters}.
The description of the parameters is given in \citetalias{nu2gc}.
\begin{table}
\begin{center}
\begin{tabular}{ll | ll | ll}
\hline
$\alpha_\mathrm{star}$ & -2.131 & $\tau_\mathrm{V0}$ & $2.5\times 10^{-9}$ & $\epsilon_\mathrm{SMBH}$ & 0.310 \\
$\epsilon_\mathrm{star}$ & 0.203 & $f_\mathrm{mrg}$ & 1.0 & $\alpha_\mathrm{cool}$ & 9.510 \\
$\alpha_\mathrm{hot}$ & 4.080 & $\kappa_\mathrm{diss}$ & 2.0 & $f_\mathrm{DI,crit}$ & 1.1 \\
$V_\mathrm{hot}$ & 129.7 [km/s] & $f_\mathrm{BH}$ & 0.01 \\
\hline
\end{tabular}
\caption{Values of model parameters in this {\it Letter}.}
\label{table:parameters}
\end{center}
\end{table}
In Fig.~\ref{fig:main}, we present the $M_\mathrm{BH}-M_\mathrm{bulge}$
relation at $z \sim 0$ predicted by the massive seed model (top panel) and light seed model (bottom panel).
For the observational data with $M_\mathrm{BH} \lesssim 10^6 M_\odot$,
we use the data obtained from \cite{GS15} (hearafter GS15).
This work re-estimated the bulge and BH masses obtained by previous work
\citep{Jiang11, Mathur12, SGS13, RGG13,Busch14}.
We also plot LEDA 87300 whose BH mass is originally estimated by \cite{Baldassare15}
and re-evaluated by \cite{GCS16}.
Almost all of the observational samples with $M_\mathrm{BH} \lesssim 10^{6} M_\odot$
have active BHs.
In our model, the $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation does not change
when we only plot AGNs.
Although all of our models reproduce the relation
at $M_\mathrm{bulge} \gtrsim 10^{10} M_\odot$,
the massive seed model is inconsistent with
the recent observational estimates for dwarf galaxies with $M_\mathrm{bulge} \lesssim 10^{10} M_\odot$,
in the sense that the predicted BH masses (shaded region) are larger than the observational estimates.
We present the results by the $N$-body simulations with the same box size and
different mass resolution ({\scriptsize$\nu^{2}$GC}~-SS and -H2)
in all panels of Fig. \ref{fig:main}.
We find that the effect of the mass resolution of $N$-body simulations
clearly appears with $M_\mathrm{bulge} \lesssim 10^{9} M_\odot$.
Nonetheless, the mass resolution does not affect
our conclusion.
Middle panel of Fig. \ref{fig:main} shows the result of the random seed model.
We find that the random seed and light seed models
reproduce the relation and its scatter well.
\begin{figure}
\centering
\scalebox{0.5}{
\input{MbhMbulge-test.tex}
}
\caption{$M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relations at $z \sim 0$
for different $M_\mathrm{BH,seed}$;
the massive (top), random (middle), and light (bottom) seed models.
Red dashed and solid lines present the results
of the {\scriptsize$\nu^{2}$GC}~-SS and -H2 simulations, respectively.
Red lines track the median, and shaded regions indicate 10-90 percentile of the models.
Orange long dashed lines present the result of \protect\citetalias{nu2gc}
with the {\scriptsize$\nu^{2}$GC}~-SS simulation.
Blue filled symbols indicate observational results obtained from
\protect\cite{MM13}, \protect\cite{KH13_review}, and
\protect\citetalias{GS15}\protect\footnotemark
(triangles, diamonds, and squares, respectively).
Green open symbols are AGN sample obtained from
\protect\citetalias{GS15},(see the text
for more details).
Green asterisks correspond LEDA 87300 \protect\citep{GCS16, Baldassare15}.
Black dot-dashed and solid lines depict the scaling relations \protect\citep{SGS13}.
Since the $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation is
sensitive to the mass of seed BHs,
most seed BHs should not set to $10^5 M_\odot$ for reproducing
the observed local relation.}
\label{fig:main}
\end{figure}
\footnotetext{Originally obtained from \protect\cite{SGS13}.}
These two successful models provide the same results
in the range of $M_\mathrm{BH} \gtrsim 10^{5.5} M_\odot$
below which these models have significantly different slope
of the relation.
More observational data with $M_\mathrm{BH} \lesssim 10^{5.5} M_\odot$ are required
for stronger constraints on the mass distribution of the seed BHs.
The sample of \cite{Jiang11} seems to have the floor in the $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation
at $M_\mathrm{BH} \sim 10^{5-6} M_\odot$.
\cite{Jiang11} thus support the results obtained from the simulations of
\cite{VN09} with seed BHs of $10^5 M_\odot$.
On the other hand, our model prefers the lower seed BH mass than $10^5 M_\odot$
to explain the $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation obtained from \cite{Jiang11}.
The black dashed and solid lines in Fig \ref{fig:main} depicts
the scaling relations \citep{SGS13}.
\footnote{\cite{SGS13} classified galaxies by their bulge surface brightness profiles:
core-S\'ersic galaxies (bulge surface brightness profiles have a partially depleted core)
and S\'ersic galaxies (bulge surface brightness profiles are well-fitted by a single S\'ersic model).}
Our models exhibit the slightly lower $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation
than the scaling relation at $M_\mathrm{bulge} \gtrsim 10^{10} M_\odot$.
In this region, $M_\mathrm{bulge}$ evaluated from observations
is potentially biased in favor of larger stellar masses
\citep[e.g.,][]{Shankar16Mar}.
Our models also exhibit the transition of the slope
in the $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relations
from quadratic to near-linear.
We also plot $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relations
obtained by \citetalias{nu2gc} in Fig. \ref{fig:main},
in which starbursts in the bulge and the gas fueling to a BH
are only triggered by major mergers.
They also show the ``bend'',
meaning that bulge and BH growth via disc instability
has small impact on the ``bend'' of
the $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation.
We have confirmed that stellar feedback is responsible for
the quadratic relation
as suggested by \cite{FMS15}.
Next, we investigate the origin of the scatter
of the $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation.
Fig. \ref{fig:z_col} indicates the distribution of
the redshift at which galaxies newly form ($z_\mathrm{form}$).
We predict that the scatter of the $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation
can be related to the difference of $z_\mathrm{form}$.
Three solid lines indicate the relation
with different ranges of $z_\mathrm{form}$:
$z_\mathrm{form} < 4$,
$4 \leq z_\mathrm{form} < 8$, and
$8 \leq z_\mathrm{form}$.
We find that more massive systems form at higher redshift.
We also find
that SMBHs become more massive with lower $z_\mathrm{form}$
for a given $M_\mathrm{bulge}$ and
that the stellar mass of the bulge
is larger with higher $z_\mathrm{form}$ for a given $M_\mathrm{BH}$.
These might be because large amount of gas gets accreted by the SMBHs
immediately after $z_\mathrm{form}$.
Galaxies which formed later are subject to gas-rich processes,
such as major mergers or disc instability.
On the other hand, galaxies hosting the same mass of the SMBHs with higher $z_\mathrm{form}$
have experienced more gas-poor processes of spheroid growth, such as dry mergers,
than lower $z_\mathrm{form}$ conterparts;
their bulges increase their masses without feeding central BHs.
This trend is inconsistent with \cite{MFT00} who suggest that
$M_\mathrm{BH}/M_\mathrm{bulge}$ ratios are higher in galaxies
with older stellar age.
We will investigate the origin of the scatter
of $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation in a forthcoming paper.
\begin{figure}
\centering
\includegraphics[width=\columnwidth]{MbhMbulge-z_col-ps2}
\caption{The $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation
at $z \sim 0$ with the {\scriptsize$\nu^{2}$GC}~-SS simulation and
$M_\mathrm{BH,seed} = 10^3 M_\odot$.
The color indicates the redshift at which the host galaxies
newly formed ($z_\mathrm{form}$).
Solid lines shows the median value for
different $z_\mathrm{form}$ ranges;
$z_\mathrm{form} < 4$ (dark brue),
$4 \leq z_\mathrm{form} < 8$ (dark green), and
$8 \leq z_\mathrm{form}$ (dark red).
For a given SMBH mass,
bulges become more massive with higher $z_\mathrm{form}$.}
\label{fig:z_col}
\end{figure}
\section{Summary and Discussion}
\label{sec:Discussion}
We have investigated how the mass of the seed BHs
affects model predictions of the local $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$
relation by using an SA model, {\scriptsize$\nu^{2}$GC}.
We find that seed BHs should not be dominated by those as massive as $10^{5}M_\odot$
to reproduce the observed $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation
at $z \sim 0$ over a wide range of bulge masses down to $M_\mathrm{bulge} \lesssim 10^{10} M_\odot$.
To obtain stronger constraints
of the mass distribution for the seed BHs,
observations of $M_\mathrm{BH} \lesssim 10^{5.5} M_\odot$
would be required.
The results in this {\it Letter} are consistent
with cosmological hydrodynamic simulations performed by \cite{Angls-Alczar15, Angls-Alczar16}
which suggest that the $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation
converges independently of the seed BH mass at $M_\mathrm{bulge} \gtrsim 10^{10} M_\odot$
while at $M_\mathrm{bulge} \lesssim 10^{10} M_\odot$, seed BH mass becomes important
in the scaling relation.
\cite{Angls-Alczar16} compare BH mass -- galaxy stellar mass relations at $z \sim 0$
with $10^4 h^{-1} M_\odot$ and $10^6 h^{-1} M_\odot$ seed BHs.
They find that in the case with $10^6 h^{-1} M_\odot$ seed BHs,
the relation has a floor which also appears
in the $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation in our massive seed model.
We explored whether the measurements of the $M_\mathrm{BH}$ -- $M_\mathrm{bulge}$ relation
at higher redshifts help to obtain further constraints on the mass of seed BHs.
Fig. \ref{fig:redshift_evolution} depicts the ratio of the average BH masses in the light seed model
($\equiv\langle M_\mathrm{BH}\rangle_{\scriptscriptstyle 3}$)
and those in the massive seed model ($\equiv\langle M_\mathrm{BH}\rangle_{\scriptscriptstyle 5}$),
as a function of bulge masses obtained from the {\scriptsize$\nu^{2}$GC}~-H2 simulation.
The difference in the seed mass clearly appears in galaxies
with bulge mass below $3\times10^{9} M_\odot$ at $z \sim0,1$ and $2$.
We find that the difference due to the seed mass becomes smaller at higher redshift
for a given $M_\mathrm{bulge}$.
Therefore observations of less massive bulges at $z \sim 0$ are
more powerful than at higher redshifts
for constraining the mass distribution of seed black holes.
\begin{figure}
\centering
\scalebox{0.5}{
\input{MbhMbulge_redshift.tex}
}
\caption{The difference of averaged SMBH mass due to the seed BH mass at $z \sim 2$
(dash-doted line), $z \sim 1$ (doted line), and $z \sim 0$ (solid line)
as a function of their bulge stellar mass
with the {\scriptsize$\nu^{2}$GC}~-H2 simulation.
The difference becomes smaller at higher redshift.}
\label{fig:redshift_evolution}
\end{figure}
Next we investigated SMBH mass functions at $z \sim 6$
by using the {\scriptsize$\nu^{2}$GC}~-L simulation.
Fig.~\ref{fig:z6} shows the results
of the light and massive seed models
(blue and red circles, respectively).
The SMBH mass function at $z \sim 6$ obtained from our model
is nearly consistent with the estimation of \cite{Willott10} in the range of $M_\mathrm{BH} \gtrsim 10^7 M_\odot$.
We find that an SMBH mass function at $z \sim 6$
in the range of $M_\mathrm{BH} \gtrsim 10^{5.8} M_\odot$
does not depend on the mass of the seed BHs
due to the large amount of cold gas
that gets accreted by the BHs.
This is true even when we employ the \citetalias{nu2gc} model,
in which a major merger is the only trigger for
a starburst and gas fueling to a BH.
As mentioned in Sec. \ref{sec:spheroid}, a smaller number of SMBHs, however,
form at $z \sim 6$ in the \citetalias{nu2gc} model.
Massive BHs have also grown efficiently by gas accretion
triggered by the disc instability as suggested by \cite{Bower06}.
\begin{figure}
\centering
\includegraphics[width=\columnwidth]{SMBHMF_z6}
\caption{SMBH mass function at $z \sim 6$
based on the largest cosmological $N$-body simulation ({\scriptsize$\nu^{2}$GC}~-L).
Orange open and green filled squares with lines
show the results of \protect\citetalias{nu2gc},
red open and blue filled circles with lines show the results
of light and massive seed models, respectively.
Even at $z \sim 6$, SMBH mass function
does not depend on the mass of the seed BHs in the range of
$M_\mathrm{BH} \gtrsim 10^{5.8} M_\odot$.
}
\label{fig:z6}
\end{figure}
\section*{Acknowledgements}
We appreciate the detailed review and useful suggestions
by the anonymous referee, which have improved our paper.
We also appreciate the English proofreading by E. J. Tasker,
helpful comments by A. Graham and R. Valiante.
We would like to thank C. Lacey for helpful comments for {\scriptsize$\nu^{2}$GC}.
T.K. was supported in part by an University Research
Support Grant from the NAOJ.
T.O. was financially supported by
JSPS Grant-in-Aid for Young Scientists (B: 24740112).
R.M. was supported in part by MEXT KAKENHI (15H05896).
T.I. has been supported by MEXT HPCI STRATEGIC PROGRAM and MEXT/JSPS KAKENHI
(15K12031) and by Yamada Science Foundation.
M.N. was supported by the Grant-in-Aid (25287049) from the MEXT
of Japan.
\bibliographystyle{mnras}
|
\section{Conclusion}
\label{sec:conclusion}
We have presented the possibility of calculating the two-loop corrections to real scalar masses in SUSY models with CP violation using the public packages
\SARAH and \SPheno. After summarising the generic approach used in these calculations, we showed the self-consistency of all results and the perfect agreement
with corrections implemented in \NC for the scale invariant NMSSM. We demonstrated for selected examples in the MSSM and NMSSM how interesting physical results can be obtained
easily with the available functionality, and that the variations of the corrections with the CP-violating phases can be large. We discussed the different options for the complex MSSM to fix CP phases by the tadpole equations, and the bias which enters the
calculation by doing that. In the case of the MSSM, the only equivalent calculations have been performed in the on-shell scheme, rendering the results difficult to compare precisely; this underlines the utility of these results in \SARAH since the majority of spectrum generators deliberately use the {\ensuremath{\overline{\mathrm{DR}}}}\xspace scheme for applications to studying GUT models, gauge-mediation, etc. On the other hand, we do find a pleasing qualitative agreement of our results.
Afterwards, for the complex NMSSM we have briefly analysed the
effect of CP phases in the two-loop corrections beyond $O(\alpha_s\alpha_t)$, which have not previously been available in any scheme. It was shown that the dependence on the phases of $M_3$ and $A_t$ is included to a large extent in the corrections involving the strong coupling. However, it turned out that for instance the effect of the phase of $\lambda$ in the full two-loop corrections deviates clearly from the impression one
has when considering only the $\alpha_s\alpha_t$ corrections.
Finally, we want to stress again that it is now possible with the demonstrated approach to obtain the Higgs masses with very high accuracy not only for the CP-violating MSSM and NMSSM. A large variety of other SUSY models can now be easily studied in the presence of significant CP phases without the problem of having a large theoretical uncertainty in the mass predictions. We hope that this gives a new impetus to interesting phenomenological studies of SUSY models with CP violation.
\section*{Acknowlegements}
We thank Dao Thi Nhung for clarifying discussions concerning \NC and Alexander Voigt for double checking one-loop results for the complex MSSM. MDG acknowledges support from Agence Nationale de Recherche grant
ANR-15-CE31-0002 ``HiggsAutomator,'' and would like to thank Pietro Slavich for interesting discussions.
\section{Introduction}
The discovery of the Higgs boson was the biggest success of Run-I of the Large Hadron Collider (LHC) \cite{Chatrchyan:2012ufa,Aad:2012tfa}. The mass of the Higgs is already known very precisely up to a few hundred MeV and its properties are in good agreement with the expectations from the Standard Model (SM). These observations now give strong constraints on any extension of the SM. Therefore, it is necessary to calculate these properties with increasing accuracy to close the gap between the experimental and theoretical uncertainty. In the context of supersymmetric models, most effort has been put into a precise calculation of the Higgs mass in the minimal supersymmetric standard model (MSSM) assuming real parameters\cite{Haber:1990aw,Ellis:1990nz,Okada:1990vk,Okada:1990gg,Ellis:1991zd,Brignole:1992uf,Chankowski:1991md,Dabelstein:1994hb,Pierce:1996zz,Hempfling:1993qq,Carena:1995wu,Heinemeyer:1998jw,Zhang:1998bm,Heinemeyer:1998np,Heinemeyer:1999be,Espinosa:1999zm,Espinosa:2000df,Brignole:2001jy,Degrassi:2001yf,Martin:2002wn,Brignole:2002bz,Dedes:2002dy,Martin:2002iu,Dedes:2003km,Heinemeyer:2004xw,Sasaki:1991qu,Carena:1995bx,Haber:1996fp,Espinosa:2001mm,Martin:2007pg,Kant:2010tf,Harlander:2008ju,Martin:2004kr,Borowka:2014wla,Hollik:2014bua,Degrassi:2014pfa}. In addition, for the next-to-minimal supersymmetric standard model (NMSSM) most calculations of the Higgs mass considered the CP conserving case \cite{Degrassi:2009yq,Staub:2010ty,Ender:2011qh,Goodsell:2014pla}.
Recently, however, there has been increasing interest in theories that extend these minimal models, and this has led to the present authors' work\cite{Goodsell:2014bna,Goodsell:2015ira}, building on that of \cite{Martin:2001vx,Martin:2003qz,Martin:2003it,Martin:2005eg}, to extend those calculations and provide a public implementation for two-loop Higgs mass calculations in generic theories. Up to this point the corrections were only available for CP-even scalars in theories with real parameters; this paper discusses the extension to all neutral scalars with or without CP violation (CPV).
Indeed, the focus on the real versions of the MSSM and NMSSM to study the Higgs mass can hardly be motivated from first principles: there is no strong argument why the CP phases in the soft-breaking sector of SUSY models should be small -- especially if SUSY breaking is transmitted via gravity. Moreover, SUSY models with CPV can have very interesting phenomenological aspects, see for instance \cite{Carena:2002bb,Bartl:2006yv,Williams:2007dc,Chiang:2008ud,Terwort:2012sy,Bharucha:2013epa,Munir:2013dya,Heinemeyer:2015qbu,Moretti:2015bua,Carena:2015uoe}. Putting the phases to zero is often an assumption to circumvent conflicts with experimental limits and simplify calculations. Due to this the impact of CP phases on the Higgs mass has so far only been partially considered in both models. In the MSSM it was first studied using renormalisation group techniques \cite{Carena:2000dp,Carena:2000yi,Carena:2001fw}, while diagrammatic calculations at the one-loop level \cite{Frank:2006yh} and particular two-loop level \cite{Hollik:2014wea,Hollik:2014bua} were performed much later. For the complex NMSSM the one-loop results \cite{Graf:2012hh} are so far only accompanied by two-loop corrections of $O(\alpha_s \alpha_t)$ \cite{Muhlleitner:2014vsa}. \\
CPV in supersymmetric theories is constrained by several observations, principally meson mixing (in particular $K^0$, $B^0_{s}, B^0_d$ and $D^0$ mesons) and decays; the electric dipole moment of nucleons and electrons; and Higgs coupling measurements. Meson physics typically places extremely stringent bounds, but there is little overlap between those constraints and constraints on the Higgs mass/mixings as relevant for this work, because generational mixing is required -- and even then, large enough generational mixing to have a sizeable effect on the Higgs mass at two loops may be unconstrained by flavour \cite{Goodsell:2015yca}. Furthermore, the measurement of the Higgs couplings at the LHC is rather insensitive to parity violation, with the parity-violating couplings still allowed to be of the same order as, if somewhat less than\footnote{The $0^-$ hypothesis for the Higgs boson is excluded, but couplings up to $0.83$ times the Standard-Model values are still allowed for parity-violating couplings to Z-bosons of the form $S Z_{\mu \nu}\tilde{Z}^{\mu \nu}$.}, the Standard-Model-like ones \cite{ATLAS:2015zja}, and so direct searches for additional Higgs bosons actually place more stringent constraints.
Therefore the most relevant constraint on the parameter space that we shall consider comes from electric dipole moments, in particular that of the electron $d_e$, which is constrained to be \cite{Baron:2013eja}
\begin{align}
|d_e| < 8.9 \times 10^{-29}\ e\ \mathrm{cm} = 4.5\times 10^{-15} e\ \mathrm{GeV}^{-1}.
\end{align}
The typical value for electric or chromoelectric moments for fermions $i$ of mass $m_i$ and a common SUSY scale $M_{\rm SUSY}$ is \cite{Pospelov:2005pr}
\begin{align}
\kappa_i \equiv \frac{m_i}{16\pi^2 M_{\rm SUSY}^2} = 1.3 \times 10^{-25}\ {\rm cm} \times \frac{m_i}{\rm MeV} \times \left( \frac{{\rm TeV}}{M_{\rm SUSY}} \right)^2
\end{align}
multiplied by a numerical factor, three Yukawa or gauge couplings, and the sine of a CP-violating phase.
In the case of the electron dipole moment in the MSSM with only CP-violation entering through the $\mu$-term we have
\begin{align}
d_e/e \simeq & \frac{5 g^2 }{24} \kappa_e \tan \beta \sin ( \varphi_\mu)
\end{align}
and we therefore need a large suppression of the total angle $\varphi_\mu$ by roughly three orders of magnitude; however, if we just consider the sneutrino-chargino sector then we obtain in the same limit
\begin{align}
|d_e/e| \simeq & \frac{4 g^2 }{3} \kappa_e \tan \beta \big|\sin ( \varphi_\mu + \varphi_{M_2} + \eta)\big|
\label{EQ:EDMchargino}\end{align}
which similiarly constrains more CP-violating phases.
There is a constraint from the neutron electric dipole moments, a recent limit being \cite{Afach:2015sja} (see also \cite{Baker:2006ts,Baker:2007df,Serebrov:2015idv})
\begin{align}
|d_n/e| \lesssim& 3.0 \times 10^{-26}\ \mathrm{cm} .
\end{align}
Here the calculation is more complicated, since it depends on the electric dipole moments of the light squarks, their chromoelectric moments $\tilde{d}_{u,d}$ (naively suppressed by a factor $\frac{e}{4\pi}$), and the theta-angle of QCD. While this has the power to restrict the gluino phase through a squark-gluino loop, either through a direct EDM since the squarks are charged, or through the chromoelectric moments, this is not relevant for our study because the bound is not sufficiently strong: it can be easily satisfied just by, for example, taking the first two generations of squarks to have masses of a few TeV.
There is an additional strong constraint from the mercury dipole moment\cite{Pospelov:2005pr}:
\begin{align}
|d_{\rm Hg}/e| \simeq& 10^{-28} \ \mathrm{cm}\ \times \left| \frac{\tilde{d}_u - \tilde{d}_d}{10^{-25}\ \mathrm{cm}} \right| \lesssim 2\times 10^{-28} \ \mathrm{cm} .
\end{align}
If the first two generations of squarks are heavy then, again, this will not constrain the parameter space relevant for the Higgs mass.
In summary, in supersymmetric models some sources of CPV in the Higgs sector are required to be small by experiment, but several parameters are essentially unconstrained -- which could have a strong impact on the masses of the neutral and charged scalars. In general, it is the electric dipole moment of the electron that will restrict the phases $\varphi_\mu, \eta$ and the phases of the electroweakinos to be close to zero, so we will not consider their effect on the Higgs masses; on the other hand, we shall treat the phase of the gluino and trilinears in the third generation of squarks to be important free parameters, keeping the first two generations of squarks heavy.
The aim of this work is to present the possibility of calculating the Higgs mass and that of all other neutral scalars in a wide range of supersymmetric models with and without CPV to the same accuracy: an automatised, diagrammatic calculation of the Higgs mass covering CPV at the two-loop level is now available via the combination of the public codes \SARAH \cite{Staub:2008uz,Staub:2009bi,Staub:2010jh,Staub:2012pb,Staub:2013tta,Staub:2015kfa} and \SPheno \cite{Porod:2011nf,Porod:2003um}. This functionality extends the automatised two-loop calculations for the real case presented in Refs.~\cite{Goodsell:2014bna,Goodsell:2015ira}. In general, the calculations are done in the gaugeless limit and neglecting the dependence of the external momenta, i.e. they are competitive with the current state-of-the-art calculations for the complex MSSM, but extend any existing two-loop calculation for other SUSY models by important corrections beyond $O(\alpha_s \alpha_t)$. We explain in sec.~\ref{SEC:METHOD} the underlying methodology used in the calculations and some technical subtleties of the new extension before we present in sec.~\ref{SEC:VALIDATION} the validation of the routines in the presence of complex parameters. In secs.~\ref{SEC:MSSM} and \ref{SEC:NMSSM} we discuss some applications of these routines in the context of the MSSM and NMSSM, before we conlcude in sec.~\ref{sec:conclusion}.
\section{Methodology}
\label{SEC:METHOD}
The calculation of CP-violating corrections at two loops is now available in \SARAH via the diagrammatic approach described in Ref.~\cite{Goodsell:2015ira}. Indeed, no modifications are required to the expressions given in that paper. For the computation of masses for CP-odd scalars in CP-conserving theories the same routines also apply; since the formalism in Ref.~\cite{Goodsell:2015ira} is given in terms of real scalars, and the CP-odd scalars are just CP-even scalars with different labels.
However, once we extend our computations to these cases we find two potential subtleties associated with our method of avoiding the Goldstone Boson Catastrophe.
To remind the reader, this problem highlighted and resolved in Refs.~\cite{Martin:2002wn,Martin:2014bca,Elias-Miro:2014pca} arises either in the MSSM beyond the gaugeless limit, or in theories beyond the MSSM even in the gaugeless limit, in that the {\ensuremath{\overline{\mathrm{DR}}}}\xspace mass of goldstone bosons have indeterminate. The full on-shell mass of course being zero, the {\ensuremath{\overline{\mathrm{DR}}}}\xspace goldstone boson mass parameter is thus of the same order as loop corrections and is small. The problem is that this parameter appears in the loop corrections to the tadpoles and masses of Higgs bosons (and other particles) and the solution for a mass calculation is to include momentum dependence.
However, since this is computationally onerous, our solution (described in Refs.~\cite{Goodsell:2014bna,Goodsell:2014pla}) is to exploit the fact that we work in the gaugeless limit and, in our two loop calculation, can therefore neglect corrections to the mass proportional to electroweak gauge couplings: we use the full potential $V_0 + V_1 + V_2|_{\rm gaugeless}$ to solve the tadpole equations, and then use the parameters determined from these in our pure gaugeless tree-level potential $V_0|_{\rm gaugeless}$ to determine the masses in our theory. Since we are effectively working in a false minimum the {\ensuremath{\overline{\mathrm{DR}}}}\xspace goldstone masses entering in our two-loop calculation are non-zero and of order the electroweak boson masses. This has the effect of taming the problem for most parts of the parameter space.
The first subtlety related to this approach as concerns CP violation is that the goldstone masses are typically tachyonic, and we retain only the real part of the loop functions. It is legitimate to ask whether the tadpole and self-energy diagrams that we compute really then correspond to the first and second derivatives of the two-loop potential once we introduce CP violation, since the complex parts of the couplings may in principle multiply a complex loop function. However, the terms in the potential, given in Ref.~\cite{Martin:2001vx}, all have the form
$$\Delta^{(2)} V_{\rm (given\ topology)} = \bigg( \mathrm{Real\ product\ of\ couplings}\bigg) \times \bigg( \mathrm{loop\ function\ of\ masses}\bigg) $$
with the exception of one contribution involving fermions and scalars, given by
$$
V^{(2)}_{\overline{FF}S} = {1\over 4} y^{IJk} y^{I'J'k} M^*_{II'} M^*_{JJ'}
f_{\overline{FF}S} (m^2_I, m^2_J, m^2_k) + {\rm c.c.}.
$$
However, this should be understood as $\mathrm{Re} ({1\over 2} y^{IJk} y^{I'J'k} M^*_{II'} M^*_{JJ'}) f_{\overline{FF}S} (m^2_I, m^2_J, m^2_k)$ and so falls into the same class as the other terms. Then, when we take the derivatives of the loop functions, since the masses are real, their derivatives with respect to real scalars are real, and we find that the imaginary part of the derivatives of the potential is always the same as the derivatives of the imaginary part, as we require for consistency of our approach.
The second subtlety once we calculate the masses of CP-odd scalars, or when we have CP violation which mixes originally even and odd scalars, is that among our scalars we now have (would-be) goldstone bosons. We must therefore ensure that the final goldstone boson masses should vanish in the Landau gauge once we add the two-loop corrections to the tree and one-loop terms.
To show that this is the case in our approach, let us write
\begin{align}
V_0 \equiv \frac{1}{2} m_{ij}^2 S_i S_j + \tilde{V}_0 + \tilde{V}_0^D
\end{align}
for scalars $S_i$, where $\tilde{V}_0^D$ is the gauge-coupling dependent part that vanishes in the gaugeless limit. At tree level, the tadpole equations are used to determine some subset of the {\ensuremath{\overline{\mathrm{DR}}}}\xspace mass parameters; let us take them here to be defined to be the diagonal terms:
\begin{align}
m_{0,ij}^2 v_j \equiv& - \partial_i \tilde{V}_0- \partial_i \tilde{V}_0^D \nonumber\\
\rightarrow m_{0,ii}^2 =& - \frac{1}{v_i} \big( \partial_i \tilde{V}_0 + \partial_i \tilde{V}_0^D \big)) - \frac{1}{v_i}\sum_{j\ne i} m_{0,ij}^2 v_j
\end{align}
and we then compute the particle masses at tree level
\begin{align}
\mathcal{M}_{0,ij}^2 \equiv& m_{0,ij}^2 + \partial_i \partial_j \tilde{V}_0 + \partial_i \partial_j\tilde{V}_0^D \nonumber\\
\mathcal{M}_{0,ij}^2\big|_{\rm gaugeless} \equiv& m_{0,ij}^2 + \partial_i \partial_j \tilde{V}_0.
\end{align}
We then compute the potential and one-loop self-energies using these \emph{tree-level} masses:
\begin{align}
\Delta V \equiv V_1 (\mathcal{M}_{0,ij}^2) + V_2 (\mathcal{M}_{0,ij}^2\big|_{\rm gaugeless}) .
\end{align}
From these we solve the tadpole corrections so that
\begin{align}
m_{ij}^2 =& m_{0,ij}^2 - \frac{\delta_{ij}}{v_i} \partial_i \Delta V \nonumber\\
\mathcal{M}_{ij}^2 (p^2 ) =& m_{ij}^2 + \partial_i \partial_j \tilde{V}_0 + \partial_i \partial_j\tilde{V}_0^D + \Pi_{1,ij} (p^2, \mathcal{M}_{0,ij}^2) + \partial_i \partial_jV_2 (\mathcal{M}_{0,ij}^2\big|_{\rm gaugeless}).
\end{align}
Here $ \Pi_{1,ij}$ is the one-loop self-energy. The masses of the neutral scalars are then found as the eigenvalues of this matrix with $p^2 = m^2$ via an iterative procedure; however, for the Goldstone bosons, we merely need to verify the presence of a null eigenvector for $p^2 = 0$, when $ \Pi_{1,ij} (0, \mathcal{M}_{0,ij}^2) = \partial_i \partial_jV_1$. For $p^2=0$ we can rewrite the above as
\begin{align}
\mathcal{M}_{ij}^2 (0) =& \mathcal{M}_{0,ij}^2 + \Delta_1 \mathcal{M}_{ij}^2 (\mathcal{M}_{0,ij}^2) + \Delta_2 \mathcal{M}_{ij}^2 ( \mathcal{M}_{0,ij}^2\big|_{\rm gaugeless}) \nonumber\\
\Delta_\ell \mathcal{M}_{ij}^2 \equiv&- \frac{\delta_{ij}}{v_i} \partial_i V_\ell + \partial_i \partial_jV_\ell .
\end{align}
To prove that our procedure retains a massless Goldstone boson, we recall the standard proof: if a potential is invariant under a global symmetry where $S_i \rightarrow S_i + \alpha_i$, then
\begin{align}
\alpha_i \frac{\partial V}{\partial S_i}=&0, \qquad \frac{\partial \alpha_i}{\partial S_j} \frac{\partial V}{\partial S_i} + \alpha_i\frac{\partial^2 V}{\partial S_i \partial S_j} =0.
\end{align}
This is true order by order in perturbation theory. If we are at the minimum of the potential, then the first term in the second equation vanishes and we have a null eigenvector of the mass matrix given by $\Delta_i$. However, for the two-loop calculation we are not working at the true minimum of the potential, nor are we using the same potential; instead our tree-level potential has $\tilde{V}^D$ removed, and we solve the tadpole equations according to
\begin{align}
\frac{\partial }{\partial S_i} \big( \frac{1}{2} \hat{m}_{ij}^2 S_i S_j + \tilde{V}_0 + \hat{V}_1 + V_2 \big) = - \frac{\partial \tilde{V}^D_0}{\partial S_i}
\end{align}
where here we have denoted by $\hat{m}_{ij}^2, \hat{V}_1$ the masses and one-loop potential, to indicate that they are in the gaugeless limit; note however that we do not compute or require $\hat{V}_1$.
Therefore
\begin{align}
\alpha_i \frac{\partial^2 }{\partial S_i \partial S_j} \bigg( \frac{1}{2} \hat{m}_{ij}^2 S_i S_j + \tilde{V}_0 + \hat{V}_1 + V_2 \bigg) = - \frac{\partial \alpha_i}{\partial S_j} \frac{\partial \tilde{V}^D_0}{\partial S_i}.
\end{align}
The term on the right-hand side of this equation is necessary to give a mass to the goldstone boson at tree level to mitigate the goldstone boson catastrophe. However, all that we take from this comptuation is the derivatives of the two-loop potential;
since we solve for the solution in the same way at tree-level and at two-loops, and because the potential $ \frac{1}{2} m_{ij}^2 S_i S_j + \tilde{V}_0$ is invariant under the global symmetry (even if the minimum we choose is not) then we find
\begin{align}
\alpha_i \frac{\partial^2 }{\partial S_i \partial S_j} \bigg( \frac{1}{2} \hat{m}_{0,ij}^2 S_i S_j + \tilde{V}_0 \bigg) =& - \frac{\partial \alpha_i}{\partial S_j} \frac{\partial \tilde{V}^D_0}{\partial S_i} \nonumber\\
\rightarrow \alpha_i \big(\Delta_2 \mathcal{M}_{2,ij}^2\big) =& 0.
\end{align}
Since the one-loop computation used in actually calculating the scalar masses is performed in the minimum of the full potential it will automatically have massless goldstone bosons; then $\alpha_i \mathcal{M}_{ij}^2(0) = 0$ when including all corrections as required. It is a highly non-trivial check of our implementation that this should be true; we show this check of our code in the next section and find that it is satisfied to a high level of accuracy.
\section{MSSM}
\label{SEC:MSSM}
In \SARAH, we express the Higgs doublets in the MSSM in the usual form shown in eq.~(\ref{eq:Hphases}).
Since we are considering CP-violation, the $\mu$-term and holomorphic soft-breaking parameters are allowed to be complex, and in general all of the neutral scalars $\phi_{u,d}, \sigma_{u,d}$ mix, with one state yielding the Goldstone boson of the Z. We use the pure {\ensuremath{\overline{\mathrm{DR}}}}\xspace renormalisation scheme, and once we use the measured values of the lepton and quark masses, electroweak gauge couplings and weak mixing angle, Z boson mass, to determine the corresponding {\ensuremath{\overline{\mathrm{DR}}}}\xspace quantities (Yukawa couplings, gauge couplings, electroweak expectation value), we still have a choice of parameters to be eliminated by the scalar tadpole equations. If we define $B_\mu \equiv e^{i\varphi_{B_\mu}} |B_\mu|$ these read
\begin{align}
0=& m_{H_d}^2 + \frac{1}{2} c_{2\beta}^2 M_Z^2 + |\mu|^2 - t_\beta |B_\mu|\cos (\eta + \varphi_{B_\mu}) + \frac{1}{v_d} \frac{\partial \Delta V}{\partial \phi_d} \\
0=& m_{H_u}^2 -\frac{1}{2} c_{2\beta}^2 M_Z^2 + |\mu|^2 - \frac{|B_\mu|}{t_\beta}\cos (\eta + \varphi_{B_\mu}) + \frac{1}{v_u} \frac{\partial \Delta V}{\partial \phi_u} \\
0=& \sin (\eta + \varphi_{B_\mu}) |B_\mu| + \frac{1}{v_u} \frac{\partial \Delta V}{\partial \sigma_d} = \sin (\eta + \varphi_{B_\mu}) |B_\mu| + \frac{1}{v_d} \frac{\partial \Delta V}{\partial \sigma_u}.
\end{align}
The last two equations are not independent due to the gauge symmetries. Note also that $\eta $ and $\varphi_{B_\mu}$ are not independent: in the above they appear in the combination $\eta + \varphi_{B_\mu}$ so at tree level $\eta = - \varphi_{B_\mu}$.
In the on shell scheme used by Refs.~\cite{Frank:2006yh,Hollik:2014wea,Hollik:2014bua}, the charged Higgs mass and $\mu$ are taken as input parameters; this is equivalent to specifying $|B_\mu|$ in the above equations and using the third tadpole equation to determine $\eta + \varphi_{B_\mu}$. This has the advantage of using a physical input, but the disadvantage of disguising potentially large tuning in the underlying values, particularly for small $\tan \beta$ where the loop corrections to the Higgs mass must be large, and typically lead to large corrections to the other Higgs masses too as we shall see in the following. In the {\ensuremath{\overline{\mathrm{DR}}}}\xspace scheme $\eta$ (hence $\eta + \varphi_{B_\mu}$) is not a fundamental parameter, but rather something that should be derived. On the other hand, it appears in the Higgs couplings and would therefore be complicated to solve for, requiring a computationally-expensive iterative procedure and problems with non-zero goldstone boson masses (since we would be violating the condition that the shift is linear in a mass-squared parameter required in sec.~\ref{SEC:METHOD}. Instead, we fix $\eta$ and use the tadpole equations to determine $B_\mu$.
Since the tadpole corrections are typically small compared to $B_\mu v_u$ this is a small adjustment and we can regard our choice of $\eta$ as being, to a good approximation, equivalent to minus the phase of $B_\mu$. For expediency due to the very strong constraints upon it we take $\eta=0$; we must then regard this as a tuning between $B_\mu$ and the other CP-violating phases in the theory for large values of $\varphi_{B_\mu}$.
There then remain two options: one conventional choice, as in the CP-conserving case, is to solve the tadpole equations for $|\mu|^2$ and $B_\mu$; this is appropriate when we have GUT-scale boundary conditions where we expect the other soft masses to unify (and we shall use this choice in subsection \ref{sec:MSSM_GUT}). For our study with low-energy boundary conditions in subsection \ref{sec:MSSM_Low} we shall choose to solve for $m_{H_d}^2, m_{H_u}^2$ and $\mathrm{Im}(B_\mu)$, taking $\mu$ and $\mathrm{Re}(B_\mu)$ as input parameters. This has the advantage that the tree-level heavy-Higgs masses are simply fixed by $\frac{|B_\mu|}{\sin \beta \cos\beta}$ so is closer to the on-shell interpretation; but as we shall see the loop corrections can be so large as to render a direct comparision of calculations in the two approaches impossible. In fact, this is further exacerbated since Refs.~\cite{Hollik:2014wea,Hollik:2014bua} use the \emph{charged} Higgs mass as the on-shell parameter, and we are only able (so far) to calculate the charged Higgs mass to one loop order compared to their two.
\subsection{One-loop masses and tadpoles}
The stop/top sector dominates the one-loop corrections as in the CP-conserving case. If we are only concerned with the lightest Higgs mass in the decoupling limit, then the leading corrections in the top Yukawa coupling $y_t$ in the effective potential approximation are
\begin{align}
(m_h^{\rm approx})^2 = M_Z^2 c_{2\beta}^2 +
\frac{3}{32\pi^2 v^2} \bigg[& s_{2\theta}^2 (m_{\tilde{t}_1}^2 - m_{\tilde{t}_2}^2)^2 + 8 m_t^2 \log \frac{m_{\tilde{t}_1}^2m_{\tilde{t}_2}^2}{ m_t^4} \nonumber\\
& + \frac{s_{2\theta}^2}{2} (m_{\tilde{t}_1}^2 - m_{\tilde{t}_2}^2) \bigg( 8 m_t^2 - s_{2\theta}^2 (m_{\tilde{t}_1}^2 + m_{\tilde{t}_2}^2) \bigg)\log \frac{m_{\tilde{t}_1}^2}{m_{\tilde{t}_2}^2}\bigg]
\label{EQ:oneloopapprox}\end{align}
where $m_{\tilde{t}_{1,2}} $ are the masses of the stop eigenstates, $m_t$ is the top mass and the square of the sine of twice the mixing angle $\theta$ is defined as
\begin{align}
s_{2\theta}^2 \equiv& \frac{2 v^2 |e^{i\eta} T_{u}^{3,3} s_\beta - y_t \mu^* c_\beta|^2}{(m_{\tilde{t}_1}^2 - m_{\tilde{t}_2}^2)^2}.
\end{align}
Note that the stop mixing includes an additional phase (compared to the CP-even case) corresponding to the phase of $e^{i\eta} T_{u}^{3,3} s_\beta - y_t \mu^* c_\beta$, but we do not need that here.
The important observation here is that if we define $\mu \equiv e^{i \varphi_\mu }|\mu|, T_u^{3,3} \equiv e^{i\varphi_u}|T_u^{3,3}|$ then the phases only enter through the combination $\cos (\eta + \varphi_u + \varphi_\mu)$, and the result should be, to leading approximation, even in that combination of phases. Since our two-loop calculations are performed in the effective potential approach in the gaugeless limit, then this should also be true at two loops.
The tadpole contribution from the stops is also important to our calculation, in particular the tadpole for the $\sigma_u,\sigma_d$ fields. We find that the one-loop stop contribution to these tadpoles neglecting the gauge couplings is
\begin{align}
\frac{\partial \Delta V}{\partial \sigma_u} \supset& - \frac{3v}{16\pi^2} \mathrm{Im}\bigg[T_u^{3,3} e^{i\eta} \big( e^{i\eta} T_u^{3,3} s_\beta - y_t \mu^* c_\beta \big)^* \bigg] \left(\frac{{\mathbf A}_0(m_{\tilde{t}_1}^2) - {\mathbf A}_0(m_{\tilde{t}_2}^2)}{ m_{\tilde{t}_1}^2 - m_{\tilde{t}_2}^2}\right) \nonumber\\
\frac{\partial \Delta V}{\partial \sigma_d} \supset& - \frac{3v}{16\pi^2} \mathrm{Im}\bigg[\mu^* y_t \big( e^{i\eta} T_u^{3,3} s_\beta - y_t \mu^* c_\beta \big)^* \bigg] \left(\frac{{\mathbf A}_0(m_{\tilde{t}_1}^2) - {\mathbf A}_0(m_{\tilde{t}_2}^2)}{ m_{\tilde{t}_1}^2 - m_{\tilde{t}_2}^2} \right)
\end{align}
where we define ${\mathbf A}_0 (x) \equiv -x(\log x/Q^2 -1)$, $Q$ being the renormalisation scale. The function of masses on the right is a slowly-varying function with typical value of order unity, so with $\eta=0$ we have
\begin{align}
\mathrm{Im} (B_\mu) \sim & \frac{3}{16\pi^2} | y_t \mu T_u^{3,3} | \sin \beta \sin (\varphi_u + \varphi_\mu) .
\end{align}
So for $\tan \beta = 5$ (for example) and $|T_u^{3,3}| = |\mu| = 2000\ {\ensuremath{\text{GeV}}}, y_t \sim 0.9$ and maximal CP-violation in the combination of phases on the right hand side we have $\mathrm{Im} (B_\mu) \sim (270\ {\ensuremath{\text{GeV}}})^2 $. For a \emph{purely imaginary} $B_\mu$ this would correspond to tree-level charged/heavy Higgs mass of $600\ {\ensuremath{\text{GeV}}}$; hence charged Higgs masses below $600\ {\ensuremath{\text{GeV}}}$ -- or, more realistically, somewhat heavier -- invoke additional fine-tuning and are difficult to impose in the {\ensuremath{\overline{\mathrm{DR}}}}\xspace scheme. In particular, this contributes to the fact that we cannot in any way reliably compare the results of our code to the benchmark scenarios of Refs.~\cite{Hollik:2014wea,Hollik:2014bua}, which involve lighter charged Higgs masses and larger trilinear couplings than we have quoted here.
\subsection{Alternative approach to the Higgs sector}
The MSSM is a special case as regards the two-loop mass computations in the gaugeless limit: there is no Goldstone Boson Catastrophe. To understand this, note that the tree-level Higgs potential consists only of the mass terms; the quartic couplings being given by the gauge couplings that are turned off. Hence the scalar masses are independent of the scalar expectation values in this limit. Now, the potential itself contains no divergences when taking the goldstone boson masses to zero -- the singluarities only appear in derivatives of the potential with respect to the goldstone boson masses -- and so the derivatives of the two-loop potential with respect to the scalar expectation values are finite. Hence we are free to consistently use the tree-level solution of the tadpole equations and mass matrices for the Higgs sector in the gaugeless limit, as was done for the calculations in the CP-conserving MSSM in Refs.~\cite{Degrassi:2001yf,Brignole:2001jy}.
We can then write the neutral scalar mass matrix $\mathcal{M}^2_{h} $ and charged Higgs mass matrix $\mathcal{M}^2_{H^{\pm}}$ in the gaugeless limit in the basis $\phi_d, \phi_u, \sigma_d, \sigma_u$ as
\begin{eqnarray}
& \mathcal{M}^2_{h} = \twoa[-\mathcal{M}_2^2 (-\tan \beta),0_{2\times2}][0_{2\times2},\mathcal{M}_2^2 (\tan \beta)] ,\quad\quad
\mathcal{M}^2_{H^{\pm}} = \mathcal{M}_2^2 (\tan \beta) &
\end{eqnarray}
where
\begin{align}
\mathcal{M}_2^2 (x) \equiv& \twoa[|B_\mu| x, |B_\mu|][|B_\mu|,|B_\mu|/x].
\end{align}
Using these mass matrices in the diagrammatic two-loop routines thus neatly avoids tachyonic masses in the two-loop functions, although it does not significantly affect the result.
\subsection{Two-loop Higgs mass with GUT boundary conditions}
\label{sec:MSSM_GUT}
If we take CMSSM boundary conditions, that is a unified A-term parameter $A_0$, scalar mass parameter $m_0$ and gaugino masses $M_{1/2}$, we should solve for $|\mu|^2$ and $B_\mu$ (both real and imaginary parts) at low energies (fixing the phase of $\mu$ as a choice). Then due to the strong constraints from electric dipole moments the phases of $\eta, \mu, m_{12}$ are constrained to be very small (of order $10^{-3} \div 10^{-2}$) and thus not interesting parameters for the Higgs mass; we are only left with the phase of $A_0$. However, without performing a detailed scan to search for tuned corners of the parameter space, typically points that match LHC constraints on squarks and gluinos alongside reproducing the correct Higgs mass, will tend to have large values of $B_\mu$ and thus heavy additional Higgses, showing little CP-violating effects.
We illustrate this in Fig.~\ref{fig:MSSMGUT}, where we define $A_0 \equiv -|A_0|e^{i\varphi_{A}}$ and vary the phase for two points:
\begin{center}
\begin{tabular}{||c|c|c|c||c|c|c||} \hline
$\tan \beta$ & $|A_0|$\ (GeV) & $m_0$\ (GeV) & $M_{1/2}$\ (GeV) & $m_{h_1}|_{\varphi_A =0}$\ (GeV) & $m_{h_{2}}|_{\varphi_A =0}$\ (GeV)& $m_{h_{3}}|_{\varphi_A =0}$\ (GeV) \\ \hline
$5$ & $4500$ & $2000$ & $2000$ & $125.0$ & $4118$ & $4118$\\ \hline
$10$ & $3300$ & $1500$ & $1000$ & $125.5$ & $2494$ & $2495$\\ \hline
\end{tabular}
\end{center}
Here we have given the values that we compute at two loops for the three Higgs neutral Higgs scalars with $\varphi_A = 0$. In the figure we show the mass of the lightest Higgs at one and two loops as we vary $\varphi_A$; we also show the heavier Higgs masses whose differences are less than one GeV, either between one and two loops or between the second and third eigenstates.
\begin{figure}[hbt]
\centering
\begin{tabular}{cc}
\includegraphics[width=0.45\linewidth]{Figs/MSSM_GUT_masses.pdf} & \includegraphics[width=0.45\linewidth]{Figs/MSSM_GUT_h2h3.pdf}
\end{tabular}
\caption{Plots of Higgs masses as the trilinear phase $\varphi_A$ is varied. On the left we show the lightest Higgs mass at one (dot-dashed) and two (solid) loops. On the right we show the masses of the heavier eigenstates which differ for each model by less than one GeV and so the distinction is not visible in the plot; the lower, blue, curve is for $\tan \beta =10$ while the upper, red, curve is for $\tan \beta = 5$.}
\label{fig:MSSMGUT}
\end{figure}
We selected small $\tan \beta$ values to maximise the visibility of the CP-violating effects, because in that way we can have a large difference between $\varphi_A =0$ and $\varphi_A = \pi$. This also requires large values of the trilinear couplings, and the contribution from stops to the Higgs mass must be large to obtain the correct value of the Higgs mass for at least some value of $\varphi_A$. However, this means that for typical points of the parameter space $B_\mu$ and $\mu$ will also be large, leading to heavy additional Higgses with small corrections to their masses at two loops. These states then have little impact on the light Higgs mass calculation and so the net effect is still little variation (of about $1$ GeV) in the two-loop contribution to the Higgs mass between $\varphi_A =0 $ and $\varphi_A = \pi$; almost all of the variation shown in the both plots of Fig.~\ref{fig:MSSMGUT} is due to the one-loop effects.
We finally note that the effect of large phases in the trilinears leads to gaugino phases through RGE running, and this in turn has a significant effect on the electron EDM $d_e$; we show the variation of this in Fig.~\ref{fig:MSSMGUT_EDM} and note that a small region near $\varphi_A = \pm \frac{\pi}{2}$ is already excluded for our $\tan \beta = 10$ scenario (recall that the contributions are proportional to $\tan \beta$ in e.g. eq.~(\ref{EQ:EDMchargino})). Thus we conclude that for CMSSM boundary conditions the CP-violating phases are well constrained and the specific two-loop corrections to the Higgs masses are less important. In the next subsection we shall consider more general low-energy boundary conditions.
\begin{figure}[hbt]
\centering
\includegraphics[width=0.6\linewidth]{Figs/MSSM_GUT_EDMs.pdf}
\caption{Electric dipole moment $d_e$ divided by electric charge $e$ as the trilinear phase $\varphi_A$ is varied, with exclusion bands shown, for values of $\tan \beta = 5$ (red) and $10$ (blue).}
\label{fig:MSSMGUT_EDM}
\end{figure}
\subsection{Two-loop shifts with SUSY-scale boundary conditions}
\label{sec:MSSM_Low}
If we take our boundary conditions at low energies (i.e at the masses of the squarks and gauginos) then, without a particular bias for the conditions at high energies, we are free given the constraints to consider a phase of the trilinear terms and the gluino. Here we shall restrict our attention to the stop trilinear term $T_u^{3,3}$ and maximise the effect of CP-violation in the stop sector since this is typically the source of the largest contributions at two loops. Thus again we shall consider a small $\tan \beta$ scenario; we take as our parameter values
\begin{gather}
T_u^{3,3} = 0.9 A_0 e^{i\varphi_u},\quad T_d^{3,3} = 0.064 A_0 ,\quad T_e^{3,3} = 0.05 A_0 ,\nonumber\\
A_0 = 3800\ {\ensuremath{\text{GeV}}},\quad \mu=3800\ {\ensuremath{\text{GeV}}}, \quad \tan \beta = 5,\quad \mathrm{Re}(B_\mu) = 10^6\ {\ensuremath{\text{GeV}}}^2 \left(\frac{\tan \beta}{1 + \tan^2 \beta}\right)\nonumber\\
m_{\tilde{L},ii}^2=m_{\tilde{e},ii}^2= m_{\tilde{q},ii}^2 = m_{\tilde{u},ii}^2= m_{\tilde{d},ii}^2= (3\times 10^3\ {\ensuremath{\text{GeV}}})^2, \quad i=1,2 \nonumber\\
m_{\tilde{L},33}^2=m_{\tilde{e},33}^2= m_{\tilde{d},33}^2 = (10^3\ {\ensuremath{\text{GeV}}})^2,\quad m_{\tilde{q},33}^2 = (1.6\times 10^3\ {\ensuremath{\text{GeV}}})^2,\quad m_{\tilde{u},33}^2= (1.52\times 10^3\ {\ensuremath{\text{GeV}}})^2 \nonumber\\
M_1 = 200\ {\ensuremath{\text{GeV}}}, \quad M_2=500\ {\ensuremath{\text{GeV}}},\quad M_3 = M_3^0 e^{i\varphi_{M_3}}.
\label{EQ:MSSM_LowPoint}\end{gather}
Here the prefactors of the trilinears are approximate values for the Yukawa couplings to allow simpler comparison between our points and those used in other works such as \cite{Hollik:2014wea,Hollik:2014bua}. The choice of the real part of $B_\mu$ (here we solve the tadpole equations for $m_{H_u}^2, m_{H_d}^2,\mathrm{Im}(B_\mu)$) is such that at tree level the heavy Higgs masses $m_{h_{2,3}}$ are at one {\ensuremath{\text{TeV}}}.
\subsubsection{Variation of gluino phase}
We expect that the gaugino phase $\varphi_{M_3}$, only entering the Higgs mass calculation at two loops in the {\ensuremath{\overline{\mathrm{DR}}}}\xspace scheme, should be an important parameter for our results. We show in Fig.~\ref{fig:MSSM_M3phase} the effect that it has on the three neutral Higgs masses and the parameter $\varphi_{B_\mu}$, for $\varphi_{u} = 0$ and $\varphi_u = \pi$. The first observation is that the difference between one and two loops is strongly dependent on $\varphi_{M_3}$; for $\varphi_u = 0$ this changes between $4$ and $7$ {\ensuremath{\text{GeV}}}, and for $\varphi_u = \pi$ between $2$ and $-5 $ {\ensuremath{\text{GeV}}}\ -- an overall shift of $7$ {\ensuremath{\text{GeV}}}\ in the latter case! While this point has been chosen to show a large variation, it underlines the importance of the two-loop corrections.
Looking more closely, we find that the effect at two loops is partly to compensate for the variation at one loop, giving a more constant value for all Higgs fields. We also have the potentially counter-intuitive result that the $\varphi_u = \pi$ points have a \emph{smaller} Higgs mass than for $\varphi_u = 0$, when we might expect that when the $A$-terms are aligned with the $\mu$-terms we should have more mixing and thus larger masses.
Both these observations have a simple explanation, that illustrates the need for the two loop routines. In the points that we have chosen with near maximal mixing, the soft terms are nearly degenerate, and so changes in the trilinear terms make only a small difference to the mixing angles. If we take the tree-level values of the stop masses and mixing (as we are required to do) and naively take $m_t = 173$ GeV, $v=246$ GeV we find for $\tan \beta = 5, M_3^0 = 2{\ensuremath{\text{TeV}}}$ the following calculated values for $m_h^{\rm approx} $ from eq.~(\ref{EQ:oneloopapprox}):
\begin{equation}
\begin{array}{||c|c|c|c|c|c||c||}\hline
\varphi_u & m_{\tilde{t}_1}\ ({\ensuremath{\text{GeV}}})& m_{\tilde{t}_2}\ ({\ensuremath{\text{GeV}}}) & s_{2\theta}^2 & m_t\ ({\ensuremath{\text{GeV}}}) & v\ ({\ensuremath{\text{GeV}}}) & m_h^{\rm approx}\ ({\ensuremath{\text{GeV}}})\\\hline
0 & 1403 &1716 & 0.936 & 173 & 246 & 123 \\
\pi & 1320 & 1781 & 0.970 & 173 & 246 & 129 \\\hline
\end{array}
\end{equation}
However, if we use the values actually calculated in \SPheno we find:
\begin{equation}
\begin{array}{||c|c|c|c|c|c|c||c||}\hline
\varphi_u & \varphi_{M_3} & m_{\tilde{t}_1}\ ({\ensuremath{\text{GeV}}})& m_{\tilde{t}_2}\ ({\ensuremath{\text{GeV}}}) & s_{2\theta}^2 & m_t^{{\ensuremath{\overline{\mathrm{DR}}}}\xspace}\ ({\ensuremath{\text{GeV}}}) & v\ ({\ensuremath{\text{GeV}}}) & m_h^{\rm approx}\ ({\ensuremath{\text{GeV}}}) \\\hline
0 & 0 &1403 &1716 & 0.936 & 151 & 244.2 & 101 \\
\pi & 0& 1320 & 1781 & 0.970 & 145 & 243.6 & 88.3 \\
0 & \pi & 1403 &1716 & 0.936 & 147 & 244.6 & 95.6 \\
\pi & \pi & 1320 & 1781 & 0.970 & 152 & 243.0 & 100 \\\hline
\end{array}
\end{equation}
Clearly the one-loop variation in the mass when we change $\varphi_{M_3}$ can only come from the change in the Yukawa coupling; the two loop shifts are then compensate for this (since the top-stop-gluino diagrams partly correspond to a self-energy correction to a top loop), which could presumably be more clearly seen in an on-shell scheme. What we also see is that when we vary $\varphi_u$ the shift in the top Yukawa has a much larger effect than the change in the mixing angle (since this can only be small when the mixing is already large). Therefore this observation is particular to the large mixing case; if the mixing were smaller, then potentially the variation of $\varphi_u$ could have the opposite effect and increase the Higgs mass as per our naive expectation.
\begin{figure}[!hbt]
\centering
\begin{tabular}{cc}
\includegraphics[width=0.45\linewidth]{Figs/MSSM_M3phaseAt0.pdf} & \includegraphics[width=0.45\linewidth]{Figs/MSSM_M3phaseAtpi.pdf} \\
\includegraphics[width=0.45\linewidth]{Figs/MSSM_M3phaseAt0_h2h3.pdf} & \includegraphics[width=0.45\linewidth]{Figs/MSSM_M3phaseAtpi_h2h3.pdf} \\
\includegraphics[width=0.45\linewidth]{Figs/MSSM_M3phase_xiB0.pdf} & \includegraphics[width=0.45\linewidth]{Figs/MSSM_M3phase_xiBpi.pdf}
\end{tabular}
\caption{Plots as the gluino phase $\varphi_{M_3}$ is varied for $M_3^0 = 2000$ {\ensuremath{\text{GeV}}}; left plots have $\varphi_u = 0$, right plots have $\varphi_u = \pi$. The top plots show the lightest Higgs mass at one (blue, dashed) and two (red) loops; the middle plots show the next lightest (green) and heaviest (red) at one (dashed) and two (solid) loops. The bottom plots show the calculated variation of the phase $\varphi_{B_\mu}$ at one (blue, dashed) and two (red) loops.}
\label{fig:MSSM_M3phase}
\end{figure}
The effect of $\varphi_u, \varphi_{M_3}$ on the heavy Higgses is very similar to the light Higgs: the loops compensate for the variation of the top Yukawa. But we note the enormous variation in their masses between $\varphi_u = 0, \pi$, and between one and two loops for $\varphi_{u} = \pi$; this underlines the tuning involved in the on-shell scheme when maintaining a constant heavy Higgs/charged Higgs mass. Finally, the variation of the phase $\varphi_{B_\mu}$ is significant enough that, if we were fixing the phase of $B_\mu$ and solving the tadpole equations for $\eta$, for most of the parameter space there would be large electric dipole moments; instead we find throughout that $|d_e/e| < 10^{-30}$.
\subsubsection{Variation of trilinear phase}
If we instead fix the gluino phase and vary $\varphi_u$, then we obtain Figs.~\ref{fig:MSSM_atphase} (for $\varphi_{M_3} = 0$) and \ref{fig:MSSM_atphase_M3pio2} (for $\varphi_{M_3} = \pi/2$). In those figures we show the variation of the light Higgs mass for three different values of $M_3^0$: the absolute value of the gluino mass clearly has a significant effect on the shift in the Higgs mass, of up to $2$ {\ensuremath{\text{GeV}}} variation in the difference of one- and two-loop results by itself.
\begin{figure}[!hbt]
\centering
\begin{tabular}{cc}
\includegraphics[width=0.5\linewidth]{Figs/MSSM_trilinear_h1.pdf} & \includegraphics[width=0.5\linewidth]{Figs/MSSM_trilinear_h1_diffs.pdf}
\end{tabular}
\caption{Left: plot of the lightest Higgs mass at one (blue) and two (red) loops as $\varphi_u$ is varied. The bands show the variation between $M_3 = 1500\ {\ensuremath{\text{GeV}}}$ and $2500\ {\ensuremath{\text{GeV}}}$. Right: difference between the one and two-loop lightest Higgs masses for three different values of $M_3$ marked in the plot, as $\varphi_u$ is varied. }
\label{fig:MSSM_atphase}
\end{figure}
\begin{figure}[!hbt]
\centering
\begin{tabular}{cc}
\includegraphics[width=0.5\linewidth]{Figs/MSSM_trilinear_h1_M3pio2.pdf} & \includegraphics[width=0.5\linewidth]{Figs/MSSM_trilinear_h1_diffs_M3pio2.pdf}
\end{tabular}
\caption{Same as figure \ref{fig:MSSM_atphase} but with $\varphi_{M_3} = \pi/2$.}
\label{fig:MSSM_atphase_M3pio2}
\end{figure}
Overall we find that $\varphi_u$ has a markedly larger impact on the Higgs mass than $\varphi_{M_3}$; as we discussed in the previous subsection this is largely due to the shift in the top Yukawa coupling rather than the change in mixing of the stops. However, the effect of the two loop corrections as we vary $\varphi_u$ is clearly not to compensate for the shift in the top coupling: in contrast to the previous subsection we see large variations of $\Delta m_h$ (being the difference between two- and one-loop lightest Higgs masses) between $-2$ and $6$ {\ensuremath{\text{GeV}}}\ in the maximally CP-violating case of $\varphi_{M_3} = \pi/2$; in that case we also see a significant asymmetry in the plot, which resembles in form figure 6 of Ref.~\cite{Hollik:2014bua} (indeed our parameter choices are deliberately similar), even though that calculation is in the on-shell scheme and as we have already remarked cannot be quantitively compared. Even more than the previous subsection, this therefore underlines the importance of the two loop corrections to obtaining a realiable calculation of the Higgs mass.
\section{Two-loop CPV effects in the NMSSM beyond $\mathcal{O}(\alpha_S\alpha_t)$}
\label{SEC:NMSSM}
\begin{figure}[hbt]
\centering
\includegraphics[width=0.5\linewidth]{Figs/NMSSM_Shifts_2L_ImAtop}
\caption{Size of the two-loop corrections as function of arg($A_t$) for different values of $|A_t|$: 1.5~TeV (dashed), 2.0~TeV (dotted), 2.5~TeV (full).
The red lines include only corrections $\mathcal{O}(\alpha_S \alpha_t)$, while the blue lines include {\it all} other corrections in the gaugeless limit approximation.}
\label{fig:NMSSMdiffAtop}
\end{figure}
In sec.~\ref{SEC:VALIDATION}, we concentrated on the impact of complex parameters on the one-loop corrections as well as the two-loop corrections $\mathcal{O}(\alpha_S\alpha_t)$ in the complex NMSSM. However, with the combination \SARAH/\SPheno one can immediately go beyond this: all non-vanishing two-loop corrections in the gaugeless limit are included automatically. Therefore, we can check how well the entire impact of the complex phases is covered by the $\mathcal{O}(\alpha_S\alpha_t)$ corrections. In the following, we use the same parameter values as in eq.~(\ref{eq:DefaultNMSSM}) if not stated otherwise. \\
We start with the phase of $A_t$ and show the change in the SM-like Higgs mass as function of arg($A_t$) in Fig.~\ref{fig:NMSSMdiffAtop} for three different values of $|A_t|$. As expected, the overall difference between the full two-loop corrections and the approximation using $\mathcal{O}(\alpha_S\alpha_t)$ grows with increasing $|A_t|$. However, for given $|A_t|$, the difference shows only a very mild depdence on the phase of $A_t$. Thus, at least for this parameter point the main sensitive of arg($A_t$) appears in the $(\alpha_S\alpha_t)$ corrections.
\begin{figure}[tb]
\centering
\includegraphics[width=0.49\linewidth]{Figs/NMSSM_Shifts_2L_ArgLambda} \hfill
\includegraphics[width=0.49\linewidth]{Figs/NMSSM_Differences_2L_ArgLambda}
\caption{On the left: size of the two-loop corrections as function of arg($\lambda$) for different values of $|\lambda|$: 0.4 (dashed), 0.6 (dotted), 0.7 (full).
The red lines include only corrections $\mathcal{O}(\alpha_S \alpha_t)$, while the blue lines include {\it all} other corrections in the gaugeless limit approximation. On the right: the differences between the red and blue lines. }
\label{fig:NMSSMdiffLambda}
\end{figure}
This is different for other phases like the one of $\lambda$: we show in Fig.~\ref{fig:NMSSMdiffLambda} the SM-like Higgs mass as function of arg($\lambda$) for three different values of $|\lambda|$. Here, we see not only a visible shift between the two different two-loop calculations, but also the dependence on the phase is very different. While the $\mathcal{O}(\alpha_S\alpha_t)$ corrections give the impression that the Higgs mass is reduced for a large phase of $\lambda$, the full calculation shows exactly the opposite. The Higgs mass actually increases for this point with increasing arg($\lambda$). As consequence, the Higgs mass is underestimated in the real case by the $\mathcal{O}(\alpha_S\alpha_t)$ corrections by about 1.3--1.6~GeV for all three vales of $|\lambda|$, while for arg($\lambda$) = $\pm$ 0.4 the discrepancy increases to 1.6--2.6~GeV. Thus, for singlet scenarios with large $\lambda$ and CP violation, the additional corrections now available with \SARAH/\SPheno can alter the SM-like Higgs mass by $O({\ensuremath{\text{GeV}}})$.
Moreover, leaving the discussion of the mass of the SM-like Higgs for a moment, we find even bigger effects of arg($\lambda$) on the mass of a light singlet. This is depicted in Fig.~\ref{fig:NMSSMlightSingletLambda} where we have taken as basis the benchmark point TP3 of Ref.~\cite{Staub:2015aea}, but with a large phase arg($\lambda$)=0.40--0.43. In this range, the mass of the light singlet shows a large sensitivity to the phase of $\lambda$. We find here that the two-loop corrections $\mathcal{O}(\alpha_S\alpha_t)$ shift the singlet mass between -0.5 and -1.0~GeV for this range, while the full two-loop corrections are about four times as large: for arg($\lambda$)=-0.4 they alter the singlet mass by -2~GeV, while for arg($\lambda$)=-0.43 they even cause a shift of more than -4~GeV.
\begin{figure}[tb]
\centering
\includegraphics[width=0.49\linewidth]{Figs/NMSSM_lightSinglet_argLam} \hfill
\includegraphics[width=0.49\linewidth]{Figs/NMSSM_lightSinglet_argLam_Diff}
\caption{On the left: light singlet mass as function of arg($\lambda$) for the benchmark secenario TP3 of Ref.~\cite{Staub:2015aea}. The right side, show the size of the two-loop corrections $\mathcal{O}(\alpha_S\alpha_t)$ only (dashed, red line), and of the sum of all two-loop corrections (full, blue line). The black dashed line gives the mass at the one-loop level. }
\label{fig:NMSSMlightSingletLambda}
\end{figure}
We also briefly give an example for the effect of arg($\kappa$) by picking the very last point proposed in Tab. 3 of Ref.~\cite{Moretti:2015bua}. The particular feature of this point is that it has two scalars close to the desired mass of 125~GeV when choosing a phase of $\kappa$ of about 0.52. We show in Fig.~\ref{fig:NMSSMkappa2H} the sensitivity of the properties of these two scalars to changing this phase. First, we find that the actual phase at which the two states are closest in mass is only slightly different between the full two-loop calculation and the one including only corrections involving the strong interaction. However, the minimal difference in mass which we find for the full calculation is smaller than 1.0~GeV, while with the incomplete calculation it is not possible to come closer than 1.6~GeV when keeping all other parameters but the phase fixed. An even more important effect can be seen when considering the character of the two states: the singlet admixture of the doublet state is quite dependent on the used two-loop calculation. One finds for instance that the full calculation has a smaller mixing when moving away from the cross-over point than the $\mathcal{O}(\alpha_S\alpha_t)$ predicts. Also close to the cross-over point we find that the mixing between the CP-even and odd states is different between both calculations and the CP-odd component of the singlet would be underestimated by up to 10\% when not including all necessary two-loop corrections.
\begin{figure}[tb]
\centering
\includegraphics[width=0.49\linewidth]{Figs/NMSSM_2H_argKappa} \hfill
\includegraphics[width=0.49\linewidth]{Figs/NMSSM_2H_argKappa_Diff} \\
\includegraphics[width=0.49\linewidth]{Figs/NMSSM_2H_argKappa_sing} \hfill
\includegraphics[width=0.49\linewidth]{Figs/NMSSM_2H_argKappa_CP}
\caption{Impact of arg($\kappa$) for a scenario with two Higgs states close to 125~GeV as proposed in Ref.~\cite{Moretti:2015bua}. Top, left: The mass of the second and third physical scalar at one-loop (dashed), and including two-loop corrections $\mathcal{O}(\alpha_s \alpha_t)$ (dotted), as well as all two-loop corrections as calculated by \SARAH/\SPheno (full line). Top, right: difference between the scalars when using $\mathcal{O}(\alpha_s \alpha_t)$ only (red), and the complete corrections (blue). Bottom, left: the singlet fraction of second (red) and third (blue) scalar using 2-loop corrections $\mathcal{O}(\alpha_s \alpha_t)$ only (dashed), and the complete 2-loop corrections in the gaugeless limit (full). Bottom, right: the CP-even fraction of the two states. The colour code is the same as on the left. }
\label{fig:NMSSMkappa2H}
\end{figure}
\section{Validation}
\label{SEC:VALIDATION}
\subsection{Comparison with CP-preserving case}
The first verification of our new routines is to compare with the CP-conserving case. In Fig.~\ref{fig:MSSMinter} we show the one- and two-loop lightest Higgs masses obtained in our code as we vary the trilinear CP-violating phase $\varphi_u \equiv \mathrm{arg}(T_u^{3,3})$ for a point in the complex MSSM; all definitions and other parameter values are given in sec.~\ref{sec:MSSM_Low}, we take $M_3 = 2$ {\ensuremath{\text{TeV}}}. On the same plot we show an \emph{interpolation} between the values in the CP-preserving MSSM for the values $\varphi_u = 0,\pi$ corresponding to $T_u^{3,3} = \pm |T_u^{3,3}$. Clearly the perfect agreement between the curves at the mid- and end-points indicates the agreement between the two codes. For the rest of the curve, the interpolation is
\begin{align}
m_h^{\rm interpolation} =& m_h^{\rm 1\ loop} (\varphi_u) + m_h^{\rm 2\ loops}\big|_{\varphi_u = 0} - m_h^{\rm 1\ loop}\big|_{\varphi_u = 0} \nonumber\\
& + (\varphi_u/\pi)^2 \bigg[ m_h^{\rm 2\ loops}\big|_{\varphi_u = \pi} - m_h^{\rm 1\ loop}\big|_{\varphi_u = \pi} - m_h^{\rm 2\ loops}\big|_{\varphi_u = 0} + m_h^{\rm 1\ loop}\big|_{\varphi_u = 0}\bigg]
\end{align}
For this point, the two-loop corrections are clearly well modelled by a quadratic; we shall investigate more interesting cases in sec.~\ref{sec:MSSM_Low}.
\begin{figure}[hbt]
\centering
\includegraphics[width=0.66\linewidth]{Figs/MSSM_interpolation.pdf}
\caption{Plot of the lightest Higgs boson mass in the MSSM, for the parameters given in sec.~\ref{sec:MSSM_Low} with $M_3 = 2000$ {\ensuremath{\text{GeV}}}, as the phase of the trilinear soft terms is varied. In red is the result of the new CP-violating code; the blue dashed curve is a quadratic interpolation of the values $\phi_u = 0, \pi$ from the Higgs mass calculated at two loops in the CP conserving routines, where the difference is added to the one-loop CP-violating case. As can be seen we find perfect agreement for the two routines at the values $\phi_u = 0,\pm \pi$. }
\label{fig:MSSMinter}
\end{figure}
\subsection{Check of the Goldstone mass}
\begin{figure}[hbt]
\centering
\includegraphics[width=0.66\linewidth]{Figs/Goldstone_M3.pdf}
\caption{The calculated mass for the neutral Goldstone Boson in the MSSM in Landau gauge as function of im($M_3$). The green line corresponds to the correct calculation.
The red lines show the impact of a possible inconsistency in the two-loop calculation: for the dashed line, the phase of $T_u$ was only included in the calculation of the masses and rotation
matrices entering the loop calculation, but dropped in the vertices. For the full line, the phase of the rotation matrix $Z_U$ was put to zero. For the dotted line
the phase of a single vertex in a single diagram involving gluino and (s)down (!) squarks was swapped. The other input
parameters are $m_0 = \text{re}(M_{1/2}) = 1$~TeV, $A_0 = -2$~TeV, $\tan\beta=10$, $\text{sign}(\mu)>0$.}
\label{fig:MG}
\end{figure}
As discussed in the previous section, there is an obvious but non-trivial check for the self-consistency of the entire loop calculation: the Goldstone Boson mass has to be correct. Thus, choosing Landau gauge, the lightest
eigenstate of the four neutral scalars must have zero mass. To obtain this in the complex case, a delicate cancellation of all phases appearing in the mass calculation of the fields in the loops, the phases in the vertices and the combination of the vertices in each diagram must happen. The impact of potential small inconsistencies in these calculations is demonstrated in Fig.~\ref{fig:MG} where we added by hand some mistakes: dropping imaginary parts of couplings only in the vertex calculation, neglecting the imaginary parts of the squark rotation matrices in the vertices, added a wrong complex conjugation to a single vertex in a single diagram. For the last point to illustrate the delicacy of the cancellations we have chosen a diagram only involving down squarks and not up squarks, which would have given an even much larger effect. While these mistakes have no impact on the results in the real case, one sees that they immediately spoil the prediction for the neutral Goldstone mass as soon as CP violation is turned on, and his provides a sensitive check for the correctness of our results.
\subsection{Comparison with the known NMSSM corrections}
\begin{figure}[tb]
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_1L_imLambda_h1} \hfill
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_1L_imLambda_h2} \hfill
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_1L_imLambda_h3} \\
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_2L_imLambda_h1} \hfill
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_2L_imLambda_h2} \hfill
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_2L_imLambda_h3}
\caption{Effect of the one-loop corrections (first row) and two-loop corrections (second row) on the masses of the three lightest scalars as function of
im($\lambda)$. The blue lines correspond to \SPheno, the red ones to \NC.}
\label{fig:NMSSMlam}
\end{figure}
The next check is to compare with existing results in literature. For the MSSM with CP violation the
codes \FH \cite{Heinemeyer:1998yj} and \CPH \cite{Lee:2003nta} exist. However, both codes use another renormalisation scheme compared to \SPheno. Therefore,
already differences in the real case are present which are often larger than the expected effects from
CP phases. Therefore, a quantitative comparison is not possible. The only other public code
which supports CP violation is \NC for the (scale-invariant) NMSSM.
\NC makes use of mixed $\overline{\mathrm{DR}}$--OS renormalization conditions for the computation of the Higgs
masses, but the OS effects in the (s)top sector can be turned off. This option together with some
modifications described in the following allow for a very precise comparison. \\
The Higgs mass calculation at one-loop
level is performed in \NC as in \SPheno including the full momentum dependence and all
possible contributions \cite{Ender:2011qh,Graf:2012hh}. At the
two-loop level only the ${\cal O}(\alpha_S \alpha_t)$ corrections are included
\cite{Muhlleitner:2014vsa}. The missing two-loop corrections will lead inevitable to a difference
between \SPheno and \NC. Moreover, as has been discussed in detail in Ref.\cite{Staub:2015aea} the
determination of the running {\ensuremath{\overline{\mathrm{DR}}}}\xspace parameters entering the Higgs mass calculation also differs between
both codes. Therefore, to have a meaningful comparison between codes in the case of CPV, we made the
following modifications
\begin{itemize}
\item {\tt \SARAH 4.8.3 and \SPheno 3.3.8}:
\begin{enumerate}
\item All two-loop corrections but the ones ${\cal O}(\alpha_S \alpha_t)$ were turned off.
\item The default input using SLHA-2 conventions \cite{Allanach:2008qq} were changed to SLHA-1 conventions \cite{Skands:2003cj}
for simpler comparison with \NC.
\item The tadpole equations were modified to be solved for im$(A_\kappa)$ and im$(A_\lambda)$ instead of
im$(T_\kappa)$ and im$(T_\lambda)$ at tree-level: \NC solves the tree-level tadpole equations to calculate im$(A_\kappa)$ and im$(A_\lambda)$, but calculates the radiative shifts to
im$(T_\kappa)$ and im$(T_\lambda)$, i.e. solves the loop-corrected tadpole equations with respect to other parameters than the tree-level
ones. The \SPheno code produced by \SARAH always solvs the tadpole equations at tree- and loop-level for the same parameters. This would have already given some difference
at the one-loop level for specific complex phases, in particular for complex $\kappa$.
\item The complex phases in the Yukawa couplings, which for instance appear via thresholds in the case
of complex $M_3$, were always put to zero becuase \NC supports only real
Yukawa couplings.
\end{enumerate}
\item {\tt \NC 2.0}:
\begin{enumerate}
\item A flag to calculate only tree-level masses has been included.
\item The internal calculation of the running SM parameters has been overwritten. Instead, the
values are now read in from the input file. This makes it possible to use exactly the same values
as \SPheno calculates.
\item The finite shifts to $g_1$, $g_2$ and $v$ were put to zero to have a pure {\ensuremath{\overline{\mathrm{DR}}}}\xspace renormalisation.
\item We fixed a bug in the two-loop calculation which we found during our comparison.
\footnote{The expression for $\delta^{(2)} M^2_{H^+}$, which is used to express the shifts in the two-loop scalar mass
matrix, contained a wrong prefactor for $\delta t_{\sigma_d}$.}
\end{enumerate}
\end{itemize}
The conventions for the phases of the Higgs fields are
\begin{align}
\label{eq:Hphases}
H_d \equiv \twov [\frac{1}{\sqrt{2}}(v_d + \phi_d + i \sigma_d),H_d^-],\qquad H_u \equiv e^{i\eta} \twov[H_u^+,\frac{1}{\sqrt{2}}( v_u + \phi_u + i \sigma_u)],\qquad S \equiv e^{i\eta_S} \frac{1}{\sqrt{2}}( v_S + \phi_S + i \sigma_S).
\end{align}
where $\eta$ is used as input, and $\eta_S$ is calculated from the complex input of $\mu_{\rm eff}$ and $\lambda$ via
\begin{equation}
\eta_S = \text{arg}(\mu_{\rm eff}) - \text{arg}(\lambda) \,.
\end{equation}
As default point we have chosen
\begin{eqnarray}
& \lambda=0.6 \,,\quad\kappa=-0.3\,,\quad\,A_\lambda=200~{\ensuremath{\text{GeV}}}\,,\quad A_\kappa=1000~{\ensuremath{\text{GeV}}}\,,\quad \tan\beta=3\,,\quad \mu_{\rm eff}=250~{\ensuremath{\text{GeV}}}&\nonumber\\
\label{eq:DefaultNMSSM}
&M_1 = M_2 = 1000~{\ensuremath{\text{GeV}}} \,,\quad M_3 = 1500~{\ensuremath{\text{GeV}}} \,,\quad A_t = 1500~{\ensuremath{\text{GeV}}}\,,\quad m_{\tilde t_L} = m_{\tilde t_R} = 1000~{\ensuremath{\text{GeV}}} &
\end{eqnarray}
All other sfermion soft masses were put to $1.5$~TeV, and all other $A$-terms to zero. \\
In Fig.~\ref{fig:NMSSMlam} we compare the radiative corrections to the three lightest scalars as function of im($\lambda$), while in Fig.~\ref{fig:NMSSM2}
the impact of the im($\mu_{\rm eff}$), and im($\kappa$) is shown. Finally, Fig.~\ref{fig:NMSSM3} depicts the dependence on im($M_3$), im($A_t$) and $\eta$.
\begin{figure}[tb]
\centering
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_1L_imMuEff} \hspace{1cm}
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_1L_imKappa} \\
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_2L_imMuEff} \hspace{1cm}
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_2L_imKappa}
\caption{Effect of the one-loop corrections (first row) and two-loop corrections (second row) on the mass of the lightest scalars as function of
im($\mu_{\rm eff}$) (left) and im($\kappa$) (right). The blue lines correspond to \SPheno, the red ones to \NC. }
\label{fig:NMSSM2}
\end{figure}
\begin{figure}[tb]
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_1L_imM3} \hfill
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_1L_imAtop} \hfill
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_1L_PhiU} \\
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_2L_imM3} \hfill
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_2L_imAtop} \hfill
\includegraphics[width=0.32\linewidth]{Figs/NMSSMCPV_2L_PhiU}
\caption{Effect of the one-loop corrections (left) and two-loop corrections (right) on the mass of the lightest scalars as function of
im($M_3$) (first row), im($A_{t}$) (second row) and $\phi_u$ (third row). The blue lines correspond to \SPheno, the red ones to \NC. }
\label{fig:NMSSM3}
\end{figure}
We find an overall very good agremment at the one- and two-loop level. The differences are at most $O(10~\text{MeV})$, which corresponds to
the agreement obtained in Ref.~\cite{Staub:2015aea} for the real case, and does not increase in the presence of very large phases. Even if it is
only possible to compare the corrections $O(\alpha_s \alpha_t)$ already the large majority of generic possible diagrams is covered. In particular
all generic diagrams involving fermions are included, i.e. this confirms the correct treatment of the terms $V^{(2)}_{\overline{FF}S}$ as discussed
in sec.~\ref{SEC:METHOD}.
|
\section{Introduction.}
As the number of on-road Electric Vehicles (EVs) increases rapidly, lack of adequate charging infrastructure is an area of growing concern. For example, a recent New York Times article reports that in California, scarcity of park-and-charge spots is a chronic problem: ``Electric-vehicle owners are unplugging one another's cars, trading insults, and creating black markets and side deals to trade spots in corporate parking lots'' \cite{NYTimesArticle}. While investing in a wide-spread deployment of charging stations by both public and private service providers is needed to address the infrastructure problem in the long-term, effective use of the existing charging infrastructure can help in significantly reducing this problem. In particular, curbing improper utilization of park-and-charge spots can improve their availability. Two prominent causes of utilization degradation are (i)~the overstaying problem, where an EV continues to occupy a park-and-charge spot even after it is fully charged, and (ii)~the ``icing'' problem, where a gas-powered car (Internal Combustion Engine or ICE vehicle) occupies a park-and-charge spot.
While icing and overstaying in park-and-charge spots are illegal in increasingly many jurisdictions, there is little or no enforcement \cite{NoEnforcementIcing}, as a result of which the frustrated users resort to ad-hoc measures ranging from mild (e.g., leaving courtesy notices) \cite{CourtesyNotice1,CourtesyNotice2} to drastic (e.g., publicly shaming the violator by posting a picture of the violation showing the violator's license plate on blogs and social media) \cite{PublicShaming1,PublicShaming2}. Extension cables that can help charge a vehicle parked a few spots away from an occupied park-and-charge spot are available in the market, but are very expensive \cite{ExtensionCable}. A longer term solution to these problems, however, will require both enforcement and an appropriate penalty for these events.
While enforcement with heavy penalty may help curb icing, a gentler approach is prudent to manage overstaying EVs. Depending on the demand for charging, overstaying EVs potentially block access to other EVs that might need charging, and so, it is important to discourage such behavior by imposing penalties. But, imposing too high a penalty might turn away EVs from using the park-and-charge facility altogether due to increased risk of a steep fine, since EV users may not exactly know their parking duration beforehand.
Our central contribution in this paper is a novel framework that combines a realistic user behavior model with traditional queueing dynamics to capture this trade-off and study the optimal penalty from the points of view of both utilization and revenue. Next, when the model parameters are unknown, we show how the well known UCB learning algorithm can be adapted to learn the optimal penalty over a period of time. Our experiments, based on charging data from London, show that an appropriate penalty results in increased utilization and significantly increased revenue. Also, perhaps surprisingly, we observe that the utilization achieved by imposing the revenue-maximizing penalty is very close to the maximum utilization.
\subsection{Related work.}
Dynamic pricing of parking has been an area of active study in the transportation literature. In~\cite{onnokdd,rowe2011}, the authors present dynamic pricing schemes for regular parking based on estimated demand to reduce both congestion and underuse. On the other hand, significant work has also been done on dynamic pricing of electric vehicle charging. In~\cite{tushar2012}, the authors model the problem as a Stackelberg game between the smart grid as the leader setting the price, and the vehicle owner as the follower deciding their charging strategies. In~\cite{anglin2013,gadh2012,hafner2009}, dynamic pricing of electricity for charging EVs is proposed based on the usage data in a given location and time. None of the above work, however, consider the problem of overstaying EVs. To the best of our knowledge, this is the first paper to investigate designing penalty schemes for park-and-charge facilities to combat overstaying EVs.
To address the situation where the probability distributions required for modelling user behaviour remain unavailable to the system until the users are actually observed, and the user behaviour needs to be learned over time, we model our problem as a Multi-Armed Bandit (MAB) problem, which has been well studied \cite{bubeck2012regret,auer2002finite,cesa2006prediction,agrawal1995sample} and applied to a wide variety of domains such as crowdsourcing, online advertising, dynamic pricing, and smart grids. However, we are not aware of any application of MABs to the park-and-charge scenario.
\section{Park-and-Charge system model.}
We adopt a simple three-part model for a parking area:
\begin{enumerate}[(a)]
\item Section~\ref{ssec:pricing-penalty} introduces the pricing function (during charging) and penalty function (during overstaying) for an EV.
\item Section~\ref{ssec:user-behavior} models how EV users respond to the posted penalty scheme, i.e., (i)~whether they agree to its terms and enter the parking area, and if so, (ii)~how long they stay.
\item Section~\ref{ssec:queueing} models the flow of EV users in and out of the parking area using queueing dynamics.
\end{enumerate}
We end the section by defining some performance measures of interest in Section~\ref{ssec:performance-metrics}.
\subsection{Pricing and penalty functions.}\label{ssec:pricing-penalty}
Let the price function while actively charging be $p_{c}(t)$ and the penalty function for overstaying at a park-and-charge spot after charging is complete be $p_{o}(t)$, where $p_{c}(0)=p_{o}(0)=0$, and $p_{c}(t)$ and $p_{o}(t)$ are continuous, nondecreasing functions. In addition, we assume that $p_{o}(t)$ is a strictly increasing function, since we will need its inverse function, $p_{o}^{-1}$, to be well defined.\footnote{The framework can be extended to the case where $p_{o}(t)$ is not strictly increasing, by defining $p_{o}^{-1}(x) = \sup\{t:p_{o}(t)=x\}$. This could accommodate, for example, an initial ``grace period'' (no penalty) after charging is complete.} To be realistically implementable (easily understandable by an average user), these functions should not be more complicated than simple piecewise linear functions; however, our framework is general and can accommodate arbitrary functions. These functions are illustrated in Figure~\ref{fig:price-penalty-functions}.
\begin{figure}[ht]
\centering
\includegraphics[width=0.4\columnwidth]{price-penalty-functions.png}
\caption{Pricing and penalty functions for an example scenario.\label{fig:price-penalty-functions}}
\end{figure}
\subsection{EV user behavior.}\label{ssec:user-behavior}
We define the following parameters, for each EV user:
\begin{itemize}
\item $T_c$, the duration of time it would take to fully charge their electric vehicle,
\item $T_a$, the length of their appointment, i.e., the EV user's preferred parking duration, and
\item $C_{\max}$, the ``penalty threshold'', i.e., the maximum penalty as a result of overstaying that they would bear for the convenience of an uninterrupted appointment.
\end{itemize}
Let $T_c$, $T_a$, $C_{\max}$ be independent, nonnegative random variables with finite means and cumulative distribution functions $F_c, F_a, F_{\max}$ respectively.\\
\noindent\textbf{Penalty acceptance probability:} When a user arrives at the parking area and inspects the posted penalty scheme, they know their $T_c$ and $C_{\max}$ values, but they may not know exactly how long their appointment will last; hence $T_a$ is not yet realized. However, the user can still estimate the likelihood that their penalty would not exceed $C_{\max}$, as follows:
\begin{equation}\label{eq:q}
q = Pr\left(p_{o}\left(T_a-T_c\right)\leq C_{\max}\right) = F_a(T_c + p_{o}^{-1}(C_{\max})).
\end{equation}
Thus, we assume that an arriving user will enter the parking lot with probability $q$. Let $\overline{q}$ denote its mean, given by:
\begin{equation}\label{eq:qbar}
\overline{q}=\int\int F_a\left(T_c+p_{o}^{-1}(C_{\max})\right)dF_c dF_{\max}.
\end{equation}
\noindent\textbf{Actual parking duration:} If a user decides to enter the parking area, they park their EV at a park-and-charge spot and leave for their appointment. $T_a$ is then realized, and if it exceeds $T_c + p_{o}^{-1}(C_{\max})$, we assume that the user reluctantly interrupts their appointment to avoid paying more than $C_{\max}$ penalty. Thus, the actual parking duration is given by:\footnote{If the realized value of $T_{a}$ is less than $T_c$, we assume that the user leaves immediately after $T_a$ time units, without waiting for their EV to finish charging.}
\begin{equation}\label{eq:tpc}
T_{pc} = \min\left\{T_c + p_{o}^{-1}(C_{\max}),T_a\right\},
\end{equation}
and hence, the duration of time the EV overstays is given by:
\begin{equation}\label{eq:to}
T_{o} = \left(T_{pc}-T_c\right)^+ = \max\{T_{pc}-T_c,0\}.
\end{equation}
\noindent\textbf{Revenue collected:} The revenue from an EV's time at the park-and-charge spot (the cost to the EV user) is given by:
\begin{equation}\label{eq:rev}
R = p_{c}(T_{pc}-T_{o}) + p_{o}(T_{o}).
\end{equation}
\subsection{Queueing model.}\label{ssec:queueing}
Since there is a finite number of park-and-charge spots in the parking area, the impact of overstaying depends on the arrival process to the parking lot, e.g., if the inter-arrival times are uniformly distributed with a low arrival rate, a limited amount of overstaying may be harmless, as opposed to a high arrival rate during weekends at a mall. We capture such phenomena using an $M$/$G$/$N$/$N$ queueing model~\cite{Kleinrock75}, where the EVs that accept the posted penalty scheme and enter the parking lot are the ``jobs'', and the $N$ park-and-charge spots are the ``servers''. The parameters and assumptions are as follows:
\begin{itemize}
\item EVs arrive at the parking area according to a Poisson process with rate $\lambda$. However, only those EVs whose users accept the posted penalty scheme (with probability $q$, given by~\eqref{eq:q}), and enter the parking area are counted for further analysis. Using the total probability theorem and the well known ``Poisson splitting'' property, it can be shown (see Proposition~\ref{prop:poisson} below) that this ``filtered'' arrival process is still Poisson, with rate $\lambda\ \overline{q}$, where $\overline{q}$ is given by~\eqref{eq:qbar}.
\item An arriving EV that finds all $N$ park-and-charge spots occupied leaves the system (there is no waiting). Otherwise, the EV stays at a park-and-charge spot for a duration of $T_{pc}$, given by~\eqref{eq:tpc}; thus, the service times are i.i.d. according to the cumulative distribution function of $T_{pc}$.\footnote{This could be a general distribution; however, in an $M$/$G$/$N$/$N$ system, the stationary distribution of its Markov chain (that tracks the number of EVs) depends on the service time distribution only through its mean.}
\end{itemize}
If $N_{pc}$ is the random variable denoting the number of EVs in the parking area, then its steady state distribution is given by:
\begin{equation}\label{eq:mgnn}
Prob\left(N_{pc}=i\right) = \frac{\rho^i/i!}{\sum_{j=0}^{N} \rho^j/j!},\quad 0\leq i\leq N,
\end{equation}
where $\rho=\lambda\ \overline{q}\ \mathbb{E}[T_{pc}]$ is the ``offered load''. Thus, in steady state, the mean number of EVs in the parking area is:
\begin{equation}\label{eq:meanNpc}
\mathbb{E}[N_{pc}] = \rho\left(1-\frac{\rho^N/N!}{\sum_{j=0}^{N} \rho^j/j!}\right).
\end{equation}
\begin{proposition}\label{prop:poisson}
Let $X(t)$ be a Poisson process with rate $\lambda$, and let each arrival $i$ counted by this process be associated with a parameter $Y_i$ that is drawn independently for each $i$ from a common distribution $Y$. If $X'(t)$ is a filtered process that counts each $X(t)$-arrival $i$ with probability $h(Y_i)$, then $X'(t)$ is also a Poisson process with rate $\lambda\ \overline{h}$, where $\overline{h}=\mathbb{E}_Y[h(Y)]$.
\end{proposition}
\proof{Proof.}
The probability with which a random $X(t)$-arrival is counted is given by
\begin{equation*}
\begin{split}
Prob\left(\mbox{arrival $i$ is counted}\right) &= \int Prob\left(\mbox{arrival $i$ is counted}\ |\ Y_i=y\right) dF_Y(y)\\
&= \int h(y)dF_Y(y) = \overline{h},
\end{split}
\end{equation*}
where $F_Y$ denotes the cumulative distribution function of $Y$. The first step follows from the total probability theorem, and the last step is the definition of expectation. It then follows from the well known Poisson splitting property that the filtered process $X'(t)$ is also Poisson with rate $\lambda\ \overline{h}$.
\eProof
\subsection{Performance measures.}\label{ssec:performance-metrics}
We define the following performance measures of interest. Throughout, $T>0$ denotes an arbitrary duration of time.
\begin{enumerate}[(a)]
\item \textbf{Throughput:} The throughput of the park-and-charge system, denoted by $\tau$, is the average rate at which EV users leave the park-and-charge area, given by:
\begin{equation}\label{eq:throughput}
\tau = \frac{\mathbb{E}[N_{pc}]}{\mathbb{E}[T_{pc}]}.
\end{equation}
\item \textbf{Overstay:} The fraction of time spent overstaying at park-and-charge spots, denoted by $\gamma_o$, is given by:
\begin{equation}\label{eq:overstaying}
\gamma_o = \frac{\mbox{Overstaying Time}}{\mbox{Total Time}} = \frac{\tau\ T\ \mathbb{E}[T_o]}{N\ T} = \frac{\mathbb{E}[N_{pc}]}{N}\frac{\mathbb{E}[T_o]}{\mathbb{E}[T_{pc}]}.
\end{equation}
\item \textbf{Utilization:} The utilization, denoted by $\gamma_u$, is defined as the fraction of time the park-and-charge spots were used for charging, and is given by:
\begin{equation}\label{eq:utilization}
\begin{split}
\gamma_u = \frac{\mbox{Charging Time}}{\mbox{Total Time}} &= \frac{\tau\ T\ \mathbb{E}[T_{pc}-T_o]}{N\ T}\\
&= \frac{\mathbb{E}[N_{pc}]}{N}\left(1-\frac{\mathbb{E}[T_o]}{\mathbb{E}[T_{pc}]}\right).
\end{split}
\end{equation}
\item \textbf{Revenue Rate:} The revenue rate $\overline{R}$ is defined as the average rate at which revenue is accrued from the park-and-charge spots, and is given by:
\begin{equation}\label{eq:revrate}
\overline{R} = \frac{\mbox{Total Revenue}}{\mbox{Total Time}} = \frac{\tau\ T\ \mathbb{E}[R]}{T} = \frac{\mathbb{E}[N_{pc}]\ \mathbb{E}[R]}{\mathbb{E}[T_{pc}]}.
\end{equation}
\end{enumerate}
When $T_c$, $T_a$, $C_{\max}$ are generally distributed, and the price/penalty functions $p_c(t)$, $p_o(t)$ are general, the above quantities do not admit closed form expressions, and we defer their (partial) mathematical derivations to Appendix~\ref{appendix:computeExpr}. However, in Section~\ref{specialCase}, we investigate a simple special case where the price/penalty functions are linear, $T_c$ and $T_a$ are Exponentially distributed, and $C_{\max}$ is a constant, and derive closed form expressions for these performance measures.
\noindent\textbf{Benchmarking performance:} In order to measure the effectiveness of our penalty scheme, we benchmark it against a system with ``ideal'' human behavior, one in which the EV users, on their own, do not overstay, i.e., $T_{pc}=\min\{T_c,T_a\}$. Here, $\overline{q}=1$, and the revenue from~\eqref{eq:rev} is simply $p_{c}(T_{pc})$.
\section{Example scenario: Linear functions, Exponential distributions.}\label{specialCase}
In this section, we consider a simplified scenario for which we derive closed form expressions for the performance measures, which allows better analysis of the effectiveness of imposing simple, linear penalties for overstaying. In particular, we assume:
\begin{itemize}
\item \textit{Linearity:} Let $p_{c}(t)=\alpha_c t$ and $p_{o}(t)=\alpha_o t$, where $\alpha_c > 0$ and $\alpha_o\geq 0$ are the parameters.
\item $T_c$ and $T_{a}$ are Exponentially distributed with parameters $\mu_c$ and $\mu_a$ respectively.
\item $C_{\max}$ is not a random variable, but a constant.
\end{itemize}
Under these assumptions, the acceptance probability $q$ from~\eqref{eq:q} and its mean $\overline{q}$ from~\eqref{eq:qbar} can be evaluated to obtain $q=1-\beta e^{-\mu_a T_c}$ and $\overline{q} = 1-\frac{\beta\mu_c}{\mu_a+\mu_c}$ respectively, where
\begin{equation}\label{eq:beta}
\beta = e^{-\mu_a \frac{C_{\max}}{\alpha_o}}.
\end{equation}
\textbf{Conditional distribution of $T_c$:} While $T_c$ is Exponentially distributed by assumption, given that (with probability $q$,) an EV accepts the posted penalty and enters the parking lot (call this event $E$), the \textit{conditional} random variable $T_c|E$ need not be Exponential. ($T_{a}$ remains unchanged, since $E$ does not depend on it.) Thus, we first compute the conditional probability density function, $f_{c|E}$, using Bayes's rule, to obtain:
\begin{equation*}
\begin{split}
f_{c|E}(T_c) &= \frac{Prob(E\ |\ T_c)f_c(T_c)}{\int_{T_c=0}^{\infty}Prob(E\ |\ T_c)f_c(T_c)dT_c} = \frac{q\ f_c(T_c)}{\int_{T_c=0}^{\infty}q\ f_c(T_c)dT_c}\\
&= \frac{q\ f_c(T_c)}{\overline{q}} = \frac{1}{\overline{q}}\ \mu_c\ e^{-\mu_c T_c}\left(1-\beta e^{-\mu_a T_c}\right).
\end{split}
\end{equation*}
\subsection{Distribution and mean of \texorpdfstring{$T_{pc}$}{Tpc}.}
The complementary cumulative distribution function of $T_{pc}$, defined as $\overline{F}_{pc}(t) = Prob(T_{pc}> t)$, can be evaluated as:
\begin{equation*}
\begin{split}
\overline{F}_{pc}(t) &= Prob\left(T_a> t\right)Prob\left(T_c+p_{o}^{-1}(C_{\max})> t\ |\ E\right)\\
&= \left(1-F_a(t)\right)\left(\int_{T_c=t-\frac{C_{\max}}{\alpha_o}}^{\infty}f_{c|E}(T_c)dT_c\right)\\
&=
\begin{cases}
e^{-\mu_a t}, & 0\leq t \leq \frac{C_{\max}}{\alpha_o}\\
e^{-\mu_a t}\left(\int_{T_c=t-\frac{C_{\max}}{\alpha_o}}^{\infty}\frac{1}{\overline{q}}\ \mu_c\ e^{-\mu_c T_c}\left(1-\beta e^{-\mu_a T_c}\right)dT_c\right), & t \geq \frac{C_{\max}}{\alpha_o}
\end{cases}\\
&=
\begin{cases}
e^{-\mu_a t}, & 0\leq t \leq \frac{C_{\max}}{\alpha_o}\\
\frac{e^{-\mu_a t}}{\overline{q}}e^{-\mu_c\left(t - \frac{C_{\max}}{\alpha_o}\right)}\left(1-\frac{\mu_c}{\mu_a+\mu_c}e^{-\mu_a t}\right), & t \geq \frac{C_{\max}}{\alpha_o}
\end{cases}
\end{split}
\end{equation*}
Thus, the mean, given by $\int_{0}^{\infty}\overline{F}_{pc}(t)dt$, can be evaluated as:
\begin{equation}\label{eq:meanTpc-sp}
\begin{split}
\mathbb{E}[T_{pc}] &= \int_{0}^{C_{\max}/\alpha_o}e^{-\mu_a t}dt + \int_{C_{\max}/\alpha_o}^{\infty}\frac{e^{-\mu_a t}}{\overline{q}}e^{-\mu_c\left(t - \frac{C_{\max}}{\alpha_o}\right)}\left(1-\frac{\mu_c}{\mu_a+\mu_c}e^{-\mu_a t}\right) dt\\
&= \frac{1-\beta}{\mu_a} + \frac{e^{\mu_c C_{\max}/\alpha_o}}{\overline{q}}\left(\int_{C_{\max}/\alpha_o}^{\infty}e^{-(\mu_a+\mu_c)t}\left(1-\frac{\mu_c}{\mu_a+\mu_c}e^{-\mu_a t}\right)dt\right)\\
&= \frac{1-\beta}{\mu_a} + \frac{e^{\mu_c C_{\max}/\alpha_o}}{\overline{q}}\left(\frac{e^{-(\mu_a+\mu_c) C_{\max}/\alpha_o}}{\mu_a+\mu_c}-\frac{\mu_c e^{-(2\mu_a+\mu_c) C_{\max}/\alpha_o}}{(\mu_a+\mu_c)(2\mu_a+\mu_c)}\right)\\
&= \frac{1-\beta}{\mu_a} + \frac{\beta}{\overline{q}}\left(\frac{1}{\mu_a+\mu_c}-\frac{\beta\mu_c}{(\mu_a+\mu_c)(2\mu_a+\mu_c)}\right)\\
&= \frac{1-\beta}{\mu_a} + \frac{\beta}{\mu_a+(1-\beta)\mu_c}\left(1-\frac{\beta\mu_c}{2\mu_a+\mu_c}\right) = \frac{1-\beta}{\mu_a} + \frac{\beta}{\mu_a+(1-\beta)\mu_c}\cdot\frac{2\mu_a+(1-\beta)\mu_c}{2\mu_a+\mu_c}\\
&= \frac{1-\beta}{\mu_a} + \frac{\beta}{2\mu_a+\mu_c}\left(1+\frac{\mu_a}{\mu_a+(1-\beta)\mu_c}\right)\\
&= \frac{1}{\mu_a} - \frac{\beta}{2\mu_a+\mu_c}\left(\frac{\mu_a+\mu_c}{\mu_a}-\frac{\mu_a}{\mu_a+(1-\beta)\mu_c}\right),
\end{split}
\end{equation}
where $\beta = e^{-\mu_a C_{\max}/\alpha_o}$.
\subsection{Distribution and mean of \texorpdfstring{$T_o$}{To}.}
The complementary cumulative distribution function of $T_{o}$, defined as $\overline{F}_{o}(t) = Prob(T_{o}> t)$, can be evaluated as:
\begin{equation*}
\begin{split}
\overline{F}_o(t) &= Prob\left(T_o > t\right) = Prob\left(T_{pc}-T_{c}> t\ |\ E\right)\\
&= Prob\left(\min\left\{p_{o}^{-1}(C_{\max}),T_a-T_c\right\}> t\ |\ E\right)\\
&= Prob\left((T_a> T_c+t\ |\ E)\ \mbox{\texttt{AND}}\ (C_{\max}> \alpha_{o}t)\right)\\
&=
\begin{cases}
\int_{T_c=0}^{\infty}\int_{T_a=T_c+t}^{\infty}f_{c|E}(T_c)f_a(T_a)dT_cdT_a, & 0 \leq t < \frac{C_{\max}}{\alpha_o}\\
0, & t \geq \frac{C_{\max}}{\alpha_o}
\end{cases}\\
&=
\begin{cases}
\frac{e^{-\mu_a t}}{\overline{q}}\left(\frac{\mu_c}{\mu_a+\mu_c}-\frac{\beta\mu_c}{2\mu_a+\mu_c}\right), & 0 \leq t < \frac{C_{\max}}{\alpha_o}\\
0, & t \geq \frac{C_{\max}}{\alpha_o}
\end{cases}
\end{split}
\end{equation*}
Thus, the mean, given by $\int_{0}^{\infty}\overline{F}_{o}(t)dt$, can be evaluated as:
\begin{equation}\label{eq:meanTo-sp}
\begin{split}
\mathbb{E}[T_{o}] &= \int_{0}^{C_{\max}/\alpha_o}\frac{e^{-\mu_a t}}{\overline{q}}\left(\frac{\mu_c}{\mu_a+\mu_c}-\frac{\beta\mu_c}{2\mu_a+\mu_c}\right) dt\\
&= \frac{1-\beta}{\mu_a}\ \frac{1}{\overline{q}}\left(\frac{\mu_c}{\mu_a+\mu_c}-1+1-\frac{\beta\mu_c}{2\mu_a+\mu_c}\right) = \frac{1-\beta}{\mu_a}\ \frac{1}{\overline{q}}\left(\frac{2\mu_a+(1-\beta)\mu_c}{2\mu_a+\mu_c}-\frac{\mu_a}{\mu_a+\mu_c}\right)\\
&= \frac{1-\beta}{\mu_a}\ \frac{1}{\overline{q}}\left(\frac{\mu_a+(1-\beta)\mu_c}{2\mu_a+\mu_c}-\frac{\mu_a^2}{(\mu_a+\mu_c)(2\mu_a+\mu_c)}\right)\\
&= \frac{1-\beta}{\mu_a}\cdot\frac{\mu_a+\mu_c}{\mu_a+(1-\beta)\mu_c}\left(\frac{\mu_a+(1-\beta)\mu_c}{2\mu_a+\mu_c}-\frac{\mu_a^2}{(\mu_a+\mu_c)(2\mu_a+\mu_c)}\right)\\
&= \frac{1-\beta}{\mu_a}\cdot\frac{1}{2\mu_a+\mu_c}\left(\mu_a+\mu_c-\frac{\mu_a^2}{\mu_a+(1-\beta)\mu_c}\right)\\
&= \frac{1-\beta}{2\mu_a+\mu_c}\left(\frac{\mu_a+\mu_c}{\mu_a}-\frac{\mu_a}{\mu_a+(1-\beta)\mu_c}\right),
\end{split}
\end{equation}
where $\beta = e^{-\mu_a C_{\max}/\alpha_o}$.
\subsection{Mean revenue.}
When the pricing/penalty functions are linear, the revenue defined in~\eqref{eq:rev} is given by $R=\alpha_c (T_{pc}-T_{o}) + \alpha_o T_{o}$, and by linearity of expectations, its mean can be evaluated to obtain:
\begin{equation}\label{eq:meanrev-sp}
\begin{split}
\mathbb{E}[R] &= \alpha_c\left(\mathbb{E}[T_{pc}]-\mathbb{E}[T_{o}]\right) + \alpha_o \mathbb{E}[T_{o}]\\
&= \frac{\alpha_c}{2\mu_a+\mu_c}\left(1+\frac{\mu_a}{\mu_a+(1-\beta)\mu_c}\right) + \alpha_o \mathbb{E}[T_{o}],
\end{split}
\end{equation}
where $\beta = e^{-\mu_a C_{\max}/\alpha_o}$, and $\mathbb{E}[T_{o}]$ is given by~\eqref{eq:meanTo-sp}.
\subsection{Performance measures.}
By inspecting the expressions, it can be seen that $\beta$ is increasing in $\alpha_o$. Hence, with increasing penalty, $\mathbb{E}[T_{pc}]$ increases and $\mathbb{E}[T_{o}]$ decreases. The other quantities, including performance measures~\eqref{eq:throughput}-\eqref{eq:revrate}, are more complicated and their behavior is not obvious from inspection. As an example, when we set $N=10$ slots, $\lambda=8$ EVs per hour, $\mu_c=\frac{60}{45}$ per hour, $\mu_a=\frac{60}{105}$ per hour, $C_{\max}=\$4$, $\alpha_c=\$2$ per hour, we find that setting the penalty rate $\alpha_o=\$2.37$ per hour provides the maximum value of utilization ($30\%$), whereas the utilization with no penalty is about $26\%$. (The maximum possible utilization, under the ideal setting where there is no overstaying is $42\%$.) From the point of view of revenue, setting the penalty rate $\alpha_o=\$3.07$ per hour provides the maximum revenue rate of $\$15.36$ per hour, but the decreased utilization at this penalty rate is only slightly less, at $29.5\%$. (The ideal revenue when there is no overstaying is merely $\$8.34$ per hour.) Thus, the revenue maximizing penalty rate provides increased utilization (by $4\%$), as well as significantly increased revenue (by $85\%$). (See Figure~\ref{fig:exponential-performance}.)
\begin{figure}[htbp]
\centering
\subfigure[Utilization]{\includegraphics[width=0.26\textwidth]{park-and-charge-exponential-utilization.png}}
\qquad
\subfigure[Revenue Rate]{\includegraphics[width=0.26\textwidth]{park-and-charge-exponential-revenue.png}}
\caption{Comparing the utilization and revenue rate obtained by imposing a linear penalty function with various per-hour penalty rates (blue curve), against an ideal scenario where no EV user overstays (green line). The dashed red line corresponds to the scenario where there is overstaying, but no penalty is imposed.\label{fig:exponential-performance}}
\end{figure}
\section{Dynamic environment.}
In this section, we consider a real world setting where no prior information about the distributions $F_c$, $F_a$, $F_{\max}$ is known, and thus, the expressions for the performance measures are also unknown to the framework. We assume that these distributions are unknown, but fixed for the day; hence, the utilization and revenue for the day depend only on $\alpha_o$.
In our model, on each day, a penalty rate $\alpha_o$ is declared at the entrance to the parking area. Arriving customers behave according to their $T_c$, $T_a$, $C_{max}$ values (which are unknown to the system, but known to the customers), and the posted penalty rate $\alpha_o$; their behavior is as described in Section~\ref{ssec:user-behavior}. The system observes the customer behavior only after they enter the parking area. Thus, the performance measures (such as revenue rate, utilization, etc.) corresponding to penalty rate $\alpha_o$ are only observed at the end of the day. The task is to find an optimal penalty rate $\alpha_o^*$ for each day, such that the total revenue over all days is maximized.\footnote{Variants of the technique presented here can be used for other performance measures such as utilization.}
This problem is an example of sequential decision making in an unknown and dynamic environment, where the system seeks to optimize the average revenue over all days, while continuously gathering more information about the revenue obtained by using different penalty rates $\alpha_o$. This leads to a trade-off between exploration (imposing each penalty rate $\alpha_o$ sufficiently often to obtain better estimates of the corresponding revenue accumulated) and exploitation (frequently imposing the optimal penalty for which the observed revenue is maximized). Such problems naturally fall into the category of stochastic multi-armed bandit (MAB) problems~\cite{bubeck2012regret}. Each penalty rate $\alpha_o$ is considered as an arm, and the daily revenue obtained by imposing that penalty rate is analogous to the reward obtained by pulling the corresponding arm. The goal in the MAB setting is to determine the arm to be pulled each time in order to maximize the total reward obtained.
\subsection{Learning algorithm UCB-PC.}
Let $A$ denote a finite, ordered set of penalty rates, and let $\mathcal{R}_i$ denote the expected daily revenue corresponding to penalty rate $A[i]$, which is unknown. The (unknown) optimal penalty rate is thus given by $A[i^*]$, where $i^* = \mathop{\arg\max}_i\ \mathcal{R}_i$. In order to estimate $\{\mathcal{R}_i\}$, on each day, we impose a penalty rate and observe the daily revenue, which is the sum of the payments made by the customers who choose to enter the parking area that day.\footnote{We observe, for each customer, whether they choose to enter the parking area or not, and if they do, their charging and overstaying times, as well as their final payment.} In doing so, we keep track of the observed average daily revenues $\{\hat{\mathcal{R}}_i\}$, which are then used to gradually learn the optimal penalty rate $A[i^*]$ for the parking area. Algorithm~\ref{algo:UCB-PC} is based on the techniques used in the $\mathtt{UCB1}$ algorithm~\cite{auer2002finite}, which is a well known tool for solving stochastic multi-armed bandit problems. However, $\mathtt{UCB1}$ assumes that the system is allowed to run only for a finite number of trials $T$ (``finite horizon multi-armed bandit''), whereas we operate under the assumption that the system runs for infinite time, and must therefore tackle the challenges involved in adapting $\mathtt{UCB1}$ to the infinite horizon setting.\footnote{While $\mathtt{UCB1}$ was our choice to illustrate the technique, we believe that our framework can also accommodate modified versions of other stochastic multi-armed bandit algorithms (such as $EXP3$).}
\begin{algorithm}
\caption{UCB-PC \label{algo:UCB-PC}}
\begin{algorithmic}[1]
\State \textbf{Input:} A finite set $A$ of penalty rates
\State $R_i$ stores the total observed revenue for $A[i]$
\State $K_i$ stores the number of days $A[i]$ is imposed
\For{$t \gets 1$ \textbf{to} $|A|$}
\State Choose penalty rate $A[t]$ on $t^{th}$ day
\State Observe revenue earned $r$
\State Set $R_t\leftarrow r$
\State Set $K_t\leftarrow 1$
\EndFor
\State Find $i^* = \mathop{\arg\max}_i\ \left({R_i} + \sqrt{2\ln{|A|}}\right)$
\For{$t \gets |A|+1, |A|+2, \ldots$ }
\State Choose penalty rate $A[i^*]$ on $t^{th}$ day
\State Observe revenue earned $r$
\State Update $R_{i^*}\leftarrow R_{i^*}+r$
\State Update $K_{i^*}\leftarrow K_{i^*}+1$
\State Update $\hat{\mathcal{R}}_{i^*}\leftarrow \frac{R_{i^*}}{K_{i^*}}$
\State Find $i^* = \mathop{\arg\max}_i\ \left(\hat{\mathcal{R}}_{i} + \sqrt{\frac{2\ln{t}}{K_i}}\right)$ for $(t+1)^{th}$ day
\EndFor
\end{algorithmic}
\end{algorithm}
\subsection{Performance analysis.}\label{sec:performance}
In this section, we compare the performance of our learning algorithm with an optimal algorithm that knows the expected revenues $\{\mathcal{R}_i\}$ beforehand, and can therefore choose the optimal penalty $A[i^*]$ every day. The loss incurred by the learning algorithm over $K$ days is termed as the \textit{regret} $\mathcal{L}_K$, and can be written as
\begin{equation}\label{eq:regret}
\mathcal{L}_K = K\cdot\mathcal{R}_{i^*} - \left(\displaystyle\sum_{i=1}^{|A|}\ \mathbb{E}[K_i(K)] \mathcal{R}_i\right)=\displaystyle\sum_{i=1}^{|A|}\ \mathbb{E}[K_i(K)] ( \mathcal{R}_{i^*} - \mathcal{R}_i),
\end{equation}
where $\mathbb{E}[K_i(K)]$ denotes the expected number of days (out of $K$) that penalty rate $A[i]$ is chosen by our learning algorithm. In the literature, the performance of multi-armed bandit algorithms is measured by obtaining an upper bound on this regret. In~\cite{auer2002finite}, the authors show that the upper bound on the regret using $\mathtt{UCB1}$ is sublinear within a finite, fixed horizon $T$; in particular, they show that the regret is bounded above by a term that is $\tilde{O}(\log{T})$. Next, in Theorem~\ref{theorem:regret-bound}, we show that the regret for $\mathtt{UCB}$-$\mathtt{PC}$ is upper bounded by $\tilde{O}(\log{K})$ after the algorithm runs for $K$ days, for all $K$.
\begin{theorem}\label{theorem:regret-bound}
The expected regret of $\mathtt{UCB}$-$\mathtt{PC}$, after the algorithm runs for $K$ days, is $\displaystyle\sum_{\substack{i=1\\ i\neq i^*}}^{|A|}\left(\left\lceil\frac{8\ln{K}}{(\mathcal{R}_{i^*}-\mathcal{R}_i)^2}\right\rceil + 1 + \frac{\pi^2}{3}\right)(\mathcal{R}_{i^*}-\mathcal{R}_i)$.
\end{theorem}
\proof{Proof Sketch.} The proof follows from~\cite{auer2002finite}, where the upper bound for regret is obtained by bounding the expected number of times an arm is pulled. In our case, the upper bound on $\mathbb{E}[K_i(K)]$ for each $i\neq i^*$ is given by:
\begin{equation}\label{eq:EKi}
\mathbb{E}[K_i(K)]\leq \tau + \displaystyle \sum_{t=\tau}^{K-1} \mathbb{P}\left(A[i]\mbox{ is imposed on day }(t+1)\wedge\ K_i(t) \geq \tau \right),
\end{equation}
for any finite positive integer $\tau$. Next, in Lemma~\ref{lemma2}, we show that, for any suboptimal penalty index $i\neq i^*$, the term $\mathbb{P}\left(A[i]\mbox{ is imposed on day }(t+1)\wedge\ K_i(t) \geq \tau \right)$ is decreasing in $t$ after sufficient exploration.
\begin{lemma}\label{lemma2}
For any $i\neq i^*$, if penalty rate $A[i]$ is chosen for at least $\left\lceil\frac{8\ln{t}}{(\mathcal{R}_{i^*}-\mathcal{R}_i)^2}\right\rceil$ days among the first $t$ days, then
\begin{equation*}
\mathbb{P}\left(A[i]\mbox{ is imposed on day }(t+1)\ \wedge\ K_i(t) \geq \tau \right) \leq \frac{2}{t^2}.
\end{equation*}
\end{lemma}
\proof{Proof.} We begin by writing,
\begin{equation}\label{eq:lem1}
\begin{split}
&\mathbb{P}\left(A[i]\mbox{ is imposed on day }(t+1)\ \wedge\ K_i(t) \geq \tau \right)\\
&\qquad=\displaystyle \sum_{s'=1}^{t} \sum_{s=\tau+1}^{t} \mathbb{P}\left(A[i]\mbox{ is imposed on day }(t+1)\wedge \ K_i(t) = s\ \wedge \ K_{i^*}(t)=s'\right).
\end{split}
\end{equation}
After running $\mathtt{UCB}$-$\mathtt{PC}$ for $t$ days, a suboptimal penalty index $i \neq i^*$ is chosen only when $\hat{\mathcal{R}}_{i^*} + \sqrt{\frac{2\ln{t}}{s'}} \leq \hat{\mathcal{R}}_{i} + \sqrt{\frac{2\ln{t}}{s}}$. Let this event be denoted by $W$. Also, let $U$ denote the event $\left(\hat{\mathcal{R}}_{i^*} \leq \mathcal{R}_{i^*} - \sqrt{\frac{2\ln{t}}{s'}}\right)$, and $V$ denote the event $\left(\hat{\mathcal{R}}_{i} \geq \mathcal{R}_{i} + \sqrt{\frac{2\ln{t}}{s}}\right)$. Now, the probability of choosing penalty rate $A[i]$ on the $(t+1)^{th}$ day can be written as:
\begin{equation}\label{eq:PW}
\mathbb{P}\left(W\right)\leq \mathbb{P}(W|U)\mathbb{P}(U)+\mathbb{P}(W|V)\mathbb{P}(V)+\mathbb{P}(W|\bar{U}\wedge\bar{V})\mathbb{P}(\bar{U}\wedge\bar{V}).
\end{equation}
Using the Chernoff-Hoeffding's inequality, the following can be shown:
\begin{equation}\label{eq:PU}
\mathbb{P}(U) = \mathbb{P}\left(\hat{\mathcal{R}}_{i^*} \leq \mathcal{R}_{i^*} - \sqrt{\frac{2\ln{t}}{s'}}\right) \leq\ e^{-2\left(\sqrt{\frac{2\ln{t}}{s'}}\right)^2s'} = \frac{1}{t^4}.
\end{equation}
\begin{equation}\label{eq:PV}
\mathbb{P}(V)= \mathbb{P}\left(\hat{\mathcal{R}}_{i} \geq \mathcal{R}_{i} + \sqrt{\frac{2\ln{t}}{s}}\right)\leq\frac{1}{t^4}.
\end{equation}
Next, we show that
\begin{equation}\label{eq:W}
\mathcal{P}(W|\bar{U}\wedge\bar{V})=0 \mbox{ if } s \geq \frac{8\ln{t}}{(\mathcal{R}_{i^*}-\mathcal{R}_i)^2}.
\end{equation}
First, we observe that the events $\bar{U}$ and $\bar{V}$ can be equivalently written as:
\begin{equation}\label{eq:UV}
\begin{split}
\bar{U}\Leftrightarrow&\hat{\mathcal{R}}_{i^*} > \mathcal{R}_{i^*} - \sqrt{\frac{2\ln{t}}{s'}} \Leftrightarrow \mathcal{R}_{i^*}<\hat{\mathcal{R}}_{i^*} + \sqrt{\frac{2\ln{t}}{s'}}\\
\bar{V}\Leftrightarrow&\hat{\mathcal{R}}_{i} < \mathcal{R}_{i} + \sqrt{\frac{2\ln{t}}{s}} \Leftrightarrow \hat{\mathcal{R}}_{i} + \sqrt{\frac{2\ln{t}}{s}}<\mathcal{R}_{i} + 2\sqrt{\frac{2\ln{t}}{s}}\\
\end{split}
\end{equation}
Then, we show that if~\eqref{eq:UV} holds and $s \geq \frac{8\ln{t}}{(\mathcal{R}_{i^*}-\mathcal{R}_i)^2}$, then the event $W$ is a contradiction:
\begin{equation*}
\begin{split}
W\Leftrightarrow&\hat{\mathcal{R}}_{i^*} + \sqrt{\frac{2\ln{t}}{s'}} \leq \hat{\mathcal{R}}_{i} + \sqrt{\frac{2\ln{t}}{s}}\\
\Rightarrow& \mathcal{R}_{i^*} < \mathcal{R}_i + 2\sqrt{\frac{2\ln{t}}{s}}\\
\Rightarrow& \mathcal{R}_{i^*} < \mathcal{R}_i + \sqrt{(\mathcal{R}_{i^*}-\mathcal{R}_i)^2}\\
\Rightarrow& \mathcal{R}_{i^*} < \mathcal{R}_{i^*},
\end{split}
\end{equation*}
which is a contradiction. Finally, substituting the values obtained by~\eqref{eq:PU}-\eqref{eq:W} in~\eqref{eq:PW}, we get $\mathbb{P}(W) \leq \frac{2}{t^4}$, which in turn, can be substituted in~\eqref{eq:lem1} to obtain
\begin{equation*}
\mathbb{P}(A[i] \mbox{ imposed on } (t+1)^{th} day)\leq\displaystyle \sum_{s'=1}^{t} \sum_{s=\tau+1}^{t} \frac{2}{t^4} \leq\frac{2}{t^2}.
\end{equation*}
This completes the proof.
\eProof
Using Lemma~\ref{lemma2} and substituting $\tau=\left\lceil\frac{8\ln{K}}{(\mathcal{R}_{i^*}-\mathcal{R}_i)^2}\right\rceil$ in~\eqref{eq:EKi}, we obtain the required upper bound on regret that is specified by Theorem~\ref{theorem:regret-bound}. It can be shown that $\mathcal{L}_K = \tilde{O}(\ln{K})$ for a fixed set of penalty rates. Thus, the average daily regret, given by $\frac{\mathcal{L}_K}{K}$, vanishes as $K\rightarrow\infty$.
\section{Experimental results.}
For simulating the behavior of electric vehicles we study real-world data for the city of London, obtained from~\cite{Plugged-in-places}, which consists of 9961 charging events, including usage data of charge points and the duration of stay for EVs. We find it difficult to fit a single parametric model to these data without any restrictions.\footnote{Mixture models can be quite effective here, because they reveal the hidden heterogeneity that arises from a latent categorical variable such as charging point type, parking duration (very short, standard, long), time of arrival (peak hours and non-peak hours), etc.} Therefore, we only look at data entries that correspond to the ``standard'' charging point type and a specific duration of parking time (between $30$ minutes and $180$ minutes), in order to fit them in a single parametric model. We assume that the charging duration data corresponds to $T_c$ and the parking duration data corresponds to $T_a$, the duration for which customers would park their car in the absence of any penalties. The histogram for the restricted parking duration data and charging duration data are shown in Figures~\ref{fig:hist_Ta} and~\ref{fig:hist_Tc}.
\begin{figure}[htbp]
\centering
\subfigure[Histogram of parking duration data]{\label{fig:hist_Ta}\includegraphics[width=0.35\textwidth]{plotTa.png}}
\qquad
\subfigure[Histogram of charging duration data]{\label{fig:hist_Tc}\includegraphics[width=0.35\textwidth]{plotTc.png}}
\caption{Histograms of real-world data for London, restricted to ``standard'' chargers and parking duration between $30$ and $180$ minutes.}
\vspace{-0.1in}
\end{figure}
Using Mathematica, we obtain the distributions that best fit these histograms. This corresponds to a uniform distribution between $30$ minutes and $180$ minutes for $T_a$, and a generalized Gamma distribution with parameters $\mu=-1.35188$, scale parameter $33.7831$, and shape parameters $1.44212$ and $1.19403$, for $T_c$.
We assume that the penalty threshold $C_{max}$ is a discrete random variable that takes values $\$4$, $\$8$, $\$10$, $\$20$ with probabilities $0.4$, $0.3$, $0.2$, $0.1$ respectively. We also assume a linear pricing function during charging, with rate $\alpha_c= \$2$ per hour. We simulate vehicles arriving to a parking area with $10$ charging slots for a $6$ hour time period, assuming that the arrivals follow a Poisson distribution with rate $10$ per hour. We also assume that when all the slots of a parking lot are occupied, arriving users do not wait for a slot to be free and immediately leave the parking area. We perform two sets of experiments, discussed next.
\subsection{Experiment 1.}
We simulate the parking area for a $6$ hour time period per day for $100$ days. Then, we observe the utilization and revenue obtained for each day by employing a linear penalty function $p_o(t) = \alpha_o*t$ with $\alpha_o\in\{0,1,2,3,4,5,6\}$. Note that $\alpha_o=0$ corresponds to the ``no-penalty'' scenario. We compare these results against an ideal benchmark where we assume that EV users do not overstay at all. Figure~\ref{fig:obs1} shows the results averaged over the $100$ days.
\begin{figure}[htbp]
\centering
\subfigure[Utilization]{\includegraphics[width=0.35\textwidth]{Utilization_low.png}}
\qquad
\subfigure[Revenue]{\includegraphics[width=0.35\textwidth]{Revenue_low.png}}
\caption{Comparing the utilization and total revenue obtained by imposing a linear penalty function with various per-hour rates, against an ideal scenario where no EV user overstays.\label{fig:obs1}}
\vspace{-0.1in}
\end{figure}
\noindent\textbf{Utilization:} The utilization of the parking area increases (dark blue line) after imposing a small penalty as compared to when no penalty (red dotted line) is charged. However, when a high penalty is imposed, most of the EV users decide not to enter the parking area, resulting in a steep drop in utilization. With a penalty rate $\$4$ per hour, the utilization is maximum, and also very close to the ideal utilization when there is no overstaying by the EV users (green line). Thus, imposing just a small penalty helps improve the utilization of charging spots in the parking area significantly.\\
\noindent\textbf{Revenue:} The daily revenue from the parking area quickly increases even after imposing a small penalty for overstaying. The daily revenue obtained in the ideal situation of no overstaying is more than when no penalty is imposed (albeit only slightly so), since more customers are served in the former situation than the latter. As the penalty rate increases, the daily revenue follows the same pattern as the utilization, and for the same reasons. It should be noted that the penalty rate $\$4$ per hour also maximizes the daily revenue.
\subsection{Experiment 2.}
We simulate the parking area for two different settings: (a)~the optimal penalty rate $\alpha_o^*$ is chosen on all days, where $\alpha_o^*$ is calculated by approximately) maximizing the total expected revenue with complete knowledge of all the underlying distributions that are used, and (b)~our learning algorithm $\mathtt{UCB}$-$\mathtt{PC}$ determines the best $\alpha_o$ for each day, based on the observed parameters for all previous days. We compare the convergence of the average revenue obtained by our learning method to the average revenue obtained by the (approximately) optimal method. Figure~\ref{fig:obs2} shows the results.
\begin{figure}[htbp]
\centering
\subfigure[Daily Revenue]{\includegraphics[width=0.4\textwidth]{Learning_algo.png}}
\qquad
\subfigure[Average Difference in Revenue]{\includegraphics[width=0.4\textwidth]{average_rev_diff.png}}
\caption{Comparing the performance of learning algorithm with respect to the optimal algorithm\label{fig:obs2}}
\end{figure}
We observe that the penalty rates chosen by our learning algorithm $\mathtt{UCB}$-$\mathtt{PC}$ are almost equivalent to that of the optimal algorithm after $15$ days in terms of the daily revenue obtained. We also show the difference between the total revenue by the optimal algorithm and $\mathtt{UCB}$-$\mathtt{PC}$ averaged over the number of days, along with the theoretical upper bound given in Theorem~\ref{theorem:regret-bound}. As expected, it can be seen that the average difference, that is, $\frac{\mathcal{L}_k}{k}$, decreases with increase in the number of days after sufficient exploration (15 days).
\section{Concluding remarks.}
In this paper, we undertake a formal study, for the first time, of the problem of overstaying EVs in park-and-charge spots. We establish a novel framework in which we bring together an interdisciplinary mix of models and techniques: probabilistic user behaviour, queueing dynamics, online learning. This framework can be extended to accommodate different user behaviour models, queueing dynamics, and other learning techniques. One can imagine ``instantiating'' it for multiple parking areas in a city with a model for the population of EV users and study the interaction at a higher level, e.g., competition between parking lots. When viewed as a comprehensive model for park-and-charge, our framework could be a useful tool for future research.
\bibliographystyle{ormsv080}
|
\section{Introduction}
Two-dimensional topological insulators (2D TIs) behave as band insulators in the bulk but host gapless 1D edge states.~\cite{hasan10,qi11RMP83_1057} Experimentally, 2D TIs and their edge states have been investigated mostly in HgTe/CdTe quantum wells, as well as in InAs/GaSb heterostructures\cite{koenig-07s766,roth09,knez11,knez14,nowack13,spanton14} and evidence for the expected ballistic edge transport and the quantum spin Hall (QSH) effect has been found. In contrast to ordinary one-dimensional spin-$\tfrac{1}{2}$ electron systems, such as quantum wires, the edge channels of 2D TIs consist of a single pair of counter-propagating electronic modes.~\cite{kane-05prl146802,wu06,xu06} Time-reversal symmetry then severely impedes backscattering in the edge states, rendering them robust to disorder and weak interactions.
The simplest models for 2D TIs predict 1D edge channels in which electrons with opposite spins propagate in opposite directions.\cite{bernevig-06s1757} As helicity (i.e., the projection of the electron's spin operator on its momentum) is then conserved on a given edge, such systems are called helical 1D systems. However, while time-reversal symmetry is expected to be essential for the protection of gapless helical edge states, spin conservation is not. A plethora of effects, such as Rashba spin-orbit coupling, bulk inversion asymmetry, or structural inversion asymmetry, give rise to effective edge-state Hamiltonians without conserved spin.\cite{kane-05prl226801,liu08,rothe-12njp065012,liu11PRL107_76802}
In the presence of spin-symmetry breaking, left- and right-moving eigenstates can be almost arbitrary linear combinations of spin-up and spin-down electrons.\cite{schmidt-12prl156402} Time-reversal symmetry merely ensures that counter-propagating eigenstates with the same energy have opposite spin orientations, but it makes no statement relating eigenstates with different energies. Hence, the most generic helical system can be thought of as a helical channel in which the spin quantization axis can rotate with momentum, which makes the spin texture of a 2D TI edge state nontrivial even in the presence of time-reversal symmetry.\cite{dolcetto13b,dolcetto14} Recently, this spin texture was calculated for a number of realized and proposed 2D topological insulators based on their effective Hamiltonians.\cite{rod15PRB91_245112} Such generic helical liquids are the most general 2D TI edge states, characterized by time-reversal but no additional symmetries.
A nontrivial spin texture leads to interesting effects. Firstly, while zero-energy observables are insensitive to the spin texture, scattering processes at finite energies are greatly affected by the existence of right-movers and left-movers with non-orthogonal spins. This gives rise, for instance, to increased backscattering and thus a deviation from the quantized edge channel conductance at finite temperatures.\cite{schmidt-12prl156402,kainaris14,dolcetto15review} Another consequence of spin-non-conservation is the appearance of novel umklapp scattering processes that can gap out the spectrum even in the presence of time-reversal symmetry.\cite{orth15} Moreover, the spin texture can in principle be tuned locally by the application of a perpendicular electric field.\cite{rothe-12njp065012} In that case, coupling edge states with different spin textures has been shown to lead to new transport effects.\cite{orth13,rod15PRB91_245112,vandyke16}
In this article, we will investigate QSH antidots, i.e., non-topological regions (such as holes) embedded in a narrow strip of a 2D TI. In this case, the helical edge states propagating around the antidot can be tunnel-coupled to the helical systems propagating along the sample edges. Such a setup has a long history in the context of quantum Hall systems.\cite{goldman95,goldman08,geller97,komijani15} When embedded in 2D TIs, an antidot can be a useful tool to generate spin-polarized currents,\cite{dolcetto13} and thus to find evidence for the helicity of their edge states, as well as to explore nonlinear spin thermoelectric effects\cite{hwang2014nonlinear,lopez14}, entanglement~\cite{dolcetto16} or Kondo physics.\cite{posske13,posske14,rizzo16} The presence of multiple antidot-induced bound states was also shown to affect the transport properties of helical edge states, by inducing quantum percolation in the QSH bar.\cite{rui2012quantum} Moreover, due to the potentially small sizes of the antidots, and the strong confinement of the electrons to 1D channels along their circumference, the Coulomb charging energy may be large. This provides a promising platform for studying the interplay between spin-orbit coupling and electron-electron interactions. Depending on the TI material at hand, antidots can in principle be realized either by lithographical patterning of the sample or by appropriate electrical gating.
In contrast to previous publications, the focus of this article will be on antidot transport in 2D TIs with a nontrivial edge-state spin structure. Our motivation is twofold: on the one hand, 2D TIs realized in InAs/GaSb or HgTe/CdTe systems are expected to have a nontrivial spin structure as a consequence of effects such as broken structural inversion asymmetry. Its effect should therefore be taken into account for a realistic modeling of antidot transport. On the other hand, it remains a challenge to directly measure the spin texture of edge states. We will show that using antidot geometries in the Coulomb-blockade regime, a spectroscopic measurement of the edge-state spin texture is possible by means of standard transport measurements.
The structure of this article is as follows: In Sec.~\ref{sec:model}, we will introduce the general model for an antidot embedded in a topological insulator without axial spin symmetry and present the low-energy Hamiltonian describing transport in the system. In Sec.~\ref{sec:non-int}, we will study transport in the absence of interactions on the antidot. In particular, we will present numerical results that allow us to fix the parameters of the analytical model. In Sec.~\ref{sec:int}, we will take into account the charging energy of the antidot, and we will present transport calculations in the sequential tunneling and cotunneling regimes. We present our conclusions in Sec.~\ref{sec:conclusions}.
\section{Model} \label{sec:model}
\begin{figure}[t!]
\centering
\includegraphics[scale=0.47]{setup_antidot.pdf}
\caption{ Sketch of the setup. The light gray area is the TI embedding an antidot of radius $R$. The dark gray areas are the leads. The tunneling processes (black dashed line) occur at $x=0$, $r=0$ and $x=0$, $r=\pi R$. The chirality of the edge states is indicated by the colors, '$+$' is red, '$-$' is green.}
\label{fig:setup}
\end{figure}
We consider an antidot geometry realized in a 2D TI, as schematically shown in Fig. \ref{fig:setup}.
This setup can be realized either by lithographically etching the sample or, in the case of an InAs/GaSb heterostructure, by gating the central portion of the bulk and thus bringing it to the trivial insulator regime. In both cases, a pair of helical edge states appear around the antidot ($\d$), in addition to the edge states present at the upper (U) and lower (L) edges of the QSH bar.
If the Fermi energy is tuned to lie within the bulk energy gap and the temperature is much lower than the gap itself, transport only occurs via the edge states, whereas the 2D bulk states are fully insulating.
The overlap between the edge-state wave functions gives rise to a finite tunneling probability between the edges and the antidot.
The total Hamiltonian in the presence of tunneling is
\begin{equation}\label{eq:Htot}
\H=\H_{{\mathrm{U}}}+\H_{\L}+\H_{\d}+\H_{\mathrm{d U}}+\H_{\mathrm{d L}},
\end{equation}
where $\H_{\mathrm{U(L)}}$ is the free Dirac Hamiltonian of the upper (lower) edge, $\H_{\d}$ is the Hamiltonian of the edge states around the antidot, and $\H_{\mathrm{d,U(L)}}$ is the tunneling Hamiltonian between the upper (lower) edge and the antidot.
Specifically, one has for the upper and lower edges,
\begin{equation}
\begin{split}
\H_{s}&=-is v_F\sum_{\alpha=\pm}\alpha\int_{-l/2}^{l/2}\!dx\, \Psi^\dagger_{s\alpha}(x)\partial_x \Psi_{s\alpha}(x),\label{hamiltonian-edge}
\end{split}
\end{equation}
where $s=\mathrm{U,L}\equiv +,-$. Moreover, $v_F$ is the Fermi velocity, and $l$ is the edge length. We mostly consider the limit $l\to\infty$, thus assuming the upper and lower edges to have a continuous spectrum, contrary to the antidot, whose energy levels are discrete with an energy separation $\approx v_F/R$, $R$ being the radius of the antidot.
In the presence of axial spin symmetry, the quantum number $\alpha$ corresponds to the spin polarization of the edge states, so that for instance spin-up electrons propagate to the right on the upper edge and to the left on the lower one (opposite for spin-down electrons).
Our aim is to investigate the more general experimental scenario in which axial spin symmetry is broken: in this case, the electron operators $\Psi^{\dagger}_{s\pm}(x)$ still correspond to chiral particles moving to the right (left) on the upper edge and to the left (right) on the lower one, but they are no longer eigenstates of the spin operator.
In momentum space it is possible to relate the chiral basis $c_{s\alpha k}= \int dx e^{-ikx}\Psi_{s\alpha}(x)/\sqrt{l}$ for $\alpha = \pm$ to the spin basis $c_{s\sigma k}= \int dx e^{-ikx}\Psi_{s\sigma}(x)/\sqrt{l}$ for $\sigma = \uparrow,\downarrow$ via a unitary transformation\cite{schmidt-12prl156402}
\begin{equation}
\begin{pmatrix}
c_{s+,k}\\
c_{s-,k}\\
\end{pmatrix}=B_{sk}^\dagger \begin{pmatrix}
c_{s\uparrow k}\\
c_{s\downarrow k}\\
\end{pmatrix}
.\end{equation}
The form of the momentum-dependent $\mathrm{SU}(2)$ matrix $B_{sk}$ is dictated by time-reversal symmetry and unitarity
\begin{equation}
B_{sk}=\begin{pmatrix}
\cos(\theta_{sk}) & -\sin(\theta_{sk})\\
\sin(\theta_{sk}) & \cos(\theta_{sk})
\end{pmatrix}
\label{Bk-matrix},
\end{equation}
where the function $\theta_{sk}$, which is even in $k$ because of time-reversal symmetry, measures the rotation of the spin-quantization axis~\cite{rod15PRB91_245112} on edge $s$ at momentum $k$. For realistic models and momenta near the Dirac point, it was shown\cite{rod15PRB91_245112} that one can usually use the approximation $\theta_{sk}\approx(k_s/k_{0s})^2$, where the parameter $k_{0s}$ represents the momentum scale over which the spin-quantization axis rotates and thus incorporates the information about the spin structure of the helical states.
Note that we allow in principle the upper and lower edge to have different spin structures with parameters $\theta_{\mathrm U k}$ and $\theta_{\mathrm L k}$.
The antidot Hamiltonian
\begin{equation}
\H_{\d}=-iv_F\sum_{\alpha=\pm}\alpha\int_0^{2\pi R}\!dr\, \Psi^\dagger_{\d\alpha}(r)\partial_r \Psi_{\d\alpha}(r)+E(n) \label{hamiltonian-antidot}
\end{equation}
is also characterized by a linear dispersion. However, due to its confinement, the charging energy contribution should be taken into account,
\begin{equation}
E(n)=\frac{E_{ c}}{2}\left(n-\frac{eV_g}{E_{c}}\right)^2,
\end{equation}
where $E_{c}$ is the Coulomb energy, $V_g$ is the gate voltage applied to the island, and $n=\sum_{\alpha}\int_0^{2\pi R}\!dr\, \Psi^\dagger_{\d\alpha}(r) \Psi_{\d\alpha}(r)$ is the number operator.
As for the edges, spin in general is not a good quantum number, so the operator $\Psi^\dagger_{\d\pm}(r)$ refers to electrons propagating clockwise/anticlockwise but without a well-defined spin polarization. Following what was done for the translationally invariant edges, we can define the most general $\mathrm{SU}(2)$ transformation in angular momentum space. It relates the chiral states $d_{\alpha j}=\int dre^{-ijr/R}\Psi^\dagger_{\d\alpha}(r)/\sqrt{2\pi R}$ for $\alpha = \pm$ to the spin-polarized ones $d_{\sigma j}=\int dre^{-ijr/R}\Psi^\dagger_{\d\sigma}(r)/\sqrt{2\pi R}$ for $\sigma = \uparrow,\downarrow$ as
\begin{equation}
\begin{pmatrix}
d_{+,j}\\
d_{-,j}\\
\end{pmatrix}=\tilde{B}_{j}^\dagger \begin{pmatrix}
d_{\uparrow j}\\
d_{\downarrow j}\\
\end{pmatrix}
.\end{equation}
It is given by
\begin{equation}
\tilde{B}_{j}= \begin{pmatrix}
\cos(\theta_{j}) & -\sin(\theta_{j})\\
\sin(\theta_{j}) & \cos(\theta_{j})
\end{pmatrix}\label{Bj-matrix}
.\end{equation}
Tunneling to and from the antidot occurs near the coordinates $x=0$ and $r=0=:r_{\mathrm{U}}$ for the upper contact and at $x=0$ and $r=\pi R=:r_\L$ for the lower one (see Fig.~\ref{fig:setup}).
We start with the most general tunneling Hamiltonian containing both spin-preserving and spin-flipping terms, \cite{krueckl11}
\begin{align}
\H_{\d s} &= \sum_{\sigma\sigma'} \int dx dr \left[
\Psi^\dagger_{s\sigma}(x) \gamma^s_{\sigma\sigma'}(x,r) \Psi_{\d\sigma'}(r_s + s r) + \text{H.c.}\right]
\end{align}
where $s = {\mathrm{U}},\L \equiv +,-$ and $\sigma,\sigma' \in \{\uparrow,\downarrow\}$. To limit the number of parameters, we assume the sample geometry to be symmetric about the $x$ axis, see Fig.~\ref{fig:setup}. Reflection symmetry about the $x$ axis is defined as $(x,y) \to (x,-y)$ and $(p_x, p_y) \to (p_x, -p_y)$. This entails the transformation rule $\sigma_z \to -\sigma_z$ for the spin quantum number. As a consequence, the field operators transform as $\Psi_{{\mathrm{U}}\sigma}(x)\rightarrow\Psi_{\L\bar{\sigma}}(x)$ and $\Psi_{\d\sigma}(r)\rightarrow\Psi_{\d\bar{\sigma}}(\pi R-r)$. Invariance of $\H_{\d {\mathrm{U}}} + \H_{\d \L}$ under this transformation leads to the four equations $\gamma^{\mathrm{U}}_{\sigma\sigma'} = \gamma^\L_{\bar{\sigma}\bar{\sigma}'}$, which allow us to eliminate $\gamma^\L$, and it leaves only the four functions $\gamma_{\sigma\sigma'} \equiv \gamma^{\mathrm{U}}_{\sigma\sigma'}$. In addition, we assume the tunnel Hamiltonian to respect time-reversal symmetry, which is local in space and acts on the edge states as $\Psi_{s\sigma}(x)\rightarrow\sigma \Psi_{s\bar{\sigma}}(x)$ for $s \in \{{\mathrm{U}}, \L, \d\}$ and $\sigma =\ \uparrow,\downarrow\ = +,-$. The tunnel Hamiltonian has time-reversal symmetry if $\gamma_{\uparrow\uparrow} = \gamma_{\downarrow\downarrow}$ and $\gamma_{\uparrow\downarrow} = - \gamma_{\downarrow\uparrow}$. This leaves us with two functions $\gamma_{\rm sc} \equiv \gamma_{\uparrow\uparrow}$ and $\gamma_{\rm sf} = \gamma_{\uparrow\downarrow}$ denoting the amplitudes of spin-conserving and spin-flip tunneling, respectively.\cite{dolcini11,dolcini15} The Hamiltonian now reads
\begin{align}
\H_{\d s} &= \sum_{\sigma} \int dx dr \big[
\Psi^\dagger_{s\sigma}(x) \gamma_{\rm sc}(x,r) \Psi_{\d\sigma}(r_s + s r) \notag \\
+&
s \sigma \Psi^\dagger_{s\sigma}(x) \gamma_{\rm sf}(x,r) \Psi_{\d\bar{\sigma}}(r_s + s r) +
\text{H.c.}\big].
\end{align}
We would like to point out that it is important to fix the form of the tunneling Hamiltonian by reflection symmetry and not inversion symmetry, the latter being defined as $(x,y) \to (-x, -y)$. Indeed, as we will show further below for the Kane-Mele model,\cite{kane-05prl146802,kane-05prl226801} in the presence of Rashba spin-orbit coupling, the bulk system remains invariant under reflection, whereas inversion symmetry is usually lost.
Next, we express the tunneling Hamiltonian in the basis of the chiral edge states. For this purpose, we Fourier-transform to momentum and angular momentum space and use the rotation matrices (\ref{Bk-matrix}) and (\ref{Bj-matrix}). Expressed in terms of the Fourier components of the tunneling amplitudes, we find
\begin{align}
\H_{\d s} =\ & \frac{1}{\sqrt{2 \pi R l}} \sum_{\sigma} \sum_{k,j} \sum_{\alpha\alpha'} \big[ \\
&
e^{i j r_s/R} \tilde{\gamma}_{\rm sc}(k,s j) (B^\dag_{s,k})^{\alpha\sigma} \tilde{B}_{j}^{\sigma \alpha'} c^\dagger_{s\alpha k} d_{\alpha' j} \notag \\
+\ &
e^{i j r_s/R} \tilde{\gamma}_{\rm sf}(k,s j) (B^\dag_{s,k})^{\alpha\sigma} \tilde{B}_{j}^{\bar{\sigma} \alpha'} s \sigma c^\dagger_{s\alpha k} d_{\alpha' j}+
\text{H.c.}\big].\notag
\end{align}
We can further simplify this by assuming that the Fourier components of the tunneling amplitudes $\tilde{\gamma}_{\rm{sc,sf}}(k,j)$ as well as the rotation matrices vary slowly as functions of $k$ and $j$. The former is justified if the tunneling happens locally on the scale of the Fermi wavelength. The latter assumption holds if temperature and applied bias voltage are small compared to $v_F k_{0\{{\mathrm{U}},\L\}}$. In this case, we can replace these functions by their values at the Fermi energy and define
\begin{align}
\gamma_T \cos(\theta_T) &= \tilde{\gamma}_{\rm sc}(k_F, j_F) \notag \\
\gamma_T \sin(\theta_T) &= \tilde{\gamma}_{\rm sf}(k_F, j_F) \notag \\
\tilde{B} &= \tilde{B}_{j_F} \notag \\
B_{s} &= B_{s,k_F} \quad \text{for }s \in \{{\mathrm{U}}, \L\}
\end{align}
where $k_F = \mu/v_F$ and $j_F = \mu R/v_F$ are determined by the chemical potential $\mu$. The angle $\theta_T$ set the ratio between the tunneling amplitudes for spin-conserving and spin-flip tunneling, $\theta_T=\tan^{-1}( \tilde{\gamma}_{\rm sf}/ \tilde{\gamma}_{\rm sc})$. Then, we obtain by Fourier-transforming back to real space
\begin{equation}
\begin{split}
\H_{\d s}&=\gamma_T \sum_{\alpha \alpha^\prime} \Psi^\dagger_{s \alpha}(0) \phi_{s\alpha\alpha'} \Psi_{\d \alpha^\prime}(r_s) + \mathrm{h.c.}, \\
\phi_{s\alpha\alpha'} &= \sum_{\sigma}(B_{s}^\dagger)^{\alpha\sigma}\left (\cos\theta_T\tilde{B}^{\sigma\alpha^\prime}+s \sigma \sin\theta_T\tilde{B}^{\bar{\sigma}\alpha^\prime}\right ).
\end{split}
\end{equation}
In the following we study how the spin structure of the helical edge states can be explored by means of transport properties. We begin by investigating the noninteracting case, which we can compare with numerical simulations on a lattice.
\section{Non-interacting antidot}\label{sec:non-int}
To investigate the transport properties in the absence of interactions we use the standard scattering matrix formalism.\cite{datta_book} After calculating the Heisenberg equations of motion $i\partial_t \Psi_{s\alpha} = [\Psi_{s\alpha},\H]$ and $i\partial_t \Psi_{\mathrm{d}\alpha} = [\Psi_{\mathrm{d}\alpha},\H]$ with respect to the Hamiltonian~\eqref{eq:Htot}, and by imposing plane-wave solutions for the states coming from (with amplitude $a_i$) and going to (with amplitude $b_i$) the contacts $i=1,\ldots,4$ (see Fig.~\ref{fig:setup}), we can find the scattering matrix relating $b_i=\sum_jS_{ij}a_j$ as
\begin{widetext}
\begin{equation}\label{eq:S}
S=\frac{1}{\left(1+\Gamma^2\right) \sin \phi +2 i \Gamma \cos \phi }\begin{pmatrix}
0 & \left(1-\Gamma^2\right) \sin\phi & 2i\Gamma\sin\Theta & -2i\Gamma\cos\Theta\\
\left(1-\Gamma^2\right) \sin\phi & 0 & -2i\Gamma\cos\Theta &-2i\Gamma\sin\Theta\\
-2i\Gamma\sin\Theta & -2i\Gamma\cos\Theta & 0 & \left(1-\Gamma^2\right) \sin\phi\\
-2i\Gamma\cos\Theta & 2i\Gamma\sin\Theta & \left(1-\Gamma^2\right) \sin\phi &0
\end{pmatrix},
\end{equation}
\end{widetext}
with the dimensionless tunneling probability $\Gamma=|\gamma_T|^2/(4v^2_F)$.
The scattering matrix depends on the chemical potential through the phase factor $\phi=\pi R\mu/v_F$ and on the parameter $\Theta=\theta_{\mathrm{U}k_F}-\theta_{\mathrm{L}k_F}+2\theta_T$.
The current measured at the $i$-th contact can be evaluated from Eq.~\eqref{eq:S} using the Landauer-B\"{u}ttiker formula
\begin{equation}\label{eq:LB}
I_i=\frac{G_0}{e}\sum_j\int_{\mu+eV_j}^{\mu+eV_i} \mathclap{dE \, T_{ij}(E),}
\end{equation}
where $G_0=e^2/(2\pi)$ is the conductance quantum, $T_{ij}=\left\vert S_{ij}\right\vert^2$ are the elements of the transmission matrix, and $\{V_j\}$ are the bias potentials applied to the four contacts.
It is worth noting that the spin structure of the helical states on the antidot does not affect the transport properties. Nevertheless, the result does depend on the spin textures of the edges through $\Theta$. Therefore, if the latter can be tuned independently, for instance by applying an electric-field gradient, they can be directly resolved via a current measurement even in the noninteracting case. This result is analogous to what was found for a tunnel junction between two edges.\cite{orth13}
In contrast, in the homogeneous case, i.e., with the same spin structure $\theta_{\mathrm{U}k}=\theta_{\mathrm{L}k}$ on both edges, $\Theta=2\theta_T$ and the transmission matrix is uniquely determined by the ratio between spin-preserving and spin-flipping tunneling.
If the chemical potential coincides with an eigenenergy of the antidot $\mu= v_F j/R$ (a scenario which we will refer to as the resonant case), the phase factor $\sin \phi=0$ so that the incoming electron is fully transmitted across the antidot, while away from resonance one recovers the typical Lorentz-shaped transmission for transport through a quantum (anti)dot.
These results are confirmed by numerical transport simulations using the KWANT package.\cite{groth_kwant} To investigate the effects induced by breaking the axial spin symmetry we consider the Kane-Mele (KM) lattice model\cite{kane-05prl146802,kane-05prl226801} on the honeycomb lattice, which is defined as
\begin{eqnarray}\label{KM_Hamiltonian}
\H_{\rm KM}&=&-t\sum\limits_{\langle ij\rangle}c^\dagger_ic_j+i\lambda_{\rm SO}\sum\limits_{\langle\!\langle ij \rangle\!\rangle}\nu_{ij}c^\dagger_is^zc_j\nonumber\\
&&{}+i\lambda_{\rm R}\sum\limits_{\langle ij \rangle}c^\dagger_i(\boldsymbol{s}\times \hat{ \boldsymbol{d}}_{ij})_zc_j,
\end{eqnarray}
where $c_i=(c_{i\uparrow},c_{i\downarrow})$ is a two-component spinor, $\nu_{ij}=\pm 1$ is a factor that is $+1$ ($-1$) if the next-nearest-neighbor hopping from site $j$ to site $i$ corresponds to a right turn (left turn) in the honeycomb lattice, $\boldsymbol{s}$ is the spin operator, and $\hat{\boldsymbol{d}}_{ij}$ is the unit vector between the nearest-neighbor lattice sites $i$ and $j$. The parameters of the model are the hopping amplitude $t$, the intrinsic spin-orbit coupling $\lambda_{\rm SO}$, and the Rashba spin-orbit coupling (RSOC) $\lambda_{\rm R}$, which is responsible for the axial spin symmetry breaking. In the following we limit ourselves to uniform bulk parameters, which corresponds in the analytical model to the homogeneous case $\theta_{\mathrm{U}k}=\theta_{\mathrm{L}k}$.
The KM Hamiltonian with RSOC does not preserve inversion symmetry.\cite{fu07prb76_45302} Inversion does not affect the spin as the latter is a pseudovector. It does exchange the two sublattices forming the honeycomb lattice, but it leaves the phase $\nu_{ij}$ invariant. Hence, the kinetic and the intrinsic spin-orbit terms of the Hamiltonian are invariant. However, the RSOC term gets a minus sign under inversion, which destroys the inversion symmetry of the total Hamiltonian.
On the other hand, $\H_{\rm KM}$ has reflection symmetry. A reflection about the $x$ axis ($y \to -y$) will change the signs of the $x$ and $z$ components of the spin. Moreover, reflection symmetry swaps the sublattices. Hence, the kinetic term is invariant. For the spin-orbit part, the $z$ component of spin will pick up a minus sign, but $\nu_{ij}$ will change sign, too. For the RSOC term, the $y$ component ($x$ component) of the lattice vectors switches (does not switch) sign, but the $x$ component ($y$ component) of the spin also switches (does not switch) sign. Hence, a reflection about the $x$ axis leaves the Hamiltonian invariant.
\begin{figure}[t!]
\centering
\includegraphics[scale=0.6]{wavefunction_updown_E_0157_lso_02_lr01.pdf}
\caption{Representative example of the electron densities (green dots) for scattering states originating from lead $1$. Panel (a) shows the up-spin propagation and panel (b) shows the down-spin propagation. The lattice is 60 lattice constants long and 34 lattice constants wide. The leads, shown in red, are 9 lattice constant wide. The model parameters are set to: $t=1$, $\lambda_{\rm SO}=0.2 t$, $\lambda_{\rm R}=0.1 t$ and $\mu=0.157t$.}
\label{fig:wavefunction}
\end{figure}
For the numerical simulation, we consider a finite lattice connected to four leads, as shown in Fig.~\ref{fig:wavefunction}. To avoid dangling bonds, we model the antidot as hexagonal-shaped. The numerical calculation provides access to the full scattering matrix, and without loss of generality we will discuss in the following the transmission of electrons injected from lead 1 to the other leads. The finite-length system provides, in addition to transport via the antidot, direct ballistic channels between the upper and the lower edge along the left and right edges of the sample. However, these are easy to distinguish from transport via the antidot. Fig.~\ref{fig:wavefunction} shows the weight of the spin-up and spin-down wavefunctions for small RSOC ($\theta_{sk_F}\ll 1$) on the antidot and the leads.
The most important effect of RSOC is to enable spin flips at the tunnel contacts. The amplitude for spin-flip processes can be quantified by calculating the transmission probability from lead $1$ to lead $i$, $T_{i1}$, shown in Fig.~\ref{fig:transmission} as a function of the chemical potential. On resonance with an antidot energy level, $T_{21}$ drops to zero, as shown in Fig.~\ref{fig:transmission}(a), in agreement with the analytic result in Eq.~(\ref{eq:S}) at $\phi=0$, showing that the injected electrons are fully transmitted to the opposite edge.
The transmission $T_{31}$ between leads 1 and 3, shown in Fig.~\ref{fig:transmission}(b), is only nonzero if there is spin-flip tunneling. Hence, in the absence of RSOC, all electrons are transmitted to lead 4 at resonance, as shown by the blue peaks in Fig.~\ref{fig:transmission}(c).
Moreover, the transmissions in Fig.~\ref{fig:transmission} are symmetric with respect to energy only in the absence of RSOC. In contrast, in the presence of RSOC, particle-hole symmetry is broken so that in general $T_{ij}(\mu)\neq T_{ij}(-\mu)$.
The peaks in the transmission probabilities all have Lo\-rentz\-ian shape around the resonance energies, but their widths change with energy. Using the numerical results for $T_{31}(\mu)$ or $T_{41}(\mu)$, we can calculate the values of $\theta_T$, shown in Fig.\ref{fig:theta_dependencies}(a), and $\gamma_T$ as functions of chemical potential. They turn out to vary slowly on the scale of the antidot level spacing. Hence, we are able to extract from the numerical simulations the dependence of the parameters of the analytic models on the tight-binding parameters as well as on chemical potential. Moreover, the Fermi velocity can be extracted from the band structure in the leads. Hence, we have access to all the quantities entering our analytic model via the numerical simulation.
\begin{figure}
\centering
\includegraphics[width=\columnwidth]{transmission_zoom_21_2.pdf}
\includegraphics[width=\columnwidth]{transmission_zoom.pdf}
\includegraphics[width=\columnwidth]{transmission_zoom_41_2.pdf}
\caption{Transmission coefficient from lead 1 to lead 2 on panel (a), to lead 3 on panel (b) and to lead 4 on panel (c), for several values of RSOC. The lattice setup is the same as in Fig.~\ref{fig:wavefunction}. The model parameters are set to: $t=1$, $\lambda_{\rm SO}=0.2t$.}
\label{fig:transmission}
\end{figure}
We also performed tight-binding calculations based on the square-lattice discretization of the Bernevig-Hughes-Zhang model \citep{bernevig-06s1757} with added bulk inversion asymmetry,\cite{koenig-08jpsj031007} parametrized by $\Delta$, whose effect is similar to $\lambda_R$ in the KM model. The results do not differ qualitatively from the ones presented here for the KM model. The main difference consists of the preserved particle-hole symmetry as shown in Fig.~\ref{fig:theta_dependencies}(b).
\begin{figure*}[t!]
\centering
\includegraphics[width=\textwidth]{PlotTheta-crop.pdf}
\caption{(Color online) $\theta_T$ at the resonance energies for several values of (a) RSOC in the KM model and (b) bulk inversion asymmetry in the BHZ model. The white crosses indicate the points of transport resonance which were used to evaluate $\theta_T$. The model parameters are set to: $t=1$, $\lambda_{\rm SO}=0.2t$ for KM model, and $A=3$, $B=-1$, $M=-2$ and $C=D=0$ for BHZ model.\citep{bernevig-06s1757}}
\label{fig:theta_dependencies}
\end{figure*}
\subsection{Non-local resistance}
To compare the analytical predictions with the numerical simulations, we need to take into account the additional ballistic channels connecting contacts $1$ and $4$ and contacts $2$ and $3$ in Fig.~\ref{fig:setup} via the sample edges. This corresponds to replacing $T_{14}\to T_{14}+1$ and $T_{23}\to T_{23}+1$ (analogously for $T_{41}$ and $T_{32}$) obtained from Eq.~\eqref{eq:S}, while all other coefficients remain invariant.
The nonlocal multi-terminal resistance is then computed by means of the Landauer-B\"{u}ttiker formula~\eqref{eq:LB} in the linear-response regime. For instance, the relation between the current flowing between contacts $1$ and $4$ and the voltage developed at these same contacts is given by $R_{14,14}=(V_1-V_4)/I_1\vert_{I_4=-I_1,I_2=I_3=0}$. A numerical result is shown in Fig.~\ref{fig:nonlocal_resistance}.
In the homogeneous case $\theta_{\mathrm{U}k}=\theta_{\mathrm{L}k}$ and at resonance ($\sin\phi=0$) one finds
\begin{equation}
R_{14,14}=\left[\frac{1}{\cos(2\theta_T)+3}+\frac{1}{4}\right]G_0^{-1}.\label{non-local-resistance}
\end{equation}
In the absence of spin-flip tunneling ($\theta_T=0$), we find $R_{14,14}=(2G_0)^{-1}$. On the other hand, if only spin-flip processes are allowed ($\theta_T=\pi/2$), then $R_{14,14}=3/(4G_0)$.
As shown in Fig.~\ref{fig:nonlocal_resistance}, at resonance the nonlocal resistance reaches its minimum. Away from resonance, it tends towards $3/(4G_0)$. Around $\mu=0$, the nonlocal resistance deviates slightly from its quantized value due to the finite length of the tunneling region in the numerical simulation, which has the tendency to open a small spectral gap.\cite{sternativo14prb89_35415,chu09} We can fit Eq.~\eqref{non-local-resistance} to the envelope of the resonant peaks (green dashed line in Fig.~\ref{fig:nonlocal_resistance}) and thus determine the leading behavior $\theta_T(\mu) - \theta_T(0) \sim \mu^2$ for small $\mu$.
\begin{figure}[t!]
\centering
\includegraphics[width=\columnwidth]{nonlocal_resistance.pdf}
\caption{Non-local resistance $R_{14,14}$ in unit of $G_0^{-1}$. The lattice setup is the same as in Fig.~\ref{fig:wavefunction}. The model parameters are set to: $t=1$, $\lambda_{\rm SO}=0.2t$ and $\lambda_{\rm R}=0.05t$. The continuous (blue) line is the computed non-local resistance for the lattice. The (green) dashed line is the fit of our model assuming that $\theta_T(\mu)\approx \alpha \mu^2 +\beta$.}
\label{fig:nonlocal_resistance}
\end{figure}
Let us briefly conclude the discussion of the non-interacting transport properties. In the case of an inhomogeneous RSOC, the transport properties depend explicitly on the spin texture. In the homogeneous case, the spin texture still appears implicitly in $\theta_T$. With the help of the numerical simulation, we are able to extract the parameters of the analytic model as a function of the bulk parameters and the chemical potential.
\section{Interacting antidot}\label{sec:int}
In confined low-dimensional systems, electron interactions are known to play an important role. Therefore, to complete the study of the transport properties through the QSH antidot, we need to investigate how interactions affect the transport mechanisms.
Computing the transport properties in the presence of electron interactions is generally a difficult task that cannot be solved exactly for arbitrary tunneling strength. Therefore, we focus on the lowest-order contributions to the tunneling current through the antidot, which are (A) sequential tunneling and (B) cotunneling.\cite{bruus_book}
\subsection{Sequential tunneling}
If the dwell time $\tau$ of electrons on the antidot is large such that $1/\tau\ll \{eV_i,k_BT\}$, the dominant transport processes are single-electron transfers between the edges and the antidot.
The transport properties can then be evaluated within first order perturbation theory in $\vert\gamma_T\vert^2$.
We assume that the antidot contains $N$ electrons in the ground state, and we assume $N$ to be even without loss of generality. The initial state of the leads contains one electron at a certain momentum $k$ in one of the leads. The initial state of the full system is thus a direct product of the initial state in the leads and in the antidot:
\begin{equation}
|i^{s\alpha}(N, k)\rangle=|N\rangle\otimes c^\dag_{s\alpha k}\vert \text{vac} \rangle.
\end{equation}
We compute the transition rate for adding another electron on the antidot. The final state due to tunneling of one electron from the edge $s$ with initial momentum $k$ and chirality $\alpha$ to the antidot, with final chirality $\alpha^{\prime}$ and angular momentum $j$, reads
\begin{equation}
|f^{s\alpha\alpha^{\prime}}(N+1,k,j)\rangle=d^{\dagger}_{\alpha^{\prime}j}c_{s\alpha k}\vert i^{s\alpha}(N,k)\rangle
.\end{equation}
According to Fermi's golden rule, the rate for transitions from the initial state to the final state is\cite{bruus_book}
\begin{equation}
\Gamma_{N+1, N}^{s\alpha\alpha^\prime}(k,j)=2\pi |\langle f|\H_{\mathrm{d},s}|i\rangle|^2F_i\delta(E_{f}-E_{i})
,\end{equation}
where $E_f - E_{i}= E(N+1) - E(N) +\varepsilon_{\mathrm{d}\alpha^{\prime}}(j)-\varepsilon_{s\alpha}(k)$ is the energy difference between final and initial states and $F_i$ is a Fermi function denoting the probability of finding the system in the initial state $|i\rangle$. $\varepsilon_{\mathrm{d}\alpha^{\prime}}(j)$ is the eigenenergy of the antidot with angular momentum $j$ and chirality $\alpha^\prime$, and $\varepsilon_{s\alpha}(k)$ is the eigenenergy of the $s$ edge with momentum $k$ and chirality $\alpha$. The total transition rate is then obtained by summing over all possible initial and final states,
\begin{equation}\label{eq:rate_seq}
\Gamma_{N+1, N}^{s\alpha\alpha^\prime}=\sum_{j,k} \Gamma_{N+1, N}^{s\alpha\alpha^\prime}(k,j)
.\end{equation}
In the sequential tunneling regime, the tunneling current is evaluated using a rate-equation approach.
In the dc limit, and by considering only two antidot states with either $N$ or $N+1$ electrons, which is valid as long as the charging energy is large enough to forbid other occupation numbers, one has
\begin{equation}
\Gamma_{{N+1}, {N}}P(N)=\Gamma_{{N}, {N+1}}P({N+1}) \label{recursive_prob_eq}
\end{equation}
with $\Gamma_{N+1,N}=\sum_{s,\alpha,\alpha^{\prime}}\Gamma_{{N+1}, {N}}^{s\alpha\alpha^{\prime}}$ and similarly for $\Gamma_{N,N+1}$. Combined with the conservation of probability constraint, $P(N)+2P(N+1)=1$, it is then possible to compute the occupation probabilities in terms of the transition rates. Transitions between the state with $N$ electrons and the one with $N+1$ electrons in the antidot are enabled close to the resonance condition $\Delta E(N+1)=E(N+1)-E(N) = 0$. Therefore, transitions between $N$ and $N+1$ states are allowed for $n_g \approx N+\frac{1}{2}$, where $n_g=eV_g/E_c$ is determined by the gate voltage and the charging energy.
The recursive equation \eqref{recursive_prob_eq} and the probability conservation yield the expression of the probabilities, which are necessary to compute the total current,
\begin{equation}
I=-e\left[P(N)\Gamma_{N+1,N}^{{\mathrm U}}-P(N+1)\Gamma_{N,N+1}^{{\mathrm U}}\right]. \label{seq_current}
\end{equation}
The expression of the current is still complicated and depends on how many levels can be reached in the bias window. If the bias window is sufficiently small, tunneling is only possible via one energy level $\varepsilon_{{\mathrm d}}(j)$ situated near the Fermi energy $\mu$. In this case,
\begin{equation}
I=-e\frac{2\Gamma_T}{\pi R}\frac{ n_F(\varepsilon_{{\mathrm d}}(j)-\mu_{\mathrm U })-n_F(\varepsilon_{{\mathrm d}}(j)-\mu_{\mathrm L})}{2+\left[n_F(\varepsilon_{{\mathrm d}}(j)-\mu_{\mathrm U })+n_F(\varepsilon_{{\mathrm d}}(j)-\mu_{\mathrm L })\right]},
\end{equation}
where $\Gamma_T=|\gamma_T|^2/(2v_F) $. We choose the chemical potentials as $\mu_{\mathrm U}=\mu+eV/2$ and $\mu_{\mathrm L}=\mu-eV/2$, where $V$ is the bias voltage between upper and lower edges. At $T=0$ and finite voltage, we get
\begin{equation}
I_{T=0}=-\frac{2e\Gamma_T}{3\pi R},
\end{equation}
for $\varepsilon_{{\mathrm d}}(j)\in[\mu-eV/2,\mu+eV/2]$. On the other hand, if the temperature is finite and $eV \ll k_B T$, the current to lowest order in the applied voltage becomes
\begin{equation}
I_{T\neq 0}=-\frac{1}{4k_BT}\frac{\Gamma_T}{\pi R}\frac{e^2V}{1+n_F(\tilde{\varepsilon}_{{\mathrm d}})}\frac{1}{\cosh^2(\tilde{\varepsilon}_{{\mathrm d}}/(2k_BT))},
\end{equation}
where $\tilde{\varepsilon}_{{\mathrm d}}=\varepsilon_{{\mathrm d}}(j)-\mu$. As is well known in the sequential tunneling regime, the limits $eV \to 0$ and $k_B T \to 0$ do not commute.\cite{bruus_book}
One of the central assumptions of this rate equation approach is that the electrons on the dot relax to the ground state between tunneling events, i.e., there is a separation of time scales between the fast relaxation and the slow tunneling. However, in our case, either the initial state $|N\rangle$ or the final state $|N+1\rangle$ is twofold-degenerate due to time-reversal symmetry. Since the rate-equation approach does not properly account for the fact that the chirality of the electrons on the antidot is conserved, it is not possible to calculate chirality-resolved currents within this approach. Hence, we only presented results for the total current $I$. However, since the total current does not contain information about the spin texture, we continue by exploring higher-order coherent processes.
\subsection{Cotunneling}
\begin{figure}[t!]
\centering
\includegraphics[scale=0.5]{cotunneling.pdf}
\caption{Sketch of a possible cotunneling process between lead 1 and lead 4. The energy level on the antidot is fully occupied. One of the two electrons escape the antidot towards lead 4, creating a virtual state with an additional hole. The final state is reached when the electron in lead 1 tunnels to the antidot.}
\label{fig:cotunneling}
\end{figure}
If sequential tunneling is inhibited due to energy conservation, transport between the upper and lower edge is still possible via cotunneling, where electrons tunnel between the upper and lower edge via virtual states on the antidot. A sketch of a possible process is shown in Fig.~\ref{fig:cotunneling}.
In the following we consider elastic cotunneling which, due to the discrete nature of the mesoscopic antidot, becomes relevant for transport.
The cotunneling rate from the initial state $\vert i^{s\alpha}(N,k)\rangle$, which contains $N$ electrons on the antidot and a single electron with momentum $k$ and chirality $\alpha$ on the edge $s$, to the final one $\vert f^{s'\alpha'}(N,k')\rangle$, which is defined analogously, reads
\begin{equation}
\begin{split}
&\Gamma_{i\to f}=2\pi\delta(E_{f}-E_{i})F_i\\
&\times|\langle f|\H_{\mathrm{d,L}}\frac{1}{E_{i}-\H_{0}}\H_{\mathrm{d,U}}+\H_{\mathrm{d,U}}\frac{1}{E_{i}-\H_{0}}\H_{\mathrm{d,L}}|i\rangle|^2,\label{cotunneling_total}
\end{split}
\end{equation}
where $\H_{0}=\H_{ {\mathrm U}}+\H_{{\mathrm L}}+\H_{ {\mathrm d}}$, and $E_{i,f}$ are the energies of the initial and final state. $F_i$ is again the Fermi distribution specifying the probability of finding the system in the initial state $|i^{s\alpha}(N,k)\rangle$. Note that the antidot contains $N$ electrons in the ground state in both initial and final states.
The total chirality-resolved cotunneling rates $\Gamma^{\alpha\alpha '}_{\mathrm{U}\to\mathrm{L}}$ and $\Gamma^{\alpha\alpha '}_{\mathrm{L}\to\mathrm{U}}$ are then obtained by summing over all the possible initial- and final-state momenta, and over all angular momenta and chiralities in the intermediate state.
From the tunneling rates it is then possible to compute the tunneling current, defined as flowing from the upper to the lower edge, as
\begin{equation}\label{eq:cot_curr}
I^{\alpha \alpha^\prime}=(-e)\left[\Gamma^{\alpha\alpha^\prime}_{\mathrm{U}\to\mathrm{L}}-\Gamma^{\alpha ^\prime\alpha}_{\mathrm{L}\to\mathrm{U}}\right].\end{equation}
To connect to the setup shown in Fig.~\ref{fig:setup}, $I^{++}$ is the current flowing from lead 1 to lead 4, $I^{+-}$ is the current flowing from lead 1 to lead 3, $I^{-+}$ is the current flowing from lead 2 to lead 4, and $I^{--}$ the current flowing from lead 2 to lead 3. The results for these currents depend strongly on the parity of the antidot occupation.
In the case of an even number $N$ of electrons on the antidot, i.e., if all levels up to the chemical potential are doubly occupied, we find
\begin{equation}
\begin{split}
I_{N\ \rm even}^{\alpha\alpha^\prime}=&-\frac{e\Gamma_T^2 }{2\pi^3R^2}\sum_{j}\int d\varepsilon [n_F(\varepsilon-\mu_{{\mathrm U}\alpha})-n_F(\varepsilon-\mu_{{\mathrm L}\alpha^\prime})]\\
&\times\frac{ \cos^2(2\theta_T)\delta_{\alpha^\prime\alpha}+\sin^2(2\theta_T)\delta_{\bar{\alpha}^\prime\alpha} }{\left [\varepsilon-\varepsilon_{{\mathrm d}}(j)-\Delta E\right ]^2}
,\end{split}
\end{equation}
where $\varepsilon_{{\mathrm d}}(j)+\Delta E$ is the energy of the intermediate state. Depending on the gate voltage, $\Delta E= \Delta E (N)$ if an additional hole occupies the $j$-th level of the dot or $\Delta E= \Delta E (N+1)$ for an additional electron.
At low bias it is possible to expand the Fermi functions around $\mu$ and, by assuming that only the $j_0$th antidot energy level (the closest from the chemical potential) is contributing to the cotunneling current and $\Delta E+\varepsilon_{{\mathrm d}}(j_0)\gg \mu_{\mathrm{U/L}\alpha}$, one obtains
\begin{equation}
\begin{split}
I_{N\ \rm even}^{\alpha\alpha^\prime}\approx&-\frac{e^2(V_\alpha-V_{\alpha^\prime})\Gamma_T^2 }{2\pi^3R^2}
\frac{ \cos^2(2\theta_T)\delta_{\alpha^\prime\alpha}+\sin^2(2\theta_T)\delta_{\bar{\alpha}^\prime\alpha} }{\left [\mu-\varepsilon_{{\mathrm d}}(j_0)-\Delta E\right ]^2}
\end{split}
\end{equation}
with the parameter $\theta_T$ evaluated at the chemical potential $\mu$. We recover here an implicit dependence on the spin texture through $\theta_T$. The Coulomb repulsion will just shift the energy in the denominator, depending on the value of the gate voltage. Moreover, it is possible to invert the expression for the current in order to extract the value of $\theta_T$ as a function of the current, the voltage, and the charging energy. This makes it possible in principle to compare the tunneling processes in the noninteracting and in the interacting limits.
The case in which the antidot level hosts an odd number of electrons, i.e., if the energy level at the chemical potential has only one electron, is quite different.
Due to the degeneracy of the antidot energy level, the initial and final states should include the initial (final) chirality of the antidot $\beta^{(\prime)}$, becoming $|i^{s\alpha\beta}(N,k)\rangle$ and $\vert f^{s'\alpha'\beta^\prime}(N,k')\rangle$.\cite{lehmann06} By applying Eq.~\eqref{cotunneling_total}, we modify the current expression in \eqref{eq:cot_curr} to
\begin{equation}\label{eq:mod_cot_curr}
I^{\alpha \alpha^\prime}=(-e)\sum_{\beta,\beta^\prime}\left[\Gamma^{\alpha\alpha^\prime\beta\beta^\prime}_{\mathrm{U}\to\mathrm{L}}-\Gamma^{\alpha ^\prime\alpha\beta\beta^\prime}_{\mathrm{L}\to\mathrm{U}}\right]p_\beta.\end{equation}
The rates are found in Appendix~\ref{appendix:rates}. The probabilities $p_\beta$ of the highest level of the antidot being occupied by an electron with chirality $\beta$ are determined by the conservation of probabilities $p_++p_-=1$ and by the rate equation,
\begin{equation}
\frac{dp_\beta}{dt}=-\Gamma^{\beta\bar{\beta}}p_\beta+\Gamma^{\bar{\beta}\beta}p_{\bar{\beta}}=0,
\end{equation}
where $\Gamma^{\beta\bar{\beta}}=\sum_{\alpha\alpha^\prime}(\Gamma^{\alpha\alpha^\prime\beta\bar{\beta}}_{\mathrm{U}\to\mathrm{L}}+\Gamma^{\alpha\alpha^\prime\beta\bar{\beta}}_{\mathrm{L}\to\mathrm{U}})$. By evaluating the rates at the chosen chemical potentials, we are able to compute the chirality-resolved currents. As an example, we set a difference of potential between the upper edge and the lower edge, such that $\mu_{\mathrm{U}+}=\mu_{\mathrm{U}-}=\mu+\frac{eV}{2}$ and $\mu_{\mathrm{L}+}=\mu_{\mathrm{L}-}=\mu-\frac{eV}{2}$, leading to
\begin{equation}
\begin{split}
I_{N\ \rm odd}^{\alpha\alpha^\prime}\approx-\frac{2\Gamma_T^2G_0V}{v_F^2}&\left [\frac{1}{\xi^2(N)}+\frac{1}{\xi^2(N+1)}\right .\\
&\left .+\frac{\alpha\alpha^\prime\cos\left (4\theta_{k_F}-4\theta_{j_0}\right)-1}{\xi(N)\xi(N+1)}\right ]
,\end{split}
\end{equation}
where $\xi(N)=2\pi R[\varepsilon_{{\mathrm d}}(j_0)+\Delta E(N)-\mu]/v_F$. In this result, we obtain an explicit dependence of the current on the antidot and edge state spin textures, $\theta_{j_0}$ and $\theta_{k_F}$, even in the case of position-independent RSOC. Hence, a measurement of the cotunneling current allows one to measure the difference between the external edge spin rotation $\theta_{k_F}$ and the antidot spin rotation $\theta_j$. Since the system occupies a virtual intermediate state, $\theta_{k_F}$ will generally differ from $\theta_{j_0}$. In particular, the difference of currents between the two lower terminals leads to
\begin{equation}
I_{N\ \rm odd}^{+-}-I_{N\ \rm odd}^{++}\approx \left (\frac{2\Gamma_T}{v_F}\right )^2\frac{\cos\left (4\theta_{k_F}-4\theta_{j_0}\right)}{\xi(N)\xi(N+1)}G_0V
\end{equation}
This measurement would enable us to extract directly the information about the spin texture.
Another possibility to probe the spin texture would be to apply a different voltage setting: only one lead is biased, such as for example $\mu_{U+}=\mu +eV$ and $\mu_{U-}=\mu_{L+}=\mu_{L-}=\mu$. Again, we can divide the tunneling current in two contributions $I_{N\ \rm odd}^{++}$ and $I_{N\ \rm odd}^{+-}$ that we compute using Eq.~\ref{eq:mod_cot_curr}, leading to
\begin{widetext}
\begin{eqnarray}\label{eq:iod+-}
I_{N\ \rm odd}^{+-}&\approx&-\frac{2\Gamma_T^2G_0V}{v_F^2}\left (\frac{1}{\xi(N+1)\xi(N)}\right )^2 \left \{\xi^2(N+1)+\xi^2(N)-\xi(N+1)\xi(N)\left [1+\cos\left (4\theta_{k_F}-4\theta_{j_0}\right )\right ]\right .\nonumber\\
&-&\left .[\xi(N+1)-\xi(N)]\cos\left (2\theta_{k_F}-2\theta_{j_0}+2\theta_T\right )\left [\xi(N+1)\cos\left (2\theta_{k_F}-2\theta_{j_0}-2\theta_T\right )-\xi(N)\cos\left (2\theta_{k_F}+2\theta_{j_0}+2\theta_T\right )\right ]\right \}
\end{eqnarray}
\begin{eqnarray}\label{eq:iod++}
I_{N\ \rm odd}^{++}&\approx&-\frac{2\Gamma_T^2G_0V}{v_F^2}\left (\frac{1}{\xi(N+1)\xi(N)}\right )^2 \left \{\xi^2(N+1)+\xi^2(N)-\xi(N+1)\xi(N)\left [1-\cos\left (4\theta_{k_F}-4\theta_{j_0}\right )\right ]\right .\nonumber\\
&+&\left .[\xi(N+1)-\xi(N)]\cos\left (2\theta_{k_F}-2\theta_{j_0}+2\theta_T\right )\left [\xi(N+1)\cos\left (2\theta_{k_F}-2\theta_{j_0}-2\theta_T\right )+\xi(N)\cos\left (2\theta_{k_F}-2\theta_{j_0}+2\theta_T\right )\right ]\right \}
.\end{eqnarray}
\end{widetext}
We observe this time a more sophisticated dependence on the different parameters.
However, from Eq.~\eqref{eq:iod+-} one can see that the current flowing to lead $3$ vanishes if $\theta_{k_F}=\theta_{j_0}=\theta_T=0$, that is, in the absence of RSOC; indeed, in this case spin is conserved and electrons, injected fully spin-up polarized from lead 1, can only flow to lead 4 preserving their spin, as schematically shown in Fig.~\ref{fig:cotunneling_setup}(a).
However, in the case of strong RSOC, spin-flip tunneling can become important, eventually dominating over the spin-preserving contribution. In this case, the current mostly flows from lead $1$ to lead $3$, as schematically shown in Fig.~\ref{fig:cotunneling_setup}(b).
\begin{figure}[t!]
\centering
\includegraphics[scale=0.47]{setup_antidot_2a.png}
\includegraphics[scale=0.47]{setup_antidot_2b.png}
\caption{Sketch of the two contributions to the tunneling current $I_{N\ \rm odd}^{++}$ and $I_{N\ \rm odd}^{+-}$ in the case only lead $1$ is biased, that is $\mu_{U+}=\mu +eV$ and $\mu_{U-}=\mu_{L+}=\mu_{L-}=\mu$.
Panel (a) corresponds to weak Rashba interactions, so that spin is almost conserved: therefore the contribution $I_{N\ \rm odd}^{+-}$ due to spin-flip is strongly suppressed. In the opposite scenario of strong Rashba interactions, spin-flip contributions can even become dominant compared to spin-preserving one, leading to the scenario depicted in panel (b).}
\label{fig:cotunneling_setup}
\end{figure}
To conclude the discussion of the electron transport in the interacting case, we observe in the cotunneling regime that the occupation of the antidot plays an important role. In the case of an even occupation, we recover the implicit dependence of the current on the spin texture. In contrast, for odd occupation, we find an explicit dependence on the spin texture. By tuning the chemical potentials, it is thus possible to detect the interplay between implicit ($\theta_T$) and explicit ($\theta_{k_F}$ and $\theta_j$) dependence of the spin texture.
\section{Conclusion}\label{sec:conclusions}
We have presented a detailed analysis of the electron transport between the edges of a two-dimensional topological insulator via an antidot. In particular, we investigated the effects of a nontrivial spin structure of the edge states and a charging energy due to Coulomb repulsion on the antidot.
We first presented a solution of the corresponding scattering problem in the absence of interactions. We showed that, on the one hand, spin-non-conservation modifies the spin texture of the edge states, but on the other hand, it also makes spin-flip tunneling between the edges and the antidot possible. We also performed numerical calculations based on tight-binding models, and we confirmed the predictions of the scattering approach. We found that the effects of spin-non-conservation become most important for inhomogeneous samples where the spin structures of different edge states may differ.
To include the effects of charging energy, we investigated the Coulomb blockade regime, where we presented a calculation of the sequential tunneling and cotunneling currents. Here, we showed in particular that, since the cotunneling occurs via an intermediate, virtual state on the antidot, it allows a spectroscopic measurement of the antidot and edge-state spin structure.
\begin{acknowledgments}
This work was supported through the German DFG priority program SPP 1666 on topological insulators. AR, GD, and TLS acknowledge support from the National Research Fund, Luxembourg (ATTRACT 7556175). SR thanks the DFG for financial support through SFB 1143.
\end{acknowledgments}
|
\section{Introduction}
Accelerated expansion of the current universe was reported by Riess et al. \cite{S27} of high-redshift supernavoe search team and Perlmutter et al. \cite{S271} of supernovae cosmology project team through accumulation of observational data from distant type Ia Supernovae. Discovery of
\cite{S27,S271} was truly ground breaking and subsequently this has been further confirmed by other observational studies including more detailed studies of
supernovae and independent evidence from clusters of galaxies, large-scale structure (LSS) and the cosmic microwave background (CMB)\cite{Fried}. The reason
behind this expansion is referred to as ``dark energy" (DE), which is regarded as an exotic matter characterized by negative pressure and having equation of state parameter $w=p/\rho<-1/3$ required for accelerated expansion of the universe. Nature of this DE is not yet clear and different DE candidates have been proposed till date. Some remarkable reviews on DE include \cite{copeland-2006,bambareview,DErev,nojirireview}. While proposing a phantom cosmology based unifying approach to early and late-time universe Nojiri and Odintsov \cite{nojiriadd} suggested generalized holographic dark energy (HDE)involving infrared cut-off combined with FRW parameters and also discussed the entropy bound in phantom era. HDE is based on ``holographic principle" and the density of HDE is \cite{3}
$\rho_{\Lambda}=3c^2M_p^2L^{-2}$, where $L$ is the infrared cut-off. Some notable works on HDE include \cite{holo1,holo2,holo3,holo4,holo51,holo61}. Furthermore, there exist plethora of literatures on HDE in theoretical aspects as well as observational constraints e.g. \cite{holo5,holo6,holo7}.
In the present work we consider
a special form of HDE \cite{EHRDE1} dubbed as ``extended
holographic Ricci dark energy" (EHRDE) \cite{EHRDE2,EHRDE3}, whose
density has the form
\begin{equation}\label{RD}
\rho_{DE}=3 M_p^2\left(\alpha H^2+\beta \dot{H}\right)
\end{equation}
where the upper dot represents derivative with respect to cosmic time $t$, $M_p^2$ is the reduced Planck mass, $\alpha$ and $\beta$
are constants to be determined. In this context we should mention that the role of a distance proportional to the Ricci scale as a causal connection scale for perturbations was noticed in \cite{R1} and \cite{R2} used it for the first time as a DE cutoff scale. Detailed cosmology of Ricci DE was discussed in \cite{R3} and some further literatures on Ricci DE include \cite{R4,R5,R6,R7}. Wang and Xu
\cite{2} found the best-fit values in order to make the cutoff of \cite{EHRDE2} to
be consistent with observational data as
$\alpha=0.8502^{+0.0984+0.1299}_{-0.0875-0.1064}$ and
$\beta=0.4817^{+0.0842+0.1176}_{-0.0773-0.0955}$. In the current work we shall take
$\alpha= 0.98$ and $\beta=0.37$.
In the early evolution of the universe, dissipative effects, including both bulk and shear viscosity, are supposed to play a very important role \cite{vcg}. Chimento et al \cite{vis1} had shown that accelerated expansion can be derived by the combination of a cosmic fluid with bulk dissipative pressure and quintessence matter and it can also solve the coincidence problem. Evolution of the universe involves a sequence of important dissipative processes that includes GUT phase transition at $t\approx 10^{-34} s$ and a temperature of about $T\approx 10^{27}K$ \cite{vcg}.
Eckart \cite{eckart} and Landau and Lifshitz \cite{landu} were the first ones to attempt at creating a theory of relativistic dissipative fluids. A relativistic second-order theory was developed by Israel and Stewart \cite{israel}.
A time dependent viscosity consideration was made to DE by Nojiri and Odintsov \cite{nojiriadd2} while considering EoS with inhomogeneous, Hubble parameter dependent term and it was demonstrated that the thermodynamic entropy may be positive even in phantom era as a result of crossing the phantom boundary. Pun et al \cite{vcg} considered a generalization of the
Chaplygin gas model and by assuming the presence of a bulk viscous type dissipative term in the effective
thermodynamic pressure of the gas and by considering dissipative effects described by truncated Israel-Stewart model they \cite{vcg} had shown that viscous Chaplygin gas model offers an effective dynamical possibility for replacing the cosmological constant. Effect of viscosity in Chaplygin gas with different modifications have been studied in \cite{vcg1,vcg2,vcg3}. Cataldo et al \cite{vis2} investigated dissipative processes in the universe in the full causal Israel-Stewart-Hiscock theory and showed that the negative pressure generated by the bulk viscosity cannot avoid that the dark energy of the universe to be phantom energy. Brevik and Gorbunova \cite{vis3} assumed the bulk viscosity to be proportional to the scalar expansion in a spatially flat FRW universe and had shown that it could lead the universe to phantom phase even if the universe lies in the quintessence phase in the non-viscous scenario. Ren and Meng \cite{vis4} considered a generally parameterized EoS in the cosmological evolution with bulk viscosity media modelled as dark fluid. Setare and Sheykhi \cite{setare2} studied the validity of generalized second law of thermodynamics in presence of viscous dark energy in a non-flat universe and concluded with validity of the generalized second law. Feng and Li \cite{feng} investigated viscous Ricci dark energy and showed that once viscosity is taken into account the problem on age of the universe gets alleviated. Amirhashchi and Pradhan \cite{vis5} considered viscous and non-viscous dark energy EoS parameter in anisotropic Bianchi type I space-time and could get a transition from quintessence to phantom. Brevik et al. \cite{vis6} investigated interacting dark energy and dark matter in flat FRW universe taking bulk viscosity as a function of Hubble parameter $H$ and cosmic time $t$ and studied subsequent corrections of thermodynamical parameters. Velten et al.\cite{vis7} derived conditions under which either viscous matter or radiation cosmologies can be mapped into the phantom dark energy scenario with constraints from multiple observational data sets. Jamil and Farooq \cite{vis8} presented a generalization of interacting HDE using the viscous generalized Chaplygin gas and reconstructed the potential and the dynamics of the scalar field. Setare and Kamali \cite{vis9} study warm-viscous inflationary universe model on the brane in a tachyon field theory and obtained the general conditions which are required for this model to be realizable. In a very recent work, Bamba and Odintsov \cite{Bamba1} investigated a fluid model in which
EoS for a fluid includes bulk viscosity and found that the spectral index of the curvature perturbations, the tensor-to-scalar ratio of the density perturbations, and the running of the spectral index, can be consistent with the recent Planck results. It may be noted that in a remarkable work Brevik et al. \cite{nojiriadd3} discussed entropy of DE filled FRW universe in the framework of holographic Cardy-Verlinde formula and expressed entropy in terms of energy and Casimir energy depending on the EoS and in a relatively recent work, Brevik et al. \cite{ nojiriadd4} derived a formula for the entropy for a multicomponent coupled fluid that under certain conditions may reduce to the Cardy-Verlinde form to relate the entropy of a closed FRW universe to the energy contained in it together with its Casimir energy. In some recent studies bulk viscosity has been incorporated in the studies of modified gravity too and studies in this direction include \cite{mod1,mod2,mod3}.
Plan of the present work is as follows: In section II we shall apply Israel-Stewart theory to study the behavior of viscous extended holographic Ricci dark energy (EHRDE) without any specific choice of scale factor as well as for the choice $a(t)=(t-t_0)^{\frac{\beta}{1-\alpha}}$. In section III we shall study the statefinder parameters and investigate whether $\Lambda$CDM phase is attainable for both the cases. In section IV we shall examine validity of the generalized second law of thermodynamics for both the cases and we in section V we shall conclude.
\section{Israel-Stewart approach }
\subsection{Israel-Stewart approach without any specific choice of scale factor}
In the cosmological framework bulk viscosity can be thought of as an internal friction due to
the different cooling rates in an expanding gas \cite{vcg}. As the dissipation due to bulk viscosity converts kinetic energy of the
particles into heat, the effective pressure is expected to be reduced in an expanding fluid. For a flat homogeneous Friedmann-Robertson-Walker (FRW) with a line element:
\begin{equation}
ds^2=dt^2-a^2(t)\left(dx^2+dy^2+dz^2\right)
\end{equation}
filled with a bulk viscous cosmological fluid the energy-momentum tensor is given by \cite{vcg}
\begin{equation}
T_i^k=(\rho+p+\Pi)u_iu^k-(p+\Pi)\delta_i^k
\end{equation}
where $\rho$, $p$ and $\Pi$ are energy density, thermodynamic pressure and the bulk viscous pressure respectively. The $u_i$ is four velocity
that satisfies the condition $u_iu^i=1$. Here, $N^i=nu^i$ and $S^i=\sigma N^i-\left(\tau \Pi^2/2\xi T\right)u^i$ are particle and entropy fluxes respectively, where $n$, $\sigma$ and $T\geq 0$ implies the number density, the specific entropy, and temperature respectively. Also, bulk viscosity coefficient and relaxation time are $\xi$ and $\tau\geq 0$ respectively. If the Hubble parameter is $H=\frac{\dot{a}}{a}$ then the gravitational field equations together with the continuity equation are \cite{vcg}
\begin{eqnarray}
3H^2 &=& \rho, \label{f1}\\
2\dot{H}+3H^2 &=& -p-\Pi, \label{f2}~~~\\
\dot{\rho}+3H(\rho+p) &=&- 3H\Pi. \label{f3}~~~~~~~
\end{eqnarray}
The effect of the bulk viscosity can be considered by
adding thermodynamic pressure $p$ to the bulk viscous pressure $\Pi$, i.e.
\begin{equation}
p_{eff}=p+\Pi
\end{equation}
terms in the energy-momentum tensor
Taking $x=\ln a$ in Eq. (\ref{RD}) we have ($M_p^2=1$)
\begin{equation}\label{RDx}
\rho_{DE}=3 \left(\alpha H^2+\frac{\beta}{2} \frac{dH^2}{dx}\right)
\end{equation}
Considering $\rho=\rho_{DE}$ in Eq.(\ref{f1}) we have the Hubble parameter
\begin{equation}\label{Hx}
H(x)=H_0 \exp \left(\frac{x(1-\alpha)}{ \beta}\right)
\end{equation}
Putting $x=\ln a$ in Eq. (\ref{Hx}) we can write
\begin{eqnarray}
H=H_0 a^{\frac{1-\alpha}{\beta}}
\end{eqnarray}
which can be written in the form of a differential equation
\begin{eqnarray}
\dot{a}(t)=H_0 a(t)^{1+\frac{1-\alpha}{\beta}}
\end{eqnarray}
where the upper dot implies time derivative with respect to cosmic time $t$. Since for the current time $t=t_0$ we have $a=1$, we have the following particular solution for $a(t)$:
\begin{equation}\label{a}
a(t)=\left(\frac{H_0 (t-t_0) (-1+\alpha )+\beta }{\beta }\right)^{\frac{\beta }{-1+\alpha }}
\end{equation}
Hence, Hubble parameter as expressed in Eq. (\ref{Hx}) can be written as a function of $t$ :
\begin{equation}\label{Ht}
H=\frac{H_0 \beta}{H_0 (t-t_0)(-1+\alpha)+\beta}
\end{equation}
Using Eq. (\ref{Ht}) in (\ref{RD}) we have the reconstructed RDE as
\begin{equation}\label{RDreconst}
\rho_{DE}=3H^2=\frac{3 H_0^2 \beta ^2}{\left(H_0 (t-t_0) \left(-1+ \alpha \right)+ \beta \right)^2}
\end{equation}
Using Eq. (\ref{RDreconst}) in (\ref{f3}) we have the EoS parameter
\begin{equation}\label{EoS}
w_{DE}=-1+\frac{1}{3} \left(-\frac{2}{ \beta }+\frac{2 \alpha }{\beta }-\frac{\Pi \left(H_0 (t-t_0) \left(-1+
\alpha \right)+ \beta \right)^2}{H_0^2 \beta ^2}\right)
\end{equation}
Hence, for present acceleration i.e. $w<-1/3$ at $t=t_0$ we need
\begin{equation}
\alpha<1+\frac{\beta}{2}\left(6+\frac{\Pi(t=t_0)}{H_0^2}\right)
\end{equation}
If the current universe is in phantom phase i.e. $w<-1$ then we shall require
\begin{equation}
\alpha<1+\frac{\Pi(t=t_0)}{2H_0^2}\beta
\end{equation}
For the bulk viscosity coefficient $\xi$ and for the relaxation time $\tau$ of the viscous extended holographic Ricci dark energy we assume the following
phenomenological laws \cite{vcg}
\begin{equation}\label{xi}
\xi=\eta \rho^{\nu},~~~~~~~~~~~~\tau=\xi \rho^{-1}=\eta\rho^{\nu-1}
\end{equation}
where, $\eta\geq 0$ and $\nu\geq 0$ are constants. At this juncture it may be stated that the bulk viscosity
coefficient $\xi$ is being considered as a function of $\rho(t)$. Hence possibility is open to a variety of
$\xi(\rho(t))$. The case $\nu=1/2$ yields $\xi=\eta \rho^{1/2}$ that corresponds to a power-law expansion for the
scale factor. To obtain solution with big-rip no restriction is imposed on $\nu$ and similar approach
was adopted in \cite{vis2}. Another work that is noteworthy in this context is done by Colistete et al.
\cite{Colistete}, where for viscous generalized Chaplygin gas a variety of solutions were presented for different
ranges of $\nu$. Taking $\nu=2$ and subsequently solving the evolution equation for $\Pi$ in the framework of the truncated Israel-Stewart theory given by
\begin{equation}\label{Pi}
\tau \dot{\Pi}+\Pi=-3H\xi
\end{equation}
we obtain the evolution equation of the bulk viscous pressure as
\begin{equation}\label{Pisolve}
\Pi=e^{-\frac{(\varphi_1 t+\varphi_2)^3}{9 \varphi_2 H_0^2 \eta }} C_1-\frac{e^{-\frac{(\varphi_1 t+\varphi_2)^3}{9 \varphi_2 H_0^2 \eta }} H_0^3 \left(-9 e^{\frac{(\varphi_1 t+\varphi_2)^3}{9 \varphi_2 H_0^2 \eta }}+3^{2/3} \left(-\frac{(\varphi_1 t+\varphi_2)^3}{\varphi_2 H_0^2 \eta }\right)^{2/3} \Gamma\left[\frac{1}{3},-\frac{(\varphi_1 t+\varphi_2)^3}{9
\varphi_2 H_0^2 \eta }\right]\right)}{2\varphi_2 (\varphi_1 t+\varphi_2)^2}
\end{equation}
where
\begin{eqnarray}
\varphi _1=\frac{H_0}{\beta } ( \alpha -1 ),\nonumber \\
\varphi _2=1+\frac{H_0 t_0}{\beta }\left(1- \alpha \right). \nonumber
\end{eqnarray}
and $C_1$ is the constant of integration.
Hence, EoS parameter, when expressed as a function of $x(=\ln a)$ takes the form
\begin{equation}\label{wDE}
\begin{array}{c}
w_{DE}=-1+\frac{1}{3} \left(\frac{2 (\alpha -1)}{\beta }-\frac{1}{2 H_0^2}e^{\frac{2 x (\alpha-1 )}{\beta }-X} \left(2-\frac{H_0^3
\beta \left(-9 C_1 e^X+3^{2/3} (-X)^{2/3} \Gamma\left[\frac{1}{3},-X\right]\right)}{(H_0 (t_0(1-\alpha )+\beta )) \left(\frac{X \left(9
H_0^2 (H_0 t_0(1-\alpha )+\beta ) \eta \right)}{\beta }\right)^{\frac{2}{3}}}\right)\right)
\end{array}
\end{equation}
where
\begin{equation}\label{X}
X=\frac{\beta \left(\frac{H_0 (\alpha-1 )}{\beta }+\left(1-\frac{H_0 t_0 (\alpha-1 )}{\beta }\right) \left(t_0+\frac{\left(-1+e^{\frac{x
(\alpha-1 )}{\beta }}\right) \beta }{H_0 (\alpha-1 )}\right)\right)^3}{H_0^2 (H_0 t_0(1-\alpha) +\beta ) \eta
}
\end{equation}
Eq.(\ref{wDE}) imposes one more constraint on the relationship between $\alpha$ and $\beta$ as
\begin{equation}
\alpha\neq 1+\frac{\beta}{H_0t_0}
\end{equation}
We would like to add a note at this juncture. Eq. (\ref{xi}) comes as a phenomenological law for bulk
viscosity coefficient and relaxation time with $\eta\geq 0$ i.e. possibility of $0$ is not excluded. Clearly,
for $\eta=0$ the bulk viscous pressure will vanish and we shall get back the non-viscous scenario.
However, it is clear that the evolution equation for $\Pi$ in the framework of Israel-Stewart theory
is written for viscous scenario and for non-viscous it is irrelevant. Eq.(\ref{Pi}) is a linear differential
equation on $\Pi$ whose integrating factor is $\exp\int\frac{dt}{\tau}$ and obviously the integrating factor will not
exist if $\eta=0$ and hence there will exist no solution and Eq.(\ref{X}) will be of no existence.
From Eq.(\ref{wDE}) we observe that for $\alpha=0.98,~\beta=0.37$ in EHRDE as mentioned in the previous section we have for very late stage of the universe
\begin{equation}
\begin{array}{c}
x\rightarrow \infty \Rightarrow w_{DE}\rightarrow -1+
\frac{1}{3} \\
\left(-0.108-\frac{1}{H_0^2}-\left.\left(10^{-5} H_0^3 \left(-9+19577.259 \left(\frac{\left(0.137+0.0148 H_0 t_0+
4\times
10^{-4} H_0^2 \left(-1+t_0^2\right)\right)^3}{H_0^5 (-0.37-0.02 H_0 t_0) \eta }\right)^{2/3}\right.\right.\right.\right. \\ \left.\left.\left.\left.\Gamma\left[\frac{1}{3},\frac{101452.804
\left(0.1369+0.0148 H_0 t_0+4\times 10^{-4}H_0^2 \left(t_0^2-1\right)\right)^3}{H_0^5 (-0.37-0.02 H_0 t_0)
\eta }\right]\right)\right)\right/\right.\\
\left.\left((-0.37-0.02H_0 t_0) \left(0.1369+0.0148 H_0 t_0+4\times 10^{-4} H_0^2 \left(t_0^2-1\right)\right)^2\right)\right)
\end{array}
\end{equation}
and for early stage
\begin{equation}
\begin{array}{c}
x\rightarrow -0.14 \Rightarrow w_{DE}\rightarrow-1+
\frac{1}{3}
\left(-\frac{1}{H_0^2}0.5e^{-\frac{0.04 \left(-0.14+0.99 H_0 t_0+H_0^2 \left(-0.054+0.054 t_0^2\right)\right)^3}{H_0^5
(0.37+0.02 H_0 t_0) \eta }} \right.\\
\left(2-\left.\left(0.37H_0^3 \left(-9e^{\frac{0.04 \left(-0.14+0.99 H_0 t_0+H_0^2 \left(-0.054+0.054 t_0^2\right)\right)^3}{H_0^5
(0.37+0.02 H_0 t_0) \eta }}+\right.\right.\right.\right.\\
\left.\left.\left.\left.1.07 \left(-\frac{ \left(-0.14+0.99 H_0 t_0+H_0^2 \left(-0.054+0.054t_0^2\right)\right)^3}{H_0^5
(0.37+0.02 H_0 t_0) \eta }\right)^{2/3} \Gamma\left[0.33,-\frac{0.04 \left(-0.054 H_0+\left(-\frac{0.14}{H_0}+t_0\right)
(1+0.054 H_0 t_0)\right)^3}{H_0^2 (0.37+0.02 H_0 t_0) \eta }\right]\right)\right)\right/\right.\\
\left.\left.\left((0.37+0.02 H_0 t_0) \left(-0.054 H_0+\left(-\frac{0.14}{H_0}+t_0\right) (1+0.054 H_0 t_0)\right)^2\right)\right)\right)
\end{array}
\end{equation}
where $\Gamma(a,z)=\int_{z}^{\infty}e^{-t}t^{a-1}dt$.
From the above limits one can see that the EoS parameter is determined by the viscosity of the EHRDE and does not blow up in the past or future. This observation is consistent with \cite{feng}, where the RDE was considered with barotropic fluid and the EoS parameter was seen not to blow up in the past of the future.
\begin{figure}[h]
\includegraphics[width=20pc]{figure1.eps}
\caption{\label{figEoS}EoS parameter based on Eq.(\ref{wDE}). Red, green and blue lines correspond to $\{\alpha,\beta\}$ combination of $\{0.9735,0.3701\}$ with $\eta=3.5\times 10^{-4},3.0\times 10^{-4}$ and $2.5\times 10^{-4}$ respectively. }
\end{figure}
\begin{figure}[h]
\includegraphics[width=20pc]{figure2.eps}
\caption{\label{figpeff}Plot of $p_{eff}=p+\Pi$. Red, green and blue lines correspond to $\{\alpha,\beta\}$ combination of $\{0.9735,3701\}$ and $\{0.9735,3701\}$ with $\eta=3.5\times 10^{-4},3.0\times 10^{-4}$ and $2.5\times 10^{-4}$ respectively.}
\end{figure}
\begin{figure}[h]
\includegraphics[width=20pc]{figure3.eps}
\caption{\label{figpidot}Plot of $\dot{\Pi}$ based on Eq.(\ref{Pisolve}). Red, green and blue lines correspond to $\{\alpha,\beta\}$ combination of $\{0.9735,3701\}$ with $\eta=3.5\times 10^{-4},3.0\times 10^{-4}$ and $2.5\times 10^{-4}$ respectively.}
\end{figure}
\begin{figure}[h]
\includegraphics[width=20pc]{figure4.eps}
\caption{\label{figxi}Plot of the bulk viscosity coefficient $\xi$. Red, green and blue lines correspond to $\{\alpha,\beta\}$ combination of $\{0.9735,3701\}$ with $\eta=3.5\times 10^{-4},3.0\times 10^{-4}$ and $2.5\times 10^{-4}$ respectively.}
\end{figure}
In Fig.\ref{figEoS} we have plotted the EoS parameter and observed that $w_{DE}<-1$ i.e. the phantom phase is attained. It is noted that the phantom barrier $w_{DE}=-1$ is never being crossed and in the very late stage $w_{DE}\ll -1$. In Fig. \ref{figpeff} the effect of bulk viscosity on the thermodynamic pressure is visualized. We observe that $p+\Pi\ll 0$ during the evolution. Fig.\ref{figpidot} shows that $\dot{\Pi}>0$ and from this we can understand that the effect of bulk viscosity on the thermodynamic pressure is increasing with evolution of the universe. However $\mid p_{eff}\mid$ is gradually decreasing with evolution of the universe. Fig.\ref{figxi} shows that the bulk viscosity coefficient $\xi$ is a monotone increasing function of cosmic time.
\subsection{Israel-Stewart approach for $a(t)=(t-t_0)^{\frac{\beta}{1-\alpha}}$ }
In the previous section instead of making any assumption on scale factor, we have derived solution for scale factor in Eq. (\ref{a}). In the present section the scale factor is chosen as
\begin{equation}\label{aplus}
a(t)=a_0 (t-t_0)^{\frac{\beta }{1-\alpha }}
\end{equation}
This leads to
\begin{eqnarray}
H=\frac{\beta }{(t-t_0)(1-\alpha)}\label{Hnew}\\
\dot{H}=-\frac{\beta }{(t-t_0)^2 (1-\alpha )}\label{Hdotnew}
\end{eqnarray}
Based on Eqs. (\ref{Hnew}) and (\ref{Hdotnew}) the reconstructed density of EHRDE is
\begin{eqnarray}\label{appdark}
\rho_{DE}=\frac{3 \beta ^2 (2 \alpha-1) }{(t-t_0)^2 (1-\alpha )^2}
\end{eqnarray}
For $\rho>0$ one needs $\alpha>1/2$. Accordingly the bulk viscosity coefficient and relaxation times (Eq. (\ref{xi})) get reconstructed and hence evolution equation for
$\Pi$ in the framework of the truncated Israel-Stewart theory given by Eq. (\ref{Pi}) is solved to get
\begin{equation}
\begin{array}{c}
\Pi=C_2 e^{-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }}+\\
\frac{e^{-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} (-1+2 \alpha ) \beta ^3 \left(-9 e^{\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }}+3^{2/3} \left(-\frac{(t-t_0)^3 (-1+\alpha )^2}{(-1+2 \alpha ) \beta ^2 \eta }\right)^{2/3} \Gamma\left[\frac{1}{3},-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }\right]\right)}{2 (t-t_0)^2 (-1+\alpha )^3}\\
\end{array}\label{appPai}
\end{equation}
and hence
\begin{equation}
\begin{array}{c}
\dot{\Pi}=\frac{e^{-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} }{6 (t-t_0)^3 (-1+\alpha )^3 (-1+2 \alpha ) \beta ^2 \eta ^2}\times\\
\left(\eta \left(-2 C_2 (t-t_0)^5 (-1+\alpha )^5+9 e^{\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} (-1+2 \alpha ) \beta ^3 \left((t-t_0)^3 (-1+\alpha )^2+6 (-1+2 \alpha ) \beta ^2 \eta \right)\right)+\right.\\
\left.(t-t_0)^6 (-1+\alpha )^4 \beta E_{\frac{2}{3}}\left[T\right]\right)
\end{array}\label{appPaidot}
\end{equation}
where, $T=-\frac{(t-t_0)^3 (-1+\alpha )^2}{9(-1+2 \alpha ) \beta ^2 \eta }$. Subsequently, $p_{DE}$ becomes
\begin{equation}
\begin{array}{c}
p_{DE}=C_2 e^{-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }}-\frac{2 \beta }{(t-t_0)^2 (-1+\alpha )}\\
-\frac{3 \beta ^2}{(t-t_0)^2 (-1+\alpha )^2}+\frac{e^{-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} (-1+2 \alpha ) \beta ^3 \left(9 e^{\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }}-3^{2/3} \left(-\frac{(t-t_0)^3 (-1+\alpha )^2}{(-1+2 \alpha ) \beta ^2 \eta }\right)^{2/3} \Gamma\left[\frac{1}{3},-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }\right]\right)}{2 (t-t_0)^2 (-1+\alpha )^3}\\
\end{array}\label{apppde}
\end{equation}
and hence EoS parameter $w_{DE}$ is
\begin{equation}
\begin{array}{c}
w_{DE}=\frac{(t-t_0)^2 (-1+\alpha )^2 }{3 (-1+2 \alpha ) \beta ^2}\times\\
\left(-C_2 e^{-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }}-\frac{2 \beta }{(t-t_0)^2 (-1+\alpha )}-\right.\\
\left.\frac{3 \beta ^2}{(t-t_0)^2 (-1+\alpha )^2}+\frac{e^{-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} (-1+2 \alpha ) \beta ^3 \left(9 e^{\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }}-3^{2/3} \left(-\frac{(t-t_0)^3 (-1+\alpha )^2}{(-1+2 \alpha ) \beta ^2 \eta }\right)^{2/3} \Gamma\left[\frac{1}{3},-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }\right]\right)}{2 (t-t_0)^2 (-1+\alpha )^3}\right)
\end{array}\label{wapp}
\end{equation}
In the above equations $E_n[z]=\int_1^\infty \frac{e^{-zt}}{t^n}dt$.
\begin{figure}[ht]
\begin{minipage}[b]{0.45\linewidth}
\centering\includegraphics[width=\textwidth]{appendix.eps} \caption{Plot of $w_{DE}$ for scale factor in Eq. (\ref{wapp})} \label{figapp} \end{minipage}
\hspace{0.5cm} \begin{minipage}[b]{0.45\linewidth}
\centering\includegraphics[width=\textwidth]{appendix1.eps}
\caption{Effective pressure $p_{eff}=p_{DE}+\Pi$ based on Eqs.(\ref{appPai}) and (\ref{apppde}).} \label{figappeff} \end{minipage}
\hspace{0.5cm}
\begin{minipage}[b]{0.45\linewidth}
\centering\includegraphics[width=\textwidth]{appendix2.eps}\caption{Time evolution of bulk viscous pressure $\dot{\Pi}$ based on Eq. (\ref{appPaidot}).}\label{figappPaidot}
\end{minipage}
\end{figure}
In Figs. \ref{figapp}, \ref{figappeff} and \ref{figappPaidot} the red, green and blue lines correspond to $\eta=0.00009,~0.0002$ and $0.00015$ respectively. In all the cases in this section $\alpha=0.9180,~\beta=0.3701$. In Fig. \ref{figapp} we plot the $w_{DE}$ and observe that the EoS parameter shows a clear transition feom $w_{DE}>-1$ to $w_{DE}<-1$ i.e. from quintessence to phantom. Hence, the model behaves like ``quintom". This is in contradiction with what happened in the model without any specific choice of scale factor, where the $w_{DE}<-1$ that implies ``phantom" behaviour of the EoS parameter. Similar to the earlier case, the effective pressure (Fig. \ref{figappeff}) is deacying with the evolution of the universe. However, time derivative of the bulk viscous pressure $\dot{\Pi}$ stays at positive level (Fig. \ref{figappPaidot}). This indicates that the effect of bulk viscous pressure increases with time. This means that the negative bulk viscous pressure gives a significant contribution to the total negative pressure of the EHRDE. The positive time derivative of bulk viscous pressure and gradually decaying effective pressure indicates that non-equilibrium bulk viscous pressure is small compared to the local equilibrium pressure.
\section{Statefinder parameters}
\subsection{Model without any specific choice of scale factor}
Sahni et al. \cite{state1} and and Alam et al. \cite{state2} introduced a pair of cosmological parameters $\{r,s\}$ (the so-called
``statefinder parameters") that seem to be promising candidates for the purpose of discrimination between the various contenders of dark energy. If the $\{r-s\}$ trajectory meets the point $\{r=1,s=0\}$ then the model is said to attain $\Lambda$CDM phase of the universe. In the literature, quite a good number of works are available, where dark energy models have been explored through statefinder trajectories e.g. \cite{state3,state4,state5}. The statefinder parameters are given by
\begin{eqnarray}
r &=& q+2q^2+\frac{\dot{q}}{H}\label{r1} \\
s &=& \frac{r-1}{3\left(q-\frac{1}{2}\right)}. \label{s1}
\end{eqnarray}
In Eqs.(\ref{r1}) and (\ref{s1}) deceleration parameter $q$ is given by
\begin{equation}
q=-\frac{\ddot{a}a}{\dot{a}^2}
\end{equation}
where $a$ is the scale factor as available in Eq.(\ref{a}). Hence, in the current framework Eq.(\ref{r1}) and (\ref{s1}) take the form
\begin{figure}[h]
\includegraphics[width=20pc]{rs.eps}
\caption{\label{figrs}The $\{r-s\}$ trajectory based on Eqs.(\ref{r}) and (\ref{s}). Red, green and blue lines correspond to $\{\alpha,\beta\}$ combination of $\{0.9735,3701\}$ with $\eta=3.5\times 10^{-4},3.0\times 10^{-4}$ and $2.5\times 10^{-4}$ respectively.}
\end{figure}
\begin{equation}\label{r}
r=\frac{H_0^2 (\alpha-1 )^2 \left(-2+\frac{\beta }{\alpha-1 }\right) \left(-1+\frac{\beta }{\alpha-1 }\right)}{(H_0
(t-t_0) (\alpha-1 )+\beta )^2}
\end{equation}
\begin{equation}
\begin{array}{c}\label{s}
s=2 \left.\left(-1+\frac{H_0^2 (\alpha-1 -\beta ) (-2+2 \alpha -\beta )}{(H_0 (t-t_0) (\alpha-1 )+\beta )^2}\right)\right/\\
3\left(-3-\frac{2}{\beta }+\frac{2 \alpha }{\beta }+
\left(C_1 e^{-\frac{(H_0 (-1+t t_0) (\alpha-1 )-t \beta )^3}{9 H_0^2 (H_0 t_0 (\alpha-1 )-\beta ) \beta ^2 \eta
}}\right.\right. \\
\left.(H_0 (t-t_0) (\alpha-1 )+\beta )^2 \left(2 H_0^2 \left(1-4 t t_0+3 t^2 t_0^2\right) (\alpha-1 )^2 \beta -2 H_0
t (-2+3 t t_0) (\alpha-1 ) \beta ^2+2 t^2 \beta ^3+\right.\right.\\
\left.\left.\left.H_0^3 \left(-2 t_0 (\alpha-1 )^3+\right.\right.\right.\right.\\
\left.\left.\left.\left.4 t t_0^2 (\alpha-1 )^3-2 t^2 t_0^3 (\alpha-1 )^3+9 e^{\frac{(H_0
(-1+t t_0) (\alpha-1 )-t \beta )^3}{9 H_0^2 (H_0 t_0 (\alpha-1 )-\beta ) \beta ^2 \eta }} \beta ^3\right)-\right.\right.\right.\\
\left.\left.\left.3^{2/3} H_0^3
\beta ^3 \left(-\frac{(H_0 (-1+t t_0) (\alpha-1 )-t \beta )^3}{H_0^2 (H_0 t_0 (\alpha-1 )-\beta ) \beta ^2 \eta }\right)^{2/3}
\Gamma\left[\frac{1}{3},-\frac{(H_0 (-1+t t_0) (\alpha-1 )-t \beta )^3}{9 H_0^2 (H_0 t_0 (\alpha-1 )-\beta
) \beta ^2 \eta }\right]\right)\right)\right/\\
\left.\left.\left(2 H_0^2 (H_0 t_0 (\alpha-1 )-\beta ) \beta ^2 (H_0 (-1+t t_0) (\alpha-1 )-t \beta )^2\right)\right)\right)
\end{array}
\end{equation}
In Fig.\ref{figrs} we observe that the $\{r-s\}$ trajectory can attain the $\Lambda$CDM point i.e. $\{r=1,s=0\}$. Again, for finite $r$, we observe that $s\rightarrow -\infty$ that corresponds to dust phase. Thus, we may conclude that the viscous EHRDE interpolates between dust and $\Lambda$CDM phases of the universe. However, the model deviates significantly from $\Lambda$CDM.
\subsection{Model with scale factor $a(t)=(t-t_0)^{\frac{\beta}{1-\alpha}}$}
For the choice of scale factor $a(t)=(t-t_0)^{\frac{\beta}{1-\alpha}}$ we get from Eqs.(\ref{r1}) and (\ref{s1}) the statefinder parameters as
\begin{equation}
\begin{array}{c}
r=\frac{1}{2} \left(1+e^{-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }}\times\right.\\
\left.\frac{ \left(-2 C_2 (t-t_0)^2
(-1+\alpha )^3 \eta +e^{\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} \beta \left(-4 (-1+\alpha )^2-6 (-1+\alpha ) \beta
+9 (-1+2 \alpha ) \beta ^2\right) \eta +(t-t_0)^3 (-1+\alpha )^2 \beta E_{\frac{2}{3}}\left[T\right]\right)}{2 (1+\alpha (-3+2 \alpha )) \beta ^2 \eta }\right.\\
\left.-\frac{1}{6 (1+\alpha (-3+2 \alpha )) \beta ^5
\eta ^2}e^{-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} (t-t_0)^2 (-1+\alpha )^3\right.\\
\left.\left(\beta ^2 \eta \left(\frac{e^{\frac{(t-t_0)^3
(-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} (t-t_0) \left(-4 (-1+\alpha )^2
-6 (-1+\alpha ) \beta +9 (-1+2 \alpha ) \beta ^2\right)}{(-1+2
\alpha ) \beta }-\right.\right.\right.\\
\left.\left.\left.12 C_2 (-1+\alpha ) \eta +\frac{(t-t_0)^4 (-1+\alpha )^2 E_{-\frac{1}{3}}\left[T\right]}{(-1+2 \alpha ) \beta \eta }+9 (t-t_0) \beta E_{\frac{2}{3}}\left[T\right]\right)-\right.\right.\\
\left.\left.\frac{(t-t_0) \left(-2 C_2 (t-t_0)^2 (-1+\alpha )^3 \eta +
e^{\frac{(t-t_0)^3
(-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} \beta \left(-4 (-1+\alpha )^2-6 (-1+\alpha ) \beta +9 (-1+2 \alpha ) \beta ^2\right) \eta +(t-t_0)^3
(-1+\alpha )^2 \beta E_{\frac{2}{3}}\left[T\right]\right)}{-1+2
\alpha }\right)+\right.\\
\left.\left(1+e^{-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }}\times\right.\right.\\
\left.\left.\frac{ \left(-2 C_2 (t-t_0)^2 (-1+\alpha
)^3 \eta +e^{\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} \beta \left(-4 (-1+\alpha )^2-6 (-1+\alpha ) \beta +9 (-1+2
\alpha ) \beta ^2\right) \eta +(t-t_0)^3 (-1+\alpha )^2 \beta E_{\frac{2}{3}}\left[T\right]\right)}{2 (1+\alpha (-3+2 \alpha )) \beta ^2 \eta }\right)^2\right)\\
\end{array}\label{appr}
\end{equation}
and
\begin{figure}
\centering
\includegraphics[width=20pc]{appendix3.eps}\\
\caption{Statefinder trajectories based on Eqs. (\ref{appr}) and (\ref{apps}).}\label{figappstate}
\end{figure}
\begin{equation}
\begin{array}{c}
s=\left(2 e^{\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }}(1+\alpha (-3+2 \alpha )) \beta ^2 \eta \left(-1+e^{-\frac{(t-t_0)^3
(-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }}\times\right.\right.\\
\left.\left. \frac{ \left(-2 C_2 (t-t_0)^2 (-1+\alpha )^3 \eta +e^{\frac{(t-t_0)^3 (-1+\alpha )^2}{9
(-1+2 \alpha ) \beta ^2 \eta }} \beta \left(-4 (-1+\alpha )^2-6 (-1+\alpha ) \beta +9 (-1+2 \alpha ) \beta ^2\right) \eta +(t-t_0)^3 (-1+\alpha
)^2 \beta E_{\frac{2}{3}}\left[T\right]\right)}{2 (1+\alpha
(-3+2 \alpha )) \beta ^2 \eta }\right.\right.\\
\left.\left.-\frac{e^{-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha
) \beta ^2 \eta }}}{6 (1+\alpha (-3+2 \alpha )) \beta ^5 \eta ^2} (t-t_0)^2 (-1+\alpha )^3\times \right.\right.\\
\left.\left.\left(\beta ^2 \eta \left(\frac{e^{\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta
^2 \eta }} (t-t_0) \left(-4 (-1+\alpha )^2-6 (-1+\alpha ) \beta +9 (-1+2 \alpha ) \beta ^2\right)}{(-1+2 \alpha ) \beta }-\right.\right.\right.\right.\\
\left.\left.\left.\left.12 C_2 (-1+\alpha
) \eta +\frac{(t-t_0)^4 (-1+\alpha )^2 E_{-\frac{1}{3}}\left[T\right]}{(-1+2 \alpha ) \beta \eta }+9 (t-t_0) \beta E_{\frac{2}{3}}\left[T\right]\right)-\right.\right.\right.\\
\left.\left.\left.\frac{(t-t_0) \left(-2 C_2 (t-t_0)^2 (-1+\alpha )^3 \eta +e^{\frac{(t-t_0)^3
(-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} \beta \left(-4 (-1+\alpha )^2-6 (-1+\alpha ) \beta +9 (-1+2 \alpha ) \beta ^2\right) \eta +(t-t_0)^3
(-1+\alpha )^2 \beta E_{\frac{2}{3}}\left[T\right]\right)}{-1+2
\alpha }\right)+\right.\right.\\
\left.\left.\left(1+e^{-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }}\times\right.\right.\right.\\
\left.\left.\left.\frac{ \left(-2 C_2 (t-t_0)^2 (-1+\alpha
)^3 \eta +e^{\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} \beta \left(-4 (-1+\alpha )^2-6 (-1+\alpha ) \beta +9 (-1+2
\alpha ) \beta ^2\right) \eta +(t-t_0)^3 (-1+\alpha )^2 \beta E_{\frac{2}{3}}\left[T\right]\right)}{2 (1+\alpha (-3+2 \alpha )) \beta ^2 \eta }\right)^2\right)\right)/\\
\left(3 \left(-2 C_2 (t-t_0)^2
(-1+\alpha )^3 \eta +\right.\right.\\
\left.\left.e^{\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} \beta \left(-4 (-1+\alpha )^2-6 (-1+\alpha ) \beta
+9 (-1+2 \alpha ) \beta ^2\right) \eta +(t-t_0)^3 (-1+\alpha )^2 \beta E_{\frac{2}{3}}\left[T\right]\right)\right)
\end{array}\label{apps}
\end{equation}
In Fig. \ref{figappstate} we have plotted the statefinder trajectories for the model with scale factor $a(t)=(t-t_0)^{\frac{\beta}{1-\alpha}}$. It is observed that the fixed $\Lambda$CDM point $\{r=1,s=0\}$ is not attained by the trajectories. However, for finite $r$, we observe $s\rightarrow -\infty$, that corresponds to the dust phase of the universe.
\section{Generalized second law of thermodynamics}
Discovery of black hole thermodynamics in 70's \cite{bek1,bek2,bek3} prompted physicists to study the thermodynamics of cosmological models of the universe. Semi classical description in black hole physics shows that a black hole behaves like a black body that is emitting thermal radiation with temperature and entropy. This temperature and the entropy are known as Hawking temperature and Bekenstein entropy respectively \cite{sir1,gs1,gs2}. This entropy is proportional to surface area $A$ of black hole, which, according to Hawking’s area theorem cannot decrease. Based on the conjectured proportionality between entropy and horizon area of black hole, a generalized version of the second law of thermodynamics was proposed by Bekenstein. According to the proposal of Bekenstein the sum of black hole entropy and the entropy of matter and radiation in the region exterior to black hole can not decrease. The GSL provides a relation between gravitation, thermodynamics and quantum theory. In a very recent work \cite{busso} conjectured a novel GSL that can be applied in cosmology irrespective of the presence of event horizon.
Ref. \cite{setare2} examined the validity of the generalized GSL in a non-flat universe in the presence of viscous dark energy. Setare \cite{setarethermo} investigated the validity of the generalized second law of thermodynamics for the quintom model of dark energy. Considering the universe as a closed bounded system filled with $n$ component fluids Bamba et al. \cite{thermobamba} studied the generalized second law in $f(T)$ cosmology. Ref \cite{thermoherera} investigated the validity of the generalized second law in the context of interacting $f(R)$ gravity. We consider the universe
To check the generalized second law of thermodynamics, we have to examine the evolution of the
total entropy $S_A+S_{DE}$, where $S_A$ denotes the entropy of the apparent horizon and $S_{DE}$ denotes the entropy of the fluid inside the horizon. For the FRW universe the apparent horizon radius reads \cite{setare2}
\begin{equation}\label{rAk}
\tilde{r}_A=\frac{1}{\sqrt{H^2+\frac{k}{a^2}}}
\end{equation}
In a flat universe $k=0$ and Eq.(\ref{rAk}) becomes
\begin{equation}\label{rA}
\tilde{r}_A=\frac{1}{H}
\end{equation}
Temperature on the apparent horizon is defined as \cite{setare2}
\begin{equation}
T_A=\frac{1}{2\pi \tilde{r}_A}\left(1-\frac{\dot{\tilde{r}}_A}{2H\tilde{r}_A}\right)
\end{equation}
The entropy associated to the apparent horizon is \cite{setare2}
\begin{equation}
S_A=\frac{A}{4G}=\frac{\pi\tilde{ r}_A^2}{G}
\end{equation}
where where $A=4\pi \tilde{r}_A^2$ is the area of the apparent horizon. It has been shown by some calculations in \cite{setare2} that for viscous dark energy dominated flat universe enveloped by the apparent horizon
\begin{equation}
T_A\dot{S}_A=4\pi H \tilde{r}_A^3 \left(\rho_{DE}(1+w_{DE})-3H\xi\right)\left(1-\frac{\dot{\tilde{r}}_A}{2H\tilde{r}_A}\right)
\end{equation}
In the present case the above can be rewritten as
\begin{equation}\label{TASA}
T_A\dot{S}_A=4\pi H \tilde{r}_A^3 \left(\rho_{DE}(1+w_{DE})+\tau \dot{\Pi}+\Pi\right)\left(1-\frac{\dot{\tilde{r}}_A}{2H\tilde{r}_A}\right)
\end{equation}
The entropy of the viscous dark energy inside the apparent horizon, $S_{DE}$, can be related to its energy $E_D=\rho_D V$ and its pressure as
\begin{equation}\label{TDSD}
T_D\dot{S}_D=V\dot{\rho}_{DE}+(\rho_{DE}(1+w_{DE})-3H\xi)\dot{V}=V\dot{\rho}_{DE}+(\rho_{DE}(1+w_{DE})+\tau \dot{\Pi}+\Pi)\dot{V}
\end{equation}
where $T_{DE}$ and is the temperature of the viscous dark energy and $V=\frac{4}{3}\pi \tilde{r}_A^3$ is the volume enveloped
by the apparent horizon. Under the assumption that the thermal system bounded by the apparent horizon remains in equilibrium i.e. temperature of the system is uniform and the temperature on the horizon is equal to temperature of the fluid inside the horizon we have $T_A=T_{DE}=T$. It has been shown in \cite{setare2} by some simple calculation that
\begin{equation}\label{Sdottotal}
T\left(\dot{S}_{A}+\dot{S}_{DE}\right)=\frac{A}{2}\left(\rho_{DE}(1+w_{DE})+\tau \dot{\Pi}+\Pi\right)\dot{\tilde{r}}_A
\end{equation}
\begin{figure}[h]
\includegraphics[width=25pc]{thermo.eps}
\caption{\label{figGSL}Plot of time evolution of total entropy $(\dot{S}_A+\dot{S}_{DE})$ based on Eq.(\ref{TSdottotal}). The $\{\alpha,\beta\}$ combination is taken as $\{0.9735,0.3701\}$ and $\eta$ ranges from 0.0002 to 0.0005.}
\end{figure}
Using Eqs.(\ref{RDreconst}),(\ref{EoS}) and (\ref{Pisolve}) in Eq.(\ref{Sdottotal}) we get
\begin{equation}
\begin{array}{c}\label{TSdottotal}
\dot{S}_A+\dot{S}_{DE}=
\frac{2 \pi}{H_0 \beta ^3} (-1+\alpha ) (H_0 (t-t_0) (-1+\alpha )+\beta ) \left(\frac{\beta }{G}-\frac{8 \pi}{\alpha
-2 \beta-1 }\times\right.\\
\left. \left(-2 \beta ^2+\frac{1}{H_0^2}(H_0 (t-t_0) (-1+\alpha )+\beta )^2 \left(C_1 e^{-\chi }-\frac{e^{-\chi
} H_0^3 \beta ^3 \left(9 e^{\chi }-3^{2/3} (-\chi )^{2/3} \Gamma\left[\frac{1}{3},-\chi \right]\right)}{2 (H_0 t_0 (-1+\alpha
)-\beta ) (H_0 (-1+t t_0) (-1+\alpha )-t \beta )^2}+e^{-\chi } \beta ^2 \eta \times \right.\right.\right.\\
\left.\left.\left.\frac{
\left(-\frac{2 C_1 (H_0 (-1+t t_0)
(-1+\alpha )-t \beta )^2}{\beta ^2 \eta }-\frac{6 3^{2/3} H_0^3 \beta \Gamma\left[\frac{1}{3},-\chi \right]}{(H_0 t_0 (-1+\alpha
)-\beta ) \eta (-\chi )^{1/3}}+\frac{6 H_0^5 \beta ^3 \left(9 e^{\chi }-3^{2/3} (-\chi )^{2/3} \Gamma\left[\frac{1}{3},-\chi \right]\right)}{(H_0
(-1+t t_0) (-1+\alpha )-t \beta )^3}+\frac{H_0^3 \beta \left(9 e^{\chi }-3^{2/3} (-\chi )^{2/3} \Gamma\left[\frac{1}{3},-\chi
\right]\right)}{(H_0 t_0 (-1+\alpha )-\beta ) \eta }\right)}{2 (H_0 (t-t_0) (-1+\alpha )+\beta )^2}+\right.\right.\right.\\
\left.\left.\left.\frac{H_0^2 \left(2
\beta (\alpha-1) -\frac{e^{-\chi } (H_0 (t-t_0) (-1+\alpha )+\beta )^2 \left(-9 e^{\chi } H_0^3 \beta ^3+2 C_1 (H_0
t_0 (-1+\alpha )-\beta ) (H_0 (-1+t t_0) (-1+\alpha )-t \beta )^2+3^{2/3} H_0^3 \beta ^3 (-\chi )^{2/3} \Gamma\left[\frac{1}{3},-\chi
\right]\right)}{2 H_0^2 (H_0 t_0 (-1+\alpha )-\beta ) (H_0 (-1+t t_0) (-1+\alpha )-t \beta )^2}\right)}{(H_0
(t-t_0) (-1+\alpha )+\beta )^2}\right)\right)\right)
\end{array}
\end{equation}
where $\chi=\frac{(H_0 (-1+t t_0) (-1+\alpha )-t \beta )^3}{9 H_0^2 (H_0 t_0 (-1+\alpha )-\beta ) \beta ^2 \eta
}$. In Fig.\ref{figGSL} we have plotted $T(\dot{S}_A+\dot{S}_{DE})$ based on Eq. (\ref{TSdottotal}) with cosmic time $t$ and $\eta$ ranging from 0.0002 to 0.0005. We have observed that $T(\dot{S}_A+\dot{S}_{DE})$ is staying at positive level. Since $T>0$, Fig. \ref{figGSL} indicates that $\dot{S}_A+\dot{S}_{DE}\geq 0$. This indicates validity of the generalized second law of thermodynamics in an universe dominated by viscous EHRDE.
\begin{figure}[h]
\includegraphics[width=25pc]{appendixthermo.eps}
\caption{\label{figappGSL}Plot of time evolution of total entropy $(\dot{S}_A+\dot{S}_{DE})$ based on Eq.(\ref{TSdottotal}) for $a(t)=(t-t_0)^{\frac{\beta}{1-\alpha}}$. The $\{\alpha,\beta\}$ combinations is taken as $\{0.9180,0.3701\}$ and $\eta$ ranges from 0.00009 to 0.00015.}
\end{figure}
Using Eqs.(\ref{appdark}),(\ref{appPai}) and (\ref{wapp}) in Eq.(\ref{Sdottotal}) we get the time evolution of the total entropy for the case $a(t)=(t-t_0)^{\frac{\beta}{1-\alpha}}$ as
\begin{equation}
\begin{array}{c}
\dot{S}_A+\dot{S}_{DE}=
\frac{1}{\beta ^2 (-1+\alpha +2 \beta )} 8 \pi ^2 (t-t_0) (-1+\alpha )^2 \\
\left(2+(-t+t_0) (-1+\alpha )-2 \alpha -\frac{C_2 e^{-\frac{(t-t_0)^3 (-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} (t-t_0)^2
(-1+\alpha )^2}{\beta }-3 \beta +3 (-1+2 \alpha ) \beta +\right.\\
\left.\frac{9 (-1+2 \alpha ) \beta ^2}{2 (-1+\alpha )}+(-1+\alpha ) \left(\frac{3 (-1+2 \alpha ) \beta ^2 \eta }{(t-\text{t0})^2 (-1+\alpha )^2}\right) +\frac{e^{-\frac{(t-t_0)^3
(-1+\alpha )^2}{9 (-1+2 \alpha ) \beta ^2 \eta }} (t-t_0)^3 (-1+\alpha ) E_{\frac{2}{3}}\left[T\right]}{2 \eta }\right)
\end{array}
\end{equation}
Fig. \ref{figappGSL} shows that like the previous case $\dot{S_{total}}=\dot{S}_A+\dot{S}_{DE}>0$ and hence the GSL of thermodynamics is validated in an universe dominated by viscous EHRDE and expanding according to $a(t)=(t-t_0)^{\frac{\beta}{1-\alpha}}$. However, contrary to Fig. \ref{figGSL}, the time derivative of total entropy is increasing with evolution of the universe.
\section{Conclusions}
Motivated by \cite{vcg} and \cite{feng} we have presented a study on viscous extended holographic Ricci dark energy (EHRDE) in flat FRW universe based on Israel-Stewart approach. The work has been carried out in two phases. In one phase instead of choosing any specific form of scale factor we have reconstructed Hubble parameter $H$ based on the field equation (Eq. \ref{f1}) with $\rho=\rho_{DE}=3 M_p^2\left(\alpha H^2+\beta \dot{H}\right)$ and subsequently solving the truncated Israel-Stewart theory given by $\tau \dot{\Pi}+\Pi=-3H\xi$ for $\Pi$ we studied the behaviour of EoS parameter $w_{DE}$, bulk viscous pressure $\Pi$, statefinder parameters and the thermodynamic consequences in terms of generalized second law (GSL) of thermodynamics. In this phase of study we have observed the following:
Under the consideration that the universe is dominated by EHRDE we have taken evolution equation for the bulk viscous pressure $\Pi$ in the framework of the truncated Israel-Stewart theory as $\tau \dot{\Pi}+\Pi=-3\xi H$, where $\tau$ is the relaxation time and $\xi$ is the bulk viscosity coefficient. Considering effective pressure as a sum of thermodynamic pressure of EHRDE and bulk viscous pressure we have observed that under the influence of bulk viscosity the EoS parameter $w_{DE}$ is behaving like phantom i.e. $w_{DE}\leq -1$ (see Fig.\ref{figEoS}). Furthermore, it has been observed that the effect of bulk viscosity is not blowing up in the very late stage or very early stage of the universe. This observation is consistent with \cite{feng}. Some constraints have been derived for the model parameters $\alpha$ and $\beta$ and other constants. Obeying the observational studies that show that for EHRDE $\alpha=0.8502^{+0.0984+0.1299}_{-0.0875-0.1064}$ and $\beta=0.4817^{+0.0842+0.1176}_{-0.0773-0.0955}$ we have taken $\alpha=0.9735, ~\beta=0.3701$. It has been already mentioned that like \cite{vis2} to obtain solution with big-rip no restriction is imposed on $\nu$. Fig. \ref{figEoS} shows that the $w_{DE}$ is decaying with evolution of the universe. It is observable that along with $\rho+p<0$ we also have $\rho+3p<0$ and with passage of time. Also, with passage of cosmic time $-(\rho+3p)$ increases, and so all gravitationally bound systems will be dissociated \cite{phantom} and the universe will end up in Big Rip. We have observed that the magnitude of the effective pressure $p_{eff}=p+\Pi$ is decaying with time (see Fig.\ref{figpeff}). Moreover, the non-negative derivative of $\Pi$ (see Fig.\ref{figpidot}) has indicated that the effect of bulk viscosity is increasing with time. The bulk viscosity coefficient $\xi$ has been found to be a increasing function of time (see Fig.\ref{figxi}). The statefinder parameters $\{r,s\}$ have also been studied. It has been observed that under the effect of bulk viscosity the statefinder trajectory $\{r-s\}$ for EHRDE is capable of reaching the $\Lambda$CDM point i.e. $\{r=1,s=0\}$. We have further observed that for finite $r$, the $s\rightarrow -\infty$, which corresponds to dust phase. This shows that the viscous EHRDE interpolates between dust and $\Lambda$CDM phases of the universe (see Fig.\ref{figrs}). Finally we have studied the thermodynamics of the viscous EHRDE under the assumption that the universe is enveloped by apparent horizon. We have derived the expression of the time derivative of the total entropy and we have observed that (see Fig.\ref{figGSL}) the time derivative is positive throughout the evolution of the universe. This shows that the generalized second law of thermodynamics is valid for the viscous EHRDE.
In the next phase of the study we have chosen the scale factor as $a(t)=(t-t_0)^{\frac{\beta}{1-\alpha}}$ and subsequently studied the cosmological parameters similar to that in the previous phase. The effective pressure and time derivative of bulk viscous pressure $\Pi$ appear to be of similar pattern to that in the earlier phase. However, the significant difference is observed in the case of EoS parameter $w_{DE}$ (see Fig. \ref{figapp}) and the statefinder trajectories $\{r-s\}$ (see Fig. \ref{figappstate}). The EoS parameter $w_{DE}$ is found to cross the phantom barrier i.e. transiting from quintessence $(w_{DE}>-1)$ to phantom $(w_{DE}<-1)$.Thus, the model is found to behave like ``quintom" for the said form of scale factor. In the statefinder trajectory, unlike the orevious case, the $\Lambda$CDM fixed point is not attainable and the model is deviated significantly from $\Lambda$CDM. However, the dust phase is attainable like the previous case. Like the previous case the GSL is found to be valid i.e. time derivative of the total entropy stays in the non-negative level. However, contrary to what happened in the previous case, the time derivative of the total entropy is increasing with evolution of the universe.
\section{Acknowledgement}
Financial support from DST, Govt of India under project grant no. SR/FTP/PS-167/2011 is thankfully acknowledged. The author sincerely thanks the reviewers for constructive suggestions. Warm hospitality provided by the Inter-University Centre for Astronomy and Astrophysics (IUCCA), Pune, India during a scientific visit in May 2016 is duly acknowledged by the author.
\\
\section{Statement on conflict of interest}
The author declares that there is no conflict of interest regarding the publication of this article.
|
\section{Preface}
These notes are broken down into two main parts. The first gives a general introduction to Fixed-Field Alternating-Gradient (FFAG) accelerators (often referred to simply as FFAGs) including an overview of the basic transverse dynamics of both the so-called `scaling' and the `non-scaling' variety, and a brief comparison with other machines. In the second part, I discuss the motivations for considering FFAGs for medical applications, focusing on charged-particle therapy (hadron therapy). I then introduce a number of FFAG designs specifically aimed at medical applications, including developments of FFAG gantries for medical use.
The FFAG accelerator is a class of circular accelerator that combines properties of both the cyclotron and the synchrotron. It uses a magnetic field which is constant in time, hence the `fixed-field', together with an increased focusing strength achieved using the `alternating-gradient' principle~\cite{bib:courantsnyder}. The RF acceleration scheme is usually variable-frequency, but in some specific instances a fixed-frequency system is possible.
Many accelerator physicists have difficulty when first encountering FFAGs, as they may have learned about only one example of an FFAG machine and therefore approach the topic with some preconceptions. Many questions arise, such as `aren't the magnets very large?', `have any of them actually been built?', and `isn't the FFAG only good for large muon beams?' The difficulty with these questions is that the modern FFAG is not really a single type of machine. This would be like assuming that a synchrotron can only be a light source, rather than a hadron collider or a medical accelerator. For the record, the answers to the questions are `sometimes', `yes', and `not only'. Of course, for synchrotrons it is easy to see that the application can change the layout, design, and properties of an accelerator. This is perhaps even more true in the case of the FFAG.
Starting with the idea that FFAGs are just accelerators which have both a fixed field and alternating-gradient focusing produces a large spectrum of designs. Some designs may have purely linear (quadrupole) magnets and fixed-frequency RF acceleration, whereas others have large-aperture magnets which produce a complex variation of the field with radius and a variable-frequency RF system. Most FFAGs have a very large dynamic aperture. This flexibility of FFAG design has only emerged in roughly the last 15 years and the field continues to be a rich source of novel developments.
From these lecture notes you should be able to answer questions like those above, and describe the various types of FFAG accelerators and some of the design principles behind them. I hope you will also learn of the potential and some of the challenges in utilizing these machines in medical applications.
\section{Fixed-field alternating-gradient accelerators}
\subsection{A historical perspective}
The concept of an FFAG accelerator is not new. This type of accelerator was invented in the 1950s and 1960s at the same time as the synchrotron was being developed. Much of the early work in developing FFAGs was carried out at the Midwestern Universities Research Association (MURA), but only electron FFAG accelerators were constructed at the time~\cite{bib:jones09}. It is interesting also to note that in Soviet terminology the FFAG is known as a `ring phasotron'~\cite{bib:kolomensky}. It was not until the 1990s that interest in this type of accelerator re-emerged in Japan, with a particular focus on what such machines could offer as hadron accelerators. For a little more on the history, see Ref.~\cite{bib:machida2012} and the references therein.
A particular area of recent interest in the field of FFAGs is their potential for high-intensity operation, because of their high repetition rate, large acceptance, simpler and cheaper power supplies, and flexibility of the RF acceleration system. High intensity may be required for some medical applications (such as radioisotope production), but for hadron therapy the beam currents are typically low. For this reason, we shall not discuss high intensities here but instead focus on the advantages in terms of high repetition rate, flexibility, and simple magnet power supplies. The impact of these qualities will be discussed in Section~\ref{section4}.
\subsection{The original or `scaling' FFAG}
In 1943 Marcus Oliphant described the idea of the synchrotron as follows:
\begin{quotation}
Particles should be constrained to move in a circle of constant radius thus enabling the use of an annular ring of magnetic field \ldots which would be varied in such a way that the radius of curvature remains constant as the particles gain energy through successive accelerations.
\end{quotation}
He intended that the magnetic field should be varied temporally and the beam should always follow the same annulus~\cite{bib:oliphant}. However, in principle there is no reason why the annulus may not change radius and the field vary spatially rather than temporally. This is the fundamental idea behind the FFAG. A large variation of the field with radius will constrain the change in radius of the orbits; this can lead to a larger field increase with radius and more compact orbits than in a cyclotron. This is the original type of FFAG, which we now call `scaling'.
To introduce the scaling FFAG, it is useful to review the four main different types of circular accelerator, which we can classify by the magnetic field they use to guide the particles~\cite{bib:kolomensky}. These are the following.
\begin{enumerate}
\item{Fixed-field constant-gradient accelerators, including conventional cyclotrons, synchrocyclotrons, and microtrons.}
\item{Pulsed-field constant-gradient accelerators, which includes weak-focusing synchrotrons and betatrons.}
\item{Pulsed-field alternating-gradient accelerators, which are the well-known AG synchrotrons.}
\item{Fixed-field alternating-gradient accelerator, otherwise known as FFAGs.}
\end{enumerate}
The fourth variety, FFAG accelerators, were proposed independently in the early 1950s by Ohkawa in Japan~\cite{bib:ohkawa}, Symon \emph{et al.} in the United States~\cite{bib:symonkerst}, and Kolomensky in Russia~\cite{bib:kolomensky57}. Symon \emph{et al.} proposed:
\begin{quotation}
A type of circular accelerator with magnetic guide fields which are constant in time, and which can accommodate stable orbits at all energies from injection to output energy.
\end{quotation}
This relies on introducing sectors with a reversed magnetic field into a cyclotron-like machine, producing strong focusing throughout the energy range. The field may rise rapidly with radius such that the orbits are relatively compact over a large energy range. It is possible to accelerate both light particles (electrons) and heavier particles (hadrons) to relativistic energies with this method. The time-independent magnetic field means that the repetition rate can be much higher than in a pulsed-field alternating-gradient machine (i.e., synchrotron), as the RF modulation can be on a much shorter time-scale than the modulation of a magnetic field. The consequences of this for medical applications will be discussed later.
The field is arranged in such a way that the increase in gradient with momentum results in the beam experiencing the same focusing independent of radius. This means that the betatron tunes are constant for all orbits. This constant focusing (or constant betatron tune) is ensured if two conditions are met. First, the field index $k$ must be constant, where we can define $k$ in terms of the bending radius $\rho$, the vertical magnetic field $B_{y}$, and its derivative in the horizontal direction $x$:
\begin{equation}
k= -\frac{\rho}{B_{y}}\frac{\partial B_{y}}{\partial x} .
\label{eqn:kvalue}
\end{equation}
Therefore we require
\begin{equation}
\frac{\partial k}{\partial p}\bigg|_{\theta = \mathrm{const.}} = 0 .
\label{eqn:cardinal1}
\end{equation}
The second requirement is that the shape of the particle orbits remains constant as the size of the orbits `scales' with energy, such that each higher-energy orbit is a geometrically similar enlargement of the lower-energy orbits as described by the following equation, derived by Kolomensky~\cite{bib:kolomensky}:
\begin{equation}
\frac{\partial}{\partial p}\left(\frac{\rho_{0}}{\rho}\right)\bigg|_{\theta = \mathrm{const.}} = 0.
\label{eqn:cardinal2}
\end{equation}
If the field meets these two conditions, the FFAG is referred to as being of the `scaling' variety.
To satisfy these requirements, we use a magnetic field that increases with radius. The particular shape of the field is given by the $r^{k}$ law of the following equation, which describes the increase in field with radius $r$ with respect to a reference radius $r_{0}$, where the field increase is characterized by the field index, $k$:
\begin{equation}
B_{y} = B_{0} \left (\frac{r}{r_{0}} \right)^{k} .
\label{eqn:scalinglaw}
\end{equation}
The field is shown in Fig.~\ref{fig:scalinglaw}. It should be clear that for a given value of the field index $k$, the field at a smaller radius not is only lower but also has a lower gradient. As the momentum increases and particles move to higher radius, the value of the confining field increases along with the field gradient. Of course, this is the field for only one of the two alternating-gradient types, the `F' or focusing type. The field for the `D' (defocusing) type has the opposite sign, as expected.
\begin{figure}[h!]
\centering\includegraphics[width=.5\linewidth]{Figs/scalinglaw}
\caption{An example of the characteristic scaling law for different values of the field index $k$, with $r_{0}=10$~m and $B_{0}=1.0$~T.}
\label{fig:scalinglaw}
\end{figure}
\begin{figure}[h!]
\centering\includegraphics[width=.5\linewidth]{Figs/scalingffag}
\caption{Radial-sector FFAG layout with reverse bend}
\label{fig:scalingffag}
\end{figure}
The fact that the different sectors in the scaling FFAG have reverse-polarity magnetic fields means that the length of the orbit and the mean radius of the machine are necessarily larger than if there were no reverse fields, as shown in Fig.~\ref{fig:scalingffag}. This is necessary to ensure stability in both planes and is the main disadvantage of the scaling FFAG. This can be partly or fully overcome, however, as the maximum magnetic-field value can be higher than that in a synchrotron with a time-varying field, which can help to constrain the machine size. In addition, there are no separate-function magnets, so provided sufficient space is left for injection, extraction, accelerating cavities, vacuum ports, and so forth, the machine may be made compact as the main magnets perform all the required functions simultaneously. The FFAG layout in Fig.~\ref{fig:scalingffag} is called a `radial-sector' layout as the faces of the magnets lie along radial lines from the machine centre.
\begin{figure}[h!]
\centering\includegraphics[width=.5\linewidth]{Figs/spiralffag}
\caption{Spiral FFAG layout, removing the need for reverse bends}
\label{fig:spiralffag}
\end{figure}
There is in fact a second type of FFAG which does away with the need for the reverse-polarity field, known as the `spiral' FFAG. This is formed from a succession of hills and valleys of field distributed in the azimuthal direction, where the magnets have a spiral angle with respect to the beam as shown in Fig.~\ref{fig:spiralffag}. In this case the beam does not enter the magnet exactly perpendicular to the face of the magnet, and thus edge focusing results. This removes the need for the opposing reverse bending magnet, while maintaining strong focusing. In the spiral FFAG, the focusing can also be made independent of momentum.
The field in a spiral FFAG in general has the form
\begin{equation}
B(r,\theta) = B_{0} \left( \frac{r}{r_{0}} \right)^{k} F(\vartheta) ,
\label{eqn:scalinglaw2}
\end{equation}
where we call $\vartheta$ a generalized angle. This is related to the usual azimuth by
\begin{equation}
\vartheta = \theta - \tan\zeta \ln\frac{r}{r_{0}}.
\end{equation}
The value of $\zeta$ is the angle between the field spiral and the radial direction, and $\tan\zeta$ is constant. As before, $B_{0}$ and $r_{0}$ are constants. The function $F(\vartheta)$ is an arbitrary periodic function with period $\vartheta_{0}=2\pi/N$, and $N$ is the number of periods. In the radial-sector scaling FFAG that we discussed earlier, all the orbits enlarge and remain geometrically similar, but in the spiral FFAG they also turn about the centre. This can be seen in an example spiral FFAG design for the RACCAM project in Section~\ref{section4}.
In terms of beam dynamics, it is useful to compare the scaling FFAG with a synchrotron. Modern synchrotrons employ the principle of alternating-gradient or `strong' focusing~\cite{bib:courantlivingston52,bib:courantsnyder58}, in which alternating focusing and defocusing magnets lead to much stronger focusing forces in the transverse plane than in constant-gradient weak-focusing synchrotrons. This alternating-gradient focusing is also employed in the FFAG. The transverse beam dynamics in the FFAG is therefore much the same as in the synchrotron, at least for a single orbit or energy, in the sense that we may discuss beta functions, dispersion, and so forth. The difference is that in this case the field is highly nonlinear and these transverse optics functions may vary with radius.
\section{The non-scaling FFAG}
The non-scaling FFAG allows the strict scaling laws applied in the original scaling FFAG to be relaxed. The idea of violating the strict scaling law of the FFAG occurred to Kent Terwilliger and Lawrence W. Jones in the 1950s~\cite{bib:jones91}, but such a machine was never pursued. Two of the main disadvantages of the original FFAG are the highly nonlinear magnetic field required and the large aperture of the magnets and RF arising from the shift of the orbit with energy, which can be up to the order of 0.5--1.0~m. The non-scaling FFAG arose from the question ``what if we violate the scaling law?'' Or, more specifically, ``What if we take a line tangent to the scaling law in Fig.~\ref{fig:scalinglaw}, such that the field is linear with radius?'' This radical idea led to the linear non-scaling FFAG and was proposed in the 1990s~\cite{bib:johnstone99}.
\subsection{Linear non-scaling FFAG}
The linear non-scaling FFAG is so called because it uses only up to linear focusing elements, that is, quadrupole and dipole fields. When only quadrupoles and no higher-order multipoles are used for focusing, the beam shifts outward with acceleration because of dispersion and sees a reduced level of focusing. This is really like considering a synchrotron where we do not ramp the magnets with time. In the scaling FFAG, we got around this by varying the gradient with the momentum and by making the beam pipe wider to allow for the orbits moving. But in the linear non-scaling FFAG we ignore the scaling law and any focusing issues for now, which allows us to increase the gradient and reduce the dispersion function even further to reduce the shift of the orbit with momentum. To achieve this, a linear non-scaling FFAG lattice may use normal bending with a defocusing `D' quadrupole and reverse bending with a focusing `F' quadrupole, and may (or may not, depending on the design) change at high momentum to use the `D' quadrupole for reverse bending and the `F' for normal bending, as described in Ref.~\cite{bib:machida2012}.
One must then ask what happens to the beam dynamics in such an accelerator. One consequence is that the orbits no longer `scale', so they are no longer geometrically similar at different energies. The orbits can be made much more compact than in the scaling FFAG. However, the most dramatic difference is that the betatron tunes are no longer constant with energy. This may seem surprising if you have worked on (almost) any other type of accelerator, as the betatron tunes are usually designed to be kept constant. In the linear non-scaling FFAG, they vary dramatically throughout the acceleration cycle, crossing not just high-order betatron resonances but also integer resonances.
In theory, if the acceleration is fast enough, the beam may be able to cross betatron resonances before they have time to build up, and therefore any amplitude growth effects may be mitigated. How fast this crossing needs to be depends on imperfections and alignment errors in the machine, and clearly necessitates a fast acceleration rate. In fact, the linear non-scaling FFAG was proposed in the context of muon acceleration, where very fast acceleration before the muons decay is an absolute requirement. The many questions surrounding the dynamics of such a machine led to the construction of the first non-scaling FFAG accelerator, known as EMMA.
\subsection{The EMMA non-scaling FFAG}
EMMA is the Electron Machine for Many Applications, a 10--20~MeV electron accelerator constructed at Daresbury Laboratory to demonstrate the technology of the linear non-scaling FFAG accelerator. The accelerator is shown in Fig.~\ref{fig:emmaring}, and measures just over 5~m in diameter. Despite the name, EMMA is in fact a demonstrator machine; the primary purpose of its commissioning in 2010--2011 was to investigate some of the key dynamics issues and technical issues involved in realizing the technology. This being demonstrated, it aimed to show that the non-scaling FFAG was a viable technology for use in `many applications' ranging from medical use and muon acceleration to high-power proton accelerators.
\begin{figure}[h!]
\centering\includegraphics[width=.5\linewidth]{Figs/emmaring}
\caption{The EMMA non-scaling FFAG at the STFC Daresbury Laboratory, UK}
\label{fig:emmaring}
\end{figure}
A few key points of interest, of relevance to medical accelerators, were learned from the EMMA experiment.\footnote{EMMA also demonstrated a number of other interesting accelerator physics concepts, including a novel acceleration mechanism known as `serpentine acceleration'.} Most importantly, EMMA demonstrated the successful operation of a linear non-scaling FFAG, bringing this technology into reality. Next, EMMA demonstrated that fast crossing of integer betatron resonances is possible if the beam is accelerated quickly enough. However, EMMA accelerates in just 10 turns from injection to extraction and it is not practicable to accelerate a hadron beam so quickly over the energies required for medical use. We shall return to this point in our discussion of hadron FFAG design studies. More information about EMMA can be found in Refs.~\cite{bib:emmanature, bib:barlow10}.
\section{FFAGs for hadron therapy}
\label{section4}
In this section we turn to addressing the specific idea of FFAG accelerators for medical applications, in particular hadron therapy. State-of-the-art hadron therapy (proton and light-ion therapy) centres must provide beams for patient treatment with unprecedented precision, flexibility, and reliability within a hospital environment. This can pose challenges for present accelerator technology, in terms of both beam requirements and considerations of machine size and cost. Existing technological options may meet present requirements, but one should ask whether they are the optimal solution for the future of this treatment modality. Can we do better?
In accelerator terms, the beam energies required for therapy are relatively low compared with the multi-TeV energy range required for high-energy physics experiments. Proton energies up to 250~MeV are required for treatment, and up to 330~MeV if online proton radiography is incorporated. For heavier ions, full-body-treatment-energy C$^{6+}$ is equivalent in magnetic rigidity to protons with an energy of around 1.2~GeV. These energies can be achieved with a number of different types of accelerator, including synchrotrons, cyclotrons, and linear accelerators. Because of the limited space available in a clinical environment, a circular accelerator is usually chosen as the main accelerator for a facility.\footnote{However, recent developments such as the `Cyclinac' design are being studied for this application~\cite{bib:amaldi2009}.} There are a number of possible choices of circular accelerator. Most existing or planned facilities use the established technology of either the synchrotron or the cyclotron.
Cyclotrons have a limited energy range, as it is difficult to maintain vertical focusing at high energy and the magnets become increasingly unwieldy as the energy and thus machine size grow. They are also limited by their fixed extraction energy. For hadron therapy, this means in practice that the beam energy must be adjusted between the accelerator and the patient using an energy degrader. Although a cyclotron can deliver ample dose to the patient, the use of energy degraders and passive scattering systems has led to concerns about activation and radiation protection~\cite{bib:pedroni00}. State-of-the-art systems ought to use active scanning systems and active energy variation to deliver the best-quality treatment.
Synchrotrons operate with a pulsed beam; however, most synchrotrons have a slow cycle rate, on the order of 1~Hz. Rapid-cycling synchrotrons have been proposed for this application, with rates up to around 50~Hz. Their main advantage is their flexibility, particularly in terms of energy reach and easy variable-energy extraction. However, the pulsed nature of these machines makes scanning rather slow. This problem has been partly overcome by using a stable slow extraction of the beam, although the energy variability is still limited by the repetition rate of the synchrotron. In addition, synchrotrons are generally much larger than cyclotrons.
This discussion leads us to ask where the FFAG accelerator might enter the picture. With a fixed magnetic field, the repetition or cycle rate can be much higher than in a synchrotron, up to the range of kHz, limited only by the speed of the RF system. With variable-energy extraction, this high repetition rate could enable slice-to-slice energy variation without limiting the dose rate for full 3D conformal irradiation, or even 3D tumour motion tracking during treatment. Such a machine is not limited in energy range by its dynamics like a cyclotron, and so can easily reach the energies required for therapy. If fast extraction can be achieved at any energy, one may even conceive of a machine which operates with different ion species on a pulse-by-pulse basis, using some pulses for imaging and some for treatment while using the same acceleration and beam delivery system. Of course, this requires that the extraction line, beamlines, gantry, diagnostics, and quality assurance are able to handle such flexibility. In essence, the FFAG has the potential to remove some of the limitations of existing technologies and provide a flexible, relatively compact alternative.
\subsection{The KEK 150~MeV FFAG}
The first prototype FFAG for medical applications was a 150~MeV proton accelerator at KEK in Japan. This was one of the first hadron FFAGs ever to be built and is a radial-sector scaling FFAG using a 12-sector DFD triplet lattice structure. The orbits vary from an average radius of 4.47~m at 12~MeV to 5.2~m at 150~MeV at the centre of the F magnet. This machine was as much about proof of technology as it was about suitability for medical applications. A number of key innovations were made which addressed some of the technology challenges of the scaling FFAG, including wide-aperture magnetic-alloy RF cavities for acceleration~\cite{bib:yonemura} and the development of a `return-yoke-free' main magnet triplet, which eased beam injection and extraction by allowing traversal through the side of the main magnets. A very similar machine for studies of accelerator-driven systems is also in operation at Kyoto University Research Reactor Institute, and the original KEK machine is now in use at Kyushu University. The machine is shown in Fig.~\ref{fig:kekring} along with the cyclotron injector and transport line.
\begin{figure}
\centering\includegraphics[width=.5\linewidth]{Figs/kekring}
\caption{The KEK 150~MeV scaling FFAG, Japan}
\label{fig:kekring}
\end{figure}
\subsection{The RACCAM project}
As discussed earlier, one issue with the radial-sector scaling FFAG is that it has a relatively large circumference because of the reverse bends, but the spiral FFAG does not have this issue. The RACCAM project, which ran from 2006 to 2008 in France, was a university and industry collaboration to design and prototype a spiral scaling FFAG for medical applications. It combined some key benefits, including variable-energy fast extraction and multiport extraction to different beamlines. The machine was designed to accelerate beams over a variable energy range from as low as 5.55~MeV to a maximum of 180~MeV with a repetition rate of at least 100~Hz. The design principles of the machine can be found in Ref.~\cite{bib:antoine09} and the layout and orbits for varying energies can be seen in Fig.~\ref{fig:raccam}.
\begin{figure}[h!]
\subfigure[]{\includegraphics[width = .45\linewidth]{Figs/raccamlayout}}
\subfigure[]{\includegraphics[width = .45\linewidth]{Figs/raccam_orbits}}
\caption{(a) Machine layout and (b) orbits in the RACCAM FFAG}
\label{fig:raccam}
\end{figure}
As part of the RACCAM project, a suitable spiral FFAG magnet was designed in iteration with beam dynamics studies, and a prototype magnet was fabricated and measured. Details of the design can be found in Ref.~\cite{bib:planche09}. Along with the machine study and the technical design, a lot of work was undertaken in an attempt to optimize the facility itself. The collaboration carried out a study on how best to utilize multiple treatment rooms taking advantage of a machine with multiple extraction ports~\cite{bib:meot15}.
\subsection{Linear non-scaling FFAG designs}
Around the time the linear non-scaling FFAG concept was invented, a number of designs to apply this concept to hadron therapy arose. One example which was studied in detail was designed by Keil \emph{et al.}~\cite{bib:keil07} and consists of three concentric rings, to produce full-energy protons and carbon ions for hadron therapy.
This is the simplest type of non-scaling FFAG, the linear version, consisting of F and D quadrupoles, providing alternating-gradient (F/D) strong focusing. In this lattice, the use of F and D doublet magnets is proposed, in which a radial offset between the F and D quadrupoles provides the dipole bending field, removing the need for separate dipole magnets, as in the EMMA design. The lattice of the second ring, which covers the 31--250~MeV proton energy range (and the equivalent for carbon ions), comprises 48 FD doublet cells and the ring radius is around 6.9~m. The layout of the lattice cell can be seen in Fig.~\ref{fig:kstcelllayout} and the optics in Fig.~\ref{fig:keilring2}.
\begin{figure}[h!]
\centering\includegraphics[width=.5\linewidth]{Figs/kstcelllayout}
\caption{Layout of one cell of the second (middle) ring from centre to centre of the D magnets in two adjacent cells}
\label{fig:kstcelllayout}
\end{figure}
\begin{figure}[h!]
\centering\includegraphics[width=.6\linewidth]{Figs/keilring2}
\caption{Beta functions and dispersion in the Keil \emph{et al.} non-scaling FFAG for hadron therapy}
\label{fig:keilring2}
\end{figure}
As we now know, the betatron tune in a linear non-scaling FFAG changes during acceleration; the variation of the tune in this lattice is shown in Fig.~\ref{fig:tunes_kst}. This changing tune will cross integer and half-integer betatron resonances, where any errors in the lattice will result in small kicks to the beam which will build up with each subsequent turn, potentially damaging the beam quality. Acceleration in this case occurs in roughly 1000 turns, which is far slower than the 10-turn acceleration in EMMA.
\begin{figure}
\centering\includegraphics[width=.7\linewidth]{Figs/tunes_kst}
\caption{Variation of betatron tune with acceleration. The cell tune is shown; the machine tune can be found by multiplying by the number of cells, which is 48 in this ring, resulting in the tunes crossing around 10 integers in each plane.}
\label{fig:tunes_kst}
\end{figure}
Detailed studies were carried out on the sensitivity of such a design to alignment errors, and a comparison was made with an alternative design by Trbojevic~\cite{bib:trbojevic08}. The results showed that alignment tolerances in such a machine may be as tight as 10 microns, an extremely stringent requirement. One may improve things by optimizing the lattice for the application so as to cross fewer resonances, but it is likely that resonance crossing will remain an issue~\cite{bib:sheehy10, bib:sheehythesis}. The topic of resonance crossing in non-scaling FFAGs is an ongoing area of active research~\cite{bib:moriya15}. In addition, one only needs to note the density of such a lattice to realize that injection and extraction and the lack of long straight sections may be problematic in an operational machine. However, the advantages of the linear non-scaling FFAG may be realized if the machine is made non-symmetric with long straight insertions. The principle may also be used to optimize the treatment gantry rather than the accelerator itself, an option which we shall discuss later.
\subsection{PAMELA: Particle Accelerator for MEdicaL Applications}
As part of the CONFORM (COnstruction of a Non-scaling FFAG for Oncology, Research and Medicine) project, which included the construction of the EMMA non-scaling FFAG, a design study for a hadron non-scaling FFAG for hadron therapy was undertaken from 2007 to 2011. Known as the PAMELA project, this was a design study aimed at applying the concept of a non-scaling FFAG to hadron therapy. The design principle was based on two rings to cover the full energy range of both protons and carbon ions up to an equivalent magnetic rigidity of 6.7~T~m, that is, 440~MeV/nucleon for C$^{6+}$ ions (Fig.~\ref{fig:pamela1}). The machine was designed to operate with a very fast repetition rate of 1~kHz.
The starting point for the study was a linear non-scaling FFAG. However, the concern about beam deterioration from resonance crossing discussed in the previous section was significant enough to motivate studies of alternative designs of FFAGs for medical use. This resulted in a non-linear FFAG design. In each ring, the design strategy resulted in a variation of the total betatron tunes with acceleration which was well within half an integer (i.e., $\Delta\nu_\mathrm{total} = n_\mathrm{cell} \, \Delta\nu_\mathrm{cell} < 0.5$). It also maintained some advantageous non-scaling properties such as small orbit excursion and simpler magnets which are easy to align.
The steps of the design were as follows:
\begin{enumerate}
\item{The designers started with a scaling law based on a radial-sector FFAG with an FDF triplet lattice.}
\item{The second stable region of Hill's equation was used, with a horizontal phase advance per cell greater than 180$^{\degree}$. This allowed a larger field index to be used, resulting in a reduction in the orbit excursion by a factor of roughly five compared with the first stability region~\cite{bib:machida09}.}
\item{The field was decomposed into its multipole components and the expansion was truncated at some low order, usually octupole or decapole, to simplify the magnets.}
\item{The shape of the magnets was changed to rectangular rather than sector-shaped, and aligned on a straight line rather than along an arc to simplify construction.}
\item{The field profile was finally optimized such that the variation in betatron tune was minimized throughout acceleration.}
\end{enumerate}
\begin{figure}
\centering\includegraphics[width=.5\linewidth]{Figs/pamela1}
\caption{Layout of the PAMELA proton ring lattice showing the low-energy (inner) and high-energy (outer) orbits. The axis units are metres.}
\label{fig:pamela1}
\end{figure}
The resulting machine was studied up to engineering design level, including a novel superconducting magnet design~\cite{bib:witte12}; studies of RF cavities; engineering design of the cryostats, injectors, injection and extraction magnets, and beamlines; and a first look at a gantry system~\cite{bib:peach13}. The layout of the injectors and two main rings is shown in Fig.~\ref{fig:pamelalayout}.
\begin{figure}
\centering\includegraphics[width=.8\linewidth]{Figs/pamelalayout}
\caption{Layout of the PAMELA facility}
\label{fig:pamelalayout}
\end{figure}
\subsection{NORMA: NORmal conducting Medical Accelerator}
The NORMA study followed on from the PAMELA design to address some of the issues that arose during that study and to iterate the design. For example, it was felt that the PAMELA machine might have been closer to implementation if normal-conducting magnets had been used instead of the novel superconducting design. The NORMA design also extended the energy range of a single ring to provide beams up to 350~MeV which could travel through a patient to enable proton radiography. Although the design was for protons only (unlike PAMELA, which was for both protons and carbon ions), it provided detailed studies and optimization based on dynamic aperture~\cite{bib:garland15}.
The cell structure (Fig.~\ref{fig:norma1}) in this design was very similar to that of PAMELA, using an FDF triplet. The NORMA study also made further innovations by introducing two long straight sections almost 5~m long for injection, extraction, and acceleration by creating a racetrack-shaped machine, shown in Fig.~\ref{fig:norma2}.
\begin{figure}
\centering\includegraphics[width=.6\linewidth]{Figs/norma1}
\caption{Layout of the NORMA cell, showing the magnetic field throughout the cell and trajectories of low-energy (inner) to high-energy (outer) orbits.}
\label{fig:norma1}
\end{figure}
\begin{figure}
\centering\includegraphics[width=.6\linewidth]{Figs/norma2}
\caption{Layout of the NORMA racetrack FFAG}
\label{fig:norma2}
\end{figure}
\subsection{Arbitrary-edge-angle non-scaling FFAG designs}
Contemporary with the PAMELA design, an alternative approach by Johnstone and Koscielniak used wedge-shaped quadrupoles to achieve control over the betatron tunes with acceleration~\cite{bib:johnstone07}. In this case both the path length through the quadrupoles and the contribution of edge focusing were designed to be a function of the beam momentum. However, over the energy ranges considered, the orbit shift was relatively large, of the order of 1~m. More information on these designs can be found in Refs.~\cite{bib:johnstone09, bib:johnstone11}.
\section{FFAG gantry designs}
One of the most promising application areas for the FFAG is in the beam delivery system from accelerator to patient. Existing treatment gantries are large, expensive, and slow to provide variable-energy beams to the patient, as one must wait for the magnetic field to be adjusted before a different energy can be accepted through the transport line. In particular, for carbon ions, the existing gantry at the Heidelberg Ion Therapy centre is both large and heavy, weighing in at 630~t, where 135~t of that is the magnets and the remainder is the supporting structure to allow rotation around the patient.
An FFAG gantry would be able to have a large energy acceptance with a single magnet setting and no limit on rapid variation of energy. This means that if the machine could provide energy variability at a rate of 1~kHz, the beam delivery system and gantry would be able to transport this to the patient treatment room.
A transport line and gantry design based on similar optics was developed in the context of the PAMELA project~\cite{bib:machidafenning, bib:fenning12, bib:fenningthesis}. However, in the PAMELA-type design the aperture is still relatively large. Noting that the linear non-scaling FFAG can have an extremely compact aperture over a large momentum range has motivated significant development work on the use of this technique for gantries. Resonance crossing and injection or extraction are obviously not issues in single-pass gantries. The major advantages that could be realized using this technology are reductions in the size, cost, and complexity of treatment gantries.
A design exists for a superconducting non-scaling FFAG gantry for carbon ions~\cite{bib:trbojevic1, bib:trbojevicbnl, bib:trbojevic2} which may reduce the weight of the magnetic components of such a design from 135~t to around 2~t. There are also designs for compact proton FFAG gantries utilizing either compact magnets or even permanent magnets~\cite{bib:trbojevic14, bib:trbojevic3}.
\section{Summary}
I hope you have gained from these notes a basic understanding of FFAG accelerators and their potential for use in medical applications. Here we have focused on hadron therapy applications but, of course, in the high-intensity regime FFAGs also hold promise for other medical applications such as radioisotope production and boron neutron capture therapy. Listed throughout are many references which will provide the reader with a starting point for learning more about the application of FFAG accelerators.
\section*{Acknowledgements}
The author would like to thank members of the FFAG community who have contributed valuable references, images, and discussions. In particular, I would like to thank S. Tygier, F. M\'eot, S. Machida, and D. Kelliher.
|
\section{Introduction}
With the development of numerous techniques to produce micron-scale droplets, there has been a growing interest in exploring the physical mechanisms behind these methods \cite{utada2007dripping,dangla2013physical,garstecki2006formation,sugiura2002characterization, van2010mechanism}. A greater understanding of which parameters are most important to droplet production can permit fine-tuning of existing techniques or modification of systems where droplet production is undesirable \cite{pena2009snap,sugiura2004effect,dangla2013droplet}. Laplace pressure driven snap-off relies upon an instability that forms when a confined dispersed phase is allowed to penetrate into a larger space filled with an immiscible continuous phase (see Fig.~\ref{fig:schematic}A).
The instability requires no viscous interaction, but is due entirely to changes in the curvature of the interface between the two phases, affecting the Laplace pressure. We have previously found that the resulting droplets are highly monodisperse~\cite{Barkley_TT}, as the system becomes unstable immediately after the protrusion of the dispersed phase reaches a critical size. The snap-off phenomenon has been studied and used to produce droplets in many different geometries \cite{van2010mechanism, dangla2013droplet, Lenormand1983mechanisms, umbanhowar00, sugiura2002characterization,Barkley_TT}. However, the case of ejecting the dispersed phase from a cylindrically symmetric tube is the simplest from a theoretical standpoint \cite{roof1970snap,pena2009snap,Barkley_TT}.
\begin{figure}
\centering
\includegraphics[width=7cm]{fig1.eps}
\caption{A) Schematic prior to droplet snap-off. The inner radius of the cylindrical nozzle $R$, minimum radius of the flowing dispersed phase column within the nozzle $R_\mathrm{c}$, and radius of the growing droplet $R_\mathrm{d}$ define the important length scales. The relevant pressures are the pressure of the bulk continuous phase $P_\mathrm{0}$, pressure of the dispersed phase in the growing droplet $P_\mathrm{d}$, pressure of the dispersed phase in the nozzle $P_\mathrm{n}$, and the pressure of the continuous phase in the collar around the dispersed phase $P_\mathrm{c}$. B) Schematic of these pressures along the length of the pipette. Snapoff occurs if $P_c < P_0$, which happens as $R_d$ grows, decreasing $P_d$ and the other pressures relative to the fixed pressure $P_0$.}
\label{fig:schematic}
\end{figure}
By neglecting pressure gradients within the dispersed phase, several groups have been able to provide a theoretical framework for droplet sizes in a quasi-static regime \cite{Barkley_TT,dangla2013droplet,van2010mechanism,roof1970snap}. The approximation of a static dispersed phase has been shown to be valid in regimes that are useful for droplet production \cite{Barkley_TT,dangla2013physical,van2010mechanism}. Additionally, it was shown that droplets grow larger before snapping off at higher flow rates, and eventually grow indefinitely for sufficiently large flow rates \cite{Barkley_TT,pena2009snap,dangla2013droplet,sugiura2002effect}. The ability to deliberately vary droplet size without changing the apparatus, for instance by changing the flow rate, represents a useful experimental control variable. Nevertheless, a model which can predict the size of snap-off droplets at flow rates where the quasi-static approximation is no longer valid has remained elusive. Previous studies have examined the effects of changes in geometry, interfacial tension, and viscosity ratio between the two fluids on the droplet production\cite{van2010mechanism, pena2009snap, sugiura2002effect, sugiura2004effect, dangla2013physical, dangla2013droplet}. However, many of these investigations have been largely qualitative in nature.
Here, we present experiments that are compared to a model predicting the size of droplets produced through the snap-off mechanism over a wide range of flow rates. The model provides a ``stability diagram'': regions on a plot of the droplet radius as a function of the flow rate where droplets are stable and grow, contrasted with regions where the droplets are unstable and snap off. The stability diagram elucidates a pathway for manipulation of the system to produce droplets at both sizes and flow rates where snap-off would not normally occur. Furthermore, the model we present accounts for the effects of fluid properties and geometry on the droplet production. The work is carried out in the cylindrically symmetric geometry, although the ideas are easily extended to the flattened geometries that are common for snap-off droplet production.
\section{Theory}
Snap-off occurs when a dispersed phase is ejected from a nozzle into a reservoir of a continuous phase as shown in Fig.~\ref{fig:schematic}A. The dispersed phase forms a growing spherical droplet that becomes unstable at some critical size and subsequently snaps-off~\cite{Barkley_TT}. Figure~\ref{fig:schematic}B illustrates schematically the location and relative values of the relevant pressures, which we now describe. Assuming a quasi-equilibrium, we can define the pressure of the bulk continuous phase $P_0$. The interior pressure of the droplet of dispersed phase is higher than $P_\mathrm{0}$ due to the droplet's Laplace pressure:
\begin{equation}
P_\mathrm{d}=P_\mathrm{0}+2\gamma/R_\mathrm{d},
\label{eq:laplace}
\end{equation}
where $R_\mathrm{d}$ is the radius of the droplet and $\gamma$ is the interfacial tension between the dispersed and continuous phase (Fig.~\ref{fig:schematic}B). In more complex, non-cylindrical geometries, growth of the droplet is restricted in one or more directions, and the Laplace pressure difference will depend on the dimensions of the confining chamber \cite{roof1970snap,dangla2013droplet,van2010mechanism}. For snap-off to proceed effectively, there must be a wetting layer of the continuous phase coating the interior of the nozzle, which forms a transient collar with a minimum radius, $R_\mathrm{c}$~\cite{Barkley_TT,roof1970snap}. Again, due to the curvature of the interface at the collar, we can write the Laplace pressure difference between the dispersed phase in the nozzle $P_\mathrm{n}$ and the continuous phase in the surrounding collar $P_\mathrm{c}$,
\begin{equation}
P_\mathrm{n}=P_\mathrm{c}+\frac{\gamma}{R_\mathrm{c}}.
\label{eq:collar}
\end{equation}
Here we have made a simplifying assumption consistent with experimental obsevations, that ${R_\mathrm{c}}$ is a much smaller radius than that of the orthogonal curvature. As the droplet begins its growth, the wetting layer of the continuous phase is thin, and so $R_\mathrm{c} \approx R$.
Figure~\ref{fig:schematic}B also indicates another important feature of the flowing fluid, that there is a pressure gradient, ${dP}/{dx}$, along the cylindrical nozzle. This pressure gradient is described by Poiseuille flow~\cite{landau1987},
\begin{equation}
\frac{dP}{dx}=\frac{8\eta Q}{\pi R^4},
\label{eq:poiseuille}
\end{equation}
where $\eta$ is the viscosity of the dispersed phase and $Q$ is the volumetric flow rate. We are concerned with the pressure difference between the dispersed phase at the collar, $P_\mathrm{n}$, and that in the droplet, $P_\mathrm{d}$. In practice, nozzles with circular apertures are undesirable, as spherical droplets block the opening and prevent the reverse flow of the continuous phase that is necessary for snap-off to occur \cite{roof1970snap,Barkley_TT}. Cylindrical nozzles must therefore have an irregular tip shape that is not easily controlled between nozzles. The decrease in pressure from $P_\mathrm{n}$ to $P_\mathrm{d}$ occurs over a length scale with two distinct components. First, each tip contributes a geometric parameter $L$ that is specific to the pipette tip's unique shape, reflecting the distance into the pipette at which the neck of the dispersed phase forms. Second, the pressure must drop to $P_\mathrm{d}$ by some distance into the droplet, which contributes $\epsilon R_\mathrm{d}$, since this dimension scales with the droplet radius. Thus the length scale over which the pressure drops from $P_\mathrm{n}$ to $P_\mathrm{d}$ is $L + \epsilon R_\mathrm{d}$ and with Eq.~\ref{eq:poiseuille}, we obtain
\begin{equation}
P_\mathrm{n}=P_\mathrm{d}+\frac{8\eta Q}{\pi R^4}\left(L+\epsilon
R_\mathrm{d}\right).
\label{eq:flowpressure}
\end{equation}
Equations \ref{eq:laplace}, \ref{eq:collar}, and \ref{eq:flowpressure} establish the relationships between each of the pressures depicted depicted in Fig.~\ref{fig:schematic}. As the droplet grows, the Laplace pressure difference between the droplet interior and exterior decreases via Eq.~\ref{eq:laplace}, and so $P_\mathrm{d}, P_\mathrm{n},$ and $P_\mathrm{c}$ all decrease, relative to the constant $P_\mathrm{0}$. The snap-off instability develops when $P_\mathrm{c}<P_\mathrm{0}$, causing a reverse flow of the continuous phase from the bulk $P_\mathrm{0}$ into the collar $P_\mathrm{c}$. As the continuous phase flows, the collar constricts the dispersed phase (${R_\mathrm{c}}$ decreases), which further reduces $P_\mathrm{c}$ relative to $P_\mathrm{n}$ according to Eq.~\ref{eq:collar}. The contracting collar exacerbates the pressure difference driving reverse flow of the continuous phase, and the collar structure rapidly collapses, releasing the droplet \cite{Barkley_TT,dangla2013physical}. Using our relations between the pressures and with $R_\mathrm{c} \approx R$, we can rewrite the snap-off condition $P_\mathrm{c}<P_\mathrm{0}$ as:
\begin{equation}
P_\mathrm{0}+\frac{2\gamma}{R_\mathrm{d}}+\frac{8\eta Q}{\pi
R^4}\left(L+\epsilon R_\mathrm{d}\right)-\frac{\gamma}{R} < P_\mathrm{0}.
\label{eq:snapoff}
\end{equation}
When this inequality is satisfied, the collar is unstable and shrinks to release the droplet.
Previous efforts to predict snap-off droplet size have been restricted to the low flow limit of the dispersed phase \cite{Barkley_TT,dangla2013physical,van2010mechanism,roof1970snap}. In this case, $Q \approx 0$, $P_\mathrm{d} \approx P_\mathrm{n}$, and Eq.~\ref{eq:snapoff} simplifies to the condition
\begin{equation}
R_\mathrm{d} > 2R,
\label{eq:quasistatic}
\end{equation}
as we have shown in a previous study\cite{Barkley_TT}. That is, when $R_\mathrm{d}$ grows to the size of $2R$, the instability begins and the droplet snaps off, and so all droplets formed are of size $2R$ in the low flow limit.
For higher flow rates, we can introduce the non-dimensional variables $\widetilde{R}_\mathrm{d}=\frac{R_\mathrm{d}}{R}$, $\widetilde{L}=\frac{L}{R}$, and $\widetilde{Q}=\frac{8 \eta}{\pi \gamma R^2}Q$. With these varibles, Eq.~\ref{eq:snapoff} can be rewritten to define unstable droplets as
\begin{equation}
\epsilon \widetilde{Q}\widetilde{R}_\mathrm{d}^2 +\left(\widetilde{L}\widetilde{Q}-1 \right)\widetilde{R}_\mathrm{d}+2 < 0.
\label{eq:nondimensional}
\end{equation}
The expression can be solved to find the values of $\widetilde{R}_\mathrm{d}$ for which the left side equals zero:
\begin{equation}
\widetilde{R}_\mathrm{d}=\frac{1-\widetilde{L}\widetilde{Q}\pm\sqrt{\left(1-\widetilde{L}\widetilde{Q}\right)^2-8\epsilon\widetilde{Q}}}{2\epsilon\widetilde{Q}}.
\label{eq:rofQ}
\end{equation}
Eq.~\ref{eq:rofQ} defines a critical non-dimensional droplet radius $\widetilde{R}_\mathrm{d}$ for a given rescaled flow rate $\widetilde{Q}$. Beyond the critical radius, the continuous phase invades the nozzle containing the dispersed phase, causing the droplet to snap-off. Eq.~\ref{eq:rofQ} can thus be interpreted as follows: For a given flow rate, the droplet grows, while still attached by the collar to the dispersed phase. Eventually the droplet grows to the critical radius given by Eq.~\ref{eq:rofQ} at which point the collar pinches off and the droplet is released into the continuous medium. Thus Eq.~\ref{eq:rofQ} defines the boundary between stable and unstable droplets in a parameter space of $\widetilde{R}_\mathrm{d}$ and $\widetilde{Q}$ as shown by the lower solid line in Fig.~\ref{fig:phasediagram}.
The above explanation assumes that the negative square root is taken in Eq.~\ref{eq:rofQ}. If the positive square root is taken instead, Eq.~\ref{eq:rofQ} defines a minimum stable droplet size as a function of flow rate, shown as the dashed line in Fig.~\ref{fig:phasediagram}. Droplets larger than this critical size are stable to continue growing indefinitely as the $\epsilon \widetilde{Q}\widetilde{R}_\mathrm{d}^2$ term dominates Eq.~\ref{eq:nondimensional}. In this situation, the distance $\epsilon R_\mathrm{d}$ is large. Thus, the pressure gradient necessary to drive the flow into the large droplet ensures that $P_\mathrm{n}$, and thus $P_\mathrm{c}$, stay large and $P_\mathrm{c} > P_0$ even for arbitrarily large droplets.
In reality, no droplets are able to grow indefinitely, as large droplets break away from the pipette due to their buoyancy. It is important to note that this separation represents a different mechanism than the Laplace-pressure driven snap-off. Here, the buoyant force overcomes the interfacial tension, similar to droplets forming on a leaky ceiling \cite{weisskopf86}. The size at which buoyant forces are sufficient to separate the droplet from the pipette depends on both the shape and orientation of the tip, as well as the flow rate. We assume that for a particular pipette, there is some critical droplet volume $V_\mathrm{b}$ beyond which the droplet is unstable to buoyancy. However, droplets take some fixed amount of time $\tau$ to detach from the pipette and continue to grow at the same flow rate during this time. The volume of droplets that break away from the pipette is therefore expressed simply as $V_\mathrm{d}=V_\mathrm{b}+Q\tau$. The droplet radius at buoyant separation is then given by:
\begin{equation}
R_\mathrm{d}=\left(\frac{3}{4\pi}\left(V_\mathrm{b}+Q\tau\right)\right)^{\frac{1}{3}},
\label{eq:buoyancy}
\end{equation}
which is plotted as the upper solid curve in
Fig.~\ref{fig:phasediagram}. While $V_b$ depends on several
details of the pipette tip geometry, we note that it should scale
as
\begin{equation}
V_\mathrm{b} \sim \left( \frac{\gamma}{\Delta \rho g} \right)^{3/2},
\label{eq:vb}
\end{equation}
suggesting that larger droplets are possible by increasing the
surface tension or better matching the densities of the two
fluids.
\begin{figure}
\centering
\includegraphics[width=9cm]{fig2.eps}
\caption{Stability diagram for droplets as they grow at a particular flow rate from a single pipette ($R=14.3~\mu$m). Droplets growing at a low constant flow rate undergo snap-off (solid circles) when their radius surpasses the critical size described by Eq.~\ref{eq:rofQ} (lower solid line, with $\eta=123$~mPa$\cdot$s, $\gamma=12$~mN/m). Droplets growing at a high constant flow rate break away from the pipette due to buoyancy (solid squares), when they reach the size specified by Eq.~\ref{eq:buoyancy} (upper solid line, with $V_\mathrm{b}=15~$nL, $\tau=19~$s). Droplets produced with a flow rate that is not constant and decreasing can be made to snap-off at intermediate sizes (open symbols) after crossing the dashed line (Eq.~\ref{eq:rofQ}).}
\label{fig:phasediagram}
\end{figure}
\section{Experiment}
Cylindrical nozzles were created by stretching capillary tubes (World Precision Instruments, USA) with a pipette puller (Narishige, Japan). Initial capillary inner diameter was $540~\mu$m and final pipette inner diameter was on the order of $\approx 10~\mu$m. Pipette ends were clipped with tweezers after stretching to produce a jagged tip shape unique to each pipette. As discussed above (see also~\cite{Barkley_TT}), jagged pipettes were found to perform optimally in comparison to perfectly flat ends that allow the droplet to seal the tip, thus preventing the reverse flow that results in snap-off. In fact, the pipettes are not perfectly cylindrical, but taper gradually from diameter $\approx 100~\mu$m to $\approx 10~\mu$m over several centimetres, and so pipettes with larger openings can be produced by breaking the pipettes further from the tip. Unless otherwise stated, the dispersed phase was mineral oil and the continuous phase was water with 1\% (by weight) sodium dodecyl sulphate (SDS) added to stabilize droplets against fusion. Droplets were produced by ejecting oil out of a pipette into a chamber filled with the water phase, taking care that the pipette tip was far from any chamber boundaries. The flow rate was controlled by maintaining a connected oil reservoir at a constant pressure, either by adjusting its height or by clamping a syringe. This procedure results in a constant flow rate at the pipette tip as long as the volume of oil leaving the pipette is negligible compared to the oil reservoir. Droplets were imaged from below at up to 50 frames per second.
The viscosity of the oil phase was decreased for some experiments by mixing dodecane with the mineral oil in concentrations up to $50\%$ by weight. The viscosity of the water phase was increased for some experiments by adding glycerol at concentrations up to $60\%$, with the SDS concentration maintained at $1\%$. The interfacial tension between the two phases was increased for some experiments by reducing the concentration of SDS in the water phase, to a minimum of $0.05\%$. The viscosity of mineral oil was measured by allowing a $225~\mu$m diameter polystyrene bead (Duke Scientific, USA) to slowly fall through a column of oil. A measurement of its terminal velocity was used to calculate viscosity through Stokes' law. The viscosity measurements were repeated with the mineral oil and dodecane mixtures, and its results compared to predictions of a method to calculate viscosity of hydrocarbon blends~\cite{ASTM2006}.
For certain experiments, it was necessary to reduce the oil flow rate during droplet growth. By doing so, the trajectory of a droplet's growth through the parameter space depicted in fig.~\ref{fig:phasediagram} is altered from a simple vertical line. To accomplish this, the oil reservoir was slowly and continuously lowered once the droplet had grown to an intermediate size. The oil reservoir was fixed at its new height upon snap-off of the growing droplet. For droplets growing at a constant flow rate, total droplet volume released in a timed experiment was used to determine the flow rate. In order to measure the flow rate at snap-off for droplets growing at a decreasing flow rate, a number of additional droplets were allowed to form after fixing the reservoir height, and the flow rate of these droplets was measured.
\section{Results \& Discussion}
For a given pipette, droplets can be produced at many different flow rates. At low flow rates, droplet size is independent of flow rate over orders of magnitude changes to $Q$, as predicted by Eq.~\ref{eq:quasistatic} (solid circles in Fig.~\ref{fig:phasediagram}). At higher flow rates, droplet size at snap-off increases with flow rate, until the flow rate reaches some critical value. This observation of a critical value agrees well with previous results \cite{Barkley_TT,sugiura2002effect}. For sufficiently large $\widetilde{Q}$, there is no droplet size $\widetilde{R}_\mathrm{d}$ that can satisfy Eq.~\ref{eq:nondimensional} and droplets would be expected to grow indefinitely \cite{pena2009snap,Barkley_TT}. In practice, droplets produced beyond the critical flow rate eventually break away from the pipette due to their buoyancy (solid squares in Fig.~\ref{fig:phasediagram}). Droplet radius at the time of separation due to buoyancy is described by Eq.~\ref{eq:buoyancy} and is plotted as the upper curve in Fig.~\ref{fig:phasediagram}, which is a fit to the square data points ($V_\mathrm{b}=15~$nL, $\tau=19~$s).
Droplets growing at a constant flow rate can be interpreted as an upwards vertical trajectory in the stable region of Fig.~\ref{fig:phasediagram}. Droplets will break away from the pipette either upon snap-off at low flow rates (solid circles in Fig.~\ref{fig:phasediagram}), or due to buoyancy at high flow rates (solid squares). For many pipettes, the droplets produced through these two mechanisms have very different sizes and it is not possible to produce droplets of intermediate size at any constant flow rate. The snap-off droplets produced for different constant flow rates agree with the prediction of Eq.~\ref{eq:rofQ} if the negative square root is taken (lower solid curve in Fig.~\ref{fig:phasediagram}, with $\widetilde{L}=-5.2$ and $\epsilon=4.3$).
Since droplets grow (i.e. $R_\mathrm{d}$ increases for positive $Q$), it is only possible to travel upwards in the $R_\mathrm{d}$--$Q$ stability diagram shown in Fig.~\ref{fig:phasediagram}. The inverted large-droplet branch of the snap-off curve (dashed line in Fig.~\ref{fig:phasediagram}) is not normally accessible, as it would require passing from an unstable droplet (which cannot remain attached to the pipette) to a stable one. However, individual droplets can be produced at continuously decreasing flow rates, represented as a diagonal trajectory towards the upper left in Fig.~\ref{fig:phasediagram}. When these droplets fulfil an alternate (root) solution to the snap-off condition of Eq.~\ref{eq:rofQ}, they cross the dashed portion of the snap-off stability curve in Fig.~\ref{fig:phasediagram} from right to left. This causes the droplets to become unstable and they subsequently snap-off, represented by the open circles in Fig.~\ref{fig:phasediagram}. As it is not possible to measure the instantaneous flow rate of these droplets, the flow rate of smaller droplets produced immediately afterwards at the same, fixed flow rate is measured instead. Because these subsequent droplets may have actually been produced at a slightly lower flow rate, the flow rate thus obtained provides an underestimate for the flow rate at snap-off of the earlier droplet.
Snap-off of droplets at decreasing flow rates provides a mechanism to produce intermediate sized droplets that are not normally accessible with a particular pipette. However, only individual droplets can be produced in this manner. While there is little practical value of this approach to droplet production, such experiments provided an excellent verification of the model. The presence of this typically inaccessible branch of the snap-off curve confirms that at intermediate flow rates, both small and large droplets are permitted to grow but medium droplets are unstable to snap-off. We reiterate that the stable portion of the $R_\mathrm{d}$--$Q$ diagram corresponding to large droplets is not accessible at a constant flow rate, since this would require droplets to pass through unstable intermediate sizes.
\begin{figure}
\centering
\includegraphics[width=9cm]{fig3.eps}
\caption{Effect of pipette dimensions on droplet radius ($\eta=123$~mPa$\cdot$s, $\gamma=12$~mN/m). A) Minimum observed radius of droplets for many different pipette radii, showing good agreement with prediction for the low-flow limit (black line). B) Snap-off droplet size for increasing flow rate through three different pipettes of radii $6.9~\mu$m, $9.9~\mu$m,$11.2~\mu$m. Curves are fits to Eq.~\ref{eq:rofQ}, returning values of $\widetilde{L}=\{20.2, 5.3, 10.7\}$ and $\epsilon = \{0.06, 1.5, 0.14\}$. Inset presents the same data in terms of scaled droplet radius and flow rate.}
\label{fig:changeR}
\end{figure}
One of the most straightforward methods to produce snap-off droplets of a different size is to alter the chamber dimensions~\cite{Barkley_TT, sugiura2002effect, dangla2013physical, dangla2013droplet}. In the case of a cylindrical nozzle ejecting a dispersed phase into an unconfined bulk continuous phase, the only dimension in the system is the radius of the nozzle, $R$. In the low flow limit, Eq.~\ref{eq:quasistatic} predicts droplet size $R_\mathrm{d}=2R$ or $\widetilde{R}_\mathrm{d}=2$ (see also reference~\cite{Barkley_TT}). This prediction is confirmed by the data presented in Fig.~\ref{fig:changeR}A, which plots the minimum droplet size observed at low flow rates as a function of the inner pipette radius for many pipettes, along with the prediction from Eq.~\ref{eq:quasistatic} (black line). Having established the validity of $R_\mathrm{d}=2R$, for the remainder of this study we obtain $R$ from $R_\mathrm{d}$ because of the accuracy and relative simplicity of that measurement in contrast with the direct measurement of the inner radius of the pipette. At higher flow rates, the dependence of $\widetilde{R}_\mathrm{d}$ on $R$ is non-trivial, as both $\widetilde{L}$ and $\widetilde{Q}$ in Eq.~\ref{eq:rofQ} are normalized by $R$ and $R^2$, respectively. Fig.~\ref{fig:changeR}B shows data from three pipettes with different radii. For each pipette, the characteristic curve of droplet radius $R_\mathrm{d}$ is plotted as a function of volumetric flow rate $Q$. The same data is plotted in terms of the non-dimensionalized variables $\widetilde{R}_\mathrm{d}$ and $\widetilde{Q}$ in the inset of Fig.~\ref{fig:changeR}B, demonstrating good collapse in the vertical direction (collapse is not expected in the horizontal direction, even if pipettes shared values of $\widetilde{L}$ and $\epsilon$, since $\widetilde{Q}$ appears with each of these parameters separately in Eq.\ref{eq:rofQ} and they exhibit dissimilar dependence on $R$). All datasets were fit to Eq.~\ref{eq:rofQ}, with oil viscosity measured as $\eta=123 \pm 4$~mPa$\cdot$s and interfacial tension taken as $\gamma=12$~mN/m based on related literature~\cite{campanelli1997effect,rehfeld1967adsorption,sugiura2004effect}. Both $\widetilde{L}$ and $\epsilon$ are expected to depend on the precise tip shape, and vary between pipettes (for the three pipettes used in Fig.~\ref{fig:changeR}, $\widetilde{L}=\{20.2, 5.3, 10.7\}$ and $\epsilon = \{0.06, 1.5, 0.14\}$).
The snap-off process is driven by the interfacial tension between
the two phases. However, the actual value of $\gamma$ does not
affect droplet production in the low flow limit, since it is present
in each term of Eq.~\ref{eq:quasistatic} (this was also observed
in reference~\cite{sugiura2004effect}). In contrast, at higher flow
rates, interfacial tension matters as it influences the non-dimensionalized flow
rate $\widetilde{Q}\propto Q/\gamma$. The bare interfacial tension
between mineral oil and water is large ($\gamma=48$~mN/m),
and is lowered in this system through the addition of SDS
surfactant to the water phase~\cite{campanelli1997effect}. By
reducing the concentration of SDS below the critical
micelle concentration, it is possible to increase
the interfacial tension relative to the solution with $1\% $
SDS~\cite{sugiura2004effect,campanelli1997effect,rehfeld1967adsorption}.
Fig.~\ref{fig:changeoil}A shows the snap-off droplet radius for
three different interfacial tensions at increasing flow rates for
the same pipette. Since snap-off is driven by interfacial tension,
droplets snap-off sooner at increased interfacial tension for a
given flow rate. Smaller droplets are produced as a result, which
can be clearly seen in Fig.~\ref{fig:changeoil}A, where the curves
of higher interfacial tension fall below those of lower interfacial
tension. Based on previous experiments with different hydrocarbons,
we estimate the interfacial tension of mineral oil and water at SDS
concentrations of 1\%, 0.1\%, and 0.05\% to be 12 mN/m, 25 mN/m,
and 36 mN/m, respectively~\cite{rehfeld1967adsorption}. Interfacial
tension is accounted for in the non-dimensionalization of $Q$, and is not expected to influence $\widetilde{L}$ or $\epsilon$, which depend only on the pipette tip shape. Upon fitting to Eq.~\ref{eq:rofQ}, $\widetilde{L}=7.2\pm0.5$, and $\epsilon=0.84\pm0.06$ for all SDS concentrations(curves in Fig.\ref{fig:changeoil}A). To further illustrate the role of interfacial tension, the inset of Fig.~\ref{fig:changeoil}A presents the same data in terms of non-dimensional variables $\widetilde{R}_\mathrm{d}$
and $\widetilde{Q}$, calculated using the estimated values of
$\gamma$. The collapsed datasets confirm the role of interfacial
tension in rescaling the flow rate.
\begin{figure}
\centering
\includegraphics[width=9cm]{fig4.eps}
\caption{A) Droplets sizes produced from a single pipette ($R=9.1~\mu$m) at increasing flow rates along with fits to Eq.~\ref{eq:rofQ} for SDS concentrations of 1\% (black circles and solid curve), 0.01\% (lighter filled circles and solid curve), and 0.005 \% (open circles and dashed curve). Interfacial tensions were 12 mN/m, 25 mN/m, and 36 mN/m, respectively. Viscosity was held fixed at $\eta=123$~mPa$\cdot$s. Inset presents the same data plotted in terms of non-dimensional units. B) Droplet sizes produced from a single pipette at increasing flow rates along with fits to Eq.~\ref{eq:rofQ} for oil viscosities of 123 mPa$\cdot$s (black circles and solid curve), 20 mPa$\cdot$s (lighter filled circles and solid curve) and 6.2 mPa$\cdot$s (open circles and dashed curve). Interfacial tension was constant at $\gamma=12$~mN/m.}
\label{fig:changeoil}
\end{figure}
Previous snap-off studies have investigated the role of the viscosity ratio of dispersed phase to continuous phase, $\eta/\eta_\mathrm{w}$~\cite{pena2009snap,van2010mechanism}. As with interfacial tension, neither viscosity value is important in the low-flow limit (Eq.~\ref{eq:quasistatic})~\cite{dangla2013droplet, van2010mechanism}. At higher flow rates, Eq.~\ref{eq:snapoff} predicts a dependence of droplet size on the viscosity of the dispersed phase only, which results from the Poiseuille flow through the nozzle opening (Eq.~\ref{eq:poiseuille}). This dependence is accounted for in the scaling of $\widetilde{Q}\propto\eta Q$, as in the case of interfacial tension, above. The viscosity of the oil phase was reduced by adding dodecane to the mineral oil. Although this change also has some impact on other properties of the oil, such as interfacial tension and density, the change to viscosity is expected to dominate for the purposes of snap-off droplet production. Viscosities of the $25\%$ and $50\%$ solutions of dodecane in mineral oil were calculated as $20 \pm 1$~mPa$\cdot$s and $6.2\pm 0.3$~mPa$\cdot$s, respectively~\cite{caudwell2004viscosity,ASTM2006}. Measurements of these viscosities through Stokes' law agreed with the calculated values. Fig.~\ref{fig:changeoil}B plots snap-off droplet radius $R_\mathrm{d}$ as a function of flow rate $Q$ for three oil phase viscosities ejected from the same pipette. According to Eq.~\ref{eq:poiseuille}, a lower viscosity is associated with a smaller pressure gradient for the same flow rate. A lower viscosity thus increases the relative importance of the Laplace pressure terms in Eq.\ref{eq:snapoff} and causes snap-off to occur at flow rates where it otherwise would not. As with interfacial tension, viscosity of the dispersed phase can be seen as an adjustment to non-dimensionalized flow rate $\widetilde{Q}$.
The theory presented here to describe snap-off (Eq.~\ref{eq:snapoff}) predicts only the onset of droplet instability. It is assumed that the continuous phase invades the nozzle immediately upon fulfilling the snap-off condition and so the threshold for droplet instability is the same as that for actual snap-off. It is for this reason that the theory fails for a perfectly circular opening, since the continuous phase is unable to flow into the nozzle~\cite{Barkley_TT,roof1970snap}. This assumption must also fail in the limit of a highly viscous continuous phase. In order to investigate the role of continuous phase viscosity on snap-off droplet production, glycerol was added to the water phase. As with the addition of dodecane to the mineral oil, addition of glycerol to water is expected to alter interfacial tension and density, but the increased viscosity is expected to dominate changes to the snap-off behaviour. The viscosity of the water phase does not affect the size of droplets produced from a single pipette at any flow rate, as seen in Fig.~\ref{fig:changewater}A.
\begin{figure}[t]
\centering
\includegraphics[width=9cm]{fig5.eps}
\caption{A) Snap-off droplet sizes produced from a single pipette ($R=9.1~\mu$m) at increasing flow rates for several viscosities of the continuous phase, with interfacial tension and dispersed phase viscosity held constant at $\eta=123$~mPa$\cdot$s and $\gamma=12$~mN/m. B) Snap-off droplet sizes produced from a single pipette ($R=8.8~\mu$m) for two different liquid pairs with the same viscosity ratio. The viscosity pairs are $\eta=20~$mPa$\cdot$s in $\eta_w=1.0~$mPa$\cdot$s (squares) and $\eta=123~$mPa$\cdot$s in $\eta_w=6.0~$mPa$\cdot$s (circles). Curves are fits to Eq.~\ref{eq:rofQ}}
\label{fig:changewater}
\end{figure}
In order to obtain a higher viscosity of the water phase relative to the oil phase, a $50\%$ solution of dodecane in mineral oil was used as the dispersed phase for this experiment, with a calculated and measured viscosity of $\eta=6.2\pm 0.3$~mPa$\cdot$s. The viscosity of the continuous phase varied between $\eta_\mathrm{w}=1.0$~mPa$\cdot$s ($0\%$ glycerol) and $\eta_\mathrm{w}=10.8$~mPa$\cdot$s ($60\%$ glycerol)\cite{segur1951viscosity}. The experiment was also conducted without addition of dodecane to the dispersed phase with similar results. The independence of snap-off on continuous phase viscosity provides justification for using a stability condition as a snap-off condition directly. Furthermore, the viscosity ratio has previously been assumed to be an important parameter for snap-off production, as is the case for other droplet production techniques~\cite{van2010mechanism,pena2009snap,sugiura2002characterization,utada2007dripping}. However, our results suggest that over the range of viscosities tested here, the viscosity of the dispersed phase dominates the snap-off criterion rather than the ratio of viscosities. To emphasize this point, Fig.~\ref{fig:changewater}B presents two datasets from the same pipette with the same viscosity ratio, $\eta/\eta_\mathrm{w}=20$, but different viscosity pairs. The lack of overlap between these two datasets provides direct evidence that the viscosity ratio is not the correct parameter to consider in the context of snap-off droplet production.
\section{Conclusions}
We have presented a model describing snap-off droplet size over a wide range of flow rates, based on simple arguments of Laplace pressure and Poiseuille flow. Pipette dimensions, interfacial tension, and dispersed phase viscosity are all accounted for. Adjustment of these parameters increases the versatility of droplet production, specifically by increasing the range of flow rates over which droplets can be produced. Interestingly, the continuous phase viscosity has no impact on snap-off over the entire range tested, including cases where the continuous phase is more viscous than the dispersed phase. Although our model was developed for a cylindrical geometry, it should be applicable to all droplet snap-off geometries with appropriate adjustments. The model predicts a rich and unexpected stability dependence on droplet size and flow rate, which was confirmed experimentally by producing droplets with radii that are normally forbidden for a particular pipette.
Financial Support for this work was provided by National Sciences
and Engineering Research Council (NSERC). The work of E.R.W. was
supported by the National Science Foundation under Grant No.
CBET-1336401.
\providecommand*{\mcitethebibliography}{\thebibliography}
\csname @ifundefined\endcsname{endmcitethebibliography}
{\let\endmcitethebibliography\endthebibliography}{}
\begin{mcitethebibliography}{20}
\providecommand*{\natexlab}[1]{#1}
\providecommand*{\mciteSetBstSublistMode}[1]{}
\providecommand*{\mciteSetBstMaxWidthForm}[2]{}
\providecommand*{\mciteBstWouldAddEndPuncttrue}
{\def\EndOfBibitem{\unskip.}}
\providecommand*{\mciteBstWouldAddEndPunctfalse}
{\let\EndOfBibitem\relax}
\providecommand*{\mciteSetBstMidEndSepPunct}[3]{}
\providecommand*{\mciteSetBstSublistLabelBeginEnd}[3]{}
\providecommand*{\EndOfBibitem}{}
\mciteSetBstSublistMode{f}
\mciteSetBstMaxWidthForm{subitem}
{(\emph{\alph{mcitesubitemcount}})}
\mciteSetBstSublistLabelBeginEnd{\mcitemaxwidthsubitemform\space}
{\relax}{\relax}
\bibitem[Utada \emph{et~al.}(2007)Utada, Fernandez-Nieves, Stone, and
Weitz]{utada2007dripping}
A.~S. Utada, A.~Fernandez-Nieves, H.~A. Stone and D.~A. Weitz, \emph{Phys. Rev.
Lett.}, 2007, \textbf{99}, 094502\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Dangla \emph{et~al.}(2013)Dangla, Fradet, Lopez, and
Baroud]{dangla2013physical}
R.~Dangla, E.~Fradet, Y.~Lopez and C.~N. Baroud, \emph{J. Phys. D: Applied
Physics}, 2013, \textbf{46}, 114003\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Garstecki \emph{et~al.}(2006)Garstecki, Fuerstman, Stone, and
Whitesides]{garstecki2006formation}
P.~Garstecki, M.~J. Fuerstman, H.~A. Stone and G.~M. Whitesides, \emph{Lab on a
Chip}, 2006, \textbf{6}, 437--446\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Sugiura \emph{et~al.}(2002)Sugiura, Nakajima, Kumazawa, Iwamoto, and
Seki]{sugiura2002characterization}
S.~Sugiura, M.~Nakajima, N.~Kumazawa, S.~Iwamoto and M.~Seki, \emph{J. Phys.
Chem. B}, 2002, \textbf{106}, 9405--9409\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[van Dijke \emph{et~al.}(2010)van Dijke, de~Ruiter, Schro{\"e}n, and
Boom]{van2010mechanism}
K.~van Dijke, R.~de~Ruiter, K.~Schro{\"e}n and R.~Boom, \emph{Soft Matter},
2010, \textbf{6}, 321--330\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Pe{\~n}a \emph{et~al.}(2009)Pe{\~n}a, Carvalho, and
Alvarado]{pena2009snap}
T.~Pe{\~n}a, M.~Carvalho and V.~Alvarado, \emph{AIChE J.}, 2009, \textbf{55},
1993--1999\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Sugiura \emph{et~al.}(2004)Sugiura, Nakajima, Oda, Satake, and
Seki]{sugiura2004effect}
S.~Sugiura, M.~Nakajima, T.~Oda, M.~Satake and M.~Seki, \emph{Journal of
colloid and interface science}, 2004, \textbf{269}, 178--185\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Dangla \emph{et~al.}(2013)Dangla, Kayi, and Baroud]{dangla2013droplet}
R.~Dangla, S.~C. Kayi and C.~N. Baroud, \emph{Proc. Nat. Acad. Sci.}, 2013,
\textbf{110}, 853--858\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Barkley \emph{et~al.}(2015)Barkley, Weeks, and
Dalnoki-Veress]{Barkley_TT}
S.~Barkley, E.~R. Weeks and K.~Dalnoki-Veress, \emph{Eur. Phys. J. E.}, 2015,
\textbf{38}, 138\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Lenormand \emph{et~al.}(1983)Lenormand, Zarcone, and
Sarr]{Lenormand1983mechanisms}
R.~Lenormand, C.~Zarcone and A.~Sarr, \emph{J. Fluid Mech.}, 1983,
\textbf{135}, 337--353\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Umbanhowar \emph{et~al.}(2000)Umbanhowar, Prasad, and
Weitz]{umbanhowar00}
P.~B. Umbanhowar, V.~Prasad and D.~A. Weitz, \emph{Langmuir}, 2000,
\textbf{16}, 347--351\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Roof \emph{et~al.}(1970)Roof\emph{et~al.}]{roof1970snap}
J.~Roof \emph{et~al.}, \emph{Society of Petroleum Engineers Journal}, 1970,
\textbf{10}, 85--90\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Sugiura \emph{et~al.}(2002)Sugiura, Nakajima, and
Seki]{sugiura2002effect}
S.~Sugiura, M.~Nakajima and M.~Seki, \emph{Langmuir}, 2002, \textbf{18},
5708--5712\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Landau and Lifshits(1987)]{landau1987}
L.~Landau and E.~Lifshits, \emph{Course of Theoretical Physics: Fluid
Mechanics}, Butterworth-Heinenann, 1987\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Weisskopf(1986)]{weisskopf86}
V.~F. Weisskopf, \emph{Am. J. Phys.}, 1986, \textbf{54}, 110--111\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[D7152-11(2006)]{ASTM2006}
A.~S. D7152-11, \emph{Standard practice for calculating viscosity of a blend of
petroleum products}, ASTM International, West Conshohocken,PA, 2006\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Campanelli and Wang(1997)]{campanelli1997effect}
J.~R. Campanelli and X.~Wang, \emph{Journal of Colloid and Interface Science},
1997, \textbf{190}, 491--496\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Rehfeld(1967)]{rehfeld1967adsorption}
S.~J. Rehfeld, \emph{J. Phys. Chem.}, 1967, \textbf{71}, 738--745\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Caudwell \emph{et~al.}(2004)Caudwell, Trusler, Vesovic, and
Wakeham]{caudwell2004viscosity}
D.~Caudwell, J.~Trusler, V.~Vesovic and W.~Wakeham, \emph{International Journal
of Thermophysics}, 2004, \textbf{25}, 1339--1352\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\bibitem[Segur and Oberstar(1951)]{segur1951viscosity}
J.~B. Segur and H.~E. Oberstar, \emph{Industrial \& Engineering Chemistry},
1951, \textbf{43}, 2117--2120\relax
\mciteBstWouldAddEndPuncttrue
\mciteSetBstMidEndSepPunct{\mcitedefaultmidpunct}
{\mcitedefaultendpunct}{\mcitedefaultseppunct}\relax
\EndOfBibitem
\end{mcitethebibliography}
\end{document}
|
\section{Introduction}
Carpooling, is the sharing of car journeys so that more than one person travels
in a car.
Knapen et al.~\cite{knapen2013estimating} describe an automatic service
to match commuting trips.
Users of the service register their personal profile and a set of periodically
recurring trips,
and the service advises registered candidates on how to combine their commuting
trips by carpooling.
The service acts in two phases.
In the first phase, the service estimates the probability that a person $a$
traveling in person's $b$ car will be satisfied by the trip.
This is done based on personal information and feedback from users on past
rides.
The second phase is about finding a carpool matching
that maximizes the global (total expected) satisfaction.
The second phase can be modeled in terms of graph theory.
Given a directed graph $G = (V, A)$.
Each vertex $v \in V$ corresponds to a user of the service and an arc
$(u, v)$ exists if the user corresponding to vertex $u$ is willing to
commute with the user corresponding to vertex $v$.
A capacity function $ c: V \rightarrow \mathbb{N} $ is defined
according to the number of passengers each user can drive if she was
selected as a driver.
A weight function $w : A \rightarrow \mathbb{R} $ defines the amount of
satisfaction $w(u, v)$,
that user $u$ gains when riding with user $v$.
A feasible \emph{carpool matching} (matching) is a triple
$(P, D, M)$, where $P$ and $D$ form a partition of $V$,
and $M$ is a subset of $A \cap (P \times D)$,
under the constraints that for every driver $d \in D$,
$\din(d) \leq c(d)$,
and for every passenger $p \in P$, ${\dout(p) \leq 1}$.
In the \textsc{Maximum Carpool Ma\-tching{}} problem we seek for a matching $(P, D, M)$ that maximizes the
total weight of $M$.
In other words, the \textsc{Maximum Carpool Ma\-tching{}} problem is about finding a set of
(directed toward the center) vertex disjoint stars
that maximizes the total weights on the arcs.
Figure~\ref{fig:carpool} is an example of the \textsc{Maximum Carpool Ma\-tching{}} problem.
\begin{figure}
\centering
\newcommand{\arc}[3]{
\draw (#1) -- (#2) node[label above] {#3};
}
\subfloat[]{
\label{subfloat:input}
\begin{tikzpicture}[every node/.style={default node}, ->, very thick]
\node(1) at(-1,3) {2};
\node(2) at(.5,.5) {3};
\node(3) at(-1,0) {1};
\node(4) at(-1,1) {3};
\node(5) at(-2,2) {0};
\node(6) at(-2,-1) {4};
\node(7) at(-3,0) {3};
\node(8) at(.5,-1) {2};
\node(9) at(0,2) {1};
\node(10) at(2,1) {4};
\arc{1}{4}{3}
\arc{2}{4}{4}
\arc{3}{4}{5}
\arc{5}{7}{2}
\arc{6}{7}{4}
\arc{8}{10}{6}
\arc{9}{10}{2}
\arc{1}{5}{4}
\arc{4}{5}{4}
\arc{2}{3}{2}
\arc{6}{3}{2}
\arc{7}{3}{2}
\arc{8}{2}{1}
\arc{10}{2}{1}
\arc{3}{8}{3}
\arc{8}{3}{3}
\arc{1}{9}{1}
\arc{4}{9}{1}
\end{tikzpicture}}
\hfill\subfloat[]{
\label{subfloat:output}
\begin{tikzpicture}[every node/.style={default node}, ->, very thick]
\begin{scope}[every node/.style={default node, draw=blue}]
\node(5) at(-2,2) {0};
\node(6) at(-2,-1) {4};
\node(2) at(.5,.5) {3};
\node(3) at(-1,0) {1};
\node(1) at(-1,3) {2};
\node(8) at(.5,-1) {2};
\node(9) at(0,2) {1};
\end{scope}
\begin{scope}[every node/.style={default node, draw=red, dashed}]
\node(7) at(-3,0) {3};
\node(4) at(-1,1) {3};
\node(10) at(2,1) {4};
\end{scope}
\arc{1}{4}{3}
\arc{2}{4}{4}
\arc{3}{4}{5}
\arc{5}{7}{2}
\arc{6}{7}{4}
\arc{8}{10}{6}
\arc{9}{10}{2}
\end{tikzpicture}}
\caption[]{
\label{fig:carpool}
A carpool matching example:
\subref{subfloat:input}
a directed graph with capacities on the vertices and weights on the arcs.
\subref{subfloat:output}
a feasible matching with total weight of 26.
$P$ is the set of blue vertices, and $D$ is the set of red, dashed vertices.
}
\end{figure}
Hartman et al.~\cite{hartman2013optimal} proved that the
\emph{Maximum Carpool Ma\-tching{}} problem considered in this paper is NP-hard,
and that the problem remains NP-hard even for a binary weight function when
the capacity function $c(v) \leq 2$ for every vertex in $V$.
It is also worth mentioning, that in the undirected, uncapacitated, unweighted
variant of the problem, the set of drivers in an optimal solution
form a minimum dominating set.
When the set of drivers is known in advanced, however, the problem becomes
tractable and can be solved using a reduction to a flow network problem.
Agatz et al.~\cite{agatz2012optimization} outlined the optimization challenges
that arise when developing technology to support ride-sharing and survey the
related operations research models in the academic literature.
Hartman et al.~\cite{hartman2014theory} designed several heuristic algorithms
for the Maximum Carpool Ma\-tching{} problem and compared
their performance on real data.
Other heuristic algorithms were developed as well~\cite{knapen2014exploiting}.
Arkin et al.~\cite{arkin2004approximations}, considered other variants of
capacitated star packing where a capacity vector is given as part of the input and
capacities need to be assigned to vertices.
Nguyen et al.~\cite{nguyen2008approximating} considered the \textsc{spanning star forest} problem
(the undirected, uncapacitated, unweighted variant of the problem).
They proved the following results:
\begin{enumerate*}
\item
there is a polynomial-time approximation scheme for planner graphs;
\item
there is a polynomial-time $\frac{3}{5}$-approximation algorithm for graphs;
\item
there is a polynomial-time $\frac{1}{2}$-approximation algorithm for weighted graphs.
\end{enumerate*}
They also showed how to apply the spanning star forest model to aligning multiple
genomic sequences over a tandem duplication region.
Chen et al.~\cite{chen2007improved} improved the approximation ratio to 0.71,
and also showed that the problem can not be approximated to within a factor of
$\frac{31}{32} + \epsilon$ for any $\epsilon > 0$ under the assumption
that $\text{P} \neq \text{NP}$.
It is not clear, however, if any of the technique used to address the
\textsc{spanning star forest} problem can be generalized to approximate the
directed capacitated variant.
In section~\ref{sec:fixed} we present an exact, efficient algorithm for the
problem when the set of drivers and passengers is given in advanced.
In section~\ref{sec:uwcm} we present a 2-approximation local search algorithm
for the unweighted variant of the problem.
Finally in section~\ref{sec:cm} we
give a 3-approximation algorithm for the problem.
\section{Maximum Weight Flow}
\label{sec:carpool:preliminary}
A flow network is a tuple $N = (G = (V, A), s, t, c)$,
Where $G$ is a directed graph,
$s \in V$ is a source vertex,
$t \in V$ is a target vertex,
and $c : A \rightarrow \mathbb{R}$ is a capacity function.
A flow $f : A \rightarrow \mathbb{R}$ is a function that has the following properties:
\begin{itemize}
\item
$f(e) \leq c(e), \quad \forall e \in A$
\item
$\sum_{(u, v) \in A} f(u, v) = \sum_{(v, w) \in A} f(v, w), \quad \forall v \in V \setminus \{s, t\}$
\end{itemize}
Given a flow function $f$,
and a weight function $w: A \rightarrow \mathbb{R}$,
the \emph{flow weight} is defined to be:
$\sum_{e \in A}{w(e)f(e)}$.
A flow with a maximum weight (\emph{maximum weight flow}) can be efficiently found by adding
the arc $(t, s)$, with $c(t,s) = \infty$, and $w(t,s) = 0$ and reducing the problem
(by switching the sign of the weights)
to the minimum cost circulation problem~\cite{tardos1985strongly}.
When the capacity function $c$ is integral,
a maximum weight integral flow can be efficiently found.
\section{Fixed Maximum Carpool Matching{}}
\label{sec:fixed}
In the \textsc{Fixed Maximum Carpool Matching{}} problem, $P$ and $D$ are given,
and the goal is to find $M$ that maximizes the total weight.
This variant of the problem can be solved efficiently
\footnote{A solution to this variant of the problem was already proposed in~\cite{hartman2014theory}.
For the sake of completeness, however, we describe a detailed solution for this variant.
More importantly,
the described solution helps us develop the intuition and understand the basic idea behind the
approximation algorithm described in Section~\ref{sec:cm}.
},
by reducing it to a maximum weight flow (flow) problem as
follow:
Let $(G = (V, A), c, w)$ be a Maximum Carpool Ma\-tching{} instance,
let $(P, D)$ be a partition of $V$,
let $N = (G' = (V', A'), s, t, c')$ be a flow network,
and let $w' : A \rightarrow \mathbb{N}$ be a weight function, where
\begin{align*}
V' & = P \cup D \cup \{s, t\} \\
A' & = A_{sp} \cup A_{pd} \cup A_{dt} \\
A_{sp} & = \{(s, p) : p \in P \} \\
A_{pd} & = A \cap (P \times D) \\
A_{dt} & = \{(d, t) : d \in D \} \\
c'(u, v) & =
\begin{cases}
c(u) & \text{if } (u, v) \in A_{dt} \\
1 & \text{otherwise}
\end{cases}
\\
w'(e) & =
\begin{cases}
w(e) & \text{if } e \in A_{pd} \\
0 & \text{otherwise}
\end{cases}
\end{align*}
The flow network is described in Figure~\ref{fig:flow}.
\begin{figure}
\centering
\begin{tikzpicture}[every node/.style={default node}]
\node(s) at (0,0) {s};
\node[draw=none]() at (3,2.2) {$P$};
\node(p0) at (3,1.6) {$p_0$};
\node[draw=none](pdots1)at (3,.8) {$\vdots$};
\node(pi) at (3,0) {$p_i$};
\node[draw=none](pdots2)at (3,-.8) {$\vdots$};
\node(pl) at (3,-1.6) {$p_l$};
\node[draw=none]() at (7,2.2) {$D$};
\node(d0) at (7,1.6) {$d_0$};
\node[draw=none](pdots) at (7,.8) {$\vdots$};
\node(dj) at (7,0) {$d_j$};
\node[draw=none](pdots) at (7,-.8) {$\vdots$};
\node(dm) at (7,-1.6) {$d_m$};
\node(t) at (10,0) {t};
\draw[->] (s) -- (pi)
node[label above] {$w' = 0$}
node[label below] {$c' = 1$};
\draw[->] (pi) -- (dj)
node[label above, above=-5mm] {$w' = w(p_i, d_j)$}
node[label below] {$c' = 1$};
\draw[->] (dj) -- (t)
node[label above] {$w' = 0$}
node[label below, below=-3mm] {$c' = c(d_j)$};
\newcommand{\edots}[2]{
\path (#1) -- (#2)
node[label, pos=0.1, anchor=center] {$\cdots$}
node[label, pos=0.9, anchor=center] {$\cdots$};
}
\edots{s}{p0}
\edots{s}{pl}
\edots{p0}{d0}
\edots{p0}{dj}
\edots{pi}{d0}
\edots{pi}{dm}
\edots{pl}{dj}
\edots{pl}{dm}
\edots{d0}{t}
\edots{dm}{t}
\end{tikzpicture}
\caption{
\label{fig:flow}
Illustration of a flow network corresponding to a Fixed Maximum Carpool Matching{} instance.}
\end{figure}
\begin{observation}
For every integral flow $f$ in $N$, there is a carpool matching $M$ on $G$ with
the same weight.
\end{observation}
\begin{proof}
Consider the carpool matching $(P, D, M^f)$, where
$$ M^f = \{(p, d) \in A_{pd} : f(p, d) = 1\} $$
one can verify that this is indeed a matching with the same weight as $f$.
\end{proof}
\begin{observation}
For every carpool matching $(P, D, M)$ on $G$, there exists a flow $f$ on $N$
with the same weight.
\end{observation}
\begin{proof}
Consider the flow function
\begin{align*}
f(s, p_i) & = \dout(p_i) \\
f(p_i, d_j) & =
\begin{cases}
1 & \text{if } (p_i, d_j) \in M \\
0 & \text{otherwise}
\end{cases} \\
f(d_j, t) & = \din(d_j)
\end{align*}
It is easy to verify, that $f$ is indeed a flow function.
Also, observe, that by construction,
the weight of $f$ equals to the weight of the matching.
\end{proof}
As we mentioned,
the maximum weight flow problem can be solved efficiently,
and so is the Fixed Maximum Carpool Matching{} problem.
It is worth mentioning, that it is possible that in a maximum weight flow,
some of the arcs will have no flow at all,
that is, it is possible that in a Fixed Maximum Carpool Matching{}
some of the passengers and drivers will be unmatched.
\section{Unweighted Carpool Matching{}}
\label{sec:uwcm}
In this section we present a local search algorithm for the unweighted
variant of the problem.
We show that the approximation ratio of this algorithm is $2$ and give an example
to show that our analysis is tight.
Given a directed graph $G = (V, A)$,
and a capacity function ${c : V \rightarrow \mathbb{N}}$,
In the \textsc{Unweighted Carpool Matching{}} problem,
we seek for a matching that maximizes the size of $M$.
We now present a simple local search algorithm for the problem.
The algorithm maintains a feasible matching through its execution.
In every iteration of the algorithm, the size of $M$ increases.
The algorithm terminates, when no further improvement can be made.
Recall that the Fixed Maximum Carpool Matching{} can be solved efficiently.
Let $M = \text{opt}_{fixed}(P, D)$ be an optimal solution of the
Fixed Maximum Carpool Matching{} problem.
For a given matching $M$, define the following sets:
\begin{itemize}
\item $P^M = \{v : \dout(v) = 1\}$
\item $D^M = \{v : \din(v) > 0\}$
\item $D^M_c = \{v : \din(v) = c(v)\}$
\item $F^M = \{v : \din(v) = \dout(v) = 0\}$
\end{itemize}
We refer to the vertices in these sets as, \emph{passenger},
\emph{driver}, \emph{saturated driver}, and \emph{free vertex} respectively.
The local search algorithm, in every iteration,
tries to improve the current matching,
by switching a passenger or a free vertex into a driver
and compute an optimal fixed matching.
The local search algorithm is described in
Algorithm~\ref{alg:local}.
\begin{algorithm}
\SetKw{True}{true}
\SetKw{False}{false}
\KwIn{$G = (V, A)$, $c : V \rightarrow \mathbb{N}$}
\KwOut{$M$}
$M \leftarrow \emptyset$ \\
\Repeat{done}{
\label{line:outerloop}
$done \leftarrow{}$ \True \\
\For{$v \in (V \setminus D^M)$}{
$D \leftarrow D^M \cup \{v\}$ \\
$P \leftarrow V \setminus D$ \\
$M' = \text{opt}_{fixed}(P, D)$ \\
\If{$|M'| > |M|$}{
$M \leftarrow M'$ \\
$done \leftarrow{}$ \False \\
}
}
}
\Return{$M$}
\caption{
\label{alg:local}
Local Search}
\end{algorithm}
First, observe that the outer loop on line~\ref{line:outerloop} of the local search algorithm
can be executed at most $n$ times,
where $n$ is the total number of vertices,
this is because the loop is executed only when there was an improvement,
and this can happen at most $n$ times.
Also, observe that the body of this loop can be computed in polynomial time,
and we can conclude that Algorithm~\ref{alg:local} runs in polynomial time.
We now prove that the local search algorithm achieves an approximation ratio of $2$.
Let $M$ be a matching found by the local search algorithm,
and let $M^*$ be an arbitrary but fixed optimal matching.
Observe that every arc in $M^*$ has at least one end point in $M$, formally:
\begin{observation}
If $(u,v) \in M^*$, then $\{u,v\} \cap (P^M \cup D^M) \neq \emptyset$
\end{observation}
\begin{proof}
If this is not the case, Algorithm~\ref{alg:local} can improve $M$
by adding the arc $(u,v)$.
\end{proof}
Now, with respect to $M$, the optimal solution can not match two free vertices to the same
passenger, formally:
\begin{observation}
\label{observation:one-free}
If $(p,d) \in M$, $f_1, f_2 \in F^M$, and $(f_1, p), (f_2, p) \in M^*$, then $f_1 = f_2$.
\end{observation}
\begin{proof}
If this is not the case, Algorithm~\ref{alg:local} can improve $M$
by removing the arc $(p,d)$ and adding the arcs $(f_1, p), (f_2, p)$.
\end{proof}
Finally, with respect to $M$, the optimal solution can not match a free vertex to a driver
that is not saturated, formally:
\begin{observation}
\label{observation:saturated}
If $(f,d) \in M^*$, $f \in F^M$, and $d \in D^M$, then $d \in D^M_c$.
\end{observation}
\begin{proof}
If this is not the case, once again, Algorithm~\ref{alg:local} can improve $M$
by adding the arc $(f,d)$.
\end{proof}
To show that Algorithm~\ref{alg:local} is 2-approximation,
consider the charging scheme that is illustrated in Figure~\ref{fig:charging}:
Load every arc $(p,d) \in M$ with 2 coins,
place one coin on $p$ and one coin on $d$.
Observe that every vertex $p \in P^M$ is loaded with one coin,
and every vertex $d \in D^M$ is loaded with $\din(d)$ coins.
Now, pay one coin for every $(u,v) \in M^*$, charge $u$ if $u \in P^M \cup D^M$,
otherwise ($v \in P^M \cup D^M$) charge $v$.
Clearly, every arc in $M^*$ is paid.
We claim that no vertex is overcharged.
\begin{figure}
\centering
\begin{tikzpicture}[
very thick,
->,
every pin arc/.style={
-,
very thin,
decorate,
decoration={snake},
black!60,
}]
\tikzset{
opt/.style={blue, dashed},
d/.style={default node, draw=red, -},
p/.style={default node, draw=orange, dashed,-},
f/.style={default node, draw=gray, dotted,-},
}
\draw[] (3,1.3) -- (3.4,1.3) node[right]{\tiny $M$};
\draw[opt] (3,1) -- (3.4,1) node[right]{\tiny $M^*$};
\draw[p] (3,.7) -- (3.4,.7) node[right]{\tiny $P^M$};
\draw[d] (3,.4) -- (3.4,.4) node[right]{\tiny $D^M$};
\draw[f] (3,.1) -- (3.4,.1) node[right]{\tiny $F^M$};
\begin{scope}[every node/.style={d}]
\node(3)[pin=above right:{\small 2\$}] at(0,.5) {3};
\node(7)[pin=below right:{\small 2\$}] at(-1.5, -1) {7};
\end{scope}
\begin{scope}[every node/.style={p}]
\node(1)[pin=above left:{\small 1\$}] at(-1,1) {1};
\node(2)[pin=right:{\small 1\$}] at(.8,-.2) {2};
\node(4)[pin=left:{\small 1\$}] at(-2,0) {4};
\node(5)[pin=right:{\small 1\$}] at(-.4,-1.2) {5};
\end{scope}
\begin{scope}[every node/.style={f}]
\node(8) at(-2.8,-1.6) {8};
\node(9) at(-2,-2.2) {9};
\node(10) at(.3,-2.2) {10};
\end{scope}
\begin{scope}
\draw (1) to (3);
\draw (2) to (3);
\draw (4) to (7);
\draw (5) to (7);
\end{scope}
\begin{scope}[opt]
\draw (1) to (4);
\draw (8) to (7);
\draw (9) to (7);
\draw (10) to (5);
\draw (2) to (5);
\draw (3) to (5);
\end{scope}
\end{tikzpicture}
\caption[]{
\label{fig:charging}
Charging Scheme: \\
1. vertices $1,2,4,5$ are loaded with 1\$ each and vertices $3,7$ with 2\$ each. \\
2. vertex 1 pays for the arc $(1,4)$. \\
3. vertex 5 pays for the arc $(10,5)$. \\
4. vertex 7 is saturated. It pays for arcs $(8,7)$ and (9,7).
}
\end{figure}
\begin{observation}
\label{observation:p-not-charged}
If $u \in P^M$, then $u$ is not overcharged.
\end{observation}
\begin{proof}
If $u \in P^{M^*}$, then it is only charged once, otherwise,
if $u \in D^{M^*}$, then it is only charged for arcs $(w, u)$ where $w \in F^M$,
and by Observation~\ref{observation:one-free}, there is at most one such arc.
\end{proof}
\begin{observation}
\label{observation:d-not-charged}
If $u \in D^M$, then $u$ is not overcharged.
\end{observation}
\begin{proof}
If $u \in P^{M^*}$, then it is only charged once,
if $u \in D^{M^*}$, then it is only charged for arcs $(w, u)$ where $w \in F^M$,
if such arcs exists, then by observation~\ref{observation:saturated}, $u$ is saturated,
and can not be overcharged.
\end{proof}
\begin{theorem}
Algorithm~\ref{alg:local} is 2-approximation
\end{theorem}
\begin{proof}
We use a charging scheme where we manage to pay 1 coin for each arc in $M^*$
by using at most $2|M|$ coins.
\end{proof}
To conclude this section, we show that our analysis is tight.
Consider the example given in Figure~\ref{fig:localtight}.
Assume, in this example, that there are no capacity constraints,
if the local search algorithm starts by choosing vertex $3$ to be a driver,
then the returned matching is the single arc $(2,3)$.
At this point, no further improvement can be done.
The optimal matching, on the other hand, is $\{(1, 2), (3, 2)\}$.
The path in the example can be duplicated to form an arbitrary large graph (forest).
\begin{figure}
\centering
\begin{tikzpicture}[every node/.style={default node}]
\node(a) at (0,0) {$1$};
\node(b) at (2,0) {$2$};
\node(c) at (4,0) {$3$};
\draw[->, dashed, very thick] (a) -- (b);
\draw[<->, very thick](b) -- (c);
\end{tikzpicture}
\caption{
\label{fig:localtight}
Local Search - Worst Case Example
}
\end{figure}
\section{Maximum Carpool Ma\-tching{}}
\label{sec:cm}
\subsection{Super Matching}
A super-matching is a relaxed variant of the Maximum Carpool Ma\-tching{} problem
where every node can act both as a driver and as a passenger.
Formally, given a directed graph $G = (V, A)$,
a capacity function $ c: V \rightarrow \mathbb{N} $,
and a weight function $w : A \rightarrow \mathbb{R}$,
a \emph{super-matching} is a set $M \subseteq A$,
under the constraint that $\forall v \in V$,
$\din(v) \leq c(v)$, and $\dout(v) \leq 1$.
Clearly, the following observation holds:
\begin{observation}
\label{ob:matching is super}
Every matching $(P, V, M)$ is a super-matching $M$
\end{observation}
A maximum super matching can be found efficiently by the following reduction
to a maximum weight flow problem:
Let $N = (G', s, t, c', w')$ be a flow network, where
\begin{align*}
G' & = (P \cup D \cup \{s, t\}, A_{sp} \cup A_{pd} \cup A_{dt}) \\
P & = \{p_v : v \in V\} \\
D & = \{d_v : v \in V\} \\
A_{sp} & = \{ (s, p_v) : p_v \in P \} \\
A_{pd} & = \{ ((p_u, d_v)) : (u, v) \in A \} \\
A_{dt} & = \{ (d_v, t) : d_v \in D \} \\
c'(s, p_v) & = c'(p_u, d_v) = 1 \\
c'(d_v, t) & = c(v) \\
w'(p_u, d_v) & =
\begin{cases}
w(u, v) & \text{if } (p_u, d_v) \in A_{pd} \\
0 & \text{otherwise}
\end{cases}
\end{align*}
That is,
we construct a bipartite graph where the left side represents each vertex
in $V$ being a passenger,
and the right side represents each vertex in $V$ being a driver.
Figure~\ref{fig:cm-flow} illustrates this flow network.
\begin{figure}
\centering
\begin{tikzpicture}[every node/.style={default node}]
\node(s) at (0,0) {s};
\node[draw=none]() at (3,2.2) {$P$};
\node(p0) at (3,1.6) {$p_0$};
\node[draw=none](pdots1)at (3,.8) {$\vdots$};
\node(pi) at (3,0) {$p_i$};
\node[draw=none](pdots2)at (3,-.8) {$\vdots$};
\node(pl) at (3,-1.6) {$p_n$};
\node[draw=none]() at (7,2.2) {$D$};
\node(d0) at (7,1.6) {$d_0$};
\node[draw=none](pdots) at (7,.8) {$\vdots$};
\node(dj) at (7,0) {$d_j$};
\node[draw=none](pdots) at (7,-.8) {$\vdots$};
\node(dm) at (7,-1.6) {$d_n$};
\node(t) at (10,0) {t};
\draw[->] (s) -- (pi)
node[label above] {$w' = 0$}
node[label below] {$c' = 1$};
\draw[->] (pi) -- (dj)
node[label above, above=-5mm] {$w' = w(i, j)$}
node[label below] {$c' = 1$};
\draw[->] (dj) -- (t)
node[label above] {$w' = 0$}
node[label below, below=-3mm] {$c' = c(j)$};
\newcommand{\edots}[2]{
\path (#1) -- (#2)
node[label, pos=0.1, anchor=center] {$\cdots$}
node[label, pos=0.9, anchor=center] {$\cdots$};
}
\edots{s}{p0}
\edots{s}{pl}
\edots{p0}{d0}
\edots{p0}{dj}
\edots{pi}{d0}
\edots{pi}{dm}
\edots{pl}{dj}
\edots{pl}{dm}
\edots{d0}{t}
\edots{dm}{t}
\end{tikzpicture}
\caption{
\label{fig:cm-flow}
Illustration of the flow network that is used to find a super-matching.
}
\end{figure}
One can verify that this is indeed a (integral) flow network and that there is a
straight forward translation between a flow and a super matching with the same weight.
\subsection{3-approximation}
We now present a 3-approximation algorithm for the \textsc{Maximum Carpool Ma\-tching{}} problem.
This algorithm acts in two phases.
In the first phase it computes a maximum super-matching of $G$,
in the second phase it decomposes the super-matching into 3 feasible
carpool matching and output the best of them.
We now describe how a super-matching can be decomposed into 3 feasible carpool
matching.
First, consider the graph obtained by an optimal super-matching.
Recall that in a super matching the out degree of every vertex is at most 1,
that is, the graph obtained by an optimal super matching is a pseudoforest -
every connected component has at most one cycle.
We now eliminate cycles from the super-matching by removing one edge from every
connected component.
It is easy to see that the resulting graph is a forest of anti-arborescences.
Each of these anti-arborescences can be, in turn, decomposed into two disjoint
feasible carpool matching.
This can be done, for example, by coloring each such anti-arborescences with two
colors, say red and green, and then consider the two solutions: one where the
green nodes are the drivers, and the other where the red nodes are the drivers.
We describe the algorithm in Algorithm~\ref{alg:cm3},
and illustrate it in Figure~\ref{fig:spanning-bipartite-graph}.
\begin{algorithm}[t]
\KwIn{$G = (V, A), c : V \rightarrow \mathbb{N}, w : A \rightarrow \mathbb{R}$}
\KwOut{$(M \subseteq A)$}
$M \leftarrow \emptyset$ \\
$G' = (V, A') \leftarrow \text{superMatching($G$)}$ \\
\For{every connected component $C_i = (V_i, A_i) \in G'$}{
Eliminate the cycle in $C_i$ by removing an arc $a_i$ \\
Decompose the remains anti-arborescences into two solutions, $M^i_1$, $M^i_2$ \\
$M \gets M \cup \argmax_{F \in \{ \{e\}, M_1, M_2 \}}{w(F)}$
}
\Return $M$
\caption{
\label{alg:cm3}
SuperMatching}
\end{algorithm}
\begin{figure}
\centering
\tikzset{
span/.style={every node/.style={default node}, very thick},
L/.style={red, dashed},
R/.style={draw=blue},
}
\subfloat[][]{
\label{subfloat:graph}
\begin{tikzpicture}[span, ->]
\node(1) at (0,0) {1};
\node(2) at (2,0) {2};
\node(3) at (0,2) {3};
\node(4) at (2,2) {2};
\node(5) at (1,3.5) {1};
\draw(1) -- node[label, below]{4} (2);
\draw(1) -- node[label, above]{3} (3);
\draw(1) -- node[label, above]{5} (4);
\draw(2) -- node[label, above]{2} (4);
\draw(3) -- node[label, above]{2} (5);
\draw(4) -- node[label, above]{1} (3);
\draw(5) -- node[label, above]{4} (4);
\end{tikzpicture}}
\hfill\subfloat[][]{
\label{subfloat:super}
\begin{tikzpicture}[span, ->]
\node(1) at (0,0) {1};
\node(2) at (2,0) {2};
\node(3) at (0,2) {3};
\node(4) at (2,2) {2};
\node(5) at (1,3.5) {1};
\draw(1) -- node[label, below]{4} (2);
\draw(2) -- node[label, above]{2} (4);
\draw(3) -- node[label, above]{2} (5);
\draw(4) -- node[label, above]{1} (3);
\draw(5) -- node[label, above]{4} (4);
\end{tikzpicture}}
\hfill\subfloat[][]{
\label{subfloat:spanning}
\begin{tikzpicture}[span, ->]
\node[L](1) at (0,0) {1};
\node[R](2) at (2,0) {2};
\node[L](3) at (0,2) {3};
\node[L](4) at (2,2) {2};
\node[R](5) at (1,3.5) {1};
\draw(1) -- node[label, below]{4} (2);
\draw(2) -- node[label, above]{2} (4);
\draw(3) -- node[label, above]{2} (5);
\draw(5) -- node[label, above]{4} (4);
\end{tikzpicture}}
\hfill\subfloat[][]{
\label{subfloat:matching}
\begin{tikzpicture}[span, ->]
\node[L](1) at (0,0) {1};
\node[R](2) at (2,0) {2};
\node[L](3) at (0,2) {3};
\node[L](4) at (2,2) {2};
\node[R](5) at (1,3.5) {1};
\draw(1) -- node[label, below]{4} (2);
\draw(3) -- node[label, above]{2} (5);
\end{tikzpicture}}
\hfill
\caption[]{
\label{fig:spanning-bipartite-graph}
Illustration of the SuperMatching algorithm:
\subref{subfloat:graph} a directed graph.
\subref{subfloat:super} a maximum super-matching.
\subref{subfloat:spanning} an anti-arborescences:
$M_1$ is the set of arcs exiting red, dashed vertices,
and $M_2$ is the set of arcs exiting blue vertices.
\subref{subfloat:matching} a feasible carpool matching with total value of 6.
}
\end{figure}
\begin{theorem}
Algorithm~\ref{alg:cm3} achieves a 3-approximation ratio.
\end{theorem}
\begin{proof}
Let $M_a = \bigcup_i \{a_i\}$ be the set of all removed arcs in the cycle
elimination phase.
Let $M_1 = \bigcup_i M^i_1$, and $M_2 = \bigcup_i M^i_2$.
Clearly, $M_a \cup M_1 \cup M_2 = A'$,
and that $\max(w(M_a), w(M_1), w(M_2)) \geq
\frac{w(A')}{3}$.
The observation that the weight of a maximum super-matching is an upper bound on
the weight of a maximum carpool matching finishes the proof.
\end{proof}
To see that our analysis is tight, consider the example in
Figure~\ref{fig:3cm-tight-fig}.
Assume, for the given graph in the figure,
that all weights are 1 and that there is no capacity constraint.
The maximum matching, then, is 3 ($\{(1,4), (2,4), (3,4)\}$),
but the algorithm can return the super matching $\{(1,2), (2,3), (3,1)\}$ from which
only one arc can survive.
\begin{figure}
\centering
\begin{tikzpicture}
\node(n1)[default node] at (0,0) {1};
\node(n2)[default node] at (2,0) {2};
\node(n3)[default node] at (4,0) {3};
\node(n4)[default node] at (2,1.1) {4};
\draw[->, very thick] (n1) -- (n2);
\draw[->, very thick] (n2) -- (n3);
\draw[->, very thick] (n3) to[bend left] (n1);
\foreach \i in {1,...,3}
\draw[->, dashed, very thick] (n\i) -- (n4);
\end{tikzpicture}
\caption{
\label{fig:3cm-tight-fig}
Super Matching Algorithm, worst case example
}
\end{figure}
\bibliographystyle{plain}
|
\section{Introduction}
Tight correlations between the masses of super massive black holes (SMBH; $M_\bullet > 10^6\,M_\odot$) and properties of the stellar component of their host galaxies are well established. These connect stellar bulge properties, such as the velocity dispersion $\sigma_{\rm{sph}}$ \citep[e.g.,][]{Ferrarese2000, Gebhardt2000,Tremaine2002, Gueltekin2009, Graham2011}, the luminosity $L_{\rm{sph}}$ \citep[e.g.,][]{Kormendy1995, McLure2001, Gueltekin2009, Schulze2011, Kormendy2013} and the stellar bulge mass $M_{\star,\rm{bulge}}$ \citep[e.g.,][]{Magorrian1998, McLure2002, Marconi2003, Haering2004, Beifiori2012} with the SMBH mass $M_\bullet$.
The existence of these relations support the idea of a coordinated co-evolution of SMBHs and their host galaxies by a common physical mechanism.
One mechanism proposed to explain this relates black holes (BH) and stellar mass growth via feedback processes from active galactic nuclei (AGN) through momentum or energy-driven winds \citep{Silk1998, Fabian1999, King2003,Wyithe2003, Murray2005, DiMatteo2005, Croton2006, Bower2006, Hopkins2006, Somerville2008}.
On the other hand, \citet{Peng2007} and \citet{Jahnke2011} demonstrated that merger averaging of galaxy stellar and SMBH mass creates the correlation between both quantities via a statistical convergence process rather than a physical process.
Assuming that BH masses and stellar masses have initially uncorrelated distributions, hierarchical merging can create the scaling relations we see today without invoking any kind of physical mechanism connecting both quantities.
In this framework a need for a physical connection between the bulge and the SMBH via AGN feedback or other mechanisms does not seem to be necessary.
Although these correlations have been known for more than a decade, the dominant process that engineered them is still under debate \citep[see][for a discussion]{Kormendy2013}.
The problem is compounded at high redshifts where BH masses cannot be measured directly, but must be inferred from emission line widths. Furthermore, the strong emission of the nucleus at large distances severely limits the ability to measure host galaxy properties. Measuring the bulge stellar mass in those systems requires color information, which is mingled with the spectrum of the bright nucleus. Velocity dispersion measurements suffer from the presence of AGN emission lines. Studies of the $M_\bullet-\sigma$ relation have been carried out up to redshifts of $z\sim0.6$ \citep[e.g.][]{Woo2008, Canalizo2012, Harris2012, Hiner2012}, while studies of the $M_\bullet-M_{\star,\rm{bulge}}$ relation reached redshifts up to $z\sim6$ \citep[e.g.][]{Walter2004, Wang2010, Targett2012}.
These studies at high redshift have very limited sample sizes; many also used potentially biased tracers (e.g., the most luminous quasars) for the BH populations. They might not represent the full galaxy and BH populations at high redshift.
To overcome the systematics that are associated with sample selection and the difficulties with high redshift data, we turn towards a more statistical approach to analyze the prospect of BH and galaxy co-evolution.
In this study we focus on the global properties of the whole galaxy and BH population by calculating the evolution of the total stellar mass and BH mass density (SMD and BHMD, respectively) over redshifts $z=0-5$.
This method has been applied before by \citet{Zhang2012} at $z\leq1.2$. At these redshifts it is possible to estimate not only the total stellar mass density but the bulge stellar mass density from bulge to total mass ratios and morphology distributions.
However, at redshifts beyond $z\approx2$ galaxies appear to be significantly different \citep{vanDokkum2008} and bulge to total mass ratios as well as morphology distributions are unconstrained by observations. Therefore we calculate the total stellar mass density (SMD) rather than the bulge mass density.
\citet{Laesker2014b} investigated the $M_\bullet-L_{\rm{sph}}$ relation using deep K-band photometry finding a linearly proportional relation between SMBH masses and total galaxy luminosity ($M_\bullet-L_{\rm{tot}}$) with comparable scatter to the $M_\bullet-L_{\rm{sph}}$ relation. The authors suggest that the total instead of the bulge luminosity (mass) might be the driving factor in the co-evolution of SMBHs and their hosts.
More recently \citet{Reines2015} investigated the local $M_\bullet-M_{\star,\rm{host}}$ relation in a sample of broad-line AGN in the local universe, complementary to \citet{Laesker2014b}, finding a clear correlation between BH mass and total stellar mass.
The normalization of this relation is, however, by an order of magnitude lower.
We calculate the SMD in two distinct ways, first using stellar mass functions from various studies, secondly adopting the star formation rate density of \citet{Madau2014} and integrating it across cosmic time.
The BHMD is estimated using quasar luminosity functions (QLFs) as tracers of the accretion history of bright quasar phases. \citet{Soltan1982} first put forward the argument that the BHMD from bright quasars phases can be inferred from the energy density of photons via a mass-to-light energy conversion efficiency \citep[see also][]{Chokshi1992}.
We devote Section\,\ref{sec_SMD} to derive the SMDs including uncertainties and compare our results with estimates from other authors. In Section\,\ref{sec_BHMD} we continue with the calculation of the BHMD in a similar fashion. We then proceed with the analysis of the combined data in Section\,\ref{sec_relation} and present the relation between both quantities derived in the previous chapters. Section\,\ref{sec_discussion} discusses implications of the presented cosmic evolution of SMD and BHMD and compares our results to those of the EAGLE and Illustris simulations. We summarize our findings in Section\,\ref{sec_conclusion}.
For the calculations we adopt the cosmology that the SMFs and QLFs were determined in, which is mostly a $\Lambda$-CDM cosmology parameterized by $h=0.7$, $\Omega_\Lambda=0.7$ and $\Omega_{\rm{M}}=0.3$. Only in the case of the QLF of \citet{Palanque2013} the cosmological parameters are slightly different, $h=0.71$, $\Omega_\Lambda=0.734$ and $\Omega_{\rm{M}}=0.267$. This resulting difference in the BHMD of $5.8\%$ at z=3 is much smaller than the $1\sigma$ uncertainties at this redshift and thus negligible.
\section{The cosmic stellar mass density (SMD)} \label{sec_SMD}
\subsection{Calculating the SMD Using Stellar Mass Functions}
A stellar mass function $\Phi_{\rm{SMF}}(z)$ (SMF) describes the number density of galaxies $n_{\rm{gal}}$ per mass interval ($M_{\rm{gal}},M_{\rm{gal}}+\mathrm{d} M_{\rm{gal}})$ in a cosmic volume at a given redshift $z$.
SMFs are built by estimating the individual masses of galaxies in large surveys via population synthesis modeling. Assumptions about the galaxy (e.g. initial mass function (IMF), star formation history, stellar metallicity distribution, age, etc.) and its stellar mass are used to build model SEDs that are fitted to the actual galaxy SED. The best fit yields a stellar mass estimate for each galaxy, which are then compiled to build a SMF for the full galaxy sample. Note that the choice of IMF has a strong impact on the SMF.
Stellar mass functions are most commonly described by single or double Schechter functions \citep{Schechter1976,Baldry2008}. They consist of a single/double power law in mass that turns into a falling exponential above a characteristic mass scale $M^*$.
Most often the stellar mass distributions are divided into redshift bins for which the best fit parameters are estimated assuming one of the above functional forms.
Once the SMF is defined, the SMD $\rho_{\rm{gal,\star}}(z)$ between the stellar mass integration limits, $M_{\rm{gal,\star}}$ and $M_{\rm{gal,\star}} + \Delta$, can then be computed by a simple integration,
\begin{equation}
\rho_{\rm{gal,\star}}(z) = \int_{M_{\rm{gal,\star}}}^{M_{\rm{gal,\star}} + \Delta} M \Phi_{\rm{SMF}}(M,z) \mathrm{d} M \label{eq_calcSMD} \ .
\end{equation}
\subsection{Stellar Mass Functions}
We use four recent measurements of the SMF to calculate the SMD in all available redshift bins. A summary of the most important characteristics is provided in Table\,\ref{tab_smfsummary}. For our purpose we rescaled all calculated SMD values to a Salpeter IMF.
For near up to intermediate redshifts ($z<4$) we used the SMFs of \citet{Bielby2012, Ilbert2013} and \citet{Muzzin2013}.
The two latter works use data from the UltraVista/COSMOS field to determine quiescent and star-forming SMFs in the redshift range of $0.2 < z < 4.0$. The UltraVista/COSMOS is the largest galaxy dataset to date and therefore provides the most complete estimates of the SMF. Although both works base their SMFs on a similar data set the authors employ different analysis methods. We deliberately include both SMFs in our analysis to use the robustness of the underlying sample to derive the SMDs and furthermore display the effects that different analysis methods have on the SMDs. We use the best fit parameters of \citet[their Table\,2]{Ilbert2013} and \citet[their Table\,7]{Muzzin2013}.
The SMF of \citet[their Table\,7]{Bielby2012} is based on data from the four Canada-France-Hawaii Telescope Legacy Survey (CFHTLS) deep fields augmented by new near-infrared data from the WIRCam Deep Survey. In comparison to most other SMF estimates the data from this sample is not encompassed in the UltraVista/COSMOS fields and therefore independent of the SMF of \citet{Ilbert2013} and \citet{Muzzin2013}. The four different fields help to reduce uncertainties due to cosmic line of sight variations. The SMF is determined over a redshift range of $0.2 < z < 2.0$.
At higher redshifts ($z>4$) we adopt the SMF of \citet[their Table\,2]{Caputi2011} which is determined at redshifts $3 < z < 5$ using data from the UKIRT Infrared Deep Survey (UKIDSS) Ultra Deep Survey (UDS). This study's IRAC galaxy selection avoids the potential bias of UV selection against older or dustier galaxies. However, the depth of the IRAC data limits the direct detections to a higher stellar mass completeness limit.
\subsection{Integration Limits}
For the high mass integration limit in Eq.\,\ref{eq_calcSMD} we adopt a value of $10^{13}\,M_\odot$. Due to the exponential decline of the SMF at high masses the SMDs are complete at the $0.001\%$ level if this value is adopted. It is also a common value in the literature \citep[e.g.][]{Caputi2011,Ilbert2013, Muzzin2013} which again ensures comparability of our calculated SMDs.
The low mass limit of the SMFs faces completeness issues because of the survey's limited sensitivity. Below a certain flux limit galaxies simply cannot be detected anymore. Mass completeness is not as well defined as luminosity completeness due to the broad range of mass to light ratio values that galaxies can exhibit. We decided to use a common generic lower mass limit of $10^8\,M_\odot$ to make our results comparable to other studies \citep[e.g.][]{Caputi2011,Ilbert2013, Muzzin2013}. Unfortunately this mass limit does not represent the sensitivities of the different SMFs and thus introduces systematics by extrapolating below the mass completeness limit.
However, since the low mass slopes of the SMFs are flatter than of galaxy luminosity functions, the impact of the lower mass limit on the SMD is not as big as it would be for the star formation rate density.
To test the robustness we varied the lower integration boundary between$10^7$ to $10^9\,M_\odot$ and found that the SMDs of two of the SMFs \citep{Ilbert2013, Muzzin2013} are quite robust against this variation, while the other \citep{Bielby2012, Caputi2011} do show a non negligible dependence on the lower mass integration limit. Hence adopting the value of $10^8\,M_\odot$ as our lower mass integration limit, could bias our results of the SMD.
\subsection{Error estimation}
We estimate our uncertainties on the SMDs by using a Monte Carlo method.
For each parameter of the SMF we build a Gaussian distribution with the reported mean and $1\sigma$ uncertainty. Whenever asymmetric uncertainties were quoted, we use the average of the upper and lower uncertainty as our symmetric $1\sigma$ uncertainty for the Gaussian, because the multi dimensional distribution functions of all parameters were not available.
For each realization of the SMF all parameters are randomly drawn from these distributions. Using Eq.\ref{eq_calcSMD} we calculate the SMD from this randomly drawn SMF.
After calculating ten thousand realizations of the SMD per SMF per redshift bin, we build cumulative distributions of the stellar mass densities and fit them with a cumulative Gaussian distribution to derive the mean and the $1\sigma$ uncertainties.
\subsection{Stellar Mass Densities from Stellar Mass Functions}
We present all calculated SMDs in Figure\,\ref{figure_smd}. Below a $z\approx1$ the cosmic SMD values seem to level off. Above this redshift all SMDs start to decline towards higher redshifts while the uncertainties in the SMD increase strongly at redshifts beyond $z>3$ in all adopted SMFs. The error bars along the redshift axis represent the redshift bins in which the original SMFs were determined.
In Table\,\ref{tab_SMDresults} we show our results of the SMD and compare them with the results quoted in \citet{Madau2014}. Our main results have uncertainties obtained in the Monte Carlo process outlined above. They are shown in the first column of the table. The second column shows the SMD based on the best fit mean parameters of the SMF. The third column contains the SMD values from \citet{Madau2014} to compare with.
Our Monte Carlo results match the literature values well at at all but the highest redshift bins. The values for the SMD of \citet{Bielby2012, Ilbert2013, Muzzin2013} were rescaled to a Salpeter IMF and we believe that the differences to the values of \citet{Madau2014}, which are on the order of $0.2-0.3\,\rm{M}_\odot\, \rm{Mpc}^{-3}$, are due to this process.
The uncertainties on our Monte Carlo SMD values are higher since the covariances of the best fit SMF parameters were not included in the publication. Therefore our Monte Carlo approach delivers a more conservative estimate of the uncertainties.
\begin{figure}[ht]
\includegraphics[width=0.45\textwidth]{figure1.pdf}
\caption{The colored dots and error bars along the ordinate display the Monte Carlo mean SMD and the corresponding $1\sigma$ uncertainties. The error bars along the abscissa show the redshift bins. The black lines show the SMD based on the cosmic SFRD of \citet{Madau2014} with various values for the return fraction $R$.}
\label{figure_smd}
\end{figure}
\begin{table}[ht]
\centering
\caption{The Calculated SMDs Compared to Values from the Literature.}
\label{tab_SMDresults}
\begin{tabular}{cccc}
\tableline
\tableline \\
Redshift &\multicolumn{3}{c}{$\log\rho_{\rm{gal,\star}} [\rm{M}_\odot\, \rm{Mpc}^{-3}]$} \\
& \footnotesize Based on &\footnotesize Based on mean &\footnotesize Comparison \\
& \footnotesize Monte Carlo fit &\footnotesize SMF parameters &\footnotesize \citet{Madau2014} \\
\tableline
& \multicolumn{2}{c}{of SMF \citep{Caputi2011} } & \\
\tableline \\
$3.00 - 3.50$ & $7.33\pm0.35$ & $7.32$ & $7.32^{+0.04}_{-0.02}$ \\
$3.50 - 4.25$ & $7.08\pm0.44$ & $7.05$ & $7.05^{+0.11}_{-0.10}$ \\
$4.25 - 5.00$ & $6.96\pm0.68$ & $6.38$ & $6.37^{+0.14}_{-0.54} $ \\
\tableline
& \multicolumn{2}{c}{of SMF \citep{Bielby2012} } & \\
\tableline \\
$0.20 - 0.40$ & $8.43\pm0.07$& $8.42$ & $8.46^{+0.09}_{-0.12}$ \\
$0.40 - 0.60$ & $8.30\pm0.04$& $8.30$ & $8.33^{+0.03}_{-0.03}$ \\
$0.60 - 0.80$ & $8.43\pm0.05$& $8.41$ & $8.45^{+0.08}_{-0.10}$ \\
$0.80 - 1.00$ & $8.39\pm0.03$& $8.39$ & $8.42^{+0.05}_{-0.06}$ \\
$1.00 - 1.20$ & $8.23\pm0.06$& $8.22$ & $8.25^{+0.04}_{-0.04}$ \\
$1.20 - 1.50$ & $8.11\pm0.03$& $8.11$ & $8.14^{+0.06}_{-0.06}$ \\
$1.50 - 2.00$ & $8.14\pm0.04$& $8.14$ & $8.16^{+0.32}_{-0.03}$ \\
\tableline
& \multicolumn{2}{c}{of SMF \citep{Ilbert2013} } & \\
\tableline \\
$0.20 - 0.50$ & $8.53\pm0.18$ & $8.52$ & $8.55^{+0.08}_{-0.09}$ \\
$0.50 - 0.80$ & $8.56\pm0.23$ & $8.44$ & $8.47^{+0.07}_{-0.08}$ \\
$0.80 - 1.10$ & $8.51\pm0.14$ & $8.47$ & $8.50^{+0.08}_{-0.08}$ \\
$1.10 - 1.50$ & $8.31\pm0.17$ & $8.30$ & $8.34^{+0.10}_{-0.07}$ \\
$1.50 - 2.00$ & $8.13\pm0.09$ & $8.12$ & $8.11^{+0.05}_{-0.06}$ \\
$2.00 - 2.50$ & $7.90\pm0.09$ & $7.90$ & $7.87^{+0.08}_{-0.08}$ \\
$2.50 - 3.00$ & $7.73\pm0.24$ & $7.70$ & $7.64^{+0.15}_{-0.14}$ \\
$3.00 - 4.00$ & $7.45\pm0.45$ & $7.33$ & $7.24^{+0.18}_{-0.20}$ \\
\tableline
& \multicolumn{2}{c}{of SMF \citep{Muzzin2013} } & \\
\tableline \\
$0.20 - 0.50$ & $8.59\pm0.10$ & $8.59$ & $8.61^{+0.06}_{-0.06}$ \\
$0.50 - 1.00$ & $8.44\pm0.04$ & $8.44$ & $8.46^{+0.03}_{-0.03}$ \\
$1.00 - 1.50$ & $8.20\pm0.04$ & $8.20$ & $8.22^{+0.03}_{-0.03}$ \\
$1.50 - 2.00$ & $7.97\pm0.05$ & $7.97$ & $7.99^{+0.05}_{-0.03}$ \\
$2.00 - 2.50$ & $7.62\pm0.09$ & $7.62$ & $7.63^{+0.11}_{-0.04}$ \\
$2.50 - 3.00$ & $7.52\pm0.23$ & $7.50$ & $7.52^{+0.13}_{-0.09}$ \\
$3.00 - 4.00$ & $7.05\pm0.72$ & $6.83$ & $6.84^{+0.43}_{-0.19}$ \\
\tableline \\
\multicolumn{4}{c}{
\begin{minipage}{1.\columnwidth}
\footnotesize \textbf{Notes.} All SMD values are rescaled to a Salpeter IMF, where it was necessary.
\end{minipage}}
\end{tabular}
\end{table}
\subsection{Stellar Mass Density derived From the Instantaneous Star Formation Rate Density}
We also infer the SMD from the best fit instantaneous star formation rate density (SFRD) $\Psi(z)$ given by Eq.\,15 in \citet{Madau2014}. Their best fit SFRD considers measured star formation rates (SFRs) in the rest-frame far UV, mid IR and far IR (see their Table\,1). We integrate $\Psi(z)$ from $z=10$ to $z=0$ using their Eq.\,2 with the return fraction $R$. The return fraction is a measure of how much stellar mass is returned to the interstellar medium during the stellar population life cycle. It is one major uncertainty from converting the SFRD to SMD. We show the range of values for the SMD by using three different values for the return fraction, $R=0.27$ for a Salpeter IMF, $R=0.41$ for a Chabrier IMF and a value of $R=0$ assuming no material is returned to the interstellar medium. The resulting three curves are shown as the solid, the dashed and the dashed-dotted black lines in Fig.\,\ref{figure_smd}. They illustrate the uncertainty associated with the SMD calculated from the SFRD. For all further purposes we use the SMD with the return fraction of $R=0.27$, which reflects a Salpeter IMF. \citet{Madau2014} state their SMD calculated from their SFRD is somewhat higher ($\sim 0.5\,\rm{dex}$) than the SMD data from SMFs at all redshifts. For a discussion about this discrepancy we refer to the original study.
The SMD calculated from the SFRD provides a SMD measurement independent to the SMFs used above.
\section{The Cosmic Black Hole Mass density Inferred from QSOs} \label{sec_BHMD}
\subsection{Calculating the Cosmic BHMD Using the Soltan Argument}
Individual black holes can grow via mass accretion or in mergers. In the latter process some black hole mass can be lost due to the emission of gravitational waves.
The BHMD, assuming that mass loss during mergers is negligible, can only grow by mass accretion. Merger processes do not change the total black hole mass in a large enough volume of space.
We can write the total accreted black hole mass density $\rho_{\bullet,\rm{acc}}(z)$ between redshifts $z_0$ and $z$ as a function of the total black hole mass growth rate $\dot{M}_{\bullet,\rm{acc}}$ in a volume of space $V$,
\begin{equation}
\rho_{\bullet,\rm{acc}}(z) \equiv \int_{z_0}^z \frac{\dot{M}_{\rm{\bullet, acc}}(z')}{V} \left(\frac{\mathrm{d} t(z')}{\mathrm{d} z'}\right) \mathrm{d} z' \label{eq_BHMDtoBHMgrowth} \ .
\end{equation}
In order to substitute the black hole mass growth rate with an observational quantity we adopt the Soltan argument \citep{Soltan1982} and assume that black holes grow only by mass accretion during bright AGN phases. The total bolometric luminosity of all accreting black holes in a volume of space $L_{\rm{bol},\rm{tot}}(z)$ can then be directly related to their overall accretion rate $\dot{M}_{\rm{acc}}(z)$, introducing an average efficiency factor of energy conversion $\epsilon$. This factor also relates the overall accretion rate with the total black hole mass growth rate $\dot{M}_{\bullet,\rm{acc}}$.
\begin{equation}
L_{\rm{bol},\rm{tot}}(z) = \epsilon\ \dot{M}_{\rm{acc}}(z)\ c^2 = \frac{\epsilon\ c^2}{1-\epsilon} \dot{M}_{\bullet,\rm{acc}} \label{eq_LboltoBHMgrowth}
\end{equation}
Inserting Eq.\ref{eq_LboltoBHMgrowth} into Eq.\ref{eq_BHMDtoBHMgrowth} and substituting the bolometric luminosity per cosmic volume with an integral over the quasar luminosity function $\Phi_{\rm{QLF}}$ we can now calculate the BHMD,
\begin{align}
\nonumber \rho_{\bullet,\rm{acc}}(z)=& \frac{1-\epsilon}{\epsilon\ c^2} \int_{z_0}^z \left(\frac{\mathrm{d} t(z')}{\mathrm{d} z'}\right)\\ & \int_{L}^{L + \Delta} L_{\rm{bol}}(L) \Phi_{\rm{QLF}}(L, z') \mathrm{d} L\ \mathrm{d} z' \label{eq_calcBHMD} \ .
\end{align}
The lower and upper luminosity integration limits are denoted by $L$ and $L + \Delta$.
This expression and the derivation have been applied many times in previous works \citep[e.g][]{Yu2002,LaFranca2005,Hopkins2007,Zhang2012}.
We do not include the BH seed masses in our definition of the BHMD. Their contribution to the BHMD at redshifts around and below $z=5$, is negligible since the accreted BH mass in bright quasar phases will be larger by orders of magnitude compared to the BH seed mass.
\subsection{Efficiency Factor of Energy Conversion}
For a rotating black hole the efficiency factor of energy conversion varies between $\epsilon \sim 0.06$ from a non-rotating black hole to $\epsilon \sim 0.31$ for a maximally rotating Kerr black hole \citep{Thorne1974}. Only theoretical arguments currently constrain the distribution function of black hole spins and therefore the distribution of efficiency factors. Above we assume an average efficiency factor for the whole black hole population allowing us to write $\epsilon/(1-\epsilon)$ in front of the integral in Eq.\ref{eq_calcBHMD} as a scaling factor. Whenever we calculate values for the BHMD we adopt a value of $\epsilon/(1-\epsilon) = 0.1$ to be comparable with previous works \citep{Yu2002,Ueda2003,Marconi2004,Hopkins2007,Zhang2012}.
\subsection{Quasar Luminosity Functions}
The calculated BHMD strongly depends on the adopted quasar luminosity functions (QLFs) and their redshift evolution. Most QLF are parameterized by a double power law,
\begin{equation}
\Phi_{\rm{QLF}} = \frac{\mathrm{d} n_{\rm{QSO}}}{\mathrm{d} \log L} = \frac{\Phi^*}{(L/L^*)^\alpha+(L/L^*)^\beta} \ ,
\end{equation}
where $\Phi^*$ is the normalization constant and $L^*$ is the characteristic luminosity where the power law index changes from $\alpha$ to $\beta$.
The QLF yields the number density of quasars $n_{\rm{QSO}}$ of a certain luminosity range if integrated over it. This distribution function, an important statistic for active galactic nuclei, is determined from wide surveys with large numbers of objects at various redshifts.
The QLF is often fitted with a continuous redshift evolution in all or a subset of its parameters $\alpha, \beta, L^*$ and $\Phi^*$.
If only the characteristic luminosity $L^*$ is varied as a function of redshift, the evolution is termed the pure luminosity evolution (PLE) model. If characteristic luminosity and normalization constant $\Phi^*$ are parameterized in redshift but independent from each other, one speaks of a luminosity evolution and density evolution model (LEDE). If the density evolution depends on the characteristic luminosity, the model is called luminosity dependent density evolution (LDDE). Some authors also vary both slopes or introduce a pivot redshift above and below which the slopes have different values.
We calculate six different BHMD evolutions to compare with the SMDs based on the following QLFs. A summary of their most important characteristics is provided in Table\,\ref{tab_qlfsummary}.
\textbf{a)} \citet{Hopkins2007} combined a large set of QLF measurements, from the rest-frame optical, soft and hard X-ray, and near- and mid-IR bands to determine a bolometric QLF. Their bolometric QLF spans a redshift range of $ z= 0-6$. The QLF is best fit by a PLE model with an additional redshift dependence of the faint and bright end slopes. The best fit values are given in their Table\,3 of \citet[``full'' model]{Hopkins2007}. The large set of QLFs folded into the determination of this bolometric QLF overcomes the bias against obscured objects in the optical wavelength range that optical single waveband QLFs suffer from.
We further adopted three optical QLFs in the g- and i-band.
\textbf{b)} \citet{Croom2009} compiled a QLF from 10637 QSOs of the 2dF-SDSS LRG and QSO survey in the redshift range $0.4 < z < 2.6$. Their g-band magnitudes reach a flux limit of 21.85 and an absolute continuum magnitude of $M_{\rm{g}}(z=2) < -21.5$.
\textbf{c)} The QLF of \citet{Ross2013}, $0.3 < z < 3.5$, measured using 22301 quasars in the i-band of the SDSS:BOSS, serves as a second optical QLF with a large number of objects over a wide field.
\textbf{d)} To extend the g-band data we also included the QLF of \citet{Palanque2013} in our analysis. Their QLF, measured in the rest frame g-band, complementing Croom et al.'s QLF with a wider redshift range, $0.68 < z < 4.0$, but with the downfall of a smaller sample size and narrower area on the sky.
We use the best fit modified LEDE model of \citet[their Table\,4]{Croom2009}, the PLE model with the pivot redshift of \citet[their Table\,7]{Palanque2013} and the first PLE model (redshift range $0.3 < z < 2.2$) in addition to the second LEDE model (DR9) of \citet[their Table\,8]{Ross2013}.
\textbf{e)} We further used the combined hard X-ray QLFs of \citet{LaFranca2005} and \citet{Fiore2012}.
In the low redshift regime ($z\leq 3.0$) we use the QLF of \citet{LaFranca2005} which was fit using a total of 508 AGN from the HELLAS2XMM sample and other published catalogs (see their Table\,1).
\citet{Fiore2012} set out to extend the results of \citet{LaFranca2005} and placed constraints on the QLF at redshifts $3 < z < 7$ using new 4Msec Chandra observations in the Chandra Deep Field South (CDFS). Their QLF fit follows the usual double power law with a combination of luminosity and density evolution model (termed LADE), fully equivalent to the introduced LDDE model above. We use the best fit model (4) of \citet[their Table\,5]{Fiore2012} joined to the best fit model (LDDE) of \citet[][their Table 2]{LaFranca2005} at a redshift of $z=3$ to determine the BHMD.
\textbf{f)} At last we adopt another estimate of the hard X-ray QLF by \citet{Ueda2014}.
The authors of this study have compiled a very large sample of 4039 AGN detected between redshifts $z=0-5$ from a multitude of surveys (see their Table\,1). They perform a maximum likelihood method to estimate a bolometric QLF fit, parameterized using a luminosity-dependent density evolution. We use the parameters given in their Table\,4 (``Bolometric'') to calculate the BHMD for this QLF.
\subsection{K-correction and Bolometric Correction}
QLFs are a direct product of quasar fluxes observed in a certain waveband. Therefore their luminosities are wavelength dependent. In order to calculate the BHMD we need to convert the rest frame luminosity (or magnitude) to a bolometric luminosity (see Eq.\ref{eq_calcBHMD}).
However, many authors follow \citet{Richards2006} and apply a continuum K-correction to their QLFs relative to a redshift of $z_0=2$.
Hence, before we can convert the waveband dependent luminosity (or magnitudes) to the bolometric luminosity we have to apply a K-correction relative to a redshift of $z=0$ to all optical QLFs. The K-correction is waveband independent for power-law spectral energy distributions (SED). The correction for magnitudes takes the following form \citep[see][]{Richards2006},
\begin{equation}
M(z=0) = M(z=z_0) + 2.5 (1+\alpha_{\nu}) \log (1+z_0) \ .
\end{equation}
The power law slope of the SED is denoted by $\alpha_{\nu}$.
After applying the K-correction we can now use the luminosity dependent bolometric correction of \citet[Eqs.\,2 and 3]{Hopkins2007} for the B-band and the Hard X-ray to convert the optical and X-ray QLFs to bolometric luminosities.
Some of our adopted QLFs are calculated in the g- or the i-band. We use the conversions given in \citet{Ross2013} and \citet{Jester2005} to formulate them in B-band luminosities to be able to apply the bolometric corrections correctly.
\subsection{Integration limits}
In order to numerically solve Eq.\,\ref{eq_calcBHMD} one needs to set the integration limits for the luminosity as well as for the redshift evolution.
To ensure that all BHMDs are comparable with another and correspond well to galaxy masses in the range of $10^8\,M_\odot$ to $10^{13}\,M_\odot$, we adopted uniform lower and upper integration limits for the luminosity. In bolometric luminosities these limits are $10^8 L_\odot$ and $10^{18} L_\odot$. They lie beyond some of the magnitude/luminosity completeness-limits of the QLFs and thus we necessarily extrapolate the QLFs in these cases. The individual integration limits for all QLFs are given in Table\,\ref{tab_qlfintlim}.
All QLFs are necessarily extrapolated to higher redshifts where no data constrains them. However, the mass in the extrapolated regime is small compared to the BH mass growth below $z\sim5$.
Assuming two different redshifts $z_0=10, 20 $ for the start of the redshift evolution we examined the changes in the BHMD for all QLFs at a redshift of $z=5$. We found no changes at a $0.001\%$ level between $z_0=10$ and $z_0=20$. Hence, we decide to start our integration at redshift $z_0 = 10$.
\begin{table}
\scriptsize
\centering
\caption{Integration limits for the QLF in the BHMD calculation (Eq.\,\ref{eq_calcBHMD})}
\label{tab_qlfintlim}
\begin{tabular}{cc}
\tableline
\tableline
QLF Reference & QLF Integration Limits \\
\tableline
\citet{Hopkins2007} & $L_{\rm{bol}} = 10^8$ to $10^{18}\,L_\odot$ \\
\citet{Croom2009} & $M_{\rm{g}}(z=2) =-39.00$ to $-12.01$ \\
\citet{Palanque2013} & $M_{\rm{g}}(z=2) =-38.77$ to $-11.78$ \\
\citet{Ross2013} & $M_{\rm{i}}(z=2) =-38.84$ to $-11.85$ \\
\citet{LaFranca2005} & $\log L_{\rm{hX}}[\rm{erg}\,\rm{s}^{-1}] = 40.60$ to $48.31$\\
\citet{Fiore2012} & $\log L_{\rm{hX}}[\rm{erg}\,\rm{s}^{-1}] = 40.60$ to $48.31$ \\
\citet{Ueda2014} & $\log L_{\rm{bol}}[\rm{erg}\,\rm{s}^{-1}] = 41.58$ to $51.58$ \\
\tableline
\end{tabular}
\end{table}
\subsection{Correcting for Observable Quasar Population}
In order to convert an observed QLF to a bolometric QLF one also has to take in account extinction effects.
In their analysis \citet{Hopkins2007} determined the probability of observing quasars with an intrinsic luminosity $L_{\rm{bol}}$ at some observed luminosity $L$. They expressed this probability in an ``observable fraction'' $f(L)$ \citep[Eq.\,4]{Hopkins2007} with a simple power law for conversion between the intrinsic population and the observed one,
\begin{equation}
f(L) = \frac{\Phi(L)}{\Phi[L_{\rm{bol}}(L)]} = f_{46} \left( \frac{L_{\rm{bol}}}{10^{46}\rm{erg}\rm{s}^{-1}} \right)^\beta \ .
\end{equation}
We adopt this rough approximation for our work to properly convert the observed QLFs to bolometric QLFs taking in account the obscured quasar population with the factor $f(L)$. For our hard X-ray QLFs we use their corresponding values ($f_{46}=1.243$, $\beta=0.066$) while we use their values for the B-band ($f_{46}=0.26$, $\beta=0.082$) for all optical QLFs.
\subsection{Error estimation}
In order to estimate the uncertainties on the BHMD we apply the same Monte Carlo approach that we used for the SMDs.
We not only draw random values for all QLF parameters but also for the bolometric correction using the quoted uncertainties in \citet{Hopkins2007}. We do not account for uncertainties in the correction for the observable fraction. From the ten thousand realizations we calculate the median value and the 68 percentile regions.
\subsection{The calculated BHMD}
Our results for the BHMDs are portrayed in Fig.\,\ref{figure_bhmd}\,a)-f). The solid colored lines show the Monte Carlo mean BHMD at the redshifts at which the QLF was determined. The dashed colored lines indicate the redshift regimes to which we extrapolated to. We only display the redshift evolution up to $z=5$, the maximum redshift for our SMD results. The light colored areas depict the 68 percentile regions estimated from the Monte Carlo method.
\textbf{a)} The BHMD estimated from the bolometric QLF of \citet{Hopkins2007} (Fig.\,\ref{figure_bhmd}\,a) shows small uncertainties over the full redshift range. We compare our result for the local ($z=0$) BHMD with the result in the original publication in Table\,\ref{table_bhmd}. The results show excellent agreement. The small difference in the uncertainties might be a consequence of using different integration limits.
We caution against over interpreting the high redshift evolution ($z>4$) of this BHMD, since only the bright end of the underlying QLFs was determined at these redshifts. This introduces large systematic uncertainties likely underestimating the BHMD at high redshifts.
\textbf{b)} The second BHMD is calculated using the QLF of \citet{Croom2009} (Fig.\,\ref{figure_bhmd}\,b).
This BHMD falls steeply at high redshifts in contrast to all other evaluated BHMDs. It is most likely the effect of extrapolating the best fit QLF to redshifts beyond $z=2.6$, where it is not constrained by any data. We should exercise caution with these high redshift results.
On the other hand the local value of this BHMD fits well into the range of values estimated by other authors (Table\,\ref{table_bhmd}).
\textbf{c)} The results estimated from the optical QLF of \citet{Palanque2013} in Fig.\ref{figure_bhmd}\,c) show increasing uncertainties to higher redshift, while the local value has the smallest uncertainties of all five calculated BHMDs (see Table\,\ref{table_bhmd}).
\textbf{d)} The fourth BHMD (Fig.\,\ref{figure_bhmd} d) calculated from the near-IR QLF of \citet{Ross2013} shows asymmetric uncertainties in the low redshift regime that increase towards higher redshifts. Extrapolation to large redshifts is needed since the QLF was determined using data in the redshift range $0.3 < z < 3.5$. Nonetheless the high redshift evolution agrees well with all other BHMDs except the one from \citet{Croom2009} (Fig.\,\ref{figure_bhmd} b).
The $z=0$ BHMD is small compared to other values (Table\,\ref{table_bhmd}), possibly a result of having to assume the obscuration correction for the $B$-band instead of a near-IR correction.
\textbf{e)} The BHMD determined using the hard X-ray QLF of \citet{LaFranca2005} and \citet{Fiore2012} is not extrapolated for the redshift range shown. At redshift $z=3$ both QLFs are joined, which is evident from the change in the slope of the BHMD. This BHMD has high uncertainties at low redshifts, where the local BHMD value falls well in the range of determined BHMDs in this and other works.
\textbf{f)} The sixth BHMD estimated from the QLF of \citet{Ueda2014} arrives at a local value close to the other estimated BHMDs above. It's redshift evolution is also similar, while the uncertainties show medium large values at all redshifts.
Our results for the local BHMD agree well with previous determinations from other authors (Table\,\ref{table_bhmd}). The overall BHMD evolution seems to be roughly consistent throughout all panels, but panel b) which is based on the adopted QLF of \citet{Croom2009}.
\begin{table}[h]
\centering
\caption{BHMD at $z=0$ Calculated from the Adopted QLFs (Upper Section) and Compared to Previous Investigations (Lower Section).}
\label{table_bhmd}
\begin{tabular}{ccc}
\tableline
\tableline \\
&$\log(\rho_{\bullet,\rm{acc}})(z=0)$ & QLF of\\
& $[M_\odot\rm{Mpc}^{-3}]$& \\
\tableline
a)&$5.68^{+0.10}_{-0.09}$ & \citet{Hopkins2007} \\
b)&$5.68^{+0.09}_{-0.10}$ & \citet{Croom2009} \\
c)&$5.57^{+0.05}_{-0.05}$ & \citet{Palanque2013} \\
d)&$5.49^{+0.42}_{-0.10}$ & \citet{Ross2013} \\
e)&$5.57^{+0.33}_{-0.32}$ & \citet{Fiore2012,LaFranca2005} \\
f)&$5.64^{+0.15}_{-0.15}$ & \citet{Ueda2014} \\
\tableline
& & Reference\\
\tableline
&$5.51$ & \citet{LaFranca2005}\\
&$5.68 \pm 0.10$ & \citet{Hopkins2007} \\
&$5.46^{+0.07}_{-0.08}$ & \citet{Yu2002} \\
&$5.66^{+0.15}_{-0.16}$ & \citet{Marconi2004} \\
\tableline
\end{tabular}
\end{table}
\begin{figure}[h]
\includegraphics[width=0.5\textwidth]{figure2.pdf}
\caption{We present the BHMD for the various QLFs adopted. The Monte Carlo median BHMD is shown as a solid colored line at redshifts where the QLF was estimated and as a dashed colored line at redshifts to which it was extrapolated. The colored areas correspond to the 68 percentile regions on the BHMD as a function of redshift. The dashed black line in panels b)-f) corresponds to the solid line in panel a) and serves as a reference for the eye.}
\label{figure_bhmd}
\end{figure}
\section{The SMD-BHMD relation} \label{sec_relation}
\subsection{Correlation Between the BHMD and the SMD}
In Fig.\,\ref{figure_smdbhmdrelation} a)-f) we show all values for the SMDs mapped onto one BHMD as a function of redshift. The data points are colored according to their redshift with their error bars resembling the uncertainties shown in Fig.\,\ref{figure_smd} and Fig.\,\ref{figure_bhmd}.
Up to intermediate redshifts, $z\approx 3$, we identify a linear relation of the data points in all double logarithmic plots, corresponding to a power law relation for the linear quantities. At low redshifts, $z<1$, the BHMD seems to saturate while the SMD still increases.
We further add the SMD values based on the SFRD of \citet{Madau2014} and map them onto the different BHMDs. The result is the solid colored line in each of the panels. According to the general offset to higher SMDs, the colored line lies beneath the data points by $\approx 0.4\,\rm{dex}$. Its shape roughly follows the data points in each panel, dominated by the different BHMD.
Assuming a simple power law ($\rho_{\bullet,\rm{acc}} = A \cdot \rho_{\star,{\rm{gal}}}^\beta$), without a redshift evolution for the normalization $A$, for the relation between SMD and BHMD, we fit the data points using the Markov Chain Monte Carlo (MCMC) algorithm of \citet{Kelly2007}. We include the uncertainties in both quantities as well as allow for scatter in the regression relationship. We assume that the intrinsic distribution of independent variables can be modeled as a mixture of three Gaussian functions. The posterior distributions are sampled using the Metropolis-Hastings algorithm option with at least ten thousand iterations. From the posterior distributions we calculate the median value as our best fit parameter and the 68 percentile regions as our $1\,\sigma$ uncertainties.
The best fitting curves using the median parameters for slope and intercept (see Table\,\ref{table_smdbhmdrelation}) are shown as the solid black lines in Fig.\,\ref{figure_smdbhmdrelation}.
We find that there is little to no intrinsic scatter in all fits, which is probably a consequence of the large errors on the data points.
Except in the case of Fig.\,\ref{figure_smdbhmdrelation}\,b) the fit is a good representation of the data. In this particular case the data points drop steeply towards lower SMDs due to the steep BHMD evolution at high redshifts of the \citet{Croom2009} QLF. We would like to caution against over interpreting this result at $z>3$ since the underlying QLF was only determined up to $z=2.6$, a lower redshift than any of the other adopted QLFs.
The best fitting values with uncertainties are displayed in Table\,\ref{table_smdbhmdrelation}. The uncertainties on the slope and the intercept are correlated with higher uncertainties in the slope resulting in much higher uncertainties in the intercept.
The relations including the BHMDs based on \citet{Hopkins2007,Palanque2013,Ross2013} show a slope close to unity and an intercept around $\sim -3.0$. The large uncertainties in the BHMD estimated from the QLF of \citet{Ross2013} give rise to large uncertainties in the fit parameters, compared to the other BHMDs.
The fit of the relation between the SMDs and the BHMD based on \citet{Croom2009} has the largest slope of $1.53$ and a corresponding small intercept of $-7.15$. If we restrict the fitting process to values with $z<3$, where the QLF was actually determined, we obtain a median slope of $1.10$ and intercept around $-3.61$. These agree with the fit parameters of the other data sets.
The relations with BHMDs calculated from \citet{LaFranca2005,Fiore2012,Ueda2014} show slopes around $1.2-1.3$ and corresponding smaller values for the intercept.
We have learned that the BHMDs and SMDs do follow a power law relation at least up to redshifts of $z\approx3$ where the error bars become too large to confidently constrain the relation. It is well represented by a power law with a slope around unity, with its individual value depending strongly on the data set.
\begin{table}[t]
\caption{This table presents a summary of our MCMC best fit parameters of the BHMD-SMD relation assuming a linear function for the logarithmic quantities. We present the median value of the posterior distribution and the 68 percentile regions around the median for each of the six BHMDs calculated and for two redshift restricted samples of the BHMD based on the \citep{Croom2009} QLF. Our results are contrasted by the local black hole mass to bulge mass relations of \citet{Kormendy2013} and \citet{Haering2004}.}
\label{table_smdbhmdrelation}
\centering
\def1.4{1.4}
\begin{tabular}{cccc}
\tableline
\tableline
& BHMD inferred from the QLF of & Intercept & Slope \\
\tableline
a)& \citet{Hopkins2007} & $-3.00_{-0.80}^{+0.92}$ & $1.02_{-0.11}^{+0.10}$ \\
b)& \citet{Croom2009} & $-7.15_{-1.18}^{+1.53}$ & $1.53_{-0.19}^{+0.14}$ \\
&\citet{Croom2009} $z< 3.0$ & $-3.61_{-1.16}^{+1.23}$ & $1.10_{-0.16}^{+0.13}$ \\
c) &\citet{Palanque2013} & $-3.38_{-0.89}^{+0.98}$ & $1.06_{-0.11}^{+0.12}$\\
d)&\citet{Ross2013} & $-2.82_{-3.70}^{+3.36}$ & $0.98_{-0.41}^{+0.45}$ \\
e) &\citet{Fiore2012}, & & \\
&\citet{LaFranca2005} & $-5.61_{-1.91}^{+2.04}$ & $1.32_{-0.25}^{+0.23}$\\
f) &\citet{Ueda2014} & $-4.84_{-1.19}^{+1.43}$ & $1.24_{-0.18}^{0.14}$\\
\tableline
&\citet{Kormendy2013} & $-4.06\pm0.05$ & $1.16\pm0.08$ \\
&\citet{Haering2004} & $-4.12 \pm0.10$ & $1.12\pm0.06$ \\
\tableline
\end{tabular}
\end{table}
\begin{figure*}[h]
\centering
\includegraphics[width = 0.97\textwidth]{figure3.pdf}
\caption{The data points show the BHMD plotted against SMD, colored as a function of redshift. Each panel shows all SMD data versus one of the five BHMD estimations ( a) \citet{Hopkins2007}, b) \citet{Croom2009}, c) \citet{Palanque2013} (PD 2013), d) \citet{Ross2013}, e) \citet{Fiore2012,LaFranca2005}, f) \citet{Ueda2014}). The error bars show the associated 68 percentile regions/$1\sigma$ uncertainties. The colored solid lines show the SMD from the SFRD \citep{Madau2014} versus the specified BHMD. Their color code follows Fig.\,\ref{figure_bhmd} and has no relation to the redshift colored bar. We display the best fit MCMC linear relation as the solid black line (Table\,\ref{table_smdbhmdrelation}). The dashed line in panel b) is the MCMC linear fit to the data with $z<3$.}
\label{figure_smdbhmdrelation}
\end{figure*}
\subsection{The Cosmic Evolution of the Ratio of BHMD to SMD}
We now turn to analyze the redshift evolution of the logarithmic ratio of BHMD to SMD.
Our results are summarized in Fig.\,\ref{figure_bhmd_div_smd}\,a)-f).
Every panel of the figure shows the ratio of both quantities as a function of redshift.
If the BHMD and the SMD actually follow a simple power law relation with a slope of unity but with a redshift dependent normalization, this figure should show us any evolution of the normalization of this relation.
The colored data points correspond to the values of all SMDs in their respective redshift bins divided by one of the five different estimations of the BHMD. We show the average SMD (see Table\,\ref{tab_SMDresults}) as empty symbols while the MC mean SMD is over plotted in grey/color. We want to point out that they disagree at the highest redshifts which could possibly lead to a different interpretation.
The colored lines refer to the SMD calculated from the instantaneous SFRD \citep{Madau2014} divided by the BHMD, which underlines the influence of the BHMD across all panels.
Whenever the BHMD was estimated by extrapolating the underlying QLF we have grayed out the data points and show a dashed instead of a solid colored line.
We restrict panel b) to redshifts $z<3$ since the QLF of \citet{Croom2009} was only determined up to $z=2.6$.
According to the data points there is basically no redshift evolution of the logarithmic ratio within the $1\sigma$ error bars across all panels.
The BHMD to SMD ratio reaches it's maximum value at a redshift of $\sim2.2$ across all panels. Although the signature of the maximum in the generally flat evolution is very faint, it does coincide
with the maximum of merger activity and star formation.
Beyond redshifts of $z=3$ panel a),c)-f) show that the BHMD-SMD ratio slightly declines. Yet, given the large uncertainties at these redshifts the redshift evolution can still be considered consistent with being flat.
However, taking in account the error bars, our data does not support a rise of the ratio towards higher redshifts as might be expected if BH growth preceded galaxy stellar mass growth for the whole population.
\begin{figure*}[h]
\centering
\includegraphics[width = 0.95\textwidth]{figure4.pdf}
\caption{The data displays the ratio of BHMD to SMD as a function of redshift. The data points refer to the SMD data calculated from SMFs (triangles \citep{Bielby2012}, squares \citep{Ilbert2013}, circles \citep{Muzzin2013}, diamonds \citep{Caputi2011}). The panels and colors refer to the different BHMDs as ordered in Fig.\,\ref{figure_smdbhmdrelation}. The lines (dashed/solid) represent the SMD from the instantaneous SFRD \citep{Madau2014}. Wherever we had to extrapolate the QLFs in redshift to calculate the BHMD the data points are grayed out and the line is dashed. The open data points refer to the average SMD values (see Table\,\ref{tab_SMDresults}), to point out the differences between them and the MC values, especially at high redshifts. The black solid line shows the BHMD to SMD ratio of the Illustris simulation with a resolution of $1820^3$ \citep{Sijacki2015}. The black dashed line shows the BHMD to SMD ratio of the EAGLE simulation (\citet{Furlong2015}, \citet{Rosas-Guevara2016}). }
\label{figure_bhmd_div_smd}
\end{figure*}
\section{Discussion} \label{sec_discussion}
\subsection{Interpretation of the results}
In this work we use the mass densities of stellar matter and BHs to investigate co-evolution over a wide redshift range.
The SMD is the integrated average stellar mass per $\rm{Mpc}^3$ and as such does not provide any information about the underlying mass distribution. It traces foremost the galaxies which dominate the galaxy mass distribution, which are predominantly $M_\star$ ($L_\star$) galaxies. However these correspond to different kinds of systems at different redshifts.
The BHMD represents the average BH mass in a volume of one comoving $\rm{Mpc}^3$. We derived this quantity using the Soltan argument and therefore assume that the bulk BH mass growth occurs in quasar phases. Therefore the BHMD is naturally dominated by the most luminous AGN, which show the highest BH mass growth.
Although we have lost the information about the underlying BH and galaxy mass distributions, we have gained the ability to robustly estimate both quantities over a wide redshift range.
The majority of the panels in Fig.\,\ref{figure_smdbhmdrelation} show a power law correlation between BHMD and SMD below $z=3$ with a slope around unity. The same signature can be seen in Fig.\,\ref{figure_bhmd_div_smd} where the logarithmic ratio of both quantities has remarkable little to no redshift evolution up to $z=3$. We interpret this as lock-step growth of the two quantities from $z=3$ to $z=0$.
While this result does not allow us to conclude that all individual BHs and their hosts grow in lock-step in this redshift range, it does strongly suggest that as a population, the systems, which dominate the mass growth, do follow this lock-step growth.
At higher redshifts around $3<z<5$ and given the completeness of the SMFs and QLFs, the BHMD to SMD ratio does not show a strong evolution. However, at the highest redshifts the ratio of BHMD to SMD seems to decrease slightly rather than to increase. While an increase could be interpreted as generally over massive BHs compared to the local value, a decrease would imply the opposite.
The evolution of the BH galaxy scaling relations has been a vivid topic of investigation.
While at redshifts below $z\sim1$ the BH to galaxy bulge mass relation does no seem to evolve \citep[e.g.][]{Cisternas2011b}, studies at higher redshift \citep[e.g.][]{Peng2006,Treu2007,Jahnke2009,Bennert2011} find a positively evolving relation, suggesting that larger BHs ($M_{\bullet} > 10^8\,M_\odot$) pre-date the formation of their host galaxy bulges at these redshifts.
Most similar to our method, \citet{Zhang2012} estimate the evolution on the $M_\bullet-M_{\star,\rm{bulge}}$ relation using BHMDs and SMDs. Their results also favor a positively evolving BH to galaxy bulge mass relation.
However, simulations of merging disc galaxies \citep{Robertson2006, Johansson2009} seem to disfavor the picture in which SMBHs develop significantly before their parent bulges.
Regarding the relation between the BH and the total galaxy stellar mass, \citet{Jahnke2009} find the BH mass to \textit{total} stellar mass relation not to be evolving, whereas \citet{Decarli2010} and \citet{Bennert2011} find a positive evolution.
\citet{Kormendy2013} illustrate in their Figure\,38 that on average $M_\bullet/M_{\star,\rm{bulge}}$ increases from its local value \citep{Haering2004} towards higher redshift. However, these high redshift data points suffer selection effects that are hard to quantify and sample bias towards more luminous systems. Also bulge disc decomposition becomes increasingly difficult in non-local systems with an AGN. If the total instead of the bulge stellar mass is used, the evolution of the ratio with z weakens or even disappears below $z=2$ \citep[see][Fig. 38b, green points]{Kormendy2013}.
\citet{Schulze2014} showed very convincingly that evolutionary trends in the apparent ratio of the BH to galaxy bulge mass relations do not carry over to an intrinsic offset once selection effects \citep{Lauer2007} are taken in account. They do not demonstrate this for the studies of \citet{Peng2006} and \citet{Decarli2010} above but for a variety of other works \citep[e.g.][]{Wang2010}).
In conclusion the BH to bulge mass relation seems to be evolving positively with redshift (see also \citet{Volonteri2016}), while the studies on BH to total stellar mass ratio are more ambiguous.
While our work somewhat disagrees with \citet{Decarli2010,Bennert2011}, it fits well into the line of recent works \citep[see][]{Jahnke2009,Kormendy2013} finding only very little evidence for an evolution of the ratio of BH to \textit{total} galaxy stellar mass up to $z=3$.
On this basis we find that BH mass growth \textit{did not} precede \textit{total} stellar mass growth in any of our data sets. The data of systems that show over massive BHs compared to their galaxy properties could well be only a subset of the total distribution of BH and host galaxy systems.
\subsection{Comparison to hydrodynamical cosmological simulations}
We compare our results, which are based on observational data, with the results of the Illustris \citep{Vogelsberger2014, Genel2014} and the EAGLE \citep{Schaye2015} simulations.
The Illustris simulation is a large scale cosmological hydrodynamical simulation. It covers a volume of $106.5\,\rm{Mpc}^3$ with more than 12 billion resolution elements. State-of-the-art physical models describing the relevant physics for galaxy formation are included, allowing for the study of the properties black holes and their host galaxies.
For our purpose we use the BH accretion rate (BHAR) and star formation rate density (SFRD) of the highest resolution Illustris simulation ($1820^3$), published in \citet{Sijacki2015}.
Both quantities are integrated across redshift to calculate the BHMD and the SMD. We rescale the SFRD from a Chabrier to a Salpeter IMF and use a return fraction of 0.27, according to Salpeter IMF, to calculate the SMD.
The simulation calibrates the efficiency of the BH feedback to reproduce the observed cosmic star formation history and the $z=0$ stellar mass function. Furthermore, the quasar efficiency factor has been set to match the normalization of the $M_{\rm{BH}}-\sigma$ relation in isolated galaxy mergers. While the Illustris simulation slightly over predicts the absolute values of the total stellar and black hole mass density, their evolution follows the data calculated in this work and the SMD from the SFRD of \citet{Madau2014} closely. Regarding the SMD this is not surprising, since the BH feedback was tuned to reproduce the star formation history. The evolution of the BH mass density, however, is not pre-determined.
The EAGLE simulations \citep{Schaye2015, Crain2015} are a suite of hydrodynamical cosmological simulations run with a version of the GADGET 3 code that includes a new hydrodynamics solver, new time stepping, and new sub-grid physics. We adopt the SMD of \citet{Furlong2015} and the BHMD (Rosas-Guevara et al., in preparation) from the large simulation Ref-L100N1504 with $1504^3$ particles in a box of $100$ comoving $\,\rm{Mpc}^3$. While the Illustris simulation is designed to match the observed star formation history and therefore the redshift evolution of the feedback efficiency is calibrated, the EAGLE simulation only matches to $z\sim0$ observational data and thus both BHMD and SMD evolution are not pre-determined. The sub-grid physics concerning stellar and AGN feedback are calibrated to match the $z\sim0$, local galaxy stellar mass function as well as the normalization of the BH galaxy mass scaling relation, which is mainly determined by the efficiency parameter of AGN feedback.
The SMD includes only stellar mass in galaxies excluding the mass associated with intra cluster light. The EAGLE simulation uses a Chabrier IMF and thus we have rescaled the mass density to a Salpeter IMF. The BHMD only includes the accreted black hole mass and not the original seed masses and is thus the best comparison to the BHMD we calculated.
The simulations and our data are computed assuming slightly different cosmological parameters. Yet, the maximum difference in terms of cosmological volumes at a redshift of $z=3$ are below $7\%$ and thus we are confident to compare them to another without recalibrating to one cosmological parameter set.
We compare the simulation data to our inferred BHMD to total SMD ratio in Fig.\,\ref{figure_bhmd_div_smd}. The data from the Illustris simulation is portrayed as a black solid line, while the data from the EAGLE simulation is shown as a black dashed line.
The Illustris BHMD to SMD ratio (black solid line) follows our data points closely and is almost always within the $1\sigma$ error bars of the data points.
The data from the EAGLE simulation, the black dashed line in Fig.\,\ref{figure_bhmd_div_smd}, matches our data points as well in panels c), d), e) and f) and at $z\gtrsim3$ in all panels.
Both simulations agree well with our data and show a nearly flat redshift evolution of the BHMD to SMD ratio up to redshifts of $z>4$ where it starts to decline slightly.
\section{Conclusion} \label{sec_conclusion}
In this work we have calculated the BHMD and SMD to evaluate possible signatures from BH-galaxy co-evolution up to high redshifts.
We calculated the SMD from multiple measurements of SMFs and the cosmic SFRD of \citet{Madau2014}, while we have used the Soltan argument on various QLFs to obtain measurements of the BHMD. The values of our calculated SMDs at various redshifts agree well with the values in the recent review of \citet{Madau2014}. We also compare our BHMD at $z=0$ with previous studies and find generally good agreement.
Our data shows clear lock-step growth of the BHMD with the SMD in the redshift regime ${z=0-3}$. If the BHMD-SMD-relations, shown in Fig.\,\ref{figure_smdbhmdrelation}, are fitted with power laws, we find values for the exponent between $1.0$ to $1.3$. These values are surprisingly close to unity. While local estimates of the BH mass to stellar bulge mass relation have very similar slopes, the SMD-BHMD cannot be easily compared to the local relations. It is an evolutionary sequence of integrated distributions of BH mass and stellar mass and not a ``snapshot'' of their distributions at $z=0$.
We show that the logarithmic ratio of BHMD to SMD seems to be roughly constant from $z=0$ to $z=5$ within the $1\sigma$ uncertainties. Therefore BH mass growth and stellar mass growth trace very well over long periods of time up to high redshifts.
Since the considered quantities hold information about the integrated distribution of BHs and galaxies, information about the distributions itself cannot be accessed. Therefore we cannot distinguish between physical processes that connect or regulate BH and stellar mass growth and scenarios of secular evolution for both quantities.
However, our data does not support a scenario in which BH growth preceded \textit{total} galaxy stellar mass growth. In light of this result, BHs, which are over massive according to BH galaxy scaling relations, are likely to be outliers of the full distribution.
From the results of the EAGLE and Illustris simulations, including galaxy and AGN feedback, we also do not expect the BHMD to SMD ratio to strongly evolve with redshift.
At high redshifts measurements of BH mass and galaxy properties become increasingly difficult. On this basis following the local BH mass galaxy relations up to high redshifts to understand their evolution and origins is an involved task. With this work we try to open up other angles to investigate BH and galaxy co-evolution based on large data sets.
Our effort is not free of assumptions and the underlying SMFs and QLFs do suffer completeness issues at the highest redshifts and the lowest masses/luminosities. But so far, using the same analysis technique on all data sets, our results are consistent across all used SMFs and QLFs.
Upcoming large scale surveys of galaxies and quasars will extend our knowledge of the SMFs and QLFs to even higher redshifts and allow us to trace back the possible co-evolution of BH and their hosts until the cosmic dawn.
\acknowledgements{We thank the anonymous referee for a constructive review. Further we would like to thank Knud Jahnke, Gurtina Besla and Dan Stark for in depth, helpful discussions and suggestions to this work. We furthermore would like to thank Debora Sijacki, Yetli M. Rosas-Guevara, Michelle Furlong and Joop Schaye for providing the Illustris and EAGLE simulation data. JTS and XF thank supports from the NSF grants AST 11-07682 and 15-15115.}
\begin{table*}[t]
\caption{Summary of the Stellar mass functions adopted in this work.}
\label{tab_smfsummary}
\centering
\def1.4{1.4}
\begin{tabular}{p{3cm} p{3.5cm} p{2cm} p{2cm} p{1.2cm} p{2cm} p{2cm}}
\tableline
Reference & Best fit & z Range & Survey/Field & Area & $\rm{N}_{\rm{Galaxies}}$ & IMF \\
\tableline
\cite{Caputi2011} & their Table\,2 & $z = 3-5 $ & UKIDSS \& UDS & $0.6\,\rm{deg}^2$ & $1213$ & Salpeter \\
\cite{Ilbert2013} & their Table\,2 full sample & $z = 0.2-4.0 $ & UltraVista DR1 / Cosmos & $1.52\,\rm{deg}^2$ & $220000$ & Chabrier \\
\cite{Muzzin2013} & their Table\,1, sample: all, first redshift bin: third row, all other bins: first row, in reference & $z = 0.2-4.0 $ & UltraVista DR1 / Cosmos & $1.62\,\rm{deg}^2$ & $95675$ & Kroupa \\
\cite{Bielby2012} & their Table\,7 & $z = 0.2-2.0 $ & WIRCam Deep Survey & $2.03\,\rm{deg}^2$ & $\sim 50000$ per band & Chabrier\\
\tableline
\multicolumn{7}{c}{
\begin{minipage}{2.\columnwidth}
\footnotesize \textbf{Notes.} All references use a $\Lambda$CDM cosmology with $h = 70, \Omega_{\rm{m}} = 0.3, \Omega_{\Lambda} = 0.7$.
\end{minipage}}
\end{tabular}
\end{table*}
\begin{table*}[t]
\scriptsize
\caption{Summary of the Quasar luminosity functions adopted in this work.}
\label{tab_qlfsummary}
\begin{tabular}{p{3cm} p{2cm} p{3cm} p{5.5cm} p{1.5cm} p{1.2cm}}
\tableline
Reference & z Range & Survey/Field & Luminosity Range & Area & $\rm{N}_{\rm{AGN}}$ \\
\tableline
\cite{Hopkins2007} & $z = 0-6$ & compilation, see Table\,1 in \cite{Hopkins2007} & $ 41 \leq \log(L_{\rm{bol}}/[\rm{erg}\,\rm{s}^{-1}]) \leq 49 $ & & $\sim 49000$ \\
\cite{Croom2009} & $z = 0.4 -2.6$ & 2dF-SDSS LRG, 2SLAQ & $M_{\rm{g}} (z=2) < -21.5$ & $191.9\,\rm{deg}^2 $& 10637 \\
\cite{Ross2013}& $z = 0.3 - 3.5$ & SDSS-III: BOSS & $M_{\rm{i}} (z=2.2) < -24.5$ & $2236\,\rm{deg}^2 $& $23201$ \\
\cite{Palanque2013} & $z = 0.68 - 4.0$ & SDSS-III: BOSS Str. 82 + MMT & $ M_{\rm{g}}(z=2) < -22.3$ & $14.5\,\rm{deg}^2 $ & $1877$ \\
\cite{Fiore2012} & $z = 3-7$ & 4Ms CDFS & $42.75 < \log(L(2-10\rm{keV})/[\rm{erg}\,\rm{s}^{-1}]) < 44.5$ & $464.5\,'^2$ & $54$ \\
\cite{LaFranca2005} & $z = 0-4$ & HELLAS2XMM, also see Table\,1 in \cite{LaFranca2005}& $42 \lesssim \log(L(2-10\rm{keV})/[\rm{erg}\,\rm{s}^{-1}]) \lesssim 46$ & $3\,\rm{deg}^2$ + others & $508$ \\
\cite{Ueda2014} & $z = 0-5$ & compilation, see Table\,1 in \cite{Ueda2014}& $42 \lesssim \log(L(2-10\rm{keV})/[\rm{erg}\,\rm{s}^{-1}]) \lesssim 46$ & see Table\,1 in \cite{Ueda2014}& $4039$\\
\tableline
\multicolumn{6}{c}{
\begin{minipage}{2.\columnwidth}
\footnotesize \textbf{Notes.} All references use a $\Lambda$CDM cosmology with $h = 70, \Omega_{\rm{m}} = 0.3, \Omega_{\Lambda} = 0.7$ except for \cite{Palanque2013} which use slightly different cosmological parameters ($h = 71, \Omega_{\rm{m}} = 0.267, \Omega_{\Lambda} = 0.734$).
\end{minipage}}
\end{tabular}
\end{table*}
\bibliographystyle{apj}
|
\section{Introduction}
Recently both ATLAS~\cite{ATLAS-CONF-2015-081, Moriond-ATLAS} and CMS~\cite{CMS-PAS-EXO-15-004,CMS-PAS-EXO-16-018,Moriond-CMS} reported small excesses in their search for diphoton resonances.
If indeed a resonance exists with a mass of $\sim 750$ GeV, then it certainly must belong to Beyond the Standard Model (BSM) Physics.
There have been several papers investigating a plethora of possible BSM scenarios~\cite{1512.04850,1512.04913,1512.04917,1512.04921,1512.04924,
1512.04928,1512.04929,1512.04931,1512.04933,1512.04939,1512.05326,1512.06028,1512.05327,1512.05328,1512.05330,1512.05332,1512.05333,1512.05334,1512.05439,1512.05542,1512.05564,1512.05585,
1512.05617,1512.05618,1512.05623,1512.05700,1512.05723,1512.05738,1512.05751,1512.05767,1512.05771,1512.05776,1512.05777,1512.05778,1512.05779,1512.05961,1512.06083,1512.06091,
1512.06106,1512.06107,1512.06113,1512.06297,1512.06335,1512.06376,1512.06426,1512.06670,1512.06508,1512.06560,1512.06562,1512.06587,1512.06671,1512.06674,
1512.06696,1512.06708,1512.06715,1512.06728,1512.06732,1512.06741,1512.06773,1512.06782,1512.06787,1512.06797,1512.06799,1512.06824,1512.06827,1512.06828,1512.06833,1512.06842,
1512.06878,1512.06976,1512.07165,1512.07212,1512.07225,1512.07229,1512.07242,1512.07243,1512.07268,1512.07462,1512.07468,1512.07497,1512.07527,1512.07616,1512.07624,1512.07541,
1512.08507,1512.07645,1512.07672,1512.07733,1512.07789,1512.07853,1512.07885,1512.07889,1512.07895,1512.07904,1512.07992,1512.08117,1512.08184,1512.08255,1512.08307,1512.08323,
1512.08378,1512.08392,1512.08434,1512.08440,1512.08441,1512.08467,1512.08478,1512.08484,1512.08497,1512.08500,1512.08502,1512.08508,1512.09129,1512.09089,1512.08777,
1512.09136,1512.09127,1512.09092,1512.09053,1512.09048,1512.08992,1512.08984,1512.08963,1512.08895,1512.09202,1601.03604,1601.03696,1601.03153,1601.02714,1601.02447,1601.02570,
1601.02490,1601.01712,1601.01676,1601.01828,1601.01569,1601.01571,1601.01144,1601.00661,1601.00836,1601.00638,1601.00624,1601.00618,1601.00602,1601.00534,1601.00285,1601.00586,
1601.00386,1601.01355,1601.00006,1601.03267,1601.02457,1601.02004,1601.01381,1601.00952,1601.00866,1601.00640,1601.00633,1601.04678,1601.00240,1601.04291,1601.04516,1601.04751,
1601.04954,1601.05038,1601.05357,1601.05729,1601.06374,1601.06394,1601.06761,1601.07167,1601.07187,1601.07242,1601.07339,1601.07385,1601.07330,1601.07396,1601.07508,1601.07564,
1601.07774,1602.00004,1602.00475,1602.00949,1602.00977,1602.01092,1602.01377,1602.01460,1602.01801,1602.02380,1602.02793,1602.03344,1602.03604,1602.03607,1602.03653,1602.03877,
1602.04170,1602.04204,1602.04692,1602.04822,1602.04838,1602.05539,1602.05581,1602.05588,1602.07866,1602.08092,1602.09099,1603.03421}.
Interestingly, the diphoton excess is accompanied by an absence of evidence for any excesses in other channels ($hh$, $WW$, $ZZ$, $t\bar{t}$, etc.). This, along with the fact that its mass is much heavier than any of the SM particles, suggests that the $750$ GeV resonance must not couple strongly to the Standard Model (SM) sector.
Further, data suggests that the width of the new resonance to be not too large. These characteristics imply that the $750$ GeV resonance is most likely the
lightest BSM particle and that there must be additional heavier charged BSM particles that contribute to loop induced decays of the $750$ GeV resonance.
Motivated by the simple observations made above, about the nature of the resonance, we carry out investigations on the effective Minimal Dilaton
Model~\cite{Abe:2012eu,Cao:2013cfa}.
The model consists of vector-like fermionic top partner(s) with mass $M_i$ that characterize the mass gap of dynamical
symmetry breaking of an approximate scale invariance. The quantum numbers of the top partner(s) are chosen to be identical to that of a right handed top quark.
This choice is motivated by topcolor~\cite{Hill:1991at} and top seesaw models~\cite{Chivukula:1998wd} that predict a naturally large top quark mass.
The dilaton field $S$ couples directly only to the Higgs boson and top partner(s).
Coupling of the dilaton to photons and gluons proceeds only through loops of the top partner(s). Thus the model can predict the production of a dilaton $S$ of
mass $m_s\sim750$ GeV and its subsequent decay to a pair of photons.
In this paper we investigate the consistency of the above statement with data.
A similar study was carried out in Ref.~\cite{1601.02570}. Here we extend their analysis to the case where we have non-trivial mixing between the top and its partner(s).
The paper is organized as follows. In the next section, we introduce the model and its parameters. We then discuss various constraints on the model imposed by precision
electroweak tests, the observed Higgs signal strengths, and the single top production rate measurement.
Following which we study constraints on the parameter space that arises in order to explain the $750$ GeV excess. We further discuss phenomenological implications of the model for future LHC runs before concluding.
\section{Lagrangian and Model Paramaters}
The dilaton is a pseudo-Nambu-Goldstone boson associated with conformal symmetry breaking and couples to the trace of the energy momentum tensor of
the SM~\cite{Goldberger:2008zz,Foot:2007iy}. It is useful to write down an effective low energy lagrangian using an effective linearized dilaton field $S$,
which is a gauge singlet, as follows~\cite{Abe:2012eu}:
\begin{eqnarray}
\mathcal{L} = \mathcal{L}_{\rm SM}
- {1 \over 2 }
\partial_\mu S \partial^\mu S
- \sum_{i=1}^{N_T}\overline{ T_i}\left(\slashed{D}+{M_i \over f} S\right)T_i
- \sum_{i=1}^{N_T}\left[
y_i' \overline{T_i}_R(q_{3L}\cdot \tilde{H}^c)
+ \text{h.c.} \right]
- \tilde V(S, H).
\label{eqn:lin-lag}
\end{eqnarray}
Here, $\mathcal{L}_{SM}$ is the SM Lagrangian modulo the Higgs potential, $f=\braket{S}$ is the vacuum expectation value of the dilaton and $T_i$ correspond to the $N_{T}$ number of
fermionic top partners. Note that the assumption here is that only the Higgs and the top partner(s) $T$ are assumed to couple to BSM dynamics, while the
remaining SM particles are considered to be spectators to the BSM sector. As a result, the dilaton $S$ couples only to $T_i$ and $H$ fields\footnote{ In typical dilaton models, the entire
SM particle spectrum is assumed to couple to the dilaton~\cite{Foot:2007iy}.} and does not couple directly to $W$'s, $Z$'s and other fermions of the SM, albeit through possible mixing between the Higgs and dilaton. This mixing
has been parametrized as follows:
\begin{align}
H=\frac{1}{\sqrt{2}}
\begin{bmatrix}
\phi^{+}\\
\left( v + h\cS{} -s \sS{} \right) + i \phi^3\\
\end{bmatrix}\ , \quad
S=\left( f + h\sS{} +s \cS{} \right)\ ,
\label{eqn:HSmix}
\end{align}
here, $v\sim246$ GeV is the Higgs vacuum expectation value, and $h$ and $s$ denote the physical Higgs ($m_h\simeq125$ GeV) and physical dilaton ($m_s\simeq 750$ GeV) fields, respectively.
Mixing between $h$ and $s$ is parametrized by the angle $\theta_s$.
In addition to mixing between $H$ and $S$, there is also possible mixing between the top and its partner(s).\footnote{The term proportional to $\overline{T}_L u_{3R}$ can be
rotated away and has not been included here. In an alternative basis, this term is kept and the $\overline{T}_R q_{3L} $ term is rotated away~\cite{Cacciapaglia:2011fx}.}
The analogous physical fields are denoted by $t$ and $t'$. The strength of this mixing is determined by an off-diagonal term in the $(t,T_i)$ mass matrix and is proportional
to the coupling $y_i'$. For simplicity, we assume the mixing between the $N_T$ top partners $T_i$ and the top quark to be of equal magnitude and neglect
mixing among top partners themselves. In addition, we consider the top partners to be nearly degenerate.\footnote{This assumption does not have any significant
bearing on the production and decay of the Higgs or dilaton and therefore is of minimal consequence to the results in this paper.} Then,
the general $(N_T+ 1)\times(N_T+ 1)$ mass matrix can be written as follows.
\begin{align}
\begin{bmatrix}
\overline{u_{3L}} & \overline{T_{1 L}}\ ... & \overline{T_{N_T L}}
\end{bmatrix}
\begin{bmatrix}
m & m' & ... & m'\\
0 & M & ... & 0\\
\vdots& & \ddots &\vdots \\
0 &... &... & M
\end{bmatrix}
\begin{bmatrix}
u_{3R} \\ T_{1R} \\\vdots \\ T_{N_T R}
\end{bmatrix}.
\label{eqn:mass-mat}
\end{align}
The assumption made on the form of the mass matrix here is reasonable since it does not strongly affect the phenomenology of dilaton production and decay, which is the main focus of our work here. Note that the top partner masses are nearly degenerate for this mass matrix.
As shown in Appendix~\ref{app:massmat},
all but one of the top partners are degenerate and have a mass $m_{t_i'}=M$ , while one of the top partners has a mass $m_{t_1'}\approx M + N_T m'$. However, a more complicated mass matrix could yield more complex relations between the masses of the top and its partners, which is beyond the scope of this work.
The renormalizable, linear scalar potential of the model has been given in Ref.~\cite{Abe:2012eu}, and we reproduce it below:
\begin{equation}
V(S,H)= \frac{m_S^2}{2} S^2 + \frac{\lambda_S}{4}S^4 + \frac{\kappa}{2}S^2 |H|^2 + m_{H}^2 |H|^2 + \frac{\lambda_H}{4}|H|^4\ .
\end{equation}
Note that the scalar potential has a $Z_2$ symmetry ($S\to -S$). This symmetry also holds for the physical fields when $\sS{}=0$, i.e. $s\to -s$. However, coupling of the dilaton to $T_i$ breaks this invariance.
From the discussion above, we see that in addition to SM parameters, the model introduces seven additional parameters; namely $M$, $f$, $y'$, $\lambda_S$, $\kappa$,
$m_S$ and $N_T$. It is more useful to recast the parameters in terms of physical masses and mixing angles. For easy reference we list them below:
\begin{itemize}
\item $m_s$: mass of the dilaton field, which we set to be $=750$ GeV.
\item $m_h$: mass of the physical Higgs field, which we set to be $=125$ GeV.
\item $m_t$: mass of the top quark, which is set to $173$ GeV in this study.
\item $m_{t'}$: mass of the top partner(s). Direct experimental limits set the value of $m_{t'}\gtrsim 780$ GeV~\cite{Chatrchyan:2013uxa,Aad:2015kqa}.
Here, we set $m_{t_i'} = 1$ TeV. Note that changing $m_{t_i'}$ does not have a significant effect on Higgs ($h$) and dilaton ($s$) production cross sections and branching ratios.\footnote{Since we assume $2 m_{t'}$ is much larger than $m_h$ or $m_s$, the $h$ and $s$ cross section and branching ratios do not vary strongly with $m_{t'}$.}
\item $\sS{}$: sine of the mixing angle $\theta_S$, which parametrizes the mixing between the Higgs and the dilaton fields, and is defined in Eq.~(\ref{eqn:HSmix}).
\item $\sL{}$: sine of the mixing angle $\theta_L$, which parametrizes the mixing between $t$ and $t'$, defined for $N_T=1$ as follows:
\al{
\begin{bmatrix}
u_{3L}\\
T_L
\end{bmatrix}
&= \begin{bmatrix}
\cos\theta_L & \sin\theta_L\\
-\sin\theta_L & \cos\theta_L
\end{bmatrix}
\begin{bmatrix}
t_L\\
t'_L
\end{bmatrix}.
}
When $N_T >1$, given the form of the mass matrix in Eq.~(\ref{eqn:mass-mat}) and assuming $m' \ll M$,
it is possible to characterize mixing between the top quark and its partner(s) by a single mixing angle ($\sL{}$) and by a $N_T\times N_T$ matrix, cf. Appendix~\ref{app:massmat}.
\item $\eta=\frac{v}{f} N_T$: ratio of the two vacuum expectation values, multiplied by $N_T$.
\item $N_T$: total number of additional vector like fermions, {\it i.e.} top partners $T_i$.
\end{itemize}
We make further simplifications by only considering the limit $m_{t'}^2 \gg m_{t}^2$ and $m_{t'}^2 \gg m_{t}^2 \tan^2\theta_L$ . Note that the second condition ensures
small mixing between the top and its partner(s).\footnote{Large mixing is constrained by oblique parameters~\cite{Abe:2012eu}. We will reanalyze these constraints for the general case, when $N_T \ge 1$.}
In this limit, we can write down the relation between the Lagrangian parameters and the physical parameters as follows:
\begin{align}
M\simeq m_{t'}\cL{} \ ,\\
y_{t} \simeq \frac{\sqrt{2}}{v}\frac{m_t}{\cL{}}\ ,\\
y'\simeq \frac{\sqrt{2}}{v}m_{t'}\sL{}\ .
\label{eqn:rel1}
\end{align}
Finally, in the large $m_{t'}$ and small mixing limit, the terms $ (m_t^2 \tan^2\theta_L/ m_{t'}^2) \to 0$ and one can simplify the coupling of the $h$ and $s$ fields as follows~\cite{Cao:2013cfa, Abe:2012eu}
\begin{eqnarray}
\tilde{C}_{hVV}&=&\frac{2 M_V^2}{v}\cS{}=C_{hVV}\frac{2 M_V^2}{v}\ ,\quad
\tilde{C}_{hff} =\frac{m_f}{v}\cS{}=C_{hff}\frac{m_f}{v}\ , \nonumber\\
\tilde{C}_{htt}&=&\frac{m_t}{v}(\cS{}\cL{2} + \eta\ \sL{2}\sS{})=\frac{m_t}{v}C_{htt}\ , \nonumber\\
\tilde{C}_{ht't'}&=&\frac{m_{t'}}{v}(\cS{}\sL{2} + \eta \cL{2}\sS{})=\frac{m_{t'}}{v}C_{ht't'}\ .
\label{eqn:h-coup}
\end{eqnarray}
Here, $V=\{W^{\pm},Z\}$ corresponds to massive Gauge bosons, and $ff$ to all fermions except the $t$ and $t'$.
Similarly for the dilaton field:
\begin{eqnarray}
\tilde{C}_{sVV}&=&\frac{2 M_V^2}{v}\sS{} =\frac{2 M_V^2}{v}C_{sVV}\ , \quad
\tilde{C}_{sff} =\frac{m_f}{v}\sS{}=\frac{m_f}{v} C_{sff}\ , \nonumber\\
\tilde{C}_{stt}&=&\frac{m_t}{v}(-\sS{}\cL{2} + \eta \sL{2}\cS{})=\frac{m_t}{v}C_{stt}\ ,\nonumber\\
\tilde{C}_{st't'}&=&\frac{m_{t'}}{v}(-\sS{}\sL{2} + \eta \cL{2}\cS{})=\frac{m_{t'}}{v}C_{st't'}\ .
\label{eqn:s-coup}
\end{eqnarray}
Note that the case of both $\sL{}=0$ and $\sS{}=0$ corresponds to the scenario when neither is there mixing between $h$ and $s$, nor between $t$ and $t'$. In this scenario $h$ has properties identical to the SM Higgs boson.
In the following section, we will present constraints on the model.
Note that for $N_T > 1$, the couplings $C_{htt}$, $C_{ht't'}$, $C_{st't'}$ and $C_{st't'}$ have additional powers of $\sL{}$ and $\cL{}$, cf. Appendix~\ref{app:massmat}.
\section{Model Constraints}
In this section, we determine constraints on the model from precision electroweak tests, Higgs signal strengths, single top production rate measurement and
the $750$ GeV resonance production rates.
\subsection{Constraints from Electroweak Precision Tests ($S$, $T$, $U$ parameters) }
\begin{figure}
\centering
\begin{minipage}{0.45\textwidth}
\includegraphics[scale=0.6]{figs/st-constraints_v1.png}
\caption{
$95\%$ CL limits from the $S$ and $T$ parameter in the $(m_{t'}-\sL{})$ plane, and for $\sS{}=0$ and $N_T=1$.
Shaded areas correspond to allowed regions of parameter space.
\label{fig:STU-cL}
}
\end{minipage}
\hfill
\begin{minipage}{0.45\textwidth}
\includegraphics[scale=0.6]{figs/NT-constraints.png}
\caption{
$95\%$ CL limits from the $S$ and $T$ parameter in the $(N_T-\sL{})$ plane, and for $\sS{}=0$ and $m_{t'}=1$ TeV.
Shaded areas correspond to allowed regions of parameter space.
\label{fig:STU-NT}
}
\end{minipage}
\end{figure}
The $S$, $T$ and $U$ parameters~\cite{Peskin:1990zt} of the model have been evaluated in Ref.~\cite{Abe:2012eu}. There are two contributions that need to be considered here, namely the contribution
from mixing between the top and its partner(s), as well as from the scalar dilaton. This test strongly constrains mixing between the top and its partner(s). In Fig.~\ref{fig:STU-cL},
we show $95 \%$ Confidence Level (CL) upper bounds on the value of $\sL{}$ with varying $m_{t'}$, when $N_T=1$.
In order to evaluate these bounds, we define a chi-squared function, $\chi^2_{STU}$, using
\begin{equation}
S= 0.05 \pm 0.09, \ \ T = 0.08 \pm 0.07 ,\ \ \rho_{ST}=0.91\ .
\end{equation}
Here, $\rho_{ST}$ is the correlation between $S$ and $T$, and the values of $S$ and $T$ are determined by setting $U=0$. We also set $\sS{}=0$; we will see below that the choice $\sin \theta_S = 0$ is best suited to explain the 750 GeV diphoton resonance
rate in this model.
When $m_{t'}=1$ TeV, we see that mixing between the top and its partner(s) is constrained, by the Electroweak precision tests, to the region where $\sL{} < 0.3$. We also observe that increasing $m_{t'}$ reduces the allowed magnitude of mixing between the top and its partner(s).
It is instructive to look at constraints on mixing between the top and its partners for the more general case when $N_T>1$. To this end, we calculate the $N_T$ dependence of the $T$ parameter and verify our results using {\tt package~X}~\cite{Patel:2015tea}. In general, each top partner can mix by different amounts. However, for simplicity, we only consider the special case of Eq.~(\ref{eqn:mass-mat}). As shown in Appendix~\ref{app:massmat}, this amounts to nearly degenerate top partners, cf. Eq.~(\ref{eq:app-mass-eval}), when the mixing between top quark and top partners is not too large. In Fig.~\ref{fig:STU-NT},
we show the $95 \%$ CL upper bounds on the value of $\sL{}$ with varying $N_T$ for $m_{t'}=1$ TeV and $\sS{}=0$. We observe that the Electroweak precision tests constrain $\sL{}$ more strongly as $N_T$ increases.
\subsection{Constraints from Higgs signal strengths}
\label{sec:higgs-fit}
\begin{figure}[ht]
\centering
\begin{minipage}{0.45\textwidth}
\includegraphics[scale=0.6]{figs/fit-Sintl-eta_v1.png}
\caption{
Contours of $1\sigma$ and $2\sigma$ deviation of $\Delta\chi^2$ in the $(\sL{} - \frac{v}{f})$ plane, constrained by Higgs signal strength data only. Here $(\sS{}=0.31,\sL{}=0,\frac{v}{f}=0.35)$ is the best fit value and is denoted by a black dot.
}
\end{minipage}
\hfill
\begin{minipage}{0.45\textwidth}
\includegraphics[scale=0.6]{figs/fit-Sints-Sintl_v1.png}
\caption{
$1\sigma$ and $2\sigma$ contours of $\Delta\chi^2$ in the $(\sS{} - \sL{})$ plane, constrained by Higgs signal strength data only. Here $(\sS{}=0.31,\sL{}=0,\frac{v}{f}=0.35)$ is the best fit value and is denoted by a black dot.
\label{fig:chi2-cont}}
\end{minipage}
\end{figure}
Higgs signal strengths have been measured using data from the $7$ and $8$ TeV runs of LHC. These signal strengths define properties of the observed 125 GeV Higgs boson. Examining these signal strengths provides insights into the amount of mixing allowed between the Higgs boson and the 750 GeV dilaton. Therefore, in this section, we perform fits to MDM paramters using Higgs data.
The signal strengths reported by ATLAS and CMS are defined as
\begin{equation}
\hat{\mu}_i = \frac{n_{\rm exp}^i}{n_{\rm SM}^i}~,
\label{eq:mui_exp}
\end{equation}
where $n_{\rm exp}^i$ is the number of events observed in the channel $i$ and $n_{\rm SM}^i$
is the expected number of events as predicted in the SM. In order to compare the MDM predictions
with the experimentally derived $\hat \mu_i$, we define (as usual)
\begin{equation}
\mu_i = \frac{n_{\rm th}^i}{n_{\rm SM}^i} =
\frac{\Sigma_p \sigma_p^{MDM} \epsilon_p^i}{\Sigma_p \sigma_p^{\rm SM} \epsilon_p^i}
\times \frac{\mathcal B_i^{MDM}}{\mathcal B_i^{\rm SM}}~.
\label{eq:mui}
\end{equation}
Here $\sigma_p$ is the production cross section of the $125$ GeV Higgs boson in the $p^{th}$ channel and $\mathcal B_i$ corresponds to its branching ratio in the $i^{th}$ channel. $\epsilon_p^i$ correspond to the fraction that each production channel contributes in the search for the Higgs in its $i^{th}$ decay channel.
Fits to $\mu_i$ are performed by minimizing the $\chi^2$ function defined as
\begin{equation}
\label{eq:chi2}
\chi^2 =\sum\limits_{i}\left(\frac{\mu_i -\hat{\mu}_i}{\hat \sigma_i}\right)^2.
\end{equation}
After setting $m_{t'}=1$ TeV and $N_T=1$, we are left effectively with three model parameters; $\sS{},\ \sL{}$ and $\frac{v}{f}$. Note that varying $m_{t'}$ has a minimal effect on the fits since
$m_{t'}^2 \gg m_h^2$ and therefore the contribution of $t'$ to Higgs decays can be calculated in the heavy quark limit to a good approximation. Using
Higgs data, listed in the Appendix of Ref.~\cite{Boudjema:2015nda}, we perform a fit over the three model parameters $(\sS{},\sL{},\frac{v}{f})$ and find the best fit to be at $(0.31,0.0,0.35)$
with the $\chi^2/d.o.f = 27.6/24$. In Fig.~\ref{fig:chi2-cont}, $1\sigma$ (one standard deviation) and $2\sigma$ contours of $\Delta\chi^2$ are shown. The left plot shows the contours in the $(\sL{} -\frac{v}{f})$ plane,
with $\sS{}=0.31$, whereas the right plot shows the same in the $(\sS{}-\sL{})$ plane, with $\frac{v}{f}=0.35$. The black dots indicate the best fit points on the plots.
Both plots highlight the preference for small or no mixing: i.e., $\sin\theta_L \sim 0$
and $\sin\theta_S \sim 0$.
\begin{figure}
\centering
\includegraphics[scale=0.6]{figs/fit-Sintl-eta_Costs1_v1.png}
\caption{ $1\sigma$ and $2\sigma$ contours of $\Delta\chi^2$ in the $(\sL{} - \frac{v}{f})$ plane. Here the best fit occurs at the line of $\sL{}=0$, with $\sS{}=0$ (see text for details). Fits are performed using Higgs data alone.
\label{fig:chi2-cont2} }
\end{figure}
In fact, we will see in the next section that the choice $\sS{}=0$, is best suited to explain the diphoton resonance rates. Keeping this in mind, we fix $\sS{}=0$ and perform fits to the Higgs signal strength data by allowing $\frac{v}{f}$ and $\sL{}$ to vary freely. We find that the $\chi^2$ at the best fit value is $\chi^2/d.o.f = 28.5/25$. In Fig.~\ref{fig:chi2-cont2}, we
show $1\sigma$ and $2\sigma$ contours of the fit in the $(\sL{}-\frac{v}{f})$ plane. $\sL{}=0$ corresponds to the best fit and $\frac{v}{f}$ is not constrained by the fit. When $\sS{}=0$, the $\frac{v}{f}$ dependence of Higgs signal strengths drops out, resulting
in a flat behavior of the $\chi^2$ function in the $\frac{v}{f}$ direction. This results in the vertical contours seen in Fig.~\ref{fig:chi2-cont2}.
Constraints on $\sL{}$ appear to be fairly weak, with all values of $\sL{}$ being allowed within $3\sigma$. This behavior can be understood from the following
argument. The $\sL{}$ dependence of the $\chi^2$ function arises through three sources: decay of Higgs to a pair of gluons (as well as gluon fusion production),
decay of Higgs to a pair of photons, and $t\bar{t} h$ production. For the first two sources, the $\sL{}$ dependence is weak, since effectively the amplitudes for these
decays are $\cL{2}A_{t} + \sL{2}A_{t'}$. Here $A_{f}$ are loop functions defined in the Appendix~\ref{app:hdecay}. Since both $m_{t}$ and $m_{t'}$ are larger than $m_h$, $A_{t}\sim A_{t'}$ and the $\sL{}$
dependence nearly vanishes from $h\to gg$ and $h \to \gamma \gamma$ processes. This leaves only $t\bar{t}h$ production with a $\sL{}$ dependence. Since $t\bar{t}h$ production has been measured with large errors, therefore the constraint on $\sin\theta_L$ from the current measurement is relatively weak. As discussed earlier, a stronger constraint on $\sL{}$ has been imposed by the Electroweak precision tests, cf.~Figs.~\ref{fig:STU-cL} and \ref{fig:STU-NT}.
\subsection{Constraints from Single Top Production}
Top quarks are copiously produced at the LHC. An important observable that would be modified by this model is the single top cross section. The current
constraints from ATLAS and CMS already put a strong constraint on the product of the mixing between the top quark and top partner(s) and $|V_{tb}|$. The current most precise measurements
from ATLAS and CMS yield $|V_{tb}| > 0.88$ and $|V_{tb}| > 0.92$, respectively, at the $95\%$ confidence level (CL) ~\cite{1510.03764,1403.7366}. The single top production cross section in this new model is proportional to the product
$(|V_{tb}| \cL{})^2$.
\begin{figure}[ht]
\centering
\begin{minipage}{0.45\textwidth}
\includegraphics[scale=0.5]{figs/Vtb-NT1-limits.png}
\caption{Allowed (shaded) region from ATLAS (darker shaded) and CMS (lighter shaded) measurement of single top production, independent of $m_{t'}$, for $N_T=1$. The CMS constraint overlaps the ATLAS constraint.}
\label{fig:s-top-nt1}
\end{minipage}
\hfill
\begin{minipage}{0.45\textwidth}
\includegraphics[scale=0.5]{figs/Vtb-NtTot-limits.png}
\caption{Allowed (shaded) region from ATLAS (darker shaded) and CMS (lighter shaded) measurement of single top production, independent of $m_{t'}$, assuming $|V_{tb}|$=1. The CMS constraint overlaps the ATLAS constraint.}
\label{fig:s-top-ntN}
\end{minipage}
\end{figure}
In Fig.~\ref{fig:s-top-nt1}, we show $95\%$ CL allowed regions in the $(|V_{tb}| - \sL{})$ plane, when $N_T=1$. We observe that the constraints on $\sin(\theta_L)$ are comparable to those from the $T$ parameter constraints, as seen in Figs.~\ref{fig:STU-cL} and \ref{fig:STU-NT}.
In Fig.~\ref{fig:s-top-ntN} we show constraints from single top production in the $(N_{T} -\sL{})$ plane, after setting $|V_{tb}|=1$. It is evident that allowed regions of $\sL{}$ reduce as $N_T$ increase.
Currently, constraints from the $T$ parameter are only slightly stronger than
that from the single top production. However, with the high luminosity runs of the HL-LHC $(3 {\rm ab}^{-1})$, it is
expected that there will be 15 million single top events. The estimated uncertainty on single top production should be reduced to $3.8\%$ by the end of the LHC
run~\cite{Schoenrock:2013jka}. This would imply a reduction on the uncertainty of approximately a factor of $2 \sim 3$ in $(|V_{tb}| \cos\theta_L)^2$. If we choose $|V_{tb}|=1$,
then the limits would be $\sL{}\lesssim 0.2$ (which is stronger than the Electroweak precision test constraints) at the end of the running of HL-LHC, ignoring changes in theortical and systematic uncertainties. Moreover, constraints from the single top measurement is independent of the top partner mass.
\subsection{Dilaton production and Decay}
Production of the dilaton of mass $m_s =750$ GeV proceeds through a loop induced process of gluon fusion. All other production modes are expected to be
sub-dominant, especially in the small mixing $(\sS{}\sim 0)$ scenario.
We estimate the cross section for production and decay of the dilaton using the Narrow Width Approximation (NWA). Since we set $\sS{}=0$, the dilaton decays primarily through loop induced processes, and therefore we find that the ratio of its decay width to mass is $\Gamma_s/m_s \sim 10^{-4}$.\footnote{The decay width of the of the dilaton is proportional to $N_T^2/f^2$.} The NWA is thus a good approximation for production of the dilaton.
The production cross section in the NWA can be written down as follows.
\begin{equation}
\sigma(gg \to s \to \gamma \gamma) =
16\pi^2 \cdot {\cal N} \cdot \frac{ \Gamma_s}{m_s} \cdot
BR(s\to \gamma \gamma) \cdot BR(R\to gg) \cdot \left[ \frac{d L^{gg}}{d\hat{s}}\right]_{\hat{s} = m^2_s}~,
\label{eq:simplest}
\end{equation}
where ${\cal N}$ is a ratio of spin and color counting factors
\begin{equation}
{\cal N} = \frac{N_{s}}{N_{g} N_{g}} \cdot
\frac{C_{s}}{C_g C_g},
\end{equation}
where $N$ and $C$ count the number of spin- and color-states, respectively, for initial state gluons and the resonant dilaton, with $N_s=1,N_g=2,C_g=8$ and $C_s=1$. In order to
compute the total cross section at $13$ TeV LHC,
we multiply the above mentioned partonic cross section with the gluon luminosity $L_{gg}$. We evaluate $L_{gg}$ using the {\tt CT14LO} parton distribution
function~\cite{Dulat:2015mca} and the {\tt LHAPDF} package~\cite{Buckley:2014ana}. We also evaluate the NNLO $K$-factor using the {\tt SuSHi} program~\cite{Harlander:2012pb} in the infinite quark mass limit with the
{\tt CT14NNLO} PDF central set~\cite{Dulat:2015mca}. We set the renormalization and factorization scales to be $\mu_R=\mu_F=750$ GeV. We find the $K$-factors to be
$K_{NNLO/LO}^{13 TeV}\sim 2.6$ and $K_{NNLO/LO}^{8 TeV}\sim 2.7$, respectively, at the $13$ TeV and $8$ TeV LHC, which will be included in the following analysis of dilaton production rates.
An interesting feature of this model is that when all mixings are set to zero (i.e. $\sL{}=0$ and $\sS{}=0$), all decays are loop induced. The branching ratios are fixed by the $SU(3)_c$ and $U(1)_Y$ charges of the the top partners. The decay width on the other hand is proportional to $N_T^2/f^2$. From the equation above we see that in order to increase the cross section one could either increase the decay width by increasing $N_T$ or decreasing $f$. However, we will see later that small values of $f$ will lead to large Yukawa couplings of the top partners and therefore to issues of perturbativity.
\begin{figure}
\centering
\begin{minipage}{0.45\textwidth}
\includegraphics[scale=0.45]{figs/sigBR-Sints.png}
\caption{Variation of the next-to-next-to leading order production cross section times branching ratio $(\sigma(pp \to s)\cdot \text{BR}(s\to\gamma\gamma))$ of the dilaton ($m_s=750$ GeV) for $13$ TeV LHC, with $\sL{}=0$.
Here we set $N_T=1$. \label{fig:csBR}}
\end{minipage}
\hfill
\begin{minipage}{0.45\textwidth}
\includegraphics[scale=0.45]{figs/sigBR-Sintl.png}
\caption{Variation of the next-to-next-to leading order production cross section times branching ratio $(\sigma(pp\to s)\cdot \text{BR}(s\to\gamma\gamma))$ of the dilaton ($m_s=750$ GeV) for $13$ TeV LHC, with $\sS{}=0$. Here we set $N_T=1$.} \label{fig:csBR2}
\end{minipage}
\end{figure}
The expressions for the decay width of the dilaton are given in
Appendix~\ref{app:sdecay}. In Fig.~\ref{fig:csBR}, we show the variation of $\sigma(pp \to s \to \gamma \gamma)$ with the
Higgs-dilaton mixing angle $\sS{}$ for three different values of $\frac{v}{f}=\{1,0.5,0.1\}$ and $\sL{}=0$. When $\frac{v}{f}=1$, we find, in the limit of
$\sS{}\to 0$, the NNLO cross section $\sigma(pp \to s \to \gamma \gamma) \to 1.1 $ fb. As mixing between $h$ and $s$ becomes non-zero ($\sS{}\ne 0$), there is a dramatic fall in the $\sigma$, as can be seen in Fig.~\ref{fig:csBR}. This behavior is due to the large negative
interference arising from the $W$-boson loop contribution to the diphoton decays of the dilaton. Furthermore, with non-zero values of $\sS{}$, tree level decays of $s\to VV$ where $V=\{W^{\pm},Z\}$ are allowed and become the dominant decay modes, further reducing the $s\to \gamma \gamma$ branching ratio, cf.~Fig.~\ref{fig:app:BR-s} in Appendix~\ref{app:bratio}.
In the rest of this paper we therefore restrict ourselves to the scenario where $\sS{}=0$. We are therefore left with three parameters in the model: $\sL{},f$ and $N_T$. When we set $\sS{}=\sL{}=0$, the dilaton $s$ can decay only through four different loop processes $s\to \gamma\gamma$, $s\to Z\gamma$, $s\to ZZ$ and $s\to gg$.
When $\sL{}\ne 0$, then the tree level $s\to t \bar{t}$ decay channel also becomes available, though suppressed by powers of $\sL{4}$ in the small mixing angle limit.\footnote{Mixing with the top quark also allows for the decay channel $s \to W^+ W^-$ through a triangle diagram. However, since the mixing angle $\sL{}$
is strongly constrained by electroweak precision tests to a small value, we may safely neglect this decay channel.}
Consequently, the total decay width of the dilaton is expected to be very small.
Branching ratios to these various channels are shown in Appendix~\ref{app:bratio}.
In Fig.~\ref{fig:csBR2}, the variation of $\sigma(pp \to s \to \gamma \gamma)$ with the $t-t'$ mixing angle $\sL{}$ is shown. We see that there is only a weak dependence on the mixing angle $\sL{}$. This behavior, as explained earlier, is due to the fact that for the choice of $\sS{}=0$,
the $\sL{}$ dependence of the cross section almost vanishes. As expected, one can see that the cross section simply depends quadratically on $\eta=N_T v/f$.
In order to constrain the model, we use the following values of cross sections
\begin{itemize}
\item $\sigma(pp \to s \to \gamma \gamma) = 6.26 \pm 3.23 $ fb \cite{1512.04939, ATLAS-CONF-2015-081, CMS-PAS-EXO-15-004}.
\item $\sigma({pp \to s \to Z \gamma }) < 8.2 $ fb \cite{Aad:2014fha}.
\item $\sigma({pp \to s \to g g }) < 2200 $ fb \cite{CMS-PAS-EXO-14-005}.
\item $\sigma({pp \to s \to Z Z }) < 19 $ fb \cite{Aad:2015kna}.
\item $\sigma({pp \to s \to t \bar{t} }) < 700 $ fb \cite{Aad:2015fna}.
\end{itemize}
In Fig.~\ref{fig:other-limits}, we set $N_T=1$ and show, in the $(\sL{}-\frac{v}{f})$ plane, constraints from one sigma exclusion limits from $\sigma(pp \to s \to \gamma \gamma)$ and $\sigma(pp \to s \to Z \gamma)$ and perturbativity requirement $(\lambda_S \le 4 \pi)$. Similarly, in Fig.~\ref{fig:other-limits-NT2}, we show the same exclusions for the case when $N_T=2$.
We do not show constraints from $s\to gg$, $s\to ZZ$ and $s\to t \bar{t}$ decay modes in these figures since they are very weak. The allowed region, that explain the diphoton excess to within one standard deviation, corresponds to the unshaded white regions in the figure.
In Fig.~\ref{fig:other-limits}, where $N_T=1$, we see that large values of $\frac{v}{f}$ are necessary in order to explain the diphoton excess. However, such large values of $v/f$ (around $2$) are mostly ruled out by the requirement of perturbativity $(\lambda_S \le 4 \pi)$ and only a small region of parameter space remains to explain the signal. On the other hand, in Fig.~\ref{fig:other-limits-NT2}, where $N_T=2$, we see that smaller values of $\frac{v}{f}$ (hence larger values of $f$) can explain the diphoton excess, thus evading bounds from perturbativity ($\lambda_S \le 4\pi$).
\begin{figure}
\centering
\begin{minipage}{0.45\textwidth}
\includegraphics[scale=0.5]{figs/other-limits_v1.png}
\caption{ Constraints from $pp \to s\to (\gamma \gamma,Z \gamma)$ production rates of the dilaton as well as perturbativity requirement($\lambda_S \le 4 \pi$). The shaded regions are excluded.
Here $N_T=1$. \label{fig:other-limits}}
\end{minipage}
\hfill
\begin{minipage}{0.45\textwidth}
\includegraphics[scale=0.5]{figs/other-limits-NT2_v1.png}
\caption{Constraints from $pp \to s\to (\gamma \gamma,Z \gamma)$ production rates of the dilaton as well as perturbativity requirement($\lambda_S \le 4 \pi$). The shaded regions are excluded.
Here $N_T=2$. \label{fig:other-limits-NT2}}
\end{minipage}
\end{figure}
In Fig.~\ref{fig:NTvar1}, we show the same set of constraints in the $(\frac{v}{f} -N_T)$ plane while setting $\sL{}=0$. We see that the model is able to explain the diphoton excess and avoid other constraints when $N_T\ge 1$. Further, as $N_T$ increases, the value of $f$ required to explain the diphoton excess increases (denoted by the unshaded white region in the figure).
As discussed in Appendix~\ref{app:vac-stab}, although the MDM, in its current form, can explain the diphoton excess, additional new dynamics is required in the TeV region to stabilize the vacuum. It is not necessary that the new dynamics will contribute to the diphoton signal. It is only required that it contributes positively to the running of the coupling $\beta_{\lambda_S}$. We therefore do not speculate the nature of this new dynamics as there are a vast number of possibilities.
It is interesting to observe that this model has very definite predictions for $s\to Z\gamma$, $s\to ZZ$ and, $s\to t\bar{t}$ branching ratios.\footnote{
See Appendix~\ref{app:sdecay} and \ref{app:bratio} for details. }
If the diphoton excess is confirmed in future runs of the LHC , then a way to further test this model is to determine these branching ratios. We discuss this in further detail later in the paper.
\begin{figure}
\centering
\includegraphics[scale=0.55]{figs/NT-limits_v1.png}
\caption{ Constraints from the $pp \to s\to (\gamma \gamma,Z \gamma)$ production of the dilaton as well as well as perturbativity of the of the dilaton's quartic coupling($\lambda_S \le 4 \pi$).
Here we set $\sL{}=\sS{}=0$. \label{fig:NTvar1}}
\end{figure}
\section{Phenomenology of MDM at LHC}
In this section we discuss the phenomenology relevant for future LHC runs in the context of the Minimal dilaton model with its constraints as derived in earlier sections.
In light of the $750$ GeV excess, the constraints on MDM can be summarized as follows:
\begin{itemize}
\item Mixing between the $125$ GeV Higgs boson and the dilaton $s$ is effectively nil, i.e. $\sS{}\sim0$. We will consider phenomenology of the the MDM strictly in the case when $\sS{}=0$.
\item Precision constraints and single top measurements require the mixing between the top and its partner(s) to be small (i.e. $\sL{}\ll 1$).
\item We find the Minimal Dilaton Model with $0.2\leq v/f\leq 1.0$ and $1< N_T<10$ is a valid effective theory up to the scale of $\sim m_{t'}$. Not only
does it explain the diphoton signal, but also satisfies all the constraints from both experimental data and the requirement for perturbativity. For $N_T > 10$, the beta function of the strong coupling constant becomes positive such that the QCD interaction is no longer asymptotically free. Hence, we do not consider this case.
\item The top partner mass is constrained by requiring the perturbativity of the Yukawa coupling $y_T \sim M/f < 4 \pi /\sqrt{N_c}$ GeV, where $N_c =3$ counts the number of color states of the top partner(s).
Since the dilaton is entirely responsible for generating the mass of the top partner(s), $m_{t'}$ is bounded from above: $m_{t'} < (1800 f/v ) $ GeV, in the small mixing
angle approximation. We therefore expect to find top partner(s) with masses in the range of $2-9$ TeV given the bounds from the previous point.
\end{itemize}
Given the approximate constraints summarized above, we proceed to discuss the phenomenology of the model.
\subsection{Determination of dilaton branching ratios}
If the diphoton resonance is confirmed at the future runs of the LHC, the next step is to determine the ratio of branching ratios of the dilaton into various decay channels.
Since we consider the limit $\sS{}=0$ and $\sL{}\ll 1$, the possible decay channels of the dilaton are
\begin{itemize}
\item $s \to g g$: In the limit $\sS{}=\sL{}=0$, $\Gamma(s \to g g)/\Gamma(s \to \gamma \gamma) \sim 9\alpha_s^2/ 8\alpha^2 \sim 14$. This decay channel can be investigated through dijet decays.\footnote{ That the dijets are indeed of gluonic origin may be investigated with the aid of tools such as jet energy profiles. See, for example, ~\cite{Chivukula:2014pma}. }
\item $s \to Z \gamma$: In the limit $\sS{}=\sL{}=0$, $\Gamma(s \to Z \gamma)/\Gamma(s \to \gamma \gamma) \sim 2 \tan^2\theta_w \sim 0.6$.
\item $s \to ZZ$: In the limit $\sS{}=\sL{}=0$, $\Gamma(s \to Z Z)/\Gamma(s \to \gamma \gamma) \sim \tan^4\theta_w \sim 0.1$.
\item $s\to t \bar{t}$: This process is proportional to $\sL{4}$ and is therefore quite small. For $\sL{}=0.3$, $\Gamma(s \to t \bar{t})/\Gamma(s \to \gamma \gamma) \sim 0.06$.
\item $s \to W^+ W^-$: This decay channel has a non-zero partial decay width only when $\sL{}\ne 0$. Further, since it is proportional to $\sL{4}$, it is expected to be highly suppressed, as compared to the other decay modes, cf.~Appendix~\ref{app:sdecay}.
\item $s \to hh$: Similar to the $WW$ channel, this decay mode has a non-zero partial width only when $\sL{}\ne 0$ and is expected to be very small.
\end{itemize}
The decay width of the dilaton, as mentioned earlier is expected to be small. In fact, when $\sS{}=0$, the ratio of decay width to mass of the dilaton ($\Gamma_s/m_s$) is of order $10^{-4}$. In this model, this ratio, can be large ($\sim 0.3$) when $\sS{}=1$. However, $\sS{}\ne 0$ is unfavorable for explaining the diphoton excess. The decay width also increases as $N_T^2$ when $\sS{}=0$, however, the range of variation is small. For $N_T = 1$ we find $\Gamma / M \sim 6\times10 ^{-5}$ and for $N_T=10$ we find $\Gamma / M \sim 6\times10 ^{-3}$.
\subsection{Determination of top partner mass and branching ratios}
Electroweak decay modes of top partners are possible when mixing with top quarks is present ($\sL{}\ne0$).
In such a scenario, the $t'$ has four possible decay modes: $t' \to W t$, $t' \to Z t$, $t' \to h t$ and, if kinematically allowed, $t' \to s t$.
The first three decay widths are related through the Goldstone Equivalence Theorem~\cite{Cornwall:1974km,Lee:1977eg,Gounaris:1986cr,Chanowitz:1985hj,Yao:1988aj}
and one finds that $\Gamma(t' \to W t) \simeq 2 \Gamma(t' \to Z t) \simeq 2 \Gamma(t' \to h t) $~\cite{Dobrescu:2009vz}. For the fourth decay channel
(assuming $m_{t'}\gg(m_{t},m_{s})$ and $\sL{}\ll 1$), we have $\Gamma(t' \to s t)\simeq (v/f)^2 \Gamma(t' \to h t) $. Therefore, the decay channel is suppressed not
only through phase space factors but also through $(v/f)^2$.
Hence, in the context of MDM, one could follow the traditional strategy of searching for top partners.\footnote{
See, for example, Ref.~\cite{Chatrchyan:2013uxa} and references therein.}
As explained earlier, one expects to find top partners with masses in the range of $\sim 2-9$ TeV. Top partners can be searched for at hadron colliders, either through pair or single production. For $14$ TeV LHC with $3000\, {\rm fb^{-1}}$ integrated luminosity, $5\sigma$ discovery is possible up to $m_{t'}\sim 1.5$ TeV, whereas a $33$ TeV machine with the same amount of integrated luminosity could discover a top partner with $m_{t'}\sim 2.4$ TeV~\cite{Agashe:2013hma}. For a 100 TeV machine it is possible to set limits as large as $m_{t'} \gtrsim 6$ TeV~\cite{Matsedonskyi:2014mna}.
One interesting aspect pertaining to the particular form of the mass matrix used in this study is that for $N_T >1$, the top partner masses are not all degenerate. Furthermore, from earlier discussion we learned that in order to explain the diphoton signal, $N_T$ could be greater than one. Therefore, one might expect to find top partners of same charge, but different masses. If $m'$, cf.~Eq.~(\ref{eq:app-mass-eval}), is large, the mass difference between the heaviest top partner and the degenerate top partners may be large enough to open up decay channels of the form $t_1' \to t_2' + h/Z $. This presents itself as a novel signal albeit a weaker one in comparison to decay modes discussed earlier.
\subsection{Double Higgs and Higgs plus jet productions }
The presence of top partners and mixing with top quark has consequences on both double Higgs and double dilaton production. When $\sS{}=0$ and $\sL{}=0$,
there is no contribution from top partners or dilaton to the production of a pair of Higgs bosons at hadron colliders. When $\sL{}\ne0$, top partners begin to
contribute to both the triangle and box diagrams in double Higgs production. At the same time, the contribution from the top quark reduces due to smaller values of
the top Yukawa coupling. Since top partners are more massive than the top itself, the consequence of having $\sL{}\ne 0$ is to reduce the double Higgs production
cross section in the invariant mass region that is far below the mass of the $t'$~\cite{Dawson:2015oha}.\footnote{It is interesting to note that since the mass
eigenstates are rotated through orthogonal transformation, the cross section follows a sum rule, namely that the double Higgs cross section reduces to the SM value when
$m_{t}=m_{t'}$.} Needless to say that if the mass of $t'$ is not too large and can be directly produced in high energy colliders, a resonance peak in the double Higgs boson
invariant mass distribution is expected. Interestingly, when $\sL{}\ne 0$, then $s \to hh$ decays are possible, albeit small. This would give rise to a small peak in the invariant mass spectrum at $m_{hh}~\sim 750$ GeV.
Similarly, the presence of the top partners will also affect the transverse momentum ($p_T$) distribution of the Higgs boson produced in association
with a high $p_T$ jet \cite{Dawson:2015oha}. When $\sL{}\ne0$, top partners begin to contribute to both the triangle and box diagrams in Higgs plus jet production.
In the small $p_T$ (less than $m_h$) region, the $\sL{}$ dependence of the differential cross section is weak,\footnote{
The reason is the same as we have argued at the end of section~\ref{sec:higgs-fit} when studying the decay width of $h \to gg$ in the MDM,
since both $m_{t}$ and $m_{t'}$ are larger than $m_h/2$.}
consequently, the low $p_T$ distribution of the Higgs boson will approximately resemble the SM prediction.
However, in the high $p_T$ (larger than $m_t$) region, where the invariant $(\sqrt{\hat{s}})$ of the process is large, the
differential cross section will depend on the value of $\sL{}$ and become smaller than the SM prediction
as $p_T$ increases toward $m_{t'}$ .
Hence, a precise measurement of the $p_T$ distribution, particularly in the high $p_T$ region, can probe
BSM physics such as the MDM.
\section{Conclusions}
In this work we analyzed the Minimal Dilaton Model as a potential candidate to explain the $750$ GeV diphoton excess. The linearized version of the model presents an effective lagrangian that includes the usual SM along with a singlet scalar dilaton ($s$) and $N_T$ number of vector-like top partners with quantum numbers identical to the right handed top quark.
We identify the possible $750$ GeV resonance with the dilaton $s$ and find that the model can explain the diphoton signal and avoid other experimental constraints. We find that values of $f$ in the range of $[0.4,1]$~TeV can explain the diphoton excess in this model.
Interestingly, we find that in order to explain the signal, mixing between the Higgs boson and the dilaton must be very small or zero (i.e., $\sin\theta_S \sim 0)$. Mixing between the top and its partner(s)
is allowed but is constrained ($\sL{} \leq 0.3$) by precision electroweak test (i.e., $S$, $T$ and $U$ parameters) and by single top production measurements.
We also note that the mixing angle $\sL{}$ may be further constrained through experiments by measuring the
$s\to Z\gamma$, $s\to Z Z$, and $s\to t\bar{t}$ decay branching ratios, and by improved single-top measurements. The constraint on $\sin\theta_L$ from single-top measurement is independent of the mass of the partner. This conclusion also holds for any model which allows the top partner to mix with top quark.
We observe three key features with regards to the phenomenology of the MDM. Firstly, signatures for the top partner(s) at the LHC are archetypal of vector like quark searches.
However, the model allows the presence of additional top partners (to explain the diphoton excess).
Hence, so long as $\sL{}\ne 0$, one hopes to find non-degenerate top partners at the LHC.
Secondly, double higgs production is affected when $\sL{}\ne0$. Finally, Higgs plus jet production at the LHC in the high $p_T$ region is also sensitive to presence of top partner(s) in the loop.
\section{Acknowledgements}
This work was supported by the National Science Foundation under Grant No. PHY-1417326 and under Grant No. PHY-1519045. We thank S. Dawson and C.-P. Yuan for discussions.
We also wish to acknowledge the support of the Michigan State University High Performance Computing Center and the
Institute for Cyber Enabled Research.
|
\section{INTRODUCTION}
Since the first discovery of exoplanets \citep{may95}, about 1900 exoplanets have been found to date. They include a wide variety of planetary systems such as hot Jupiters and eccentric planets etc. But a comprehensive planetary formation model that explains all these planet types has not yet been established.
Most exoplanets have been found by the radial velocity \citep{but06} and transit \citep{bor11} methods. These methods are sensitive to low-mass planets orbiting less than 1 AU from the host star. In contrast, gravitational microlensing is sensitive to planets orbiting at a few AU away from the host stars down to Earth mass, which is complementary to other methods \citep{ben96}. \citet{sum10} constructed the planet mass function beyond the snow-line and found Neptune-mass planets are $\sim$3 times more common than Jupiter-mass planets based on 10 microlensing planets. \citet{gou10} estimated the planet abundance beyond the snow-line based on 6 events and found they are 7 times more likely than that at close orbits of 1 AU. \citet{cas12} used 6 years of PLANET collaboration data to constrain the cool planetary mass function for masses $5 M_{\oplus} - 10 M_{\rm Jup}$, and separation $0.5 - 10 AU$, including constraints obtained by the two previous works by \citet{sum10} and \citet{gou10}, and found there is one planet per star in the Galaxy. \citet{cla14} found that the planet abundances estimated by microlensing are consistent to these found by radial velocity. Recently \citet{shv15} estimated planet abundance and mass function based on 9 events and found that 55\% of stars host a planet beyond the snow-line and Neptune-mass planets are $\sim$10 times more common than Jupiter-mass planets. \citet{suz16} found a break and possible peak in the exoplanet mass ratio function at $q \sim 10^{-4}$, and found 0.75 planets per star at $q > 5 \times 10^{-5}$ and 1.12 planets per star for $q > 0$. However, the numbers of planets used in these analyses were small. Thus discovering more statistics microlensing planets is important for improving our statistical estimates of planets abundances.
In microlensing, we can measure the planet/host mass ratio $q$ and their separation $s$ in units of Einstein radii. The mass and the distance can be measured when we detect the microlensing parallax effect or detect the lens directly together with an angular Einstein radius, $\theta_E$, obtained from the finite source effect. Also, there are other effects that can help break the degeneracy such as astrometric microlensing \citep{gou14} and interferometry \citep{cas16}. Recently, follow-up observations by {\sl Spitzer} helped resolve the degeneracy by detecting parallax effects \citep{uda15, zhu15}. Further, space-based parallax observations of microlensing events by the {\sl Kepler} telescope (K2C9) are planned in 2016 \citep{gou13}. But we need to wait for results from the {\sl WFIRST} satellite, for large number statistics. Until then, we need to collect as many ground-based microlensing events as possible, including events without parallax measurements (e.g. Suzuki et al. in preparation). In such an analysis, a careful treatment of events with a weak signal or with a degeneracy between parameters is important.
In this paper, we report the analysis of a microlensing event OGLE-2012-BLG-0724 which has a relatively weak planetary signal and degenerate solutions. We describe the observation of this event in section 2. Section 3 explains our data reduction procedure. Section 4 discusses the modeling of the lightcurve and the comparison with other models. Section 5 discusses the likelihood analysis. Finally we discuss the results of this work in section 6.
\section{OBSERVATION}
The Microlensing Observations in Astrophysics (MOA) collaboration conducts a high cadence microlensing survey observation program toward the Galactic bulge at Mt John in New Zealand \citep{bon01,sum03}. The second phase of MOA uses the 1.8m MOA-II telescope equipped with a very wide field-of-view (2.2 ${\rm deg}^2$) MOA-cam3 CCD camera \citep{sak08}. The MOA-II observing strategy is that 6 fields ($\sim13 \ {\rm deg}^2$) with the highest lensing rate are observed with a 15 minute cadence, while the 6 next best fields are observed with a 47 minutes cadence, and 8 additional fields are observed with a 95 minutes cadence. The MOA-II observations are carried out in the custom MOA-Red wide band filter, which corresponds to the sum of the standard Cousins $R$ and $I$-bands. MOA issues $\sim 600$ alerts of microlensing events in real time each year.\footnote[1]{ https://it019909.massey.ac.nz/moa/} The 61 cm B\&C telescope at the same site is used for follow-up observations with standard $I$ and $V$-band filters.
The Optical Gravitational Lensing Experiment (OGLE; \citep{uda15a}) conducts a microlensing survey with the 1.3 m Warsaw telescope at the Las Campanas Observatory in Chile. The fourth phase of OGLE, OGLE-IV started its high cadence survey observations in 2010 with a 1.4 ${\rm deg}^2$ FOV mosaic CCD camera. OGLE-IV observes the Galactic bulge fields with cadences ranging from one observation every 20 minutes for 3 central fields to less than one observation every night for the outer bulge fields. Most observations are taken in the standard Kron-Cousin $I$-band with occasional observations in the Johnson $V$-band. OGLE-IV issues alerts for $\sim 2000$ micolensing events in real time each year.\footnote[2]{http://ogle.astrouw.edu.pl/ogle4/ews/ews.html}
The gravitational microlensing event OGLE-2012-BLG-0724 was first found and alerted by OGLE on 22 May 2012 (HJD$'$ = HJD-245000 $\sim$6069.60) at (R.A., decl.)(J2000) = ($17^{h}55^{m}52^{s}.39$, $-29^{\circ}49'06''.7$) or $(l, b) = (0^{\circ}.385, -2^{\circ}.371)$ in Galactic coordinates. MOA independently detected and alerted the same event on the next day (HJD$'$ = 6071.02) as MOA-2012-BLG-323. The light curves are shown in Figure 1. Because the magnification of this event was predicted very high, $\sim$ 100, which is sensitive to planets \citep{gou92,rat02}, this event was alerted as a high-magnification event. During the event, the small deviation from the point-source point-lens (PSPL) model fit was detected in the MOA-II data in real-time. So follow-up observations were started using the B\&C telescope immediately and increased the observation cadence. The data covered the both caustic entry and exit, but the photometry accuracy at the caustic exit was a little worse due to thin cloud. Because the duration of the anomaly was short, about 6 hours, and the peak magnitude of $I_{\rm max} = 16.5$ was too faint for small telescopes, only the B\&C telescope could conduct follow-up observations of the anomaly.
\section{DATA REDUCTION}
The MOA-Red-band and B\&C $I$ and $V$-band data were reduced by the MOA Difference Image Analysis (DIA) pipeline \citep{bon01}. The OGLE $V$ and $I$-band data were reduced by the OGLE DIA photometry pipeline \citep{uda15a}. Systematic photometry trends in the MOA data with seeing and differential refraction measured in years other than 2012 were linearly subtracted from all the MOA photometry data.
It is known that the nominal errors from the photometric pipeline are underestimated for the stellar dense fields like ours. We renormalized the error bars of each dataset by using the following standard formula,
\begin{equation}
\sigma'_i = k \sqrt{\sigma_i^2 + e_{\rm min}^2}
\end{equation}
where $\sigma_i$ is the original error of the $i$th data point in magnitudes, and $k$ and $e_{\rm min}$ are the re-normalizing parameter \citep{yee12}. The cumulative $\chi^2$ distribution from the tentative best fit model, which are sorted by their magnification of the model at each data point, is supposed to be the straight line if the data is normal distribution.
Thus $e_{\rm min}$ is chosen to make this cumulative $\chi^2$ distribution a straight line.
Then $k$ is chosen so that each data set gives $\chi^2/{\rm d.o.f} = 1$. The results are shown in Table \ref{tab1}.
\section{LIGHT CURVE MODELING}
For a binary lens model, fitting parameters are the time of closest approach to the lens masses, $t_{\rm 0}$, $t_{\rm E}$ and $u_0$ are the Einstein radius crossing time and the impact parameter in units of the angular Einstein radius $\theta_{\rm E}$, $q$ is the planet/host mass ratio, $s$ is the planet-star separation in Einstein radius units, and $\alpha$ is the angle of the source trajectory relative to the binary lens axis. When we take account of the finite source effect and the parallax effect, the angular radius of the source star in units of $\theta_{\rm E}$, $\rho$, and the east and north components of the microlensing parallax vector, $\pi_{\rm E,E}$ and $\pi_{\rm E,N}$, are added for each case. The modeling light curve can be given by,
\begin{equation}
F(t) = A(t)F_{\rm S} + F_{\rm b}
\end{equation}
where F($t$) is the flux at time {\sl t}, A($t$) is a magnification of the source star at {\sl t}, $F_{\rm S}$ and $F_{\rm b}$ are baseline fluxes from the source and blend stars, respectively.
In this section, we estimate limb darkening and search for the best-fit model. Then we investigate the parallax effect and other models.
\subsection{Limb Darkening}
In this event, the caustic entry and exit were observed. This allows an estimate of the finite source star parameter, $\rho \equiv \theta_{\rm *}/\theta_{\rm E}$. To get $\rho$ properly, we have to apply limb darkening in the finite source calculation. We adopt a linear limb-darkening surface brightness, $S_{\rm \lambda}(\vartheta)$, given by,
\begin{equation}
S_{\rm \lambda}(\vartheta) = S_{\rm \lambda} (0) [1 - u_{\rm \lambda}(1 - \cos(\vartheta))]
\end{equation}
where $\vartheta$ is the angle between the normal to the stellar surface and the line of sight, and $u_{\rm \lambda}$ is a limb darkening coefficient in each filter. The effective temperature calculated from the source color discussed in section 5 is $T_{\rm eff} \sim 4930 \ {\rm K}$ \citep{gon09}. Assuming $T_{\rm eff} = 5000 \ {\rm K}$, surface gravity $\log g = 4.5 \ {\rm cm \ {s}^{-2}}$ and metallicity $\log [M/H] = 0$, the limb darkening coefficients selected from Claret (2000) are $u_{\sl I} = 0.5880$, $u_{\sl V} = 0.7592$ and $u_{\rm Red} = 0.6809$ for each filter.
\subsection{Best-fit Model}
We search for the best-fit model over a wide range of values of microlensing parameters by using the Markov Chain Monte Carlo (MCMC) algorithm \citep{ver03} and the image-centered ray-shooting method \citep{ben96, ben10}. To find the global best model, we first conduct a grid search by fixing three parameters, $q$, $s$ and $\alpha$, at 20000 different grid points with other parameters free. Next, by using the best 100 smallest $\chi^2$ models as a initial parameters, we search for the best-fit model by refining all parameters.
The best-fit light curve and the parameters are shown in Figure \ref{fig1} and Table \ref{tab2}. The $\Delta\chi^2$ of these models compared to the PSPL and FSPL (finite-source point-lens) are about 373 and 210, respectively, so the planetary signal is detected confidently. As is often the case for high magnification event, there are two degenerate solutions with a separation of $s$ and $1/s$ that can explain the light curve, which is known as the "close-wide" degeneracy. We call the model with $s<1$ and $s>1$ as the close and wide models, respectively. The other parameters are almost the same. These solutions are equally preferred with $\Delta\chi^2$ of 0.2. The overall shape of the caustics of these two models are different but the central part where the source crosses are very similar, see Figure \ref{fig2}. Thus we cannot distinguish between the models.
\subsection{Parallax Model}
Microlensing parallax is an effect where the orbital motion of the Earth causes the apparent lens-source relative motion to deviate from a constant velocity. This can be described by the microlensing parallax vector \mbox{\boldmath $\pi$}$_{\rm E}=(\pi_{\rm E,N}, \pi_{\rm E,E})$ whose direction is the direction of the lens-source relative motion projected on the sky and its amplitude, $\pi_{\rm E}={\rm AU}/\tilde{r}_{\rm E}$, is the inverse of the Einstein radius, projected to the observer plane.
If the parallax effect and finite source effect are measured in a gravitational microlensing event, we can calculate the lens properties uniquely by assuming the distance to the source star, $D_{\rm s}$, as
$M_{\rm L}=\theta_{\rm E}/(\kappa\pi_{\rm E})$ and
$D_{\rm L}={\rm AU}/({\pi_{\rm E}\theta_{\rm E}+\pi_{\rm s}})$
where $\kappa=4G/(c^2{\rm AU})=8.144 \ {\rm mas} \ M^{-1}_{\odot}$ and $\pi_{\rm s}={\rm AU}/D_{\rm s}$ \citep{gou00}.
We searched for the best model with the parallax effect and found a model with an improvement in $\chi^2$ of $\Delta\chi^2=\chi^2_{\rm stat} - \chi^2_{\rm para} \sim 47$. However the value of the parallax parameters are $\pi_{\rm E,E}=1.53\pm0.18$ and $\pi_{\rm E,N}=-8.00\pm0.63$, which are much larger than typical values, i.e., unity or less. If they were real, then the lens host star would be a close to three Jupiter-masses. Figure \ref{fig8} shows the difference in the cumulative $\chi^2$ between the static model and the model with the parallax effect. The $\Delta\chi^2$ of MOA-Red and OGLE-{\sl I} are $\Delta\chi^2_{\rm MOA- Red}\sim35$ and $\Delta\chi^2_{{\rm OGLE-}{\sl I}}\sim12$, respectively. The largest improvement in $\chi^2$ due to parallax comes from very low level continuous deviations around $HJD' \sim 6000$ which is far from the main magnified part of the event. This period corresponds to the beginning of the observation season and the GB fields were observed at low altitudes. It is known that the light curves taken at high airmass are affected by the systematics due to the basic parameters of the static model, at both the beginning and the end of the season as shown in the bottom panel of Figure \ref{fig8}. For this reason, we regard this parallax signal as not real, but due to residual systematics which could not be corrected by the de-trending process applied to the light curve. Therefore, we decided not to include the parallax effects in the following analysis.
\subsection{Search for Degenerate Solution}
In the initial grid search for best-fitting models, we found some local minima with stellar binary mass ratios. To check the uniqueness of the best planetary model, we inspected the models with the mass ratio $q$ in the range of $-5 < \log q < 0$ carefully. Figure \ref{fig3} shows $q$ versus $\Delta\chi^2$. We found two local minima around $q \sim 4\times10^{-5} \ {\rm and} \sim 1$, which are planetary mass ratio and binary mass ratio, respectively. But the $\Delta\chi^2$ compared from the best-fit models are about 91 and 100, respectively, so we conclude the best models are superior by about 9$\sigma$ and 10$\sigma$.
\section{LENS PROPERTY}
The lens physical parameters can not be derived directly because a credible parallax effect is not measured in this event.
Only the angular Einstein radius $\theta_{\rm E}=\theta_{\rm *}/\rho$, can be measured from the finite source effect, where $\theta_{\rm *}$ is the angular source star radius.
Figure \ref{fig4} shows the OGLE instrumental $({\sl V-I, I})$ CMD within $2'$ around the source star. The centroid of Red Clump Giants (RCG), $({\sl V-I,I})_{\rm RCG} = (2.31,15.88) \pm (0.01,0.02)$ and the best fit source color and magnitude, $({\sl V-I, I})_{\rm S}=(2.231,21.89) \pm (0.002,0.07)$ are shown as filled red and blue circles, respectively. In Figure \ref{fig4}, we also show the stars in Baade's window observed by the {\sl HST} \citep{hol98}, which are corrected for the extinction and reddening by the RCG position in the {\sl HST} CMD, $({\sl V-I,I})_{{\rm RCG,}{\sl HST}}=(1.62,15.15)$ \citep{ben08}. They are plotted as green dots in Figure \ref{fig4}. We {\bf find out} that the best fit source color and magnitude are consistent with bulge main sequence stars. Assuming the source suffers the same dust extinction and reddening as the RCGs and using the expected extinction-free RCG centroid $({\sl V-I, I})_{\rm RCG,0} = (1.06, 14.42) \pm (0.06, 0.04)$ at this position \citep{ben13,nat13}, we estimated the extinction-free color and magnitude of the source as $({\sl V-I,I})_{\rm S,0}=(0.98,20.43) \pm (0.06,0.09)$. We also independently derived the source color and magnitude from the MOA-Red and MOA-{\sl V} bands which are transformed to standard {\sl I} and {\sl V}-bands, and the CMD within $5'$ around the source star in the MOA reference image, and confirmed the above results. We adopt the color from the OGLE data as it is more accurate.
The angular source radius $\theta_{\rm *}$ is calculated by using the observed $(V-I, I)_{\rm S,0}$ and the relation between the limb-darkened stellar angular diameter, $\theta_{\rm LD}$, $(V-I)$ and {\sl I} from \citet{boy14} \& \citet{fuk15},
\begin{equation}
\log \theta_{\rm LD} = 0.5014 + 0.4197(V - I) - 0.2I.
\end{equation}
This gives $\theta_{\rm *} \equiv \theta_{\rm LD}/2 = 0.336 \pm 0.025 \ {\rm \mu as}$, whose error includes the $\sigma_{\sl (V-I)}, \sigma_{\sl I}$ and the 2\% uncertainty in Equation 4.
We derived the angular Einstein radius $\theta_{\rm E}$ and the geocentric lens-source relative proper motion $\mu_{\rm geo}$ for close and wide models as follows,
\begin{equation}
\theta_{\rm E} = \frac{\theta_*}{\rho} = 0.239 \pm 0.028 \ {\rm mas \ (close)}
\end{equation}
\begin{equation}
= 0.242 \pm 0.029 \ {\rm mas \ (wide)},
\end{equation}
\begin{equation}
\mu_{\rm geo} = \frac{\theta_{\rm E}}{t_{\rm E}} = 6.52 \pm 0.87 \ {\rm mas \ yr^{-1} \ (close)}
\end{equation}
\begin{equation}
= 6.55 \pm 0.90 \ {\rm mas \ yr^{-1} \ (wide)} .
\end{equation}
We conduct a Bayesian analysis to get the probability distribution of the lens properties \citep{bea06,gou06,ben08}. We calculate the likelihood by using the Galactic model \citep{han03} and the observed $t_{\rm E}$ and $\theta_{\rm E}$. We also used the de-reddened blending flux which includes the lens and unrelated stars derived from the OGLE-{\sl I} and OGLE-{\sl V} light curves as the upper limit for the lens brightness,
\begin{equation}
I_{\rm b,0} = 18.54 \pm 0.05,
\end{equation}
\begin{equation}
V_{\rm b,0} = 18.39 \pm 0.08,
\end{equation}
Because the $\chi^2$ and physical parameters of close and wide models are similar, we combined the probability distribution of these models by weighting the probability distribution of the wide model by $e^{-\Delta\chi^2/2}$, where $\Delta\chi^2=\chi^2_{\rm wide}-\chi^2_{\rm close} \sim 0.20$. Figure \ref{fig5} and \ref{fig6} show the probability distribution of the lens properties derived from the Bayesian analysis. According to the results, the lens host star is an M-dwarf with a mass of $M_{\rm L}=0.29_{-0.16}^{+0.33} \ M_{\sun}$ and its distance is $D_{\rm L}=6.7_{-1.2}^{+1.1} \ {\rm kpc}$ away from the Earth, and the mass of the planet is $m_{\rm P}=0.47_{-0.26}^{+0.54} \ M_{\rm Jup}$ and the projected separation is $a_{\perp}=1.6_{-0.3}^{+0.4} \ {\rm AU}$. If we assume a circular and randomly oriented orbit for the planet, the 3-dimensional semi-major axis is expected to be $a=2.0_{-0.5}^{+1.0} \ {\rm AU}$. The probability distribution of {\sl I}-, {\sl V}- and {\sl H}-band magnitudes of the lens star with the extinction is shown in Figure \ref{fig6}. The extinction for the lens is assumed to be the same as that for the source because the lens is predicted to be near the Galactic bulge. The {\sl H}-band magnitude of the source with the extinction is calculated to be $H_{\rm S}=20.52 \pm 0.12$ from the extinction-free $(I-H)$ color of the source estimated from $(V-I)$ color using the stellar color-color relation \citep{ken95} and the {\sl H}-band extinction $A_H$ estimated from $A_I$ and $A_V$ using the extinction law by \citet{car89}. The lens is predicted to be fainter than the source by $\sim 3$ magnitude in the {\sl I}-band, $\sim 5$ magnitude in the {\sl V}-band and $\sim 2$ magnitude in the {\sl H}-band, respectively. Thus it is not easy to detect the lens flux by future high resolution follow-up observations.
\section{DISCUSSION AND CONCLUSION}
Originally, OGLE-2012-BLG-0724Lb was thought to comprise a binary star lens system. In this work, we concluded that OGLE-2012-BLG-0724Lb is a Saturn mass planet orbiting around an M-dwarf. This system is of a type typically found by gravitational microlensing. Recently, \citet{fuk15} found a possible pileup of sub-Jupiters ($0.2 < m_{\rm P}/M_{\rm Jup} < 1$) in contrast to a lack of Jupiters ($\sim 1-2 \ M_{\rm Jup}$) around M-dwarfs, suggesting that Jupiter-mass planets are rarely formed around M-dwarfs, as predicted by core accretion models (e.g. \citet{ida05}). OGLE-2012-BLG-0724Lb belongs to the sub-Jupiter class, supporting the above idea. However, the statistical error of the abundance of these planets is still large. A larger sample will give us a better understanding of the planetary formation mechanisms.
In statistical analysis leading to estimates of planet abundances, we need to beware events which have degenerate solutions. For example, OGLE-2008-BLG-355Lb was originally published as a stellar binary, but the reanalysis of \citet{kos14} concluded that it was a planet. In such cases, we need to investigate the wide range of parameters so as not to be fooled by local minima. Event OGLE-2012-BLG-0724 has a relatively short time scale, the anomaly lasted for only 6 hrs, and it was not very bright even at the high-magnification peak, which was difficult for follow-up observations by small telescopes. We could figure out the planetary nature and its superiority over the binary solution thanks to the high-cadence observations by OGLE and MOA.
The recent high-cadence survey observations by medium-aperture telescopes equipped with a wide field-of-view camera as used by the MOA, OGLE and KMTNet groups are going to detect many planetary events without dense follow-up observations. But if we seek more rare events like an Earth-mass planetary event, the sampling during short anomalies will be limited and we will face similar marginal conclusions. This is also true at the boundary of detection limits even for the future space based observations by {\sl WFIRST} \citep{spe13} and {\sl Euclid} \citep{pen13}. This work is a test case for analysis efforts in such marginal events.
We could not measure the mass of the system because microlensing parallax was not detected. We can measure the lens properties if we can directly resolve the lens flux in high resolution follow-up observations by the {\sl HST} or large ground telescopes, such as the Keck, VLT and Subaru \citep{ben06, ben15, bat15}. The unrelated blending stars can usually be separated from the lens and source by high resolution follow-up observations. The lens-source relative proper motion is $\mu_{\rm geo}=6.52 \pm 0.87 \ {\rm mas \ yr^{-1}}$. This implies that the source and lens will be separated by $\sim 1$ HST pixel ($\sim 39.12 \pm 5.22$ mas) by 2018. But in the {\sl I}-band, the median lens magnitude is predicted to be very faint compared to the source magnitude by $\sim 3$ magnitude (see Figure 7) and it makes difficult to observe the lens star. From Figure 7, we see that the {\sl H}-band magnitude of the median prediction for the lens and source differs by $\sim 2$ magnitude. The lens is likely to be too faint to be detected until the lens and source are resolved. The future high resolution images by the {\sl HST}, {\sl JWST} or ground based telescopes using Adaptive Optics such as TMT in more than 10 years after peak magnification, which is in 2022, may detect the lens host star and determine the lens properties uniquely.
However, if the lens and source have different color, the apparent centroid shift of the lens plus source differs from images in different filter bands. In OGLE-2003-BLG-235, the color-dependent centroid offset was detected at the level of 0.6 mas by the {\sl HST} \citep{ben06}. In OGLE-2012-BLG-0724, we expect to detect the color-dependent centroid shift of ${\rm d}x=1.0$ mas in ${\rm d}t= 4$ years after the peak magnification from the relation ${\rm d}x = {\rm d}t \times (f_I -f_V ) \times \mu_{\rm geo}$. Here $\mu_{\rm geo} = 6.52 \ {\rm mas \ yr^{-1}}$ and the fraction of the lens+source flux that is due to the lens, $f_{\rm lens}$, is $f_I = 0.05$ and $f_V = 0.01$ in the {\sl I}- and {\sl V}-band, respectively. Thus the follow-up observations in different filter bands by the {\sl HST} in 2016 can detect the lens flux and determine the lens properties.
\\
\par
TS acknowledges the financial support from the JSPS, JSPS23103002, JSPS24253004 and JSPS26247023. The MOA project is supported by the grant JSPS25103508 and 23340064. The OGLE project has received funding from the National Science Centre, Poland, grant MAESTRO 2014/14/A/ST9/00121 to AU. OGLE Team thanks Profs. M. Kubiak and G. Pietrzy{\'n}ski, former members of the OGLE team, for their contribution to the collection of the OGLE photometric data over the past years. DPB acknowledges support from NSF grants AST-1009621 and AST-1211875, as well as NASA grants NNX12AF54G and NNX13AF64G. Work by IAB was supported by the Marsden Fund of the Royal Society of New Zealand, contract no. MAU1104. NJR is a Royal Society of New Zealand Rutherford Discovery Fellow. AS, ML and MD acknowledge support from the Royal Society of New Zealand. AS is a University of Auckland Doctoral Scholar. NK is supported by Grant-in-Aid for JSPS Fellows.
|
\section{Introduction}
Systems perturbed away from equilibrium have been shown to exhibit a rich array of behaviors that depend on the type of initial perturbation and the characteristics of the systems. At asymptotically late times, however, they are generically expected to exhibit behavior characteristic of thermal equilibrium, regardless of the short-time behavior following the perturbation, so long
as the perturbation injects sufficient energy into the system.
This behavior can be investigated from the point of view of a subsystem, where the system is defined to have thermalized if its reduced density matrix is equal to that of a thermal (mixed) state; however, isolated quantum systems starting from a pure quantum mechanical state can also be described as ``thermalized'' if the expectation values of observables at late times are in agreement with those of a thermal ensemble~\cite{Srednicki:1994aa,Deutsch:1991aa,Rigol:2008aa,Rigol:2012aa}.
Theoretical and experimental evidence on non-equilibrium behavior
has increasingly shown that the expectation that all systems equilibrate
to a simple thermal state may be misleading in 1+1-dimensional systems, where
in some cases thermalization appears to be inhibited entirely\footnote{See~\cite{Daley,Eisert:2015aa,Langen:2016vdb} for recent reviews.}. In holographic contexts, where thermalization in the field
theory is understood to be dual to black hole formation in the holographically
dual asymptotically anti-de-Sitter (AdS) bulk spacetime, such non-thermalization
would appear to be at odds with the expectation that perturbations
of AdS of sufficiently high energy should generically backreact to form black holes\footnote{The question of whether exact, non-trivial, eternally oscillating asymptotically-AdS solutions (with energies equal to that of a large AdS black hole)
exist is currently an open issue; we comment on it briefly in Sec.~\ref{sec:discussion}.}.
Absence of thermalization in certain 1+1-dimensional isolated systems has been
attributed to the presence of a large number of conserved currents
and is associated with the notion of quantum integrability, with such systems proposed to behave in accordance with the generalized Gibbs ensemble (GGE) instead of the usual Gibbs ensemble~\cite{Rigol:2007aa}. The critical behavior of many 1+1-dimensional systems is described
by conformal field theories (CFTs), suggesting that there may be qualitative differences
between the thermalization behavior of 2D CFTs with their infinite dimensional conformal
symmetry as compared to that of higher-dimensional CFTs, where the stress tensor and its descendants are the only
conserved currents to be found.
Nonetheless, even for unitary 2D CFTs there are important differences
between the behavior of CFTs whose central charge is below or above some critical
value $c_{\text{crit}}$, where $c_{\text{crit}}$ depends
on the chiral algebra of the 2D CFT and determines whether the CFT
is rational ($c<c_{\text{crit}}$) or not\footnote{While this appears to be the case in known examples, we are not aware
of a rigorous proof of this statement.} ($c>c_{\text{crit}}$).
For CFTs whose symmetry is only the Virasoro algebra, i.e. with no
additional extended symmetries, $c_{\text{crit}}=1$. In the rational
case, the spectrum of the theory consists of a finite number of primaries
for the chiral algebra with rational conformal dimensions of the form
$\frac{p}{q}$, with integer $p,q$. For a CFT on a circle of radius
$R$, time translations are thus generated by $U(t)=\exp\left(- i t\left(L_{0}+\bar{L}_{0}-\frac{c}{12}\right)/R\right)$,
so that all correlation functions will be periodic in time\footnote{It should be emphasized that these revivals are different from Poincar\'{e} recurrences and occur on far shorter time scales.}, where the existence of such revivals follows from the rationality of the conformal dimensions in the CFT, and their period depends on the operator spectrum and on the size $R$ of the
system. Clearly, theories with $c<c_{\text{crit}}$ do not thermalize, although
it is still in principle possible for subsystems to behave approximately
as thermal systems for times $t$ that are much smaller than the revival
time of the system.
For $c>c_{\text{crit}}$, this argument no longer applies, and there
is no \textit{a priori} mechanism to prevent thermalization for generic
perturbations. There are nonetheless special states that fail to thermalize
in any CFT, the simplest examples being states that are built from
descendants of the ground state only. These states are linear superpositions
of states with integer conformal dimension,
and their period is proportional to the system size $L$ alone. Even in such states, sufficiently
small subsystems will exhibit approximately thermal behavior for times
$t\ll L$, however globally the system undergoes periodic
revivals.
Special descendants of the ground states, coherent states, have a geometric interpretation as
conformal transformations of the CFT on the plane or a subspace thereof.
In the case of a bounded subspace, such boundary states in the form
of a strip or a rectangle have been used to analyze certain quantum
quenches and CFT non-equilibrium behavior (see, e.g., \cite{Calabrese:2006rx,Calabrese:2007rg,Calabrese:2007aa,Hartman:2013qma,Cardy:2014rqa,Kuns:2014zka,Engelhardt:2015axa,Asplund:2015eha,Calabrese:2016xau}),
with conditions on the Euclidean boundary defining the initial conditions
of the system, whose time-evolved correlation functions are computed
by analytic continuation from Euclidean time. Such states can be understood to define an initial state via a Euclidean path integral over a portion of the boundary, with correlation functions computed by joining together domains representing an in- and an out-state.
For example, a path integral over over a rectangle with suitable boundary conditions on three sides provides a state in the CFT on the interval formed by the remaining side; a correlation function in this state can be computed by joining together such an in-state with an out-state, resulting in a full rectangle\footnote{This is discussed in more detail in Sec.~\ref{sec:bndrystateformalism}.}. Similarly, in the case of the strip opposite halves represent the in- and out-states.
While strip states have
been shown to exhibit behavior consistent with thermalization, one has to be
careful with CFTs defined on the entire real line. Paraphrasing the result of
\cite{Kuns:2014zka}, a conformal compactification of the real line maps it to
a finite interval\footnote{The precise map is $e^{i\tilde{z}}=(e^z-1)/(e^z+1)$,
where $z\in [-\infty,\infty]\times[0,\pi]$ is the coordinate on the Euclidean strip
of infinite spatial extent, and $\tilde{z}\in [0,\pi]\times[-\infty,\infty]$ a coordinate on a finite strip
with infinite extent in Euclidean time.}, and it maps all of Minkowski spacetime to a causal diamond
based on the finite interval. Therefore, measurements in Minkowski space are insensitive to the presence of the boundaries
of the interval, which introduce a finite size in the system that
determines the period of revivals. The restriction of strip observations
to a causal subset thus prevents non-thermal features of such states
from being detected. This paper therefore made it clear that the apparent
thermalization in strip states observed in \cite{Calabrese:2006rx,Calabrese:2007rg,Calabrese:2007aa,Hartman:2013qma}
is due to the restriction to a limited amount of time.
These observations can be further motivated by noting that many features of
global thermalization of a CFT, such as the appearance
of a suitable coarse-grained entropy, should be conformally invariant.
In fact, one could argue that a better (and conformally invariant) definition of thermalization would be
to require that expectation values at late times approach those of a thermal
state or those of a conformally transformed thermal state.
In particular,
in holographic theories, where conformal mappings are dual to
bulk diffeomorphisms, thermalization invariance under conformal mappings
is equivalent to the evident statement that black hole formation (or lack
thereof) is diffeomorphism invariant, and that asymptotic (AdS boundary)
observers must agree on whether or not a black hole has formed in
the bulk. Since black hole formation following an injection of energy
is rather generic in AdS,
this calls into question which CFT states do in fact thermalize. As
we show here, in non-rational CFTs, i.e. where $c>c_{\text{crit}}$, no revivals would be observed in expectation values of primary operators in general states constructed as linear superpositions of states obtained by local operator insertions. To the extent that the absence of revivals in the system is indicative of its thermalization, this is in line
with the expectation from holography.
An interesting additional feature of 2D CFTs is the existence of an infinite number of commuting conserved charges, even when the chiral algebra is just the Virasoro algebra. The lowest two charges are $L_0$, the zero mode of $T$, and the zero mode $K_0$ of $:TT:$. These charges are a quantum version of the infinite number of conserved charges that appear in the KdV hierarchy~\cite{Bazhanov:1994ft}. One would more generally expect that generic states in a 2D CFT at late times should be describable in terms of a generalized Gibbs ensemble with chemical potentials for all conserved charges instead of the thermal ensemble. This has indeed been confirmed in \cite{Cardy:2015xaa,Mandal:2015jla,Mandal:2015kxi}.
A nice heuristic picture of some of the features of thermalization
in 2D CFTs arises by assuming that all excitations can be described
in terms of free quasi-particles~\cite{Calabrese:2005in,Calabrese:2006rx,Calabrese:2007rg,Calabrese:2009qy}.
If after a quench correlated pairs of quasi-particles are locally
emitted, the entanglement between an interval of length $L$ and its
complement will increase until time $T\sim L/2$ and then remain constant. This picture of growth and saturation is qualitatively in keeping with the holographic predictions \cite{Balasubramanian:2010ce,Balasubramanian:2011ur,Caputa:2013eka,Liu:2013qca}. In the case of a union of disjoint intervals, on the other hand, the post-quench behavior of the entanglement entropy given by the quasi-particle picture only correctly corresponds to the behavior for $c<c_{\text{crit}}$ \cite{Asplund:2015eha} systems. There therefore
appear to be close connections between integrability, rational conformal
dimensions, and the validity of the quasi-particle picture for $c<c_{\text{crit}}$
on the one hand, and between irrational conformal dimensions, lack
of integrability, and the breakdown of the quasi-particle picture
for $c>c_{\text{crit}}$.
The inhibition of thermalization that we find in rational CFTs by
contrast to general CFTs thus further asserts such connections. In
this paper, we clarify some additional aspects of these connections
and make contact with the dual holographic picture that they provide.
We begin by discussing the holographic dual picture of local thermalization
in a pure state and analyze the capacity of the CFT stress tensor
for serving as a thermalization diagnostic (Sec.~\ref{sec:thermprobes}).
We then exploit the conformal invariance of global thermalization
in a CFT by evaluating whether local perturbations of the rectangle
state are followed by initial-value revivals of observables at asymptotically-late
times; such revivals are indicative of the system's inability to establish
an asymptotic thermal state, and we show that as is expected from holography, they naively
do not take place for a general
(non-rational) CFT (Sec.~\ref{sec:spectrumdependence}). This discussion
is preceded by a review of the boundary-state setup and the strip
and rectangle states (Sec.~\ref{sec:bndrystateformalism}). Finally,
we consider the holographic dual of the generalized Gibbs ensemble
with chemical potentials for all conserved charges and show that it
is still described by the BTZ black hole (Sec.~\ref{sec:GGE}). We
conclude with a discussion of future directions.
\section{Probes of local and global thermalization}\label{sec:thermprobes}
The general thermalization setup is to consider a CFT in a pure state $|\psi\rangle$, let the system time evolve,
and ask to what extent the state of system can be well approximated by a thermal state (global thermalization) and
to what extent a subsystem can be well approximated by a subsystem of a thermal system (local thermalization).
A unique feature of 2D CFTs is that they have an infinite symmetry algebra that creates new states
$|\psi'\rangle \sim\sum\prod L_{-k_i}|\psi\rangle$ from $|\psi\rangle$. We would expect that these symmetries
do not affect whether or not a system globally thermalizes, but it is not \textit{a priori} clear in what way these
symmetry generators affect local thermalization. The example of the rectangle state (which is related to
the ground state by symmetries) shows that local thermalization can occur even in states that are descendants
of the ground state: by restricting observations to a small interval on the rectangle, the geometry observed is effectively that of the infinite strip and therefore thermalization is observed. It would be quite interesting to develop a more quantitative theory explaining to what extent subsystems in states that are descendants of the ground state are approximately thermal. Given that
the behavior of the systems of interest seems to be fixed by geometry and symmetries alone, such a quantitative description should be possible,
and we hope to report on it elsewhere. In the meantime we will present the holographic dual point of view.
In holography, states that are descendants of the ground state and that have a semiclassical gravitational dual
are described by geometries that are diffeomorphic to global AdS${}_3$. General descendants of the ground state
are described by AdS${}_3$ with many graviton excitations, and different semiclassical AdS${}_3$ geometries correspond to various Virasoro
coherent states. Diffeomorphisms that preserve a convenient Fefferman-Graham gauge choice act on AdS${}_3$
as follows. We start with vacuum AdS with metric $ds^2=(dw^2+dz d\bar{z})/w^2$, and perform the following coordinate transformation
\begin{equation}
w\rightarrow \frac{w\sqrt{\partial f \bar{\partial} \bar{f}}}{N},\quad
z\rightarrow f(z) -\frac{w^2}{2} \frac{\partial f \bar{\partial}^2 \bar{f}}{\bar{\partial}\bar{f} N},\quad
\bar{z} \rightarrow \bar{f}(\bar{z}) -\frac{w^2}{2} \frac{\bar{\partial} \bar{f} \partial^2 f}{\partial f N},
\end{equation}
where
\begin{equation}
N=1+\frac{w^2}{4}\frac{ \partial^2 f \bar{\partial}^2 \bar{f}}{ \partial f \bar{\partial}\bar{f} } .
\end{equation}
We then obtain a metric of the form
\begin{equation} \label{genmet2}
ds^2 = \frac{dw^2 + dzd\bar{z}}{w^2} -\frac{6}{c}T(z) dz^2 -\frac{6}{c}\bar{T}(\bar{z})d\bar{z}^2 +\frac{36}{c^2} w^2 T(z) \bar{T}(\bar{z})dz d\bar{z}
\end{equation}
where
\begin{equation}
T(z)=\frac{c}{12} \{f,z\}, \quad
\bar{T}(\bar{z}) = \frac{c}{12}\{ \bar{f},\bar{z} \},
\label{eq:TandTbar}
\end{equation}
and the Schwarzian derivative is as usual
\begin{equation}
\{ f,z \} = \frac{\partial^3 f}{\partial f} - \frac{3}{2} \left( \frac{\partial^2 f}{\partial f} \right)^2 .
\label{eq:schwarzian}
\end{equation}
If we restrict to an interval where $T(z)$ and $\bar{T}(\bar{z})$ are approximately constant, then the
bulk geometry in the neighborhood of that interval will be close to the BTZ geometry\footnote{The metric \ref{genmet2} corresponds to the metric of \cite{Banados:1998gg}
under the variable change $\rho=-\ln w$ and upon setting $c=\frac{3\ell}{2G}$.}~\cite{Banados:1998gg}, and correlation functions
computed there are approximately the same as the finite temperature correlation functions obtained from the BTZ
geometry. Thus in order to obtain local thermalization we should apply a diffeomorphism that produces a locally
constant $T(z)$ and $\bar{T}(\bar{z})$. An example of such a diffeomorphism is one that is locally approximately an
exponential $f(z) =\exp(\alpha z)$ as this has a constant Schwarzian derivative. This is not too surprising as
an exponential map essentially produces a local version of the Unruh effect whereby accelerated observers observe
a thermal state.
Globally, then, these diffeomorphisms produce what would appear as a local concentration of energy-density repeatedly oscillating (due to the global periodic time-dependence) in AdS, but that does not form a black hole even at arbitrarily late times. It is therefore clear that diffeomorphisms alone, absent additional energy injections into AdS, never produce global thermalization. This leads to
an interesting reverse question: given the expectation values of $T(z)$ and $\bar{T}(\bar{z})$ in some state,
is it possible to come up with a diagnostic for whether or not the dual description of this state involves a black hole? In order to find such a diagnostic, we need to make sure that our diagnostic is not sensitive to diffeomorphisms,
as the question of whether or not there is a black hole is clearly diffeomorphism invariant.
Perhaps the simplest way to analyze this problem is to find a diffeomorphism that makes $T(z)$ and $\bar{T}(\bar{z})$
constant and to read off the relevant constant values\footnote{There is a subtlety here, as such a diffeomorphism may not always exist. As nicely reviewed in \cite{Balog:1997zz}, one can classify the $T(z)$ that are inequivalent under diffeomorphisms of the circle,
which is the same as the classification of the so-called Virasoro coadjoint orbits. Besides the orbits which contain a point with constant $T(z)$, there are several other
orbits, but all of these orbits except one have an energy $L_0$ which is unbounded from below and are therefore most
likely unphysical. The one remaining orbit, labeled ${\cal P}_1^-$ in \cite{Balog:1997zz}, has energy bounded from below,
and its physical relevance (if any) is not clear to us. In any case, if we use the Chern-Simons description, and use $SL(2,\mathbb R)$
gauge transformations instead of diffeomorphisms, we can always achieve constant $T$. We will ignore this subtlety in the remainder
of the paper and would like to thank Glenn Barnich for drawing our attention to this issue.}.
If both are larger than $0$ in the planar case (or larger
than $c/24$ in the global case) then the dual description can possibly involve a black hole, whereas for smaller values
this is impossible and the system does not exhibit global thermalization. Note that this is a necessary, not a
sufficient, condition for the existence of a black hole, as a large amount of dilute matter could also produce
the relevant energy densities without there being a black hole.
The Chern-Simons description of three-dimensional gravity suggests a different way to do this computation. Diffeomorophisms
act as gauge transformations on the SL$(2,\mathbb R)$ gauge field
\begin{equation}
A=\left( \begin{array}{cc} 0 & 1 \\ \frac{6}{c} T & 0 \end{array} \right)
\end{equation}
and therefore the relevant constant values of $T$ can also be read off from the Wilson loop \cite{Martinec:1998wm}
\begin{equation} \label{wilsonloop}
\cosh \frac{6}{c} T_{\rm const} = \frac{1}{2} {\rm Tr} P \exp \oint A dx.
\end{equation}
One can think of the coordinates that yield constant values for $T(z)$ as the AdS${}_3$ analogue of the ``center of mass''
frame.
As a side remark, the geometries (\ref{genmet2}) have recently been used to study gravitational hair for black holes,
see e.g. \cite{Donnelly:2015taa,Compere:2015knw,Sheikh-Jabbari:2016unm}, with $T(z)$ and $\bar{T}(\bar{z})$ playing
the role of the gravitational hair. From the Chern-Simons point of view
the only gauge-invariant observables in the theory are the Wilson loops (\ref{wilsonloop}), which commute with all the Virasoro generators
and which can be viewed as a Casimir for the Virasoro generators. These measure the invariant mass and angular momentum of the black
hole. By contrast, there is no gauge-invariant observable in Chern-Simons
theory that measures the gravitational hair away from the boundary of AdS or near the horizon of the black hole. In particular,
there is no observable in the interior of AdS in Chern-Simons theory that would allow one to detect the gravitational hair,
suggesting that the hair has nothing to do with the degrees of freedom making up the black hole\footnote{We would like to thank
the participants of the Workshop on Topics in Three Dimensional Gravity (ICTP, Trieste) for useful discussions of these points.}.
The above considerations are meant to illustrate that while the stress tensor alone may provide some indication of thermalization, it is not a sufficiently sensitive diagnostic.
This can be further motivated by observing that in theories with holographic duals the stress tensor only captures the
behavior of the metric near the boundary of AdS. The analysis of physics deep inside the bulk, including whether or not a black hole is
present, in general requires a knowledge of the expectation values of other operators in the theory as well.
More generally, in arbitrary CFTs the expectation values of all the higher conserved charges can be rendered constant by acting with more complicated Virasoro symmetries (beyond diffeomorphisms). However, these higher conserved charges do not appear to play an important role in AdS/CFT, which we shall see for the case of 2+1 dimensions in Sec.~\ref{sec:GGE}.
Finally, we note that the holographic bulk geometries obtained via (\ref{genmet2}) are dual to conformal transformations of the CFT on the full plane. In order to apply this approach to find the holographic dual of arbitrary bounded subsets of this CFT, i.e. BCFTs, it is necessary to equip this description with an appropriately-chosen extension of the boundary of the CFT to the bulk - a bulk brane that bounds the spacetime region dual to this BCFT in the spirit of the AdS/BCFT correspondence of \cite{Takayanagi:2011zk,Fujita:2011fp}. Applying (\ref{genmet2}) to such setups in order to describe holographically a large class of holographic duals to BCFTs is an interesting direction that we leave to future work. Importantly, however, the presence of such a bulk brane is not expected to affect the local bulk physics in the deep interior (far away from the brane) of this spacetime, so that the above statements regarding local thermalization should carry over in the BCFT regime as well so long as the subsystem considered is sufficiently far from the boundary endpoints of the CFT.
\section{Non-equilibrium behavior from CFT boundary states\label{sec:bndrystateformalism}}
The setup underlying the CFT non-equilibrium dynamics approaches of \cite{Calabrese:2006rx,Calabrese:2007rg,Calabrese:2007aa,Hartman:2013qma,Cardy:2014rqa,Kuns:2014zka,Engelhardt:2015axa,Asplund:2015eha} -- and which lends a physical interpretation to the strip and rectangle states -- is that of the Calabrese and Cardy (CC) boundary state model for non-equilibrium evolution in CFTs ~\cite{Calabrese:2006rx,Calabrese:2007rg}. This boundary state setup relies on the existence
of a well-defined analytic continuation from Lorentzian to Euclidean
time in the system. This allows an initial state of the system $\left|\psi_{0}\right\rangle $
to be described as a Euclidean boundary state $\left|B\right\rangle $.
The system is taken to have a Hamiltonian $H$, and the initial
state $\left|\psi_{0}\right\rangle $ is assumed to be an eigenstate
of a different Hamiltonian $H_{0}$. Conformal boundary states are in fact non-normalizable, and in practice the quench is taken to be from a gapped Hamiltonian, so that the actual Euclidean boundary state is given by a state that is irrelevantly perturbed from the conformal boundary state $\left|B\right\rangle $; by convention it is taken to be
\begin{equation}
\left|\psi_{0}\right\rangle _{E}\propto e^{-\tau_{0}H}\left|B\right\rangle,
\label{eq:bndrystateform}
\end{equation}
where $\tau_{0}$ is on the order of the correlation length of the gapped Hamiltonian $H_0$. We note that $H\propto\int T_{tt}dx$, where $T_{tt}\propto T(z)+\bar{T}(\bar{z})$, and in general additional irrelevant operators are expected to contribute. More general forms of boundary states where additional conserved charges or boundary operators are introduced in the exponential and act on the conformal boundary state were considered in~\cite{Cardy:2015xaa,Mandal:2015jla,Mandal:2015kxi}. The restriction to $T_{tt}$ in (\ref{eq:bndrystateform}) was motivated in \cite{Cardy:2014rqa} by noting that $T_{tt}$ is often the leading irrelevant operator acting on the
boundary state, and here we restrict our analysis to this form.
At $t=0$ the system is put in the state $\left|\psi_{0}\right\rangle $, and it is thereafter allowed to evolve unitarily
as $e^{-iHt}\left|\psi_{0}\right\rangle $. Correlation functions
of observables $\mathcal{O}(t,x)$ are therefore given by
\[
\left\langle \mathcal{O}(t,x)\right\rangle =\left\langle \psi_{0}\left|e^{iHt}\mathcal{O}(x)e^{-iHt}\right|\psi_{0}\right\rangle.
\]
and upon analytic continuation to Euclidean time can be computed via a path integral over a strip, of width $2\tau_0$, with the operator $\mathcal{O}$ inserted
at $\tau=\tau_{0}$ and analytically continued as $\tau\rightarrow\tau_{0}+it$.
In a 2D CFT, where the strip of width $2\tau_{0}$ can be conformally mapped to the upper-half plane
(UHP) as $w\rightarrow z(w)=e^{\frac{\pi}{2\tau_0}w}$, correlation functions
in this setup can simply be computed by conformal transformations
from the correlation functions of a boundary CFT (BCFT) on the UHP. This setup was used by CC to show that one-point functions
decay exponentially for $t\gg\tau_{0}$ and to compute the time evolution
of correlations between two primary operators (via the two-point function).
Since the restriction of the CFT to the UHP reduces the symmetry group
of the CFT, boundary conditions must be enforced at the interface
such that the conformal symmetry group is retained under conformal
maps from the UHP. These are given by the condition that there should
be no energy or momentum flow across the boundary, $\left.T_{xy}\right|_{y=0}=0$,
or
\begin{equation}
\left.T(z)=\bar{T}(\bar{z})\right|_{z=\bar{z}}.\label{eq:conformalBC}
\end{equation}
In the presence of additional symmetries in the CFT, boundary conditions
that retain these symmetries may be imposed; however, the specification
of the BCFT alone does not require the boundary to respect these additional
symmetries.
The implication of this conformal boundary condition is that the holomorphic
and anti-holomorphic sectors of the CFT are no longer independent.
In particular, $n$-point bulk correlators $\left\langle \phi_{h_{1},\bar{h}_{1}}\left(z_{1},\bar{z}_{1}\right)\phi_{h_{2},\bar{h}_{2}}\left(z_{2},\bar{z}_{2}\right)...\phi_{h_{n},\bar{h}_{n}}\left(z_{n},\bar{z}_{n}\right)\right\rangle$ on the upper-half plane obey the same Ward identities as the formal
$2n$-point correlators of holomorphic
fields on the full plane~\cite{francesco1999conformal}, $$\left\langle \phi_{h_{1}}\left(z_{1}\right)\phi_{\bar{h}_{1}}\left(z_{1}^{*}\right)\phi_{h_{2}}\left(z_{2}\right)\phi_{\bar{h}_{2}}\left(z_{2}^{*}\right)...\phi_{h_{n}}\left(z_{n}\right)\phi_{\bar{h}_{n}}\left(z_{n}^{*}\right)\right\rangle.$$
The presence of the boundary thus implies that, e.g., one-point functions
of primary operators no longer vanish in general on the UHP and are
determined by conformal invariance up to a constant to have the form
$\left\langle \phi_{h,\bar{h}}(z,\bar{z})\right\rangle \sim\left(z-\bar{z}\right)^{-2h}$
for $h=\bar{h}$.
The infinite conformal symmetry of 2D CFTs allows a boundary state
defined on the upper-half plane to be mapped to an effectively unlimited
range of bounded domains, with the strip only one particular example;
as noted earlier, such mappings do not affect the thermal behavior
of the system, and whether or not the system reaches a global thermal state
is invariant under these transformations. Consequently, the out-of-equilibrium
behavior of a system from a particular boundary state can be investigated
in any of the conformally-equivalent boundary states. In the absence
of additional operator insertions, these states are simple conformal
mappings of the ground-state on the UHP and do not exhibit global thermalization.
As noted earlier, any of these boundary states can be mapped to the strip geometry, where the expectation value of the stress tensor is a constant Casimir value due to the vanishing of $\left\langle T(z)\right\rangle$ on the ground-state on the UHP.
The simplest modifications of the boundary states that potentially exhibit global thermalization are those obtained by
local operator insertions. As we show below, to diagnose thermalization of such systems, it is necessary to consider more refined observables. If additional operators are inserted on the boundary of the domain, conformal mappings do not affect the nature of these fields as boundary fields, since the boundary of a given system (e.g.
the $x$-axis on the UHP) is mapped to the boundary of the conformally
transformed system.
\subsection{Revivals in finite-length systems}
The finite-length equivalent of the CC setup is a boundary state defined on
a strip with spatial boundaries. Such bounded domains, with a vast
array of differently-shaped boundaries, can be obtained by Schwarz-Christoffel
maps~\cite{driscoll2002schwarz} from the UHP to bounded polygonal
geometries. These transformations map a set of designated
prevertices on the real line of the complex plane to the vertices
of a new polygonal domain, with the real line mapped to the boundary
of the domain. In particular, we can consider the map to a rectangle.
\begin{figure}[h]
\begin{center}
\includegraphics[width=1.0\textwidth]{UHPtoRec2.pdf}
\end{center}
\vspace{-0.3in}
\caption{\small{The Schwarz-Christoffel conformal transformation that maps the UHP with designated prevertices to a rectangle.}}
\label{fig:UHPtoRec}
\end{figure}
For prevertices at
$x=\pm1,\pm\frac{1}{k}$, the general form of the map $z\rightarrow f(z)=w$
to the rectangle is given by the integral expression
\[
w(z)=A\int_{0}^{z}\frac{d\zeta}{\left(\zeta-1\right)^{\frac{1}{2}}\left(\zeta+1\right)^{\frac{1}{2}}\left(\zeta-\frac{1}{k}\right)^{\frac{1}{2}}\left(\zeta+\frac{1}{k}\right)^{\frac{1}{2}}}
\]
where $A$ is a constant that can be freely chosen. With a choice
of $A=-\frac{L}{2kK_{1}\left(k^{2}\right)}$, where $K_{1}\left(k^{2}\right)$
is the complete elliptic integral of the first kind and $k\in\left[0,1\right]$,
$w(z)$ is given as an elliptic integral of the first kind
\begin{equation}
z\rightarrow w(z)=\frac{L}{2K_{1}\left(k^{2}\right)}F\left(\arcsin z,k^{2}\right)
\label{eq:UHPtoRec}
\end{equation}
and maps the UHP to a rectangle with vertices at $\left(\pm\frac{L}{2},0\right)$
and $\left(\pm\frac{L}{2},H\right)$, where $H=\frac{K_{1}\left(1-k^{2}\right)}{2K_{1}\left(k^{2}\right)}$
is the height of the rectangle (Fig.~\ref{fig:UHPtoRec}).
The geometry of the rectangle is fully determined by the ratio $L/H$.
The limit of $k\rightarrow1$ corresponds to the zero-height rectangle,
and in this limit the system appears infinite in length. The limit of $k\rightarrow0$ corresponds
to the semi-infinite strip with width $L$.
The inverse map from the rectangle to the UHP is given by the elliptic
Jacobi function
\begin{equation}
w\rightarrow z(w)=\text{sn}\left(\frac{2K_{1}\left(k^{2}\right)}{L}w,k^{2}\right),\label{eq:ellipticJacobi}
\end{equation}
which is periodic in its argument as
\[
\text{sn}\left(\frac{2K_{1}\left(k^{2}\right)}{L}\left(w+mL+2inHL\right),k^{2}\right)=\left(-1\right)^{m}\text{sn}\left(\frac{2K_{1}\left(k^{2}\right)}{L}w,k^{2}\right).
\]
We will denote the complex coordinate on the rectangle by $w=x+i\tau$,
with $\tau$ the Euclidean time direction along
the height of the rectangle and $x$ the direction along its width. Observables
in this geometry are inserted on the rectangle
and analytically continued to Lorentzian times as $\tau\rightarrow \frac{H}{2}+it$,
where $t$ denotes the Lorentzian time coordinate. As a result, (\ref{eq:ellipticJacobi})
is periodic in Lorentzian time with period equal to $2L$.
\begin{figure}
\centering
\begin{subfigure}[b]{0.57\textwidth}
\includegraphics[width=\textwidth]{StressTensor3Dplot.pdf}
\vspace{0.5in}
\caption{Profile of the expectation value of the holomorphic stress tensor $T(t,x)$ across the rectangle.}
\end{subfigure}
~
\qquad
\begin{subfigure}[b]{0.35\textwidth}
\includegraphics[width=\textwidth]{onepoint01.pdf}\\
\includegraphics[width=\textwidth]{onepoint04.pdf}
\caption{One-point functions $\left\langle \mathcal{O}(t,x)\right\rangle$ at sample points $x=0.1$ (top) and $x=0.4$ (bottom).}
\end{subfigure}
~
\caption{\small{Periodicity in observables in the rectangle ground state. Plot parameters are $k=0.5$ and $L=1$.}}
\label{fig:PeriodicObservables}
\end{figure}
Since correlation functions on the rectangle are calculated from their
counterparts on the UHP, every argument $z$ of a Lorentzian operator
assumes an inherent periodicity; e.g. one-point functions of primary
operators of conformal dimension $h$ in the conformal mapping of the UHP ground-state are given by
\begin{equation}
\left\langle \mathcal{O}(t,x)\right\rangle \sim\left.\left(\frac{dz(w)}{dw}\frac{d\bar{z}(\bar{w})}{d\bar{w}}\right)^{h}
\left(z(w)-\bar{z}(\bar{w})\right)^{-2h}\right|_{\begin{array}{c}
w\rightarrow x-t+iH/2\\
\bar{w}\rightarrow x+t-iH/2
\end{array}}
\label{eq:onePointMapped}
\end{equation}
and the stress tensor is given by
\begin{equation}
\left\langle T(t,x)\right\rangle =\frac{c}{12}\{z(w),w\},
\label{eq:stressTensorMapped}
\end{equation}
where $c$ is the central charge and $\{z(w),w\}=\frac{z^{(3)}(w)}{z'(w)}-\frac{3}{2}\left(\frac{z^{(2)}(w)}{z'(w)}\right)^{2}$
is the Schwarzian derivative. The periodicity of (\ref{eq:onePointMapped}) and (\ref{eq:stressTensorMapped}) in Lorentzian time
is therefore evident (Fig.~\ref{fig:PeriodicObservables}).
The periodicity of these observables as resulting from the nature of the conformal mapping and the implication that the
rectangle state features non-thermal behavior was also pointed out in \cite{Kuns:2014zka}.
As we reviewed, conformal transformations of the vacuum
state on the upper-half plane do not thermalize, but one might
expect that perturbations of this boundary state should eliminate the non-thermal
behavior. Rectangle states perturbed by operator insertions in $c=1$ CFT were considered in \cite{Engelhardt:2015axa} in a somewhat different context. Below we investigate how the time evolution of similar states is affected by the spectrum of the CFT (rational vs. non-rational), and whether a given system may exhibit periodic revivals at asymptotically late times. Recall that, as was pointed out in Sec.~\ref{sec:thermprobes}, the expectation value of the stress tensor itself is in general an insufficient diagnostic of thermalization. In particular, in a state perturbed by Euclidean-time operator insertions $\mathcal{O}_i$ with conformal dimensions $h_i$, the time dependence in the expectation value of the stress tensor is determined purely by conformal invariance:
\[
\left\langle T(z)\prod_{i}\mathcal{O}_{i}(\zeta_{i})\right\rangle =\sum_{i}\left[\frac{h_{i}}{\left(z_{i}-\zeta_{i}\right)^{2}}+\frac{\partial_{\zeta_{i}}}{z_{i}-\zeta_{i}}\right]\left\langle \prod_{i}\mathcal{O}_{i}(\zeta_{i})\right\rangle,
\]
since only the stress tensor coordinate $z$ is continued to Lorentzian time. As a result, the time evolution of this expectation value is qualitatively identical regardless of the spectrum of the CFT and cannot be used to resolve any potential differences for CFTs with $c<c_{\text{crit}}$ versus those with $c>c_{\text{crit}}$. In the next section we therefore probe perturbations of boundary states using one-point functions of generic operators that do not correspond to conserved currents, focusing on the different behaviors of rational vs. non-rational CFTs.
\section{Operator spectrum dependence of thermalization\label{sec:spectrumdependence}}
In this section we consider expectation values of primary operators in perturbed states. The simplest perturbed
states are those produced by a path integral over a suitable Euclidean domain with a single operator insertion on
the boundary of the domain. The expectation value of a single operator in such a state will then be given by
the analytic continuation of a three-point function with two operators on the boundary (one for the in-state and
one for the out-state) and one operator in the interior. Conformal invariance fixes the form of these
three-point functions up to a single unknown function of a suitable cross-ratio. Even without knowing the explicit
form of this function (which would involve knowledge of the structure constants and conformal blocks of the theory)
one can already see a qualitative change in the behavior of the part of the three-point function that is
determined by conformal invariance (and that we henceforth refer to as the ``universal'' part of the correlation function) as one moves from rational to non-rational theories. In particular, exact
periodicity of the expectation value appears to be lost\footnote{To see this, as we discuss below,
we in fact need to consider linear superpositions
of states obtained by operator insertions.}, in agreement with the picture that rational theories
should not display global thermalization and irrational theories should. However, without more detailed knowledge
of the exact correlation function, it is not possible to see the destructive interference which leads to exponential
decay to the thermal value of one-point functions, and, while suggestive, our analysis is by
no means to be taken as a proof of thermalization in irrational CFTs.
\subsection{General setup}
It is in principle possible to consider very general classes of states created by a path integral over arbitrary bounded
domains with a particular boundary state on the boundary and arbitrary insertions of operators in the interior of the
domain and on its boundary. Even in the absence of operator insertions, correlation functions computed in states of this
type are in general time dependent. As we discussed in section~\ref{sec:thermprobes}, the time dependence in the expectation
value of the energy momentum tensor can in general be removed by applying a suitable diffeomorphism, and we will therefore focus
on the geometries with a time-independent expectation value for the energy-momentum tensor, which are infinite strip geometries.
We consider an infinite Euclidean strip of the form $w=x+i\tau$ with $(x,\tau)\in [0,2L]\times [-\infty,\infty]$, which can be mapped
to the upper half plane via the map $z(w)=e^{\frac{\pi i w}{2L}}$, with $z$ the coordinate on the upper half plane. Such an
infinite strip can be interpreted in two different ways, either as providing an in- and an out-state on the theory on a
finite interval of length $2L$, but also as providing an in- and an out-state on an infinite spatial interval. In the latter
case, the roles of space and time should be exchanged\footnote{This is the strip state of CC~\cite{Calabrese:2006rx,Calabrese:2007rg}.}, so that Euclidean time runs from $0$ to $2L$ and space from $-\infty$
to $+\infty$. Moreover, the relevant analytic continuation to Lorentzian time is $w=x-t$ in the first case, and $w=L+it+i\tau$
in the second case. We will mostly take the point of view of the finite strip in
what follows, but the infinite
strip can be treated in exactly the same way.
We insert $n_1$ boundary operators $\mathcal{O}_B$ on the left boundary of the strip at $w_a=i\tau_a$,
and $n_2$ bulk operators $\mathcal{O}$ at positions $w_p=x_p+i\tau_p$. For simplicity, we will
not insert any operators on the right boundary of the strip, but this is a straightforward generalization. In order
to be able to interpret the boundary insertions as corresponding to an in- and an out- state, the boundary operators
should be distributed symmetrically around $\tau=0$. However, if we are interested in studying linear superpositions of
states, we should also consider asymmetric distributions of operators.
\subsection{Periodicity in correlation functions}
The general form of the correlation function can be obtained by mapping it to the upper-half plane and using $SL(2,\mathbb{R})$
Ward identities. To write the result we denote
\begin{eqnarray}
(\xi_1,\ldots,\xi_N)=(\{z_a(w_a)\},\{z_p(w_p)\},\{\bar{z}_p(\bar{w}_p)\}), \quad N=n_1+2n_2,
\end{eqnarray}
in term of which the correlator is, up to an overall constant factor,
\begin{eqnarray}
\left\langle \prod_a {\cal O}_{B,a}(w_a) \prod_j {\cal O}_p(w_p) \right\rangle = \prod_{i}^{N} \xi_i^{h_i}
F\left( \frac{\xi_{ij} \xi_{kl} }{\xi_{ik} \xi_{jl} } \right) \prod_{i<j} \xi_{ij}^{\frac{2}{N-2}(h_{\Sigma}/(N-1)-h_i-h_j)}
\end{eqnarray}
where $h_{\Sigma}=\sum h_i$ and $\xi_{ij}=\xi_i-\xi_j$, and $F$ a function of cross ratios. Note that the conformal dimensions $h_i$ refer to both those of the bulk operator, $h$, $\bar{h}$ as well as those of the boundary operators, $h_B$. The prefactor
$\prod \xi_i^{h_i}$ is due to the map from the strip to the upper-half plane and includes contributions from the coordinates of all operators\footnote{This prefactor is given by $\prod_i \left(\frac{dw_i(z_i)}{dz_i}\right)^{-h_i}$, which on the strip becomes $\prod_i \left(z_i(w_i)\right)^{h_i}$ up to a constant factor.}. It can be absorbed in a nice way
in the rest of the expression by defining
\begin{equation} \label{bb}
\tilde{\xi}_{ij} = \frac{\xi_i-\xi_j}{\sqrt{\xi_i \xi_j}} = 2 i \sin\left[ \frac{\pi}{4L}(w_i-w_j) \right],
\end{equation}
in terms of which the general correlator is of the form
\begin{eqnarray}
\left\langle \prod_a {\cal O}_{B,a}(w_a) \prod_p {\cal O}_p(w_p) \right\rangle =
F\left( \frac{\tilde{\xi}_{ij} \tilde{\xi}_{kl} }{\tilde{\xi}_{ik} \tilde{\xi}_{jl} } \right)
\prod_{i<j} \tilde{\xi}_{ij}^{\frac{2}{N-2}(h_{\Sigma}/(N-1)-h_i-h_j)}.
\end{eqnarray}
Note that because of the the exponential map that we employ here has an explicit dependence on $i$ in it,
\begin{eqnarray}
(w_1,\ldots,w_N)=(\{w_a\},\{w_p\},\{-\bar{w}_p\}).
\end{eqnarray}
Upon analytic continuation of a particular bulk operator to Lorentzian time, $w\rightarrow x-t$, it is clear from (\ref{bb})
that the correlation function will contain contributions of the form $f(t) =(\sin(\frac{\pi}{4L}(t-c)))^s$, with complex $c$,
which might appear to be periodic with period of at most $8L$,
except that $s$ is in general not an integer and $f(t)$ has to be defined through
analytic continuation. For complex $c$, the function $z(t)=\sin(\frac{\pi}{4L}(t-c))$ follows a contour around the origin in
the complex plane that we can write as $z(t)=r(t) e^{i\phi(t)}$, with both $r(t)$ and $\phi(t)$ periodic with period $8L$.
The analytic continuation of $z(t)^s$ is clearly $r(t)^s e^{is\phi(t)}$, which is now no longer periodic unless $s$ is rational.
This is an indication that the time-dependence of correlation functions in rational theories will have special properties and
tend to be periodic.
We will consider pure states of the form $\sum_i |\psi_i\rangle$ where each $|\psi_i\rangle$ is obtained
through a path integral on the half-strip with suitable operator insertions. Expectation values of bulk operators
in such states require us to compute matrix elements $\langle \psi_i | \prod_k {\cal O}_k | \psi_j \rangle$.
We first focus on the diagonal matrix elements. For those, it turns out that the
universal part of the correlation function will always be periodic.
To see this, we observe that the correlation function will contain a product of terms of the form
\begin{equation}
\left[\sin\left(\frac{\pi}{4L}(t-x+i\tau_{0})\right)\sin\left(\frac{\pi}{4L}(t-x-i\tau_{0})\right)\right]^{s},
\label{eq:pairing}
\end{equation}
which can be rewritten as the purely real expression
\begin{equation}
2^{-s}\left[\cosh\left(\frac{\pi}{2L}\tau_{0}\right)-\cos\left(\frac{\pi}{2L}(t-x)\right)\right]^{s},
\end{equation}
which is well-defined with period $4L$.
Any possible breakdown of periodicity in diagonal matrix elements therefore
has to originate from the function $F$ of the cross-ratios that
appears in the correlation function as well. Unfortunately, it is much more difficult to analyze this function in
general. If we take the simplest example with two boundary insertions at $\pm i\tau_0$ and one bulk operator, the cross-ratio
(after analytic continuation) takes the form
\begin{equation}
y=\frac{\tilde{\xi}_{w,\bar{w}} \tilde{\xi}_{w_1,w_2} }{\tilde{\xi}_{w,w_1} \tilde{\xi}_{\bar{w},w_2}}=\frac{\sin\left[\frac{\pi}{2L}x\right]\sin\left[\frac{\pi i}{2L}\tau_{0}\right]}{\sin\left[\frac{\pi}{4L}(t-x-i\tau_{0})\right]\sin\left[\frac{\pi}{4L}(t+x+i\tau_{0})\right]}.
\label{eq:crossratio}
\end{equation}
We see that $y$ does not
go around one of the singularities at $y=0,1,\infty$ and that therefore the unknown function of the
cross ratio will remain periodic\footnote{We can also see this by observing that the denominator of (\ref{eq:crossratio}) can be expanded as $\frac{1}{2} \left(\left(a^2+b^2\right) \cos \left(\frac{\pi x}{2 L}\right)-2 i a b \sin \left(\frac{\pi x}{2 L}\right)-\cos \left(\frac{\pi t}{2 L}\right)\right)$ where $a=\cosh \left(\frac{\pi \tau_0}{4 L}\right)$ and $b=\sinh \left(\frac{\pi \tau_0}{4 L}\right)$, so that it is given by the sum of a real time-periodic and a complex time-independent function.} with period $4L$. Finally, for boundary operators inserted at $\pm\infty$ ($\tau_0\rightarrow\infty$), the cross ratio becomes time independent:
\begin{equation}
y = e^{\frac{\pi i x}{L}}-1,
\end{equation}
so that no decay in time can be seen for such operator placement. There may be an argument as to why diagonal matrix elements always remain
periodic based on the symmetry $\tau \leftrightarrow -\tau$, but we have not explored this in
detail.
Off-diagonal matrix elements, on the other hand, appear to lose their periodicity in general. This is already
clear at the level of the universal part of the correlation function, where factors of the form $[\sin
\frac{\pi}{4L}(t-c))]^s$, $c=x+i\tau_0$, are no longer paired with factors $[\sin
\frac{\pi}{4L}(t-c^*)]^s$ as in (\ref{eq:pairing}), resulting in an expression consisting of powers of periodic functions that are complex in the time argument. If $s$ is rational, these factors will remain periodic but with
a longer period, but if $s$ is irrational periodicity is lost altogether. Of course, for a complete
analysis it is necessary to also consider the in general unknown functions of the cross-ratios\footnote{One
can easily check in examples of $c=1$ theories where correlation functions of primaries can be explicitly
written down that these conclusions indeed hold for the full correlation functions: for rational $c=1$ theories
periodicity is maintained, while for irrational $c=1$ theories periodicity is lost. (Note that periodicity is maintained if we take as our operators to be $\partial\phi$ or $\bar{\partial}\phi$, but since these operators correspond to conserved currents they should not be considered for diagnosing whether the system experiences revivals as previously explained.) Because $c=1$ theories are
exactly solvable we do expect these theories to be described by a suitable Generalized Gibbs Ensemble
at late times under generic perturbation, see \cite{Mandal:2015kxi,Mandal:2015jla}.}.
The analytic properties of correlation functions, and more generally the analytic properties of
conformal blocks, are typically closely related to the braiding and fusion properties of the theory.
For rational theories the space of conformal blocks form finite dimensional representations under fusion and braiding,
which in turn is closely related to the periodicity of correlation functions\footnote{which we already knew to be periodic
in time anyway in view of the straightforward argument in the introduction.}. One would therefore expect to see
periodicity in the case of rational theories, and a breakdown of periodicity in irrational theories. As we have explained,
we already see signs of this breakdown in simple correlation functions, and it would be interesting to explore this further.
\section{The holographic dual of the generalized Gibbs ensemble}\label{sec:GGE}
As mentioned in the introduction, conformal field theories have a large number of conserved currents.
For example, any polynomial made out of the
stress tensor $T(z)$ and its derivatives is a conserved current. Similarly, if there are additional higher spin
currents, any polynomial involving those leads to conserved currents as well. Given such large sets of conserved
currents, one can ask what the maximal set of conserved and commuting charges is. For the case of the Virasoro algebra,
there exists a conserved current, unique up to total derivatives, whose zero modes all commute. In the semi-classical
case, where we replace OPEs by Poisson brackets, the construction of these conserved currents and corresponding
conserved charges is captured by the KdV hierarchy. The KdV hierarchy does in fact also describe the flows generated by
the complete set of commuting conserved charges. A conformal field theory contains a quantum deformation of the KdV
hierarchy, the quantum KdV hierarchy, see \cite{Bazhanov:1994ft}.
Since the stress tensor is a single trace operator, adding polynomials of the stress tensor and its derivatives
with chemical potentials to the action (in order to describe a generalized Gibbs ensemble)
corresponds to multitrace deformations in the CFT. Multitrace deformations
both in pure gravity as well as in its higher spin extensions can be conveniently studied in the Chern-Simons formulation, and
a detailed discussion will appear elsewhere \cite{deboerjottar}. Here we simply summarize a few key ingredients
using the notation from \cite{deBoer:2014fra}.
In general, if we add a multitrace deformation of the form $\int \Omega\equiv \sum_i \nu_i F_i(W_s)$, with the $\nu_i$
chemical potentials which we will take to be constant, and $F(W_s)$ polynomials in the higher spin fields
and their derivatives, all we need in Chern-Simons theory is a boundary term of the form
\begin{equation}
I^{(E)}_B = -\frac{k_{cs}}{2\pi} \int_{\partial M} d^2 z\,{\rm Tr}\left[ (a_z+a_{\bar{z}})a_{\bar{z}} - 2\Omega\right]
\end{equation}
plus a similar result for the right movers. Moreover, whereas $a_{\bar{z}}$ usually contains the sources $\mu_s$ for the higher spin fields $W_s$,
we now need to replace these sources $\mu_s$ by $\partial\Omega/\partial W_s$. We therefore in general have a non-linear relation between
the normalizable and non-normalizable modes, which is typical for multitrace deformations \cite{Witten:2001ua,Sever:2002fk}.
The variation of the on-shell action consisting of standard Chern-Simons theory plus the boundary term can be written as
\begin{equation}
\delta( I^{(E)}_{CS}+I^{(E)}_B ) = \frac{k_{cs}}{\pi} \int_{\partial M} d^2 z\,{\rm Tr} \sum_i \delta\nu_i F_i(W_s),
\end{equation}
which indeed has the right structure.
Although we could continue our discussion in the language of Chern-Simons theory, from the above it should be
clear that the bulk field equations are not modified, and that once we restrict to translationally invariant solutions,
in the bulk the solution looks just like the BTZ black
hole and its higher spin generalizations. This is also immediately the main point of this section: classically there are no
hairy black holes corresponding to the generalized Gibbs ensemble, the bulk geometry is still the BTZ geometry.
The free energy or partition function is however different
from that of the usual BTZ black hole, because of the additional boundary terms that one needs. In fact,
looking carefully at the Chern-Simons formulation, one finds that the contribution of the
left-movers to the partition function for the pure gravity case with
a deformation
\[
\int d\sigma \sum_i \mu_{i} F_i(T)
\]
is equal to
\begin{equation}
Z= {\rm Tr}(e^{-\int d\sigma \sum_i \mu_{i} F_i(T) }) = e^{2\pi \sqrt{\frac{c}{6} L_0} - \sum_i 2\pi \mu_i F_i(L_0)}
\left.\right|_{\rm saddle} .
\end{equation}
Here, saddle means that we have to extremize the right hand side with respect to $L_0$, and the answer therefore looks
like a generalized Legendre transform of the expression of the black hole entropy.
Here, because we restrict to translationally invariant solutions, all terms containing derivatives of $T$ drop out
of $F_i(T)$, and these functionals become ordinary functions of the zero mode $L_0$. Thus, using the bulk gravitational
description simplifies the GGE dramatically, the zero modes of the higher spin conserved currents are polynomials in terms
of $L_0$ and no longer take on independent values.
It is straightforward to see that
\[
\frac{\partial \log Z}{\partial \mu_i} = - 2\pi F_i(L_0)|_{\rm saddle}.
\]
If we identify the $F_i(T)$ with the conserved charges of the KdV hierarchy, then the partition function is precisely
a tau-function for the KdV hierarchy\footnote{See, e.g. \cite{DJKM,JimboMiwa} for the tau-function and \cite{drinfel1985lie} for the KdV hierarchy.}.
Though this is perhaps a somewhat trivial example of a tau-function, we can extend it to the case where $T$ is no longer constant.
For this we need to use the gauge invariant generalization of the entropy given by the appropriate Wilson line operator.
The result is
\begin{equation}
Z= {\rm Tr}(e^{-\int d\sigma \sum_i \mu_{i} F_i(T) }) = \exp\left\{\frac{c}{6} \cosh^{-1} \frac{1}{2} {\rm Tr}
P\exp\oint \left(\begin{array}{cc} 0 & 1\\ \frac{6T}{c} & 0 \end{array} \right) - \int d\sigma \sum_i \mu_{i} F_i(T) \right\}
\left.\right|_{\rm saddle}
\end{equation}
where now saddle means that we should find the saddle point of the expression on the right hand side for the
functional $T(\sigma)$. This provides a more interesting class of tau-functions for the KdV hierarchy if the
$F_i(T)$ are the corresponding charges, but at this level the $F_i(T)$ can in principle still be arbitrary,
which is probably an artifact of the large $c$ (or large $k$) limit.
We expect that once we start quantizing Chern-Simons theory with matter we should see a more interesting structure emerge,
and, in particular, we expect gravitational solutions that depend non-trivially on the chemical potentials $\mu_i$.
It would be interesting to explore the construction of such ``black holes with quantum hair'' in more detail.
Finally, we note that while it is tempting to assume a connection between the conserved charges considered here
and the conserved charges that appear in studies of integrability in AdS/CFT, the latter are generically non-local
and are supposed to already be relevant at the semi-classical level. Therefore, an obvious connection is lacking, but
it would also be interesting to explore this in more detail, as would be the role that the various conserved charges can
possibly play in studying geon solutions and instabilities of AdS.
\section{Discussion\label{sec:discussion}}
In this paper we studied some properties of the non-equilibrium behavior of 2D CFTs as well as the distinction
between local and global thermalization. We provided arguments that there are no revivals in generic states in
irrational theories, which one could take as an indication that the system thermalizes. To actually see thermalization
probably requires one to choose very complicated initial states for which explicit computations rapidly
become intractable. One-point functions of light probes in very complicated, heavy states can presumably
be well-approximated by the light-light-heavy-heavy conformal block derived in \cite{Fitzpatrick:2015zha},
although these computations have to our knowledge not been extended to a situation with boundaries.
Ultimately this is just another illustration of the usual problem than we can either do explicit, weakly coupled computations
where unitarity is manifest but thermalization difficult to see, or we can do strongly coupled (e.g. gravitational)
computations where thermality is easy to see but manifest unitarity is lost.
We note that there has been much research in recent years, starting with \cite{Bizon:2011gg,Dias:2011ss,Dias:2012tq,Maliborski:2013jca}, into the possibility of time-periodic solutions in AdS that avoid collapse into a black hole; however, exact solutions involving stable oscillating matter known to exceed the BTZ black hole mass threshold (in AdS$_3$) and yet exhibiting revivals to $t\rightarrow\infty$ (undamped oscillations) have so far not been found. If such solutions do exist, they appear likely to occupy a very small phase space and/or involve considerable simplifications of the physical setup.
In a similar spirit, we have shown that the holographic dual of the
generalized Gibbs ensemble is still a BTZ black hole. The GGE has
been central to the discussion of 1+1-dimensional integrable systems
away from a conformal fixed point. Such integrable field theories
can be obtained as massive deformations of a CFT, and -- at least
in principle -- the analysis that was carried out here could be applied
to them via conformal perturbation theory, where transformations to
a frame of constant stress tensor can still be applied at every order.
We note several additional avenues that are of interest in light of
our findings. The holographic picture of Sec.~\ref{sec:thermprobes} for
diffeomorphisms of the CFT ground state can be used to generalize
the AdS/BCFT setup of \cite{Takayanagi:2011zk,Fujita:2011fp} to arbitrary
forms of boundary states by finding the appropriate bulk brane corresponding
to the extension into the bulk of the dual BCFT's boundary. In particular,
the holographic dual of the rectangle state can thus be found, and
Lorentzian-time correlators from the corresponding initial state can
be computed via a formalism such as \cite{Skenderis:2008dh,Skenderis:2008dg}.
The holographic implementation of such a setup would likely be a useful
tool in evaluating general non-equilibrium behavior in systems with boundaries,
not only in classical AdS geometries, but also to $1/N$ corrections.
Finally, we note that while in classical $SL(2,\mathbb R)$ Chern-Simons theory
expectation values of Wilson lines in different representations are related to each
other in a simple way, this is no longer the case in quantum Chern-Simons theory.
It would be interesting to explore these quantum expectation values in more detail
and establish their relationship to the quantum KdV hierarchy and the GGE at finite
values of the central charge.
\subsubsection*{Acknowledgments}
We are grateful to G. Barnich, N. Engelhardt , B. Freivogel, D. Harlow, T. Hartman, J. Jottar, and D. Marolf for useful discussions.
DE acknowledges support from NSF grants PHY-1313986 and DGE-0707424, the Netherlands Organisation for Scientific Research (NWO), and the University of Amsterdam and is grateful to the Kavli Institute for Theoretical Physics for hospitality during the workshop Quantum Gravity Foundations: UV to IR while this work was in progress.
\bibliographystyle{utphys}
|
\section*{Results}
\noindent
\textbf{The seismic sample of exoplanets}
Using asteroseismology, we obtained accurate stellar mean densities and radii for $102$ exoplanet host stars (both confirmed and candidate exoplanets). These are shown in an asteroseismic Hertzsprung-Russell Diagram in Fig.~\ref{fig:1} (the methods used to determine the parameters are discussed in Methods while Supplementary Table~1 contains the data). The asteroseismic mean densities and radii, combined with precise periods and transit depths as well as the stellar effective temperature, allowed us to calculate very precise planetary radii and incident fluxes for the subset of Kepler exoplanets that orbit the $102$ host stars (typically more precise than $10\%$, see Fig.~\ref{fig:5}).
\begin{figure}[htbp]
\centering
\includegraphics[width=8.5cm]{Figure-1_Lundkvist.pdf}
\caption{\textbf{The seismic host stars.} Asteroseismic Hertzsprung-Russell diagram showing the large frequency separation as a function of stellar effective temperature (with $1\sigma$ uncertainties) for the $102$ exoplanet host stars in the asteroseismic sample. The grey lines show evolution tracks of different masses (in solar units) for solar composition (adapted from ref. \citenum{ref:lundkvist2014}). The location of the Sun is indicated by the grey solar symbol (circle with a dot). \label{fig:1}}
\end{figure}
We determined the flux that the exoplanet receives from its host star, using the following expression for the time-averaged incident flux in units of the Earth value (assuming circular orbits):
\begin{equation}
\label{eq:incidentflux}
\frac{F}{F_\oplus} =
\left( \frac{\rho_*}{\rho_\odot} \right) ^{-2/3}
\left( \frac{P}{1 \ \mathrm{yr}} \right) ^{-4/3}
\left( \frac{T_{\mathrm{eff},*}}{T_{\mathrm{eff},\odot}} \right) ^4 \ .
\end{equation}
Here, $\rho_*$ is the stellar mean density obtained from asteroseismology, $P$ is the orbital period, and $T_\mathrm{eff}$ is the effective temperature, with $T_{\mathrm{eff},\odot} = 5778 \ \kelvin$ being the effective temperature of the Sun. To find the radius we used the planet-star radius ratio ($R_\mathrm{p}/R_*$), which can be obtained from the transit depth ($\delta F/F$) and the stellar radius from grid-modelling:
\begin{equation}
\label{eq:planetradius}
R_\mathrm{p} = \sqrt{\frac{\delta F}{F}} R_* = \left( \frac{R_\mathrm{p}}{R_*} \right) R_* \ .
\end{equation}
The periods and the planet-star radius ratios have been obtained from ref. \citenum{ref:vaneylen2015} ($62$ exoplanets) or the NASA Exoplanet Archive's cumulative KOI (Kepler Object of Interest) list (\url{http://exoplanetarchive.ipac.caltech.edu/cgi-bin/TblView/nph-tblView?app=ExoTbls&config=cumulative}, accessed on July 1st 2015) with preference given to the former. The uncertainties were estimated using propagation of (Gaussian) uncertainties, where the dominant contribution to the uncertainty on the incident flux stems from the temperature uncertainty.
\vspace{12pt}
\noindent
\textbf{The hot-super-Earth desert}
In Fig.~\ref{fig:2} we show the exoplanet radius as a function of the incident flux for $157$ of the $162$ exoplanets. Five exoplanets were removed from the subsample because their radius estimates had an uncertainty in excess of $20\%$ (in order to not have our sample polluted by bad data points, see Methods for details). For illustration we also show in Fig.~\ref{fig:2} all Kepler KOIs with apparent sizes below $30 \ R_\oplus$ determined to better than $20\%$, that have a calculated flux and are not in our seismic sample (the non-seismic sample, the incident fluxes and radii for these KOIs have been taken from the NASA Exoplanet Archive).
\begin{figure}[htbp]
\centering
\includegraphics[width=18cm]{Figure-2_Lundkvist.pdf}
\caption{\textbf{Radius-flux diagram showing the distribution of exoplanets.} The $157$ exoplanets in the seismic sample are plotted with $1\sigma$ errorbars (in blue), while the non-seismic sample is shown in grey (the inset shows the full non-seismic sample). The exoplanets Kepler-4b, Kepler-10b and KOI-4198.01 are identified in the diagram. The location of the four rocky solar-system planets; Mercury (Me), Venus (V), Earth (E) and Mars (M) is indicated with the green writing (no points). The vertical dashed line marks an incident flux of $650 \ F_\oplus$, while the horizontal dashed lines indicate radii of $2.2$ and $3.8 \ R_\oplus$ respectively. The location of the hot-super-Earth desert has been shaded. \label{fig:2}}
\end{figure}
Figure~\ref{fig:2} clearly displays a complete absence of exoplanets with sizes between $2.2$ and $3.8 \ R_\oplus$ and an incident flux above $650$ times the Earth value (shaded area in Fig.~\ref{fig:2}). We constrained the size of the empty region by bootstrapping with $1$~million iterations of the exoplanets present in the seismic subsample and using the boundaries that left the region empty in $95.45\%$ ($2\sigma$) of the iterations (see Methods for further information). This empty region in the radius-flux diagram is the hot-super-Earth desert, and its location agrees with the theoretical prediction\citep{ref:lopez2013}. We note that some data points from the non-seismic sample will fall in the region of the hot-super-Earth desert if no cut is made to weed-out uncertain data points (see for example Fig.~7 of ref. \citenum{ref:rowe2015} and Methods).
As the boundaries and Fig.~\ref{fig:2} suggest, we opted to model the hot-super-Earth desert as a simple box region. While such a simplistic model may not capture the full effects of evaporation on the planet population, we do believe it to encompass the main features. A more sophisticated model taking into account how the amount of evaporation scales with incident flux and planet mass could be a next step.
As an aside, it should be pointed out that in the seismic subsample shown in the radius-flux diagram in Fig.~\ref{fig:2}, KOI-4198.01 (which we call Zenta) appears somewhat isolated. If Zenta is a bona fide exoplanet, it could potentially be a very interesting object, since it has the highest incident flux of the exoplanets in the seismic subsample, and it is below $1 \ R_\oplus$ in size. We have inspected the light curve of Zenta to make sure the transits look like genuine exoplanet transits, and we have obtained a few spectra of the host star with the Nordic Optical Telescope (on La Palma). These spectra will be the subject of a subsequent analysis.
\vspace{12pt}
\noindent
\textbf{Significance}
We employed different techniques to assess the significance of the hot-super-Earth desert. Firstly, under the assumption that the period-, or equivalently the incident flux-distribution does not change with planet radius\citep{ref:morton2014} (the null hypothesis), we tested whether the hot-super-Earth desert could occur by chance. This was done by drawing exoplanets randomly from the planet population below $650 \ F_\oplus$ and counting how many exoplanets fell in the radius range of the desert (see Methods for details). We find that only eight of our $10$~million simulations returned zero exoplanets in the desert. Thus it is very unlikely to observe the desert if the incident flux is not a function of radius, which is in agreement with our observation of a gap in the distribution.
Secondly, we used a Gaussian mixture model to represent the seismic subsample as it would look with no desert. Here, the underlying assumption is that the radius-flux distribution can be described by a sum of log-normal distributions\citep{ref:farr2014}. From the model we created a histogram (Fig.~\ref{fig:3}), and we found that fewer than $0.4\%$ of our simulations return the observed number of planets (zero) in the region of the hot-super-Earth desert (see also Methods). This shows that the gap in the radius-flux diagram is significant. It is worth noting that from the non-seismic sample alone, this inference cannot be made (it gives a p-value of $8\%$). We do not believe that this could be due to selection effects between the seismic and the non-seismic sample, since any detected hot-super-Earth planet would have been a high priority target to the Kepler mission. From the Gaussian mixture model treatment of the seismic sample, we also found a slight, although not statistically significant, over-density below the desert (see Fig.~\ref{fig:3}), similar to that expected if the rocky cores are left over from evaporation\citep{ref:lopez2013}.
\begin{figure}[htbp]
\centering
\includegraphics[width=8.5cm]{Figure-3_Lundkvist.pdf}
\caption{\textbf{Simulated number of exoplanets in and below the hot-super-Earth desert.} Histograms of the number of exoplanets in (blue) and below the hot-super-Earth desert (green, in radius) using a Gaussian mixture model of the seismic subsample under the assumption of no gap. The two dashed lines show the observed number of planets in (dark blue) and below the desert (dark green); $0\pm0.04$ and $17\pm0.7$, respectively. The histograms are based on $5$~million realisations. \label{fig:3}}
\end{figure}
\vspace{12pt}
\noindent
\textbf{Selection effects and false positives}
It should be emphasized that there are some selection biases in the sample. The limitations in the detection sensitivity of Kepler are the reason for the lack of small exoplanets with low incident flux. Also, for the asteroseismic subsample, the selected stars were on the Kepler short-cadence target list, which is the reason for the low number of large exoplanets with low incident flux (short-cadence slots were prioritised for multi-planet systems over single-planet systems, which favours small planets\citep{ref:latham2011}, and exoplanets showing many transits were discovered early in the mission and kept). While the completeness of the sample is hard to quantify\citep{ref:batalha2013,ref:petigura2013}, no known selection effects\citep{ref:wolfgang2015} would produce the paucity that we observe and the sample is complete down to $2 \ R_\oplus$ for short-period exoplanets\citep{ref:howard2012} (any missing small planets, i.e. below the gap, would only make the desert more pronounced). We also attempted to account for detection biases in our sample by imposing a signal-to-noise ratio criterion and assuming that no exoplanets meeting that criterion with a radius above $1.4 \ R_\oplus$ would have have been missed\citep{ref:huber2013}. We found this not to affect the presence of the hot-super-Earth desert (see Fig.~\ref{fig:7} and Methods for further details).
Despite our basic vetting, the seismic subsample of exoplanets will contain some false positives (FPs). The overall FP-rate for the sample is found to be low\citep{ref:desert2015} (in particular for the multi-planet systems\citep{ref:lissauer2014apj}), but it does vary over the sample. For example, the FP-rate is lower for exoplanets with radii $2-4 \ R_\oplus$ than for those with smaller or larger radii\citep{ref:fressin2013}. However, clearly no FPs have filled the hot-super-Earth desert, and our simulations show we would not be significantly affected by the presence in the sample of the percentage of FPs suggested by ref. \citenum{ref:fressin2013} (see Methods).
\vspace{12pt}
\noindent
\textbf{The sub-Jovian pampas}
A trend, agreeing with our results, has been seen in the radius-period (or semi major axis) diagram by previous studies\citep{ref:szabo2011,ref:beauge2013,ref:kurokawa2014}. They detected a deficit of exoplanets in the radius-range $3-10 \ R_\oplus$ with periods shorter than around $2.5 \ \mathrm{days}$ (the sub-Jovian pampas or sub-Jovian desert)\citep{ref:szabo2011,ref:beauge2013}. While both our hot-super-Earth desert and the sub-Jovian pampas lie at high temperatures (be it high incident flux or short periods), the radius-range is somewhat different, since we find the hot-super-Earth desert to extend only up to $3.8 \ R_\oplus$. Therefore, we investigated the radius-range of the hot-super-Earth desert further to determine whether it could be an extension of the sub-Jovian pampas.
Of the exoplanets in the seismic subsample above our flux boundary of $650 \ F_\oplus$, four exoplanets are present above $10 \ R_\oplus$. These are all confirmed exoplanets (Kepler-1b, 2b, 7b and 14b), and thus agree with the upper limit set by the previous studies. In the radius-range between $4$ and $10 \ R_\oplus$, another four exoplanets are present in our seismic sample. Of these, two are confirmed exoplanets (Kepler-4b and 56b), and a third (KOI-5.01) is a candidate in a multi-planet system (where the FP-rate is lower\citep{ref:lissauer2014apj}). Most important to the location of the upper boundary of the hot-super-Earth desert is Kepler-4b, which is located at $R = 4.2 \ R_\oplus$ and $F = 1243 \ F_\oplus$ (see Fig.~\ref{fig:2}), and thus effectively sets the upper boundary. Kepler-4b has a density of around $1.9 \ \gram \ \centi\meter^{-3}$ (similar to the density of Neptune), and is consequently volatile-rich\citep{ref:borucki2010}, which agrees with its location above the desert. Similarly, Kepler-56b also has a density estimate consistent with a volatile-rich composition\citep{ref:huber2013_sci}, thus also agreeing with its location above the desert.
We have examined the transits of Kepler-4b for evidence that it could be evaporating, but we failed to find any asymmetry in the transits or any transit-to-transit depth variations, which could both indicate atmospheric loss \citep{ref:rappaport2012,ref:rappaport2014}. Still, it cannot be ruled out that evaporation of Kepler-4b could be ongoing at a level, which we cannot detect and possibly at a level that does not influence the radius-evolution of the planet.
In order to assess the significance of an extended gap scenario, we tested two additional sets of boundaries, allowing for the presence of exoplanets from the seismic sample within the gap. The first scenario had the same flux boundary as the hot-super-Earth desert ($650 \ F_\oplus$), but spanned the radius-range from $2.2$ to $10 \ R_\oplus$ in agreement with the upper limit stated for the sub-Jovian pampas. This meant that four seismic exoplanets were present in the tested region (Kepler-4b, Kepler-56b, KOI-5.01 and KOI-1314.01). However, since the sub-Jovian pampas was defined in orbital period rather than incident flux, we cannot replicate the exact limit in the radius-flux diagram found by for instance ref. \citenum{ref:beauge2013}. Thus, we also considered the possibility that we should move the boundary to higher incident flux. Therefore we tested a region with the afore-mentioned limits in radius, but bounded by an incident flux of $1,000 \ F_\oplus$ instead of $650 \ F_\oplus$, which only leaves Kepler-4b in the region of the gap (even though a flux limit this high does not seem to agree with the sharp cut-off in the seismic sample in the $2.2-3.8 \ R_\oplus$ region). We find that both of the tested scenarios are less significant than the hot-super-Earth desert, with the $650 \ F_\oplus$ radius-extended scenario being by far the least significant one.
It can be noted in connection to the sub-Jovian pampas that some exoplanets seem to occupy that gap\citep{ref:beauge2013, ref:colon2015}, and that they do not all appear to be FPs\citep{ref:colon2015}. Ref. \citenum{ref:colon2015} investigate three planet candidates located in the sub-Jovian pampas, and they find that two of the three are likely true planets. While these two planets fall comfortably within the sub-Jovian pampas, one of them is too large to fall in the hot-super-Earth desert, and the other one has uncertainties large enough that it could as well be outside the hot-super-Earth desert (it sits $<1\sigma$ from the upper radius-limit\citep{ref:colon2015}).
\section*{Discussion}
For exoplanets in the radius range in question, radius is thought to be a good proxy for composition\citep{ref:lopez2014,ref:wolfgang2015}. This allows for the transition from a predominantly rocky to a volatile-rich make-up to be expressed in terms of radius, and this transition has been found to occur around $1.6-1.8 \ R_\oplus$ by different studies\citep{ref:rogers2015, ref:lopez2014, ref:wolfgang2015}. Thus, the majority of exoplanets in the $2.2-3.8 \ R_\oplus$ range are expected to be volatile-rich, though some of them could be water worlds\citep{ref:wolfgang2015} (for comparison, the radius of Neptune is $\sim \!\! 3.8 \ R_\oplus$). This agrees with the theory that these exoplanets could be stripped of their envelopes when they are too close to their host star. Thus, we can infer from our hot-super-Earth desert that hot exoplanets below $\sim \!\! 2.2 \ R_\oplus$ most likely have a predominantly rocky composition.
Dynamical interactions may in principle also be responsible for shaping the gap in the radius-flux diagram, for example due to orbital decay or inward migration of planets at late evolutionary stages. However, it seems unlikely that orbital decay played a major part in clearing out the particular part of parameter space associated with the hot-super-Earth desert since the planets would either need to be more massive or on shorter orbits\citep{ref:essick2015}. Other migration channels such as a combination of planet-planet scattering, tidal circularisation and the Kozai mechanism could have played a role in shaping the location of the hot-super-Earth desert through migration of exoplanets that were initially part of a triple (or larger) system\citep{ref:fabrycky2007,ref:nagasawa2008}. These effects have not been considered in our work, but they could be responsible for later migration of some of the planets that sit above the hot-super-Earth desert (and inside the sub-Jovian pampas, such as Kepler-4b). In addition, the flux boundary is likely a function of the planet mass with heavier planets being able to better withstand the evaporation. Therefore, while we find that the hot-super-Earth desert is more significant than the other regions we tested, we are not in a position to unambiguously decide whether the hot-super-Earth desert is an extension of the sub-Jovian pampas or a separate feature in the radius-flux diagram.
We have established the existence of a hot-super-Earth desert in the radius-flux diagram. Its presence confirms that photo-evaporation plays an important role in planetary evolution, with the mass-loss history depending on the incident stellar flux. This represents a mechanism not seen in our own solar system, by which some volatile-rich exoplanets are stripped of their atmospheres by their host stars. Consequently, our detection of a hot-super-Earth desert will add an important constraint for simulations of the evolution of planetary systems.
\section*{Methods}
\noindent\textbf{Preparation of the power spectra}
\noindent Asteroseismology is the study of stellar oscillations. In the case of solar-like stars, the frequencies of the oscillations are almost regularly spaced in a Fourier transform of the time series (a power spectrum, see the inset in Fig.~\ref{fig:4}). The dominant regular structure yields the large frequency separation, which carries information about the stellar mean density\citep{ref:chaplin2013}.
\begin{figure}[htbp]
\centering
\includegraphics[width=8.5cm]{Figure-4_Lundkvist.pdf}
\caption{\textbf{The large separation.} Output from the Matched Filter Response function for the host star KIC~9414417. The large peak seen at $\sim \!\! 53 \ \micro\hertz$ (and marked by the dashed line) indicates the large frequency separation for the star. The inset shows a section of the power spectrum of KIC~9414417 (smoothed with a Gaussian filter with a width of $1\ \micro\hertz$), where the regular spacing between the oscillation frequencies is clear. \label{fig:4}}
\end{figure}
We have searched all $275$ exoplanet host stars with a Kepler magnitude brighter than $13.5$ and with short cadence Kepler data (sampled every $58.85 \ \second$) for an asteroseismic signal. A magnitude limit of $13.5$ was chosen since we have essentially no chance of detecting oscillations in a solar-like star fainter than this\citep{ref:chaplin2011}. To be able to search for the large frequency separation ($\Delta\nu$) for each of the stars, we first made weighted power spectra. The power spectrum for each star was calculated in the following manner: (1) The time series for each quarter (data from Kepler are divided into quarters of approximately $3$ months duration due to the roll of the spacecraft) was cleaned for bad data points using sigma-clipping (with $4\sigma$) of a high-pass filtered time series (high-pass filter was $7 \ \mathrm{min}$) to take out the effect of all slow variations. (2) Using a high-pass filter, the long-term variation of the noise per data point was estimated and taken as the scatter ($\sigma$). (3) Using $1/\sigma^2$ as the statistical weight per data point, we calculated the power spectrum following ref. \citenum{ref:frandsen1995}. (4) For each quarter we calculated a separate power spectrum, and subsequently we combined the power spectra for all quarters into one single spectrum using a weighted mean. The weights were given by $1/\left(\mathrm{median}\left(\mathrm{power}\right)\right)^2$, where the median of the power between $2$ and $4 \ \milli\hertz$ was used. This serves the purpose of down-weighting power spectra for quarters with higher noise levels with respect to the others. Also, when combining several power spectra this way, we change the statistics of the power spectrum from being described by a $\chi_2^2$ to approaching a normal distribution (as stated by the central limit theorem)\citep{ref:appourchaux2003}. An example of a part of a power spectrum can be seen in the inset in Fig.~\ref{fig:4}.
\vspace{0.4cm}
\noindent\textbf{Extraction of large frequency separations}
\noindent A clear asteroseismic signature was found in $102$ of the host stars using a matched filter response function (MFR)\citep{ref:gilliland2011} to search for the large frequency separation. The method takes advantage of the near-regular spacing of the high-order, low-degree p-modes in the power spectrum of solar-like stars. It does this by summing the smoothed power at specific frequencies, which have been calculated from the asymptotic relation \citep{ref:tassoul1980} in the version:
\begin{equation}
\label{eq:asymp_rel}
\nu_{n, \ell} \approx \Delta \nu \left( n + \tfrac{\ell}{2} + \varepsilon \right)
- \ell \left( \ell + 1 \right) D_0 \ .
\end{equation}
Here, $n$ is the radial order of the mode (related to the number of nodes in the radial direction), $\ell$ is the degree of the mode (the number of surface nodes), $\varepsilon$ is a parameter sensitive to the near-surface layers of the star, while $D_0$ is sensitive to the conditions near the core.
When summing the power at frequencies given by different values of $\Delta\nu$ (collapsing over different values of the other parameters in expression~(\ref{eq:asymp_rel}), the result is the MFR giving the summed power as a function of $\Delta\nu$ (see ref. \citenum{ref:gilliland2011} for details). An example for the host star KIC~9414417 can be seen in Fig.~\ref{fig:4}. The large frequency separation corresponding to the most prominent peak in the MFR is then the large frequency separation of the star. The uncertainty on the large frequency separation is determined as the full width at half maximum of the peak.
\vspace{0.4cm}
\noindent\textbf{Grid-modelling of the host stars}
\noindent We used four pipelines to determine the stellar parameters for the $102$ exoplanet host stars. These were Asteroseismology Made Easy (AME)\citep{ref:lundkvist2014}, SEEK\citep{ref:quirion2010}, BAyesian STellar Algorithm (BASTA)\citep{ref:silvaaguirre2015} and the Yale-Birmingham (YB)\citep{ref:basu2010,ref:gai2011,ref:basu2012} pipelines. The YB pipeline derived the properties from five different grids of stellar models, which brings us to a total of eight different grids of stellar models. These pipelines have been used extensively for asteroseismology\citep{ref:huber2013,ref:chaplin2014_param,ref:campante2015}, and further description of the pipelines can be found in the literature.
As inputs to the grid-modelling we used for each star its large frequency separation ($\Delta\nu$) found from asteroseismology and two spectroscopic inputs; the effective temperature ($T_\mathrm{eff}$) and the metallicity ($[\mathrm{Fe}/\mathrm{H}]$). The values that were used for the $102$ host stars can be found in Supplementary Table~1.
We chose to use the mean density and radius returned by AME and then determined the uncertainty by adding in quadrature the uncertainty returned by AME and the scatter over the values returned by the other seven grids. Three stars were too massive for the AME grid, so for these we used the median parameters from the other seven pipelines and estimated the uncertainties by adding in quadrature the median formal uncertainty and the scatter over all seven grids. We note that the parameters returned by the various pipelines were consistent.
Many of the host stars in our seismic sample are present in other large host star samples with published seismic results\citep{ref:huber2013,ref:silvaaguirre2015}, and we have compared the densities and radii obtained for our sample with these other results. We find our parameters to be fully consistent (within $1\sigma$) with the results from ref. \citenum{ref:huber2013} with the exception of Kepler-22. However this is due to the fact that we are using a very different large frequency separation, since the signal originally found\citep{ref:borucki2012} is no longer thought to be the correct one [H. Kjeldsen et al. (in prep.)]. When comparing the densities and radii for the host stars that we have in common with ref. \citenum{ref:silvaaguirre2015} ($32$ stars), we find that all densities and $29$ of the $32$ radii are consistent within $1\sigma$ with the remaining three radii differing by just above $1\sigma$, leading us to conclude that our densities and radii are in agreement with those previously determined.
\vspace{0.4cm}
\noindent\textbf{Vetting of the seismic subsample of exoplanets}
\noindent In order to do some basic vetting of our seismic subsample, we chose to limit our sample to exoplanets that had an uncertainty in radius of less than $20\%$. A large uncertainty on radius was primarily due to large uncertainties on $R_\mathrm{p}/R_*$, which can be caused by grazing transits where the planet only partly covers the star. This removed five exoplanets from the sample: KOI-371.01, KOIs~2612.01 and 2612.02, KOI-3194.01 (which in addition has an impact parameter ($b$\citep{ref:seager2003}) larger than unity) and KOI-5086.01 (also $b>1$). A radius cut of $30\%$ would remove three of these targets (it would leave KOIs~2612.01 and 2612.02 in the sample). It should be noted that none of these exoplanets were situated in the hot-super-Earth desert. Instead of limiting our sample by using the uncertainty in radius, we also tried using the impact parameter (with the criterion $b<1$), which would remove some of the grazing transits. This removed the two exoplanets mentioned above from the asteroseismic subsample, but we opted for the stricter $20\%$ limit on the radius uncertainty.
We also tried to vet the subsample by using asterodensity profiling\citep{ref:vaneylen2015, ref:tingley2011, ref:kipping2014, ref:sliski2014}. Here, the ratio of stellar mean densities derived from the orbit and, in our case, grid-modelling ($\rho_{*,\mathrm{tr}}/\rho_{*,\mathrm{seis}}$) is considered, and a value very different from unity points to either very eccentric orbits or a blend scenario (these are the two largest effects). However, it was difficult to put meaningful constraints on the density ratio since a conservative value did not eliminate any candidates and a more aggressive value would risk throwing away high-eccentricity exoplanets. Thus, we did not pursue this further.
If the cut in radius uncertainty is made at a higher value than $20\%$, exoplanets from the non-seismic sample will appear in the desert. We have examined the points that appear if the cut is instead made at $30\%$ or $40\%$. Using the information from the NASA Exoplanet Archive (from July 1st 2015), when we make the cut at $20\%$ one exoplanet from the non-seismic sample is present in the top of the desert (with its $1\sigma$ errorbars easily placing it outside the desert). If we increase this value to $30\%$, two additional planets enter the hot-super-Earth desert, one very close to the lower flux boundary, and one which, since we downloaded the data, has been flagged as a false positive (FP).
If the cut is instead made at $40\%$, a total of $13$ exoplanet occupy the region of the hot-super-Earth desert including those discussed above. Of these $13$ planets, two are FPs and one is the confirmed exoplanet Kepler-319b. However, upon checking the radius and flux for Kepler-319b listed in the discovery paper\citep{ref:rowe2014}, it is clear that this planet is in fact situated far from the desert (with $R = 1.63 \ R_\oplus$ and $F = 261.6 \ F_\oplus$\citep{ref:rowe2014}), which brings us down to $10$ exoplanets in the desert.
We have manually inspected these $10$ remaining exoplanets situated in the hot-super-Earth desert. They all orbit stars of spectral type F or G, and we find that the reason for the very uncertain exoplanet parameters is very uncertain parameters for the host stars. We find that all of them have uncertainties consistent with a location outside the desert, and that two of them are likely FPs judged on inconsistency between the stellar density derived from the transit and that derived from the stellar mass and radius (these planets are on short orbits and are thus unlikely to have large eccentricities). It is noteworthy that excluding data points with high uncertainties does not exclude a specific spectral type, for instance, it simply limits the number of bad data points in the sample.
\begin{figure}[htbp]
\centering
\includegraphics[width=18cm]{Figure-5_Lundkvist.pdf}
\caption{\textbf{Distribution of uncertainties on radius and incident flux.} Histogram showing the distribution of the relative uncertainty in radius (\textbf{a}) and incident flux (\textbf{b}) for both the seismic and the non-seismic sample. The seismic sample is shown in blue and the non-seismic sample is shown in grey. Note the bimodal distribution in the non-seismic sample and the low uncertainties in the seismic sample compared to the non-seismic one. \label{fig:5}}
\end{figure}
We have plotted histograms of the relative uncertainties on the radius and incident flux, which can be seen in Fig.~\ref{fig:5}. We note that there is a clear bimodal distribution in both histograms, and that the uncertainties for the seismic subsample are lower than the typical uncertainties in the non-seismic sample. This emphasizes our point that the properties of the seismic sample are determined to a high accuracy. The bimodal distributions in relative uncertainty in flux and radius show that the non-seismic sample is divided into a "low" uncertainty and a "high" uncertainty population, and the division between the two populations lie at $\sim \! \! 30\%$ in radius. Thus, making a cut at $20\%$ should ensure that we are only plotting the best data points from the non-seismic sample, and we have verified that we are not cutting away a population of planets around M-dwarfs (which would have high uncertainties in radius) by doing so.
\vspace{0.4cm}
\noindent\textbf{Determining the boundaries of the hot-super-Earth desert}
\noindent We constrained the size of the hot-super-Earth desert by doing a bootstrap with $1$ million iterations of the exoplanets present in the seismic subsample and using the boundaries that make $95.45\%$ ($2\sigma$) of the iterations return an empty desert. To be specific, we first randomly drew $157$ exoplanets with replacement from the seismic subsample. Then we assigned each of these a radius and a flux randomly selected from Gaussians centred on the parameters for the drawn exoplanet with a standard deviation equal to the uncertainty. Subsequently, we determined how many of these exoplanets that were situated in the hot-super-Earth desert. This was repeated $1$ million times, after which we calculated the percentage of iterations without planets in the hot-super-Earth desert (which is the observed number). We used this information to change the boundaries of the desert, and we repeated the above procedure until we had obtained the $2\sigma$ limits. This procedure does not yield unique boundaries, although they are well constrained due to the small uncertainties on the exoplanets in the sample. However, to determine the exact extent of the hot-super-Earth desert is beyond the scope of this work, and it will in addition depend on whether or not one will allow any exoplanets in the desert.
\vspace{0.4cm}
\noindent\textbf{The Gaussian mixture model}
\noindent We have used a Gaussian mixture model (GMM), which is a probabilistic model that is the sum of a finite number of Gaussian distributions (we used the Python Scikit-Learn Gaussian Mixture Model\citep{ref:pedregosa2011}). We used the GMM to describe the planet population in log-log radius-flux space and then applied tests to the model to assess the probability that we had detected the hot-super-Earth desert. The distribution of planets in flux and radius is expected to form a correlated log-normal distribution as an outcome of a stochastic planet formation process that produced many correlated, fractional changes in planet sizes and orbits\citep{ref:farr2014}. Thus it is justified to use the GMM, which fit a sum of bivariate Gaussians to the data.
The two different hypotheses that we tested using the GMM and the data are the null hypothesis and the irradiated hypothesis. The null hypothesis states that the radius-flux distribution is smooth, thus that there is no hot-super-Earth desert present in the data. The irradiated hypothesis states that there is a gap in the population density and that there is an over-density at radii lower than the gap.
We leave the number of summed normal distributions as a parameter to be determined by the data in order to allow for different formation processes, selection effects, and other biases. The number of Gaussian components is determined by selecting the model with the lowest Bayesian Information Criterion (BIC). We apply the fit to three different samples; the seismic subsample of exoplanets, the non-seismic subsample and the combined sample. For each sample we use the minimum BIC to determine the number of components used in the GMM. For the seismic subsample, the typical number of components selected by the BIC is one.
The fit applied by the GMM does not treat statistical uncertainties on the data points. In order to ensure our tests are robust we have used a Monte Carlo approach to draw each data point from its statistical uncertainties. We generate $1,000$ draws from the uncertainties and for each draw we fit the GMM, and each time we determine the number of components by selecting the lowest BIC. From each of these $1,000$ models, we draw $5,000$ populations and record the number of planets that occupy the gap for each. This then provides the probability distribution of planets in the gap under the null hypothesis, since we fit our model to the data under this assumption.
\begin{figure}[htbp]
\centering
\includegraphics[width=18cm]{Figure-6_Lundkvist.pdf}
\caption{\textbf{Radius-flux diagrams showing real and simulated data.} \textbf{a:} One draw of the $157$ exoplanets in the seismic subsample (filled blue cicles) as well as a model of the subsample made from the Gaussian mixture model with (grey open circles) and without an artificial gap (green open circles). The vertical dashed line shows where the incident flux is equal to $650 \ F_\oplus$, while the horizontal dashed lines indicate radii of $2.2$ and $3.8 \ R_\oplus$ respectively. The location of the hot-super-Earth desert has been shaded. \textbf{b:} Same, but for the non-seismic sample. \label{fig:6}}
\end{figure}
Figure~\ref{fig:6} shows examples of the real data together with simulated samples drawn from the fit. We artificially injected a hot-super-Earth desert ($2.2 \leq R_\mathrm{p}/R_\oplus \leq 3.8$ and $F \geq 650 \ F_\oplus$) into the drawn samples by subtracting $2.7 \ R_\oplus$ from the planetary radius if the planet fell within the desert. While somewhat crude, this introduces the gap and an over-density below the gap.
In the seismic sample no planets are observed in the hot-super-Earth desert. Figure~\ref{fig:3} shows the probability distribution of planets expected in the hot-super-Earth desert under the null hypothesis together with the observed value ($0 \pm 0.04$). The uncertainty comes from the small chance that a system actually occupies the gap due to the uncertainties on the planetary radius and flux. Furthermore, we show the expected population distribution below the desert ($0.4 \leq R_\mathrm{p}/R_\oplus \leq 2.2$ and $F \geq 650 \ F_\oplus$) also with the observed value ($17\pm0.7$). The probability of observing no planets in the hot-super-Earth desert in the seismic sample given the null hypothesis is $p = 0.4\%$, which is sufficiently small that we reject the null hypothesis. We observe a slight over-density in the planet population below the desert, but this is very weak and not statistically significant.
We repeat the analysis with the non-seismic and the combined samples. For the non-seismic sample we find the probability of observing the data in the desert under the null hypothesis is $p = 8\%$, which supports the rejection of the null hypothesis but is not significant under the typical requirements of either $p < 5\%$ or $p < 1\%$. For the combined data we find a small improvement with $p = 0.3\%$, which is clearly dominated by the seismic sample.
We checked our method using the simulated data with and without a gap. We found results that were consistent with those reported here for the real data. It should be noted, specifically, that in the simulated-gap seismic sample, we consistently found we could reject the null hypothesis of no gap, while we typically did not confirm an over-density below the gap.
\vspace{0.4cm}
\noindent\textbf{De-biasing the seismic subsample}
\noindent In an attempt to account for detection biases in our seismic subsample, we de-biased the sample following the approach described by ref. \citenum{ref:huber2013}. First, we determined the minimum planetary radius that should be detectable for a given host star\citep{ref:howard2012}:
\begin{equation}
\label{eq:rmin}
R_\mathrm{min} = R_* \left( \sigma_\mathrm{CDPP} \cdot \mathrm{SNR}_\mathrm{lim} \right)^{0.5} \left( \frac{n_\mathrm{tr} t_\mathrm{dur}}{6 \ \mathrm{h}} \right)^{-0.25} \ .
\end{equation}
Here, $\sigma_\mathrm{CDPP}$ is the $6 \ \mathrm{h}$ Combined Differential Photometry Precision\citep{ref:christiansen2012}, $\mathrm{SNR}_\mathrm{lim}$ the required signal-to-noise ratio (SNR), $n_\mathrm{tr}$ the number of observed transits and $t_\mathrm{dur}$ the duration of a transit. We chose a SNR threshold of $10$ (ref. \citenum{ref:howard2012}), and for each exoplanet in the sample we estimated $R_\mathrm{min}$ by using the median $6 \ \mathrm{h} \ \sigma_\mathrm{CDPP}$ over all observed quarters (obtained from the Mikulski Archive for Space Telescopes, MAST, \url{https://archive.stsci.edu/kepler/}, accessed on July 8th 2015), the transit durations from NASA's Exoplanet Archive's cumulative KOI list (\url{http://exoplanetarchive.ipac.caltech.edu/cgi-bin/TblView/nph-tblView?app=ExoTbls&config=cumulative}, accessed on July 8th 2015), and crudely estimating the number of observed transits by dividing the total lifetime of Kepler (around $1470$ days) by the period of the exoplanet.
After having calculated $R_\mathrm{min}$ for all exoplanets in the seismic sample, we found for a range of exoplanet radii ($R_\mathrm{x}$) the number of exoplanets fulfilling the inequality $R_\mathrm{min}<R_\mathrm{x}<R_\mathrm{p}$. Finally, our de-biased sample consists of the exoplanets that fulfil the inequality $R_\mathrm{min} < 1.4 \ R_\oplus < R_\mathrm{p}$, where $1.4 \ R_\oplus$ was the value of $R_\mathrm{x}$ that returned the maximum number of exoplanets. The de-biased sample can be seen in Fig.~\ref{fig:7} along with the de-biased non-seismic sample (for illustration) using the $R_\mathrm{x}$ determined from the seismic subsample. It can be seen that the desert is still evident (also, see below).
\begin{figure}[htbp]
\centering
\includegraphics[width=8.5cm]{Figure-7_Lundkvist.pdf}
\caption{\textbf{Radius-flux diagram showing the de-biased seismic subsample.} The de-biased sample of exoplanets with a threshold SNR of $10$ and a radius fulfilling $R_\mathrm{min} < R_\mathrm{x} < R_\mathrm{p}$ with $R_\mathrm{x} = 1.4 \ R_\oplus$ is shown (in blue) with $1\sigma$ errorbars. The grey points are all the exoplanets in the non-seismic sample fulfilling $R_\mathrm{min} < R_\mathrm{x} < R_\mathrm{p}$, also with $1\sigma$ errorbars. The vertical dashed line shows where the incident flux is equal to $650 \ F_\oplus$, while the horizontal dashed lines indicate radii of $2.2$ and $3.8 \ R_\oplus$ respectively. The location of the hot-super-Earth desert has been shaded. \label{fig:7}}
\end{figure}
\vspace{0.4cm}
\noindent\textbf{Further tests}
\noindent As well as using the Gaussian mixture model to assess the hot-super-Earth desert, we also took another approach to verify the significance of the missing data points. We did this by first dividing the seismic subsample of exoplanets in two groups, with $F/F_\oplus > 650$ and $F/F_\oplus < 650$. We then used the exoplanet radius distribution for the $F/F_\oplus<650$ sample to generate a sample with randomly selected exoplanet radii for a number of exoplanets corresponding to the number of exoplanets with $F/F_\oplus > 650$. Afterwards we determined how many of the selected exoplanets had a radius between $2.2$ and $3.8 \ R_\oplus$. This simulation was repeated $10^7$ times, and we determined the number of times we found the same number of exoplanets as we observe in the hot-super-Earth desert (zero), in this radius range. We found this to happen in only eight of the $10$~million simulations.
This test was repeated to measure the effect of false positives (FPs) on the detection. This was done by randomly removing points from the seismic subsample according to the percentages given by ref. \citenum{ref:fressin2013} and then repeating the above analysis. Of course this approach does not take into consideration any non-uniformity of the FP-rate with flux (for instance there are more eclipsing binaries at higher incident flux\citep{ref:lissauer2014apj}), but on the other hand we do not compensate for the FP-rate for multi-planet systems being lower than for single-planet systems\citep{ref:lissauer2014apj}, or that we have many confirmed exoplanets in the sample (for which the FP-rate should be essentially zero). Thus, this approach should give a fairly conservative estimate of the effect of FPs on the hot-super-Earth desert. We find that $39$ of our $10$~million simulations return zero exoplanets in the radius region of the desert, meaning that the presence of FPs in our sample does not significantly affect the detection of the hot-super-Earth desert.
In order to assess the importance of potential systematic errors on the detection of the hot-super-Earth desert, we investigated the impact on the incident flux of a $100 \ \kelvin$ temperature offset and also of a non-zero eccentricity of $e = 0.5$. We find that the effect of both of these changes is of the same magnitude, and using this test we determined that they have no impact on the detection of the hot-super-Earth desert.
We also used the test on the de-biased sample (seen in Fig.~\ref{fig:7}), and here $54$ of the $10$~million simulations returned the same number of exoplanets in the desert as we observe; thus the detection of the hot-super-Earth desert is not greatly changed by using the de-biased sample instead. We performed a bootstrap on the de-biased sample similarly to what was done for the full sample. Here we found that the boundaries of the hot-super-Earth desert that we determined from bootstrapping the full sample ($2.2 < R_\mathrm{p}/R_\oplus < 3.8$ and $F > 650 \ F_\oplus$) are stronger when considering the de-biased sample. They change from being $2\sigma$ limits to being just above $3.5\sigma$, meaning that $>99.95\%$ of the $1$~million simulations left the hot-super-Earth desert empty ($380$ yielded one planet).
\setlength{\bibsep}{3.0pt plus 0.3ex}
|
\section{INTRODUCTION}
Magnetic reconnection is believed to be the main mechanism of solar flare energy release. Various scenarios of magnetic reconnection discussed in many papers including flare models by \cite{Somov1974,Syrovatskii1976,Amari1999,Somov2000,Priest2000,Priest2002}. Most of these models assume that the reconnection process occurs in the low-density high-temperature corona. However, there are a lot of variants of magnetic field topologies where magnetic reconnection can be triggered. The most popular standard flare model \citep{Hirayama1974,Magara1996,Tsuneta1997} assumes formation of a quasi-vertical current sheet in the solar corona beneath of an upward moving plasmoid. In the framework of this model the primary energy release (magnetic reconnection in the current sheet) and electron acceleration also take place in the low-density corona. It is likely that a large fraction of eruptive solar flares follows this scenario \citep[e.g.][]{Liu2008,Krucker2008,Fletcher2011}. Obviously, non-eruptive events cannot be interpreted in the frame of the standard model. Thanks to the development of multiwavelength observations of the Sun, nowdays we are getting a lot of information about the real complexity of the flare phenomenon and inapplicability of the standard model. It has been argued that the magnetic reconnection process can be triggered not only in the low-density corona but also in deeper partially ionized layers of the solar atmosphere \citep[e.g.][]{Georgoulis2002, Chae2003}. Recently developed models of chromospheric magnetic reconnection \citep[e.g.][]{Leake2012, Leake2013, Leake2014, Ni2015} have direct applications to the physics of such observed phenomena at different scales like chromospheric jets, Ellerman bombs, and, perhaps, solar flares. However, it is unclear if the chromospheric reconnection may occur on the larger scale of solar flares. In this respect, investigation of the flare energy release in the lower solar atmosphere is particularly interesting.
It has been known since observations of \cite{Severnyi1958} that the solar flares appear first in the vicinity of the polarity inversion line (PIL) of the line-of-sight magnetic field, and that the flare emission spreads outside the PIL as the flare develops. Also, he found that a considerable gradient of the magnetic field across the PIL is required for the flare appearance. Due to the availability of various multispectral observations of the solar flares, today we are getting new knowledge about the flare processes near the PIL. The statistical analysis of SOHO/MDI line-of-sight magnetograms, presented in the work of \cite{Welsch2008} shows that the PIL with strong gradient of the magnetic field is associated with the flux emergence. The most recent statistical study made by \cite{Schrijver2016} illustrates that strong-field, high-gradient polarity inversion lines (SHILs) created during emergence of magnetic flux into active region are associated with X-class flares. \cite{Wang2015} demonstrated changing horizontal component of the magnetic field near the PIL, which could be connected with magnetic reconnection in the twisted magnetic flux tube. A detailed 3D modelling of the magnetic field presented in the work of \cite{Inoue2016} reveals conditions in the vicinity of the PIL favourable for magnetic reconnection and triggering solar flares. High resolution observations of the formation of H$\rm_{\alpha}$ ribbons surrounding the twisted magnetic flux rope near the PIL are shown in the work of \cite{Wang2015}. In this work authors show evidence that the flux rope elongated along the PIL in the low solar atmosphere becomes unstable following the enhancement of its twists. Thus, it is especially interesting to study flare processes in the vicinity of PIL in more details.
In this paper we investigate the M1.0 non-eruptive solar flare occurred on 12 June, 2014, started at around 21:00~UT (peak at 21:12~UT and ended at $\approx$21:30~UT) in active region NOAA 12087, located approximately 50 degrees South-East from the disk center. This event was selected for analysis due to the availability of various unique observations of the solar atmosphere made by Interface Region Imaging Spectrograph, IRIS \citep{DePontieu2014}, New Solar Telescope, NST \citep{Goode2012} in the Big Bear Solar Observatory (BBSO), Helioseismic Magnetic Imager, HMI \citep{Scherrer2012} and Atmospheric Imaging Assembly, AIA \citep{Lemen2012} instruments onboard Solar Dynamics Observatory, SDO \citep{Pesnell2012}. This flare showed an intriguing activity in the vicinity of the PIL, which was discussed in a couple of previous works \citep{Sadykov2015,Kumar2015}. IRIS and RHESSI observations of the selected flare were previously discussed in the paper \cite{Sadykov2015}. This work presents the detailed analysis of Doppler shift maps reconstructed for different lines, which are compared with the RHESSI X-ray images. It was concluded that chromospheric evaporation could be triggered not only by accelerated particles but by heat conduction flows from hot plasma. IRIS and AIA/SDO images also reveal energy release in the form of dynamic jet, which erupts from the deep layers of the solar atmosphere in the vicinity of the magnetic field polarity inversion line (PIL). In the work \citep{Kumar2015} authors claim that they found direct evidence of magnetic reconnection in the vicinity of the PIL between two small opposite polarity sunspots. Using NST H$_{\alpha}$ images they concluded that interaction between two J-shape loops lead to the formation of the twisted flux-rope elongated along the PIL. They also detected plasma inflows near the PIL that was recognised as a signature of the magnetic reconnection. The focus of our paper is on a detailed analysis of physical processes in the vicinity of the PIL in the low atmosphere during the solar flare using high resolution observations.
We present analysis of the H$\rm_{\alpha}$ line wings filtergrams and broadband TiO images (7057~\AA), which correspondingly show processes in the lower chromosphere and the photosphere. We will also use nonlinear force-free magnetic field (NLFFF) modelling of the magnetic field to explain some topological peculiarities and energy release of the flare. Magnetic reconnection or triggering of a solar flare in the lower solar atmosphere can be connected with plasma flows. To detect these and compare with other data we use the HMI Dopplergrams, which give us information about the speed of plasma flows along the line of sight.
The paper is divided into four sections. Section 2 describes the observational data. Section 3 is devoted to the analysis of NST images, electric currents and magnetic field topology (using the HMI data). Discussion and conclusions are presented in Section 4.
\section{OBSERVATIONAL DATA}
To investigate the fine spatial structure of the flare energy release site we use $H_{\alpha}$ data from Visible Imaging Spectrometer (VIS) and TiO filter (7057~\AA) images from Broadband Filter Imager (BFI) obtained at the 1.6 m New Solar Telescope \citep{Goode2012,Varsik2014} and available from the BBSO web site (http://bbso.njit.edu/). The new system of adaptive optics, large aperture and speckle-interferometry postprocessing \citep{Woeger2008} make it possible to obtain images of the Sun with high spatial resolution up to the diffraction limit. The pixel size of the VIS images is about 0.029$^{\prime\prime}$, which is approximately 3 times smaller than the telescope diffraction limit $\lambda_{H\alpha}/D\approx 0.084^{\prime\prime}$. The pixel size of the BFI TiO images is about 0.034$^{\prime\prime}$ with the diffraction limit $\approx 0.09^{\prime\prime}$. The time cadence between two subsequent $\rm H_{\alpha}$ line scans in 5 wavelength bands (6563 $\rm\AA$ $\pm$1.0, $\pm$0.8, $\pm$0.4 and the line core) is $\approx$15 seconds.
We study the magnetic field structure using observations of Helioseismic Magnetic Imager \citep{Scherrer2012}. The HMI makes spectropolarometric observations of the magneto-sensitive Fe~I line (6173\AA) by two different cameras in six wavelength channels covering the whole line profile. Calculations of the optical continuum intensity, line-of-sight magnetic field and Doppler velocity with the time cadence 45 s and the spatial resolution of $\sim 1^{\prime\prime}$ are based on the right and left circular polarization measurements. To obtain the full magnetic field vector with the time cadence 720 s HMI also make measurements of the linear polarization profile. The spatial resolution of vector magnetograms is the same as in the case of the LOS magnetograms.
The 3D structure of the magnetic field in the flare region was reconstructed using the NLFFF optimization code \citep{Wheatland2000} available from the package SolarSoft. For the boundary condition we used the disambiguated HMI vector magnetograms \citep{Centeno2014}.
\section{RESULTS}
\subsection{NST OBSERVATIONS}
In Fig.\,\ref{VIS_large} we show a sequence of H$\rm_{\alpha}$~filtergrams (the line core and red wing~6563$+0.8\rm\AA$) for a large field of view (FOV). The $H_{\alpha}$ line wing filtergram corresponds to deep layers of the chromosphere, as the emission in this band experiences less absorption than in the H$\rm_{\alpha}$ line core. The line-core center filtergrams reveal the complexity of the upper chromospheric flare region. One can note a twisted structure (indicated by red arrow) passing through the image. The H$\rm_{\alpha}$ line core filtergrams show ribbon-like emission sources during the whole event, while emission in the line wings was observed only during a short time interval. The most interesting observation is that the initial emission is developed in a small region surrounding a twisted magnetic structure located in the vicinity of the polarity inversion line. According to the work of \cite{Sadykov2015} and \cite{Kumar2015} this place corresponds to a jet observed by IRIS, and probably corresponds to the place of magnetic reconnection. To show the flare build-up phase and locate the preflare energy release site in the low solar atmosphere we present H$\rm_{\alpha}$ contour images before the flare (blue tones) and during the flare (red tones) in Fig.\,\ref{rib_evo}. The most significant preflare activity was observed in the region marked by ellipse. Our further analysis will be mostly focused on this particular region.
More detailed zoomed images of this region are displayed in Fig.\,\ref{VIS_TIO}. The TiO images show the temporal dynamics of an elongated structure (that looks like a small twisted flux rope, or a sheared arcade, and indicated by red ellipse), separating two sunspots of opposite magnetic polarity ($\delta$-type configuration). The visible width of this structure has a tendency to grow with time. Two other columns in Fig.\,\ref{VIS_TIO} correspond to the red and blue wings of $\rm H_{\alpha}$ line. At beginning of the flare before the impulsive phase we observe tiny $\rm H_{\alpha}$ ribbons and brightenings in the vicinity of the TiO arcade. At 21:06:25 UT the most intensive $\rm H_{\alpha}$ ribbons surround the TiO arcade (which may correspond to a magnetic flux rope). A very intriguing peculiarity is that we observe a three ribbon structure: two relatively wide ribbons (with width $\sim 1^{\prime\prime}$) and a tiny thread (width $\sim 0.3^{\prime\prime}$) located between them. The tiny ribbon directly corresponds to the TiO flux-rope which is located inside the twisted magnetic structure, seen in the $\rm H_{\alpha}$ line core. These observations are summarized in Fig.\,\ref{VIS_compare}, where $\rm H_{\alpha}$ (line wing) emission sources (shown by yellow contour lines) are compared with the TiO and $\rm H_{\alpha}$ (line core) images.
A time-space diagram made along two slices intersecting all three $H_{\alpha}$ ribbons is shown in Fig.\,\ref{Ha_rib_evo}. The thin ribbon is quasi-stationary while the other two ribbons experience explosive motion at 21:04~UT in the opposite directions from each other. The approximate speed of this expansion is about 10 km/s for the lower ribbon and $\approx 5$~km/s for the upper ribbon.
\subsection{DYNAMICS OF THE PLASMA FLOWS IN THE FLARE REGION}
In this section we present analysis of the Doppler line-of-sight velocity in the flare region, measured by HMI. It is worth noting that the detected flows do not correspond to the upflows and downflows directly as the solar flare is located $\sim 640^{\prime\prime}$ from the disk center. Thus, estimated velocities are composed from the horizontal (along solar surface) and vertical components. However, further we will distinguish positive and negative velocities as downflows and upflows.
The HMI Dopplergrams are compared with the HMI LOS magnetograms in Fig.\,\ref{HMI_v}. Before the flare onset (top rows) we observe a system of upflows surrounded by downflows near the PIL. This flow system was observed during the whole flare process without significant changes. The flare initiation is associated with appearance of new downflows near other region of the PIL (marked by an arrow), which corresponds to the TiO arcade. The average downflows speed is about 1 km/s.
In Fig.\,\ref{hist_v} we demonstrate the evolution of the flow speed distribution in the flare region. By red contour in the image we show an area where distribution of Doppler speeds was calculated. This place corresponds to the TiO arcade and the region with enhanced Doppler flows. One can notice that after the flare onset (marked by vertical line in right panel) the Doppler speed distribution changes. Thick black curve is the Doppler speed averaged over all pixels inside the red contour in left panel. This line also indicates changing flows in the region of our interest which is associated with the flare process.
\subsection{ELECTRIC CURRENTS IN THE FLARE REGION}
To calculate the vertical currents $j_z$ (component perpendicular to the solar surface) we use the HMI vector magnetograms, and the Ampere's law \citep[e.g.][]{Guo2013, Musset2015}:
\vskip-.6cm
\begin{eqnarray}
j_z=\frac{c}{4\pi}(\nabla\times\vec{B})_z = \frac{c}{4\pi}\left(\frac{\partial B_x}{\partial y} - \frac{\partial B_y}{\partial x}\right)
\label{eq_jz}
\end{eqnarray}
where $B_x$ and $B_y$ correspond to the East-West and South-North components of the magnetic field.
Since the flare was located far from the disk center the observed LOS PIL may deviate from the exact position of the PIL of the $B_z$-component (vertical to the solar surface) due to the projection effect. Using the HMI vector magnetograms we recalculated all $\vec{B}$ components from the local helioprojective Cartesian system to the Heliocentric Spherical coordinate system. The recalculated values are used for the $j_z$ calculation (Eq.\,\ref{eq_jz}). Figure~\ref{jz} shows comparison of the LOS PIL (red line) with exact PIL (orange line) in the helioprojective Cartesian coordinate system. Electric currents maps are also shown in Fig.\,\ref{jz}.
There are several places along the PIL where electric currents are intensified. In the region of the TiO flux-rope electric currents are the most intensive. The configuration of electric currents does not experience significant changes which can be visually detected. Temporal dynamics of the averaged $j_z$ is shown in Fig.\,\ref{jz_evo}. The error bars are calculated as standard deviation of the $j_z$ distribution (which is fitted by a Gaussian) outside the region of intensified electric currents near the PIL. One can note that the average current changes during the flare. Absolute value of negative $I_z$ increases while positive $I_z$ decreases.
The reconstructed PIL does not completely correspond to the LOS PIL. Near the TiO flux-rope and downflows region before the flare onset both PILs coincide, but after flare initiation they are separated. This means a change of magnetic field orientation which likely corresponds to the observed reduction of magnetic shear of the TiO arcade, as discussed in the next section.
\subsection{TOPOLOGY OF THE MAGNETIC FIELD}
The global magnetic field topology of the flare region is shown in Fig.\,\ref{topology} (top panels). The twisted magnetic field structure follows the polarity inversion line of the magnetic field. This twisted structure is surrounded by sheared magnetic field lines forming a closed configuration. The magnetic field topology does not change significantly during the flare energy release, which is shown by comparison between the preflare and postflare NLFFF extrapolations (Fig.\,\ref{topology}).
Bottom panels of Fig.\,\ref{topology} show the absolute value of the horizontal component of electric current density, calculated from the extrapolated magnetic field. We see that the strongest horizontal currents are concentrated in the vicinity of the PIL. One can notice that the TiO arcade corresponds to the place of strong $j_h$. The preflare value of $j_h$ is weaker than in the postflare state.
The place of our particular interest is the region, where the TiO arcade and preflare activity were observed (this place is marked by ellipse in Fig.\,\ref{topology}). In Fig.\,\ref{nlfff2} we present the magnetic field extrapolation results for this region. Before the flare, we see two interacting sheared twisted flux-tubes near the magnetic field polarity inversion line. After the flare between these flux-tubes a small arcade is formed. The results of this modelling are consistent with the TiO and $\rm H_{\alpha}$ images (Fig.\,\ref{VIS_TIO}). Before the flare the TiO arcade is more sheared, and after the flare it is more wide and the shear seems to be reduced. In Fig.\,\ref{nlfff2} we also show the value of magnetic field gradient $\nabla_hB_z=\sqrt{(\partial B_z/\partial x)^2+(\partial B_z/\partial y)^2}$ (this value coincides with $j_h$ map in bottom panels of Fig.\,\ref{topology}). The strongest value of $\nabla_hB_z$ ($\sim 1-2$~kG/Mm) is found along the PIL, and concentrated near the region where the TiO flux-rope with downflows was observed. Thus, the strongest shear is along the PIL and TiO arcade.
To show the dynamics of the magnetic fields in the lower solar atmosphere we calculated differences between the magnetic field components ($B_x$, $B_y$ and $B_z$) before and after the flare (Fig.\,\ref{B_restruct}). One can see that the magnetic field experience changes in the vicinity of the PIL. These changes are especially noticeable in the region of the TiO arcade (indicated by magenta ellipse). The magnetic field dynamics can be associated with magnetic reconnection or motion of the magnetic structures. The motion of the magnetic field tubes produces electric field $\vec{v}\times\vec{B}/c$ which can be an important driver of the flare energy release. Anyway, the significant changes of the magnetic fields observed in the vicinity of the PIL are associated with the flare energy release.
In Figures~\ref{slice1}-\ref{slice3} we demonstrate the distribution of different physical quantities derived from the NLFFF magnetic extrapolations along three slices intersecting the PIL in various points (Fig.\,\ref{slice2} show slice intersecting the TiO arcade). We show these distributions for preflare (left panels) and postflare (right panels) times. There are no any significant changes in the distribution of the electric current component $j_{perp}$ perpendicular to the slice.
Magnetic field components $B_z$ (panel E), $B_s$ (along slice, panel F) and $B_{perp}$ (perpendicular to the slice, panel G) at various heights also does not show significant changes during the flare energy release. We only found increasing $B_s$ component in the case of slice presented in Fig.\,\ref{slice2} and decreasing $B_{s}$ in the other two cases (Figures~\ref{slice1} and \ref{slice3}).
We also show the sign inversion line of $B_z$ component in the plane of the slice by black line (panels B and C). This line experiences some changes only in the region of the TiO arcade (Fig.\,\ref{slice2}). In the case of other slices (Figures~\ref{slice1} and \ref{slice3}) the line does not change during the flare energy release.
In Figure~\ref{jslices} we show the distribution of $\vec{j}$ absolute value. One can note that in the region of the TiO arcade we have decreasing value of electric currents and the height of the maximal electric current is decreased. While other slices do not show significant changes.
\section{DISCUSSION AND CONCLUSIONS}
In this section we will try to draw a picture of the physical processes in the flare region. First of all, we summarize the main observational results. All preflare activity in the low solar atmosphere was located near the PIL in a compact region, according to the NST data. The flare observed in the NST images was accompanied by changing magnetic fields near the PIL which is clearly seen in the HMI vector magnetograms. The TiO and H$\rm_{\alpha}$~images reveal formation of a small ($\sim 3$Mm) arcade-like magnetic structure in the photospheric and chromospheric layers of the solar atmosphere, which shows an evolving shearing structure. Magnetic field of this structure is approximately $1000$ Gauss. The H$\rm_{\alpha}$ emission sources near this place were observed as a three ribbon structure with the thinnest ribbon located between the thicker ones. This thin ribbon was stable while the others moved away from each other during the flare with the speed $\sim 5-10$ km/s. Moreover the thin ribbon was observed only in the wings of H$\rm_{\alpha}$ line, that evidences in favour of a deep location of this structure.
In the same region of the small magnetic arcade we found intensification of Doppler downflows across the PIL, which is associated with the flare onset. The strongest intensification of electric currents estimated from the HMI vector magnetograms also corresponds to this place. Downflows could be connected with moving plasma attached to the reconnected magnetic field lines. The plasma flows across magnetic field lines produce electric field $\vec{v}\times\vec{B}/c$ which could be a driver of the flare energy release. The observed flows near the PIL are connected with the flare energy release as their distribution and average speed experiences changes during the flare time.
The NLFFF modelling reveals interaction of oppositely directed magnetic flux-tubes in the PIL. The strong electric current was concentrated near the PIL and its strongest value is achieved in the region of the TiO arcade. Before the flare onset the interaction of the magnetic fluxes extended from the photospheric up to the chromospheric layers. These two interacting magnetic flux tubes are observed as the sheared TiO arcade. After the flare the arcade shear is reduced in accordance with the NST observation. A possible scheme of the magnetic reconnection and magnetic field topology in the PIL is illustrated in Fig.\,\ref{scheme}. The reconnection is developed in the volume with strong magnetic field in the chromosphere codirectional with the electric current. Footpoints of the formed arcade may correspond to the observed H$\rm_{\alpha}$ ribbons. How can we explain the appearance of the third thin ribbon located between the thick ones in the low solar atmosphere, elongated along the PIL, and cospatial with the TiO arcade? This H$\rm_{\alpha}$ emission could originate from a thin channel (possibly a part of the current sheet) where electric current dissipates.
How can we explain formation of the large scale emission ribbons? Can the energy be transferred from site in the PIL in the lower atmosphere to the flare ribbons? Perhaps, it is possible to organise energy transfer by accelerated particles spreading along the magnetic field lines, and filling the large-scale magnetic field structure. Heat conduction flows can be also responsible for energy transfer. However, to answer these questions theoretical modeling is necessary.
Presented observational results evidence in favour of location of the primary energy release site in the dense chromosphere where plasma is partially ionized in the region of strong electric currents concentrated near the polarity inversion line. Magnetic reconnection may be triggered by two interacting magnetic flux tubes with forming current sheet elongated along the PIL. The reconnection process develops in the presence of strong magnetic field $\sim 1000$ Gauss and, probably, large radiative losses due to the high density. Observed small magnetic arcade can be a result of the chromospheric magnetic reconnection.
The studied solar flare is not eruptive and, thus, energy of CME should not be considered in total flare energetics. To calculate total flare energetics one can integrate flare emissions. Total integrated soft X-ray radiation losses are estimated as $\sim 10^{30}$ ergs according to the GOES data. This energy was estimated by time integration of $L_{rad}=EM\cdot f(T)$, where $f(T)$ is radiative loss function \citep{Rosner1978}. Emission measure $EM$ and plasma temperature $T$ are calculated according to the method described in the work of \cite{Thomas1985}. However, flare radiation losses are concentrated not only in the soft X-ray emission range. Significant part of the flare radiation is also concentrated in the UV and EUV parts of electromagnetic spectrum \citep{Emslie2012,Milligan2014}. According to these works, the total flare bolometric irradiance can be several times greater than the soft X-ray integrated energy losses. In the case of the studied flare, we may suggest that total flare energetics $E_{tot}$ is in the range of $10^{30}-10^{31}$ ergs. This value can be explained by dissipation of the energy stored in the magnetic fields, generated by local electric currents. The total magnetic energy is calculated as integration of $B^2/8\pi$ over the whole volume, for which we made the magnetic field extrapolations. According to the NLFFF modelling the difference between the postflare and preflare total magnetic energies is about $6\times 10^{31}$ ergs which is, at least, a few times larger than energy $E_{tot}$ released during the studied flare. Thus, the released magnetic energy is in accordance with the total flare energetics.
The studied event is a good illustration of a chromospheric non-eruptive flare which does not fit into a standard model. It motivates us to investigate magnetic reconnection in the physical conditions far from those that are assumed in the frame of the standard model. To improve idea of flare chromospheric magnetic reconnection we need new detailed numerical simulations whose results can be compared with the available high-resolution multiwavelength observations of the solar flares.
The main conclusion of the paper is that the flare primary energy release develops within a relatively small volume in the vicinity of the magnetic field polarity inversion line in the presence of strong electric currents, magnetic fields and plasma flows confirming the initial results of \cite{Severnyi1958}. It is likely that all large scale processes of flare energy release observed as UV, EUV and $\rm H_{\alpha}$ ribbons and formation of hot UV and soft X-ray loops are connected with the small scale primary energy release site located near the PIL.
\acknowledgements
The authors acknowledge the BBSO observing and technical team for their contribution and support. This work was partially supported by the Russian Foundation for Basic Research (grants 15-32-21078 and 16-32-00462), and by NASA grant NNX14AB68G.
|
\section{Introduction}
Random linear network coding (RLNC) in theory achieves the max-flow capacity of a multicast network\cite{Ahlswede2000}, \cite{Ho2006} but unfortunately has high decoding complexity. The decoding requires solution of a general system of linear equations in $M$ unknowns to recover $M$ source packets, resulting in high $\mathcal{O}(M^3)$ computational cost using Gaussian elimination (GE).
To reduce decoding cost, a possible solution is to group source packets into subsets called \textit{generations}. By performing RLNC only among packets belonging to the same generation \cite{Chou2003}, a sparse system is obtained. In \cite{Maymounkov2006}, it is established that intermediate nodes can randomly \textit{schedule} generations to perform coding without acknowledgment between nodes. The scheme is referred to as generation-based network coding (GNC) and is the focus of this paper.
A complete GNC system consists of a \textit{code}, \textit{scheduling strategy}, and \textit{decoder}. The GNC code specifies how generations are formed and how coded packets are generated at the source node. The scheduling strategy at intermediate nodes determines from which generation to re-encode a packet when there is a transmission opportunity. At each destination, the GNC decoder recovers source packets from received coded packets of different generations.
A key GNC performance metric is reception \textit{overhead}, defined as the excess in received packets over the number of source packets needed to decode. The overhead can be classified into \textit{encoder-induced}, \textit{decoder-induced}, and \textit{network-induced}. Encoder-induced overhead (or \textit{code overhead} for brevity) is introduced if there exists at least one subset with size $k\leq M$ of the encoded packets that is not a linearly independent set; decoder-induced overhead is incurred if the decoder is unable to decode when $M$ linearly independent packets are received; network-induced overhead is incurred if scheduling and re-encoding at intermediate nodes introduces linear dependency.
We focus on encoder and decoder-induced overhead. In \cite{Thibault2008, Silva2009a, Li2011a, liye2012, Tang2012, Mahdaviani2012}, GNC codes with \textit{generation-by-generation} (G-by-G) decoding are designed. The G-by-G decoder decodes within generations and decoded packets are subtracted from the received packets of other generations that overlap with the decoded generations. G-by-G decoding can result in a high decoder-induced overhead.
In this paper, we design GNC codes for moderate size $M$ that have low code overhead and a decoder with zero decoder-induced overhead. Moderate refers to when $M$ is of the order of $100\mathrm{s}$-$1000\mathrm{s}$, e.g., as seen in streaming media. We first propose a low-complexity overhead-optimized GNC decoder which succeeds as soon as $M$ linearly independent packets are received and hence has zero decoder-induced overhead. While overhead-optimized decoding has high decoding cost for large $M$, we show that for moderate $M$ it may bring considerable advantages. The proposed decoder, termed \textit{overlap-aware} (OA), exploits the sparseness of GNC codes
The OA decoding first processes received packets \textit{locally} within generations and then pivots the \textit{global} sparse linear system to lower the computational cost. While pivoting has been employed in the decoding of sparse erasure-correction codes such as LDPC \cite{Burshtein2004, Pishro-Nik2004, Paolini2012} and raptor codes \cite{ShokrollahiLuby09}, its application to decode GNC codes has yet to be investigated. A crucial aspect of GNC is that GNC-coded packets mix with others from the same generation. Hence, local processing and multiple rounds of pivoting are needed for efficient decoding.
For the proposed OA decoder, we propose a GNC code that features binary precoding \cite{Shokrollahi2006}\cite{Maymounkov2002}, random overlapping generations \cite{Li2011a}, and binary RLNC. Precoding and overlapping both reduce code overhead. We show that the proposed code can achieve close-to-zero code overhead and efficient OA decoding.
Similar types of overhead-optimized decoding of GNC codes have been considered previously. In \cite{Heidarzadeh2010, Heidarzadeh2011, Fiandrotti2014, Heide2014}, GNC based on banded matrices are designed. Each band of the decoding matrix corresponds to a generation. The decoding therein uses straightforward GE, which preserves the banded structure during row reductions and therefore has a low decoding cost.
Our work improves upon \cite{Heidarzadeh2010, Heidarzadeh2011, Fiandrotti2014, Heide2014} in several major ways. First, the proposed OA decoder has low complexity for GNC codes with more general overlapping patterns while the straightforward GE decoder in \cite{Heidarzadeh2010, Heidarzadeh2011, Fiandrotti2014, Heide2014} only applies to GNC codes with banded decoding matrices. To achieve close-to-zero overhead, GNC codes with random overlap may be more desirable as we will show. Second, the proposed design creates sparser codes due to the combined use of precoding and random overlap, resulting in lowered computational costs, while no precoding is used in \cite{Heidarzadeh2010, Heidarzadeh2011, Fiandrotti2014, Heide2014}.
The rest of the paper is organized as follows: Section \ref{model} presents the structure of generation-based network codes. We review existing decoders and propose the OA decoder for GNC codes in Section \ref{decoder_desp}. Section \ref{design} presents the code design, its OA decoding, and performance analysis. In Section \ref{section: evaluation}, we evaluate our design by simulation. The conclusion is given in Section \ref{summary}.
\section{Model: Generation-based Network Coding}\label{model}
Consider that $M$ source packets, $\mathcal{S}=\{\mathbf{s}_i,1\leq i\leq M\}$, are to be sent to destination nodes over a network that contains intermediate nodes. Links are lossy and are modeled as erasure channels. Each source packet consists of $K$ source symbols from a finite field $\mathbb{F}_q$, where $q$ is the finite field size. Each $\mathbf{s}_i$ is a $K$-length row vector on $\mathbf{F}_q$. A set of $L$ generations $\mathcal{G}=\{\mathcal{G}_1,\ldots,\mathcal{G}_L\}$ are constructed from the $M$ source packets. Each generation $\mathcal{G}_l=\left\{\mathbf{s}_1^{(l)},\ldots,\mathbf{s}_{G_l}^{(l)}\right\}, l=1,\ldots, L$, is a subset of source packets of size $G_l=|\mathcal{G}_l|$, where $\mathbf{s}_j^{(l)}=\mathbf{s}_i$ for some $1\leq i\leq M$ for each $j=1,\ldots, G_l$. We assume that $\cup_{l=1}^L\mathcal{G}_l=\mathcal{S}$, i.e., each source packet is present in at least one generation. A one-to-one index mapping $f_l(\cdot): j\rightarrow i$ indicates that the $i$-th source packet is selected as the $j$-th packet in $\mathcal{G}_l$. The source packet indices in $\mathcal{G}_l$ are stored as the set $\mathcal{I}_l=\left\{f_l(1),f_l(2),\ldots, f_l(G_l)\right\}$. $\mathcal{G}$ is said to be \textit{disjoint} if $\mathcal{I}_i\cap \mathcal{I}_j=\emptyset, \forall i\neq j$ or else \textit{overlapping}, and is of \textit{equal-size} if $G_i=G_j, \forall i, j$ or else of \textit{unequal-size}. For overlapping $\mathcal{G}$, $\sum_{l=1}^LG_l>M$. We assume that the index mappings are made known to the destination nodes.
A GNC code is defined on $\mathcal{G}$ as follows: for each transmission from the source node, a coded packet is generated as a random linear combination of source packets in a randomly chosen generation; coefficients are chosen from $\mathbb{F}_q$. Let $\mathcal{P}=\{p_1,p_2\ldots,p_L\}$ be the set of probabilities where $p_l$ denotes the probability that generation $\mathcal{G}_l$ is chosen when generating a packet, $1\leq l\leq L$. The GNC code is then characterized by $(\mathcal{G},\mathcal{P},q)$. The GNC codes are \textit{rateless}, meaning that a potentially unlimited number of coded packets may be generated. The source node is informed to stop transmission only after the destinations have recovered all of the source packets.
At intermediate nodes, packets are re-encoded from previously received packets of a chosen generation. Re-encoded packets are assumed to be random linear combinations of the received packets. The procedure for choosing the generation to re-encode for the next transmission is called \textit{scheduling}. Different scheduling strategies may be used, such as random scheduling \cite{Maymounkov2006}, \cite{Li2011a} and maximum local potential innovativeness scheduling \cite{liye2013}.
At a destination, received packets of $\mathcal{G}_l,l=1,\ldots,L$ are in the form of $\mathbf{r}^{(l)}=\sum_{i=1}^{G_l}g_i^{(l)}\mathbf{s}_i^{(l)}$, where $g_i^{(l)}$ is an encoding coefficient from $\mathbf{F}_q$. We refer to $\mathbf{g}^{(l)}=[g_1^{(l)},g_2^{(l)},\ldots,g_{G_l}^{(l)}]$ as a \textit{generation encoding vector} (GEV) of $\mathcal{G}_l$. The GEV is delivered in the header of each coded packet. Each GEV can be transformed to a length-$M$ \textit{encoding vector} (EV), denoted as $\mathbf{g}$, in which elements $g_{f_l(j)}=g_j^{(l)}$ for $j=1,\ldots,G_l$ and the rest of the $M-G_l$ elements are zero.
Decoding of GNC codes is performed by solving linear systems of equations. We refer to a received packet whose EV is not in the span of EVs of the previously received packets of the destination node as an \textit{innovative packet} and the EV is referred to as an \textit{innovative EV}. The receiver has to receive $M$ innovative EVs to recover all the source packets.
Let $N'$ be the number of randomly encoded packets that contain $M$ linearly independent EVs among them. We define $\varepsilon_c=(N'-M)/M$ as the \textit{code overhead}. Let $N''$ denote the number of received packets among which $M$ innovative packets can be obtained in a transmission session. We refer to $\varepsilon_{cn}=(N''-M)/M$ as the \textit{code-and-network-induced overhead}. This overhead may be caused by either the encoding at the source node or scheduling and re-encoding at intermediate nodes, or both. Supposing that the decoding succeeds after receiving $N\geq N''$ packets, $\varepsilon_d=(N-N'')/M$ is referred to as the \textit{decoder-induced overhead}. Zero decoder-induced overhead is achieved if the decoder succeeds immediately once $M$ innovative packets are received. The overall reception overhead of the session is $\varepsilon=(N-M)/M=\varepsilon_{cn}+\varepsilon_d$. Note that transmission losses (packet erasures) are not counted in the overheads defined so far.
The \textit{decoding cost} of GNC codes is measured as the number of finite field arithmetic operations required for successful decoding, where an \textit{operation} refers to either a divide or a multiply-and-add between two elements of a finite field.
\section{Decoding Algorithms of GNC Codes}\label{decoder_desp}
We first introduce the G-by-G decoder and identify its decoder-induced overhead. A baseline approach and the OA decoder are then proposed to improve efficiency.
\subsection{G-by-G Decoder}
\begin{definition*}[G-by-G Decoding]
At the beginning of each \textit{step}, the decoder attempts to select a generation $\mathcal{G}_l, 1\leq l\leq L$ and decode it by solving a system of linear equations using Gaussian elimination. Denote successive rows of GEVs and information symbols of received coded packets belonging to $\mathcal{G}_l$, as $\mathbf{A}_l$ and $\mathbf{B}_l$, respectively. Decoding solves $\mathbf{A}_l\mathbf{X}_l=\mathbf{B}_l$, where rows of $\mathbf{X}_l$ are the to-be-decoded source packets in $\mathcal{G}_l$. A generation $\mathcal{G}_l$ whose $\mathbf{A}_l$ is full-rank is called \textit{separately decodable}. When a generation is decoded, decoded source packets are subtracted from the received packets of remaining undecoded generations which contain the decoded packets. This marks the end of one decoding step. Since the subtraction may reduce the numbers of unknown packets of other generations, new separately decodable generations may be found. If this is the case, the next decoding step can begin; if no such generations can be found, the decoder waits until more packets are received such that a new separately decodable generation is found. Decoding proceeds as above until all generations are decoded.
\end{definition*}
The following example illustrates that G-by-G decoding has decoder-induced overhead.
\begin{example}[Inefficiency of G-by-G decoding]\label{nonzero_decoder_overhead_example}
Assume that $4$ source packets are grouped into two generations $\mathcal{G}_1=\{\mathbf{s}_1,\mathbf{s}_2, \mathbf{s}_3\}$ and $\mathcal{G}_2=\{\mathbf{s}_2,\mathbf{s}_3, \mathbf{s}_4\}$. Suppose that $2$ packets have been received for each generation, written as $\mathbf{r}_1^{(1)}=\mathbf{s}_1+\mathbf{s}_2$, $\mathbf{r}_2^{(1)}=\mathbf{s}_2+\mathbf{s}_3$ and $\mathbf{r}_1^{(2)}=\mathbf{s}_2+\mathbf{s}_4$, $\mathbf{r}_2^{(2)}=\mathbf{s}_2+\mathbf{s}_3+\mathbf{s}_4$, respectively. In this case, $\mathbf{r}_1^{(1)}$, $\mathbf{r}_2^{(1)}$, $\mathbf{r}_1^{(2)}$ and $\mathbf{r}_2^{(2)}$ are linearly independent. However, neither generation is separately decodable and the G-by-G decoding process cannot start.
\end{example}
\subsection{Straightforward Overhead-Optimized Decoding}
The inefficiency of G-by-G decoding arises from separate decoding of each generation and that possible overlaps among generations are not exploited until a generation has been separately decoded. To resolve the issue, a straightforward overhead-optimized approach may be used by solving $\mathbf{A}\mathbf{X}=\mathbf{B}$ using GE where successive rows of $\mathbf{A}$ and $\mathbf{B}$ are the EVs and information symbols of the received coded packets, respectively, and $\mathbf{X}$ contains all the $M$ source packets. In this case, decoding is successful as soon as $M$ innovative packets are received, resulting in zero decoder-induced overhead. We refer to this as the \textit{naive decoder}. Unfortunately, the naive decoder does not take EV sparsity into account, and therefore the decoding cost may be high.
\subsection{Overlap-Aware Decoder}
We now propose an \textit{overlap-aware} (OA) overhead-optimized decoder for GNC codes with the same overhead as the naive decoder but at a lower computational cost. By being overlap aware, the OA decoder is better able to exploit overlaps among generations.
OA decoding is first performed \textit{locally} in each generation. Let $\mathbf{A}_l$ denote the decoding matrix of $\mathcal{G}_l,l=1,\ldots, L$ which is initialized as a $G_l\times G_l$ zero matrix; $\mathbf{A}_l$ is referred to as the \textit{local decoding matrix} (LDM) of $\mathcal{G}_l$. Forward row operations are performed on the successively received GEVs. Each newly received GEV, if it is not zero after being processed against previously received GEVs, is referred to as an \textit{innovative GEV} of $\mathcal{G}_l$. The vector is stored as the $i$-th row of $\mathbf{A}_l$ if its $i$-th element is the left-most nonzero. Note that an innovative GEV may not be an innovative EV. We declare the decoder as \textit{OA ready} when a total of $M$ innovative GEVs have been received.
When OA ready, the decoder attempts to \textit{jointly} decode generations. Each $\mathbf{A}_l,l=1,\ldots,L$ is \textit{partially diagonalized} by eliminating elements above nonzero diagonal elements, rendering $\mathbf{A}_l$ sparser. The $M$ innovative GEVs are then converted to EVs to populate an $M\times M$ \textit{global decoding matrix} (GDM) $\mathbf{A}$.
Two properties of $\mathbf{A}$ are noted. First, in each length-$M$ row of $\mathbf{A}$ there are at most $\max\{G_l,\forall l\}$ nonzero elements. Since $\max\{G_l\}\ll M$, $\mathbf{A}$ tends to be sparse. Second, if any generation is already separately decodable, its LDM has been fully diagonalized, resulting in some \textit{singleton} rows in $\mathbf{A}$, i.e., rows containing only one nonzero element. The joint decoding aims to transform $\mathbf{A}$ to an identity matrix. Exploiting its sparseness, we pivot $\mathbf{A}$ to minimize the computational cost.
\subsection{Pivoting $\mathbf{A}$ in OA Decoding}\label{solve_sparse}
Pivoting reorders rows and columns of a sparse matrix such that the computational cost of row reductions can be reduced. Finding the globally optimal pivoting sequence that minimizes the computational cost is known to be an \textit{NP-complete} problem \cite{Rose1978}. Here we only consider local heuristic methods. We propose the following method that employs two rounds of pivoting:
\subsubsection{First Round}
We pivot $\mathbf{A}$ using an \textit{inactivation} approach \cite{Odlyzko1985}, \cite{Pomerance1992}, as is employed in decoding standardized raptor codes \cite{ShokrollahiLuby09}. The reordered matrix after pivoting consists of a lower triangular (\textit{active part}) and some other dense ``inactive'' columns (\textit{inactive part}), as shown in the left of Fig. \ref{inactivation} where $\mathbf{0}$ refers to areas consisting of only zero elements. The time complexity of inactivation pivoting is $\mathcal{O}(n)$ for an $n\times n$ matrix. The lower triangular part will then be diagonalized, and we refer to the sub-matrices of the inactive part of $\mathbf{A}$ as $\mathbf{U}_I$ and $\mathbf{T}_I$, respectively. The number of inactivated columns is denoted as $M_I$.
\begin{figure}[htbp]
\centerline{\includegraphics[width=2.5in]{Figures/inactivation.pdf}}
\caption{\label{inactivation}Reordering and partial diagonalization of $\mathbf{A}$ using inactivation pivoting.}
\end{figure}
\subsubsection{Second Round}
The $\mathbf{T}_I$ of Fig. \ref{inactivation} becomes dense due to row reductions to diagonalize the active part of $\mathbf{A}$. However, the structure of GNC codes is such that the nonzero elements in the inactive part might not be uniformly located, and $\mathbf{T}_I$ may still be sparse. We perform another round of pivoting on $\mathbf{T}_I$ to exploit its sparsity.
The second round uses a modified \textit{Markowitz criterion} due to Zlatev \cite{Zlatev1980}. The original Markowitz criterion \cite{Duff1986} selects a nonzero $\mathbf{T}_I[i][j]$ as the pivot if it has the smallest \textit{Markowitz count} of the matrix, defined as $(r_i-1)(c_j-1)$, where $r_i$ and $c_j$ are the number of nonzero elements on the corresponding row and column, respectively. Instead of searching $n-i+1$ rows for the $i$-th pivot, Zlatev pivoting searches only from a constant number ($\leq 3$) of rows with the least number of nonzero entries. Therefore, the time complexity of Zlatev pivoting is also $O(n)$ for an $n\times n$ matrix while that of the original Markowitz criterion is $\mathcal{O}(n^2)$.
After the second round of pivoting, we first perform forward row operations on the reordered $M_I\times M_I$ matrix $\mathbf{T}_I$. If the $M$ innovative GEVs that populated GDM $\mathbf{A}$ are all innovative EVs, $\mathbf{T}_I$ is full-rank. The resulting upper triangular $\mathbf{T}_I$ can then be reduced to an identity matrix. This solves $M_I$ source packets. Further eliminating $\mathbf{U}_I$ by subtracting the $M_I$ decoded packets will recover the rest of the source packets. If some innovative GEVs are not innovative EVs, the $\mathbf{T}_I$ after row operations would be an upper triangular matrix containing zero diagonal elements in some rows. In this case, more coded packets need to be received and processed to fill in the rows before reducing $\mathbf{T}_I$ to an identity matrix.
\subsection{OA Decoder-Induced Overhead}\label{oaoh}
Only one or zero innovative EV may be generated from an innovative GEV. Suppose that $M$ innovative EVs are received, the decoder must be OA ready. With $M$ innovative EVs, the constructed $\mathbf{A}$ is full-rank. Since pivoting does not change the matrix rank, OA decoding is guaranteed to succeed and therefore has zero decoder-induced overhead.
\section{Code Design and OA Decoding}\label{design}
\subsection{Code Description}\label{code_description}
We present a code design based on the \textit{random annex code} (RAC), originally proposed in \cite{Li2011a} for the G-by-G decoder. The design of code parameters for the OA decoder, however, differs significantly from that for the G-by-G decoder.
\begin{definition*}[Random Annex Code \cite{Li2011a}]
The $M$ source packets, $\mathcal{S}=\{\mathbf{s}_1,\ldots,\mathbf{s}_M\}$, are first partitioned into $L$ disjoint subsets $\mathcal{B}_l=\{\mathbf{s}_{(l-1)B+1},\ldots,\mathbf{s}_{lB}\},l=1,\ldots,L$ of equal size $B$ (we assume $M=LB$, i.e., $L$ to be a divisor of $M$; otherwise null packets can be used for padding), one per generation. $\mathcal{B}_l$ is referred to as the \textit{base part} of the generation. After that, each generation $\mathcal{G}_l$ is equipped with a random \textit{annex} of size $H$, denoted as $\mathcal{H}_l$, which consists of a random selection of $H$ packets from $\mathcal{S}-\mathcal{B}_l$. The annex code introduces overlap between generations. The overall generation $\mathcal{G}_l=\mathcal{B}_l\cup\mathcal{H}_l$ and $G=|\mathcal{G}_l|=B+H$. When generating a coded packet, one generation is chosen uniformly at random.
\end{definition*}
The proposed design has two customizations relative to the original RAC: 1) \textit{precoded} source packets using a binary systematic erasure-correction code and 2) only the binary field, $\mathbb{F}_2$ is used when coding a packet. The proposed design is referred to as the \textit{precoded binary RAC} (PB-RAC).
\begin{definition*}[Precoded Binary Random Annex Code]
The $M$ source packets are first precoded using a binary systematic code to obtain $M+S$ \textit{intermediate packets}, $\{\mathbf{s}_1, \ldots, \mathbf{s}_M, \mathbf{c}_1, \ldots, \mathbf{c}_S\}$, where $\mathbf{c}_i=\sum_{j=1}^Mw_{i,j}\mathbf{s}_j, i=1,\ldots,S$ are parity-check packets, the $w_{i,j}$ are chosen from $\mathbb{F}_2$ and $S=\theta M$. We assume that each source packet is covered by at least one parity-check packet. RAC is then applied to the intermediate packets and a total of $L'=\frac{M+S}{B}$ generations are formed from the intermediate packets with base part size $B$ and generation size $G$.
\end{definition*}
\subsection{OA Decoding of PB-RAC}
The addition of a precode is inspired by the improvements obtained by adding a precode to the Luby transform (LT) code to form raptor codes \cite{Shokrollahi2006}. As with raptor codes, we assume that the PB-RAC precoding coefficients are known to all the receivers of the transmission. The precode codes across the source packets of all generations before RAC coding is performed. This helps to alleviate the coupon collector problem characterized in \cite{Li2011a}. With a systematic precode, we show below that the OA decoder efficiently affects joint decoding of the precode and RAC.
Unlike successively-decoded network codes and precodes in previous works (e.g., in \cite{Tang2012}, the decoder needs to recover a pre-defined fraction of intermediate packets before decoding of the precode can begin), OA joint decoding begins the pivoting by appending the parity-check matrix of the precode to the GDM of the network code and performing pivoting on the combined matrix. Given a valid precode, joint decoding guarantees successful decoding when $M$ innovative EVs are received.
Since RAC is applied to $M+S$ intermediate packets in PB-RAC, $\mathbf{A}$ has $M+S$ columns rather than $M$ as in the non-precoded case. The $S$ parity-check constraint equations of the precode, i.e., $\sum_{j=1}^M w_{i,j}\mathbf{s}_j+\mathbf{c}_i=0$ for $i=1,2,\ldots, S$, are then appended to $\mathbf{A}$: Let $\mathbf{H}=\left[\begin{array}{cc}\mathbf{W} & \mathbf{I}_{S\times S}\end{array}\right]$, where elements $w_{i,j}$ of $\mathbf{W}$, $1\leq i\leq S$, $1\leq j\leq M$ are coding coefficients of the systematic precode and $\mathbf{I}_{S\times S}$ is the size-$S$ identity matrix. We therefore have
\begin{equation}
\left[\begin{array}{c}\mathbf{A}\\ \mathbf{H}\end{array}\right]\left[\begin{array}{cccccc}\mathbf{s}_1^T & \cdots & \mathbf{s}_M^T & \mathbf{c}_1^T & \cdots & \mathbf{c}_S^T\end{array}\right]^T=\left[\begin{array}{c}\mathbf{B}\\ \mathbf{0}_{S\times K}\end{array}\right],
\end{equation}
where $[\cdot]^T$ denotes transpose and $\mathbf{0}_{S\times K}$ is the $S\times K$ zero matrix. Pivoting is performed on the binary $(M+S)\times(M+S)$ matrix $\mathbf{A}_{\text{eff}}=\left[\begin{array}{cc}\mathbf{A}^T & \mathbf{H}^T\end{array}\right]^T$. If the $M$ innovative GEVs are all innovative EVs, a full-rank $\mathbf{A}_{\text{eff}}$ can be obtained with high probability when a valid precode is used.
\subsection{Choosing Parameters for PB-RAC}\label{PB-RAC_analysis}
In this subsection we choose code parameters for PB-RAC. First, we analytically show that precoding (i.e., $S>0$) and/or allowing for overlap (i.e., generation size $G>B$) help reduce code overhead, which is inversely proportional to the probability that innovative coded packets are received.
Let $p_k$ be the probability that the next received coded packet is innovative for the receiver when $k<M$ coded packets have been received. Let $\mathrm{Pr}(n_1,\ldots,n_{L'};k)$ denote the probability of any combination of $n_1,\ldots,n_{L'}$ received packets satisfying $\sum_{l=1}^{L'}n_l=k$ where $n_l\geq 0$ is the number of received packets belonging to the $l$-th generation among the $L'=\frac{M+S}{L/M}=\frac{M+S}{B}$ generations. We assume that packets belonging to each generation arrive at the receiver with equal probability $\frac{1}{L'}$, which reflects that the generations are scheduled with equal likelihood. The above joint probability follows the multinomial distribution,
\begin{eqnarray}
\mathrm{Pr}(n_1,\ldots,n_{L'};k) &\triangleq& \mathrm{Pr}(\mathbf{n};k)\nonumber\\
&=& \frac{k!}{n_1!\cdots n_{L'}!}\left(\frac{1}{L'}\right)^{n_1}\cdots \left(\frac{1}{L'}\right)^{n_{L'}}\nonumber\\
&=& \frac{k!}{n_1!\cdots n_{L'}!}\left(\frac{1}{L'}\right)^{k}.
\end{eqnarray}
Considering the precoded but non-overlapping case first, i.e., $S>0, G=B$, to simplify the analysis, we assume that a sufficiently large finite field is used. Note that innovative GEVs are equivalent to innovative EVs in the non-overlapping case. When $k=\sum_{l=1}^{L'}n_l$ packets have been received, the next packet would be non-innovative only if it belongs to a generation that has at least $B$ received packets. Let $\mathcal{S}$ be the set of all $\mathbf{n}$'s with $\sum_{l=1}^{L'}n_l=k$ and $u(\mathbf{n};B)$ be the number of elements in $\mathbf{n}$ that are greater than or equal to $B$. For a given $\mathbf{n}\in\mathcal{S}$, $u(\mathbf{n};B)/L'$ is the probability of the next received packet being non-innovative. Hence,
\begin{eqnarray}\label{pk_precode}
p_k &=& 1-\frac{\sum_{\mathbf{n}\in\mathcal{S}}\mathrm{Pr}(\mathbf{n};k)u(\mathbf{n};B)}{L'}\nonumber\\
&=& 1-\frac{\displaystyle\sum_{\mathbf{n}\in\mathcal{S}} \frac{k!}{n_1!\cdots n_{L'}!}\left(\frac{1}{L'}\right)^{k} u(\mathbf{n};B) }{L'}.
\end{eqnarray}
Note that (\ref{pk_precode}) also applies to the non-precoded case, replacing $L'$ with $L$. Given that $L'>L$, $p_k$ of the precoded case is therefore greater than that of the non-precoded case, i.e., code overhead is reduced after precoding.
When we allow for overlap, i.e., $S>0, G>B$, we are not able to obtain an exact expression for $p_k$ (because an innovative GEV does not guarantee an innovative EV). However, we can lower bound it using (\ref{pk_precode}) because packets are encoded across more intermediate packets in the overlapping case, and therefore its $p_k$ is always greater than that of the precoded but non-overlapping case, i.e.,
\begin{equation}\label{pk_overlap_lower}
p_k>1-\frac{\displaystyle\sum_{\mathbf{n}\in\mathcal{S}} \frac{k!}{n_1!\cdots n_{L'}!}\left(\frac{1}{L'}\right)^{k} u(\mathbf{n};B) }{L'}.
\end{equation}
Similar to (\ref{pk_precode}), (\ref{pk_overlap_lower}) applies to $S=0$ as well. Therefore, allowing for overlap is capable of reducing code overhead in both the non-precoded and precoded cases. We note that $p_k$ for allowing overlap is upper bounded by
\begin{equation}\label{pk_overlap_upper}
p_k< 1-\frac{\displaystyle\sum_{\mathbf{n}\in\mathcal{S}} \frac{k!}{n_1!\cdots n_{L'}!}\left(\frac{1}{L'}\right)^{k} u(\mathbf{n};G) }{L'},
\end{equation}
where the right-hand side corresponds to the probability assuming that the first $G$ packets received by each generation are always innovative.
\begin{figure}[htbp]
\centerline{\includegraphics[width=4in]{Figures/pk_comparisons.pdf}}
\caption{\label{pk_comparisons}Comparisons of $p_k$ for $k\geq 30$ of various codes; $M=64$ and $B=16$.}
\end{figure}
A comparison of $p_k$'s for the different cases is shown in Fig. \ref{pk_comparisons} with (\ref{pk_precode}), (\ref{pk_overlap_upper}), and Monte Carlo simulation results plotted. The simulation uses $\mathbb{F}_{256}$ and each parity-check packet of the precode is a random linear combination of all the source packets. The simulations of the non-overlapping cases match the analysis accurately and that of using $S=16, G=20$ approaches the upper bound of (\ref{pk_overlap_upper}). Compared to the no-precode-no-overlap case, Fig. \ref{pk_comparisons} shows that increasing $S$ and/or $G$ results in higher $p_k$ and hence reduces code overhead\footnote{It is noted that $G$ cannot be increased without bound when designing RAC for the G-by-G decoder \cite{Li2011a}, \cite{liye2013}.}. However, we argue that increasing both $S$ and $G$ somewhat is preferable to increasing only one of them and can achieve a similar $p_k$. For example as shown in Fig. \ref{pk_comparisons}, using $S=16, G=20$ results in similar (even slightly higher) $p_k$ than using $S=32$ but no overlap. A mixed use better balances the matrix sparseness of $\mathbf{A}_{\text{eff}}=\left[\begin{array}{cc}\mathbf{A}^T & \mathbf{H}^T\end{array}\right]^T$, leading to fewer columns to inactivate and hence lower decoding cost as shown in Section \ref{section: evaluation}.
Our choices of $S$ and $G$ are as follows. For a given $M$, we use the same systematic LDPC precode as standard raptor codes \cite{Luby2007} (Section 5.4.2.3), which has a fixed efficient structure and is suitable for inactivation pivoting. The value of $S$ therein is the smallest prime number greater than or equal to $\lceil0.01M\rceil+X$ where $X$ is the smallest integer such that $X(X-1)\geq 2M$. To determine $G$, we first fix $B=32$ as it is demonstrated in \cite{Paramanathan2013} that generations of size $32$ yield acceptable GE decoding speed when performing RLNC over $\mathbb{F}_2$. Given $B$ and $S$, noting that $p_k$ with $G>B$ may approach the upper bound (\ref{pk_overlap_upper}) as shown in Fig. \ref{pk_comparisons}, $G$ is therefore chosen to satisfy the following criteria: when a total of $M$ packets are received where each packet may belong to any generation with equal probability, the probability of a generation receiving more than $G$ packets is sufficiently small (see below). As discussed above, the numbers of packets received by the generations follow a multinomial distribution. To simplify calculation of the probability, as an approximation, we may instead model the numbers of received packets of the generations as IID Poisson random variables with rate parameter $\tau=M/L'$ \cite{Mitzenmacher:2005:PCR:1076315}. Let $Y$ denote the number of received packets of a generation. We propose to find the smallest $G$ (in favor of sparseness) satisfying the criterion expressed as:
\begin{equation}
G_{\text{min}}=\inf \left\{G\in\mathbb{Z}^{+}: \mathrm{Pr}\{Y>G\}<\frac{1}{L'}\right\},
\end{equation}
where the inequality ensures that the expected number of generations that receives more than $G_{\text{min}}$ packets is less than one. $G_{\text{min}}$ can be found by an integer search starting from $G=B$.
\subsection{Number of Inactivated Columns}
From Fig. \ref{inactivation}, we see that the cost of OA decoding depends heavily on the number of inactivated columns $M_I$ because the $M_I\times M_I$ matrix $T_I$ needs to be reduced to an identity matrix using GE. In this subsection, we present a method to estimate the fraction of columns that would be inactivated when pivoting $\mathbf{A}_{\text{eff}}$ for a given set of parameters $\{M, S, B, G\}$. For ease of analysis, we make the following further assumptions: 1) a set of parameters $\{M, S, B, G\}$ is chosen so that the first $M$ received packets are linearly independent; 2) after uniformly randomly inactivating $\alpha M$ columns in $\mathbf{A}$, $\alpha\in(0,1)$, G-by-G decoding can successfully decode $(1-\delta)L'$ generations (or equivalently $M$ intermediate packets) with $M$ received packets, where $\delta\equiv\frac{\theta}{1+\theta}$, $\theta=S/M$.
The above assumptions ensure that $\mathbf{A}_{\text{eff}}$ can be pivoted successfully with a total of $M_I=(\alpha+\theta)M$ columns being inactivated (i.e., inactivating another $S=\theta M$ columns after appending the parity-check rows $\mathbf{H}$ to $\mathbf{A}$). Note that the rest of OA decoding only involves back substitutions on $\mathbf{A}_{\text{eff}}$ after the inactivated part is solved via GE. The whole OA decoding process can therefore be viewed as a combination of inactivation and G-by-G decoding.
The expected proportion of inactivated columns, $\alpha$, can be determined using an asymptotic analysis of G-by-G RAC decoding. In order to recover $(1-\delta)L'$ generations using the G-by-G decoder when no inactivation is introduced, the following inequality has to be satisfied for all $x\in[\delta,1]$:
\begin{equation}\label{iterative_governer}
\sum_{u=0}^{G-1}\eta_{u}\sum_{k=u}^{G-1}\left(\begin{array}{c}G-1\\ k\end{array}\right)(\lambda(x))^k(1-\lambda(x))^{G-1-k}<x,
\end{equation}
where $\eta_{u}$ is the probability that one generation has $u$ innovative packets received. The detailed derivation of (\ref{iterative_governer}) is provided in Appendix A where also $\lambda(x)$ is defined in (\ref{lambda_asym}).
Now if we inactivate $\alpha M$ packets in $L'$ generations, on average $\alpha M/L'$ packets per generation, then the G-by-G decoding only needs to ``decode'' $G'=G-\alpha M/L'$ packets from each generation (the ``decoded'' packets will be linear combinations of the inactivated packets of the generation). Therefore, we need to modify (\ref{iterative_governer}) by replacing $G$ with $G'$. The inequality needs to be satisfied for all $x\in[\delta,1-\alpha M/(M+S)]$.
Again, we model the number of received packets of each generation as independent and identically distributed (IID) Poisson variables with rate parameter $\tau=M/L'$. Therefore $\eta_u=\frac{\tau^u\mathrm{e}^{-\tau}}{u!}$ in (\ref{iterative_governer}). Let $f(M, S, B, G, \alpha)$ denote the modified left-hand side of (\ref{iterative_governer}) after replacing $G$ with $G'$. The required value of $\alpha$ is
\begin{equation}\label{ia_fraction_analysis}
\alpha^{\ast}=\inf\left\{\alpha:f(M, S, B, G, \alpha)<x,\ x\in[\delta,1-\alpha M/(M+S)]\right\}.
\end{equation}
We find $\alpha^{\ast}$ using one-dimensional exhaustive search starting from $\alpha=0$ with desired precision increment $\Delta\alpha$. In each search step, the inequality in (\ref{ia_fraction_analysis}) is tested by discretizing $x$ in $[\delta,1-\alpha M/(M+S)]$. The total number of inactivated columns is then $M_I=(\alpha^{\ast}+\theta)M$.
\section{Performance Evaluation}\label{section: evaluation}
We now evaluate the performance of our design. Throughout we use packets each containing $K=1600$ one-byte source symbols. Coding coefficients used for precoding and RLNC at the source or intermediate nodes are from $\mathbb{F}_2$ unless stated otherwise. We count the total number of operations on both sides of the linear system of equations in our developed software library \cite{libslnc}, denoted as $N_{\text{ops}}$. We use the \textit{average number of operations per symbol}, $\frac{N_{\text{ops}}}{MK}$, to compare decoding costs. Performance results are reported below based on averaging over $1000$ trials.
\subsection{Code and Decoder Performance}
We first evaluate the design in the scenario where the decoders operate on GNC-coded packets directly and therefore only code and decoder-induced overheads may be incurred. In Fig. \ref{Iterative_Naive_OA_decoders}, we compare the proposed OA decoder with the G-by-G and the naive decoders. We use non-precoded RAC for comparison. We show the overheads and decoding costs of RAC for different generation sizes. It is seen that the OA decoder has the same overhead as the naive decoder. For G-by-G decoding, the introduction of overlap initially alleviates the ``coupon collector problem" \cite{Li2011a} to efficiently reduce the overhead to $20\%$. Beyond this, the inherent limitation of G-by-G strategy increases the overhead. The overheads of the naive and OA decoders are due only to code overhead. The decoding cost of G-by-G decoder is the lowest and increases only slightly with generation size. The OA decoding cost is much lower than that of the naive decoder and is close to that of the G-by-G decoder.
\begin{figure}[htbp]
\centerline{\includegraphics[width=4in]{Figures/RAC_GF2_N1024_iter_naive_OA_decoders.pdf}}
\caption{\label{Iterative_Naive_OA_decoders}Comparison of G-by-G, naive and OA decoders for RAC with $M=1024$, $B=32$ and $L=32$.}
\end{figure}
Next we compare the proposed PB-RAC with the original RAC of \cite{Li2011a}, \textit{head-to-toe} (H2T) codes of \cite{Heidarzadeh2010}, \cite{Heidarzadeh2011}, \textit{windowed} codes of \cite{Heide2014}, and \textit{banded} codes of \cite{Fiandrotti2014}. The H2T codes have the same number of $L=M/B$ generations as RAC. The generations of H2T codes are overlapped consecutively rather than randomly. A windowed code can be viewed as a H2T code with $M$ generations. The banded code is similar to the windowed code except that it does not allow for wrap-around and therefore has only $M-G+1$ generations. The decoding matrices of banded codes are strictly banded while those of H2T and windowed codes are close to banded (except for the last few rows which wrap around). In Fig. \ref{H2T_RAC_PB-RAC}, we show the overheads and decoding costs of the four codes for different generation sizes. Note that the probability of sending coded packets from each generation of the banded code is not uniform as in \cite{Fiandrotti2014} while that of the other three codes are uniform. The decoding of H2T codes, windowed codes and banded codes utilize straightforward GE whereas the decoding of RAC and PB-RAC use the proposed OA decoder.
\begin{figure}[htbp]
\centerline{\includegraphics[width=4in]{Figures/H2T_Windowed_Banded_RAC_PB-RAC_N1024_GF2_comparison.pdf}}
\caption{\label{H2T_RAC_PB-RAC}Comparison of H2T from \cite{Heidarzadeh2010}, \cite{Heidarzadeh2011}, windowed codes from \cite{Heide2014}, banded codes from \cite{Fiandrotti2014}, RAC, and PB-RAC; $M=1024$ and $B=32$, $S=59$ for PB-RAC.}
\end{figure}
As generation size $G$ grows, overheads of all codes decrease. However, PB-RAC has much lower overhead than that of H2T and RAC, achieving less than $1\%$ at $G=41$ while RAC achieves this at $G=58$ and H2T at $G>64$. It is important to note that overheads of H2T decrease more slowly when approaching zero than that of RAC, which is a major justification for our choice of RAC for design. The decoding costs of achieving $1\%$ overheads for PB-RAC, RAC and H2T are $35$, $50$, and $60$ operations per symbol, respectively. A significant improvement in both overhead and decoding cost is obtained using PB-RAC. It is interesting to note that windowed and banded codes have very similar code overheads to that of PB-RAC even though no precoding is used. The windowed and banded code achieve $1\%$ overhead at $G=45$ and $G=61$, respectively, and both require about $47$ operations per symbol to decode. However, subsequent results show that the two codes might not be suitable for use in networks where intermediate nodes need to re-encode packets on-the-fly during transmission.
We have noted that OA decoding costs of RAC and PB-RAC increase quickly with generation size, while those of H2T, windowed and banded codes are much flatter. This is expected since the decoding matrices of RAC and PB-RAC, being less structured, require more decoding operations to decode even though OA decoding has been used to exploit sparseness. Nevertheless, since the overheads of H2T, windowed and banded codes decrease more slowly as the generation size increases, to achieve the same low level of overhead PB-RAC with OA decoding requires fewer operations because the required code can be much sparser.
In Table \ref{achieve_1_percent_ohs} we show decoding performances of four PB-RAC's that result in about $1\%$ overhead, where $S$ denotes the number of parity-check packets added by the precode and $S=0$ corresponds to the non-precoded case (i.e., original RAC). The trade-off between $S$ and $G$ and a suitable choice of $S$ and $G$ yielding the least number of inactivated columns and, as a consequence, the least cost, are demonstrated.
\begin{table}[h]
\begin{center}
\begin{tabular}{|c|c|c|c|c|}
\hline
$S$ & $G$ & $\varepsilon$ & $\frac{N_{\text{ops}}}{MK}$ & $M_I$\\
\hline
0 & 58 & 0.92\% & 50 & 127\\
\hline
\textbf{59} & \textbf{41} & \textbf{0.74\%} & \textbf{35} & \textbf{80}\\
\hline
101 & 39 & 0.70\% & 38 & 100\\
\hline
149 & 37 & 0.95\% & 39 & 112\\
\hline
\end{tabular}
\end{center}
\caption{Comparison of decoding cost $\frac{N_{\text{ops}}}{MK}$ and number of inactivated columns $M_I$ of PB-RACs achieving $\varepsilon=1\%$ with different $S$; $M=1024$, $B=32$.}\label{achieve_1_percent_ohs}
\end{table}
\begin{table}
\begin{center}
\begin{tabular}{|c|c|c|c|c|}
\hline
$M$ & 1024 & 4096 & 7168 & 10240\\
\hline
\hline
$S$ & 59 & 137 & 193 & 251\\
\hline
$G_g$ & 42 & 43 & 44 & 44\\
\hline
$G_o$ & 41 & 45 & 47 & 48\\
\hline
\end{tabular}
\end{center}
\caption{Parameters of PB-RAC codes for various numbers of source packets $M$.}\label{PB-RAC_parameters_table}
\end{table}
We show the performances of PB-RAC for various $M$'s in Fig. \ref{PB-RAC_various_M}, where the code parameters are determined according to Section \ref{PB-RAC_analysis}. The results are compared with two other schemes: One applies G-by-G decoding on another set of PB-RAC codes with the same $B$ and $S$ but $G$ is chosen to minimize the overhead (see Fig. \ref{Iterative_Naive_OA_decoders}). The other one is P256-RAC whose coding parameters are the same as the designed PB-RAC but nonzero precode coefficients are from $\mathbb{F}_{256}-\{0\}$ and RLNC are performed in $\mathbb{F}_{256}$. We also perform OA decoding on P256-RAC. Selected coded parameters are presented in Table \ref{PB-RAC_parameters_table} where $G_g$'s and $G_o$'s are $G$ for when G-by-G and OA decoding are used, respectively. From Fig. \ref{PB-RAC_various_M}, we see that two codes achieve almost zero overhead whereas PB-RAC with G-by-G decoding has more than $12\%$ overhead. The difference in overhead by using $\mathbb{F}_2$ versus $\mathbb{F}_{256}$ is slight. We compare the decoding speed of the three schemes which is defined as the amount of data (i.e., $MK$ bytes) divided by the total CPU time needed to completely decode all the $M$ packets. The comparison (compiled with \texttt{-O3} using \texttt{gcc}) is conducted on a 2.66 GHz quad-core Intel Core 2 CPU with 4 GB RAM. The implementation is not carefully optimized and the speeds are for rough comparison. The decoding speed of G-by-G decoding is the highest and it does not decrease much as $M$ grows. The OA decoding speed is much lower and decreases rapidly as $M$ grows, suggesting that OA decoding may not be practically feasible for larger $M$; however, as $\mathbb{F}_2$ arithmetic is readily implemented in digital logic, custom hardware may be an attractive solution. The OA decoding speed of PB-RAC is considerably higher than that of P256-RAC. The OA decoding speed of PB-RAC at $M=10240$ is $3$ MB/s.
\begin{figure}[htbp]
\centerline{\includegraphics[width=4in]{Figures/PB_RAC_ohs_speed.pdf}}
\caption{\label{PB-RAC_various_M}Performances of PB-RAC codes for various numbers of source packets, $M$.}
\end{figure}
\begin{figure}[htbp]
\centerline{\includegraphics[width=4in]{Figures/inactivated_fractions.pdf}}
\caption{\label{inactivated_fractions}Inactivated columns in OA decoding of PB-RAC.}
\end{figure}
Fig. \ref{inactivated_fractions} compares the fraction of inactivated columns in OA decoding, $\frac{M_I}{M}$. The gap between P256-RAC and PB-RAC demonstrates the benefit of using $\mathbb{F}_2$: the number of inactivated columns can be reduced by half. This is because PB-RAC is much sparser with about half of its coding coefficients being zero. The analysis result ($\Delta\alpha=0.001$ when solving (\ref{ia_fraction_analysis})) which assumed sufficiently large finite field size closely matches the simulation results of P256-RAC for large $M$. For smaller $M$, it is less accurate because the analysis in Appendix A assumes sufficiently large $M$.
\subsection{Network Performance}
In this subsection we evaluate the performance of PB-RAC in the well-known lossy butterfly network \cite{Ahlswede2000}. The erasure rates of the links are set equally to $p_e=0.1$. The max-flow capacity of the network is $1.8$ packets per network use, where each \textit{network use} corresponds to both the source and intermediate nodes each sending a packet.
Fig. \ref{H2T_Windowed_Banded_PB-RAC_various_M_butterfly} shows the overheads and decoding costs when using H2T, windowed code, banded code and PB-RAC. We set $G=2\sqrt{M}$ for H2T, windowed and banded codes, as it is shown empirically in \cite{Studholme2010} that $2\sqrt{M}$ is the required width for a banded random matrix to have similar probabilistic rank properties as a dense random matrix. The parameters of PB-RAC are the same as in Fig. \ref{PB-RAC_various_M}. Each intermediate node performs random scheduling \cite{Maymounkov2006} and re-encodes packets using random coefficients from $\mathbb{F}_2$. Straightforward GE is used for decoding H2T, windowed and banded codes. PB-RAC uses OA decoding.
\begin{figure}[htbp]
\centerline{\includegraphics[width=4in]{Figures/H2T_Windowed_Banded_PB-RAC_various_M_and_G_butterfly.pdf}}
\caption{\label{H2T_Windowed_Banded_PB-RAC_various_M_butterfly}Comparison of H2T ($B=32$), windowed code, banded code and PB-RAC over a lossy butterfly network \cite{Ahlswede2000} where all relay nodes perform random scheduling and re-encoding in $\mathbb{F}_2$; erasure rates of links are equally $p_e=0.1$.}
\end{figure}
Fig. \ref{H2T_Windowed_Banded_PB-RAC_various_M_butterfly} shows that PB-RAC and H2T have the same overhead. All the generation sizes $G$ of PB-RAC (see Table \ref{PB-RAC_parameters_table}) are smaller than $50$ whereas those of H2T are $2\sqrt{M}\geq 64$; hence, PB-RAC is much sparser. The overheads of the windowed and banded codes, however, are high. The reason is due to limited re-encoding opportunity: the two codes each have almost $M$ generations and therefore the number of buffered packets for each generation at the relays is far fewer than that of H2T or PB-RAC, each of which have $L\ll M$ generations. We note that measures can be taken at intermediate nodes to alleviate the issue \cite{Fiandrotti2014}, \cite{Heide2014}. For example, one can search for buffered packets from different generations so that a re-encoded packet is confined to a desired window/band; or one can perform decoding at intermediate nodes to obtain a re-encoded packet. Such measures, however, complicate intermediate node processing. Since PB-RAC is much sparser, its decoding cost is lower than those of H2T and windowed codes. The decoding cost of the banded code is lowest due to its strict banded structure.
It is seen from Fig. \ref{H2T_Windowed_Banded_PB-RAC_various_M_butterfly} that although the codes may have close-to zero code overhead and zero decoder-induced overhead (see Fig. \ref{PB-RAC_various_M}), the reception overhead over a network is nonzero because of scheduling and re-encoding at intermediate nodes. We remark that the performance may be improved by optimizing scheduling. In Fig. \ref{PB-RAC_butterfly_various_schedulings}, we show the performances of the same PB-RAC codes over the network where the MaLPI scheduling proposed in \cite{liye2013} is used at intermediate nodes. Unlike random scheduling, MaLPI chooses a generation that is \textit{least scheduled} based on the number of received packets of each generation. The overhead is reduced from $58\%$ to $38\%$. If we use $\mathbb{F}_{256}$ for re-encoding PB-RAC packets at intermediate nodes, the overheads can be further reduced to $14\%$, which correspond to the rate of about $1.57$ packets per network use (i.e., close to $90\%$ of the max-flow capacity). Note that re-encoding with $\mathbb{F}_{256}$ at intermediate nodes will change all network coding coefficients to $\mathbb{F}_{256}$, so the decoding cost will increase accordingly, as shown Fig. \ref{PB-RAC_butterfly_various_schedulings}.
\begin{figure}[h]
\centerline{\includegraphics[width=4in]{Figures/PB-RAC_butterfly_various_schedulings.pdf}}
\caption{\label{PB-RAC_butterfly_various_schedulings}Performance of PB-RAC with different scheduling strategies at relay nodes in butterfly network; $p_{e}=0.1$ for all links.}
\end{figure}
\section{Conclusion}\label{summary}
In this paper we proposed an OA decoder for GNC codes. It is shown that local processing and pivoting can be employed to exploit the sparseness of GNC codes. The decoder is shown to have the same overhead as straightforward GE decoder but with much lower computational cost. For moderate numbers of source packets, the decoding cost could approach that of the linear-time G-by-G decoder. A new code that combines precoding, random overlapping generations and binary RLNC is designed and decoded by the OA decoder. It is demonstrated that a balanced combination of precoding rate and generation overlap size is crucial to obtaining low decoding costs. For a given low overhead design goal, the proposed design using PB-RAC with OA decoding is shown to have the least decoding cost compared to existing schemes.
\appendices
\section{Analysis of G-by-G Decoding of Precoded RAC}
A precoded RAC with parameters $M$, $S$, $B$, $G$ can be viewed as a realization from an ensemble of bipartite graphs. The reader is referred to \cite{Luby1998, Richardson2001} for an exposition of the method used in this appendix. The left and right nodes of the bipartite graph correspond to intermediate packets and generations, respectively. An edge connects a pair of left and right nodes if the intermediate packet is present in the generation. The ensemble is characterized by the left-node degree distribution $\Psi(x)=\sum_{k=1}^{L'}\Psi_kx^{k}$ and the constant right-side edge degree $G$, where $L'=\frac{M+S}{B}$ and $\Psi_k$ denotes the fraction of left nodes that are of degree $k$, i.e., intermediate packets that are present in $k$ generations. According to the definition of RAC in Section \ref{code_description},
\begin{equation}\label{Psi_k}
\Psi_k=\left(\begin{array}{c}L'-1\\ k-1\end{array}\right)\left(\frac{G-B}{M+S-B}\right)^{k-1}\left(1-\frac{G-B}{M+S-B}\right)^{L'-k}.
\end{equation}
Applying (\ref{Psi_k}) to the definition of $\Psi(x)$,
\begin{eqnarray*}
\Psi(x) &=& \sum_{k=1}^{L'}\left(\begin{array}{c}L'-1\\ k-1\end{array}\right)\left(\frac{G-B}{M+S-B}\right)^{k-1}\left(1-\frac{G-B}{M+S-B}\right)^{L'-k}x^{k}\\
&=& x\sum_{k=0}^{L'-1}\left(\begin{array}{c}L'-1\\ k\end{array}\right)\left(\frac{G-B}{M+S-B}x\right)^{k}\left(1-\frac{G-B}{M+S-B}\right)^{L'-1-k}\\
&=& x\left[1-\frac{(G/B-1)(1-x)}{L'-1}\right]^{L'-1}\\
&\approx& x\mathrm{e}^{-(G/B-1)(1-x)},
\end{eqnarray*}
where the approximation $\lim_{m\rightarrow\infty}(1+1/m)^m=\mathrm{e}$ is used, which is accurate even when $L'$ is not very large (e.g. $100$).
Let $\lambda(x)=\sum_{k=1}^{L'}\lambda_{k}x^{k-1}$ denote the left-side edge degree distribution, where $\lambda_k$ denotes the probability that a randomly chosen edge of the bipartite graph is connected with a left node of degree $k$. We have $\lambda(x)=\Psi'(x)/\Psi'(1)$ where $\Psi'(x)$ is the derivative of $\Psi(x)$ with respect to $x$. For sufficiently large $M$ and $L'$, we have
\begin{equation}\label{lambda_asym}
\lambda(x) \approx \left(\frac{B}{G}+\left(1-\frac{B}{G}\right)x\right)\mathrm{e}^{-(G/B-1)(1-x)}.
\end{equation}
Suppose that each generation (i.e., right node) has received a number of linearly independent packets. The G-by-G decoding corresponds to the following process on the bipartite graph: initially, every node on the graph is labeled as \textit{unknown}, where we designate an edge as unknown if both of its end nodes are unknown, or \textit{known} if at least one of its end nodes is known. In each step, a right node is decoded by GE if it is \textit{full rank}, i.e., the number of its received linearly independent packets is larger than or equal to the number of its unknown adjacent edges. After decoding a right node, the decoder labels all adjacent edges of the decoded right node, its left neighbors, and edges adjacent to these neighbors as known. The decoding proceeds until no decodable right node can be found.
The and-or tree evaluation technique of \cite{Luby1998} can be used to characterize the above decoding process by randomly choosing one edge of the bipartite graph and expanding the graph from the right node of the edge to obtain a tree. $h$ steps of G-by-G decoding correspond to the evaluation from depth-$0$ of a tree of depth $2h$ as shown in Fig. \ref{tree}. Nodes at depths $2h-1$ and $2h-2$ are referred to as on level $h$.
\begin{figure}[h]
\centerline{\includegraphics[height=1.5in]{Figures/tree.pdf}}
\caption{\label{tree}Expanding the graph as a tree.}
\end{figure}
Let $y_h$ and $z_h$ denote the probabilities that a right and left node on level $h$ are evaluated as unknown (i.e., not decoded), respectively. Then
\begin{equation}
y_h=\sum_{u=0}^{G-1}\eta_{u}\sum_{k=u}^{G-1}\left(\begin{array}{c}G-1\\ k\end{array}\right)(z_h)^k(1-z_h)^{G-1-k},
\end{equation}
where $\eta_{u}$ denotes the probability that $u$ linearly independent packets are received by a right node. Since $z_h=\lambda_1+\sum_{k\geq 2}\lambda_ky_{h-1}^{k-1}=\lambda(y_{h-1})$ where $z_0=1$, we have
\begin{equation}
y_h=\sum_{u=0}^{G-1}\eta_{u}\sum_{k=u}^{G-1}\left(\begin{array}{c}G-1\\ k\end{array}\right)(\lambda(y_{h-1}))^k(1-\lambda(y_{h-1}))^{G-1-k},
\end{equation}
which expresses the probability that a right node is unknown after one step of G-by-G decoding as a function of the corresponding probability before the step.
We denote the probability that a generation is not decodable as $x$, $x\in[\delta,1]$ where $\delta=\lim_{h\rightarrow\infty}y_h$ stands for the smallest probability that the decoder can reach after going through all generations. We therefore require
\begin{equation*}
\sum_{u=0}^{G-1}\eta_{u}\sum_{k=u}^{G-1}\left(\begin{array}{c}G-1\\ k\end{array}\right)(\lambda(x))^k(1-\lambda(x))^{G-1-k}<x
\end{equation*}
for all $x\in[\delta,1]$ if we want at least a fraction $(1-\delta)$ of generations to be decoded, establishing (\ref{iterative_governer}). The inequality corresponds to the fact that the probability that a generation is not decodable is strictly decreasing.
\bibliographystyle{IEEEtran}
|
\section{Introduction}
In the literature on multicell multiple-input multiple-output (MIMO) precoding \cite{Gesbert2010}, the user utility is often modelled as the continuous Shannon rate, which describes the rate that can be achieved with vanishingly low error probabilities using long codewords. This is an optimistic model, which further assumes optimal decoders and modulation constellations with infinite granularity. Practical wireless communications systems typically have non of these however. Instead, these systems are often adhering to the bit-interleaved coded modulation (BICM) paradigm \cite[Ch.~7.4.1]{FundamentalsDigitalCommunication}, where the transmit rate is determined by the selection of a channel code and a modulation constellation size. The discrete combinations of codes and constellations are called the modulation and coding schemes (MCSs). Given a signal-to-interference-and-noise ratio (SINR) at the receiver, the highest discrete rate that achieves some acceptable block error rate is then used for the transmissions.
In this work, we consider the case of joint precoder design and discrete rate selection. We model the problem as a system-level optimization problem, where we aim to maximize the weighted sum rate while using minimal amount of power. Since the optimization problem is both combinatorial and non-convex, we first rewrite it using some discontinuous rate functions. These are then bounded by their concave envelopes, in some domain which can be selected by the system designer. After a linearization step, block coordinate descent \cite[Ch.~2.7]{NonlinearProgramming} is applied, resulting in a convergent algorithm which is distributed over the mobile stations. We evaluate our algorithm using numerical simulations. Compared to the state-of-the-art in continuous rate optimization, our algorithm performs well.
Existing work on joint beamforming and discrete rate selection is scarce, and limited to the multiple-input single-output (MISO) and single-input single-output (SISO) models. In \cite{Wai2013}, a convex approximation of the sum rate was proposed for the MISO case. Through a reweighting procedure, some gains over the state-of-the-art in continuous rate optimization was shown. In \cite{Cheng2015}, a mixed integer second order cone program (MISOCP) was formulated for the MISO case. The problem was mathematically reformulated to be applicable to the commercial branch-and-cut solver CPLEX, which numerically gave the optimal solution. Two heuristics, based on solving a sequence of SOCP problems, were also proposed. In \cite{Wolkerstorfer2013}, the problem was considered for a subcarrier-based SISO system, and an optimal branch-and-bound algorithm was proposed.
Contrary to the previous work, in this paper we consider the problem for the MIMO case. This is an interesting scenario, since it allows for more degrees of freedom in the optimization: both precoders at the transmitters and receive filters at the receivers should be optimized.
\section{System Model} \label{sec:system_model}
We consider a multicell network with $I$ base stations (BSs), collected in the set $\setI = \{ 1, 2, \ldots, I \}$. The $i$th BS serves the mobile stations (MSs) in the set $\setK_i = \{ 1, \ldots, K_i \}$ with data in the downlink. For brevity, we will denote the $k$th MS served by the $i$th BS as $i_k$. The channel between BS $j$ and MS $i_k$ is $\Hikj \in \complexnumbers^{N_{i_k} \times M_i}$. BS $i$ uses a linear precoder $\Vik \in \complexnumbers^{M_i \times d_{i_k}}$ to serve MS $i_k$ with $d_{i_k}$ data streams. At the receiving end, MS $i_k$ applies a linear receive filter $\Uik \in \complexnumbers^{N_{i_k} \times d_{i_k}}$ for interference rejection. The transmitted signal $\xik \in \complexnumbers^{d_{i_k}}$ has zero mean, unit per-stream power, and is i.i.d.\@ over the streams. We denote the $n$th column of $\Vik$ and $\Uik$ as $\vikn$ and $\uikn$, respectively, and assume single-stream decoding in the receivers. With the interfering broadcast channel as the multiuser interaction model, the received filtered signal for the $n$th stream at MS $i_k$ can thus be written as
\begin{align}
\hat{x}_{i_k,n} &= \uikn^\herm \Hiki \vikn \xikn \label{eq:received_filtered_signal} \\
&+ \uikn^\herm \hspace{-0.75em} \sum_{\substack{j \in \setI, l \in \setK_j\\m = 1,\ldots,d_{j_l}}} \hspace{-0.5em} \Hikj \vjlm \xjlm + \uikn^\herm \zik, \notag
\end{align}
where $\zik \sim \mathcal{CN} \left( 0, \sigma_{i_k}^2 \matI \right)$ is the thermal noise. The corresponding per-stream SINR is then given by \eqref{eq:per_stream_SINR}, at the top of next page.
The discrete rates that are available to MS $i_k$ are described by the set \mbox{$\setQ_{i_k} = \left\{ q_{i_k}^{(0)}, \ldots, q_{i_k}^{\left( \card{\setQ_{i_k}}-1 \right)} \right\} \subset \realnumbers^+$}, and we assume without loss of generality that \mbox{$0 = q_{i_k}^{(0)} < q_{i_k}^{(1)} < \ldots < q_{i_k}^{\left( \card{\setQ_{i_k}}-1 \right)} < \infty$}. We include the zero rate in order to ensure feasibility in the optimization problem to be formulated. Due to its inclusion, our optimization formulation will also perform implicit user selection. Different MSs may belong to different terminal classes, corresponding to the discrete rates that they can decode, and the sets $\{ \setQ_{i_k} \}_{i \in \setI, k \in \setK_i}$ need thus not be identical. Some examples of discrete rate sets are:
\begin{example}[Discrete rates in WiFi] \label{ex:wifi}
In the IEEE 802.11ac WiFi standard, code rates between $1/2$ and $5/6$ are combined with constellations ranging from BPSK to 256-QAM \cite{Bejarano2013}. This gives $\setQ = \{ 0, 0.5, 1, 1.5, 2, 3, 4, 4.5, 5, 6, 6.67 \}$ [bits/s/Hz].
\end{example}
\begin{example}[Discrete rates in cellular communication]
In the 3GPP LTE standard, code rates between $1/8$ to $4/5$ are combined with constellations ranging from QPSK to \mbox{64-QAM} \cite[Sec.~22.4.4.1]{LTEtheUMTSLongTermEvolution}. This gives $\setQ = \{ 0, 0.25, 0.4, 0.5$, $0.67, 1, 1.33, 1.5, 1.6, 2, 2.67, 3, 3.2, 4, 4.5, 4.8 \}$ [bits/s/Hz].
\end{example}
A discrete rate is achievable if the achieved SINR exceeds a pre-determined threshold:
\begin{definition}[Achievable discrete rate] \label{def:achievable_discrete_rate}
The discrete rate for the $n$th stream of MS $i_k$, $s_{i_k,n} \in \setQ_{i_k}$, is achievable if and only if the SINR for that stream satisfies
\begin{equation} \label{eq:SINR_constraint}
\textsf{SINR}_{i_k,n} \left(\uikn, \{ \Vjl \} \right) \geq \beta_{i_k} ( s_{i_k,n} ),
\end{equation}
where $\beta_{i_k} : \realnumbers^+ \rightarrow \realnumbers^+$ is a function that maps a discrete rate to its required minimum SINR.
\end{definition}
For a rate $q_{i_k}^{(p)} \in \setQ_{i_k}$, the required SINR $\beta_{i_k}(q_{i_k}^{(p)})$ is typically selected such that the corresponding block error rate (BLER) at the receiver is lower than some $\epsilon_{i_k}^{(p)} > 0$. An example is given by:
\begin{example}[Receiver with constant implementation margin] \label{ex:implementation_margin}
Given a BLER target of $\epsilon$, assume that the receiver needs a factor $\bar{\beta} \geq 1$ higher SINR than the theoretical minimum.\footnote{This is called the SINR gap approximation \cite[Ch.~9.2.2]{CooperativeCellularWirelessNetworks}.} The discrete rate then satisfies the following Shannon formula \mbox{$s = \log_2 (1 + \beta(s)/\bar{\beta} )$} and the corresponding minimum required SINR is $\beta(s) = \bar{\beta} (2^s - 1)$.
\end{example}
\begin{figure*}
\centering
\subfloat[MSE domain, $\eta(e) = e$]{\includegraphics[width=0.33\linewidth]{illustrations/approximations-MSE} \label{fig:illustrations/approximations-MSE}}
\subfloat[Continuous rate domain, $\eta(e) = \log_2(e)$]{\includegraphics[width=0.33\linewidth]{illustrations/approximations-rate} \label{fig:illustrations/approximations-rate}}
\subfloat[SINR domain, $\eta(e) = 1 - 1/e$]{\includegraphics[width=0.33\linewidth]{illustrations/approximations-SINR} \label{fig:illustrations/approximations-SINR}}
\caption{Discontinuous rate functions together with their concave envelopes in different QoS domains. Note the poor fit of the bound in (a), compared to the bounds in (b) and (c). The discrete rates were taken from Ex.~\ref{ex:wifi}, with required SINRs from Ex.~\ref{ex:implementation_margin} where $\bar{\beta} = 1$.} \label{fig:illustrations/approximations}
\end{figure*}
\vspace{-2ex}
\section{Joint Coordinated Precoding \\and Discrete Rate Selection}
Our goal is now to optimize the network utility, given the model for the discrete rates. We consider the weighted sum rate as the system-level objective\footnote{For each MS, we sum the discrete rates over all data streams.} function, where $\omega_{i_k} \in \realnumbers_+$ is the weight for MS $i_k$. Since excess power will increase the interference in the network, we maximize the weighted sum rate subject to a power regularization term:
\begin{align}
& \underset{\substack{\{ \Uik \}, \{ \Vik \}, \\ \{ s_{i_k,n} \}}}{\text{maximize}} & & \sum_{\substack{i \in \setI, k \in \setK_i\\n = 1,\ldots,d_{i_k}}} \hspace{-0.5em} \omega_{i_k} s_{i_k,n} - g_\kappa(\{ \Vjl \}) \notag \\
& \text{subject to} & & s_{i_k,n} \in \setQ_{i_k}, \quad \forall \, i_k, n \notag \\
& & & \textsf{SINR}_{i_k,n} \left(\uikn, \{ \Vjl \} \right) \geq \beta_{i_k} (s_{i_k,n}), \; \forall \, i_k, n \notag \\
& & & \sum_{k \in \setK_i} \Fnormsq{\Vik} \leq P_i, \quad \, \forall \, i \in \setI, \label{opt:original}
\end{align}
where $g_\kappa(\{ \Vjl \}) = \kappa \sum_{i \in \setI, k \in \setK_i} \Fnormsq{\Vik}$. The regularization parameter $\kappa$ is selected according to the following lemma, as inspired by Claim~1 in \cite{Matskani2008}:
\begin{lemma} \label{lemma:power_regularization}
Define $f(\{ s_{i_k,n} \}) = \sum_{\substack{i \in \setI, k \in \setK_i\\n = 1,\ldots,d_{i_k}}} \omega_{i_k} s_{i_k,n}$ and $\delta~=~\min_{\{ s_{i_k,n} \}, \{ \check{s}_{i_k} \}, \{ s_{i_k,n} \} \neq \{ \check{s}_{i_k,n} \}} \abs{f(\{ s_{i_k,n} \}) - f(\{ \check{s}_{i_k,n} \})}$. If $\kappa = \frac{\delta}{\sum_{i \in \setI} P_i + 1}$, the solution to the optimization problem in \eqref{opt:original} simultaneously gives the maximum weighted sum rate and the corresponding minimum sum power precoders.
\end{lemma}
\begin{IEEEproof}
Similar to the proof of \cite[Claim~1]{Matskani2008}.
\end{IEEEproof}
With this selection of $\kappa$, no loss in the objective due to selecting a smaller discrete rate for some MS can be made up for by the corresponding decrease in used power. Therefore, the optimization problem in \eqref{opt:original} simultaneously gives the maximum weighted sum rate and the corresponding minimum sum power precoders. This hinges on the facts that the weighted sum rate only takes on discrete values and that the sum power is bounded; see related discussion in \cite{Matskani2008}.
\vspace{-3ex}
\subsection{Problem Reformulation}
The optimization problem in \eqref{opt:original} is both combinatorial (due to the selection of the discrete rates) and non-concave (due to the non-concavity of $\textsf{SINR}_{i_k,n} \left(\uikn, \{ \Vjl \} \right)$). As posed, it is thus difficult to solve. We will therefore reformulate the problem into one with a discontinuous objective function, which we will then bound. After the reformulation and bounding, we will apply the ideas pioneered in \cite{Christensen2008,Shi2011} for the optimization. This entails linearizing the objective and applying block coordinate descent \cite[Ch.~2.7]{NonlinearProgramming}.
The first step in the reformulation is the introduction of the mean squared error (MSE) of the $n$th stream of MS $i_k$:
\begin{align}
e_{i_k,n}&(\uikn, \{ \Vjl \}) = \ex{\abssq{x_{i_k,n} - \hat{x}_{i_k,n}}} = \\
&1 - 2\real{\uikn^\herm \Hiki \vikn} + \uikn^\herm \Phiik \uikn, \notag
\end{align}
where the received signal covariance matrix for MS $i_k$ is \mbox{$\Phiik = \sum_{j \in \setI, l \in \setK_j} \Hikj \Vjl \Vjl^\herm \Hikj^\herm + \sigma_{i_k}^2 \matI$}. Assuming finite-power precoders, together with the unit-power symbols, we have that $ 0 < e_{i_k,n}(\uikn, \{ \Vjl \}) \leq 1, \, \forall \, i_k, n$.
Next, we rewrite the SINR constraint as a general quality of service (QoS) constraint, which is a function of the MSE.
\begin{definition}[QoS domain] \label{def:QoS_domain}
Let $\eta \! : \realnumbers_+ \rightarrow \realnumbers_+$ be a concave and strictly increasing function. It describes the mapping from the MSE domain to another \emph{QoS domain}.
\end{definition}
\begin{definition}[Discontinuous rate function] \label{def:discontinuous_rate_function}
Given a fixed receive filter $\uikn$, fixed precoders $\{ \Vjl \}_{j \in \setI, l \in \setK_j}$, and a QoS domain represented by $\eta(\cdot)$, the discrete rate for the $n$th stream of MS $i_k$ is given by the \emph{discontinuous rate function}
\begin{align}
g_\eta (&e_{i_k,n}(\uikn, \{ \Vjl \})) = \label{eq:discontinuous_rate_function} \\
&\begin{aligned}
& \underset{q \in \setQ_{i_k}}{\textnormal{maximize}} & & q \notag \\
& \textnormal{subject to} & & \eta \left( e_{i_k,n}(\uikn, \{ \Vjl \}) \right) \leq \eta \left( \frac{1}{1+\beta_{i_k}(q)} \right). \notag
\end{aligned}
\end{align}
\end{definition}
In the following, this discontinuous function will be bounded by a continuous function. By introducing $\eta(\cdot)$ into \eqref{eq:discontinuous_rate_function}, we get a degree of freedom in designing this bound.
Given Def.~\ref{def:discontinuous_rate_function}, we now reformulate the problem in \eqref{opt:original} as:
\begin{align}
& \underset{\{ \Uik \}, \{ \Vik \}}{\text{maximize}} & & \hspace{-3mm} \sum_{\substack{i \in \setI, k \in \setK_i\\n = 1,\ldots,d_{i_k}}} \hspace{-3mm} \omega_{i_k} g_\eta(e_{i_k,n}(\uikn, \{ \Vjl \})) \notag - g_\kappa(\{ \Vjl \}) \notag \\
& \text{subject to} & & \sum_{k \in \setK_i} \Fnormsq{\Vik} \leq P_i, \quad \, \forall \, i \in \setI. \label{opt:transformed}
\end{align}
The discrete rates are now implicitly selected in \eqref{eq:discontinuous_rate_function}, and the problem is no longer combinatorial. The objective function has however become discontinuous. There is no loss in optimality due to this reformulation though, since it holds that
\begin{equation*}
\min_{\uikn} e_{i_k,n}(\uikn, \{ \Vjl \}) = \min_{\uikn} \frac{1}{1 + \textsf{SINR}_{i_k,n} \left(\uikn, \{ \Vjl \} \right)}.
\end{equation*}
We will now bound the objective function in \eqref{opt:transformed} by bounding the discontinuous rate function by its concave envelope.\footnote{The concave envelope is the ``smallest'' concave function which majorizes the function. It is thus the best concave approximation available.} Given $\setP_{i_k} \subset \naturalnumbers$ and $\{ c_{i_k}^{(p)} \}_{p \in \setP_{i_k}}$, $\{ m_{i_k}^{(p)} \}_{p \in \setP_{i_k}}$ which are uniquely defined slopes and offsets,\footnote{These are uniquely determined by $\setQ_{i_k}$ and $\beta_{i_k}(\cdot)$, see examples in Fig.~\ref{fig:illustrations/approximations}.} the concave envelope is given by the following piecewise linear function:
\begin{equation}
g_\eta^\text{conc} (e) = \underset{p \in \setP_{i_k}}{\text{min}} \left\{ c_{i_k}^{(p)} \eta \left( e \right) + m_{i_k}^{(p)} \right\} \geq g_\eta(e), \notag
\end{equation}
Some examples of concave envelopes are given at the top of the page, in Fig.~\ref{fig:illustrations/approximations}, for three different QoS domains. This figure illustrates two key properties of our model. First, note that different QoS domains give bounds with different tightness. In the continuous rate domain (i.e. $\eta(e) = \log_2(e)$) for example, the concave envelope is a tight bound. This is because the discrete rates ``look linear'' in the this domain (cf. Ex.~\ref{ex:implementation_margin}), and are thus well approximated by a piecewise linear function. The second property to note is that our model accounts for the maximum discrete rate that is achievable. There is thus no point in reducing the MSE past the threshold value of the largest discrete rate.\footnote{By reducing the MSE further, the performance at the corresponding MS would not increase but all other MSs might receive stronger interference, which is detrimental to the system-level performance.} In Figure~\ref{fig:illustrations/approximations}, this is seen by the curves having zero slope for sufficiently small MSEs.
By bounding the discontinuous rate functions by their concave envelopes, we get the following optimization problem:
\begin{align}
& \underset{\{ \Uik \}, \{ \Vik \}}{\text{maximize}} & & \hspace{-3mm} \sum_{\substack{i \in \setI, k \in \setK_i\\n = 1,\ldots,d_{i_k}}} \hspace{-3mm} \omega_{i_k} g_\eta^\text{conc}(e_{i_k,n}(\uikn, \{ \Vjl \})) - g_\kappa(\{ \Vjl \}) \notag \\
& \text{subject to} & & \sum_{k \in \setK_i} \Fnormsq{\Vik} \leq P_i, \quad \, \forall \, i \in \setI. \label{opt:conc}
\end{align}
This step introduces some non-optimality, since we are upper bounding the objective of a maximization problem. The problem is no longer discontinuous however. The final hurdle is now the non-concavity of the objective. By Taylor expanding the $\eta(\cdot)$ function around a point $1/\wikn$, we get
\begin{align*}
&g_{\eta^\text{lin}}^\text{conc}(e_{i_k,n}(\uikn, \{ \Vjl \}), \wikn) = \\
&\underset{p \in \setP_{i_k}}{\text{min}} \Bigg\{ c_{i_k}^{(p)} \Bigg( \eta \left( \frac{1}{\wikn} \right) + \eta' \left( \frac{1}{\wikn} \right) \Bigg( e_{i_k,n}(\uikn, \{ \Vjl \}) \\
&\hspace{10mm}- \frac{1}{\wikn} \Bigg) \Bigg) + m_{i_k}^{(p)} \Bigg\} \leq g_{\eta}^\text{conc}(e_{i_k,n}(\uikn, \{ \Vjl \})).
\end{align*}
The inequality holds since $c_{i_k}^{(p)} \eta(\cdot)$ is a convex function\footnote{By construction, it holds that $c_{i_k}^{(p)} \leq 0, \, \forall \, p \in \setP_{i_k}$.} together with the fact that the first-order Taylor expansion of a convex function is a global underestimator \cite[Ch.~3.1.3]{ConvexOptimization}. By introducing the linearization points as optimization variables, we get the final optimization problem as:
\begin{align}
& \underset{\substack{\{ \Uik \}, \{ \Vik \}, \\ \{ \wikn \}}}{\text{maximize}} & & \hspace{-3mm} \sum_{\substack{i \in \setI, k \in \setK_i\\n = 1,\ldots,d_{i_k}}} \hspace{-3mm} \omega_{i_k} g_{\eta^\text{lin}}^\text{conc} (e_{i_k,n}, \wikn) - g_\kappa(\{ \Vjl \}) \notag \\
& \text{subject to} & & \sum_{k \in \setK_i} \Fnormsq{\Vik} \leq P_i, \quad \, \forall \, i \in \setI. \label{opt:conc_lin}
\end{align}
It can easily be shown that $\max_{\wikn} g_{\eta^\text{lin}}^\text{conc}(\cdot, \wikn) = g_\eta^\text{conc}(\cdot)$, i.e., the linearization is tight at optimality. The optimization problems in \eqref{opt:conc} and \eqref{opt:conc_lin} therefore have the same optimal value.
\subsection{Distributed Algorithm}
The final optimization problem in \eqref{opt:conc_lin} has the desired property that it is concave in each block of variables, when the two other blocks are held fixed. This leads us to apply block coordinate descent (BCD) \cite[Ch.~2.7]{NonlinearProgramming} to it.
By fixing the precoders and linearization weights in the optimization problem in \eqref{opt:conc_lin}, it can be shown that an optimal receive filter is the MMSE filter \mbox{$\Uik^\star = \Phiik^{-1} \Hiki \Vik, \, \forall \, i_k$}. By fixing the receive filters and the precoders, it can be shown that optimal linearization weights are \mbox{$\wikn^\star = 1/e_{i_k,n}(\uikn^\star, \{ \Vjl \}), \, \forall \, i_k, n$}. Finally, the optimal precoders are given by the optimization problem when the receive filters and linearization weights are fixed. This strongly concave optimization problem has a unique solution, which can be found using, e.g., interior-point methods \cite[Ch.~11]{ConvexOptimization}.
By sequentially solving the subproblems, an iterative algorithm is obtained. The receive filters and linearization weights can be solved for distributedly over the MSs, whereas the precoders must be solved for centrally at the BSs.
\begin{theorem}
When BCD is applied to the optimization problem in \eqref{opt:conc_lin}, the sequence of objective values obtained converges.
\end{theorem}
\begin{IEEEproof}
The sequence of objective values is nondecreasing, since in each step of the BCD, the objective function is maximized. The sequence is further bounded above by the finite optimal value of the optimization problem in \eqref{opt:conc_lin}. The sequence thus converges \cite[Thm.~3.14]{PrinciplesofMathematicalAnalysis}.
\end{IEEEproof}
\begin{figure}[t]
\centering
\includegraphics{plots/convergence}
\vspace{-5ex}
\caption{Example of convergence of the algorithms for one realization.} \label{fig:convergence}
\vspace{1.5ex}
\includegraphics{plots/SNR-heuristics}
\vspace{-5ex}
\caption{Comparing different QoS domains.} \label{fig:SNR-heuristics}
\vspace{1.5ex}
\includegraphics{plots/SNR-baselines}
\vspace{-5ex}
\caption{Comparing the proposed algorithm to the benchmarks.} \label{fig:SNR-baselines}
\vspace{1.5ex}
\includegraphics{plots/Q}
\vspace{-5ex}
\caption{Sum rate when varying the maximum discrete rate. The rates of uncoded QAM-constellations are shown in grey dotted lines.} \label{fig:Q}
\vspace{-2ex}
\end{figure}
\vspace{-2ex}
\section{Performance Evaluation}
We evaluate the performance of the proposed algorithm using numerical simulations. We let $I = 3$ BSs be placed equidistant along the centre line of a $120 \times 20$ [m] office corridor. Each BS serves $K = 2$ randomly placed MSs with $d = 2$ data streams. The BSs have $M = 4$ antennas each and the MSs have $N = 2$ antennas each. The large-scale fading is given by the ITU-R InH model \cite[Table~A1-2]{ITURInH}, but we model the small-scale fading as i.i.d.\@ Rayleigh fading. We use the discrete rates from Ex.~\ref{ex:wifi} with corresponding required SINRs from Ex.~\ref{ex:implementation_margin} with $\bar{\beta} = 1$. We draw $100$ i.i.d.\@ Monte Carlo realizations, and average the results. The proposed algorithm is run until the relative difference between subsequently achieved objective values is less than $10^{-3}$. We compare our proposed algorithm to the per-stream WMMSE algorithm \cite{Komulainen2013} and the MaxSINR algoritm \cite{Gomadam2011}, which both are well-known to perform well for the continuous rate\footnote{We define the continuous rate as $\log_2(1 + \textsf{SINR})$.} case \cite{Schmidt2013}.\footnote{The existing work in \cite{Wolkerstorfer2013,Wai2013,Cheng2015} cannot handle the MIMO case, which we consider here, and are consequently not included as benchmarks.} We also consider intercell and intracell time-division multiple access (TDMA), where the precoders are given by waterfilling over the strongest singular vectors of the desired channel.
In Fig.~\ref{fig:convergence}, we show the convergence of our algorithm when $\eta(e) = \log(e)$ and the transmit power is 21 dBm. The achieved discrete and continuous rates are more interesting than the (regularized) optimization objectives, and we thus show the former. After about 20 iterations, the two rates converge. This indicates that no excess power is used, since otherwise the continuous rate would be larger than the discrete rate. The discrete rate performance of the WMMSE algorithm is poor since it allocates too much power to already saturated streams.
In Fig.~\ref{fig:SNR-heuristics}, we compare the performance for different QoS domains. The rate and SINR domains perform identically at high transmit powers, whereas the MSE domain is unable to perform as well (cf. the bound tightness in Fig.~\ref{fig:illustrations/approximations}). In Fig.~\ref{fig:SNR-baselines}, we compare our algorithm to the benchmarks. At high transmit powers, the necessity of modelling the discrete rates is clear. The WMMSE algorithm performs worse for sufficiently high transmit power and the other benchmarks are not competitive.
In Fig.~\ref{fig:Q}, we vary the number of available discrete rates at a fixed transmit power of 21 dBm. We consider discrete rates $\setQ = \{ 1, 2, \ldots, q^\text{max} \}$, where we sweep $q^\text{max}$ in steps of 1 [bits/s/Hz]. At typical constellation sizes, our proposed algorithm is clearly superior. For very large constellations however, the WMMSE algorithm catches up.
\vspace{-2ex}
\section{Conclusion}
Many practical wireless communications systems use a finite set of discrete rates. By explicitly modelling these, a heuristic coordinated precoding algorithm was developed, which performs very well compared to algorithms which do not account for the discrete rates.
\bibliographystyle{IEEEtran}
|
\section{Introduction}
Interstellar grains play a central role in the physics of the interstellar medium. These grains are responsible for the observed extinction of the starlight \citep{Trumpler30} and provide shielding, allowing an increase of the molecular complexity in dense regions. They are also known to act as catalysts for reactions, the most important one leading to the formation of H$_2$ \citep{Gould63}. In dense and shielded regions, icy mantles are known to form around dust grain cores via accretion of gas-phase species followed by chemical reactions at the surface of the grains. Observations of these mantles have shown that they mostly consist of amorphous water, carbon monoxide, carbon dioxide, methanol, ammonia and methane \citep[see the review of][]{Boogert15}. Although difficult to identify, several other compounds are thought to be present and formed on the surface of those grains. In particular, the observed gas-phase abundance of complex molecules in star-forming environments seems tightly linked to the physical and chemical processes occurring in the solid state \citep[see the review of][]{Herbst09}. However, the recent detection of molecules such as methyl formate or dimethyl ether in cold regions \citep{Cernicharo12,Bacmann12} have challenged models and brought some authors \citep[see][for example]{Balucani15} to reassess the relative contribution of gas phase reactions compared to grain chemistry. Although the relative contribution of gas phase and grain surface chemistry on the formation of the most complex organic molecules is still unclear, it seems well established that grains plays a crucial role even at low temperature. This is the case for the formation of methanol for example for which gas phase chemistry cannot alone explain its observed abundances \citep{Geppert06,Garrod06a}. Modelling the formation and the evolution of these icy grains is therefore essential if we aim at studying the chemistry of dense and cold regions.
A number of studies has addressed this link by coupling the gas-phase chemistry to the solid phase using various numerical methods with different degrees of complexity and refinement. The four usually employed approaches are: (1) the rate equation approach \citep{Hendecourt85,Hasegawa92,Caselli98}, (2) the master equation \citep{Biham01,Stantcheva02}, (3) the macroscopic kinetic Monte Carlo method \citep{Tielens82,Vasyunin13}, and (4) the microscopic kinetic Monte Carlo method \citep{Chang05,Cuppen05}. Rate equation methods are relatively easy to implement and fast in term of computation time \citep[see][for a review on such techniques]{Cuppen13}.
The model developed by \citet{Hasegawa92} refers to the well known 2-phase (gas and grains) model in which no distinction is made between the outermost and inner monolayers. In this model, the surface and the mantle are treated as a single phase with the same properties for adsorption, diffusion and reaction. Subsequently, \citet{Hasegawa93a} developed a 3-phase (gas, grain surface and grain mantle) model in which the surface and the mantle are treated as separate phases. In this model, species can only react and desorb from the surface phase. The mantle is considered as inert and grows by incorporating material from the surface. Following the same approach, \citet{Taquet12} developed a similar model but using a multilayer method in which each layer is considered as a specific entity rather than one single, averaged, phase, i.e. the mantle. Based on recent calculations and experiments it has become clear that sub-surface processes, such as photodissociation, diffusion and recombination should be at work in interstellar grain mantles \citep{Andersson08,Oberg09c}. Motivated by these findings several authors modified the original 3-phase model of \citet{Hasegawa93a} to take into account this active bulk chemistry \citep{Kalvans10,Garrod13}.
In this paper we present an extended version of the 2-phase gas-grain code {\sevensize NAUTILUS} to the 3-phase modelling. The formalism used to distinguish surface and mantle layers is based on the pioneering work of \citet{Hasegawa93a}. In this model, both the mantle and the surface are considered as chemically active. As opposed to previous models, we assume that the bulk diffusion is driven by the diffusion of water molecules in the ice, as suggested by molecular dynamics simulations and experiments \citep{Ghesquiere15}. This paper is organized as follows. In Section \ref{sec:model_description}, we describe our chemical model and all the processes that we take into account. In Section \ref{sec:ice_modelisation}, we present our modelling results for the solid phase under dark cloud conditions and we compare these results with the available observations. In Section \ref{sec:gas_modelisation}, we present our modelling results for the gas-phase and we compare these results with observations in the TMC-1 (CP) and L134N dark clouds. Finally, Section \ref{sec:conclusion} contains a summary of our work.
\section{Model description}
\label{sec:model_description}
This new 3-phase model (gas, grain surface and grain mantle) is a modified version of the 2-phase gas-grain code {\sevensize NAUTILUS} extensively used to study the chemistry in various environments \citep{Loison14,Wakelam14,Reboussin15} and already presented in details in \citet{Reboussin14} and \citet{Ruaud15}. As in \citet{Hasegawa93a}, it is assumed that both accretion and desorption only occur between the gas and the outermost surface layer. We have however assumed that chemical reactions can occur in the mantle as on the surface but with a smaller diffusion rate of the species compared to the surface.
\subsection{General equations}
\label{sec:general_eq}
The differential equations governing gaseous, surface and mantle concentrations of a species i, denoted as $n(i)$, $n_s(i)$ and $n_m(i)$ [cm$^{-3}$] respectively, are:
\begin{equation*}
\begin{split}
\frac{dn(i)}{dt}\biggr\rvert _\text{tot} &=\sum_l \sum_j k_{lj}n(l)n(j) + k_\text{diss}(j)n(j) + k_\text{des}(i)n_s(i) \\
& - k_\text{acc}(i)n(i) - k_\text{diss}(i)n(i) - n(i)\sum_l k_{ij} n(j),
\end{split}
\end{equation*}
\begin{equation*}
\begin{split}
\frac{dn_s(i)}{dt}\biggr\rvert _\text{tot}&=\sum_l \sum_j k_{lj}^sn_s(l)n_s(j) + k_\text{diss}^s(j)n_s(j) + k_\text{acc}(i)n(i)\\
& + k_\text{swap}^{m}(i) n_m(i) + \frac{dn_m(i)}{dt} \biggr\rvert _{m\rightarrow s} \\
& - n_s(i)\sum_j k_{ij}^s n_s(j) - k_\text{des}(i)n_s(i) - k_\text{diss}^s(i)n_s(i) \\
& - k_\text{swap}^{s}(i) n_s(i) - \frac{dn_s(i)}{dt} \biggr\rvert _{s\rightarrow m},
\end{split}
\end{equation*}
\begin{equation*}
\begin{split}
\frac{dn_m(i)}{dt}\biggr\rvert _\text{tot}&=\sum_l \sum_j k_{lj}^m n_m(l)n_m(j) + k_\text{diss}^m(j)n_m(j) \\
& + k_\text{swap}^{m}(i) n_s(i) + \frac{dn_s(i)}{dt} \biggr\rvert _{s\rightarrow m}\\
& - n_m(i)\sum_j k_{ij}^m n_m(j) - k_\text{diss}^m(i)n_m(i) \\
&- k_\text{swap}^{m}(i) n_m(i) - \frac{dn_m(i)}{dt} \biggr\rvert _{m\rightarrow s}.
\end{split}
\end{equation*}
$k_{ij}$, $k_{ij}^s$ and $k_{ij}^m$ [cm$^3$s$^{-1}$] represent the rate coefficients for reactions between species $i$ and $j$ in the gas-phase, on the grain surface and in the mantle respectively. $k_\text{acc}$ and $k_\text{des}$ [s$^{-1}$] are respectively the accretion/evaporation rate coefficient of individual species onto/from the grain surface. In our model $k_\text{des}$ can be thermal or non-thermal (see section \ref{sec:acc_diff_des}). $k_\text{diss}$ [s$^{-1}$] gather dissociation rate coefficients by (1) direct cosmic-ray processes, (2) secondary UV photons induced by cosmic-rays and (3) the standard interstellar UV photons \citep[see][]{Wakelam12}. $k_\text{swap}^s$ and $k_\text{swap}^m$ [s$^{-1}$] are the surface-mantle and mantle-surface swapping rates respectively. $dn_s(i)/dt\rvert_{s\rightarrow m}$ and $dn_m(i)/dt\rvert_{m\rightarrow s}$ are related to the individual transfer of the species $i$ from the surface to the mantle and \textit{vice versa}. Those terms are calculated as follow:
\begin{equation*}
\frac{dn_s(i)}{dt} \biggr\rvert _{s\rightarrow m} = \alpha_\text{gain} \frac{n_s(i)}{n_{s,\text{tot}}} \frac{dn_{s,\text{gain}}}{dt},
\end{equation*}
and
\begin{equation*}
\frac{dn_m(i)}{dt} \biggr\rvert _{m\rightarrow s} = \alpha_\text{loss} \frac{n_m(i)}{n_{m,\text{tot}}} \frac{dn_{s,\text{loss}}}{dt},
\end{equation*}
where $dn_{s,\text{gain}}/dt$ and $dn_{s,\text{loss}}/dt$ are the overall rate of gain and loss of surface material respectively,
\begin{equation*}
\begin{split}
\frac{dn_{s,\text{gain}}}{dt} &= \sum_i \Bigg[ \sum_l \sum_j k_{lj}^sn_s(l)n_s(j) + k_\text{diss}^s(j)n_s(j)\\
& + k_\text{acc}(i)n(i) \Bigg],
\end{split}
\end{equation*}
\begin{equation*}
\begin{split}
\frac{dn_{s,\text{loss}}}{dt} &= \sum_i \Bigg[ n_s(i)\sum_j k_{ij}^s n_s(j) + k_\text{des}(i)n_s(i) \\
& + k_\text{diss}^s(i)n_s(i)\Bigg].
\end{split}
\end{equation*}
Therefore, the sum of $dn_{s,\text{gain}}/dt$ and $dn_{s,\text{loss}}/dt$ represent the net rate of change in the total surface material. This sum is thus $>0$ in the case of net accretion from the gas phase onto grain surface and $<0$ in the case of net desorption from the grain surface to the gas phase. This approach slightly differs to the one proposed by \citet{Hasegawa93a} in the sense that the overall rate of gain and loss of surface molecules are simultaneously used to compute the individual rate of species transfer from the surface to the mantle and from the mantle to the surface respectively. Using this notation, we can define the average absolute number of particles of species $i$ present in the surface layer as $N_s(i)= n_s(i) / n_{\text{dust}}$ where $n_s(i)$ [cm$^{-3}$] is the surface concentration of surface species $i$ and $n_{\text{dust}}$ [cm$^{-3}$] is the gas-phase concentration of dust particles.
$\alpha_\text{gain}$ and $\alpha_\text{loss}$ are defined as \citep[see][]{Garrod11}
\begin{equation*}
\alpha_\text{gain}= \frac{\sum_i N_{s}(i)}{\beta N_\text{site}}
\end{equation*}
and
\begin{equation*}
\alpha_\text{loss}=
\begin{dcases}
\frac{\sum_i N_m(i)}{\sum_i N_s(i)}, &\text{if}~~\sum\nolimits_i N_{m}(i) < \sum\nolimits_i N_{s}(i)\\
1,& \text{otherwise}
\end{dcases}
\end{equation*}
where $N_\text{site}$ is the total number of surface sites on a grain. $\beta$ is used to set the number of active surface layers on the grain. We assume that $\beta=2$ as suggested by \citet{Fayolle11} to account for surface roughness; i.e. the two outermost layers are considered as part of the surface.
It is important to note that since $dn_s(i)/dt\rvert_{s\rightarrow m}$ and $dn_m(i)/dt\rvert_{m\rightarrow s}$ are related to the net rate of change in total surface material, those terms do not represent a physical motion of material between surface and mantle but rather a way to treat the continuous renewal of the grain surface material \citep{Hasegawa93a,Garrod11}. The true physical motion of material between surface and mantle is accounted by
$k_\text{swap}^{s}$ and $k_\text{swap}^{m}$ [s$^{-1}$]. As discussed by \citet{Garrod13}, the surface-mantle swapping is a pair-wise process and requires that each swapping rate of all species, must collectively produce no net transfer between the two phases. In our model this requirement is achieved following \citet{Garrod13}. We first calculate the swapping rates from mantle to surface,
\begin{equation*}
k_\text{swap}^{m} (i)=
\begin{dcases}
\frac{1}{t_\text{hop}^m(i)} [\text{s}^{-1}] & \text{if} ~~ N_{\text{lay},m} < 1\\
\frac{1}{t_\text{hop}^m(i) N_{\text{lay},m}} [\text{s}^{-1}] & \text{if} ~~ N_{\text{lay},m} > 1\\
\end{dcases}
\end{equation*}
where $N_{\text{lay},m} = \sum_i N_m(i)/N_\text{site}$ is the number of mantle layers and $t_\text{hop}^m = \nu^{-1} \exp({E_\text{diff}^m/T_\text{dust}})$ the mantle thermal hopping time (i.e. the time required for the species to migrate from one site to an adjacent one via thermal hopping).
The surface to mantle rates are then built to match a total rate identical to the mantle to surface one,
\begin{equation*}
k_\text{swap}^{s}(i)=\frac{\sum_j k_\text{swap}^{m}(j)n_m(j)}{n_{s,\text{tot}}} [\text{s}^{-1}],
\end{equation*}
Unlike \citet{Garrod13}, we set all the species (except H, H$_2$, C, N and O) with E$_\text{diff}^m(i)$$<$E$_\text{diff}^m$(H$_2$O) to the diffusion barrier of H$_2$O considering that the bulk diffusion mechanism is driven by the diffusion of the water molecules in the ice, in agreement with the calculations of \citet{Ghesquiere15} for NH$_3$, CO$_2$, CO and H$_2$CO trapped in an amorphous H$_2$O ice for temperatures in the range of 90-170K. This treatment allows us to reproduce the observed desorption kinetics by TPDs experiments for which first and zero order desorption kinetics are at work (See Appendix \ref{sec:tpd_expe}). We do not include H, H$_2$, C, N and O assuming that these species are sufficiently light to efficiently diffuse in the ice even at low temperature.
\subsection{Accretion, diffusion and desorption}
\label{sec:acc_diff_des}
Accretion, diffusion and thermal desorption rate coefficients are computed based on \citet{Hasegawa92}. We assume a sticking probability of 1.0 for all the neutral species, except for H and H$_2$. For these two species, we use the temperature dependent expressions of \citet{Matar10} and \citet{Chaabouni12} derived from laboratory experiments. As stated in section \ref{sec:general_eq}, several non-thermal desorption mechanisms are also included: (1) the cosmic-rays desorption mechanism \citep[see][]{Hasegawa93b}, (2) the chemical desorption mechanism (desorption due to the exothermicity of surface reactions, set to $\sim 1\%$ efficiency) \citep[see][]{Garrod07}, and (3) the photo-desorption. The non thermal desorption mechanisms considered in other studies such as \citet{Roberts07} are not included in this work.
Over the last years, quantitative photo-desorption yields have been measured experimentally for pure ices sample using hydrogen discharge lamps: CO \citep{Oberg07,MunozCaro10}, H$_2$O \citep{Oberg09b}, N$_2$, CO$_2$ \citep{Oberg09a,Yuan13} and CH$_3$OH \citep{Oberg09c}. Thanks to these experiments, useful photo-desorption yields were determined for astrochemical models despite the fact that the mechanism itself was not very well understood. More recently, wavelength-dependent UV studies have been performed for pure and mixed ices: CO \citep{Fayolle11a,Bertin12,Bertin13}, N$_2$ and O$_2$ \citep{Fayolle13}. These wavelength-dependent studies helped in the understanding of the photo-desorption process and give new insights on this process. From these experiments, it seems to emerge that:
\begin{itemize}
\item The photo-desorption is an indirect process: induced by a photo absorption in sub-surface molecular layers and an energy transfer to the surface molecules \citep{MunozCaro10,Bertin12}.
\item Only the topmost ice layers are involved in the photo-desorption process; i.e. the 2 to 5 first monolayers.
\item The photo-desorption process is highly wavelength dependent as shown in \citet{Fayolle11a,Bertin12,Bertin13} and \citet{Fayolle13}.
\item This mechanism highly depends on the composition of the ice and how this ice is mixed, as shown by \citet{Bertin12} and \citet{Bertin13}.
\end{itemize}
Following this and considering the lack of knowledge on this process, we follow the recommendations of \citet{Bertin13} and choose to use a simplistic approach and to consider a single photo-desorption yield for all the molecules rather than individual ones determined from experiments. In the following the photo-desorption rate is kept constant using a photo-desorption yield $Y_\text{pd} = 10^{-4}$ molecule/photon \citep{Andersson08}. The corresponding rates for (1) the standard interstellar UV photons and (2) the secondary UV photons induced by cosmic-rays used are
\begin{equation*}
k_\text{des,UV}(i)= F_\text{UV}S_\text{UV} \exp({-2 A_V})Y_\text{pd}\frac{\pi r_\text{dust}^2}{N_\text{site}}~~[\text{s}^{-1}],
\end{equation*}
for the standard interstellar UV photons and
\begin{equation*}
k_\text{des,UV-CR}(i)= F_\text{UV-CR} S_\text{UV-CR}Y_\text{pd}\frac{\pi r_\text{dust}^2}{N_\text{site}}~~[\text{s}^{-1}],
\end{equation*}
for the secondary UV photons induced by cosmic-rays. In those expressions, $S$ is the scaling factor for the UV radiation field, $ F $ its strength in unit of photons cm$^{-2}$ s$^{-1}$ and $r_\text{dust}$ the grain radius. The factor of 2 in the exponential part of the first expression comes from \citet{Roberge91} and account for the UV extinction relative to $A_V$. For the standard interstellar UV photons field, we set $F_\text{UV}=1.0\times 10^8$ photons cm$^{-2}$ s$^{-1}$~\citep{Oberg07} and $F_\text{UV-CR}=1.0\times 10^4$ photons cm$^{-2}$ s$^{-1}$~\citep{Shen04}. In the following, the impact of the photo-desorption is not discussed since it does not impact our modelling results.
\subsection{Grain surface reactions}
We consider that most reactions proceed through the Langmuir-Hinshelwood mechanism. In a previous work, we also considered that some reactions can proceed through the Eley-Rideal mechanism \citep[see][for details]{Ruaud15} but did not consider this mechanism here. The reason is that this mechanism is found to have a minor impact on the computed abundances due to the low diffusion to binding ratio that we use (i.e. $E_\text{diff}^s=0.4\times E_\text{des}$ for our standard model, see Section \ref{sec:ice_modelisation}). We carried tests to see the impact of the Eley-Rideal mechanism and found that for $E_\text{diff}^s \gtrsim 0.45\times E_\text{des}$ this mechanism compete with the Langmuir-Hinshelwood mechanism due to the higher surface diffusion energy. When $E_\text{diff}^s \gtrsim 0.45\times E_\text{des}$ this mechanism enhances the computed abundances of species like CH$_3$OCH$_3$, HCOOCH$_3$ and CH$_3$CHO \citep[as already found in][]{Ruaud15}.
The Langmuir-Hinshelwood mechanism supposes that each reactant is already pre adsorbed on the surface (i.e. physisorbed) before encountering another reactant and possibly leading to the formation of a new species. The surface reaction rate for this mechanism is
\begin{equation*}
k_{ij}^x = \kappa_{ij}\Bigg(\frac{1}{t_\text{hop}^x(i)} + \frac{1}{t_\text{hop}^x(j)}\Bigg)\frac{1}{N_\text{site}n_\text{dust}}~ [\text{cm}^3\text{s}^{-1}],
\end{equation*}
where $x$ stands for $s$ (surface species) and $m$ (mantle species). $\kappa_{ij}$ is the probability that the reaction occurs and $t_\text{hop}^x = \nu_i^{-1} \exp({E_\text{diff}^x(i)/T_\text{dust}})$ the thermal hopping time. In this expression, $\nu_i$ is the characteristic vibration frequency of the species $i$ \citep[see][]{Hasegawa92} and $E_\text{diff}^x(i)$ its diffusion energy barrier. For mantle reactions, we modified the original expression given by \citet{Hasegawa92} by dividing $k_{ij}^m$ by $\sum_i N_m(i)/N_\text{site}$; i.e. the number of mantle layers, considering that the time needed for a mantle species to scan the entire grain mantle increases as the mantle is growing.
When the reaction is exothermic and barrierless, we consider that $\kappa_{ij}=1$ \citep{Hasegawa92}. Inversely, for exothermic reactions with activation barriers, denoted $E_{\text{A},ij}$, we calculate $\kappa_{ij}$ as the result of the competition among reaction, hopping and evaporation as suggested by \citet{Chang07} and \citet{Garrod11}:
\begin{equation*}
\kappa_{ij} = \frac{\nu_{ij} \kappa_{ij}^*}{\nu_{ij} \kappa_{ij}^* + k_\text{hop}^x(i) + k_\text{evap}(i) + k_\text{hop}^x(j) + k_\text{evap}(j)}.
\end{equation*}
where $\kappa_{ij}^*$ can be expressed as $\exp(-E_{\text{A},ij}/\text{T}_\text{dust})$ or the quantum mechanical probability for tunneling through a rectangular barrier of thickness $a$: $\kappa_{ij}^*=\exp[-2(a/ \hbar)(2\mu E_{\text{A},ij})^{1/2}]$, where $\mu$ is the reduced mass \citep[see][for details]{Hasegawa92}. Here, $\nu_{ij}$ is taken to be equal to the larger value of the characteristic frequencies of the two reactants $i$ and $j$ \citep{Garrod11}.
\section{Model predictions for the ice composition}
\label{sec:ice_modelisation}
Throughout this paper we use typical cold dense cloud conditions, i.e. n$_\text{H}=2\times10^4$cm$^{-3}$, T$_\text{gas}$=T$_\text{dust}$=10K, A$_\text{V}$=10 mag and $\zeta_{\text{H}_2}=1.3\times10^{-17}$s$^{-1}$. The adopted gas-phase network is \textit{kida.uva.2014} \citep[see][]{Wakelam15}. The grain network is the one presented in \citet{Ruaud15} and based on the previous work of \citet{Garrod07}. Hydrogen-abstraction reactions were added for reactions with HCO, CH$_3$O, CH$_2$OH and CH$_3$OH \citep{Chuang16}\footnote{The final network contains 717 species (489 for the gas phase and 228 for the grain surface) coupled through more than 11500 reactions (7509 for the gas phase and more than 4000 for the grain surface).}. For the H-atom abstraction reaction from CH$_3$OH, we use the reaction barriers used in \citet{Garrod13}, i.e. $E_\text{A}=4380$K for the reaction leading to CH$_2$OH and $E_\text{A}=6640$K for the reaction leading to CH$_3$O).
The binding energy of H is taken equal to $E_\text{des}(\text{H})=650$ K as suggested by theoretical calculations on amorphous solid water ice \citep{AlHalabi07}.
For diffusion barriers, we assume $E_\text{diff}^s=0.4\times E_\text{des}$ and $E_\text{diff}^m=0.8\times E_\text{des}$ for surface and mantle species respectively\footnote{Note that, except for H, H$_2$, C, N and O, we have set $E_\text{diff}^m(i)$=$E_\text{diff}^m$(H$_2$O) for all species that have $E_\text{diff}^m(i)$<$E_\text{diff}^m$(H$_2$O), as discussed in Section \ref{sec:general_eq}.}. A specific value $E_\text{diff}^s(\text{H})=230$ K for H is used coming from the calculations of \citet{AlHalabi07}. A similar diffusion barrier was derived by the experiment of \citet{Matar08} for D atoms (i.e. $E_\text{diff}^s(\text{D})=255 \pm 23$ K) as well as \citet{Hama12} for H atoms (i.e. $E_\text{diff}^s(\text{H})=255 \pm 11$ K) on amorphous water ice surfaces. Finally, initial abundances are summarized in Table \ref{initial_abundances}, grains are considered to be spherical with a 0.1$\mu$m radius, a 3g.cm$^{-3}$~density, $\simeq10^6$ surface sites\footnote{The effect of grain growth which leads to an increase of the number of grain sites is neglected.} and a dust to gas mass ratio of 0.01.
In the following, all the 2-phase model are run using the same parameters than those used for the 3-phase model, except for the diffusion-to-binding energy ratio which is taken to be equal to $E_\text{diff}=0.5\times E_\text{des}$ (to be consistent with previous studies based on 2-phase modelling). For H, the specific values defined above are employed.
\begin{table}
\caption{Initial abundances. $^\dagger$ a(b) stand for a$\times10^{\textrm{b}}$.}
\label{initial_abundances}
\begin{center}
\begin{tabular}{lrr}
\hline
\hline
Element & $n_i/n_\textrm{H}^\dagger$ & References \\
\hline
H$_2$ & 0.5 \\
He & 0.09 & 1 \\
N & 6.2(-5) & 2 \\
O & 2.4(-4) & 3 \\
C$^+$ & 1.7(-4) & 2 \\
S$^+$ & 8.0(-8) & 4 \\
Si$^+$ & 8.0(-9) & 4 \\
Fe$^+$ & 3.0(-9) & 4 \\
Na$^+$ & 2.0(-9) & 4 \\
Mg$^+$ & 7.0(-9) & 4 \\
P$^+$ & 2.0(-10) & 4 \\
Cl$^+$ & 1.0(-9) & 4 \\
F & 6.68(-9) & 5 \\
\hline
\end{tabular}
\end{center}
\medskip
(1) see discussion in \citet{Wakelam08}, (2) \citet{Jenkins09}, (3) see discussion in \citet{Hincelin11}, (4) low metal abundance from \citet{Graedel82}, (5) Depleted value from \citet{Neufeld05}.
\end{table}
\subsection{General effect of the 3-phase model on the ice composition}
\label{sec:general_effect}
In this section we discuss the impact of the introduced layered structure of the grain on the major ice compounds. We ran two types of models in which the mantle is considered as (1) chemically inert (labeled as model $a$), and (2) fully chemically active (i.e. including photodissociation, swapping and reactions ; labeled as model $b$). To study the effect of the reaction-diffusion competition, we ran these two models with and without this process. For comparison, we compare our results to the 2-phase model.
\begin{figure*}
\includegraphics[width=11.5cm,trim = 4cm 2.5cm 2cm 5cm, clip,angle=270]{Figures/ice_noreacdiff.pdf}
\caption{Computed ice thickness and contribution to the total ice material for major ice compounds, when the reaction-diffusion competition is not activated, as a function of time. Left: Results obtained with the 2-phase model. Middle: Results obtained with the 3-phase model where the mantle is considered as inert (model $a$). Right: Full surface and mantle chemistry (model $b$). Note that CO$_2$, H$_2$CO and CH$_3$OH have very low abundances in these three models and may not be clearly visible on this plot.}
\label{Fig:ice_noreacdiff}
\end{figure*}
\begin{figure*}
\includegraphics[width=11.5cm,trim = 4cm 2.5cm 2cm 5cm, clip,angle=270]{Figures/ice_reacdiff.pdf}
\caption{Same as Fig. \ref{Fig:ice_noreacdiff} but with the incorporation of the reaction-diffusion competition. Note that NH$_3$, CH$_4$ and H$_2$CO have very low abundances in these three models and may not be clearly visible on this plot.}
\label{Fig:ice_reacdiff}
\end{figure*}
Figures \ref{Fig:ice_noreacdiff} and \ref{Fig:ice_reacdiff} show the model predictions for the major ice compounds between 0.5 and 4~Myr, with and without the reaction-diffusion competition respectively. In both cases, the left panel shows the results for 2-phase model, the middle one, the results for the 3-phase model where the mantle is considered as inert (model $a$) and the right panel the results when the full mantle chemistry is accounted (model $b$). In all the models, we show the observed main ice components: H$_2$O, CO, CO$_2$, NH$_3$, CH$_4$, H$_2$CO and CH$_3$OH for which the relative amounts of each molecule vary.
For all cases, a thickness of $\gtrsim80$ monolayers of ice is reached after 1~Myr. The computed ice is very water rich in all the simulations and H$_2$O represents at least $30\%$ of the total material of the ice (see the bottom panel of Fig. \ref{Fig:ice_noreacdiff} and Fig. \ref{Fig:ice_reacdiff}). In absence of reaction-diffusion competition, H$_2$O is mainly formed on the surface by the reaction H+OH$\rightarrow$H$_2$O. When this competition is taken into account, the main reaction path leading to H$_2$O ice is H$_2$+OH$\rightarrow$H$_2$O+H \citep[$E_\text{A}=2100$K;][]{Baulch84} on the surface rather than reaction with atomic H. This difference can be explained by the fact that when considering the reaction-diffusion competition, the rates of reaction with activation barriers are enhanced by several orders of magnitude (this point will be discussed in Section \ref{sec:gen_effects}). The same formation path was found by \citet{Cuppen07} using the CTRW Monte Carlo code technique and \citet{Garrod11} that also accounts for this competition.
If the reaction-diffusion is not taken into account, CO can be very abundant as well, and can account, as water ice, for almost $\sim30\%$ of the total ice material. When the reaction-diffusion competition is activated, the CO abundance is highly decreased due to the enhanced O+HCO reaction to form CO$_2$. In opposition to \citet{Garrod11}, the reaction with barrier OH+CO$\rightarrow$CO$_2$ + H \citep[$E_\text{A}=150$K;][]{Fulle96} is found to be inefficient compared to this reaction path and represents, in the best case, only few percents of the total flux leading to CO$_2$ formation. This may arise from the fact that in \citet{Garrod11} the barrier thickness $a$ used to calculate the square-well tunneling rate of the reaction H+CO$\rightarrow$HCO is set to $2\AA$ whereas we use a typical value of $1\AA$ for all the reactions that have a barrier as commonly assumed in most gas-grain models \citep{Tielens82,Hasegawa92}.
In both 2-phase models (Figs. \ref{Fig:ice_noreacdiff} and \ref{Fig:ice_reacdiff}), NH$_3$ and CH$_4$ are efficiently produced by the successive hydrogenation of nitrogen and carbon atoms on grains and can represent as much as $\sim 10\%$ of the total ice material. The fact that these two molecules are produced with a slightly smaller abundance in the 3-phase models is mainly due to the fact that we use a low diffusion-to-binding ratio of 0.4 for the surface as compared to 0.5 for the 2-phase model. This implies that atoms (other than H) or light molecules move more rapidly on the surface by thermal hopping, making reactions involving such species more competitive in front of hydrogenation reactions.
In all models, there is a non negligible contribution coming from other molecules stated as "Others" on Figs. \ref{Fig:ice_noreacdiff} and \ref{Fig:ice_reacdiff}. The fraction of the ices represented by these species can be as high as 30\% at 2 Myr in models with the reaction-diffusion competition. In the model where the full chemistry is activated for the surface and the mantle (model $b$), this contribution comes principally from N-bearing species such as HCN, N$_2$, CH$_3$NH$_2$ and HC$_3$N, but also species such as CH$_3$OCH$_3$, HCOOH, HCO, CH$_3$O, CH$_3$CH$_2$OH, C$_2$H$_6$, CH$_2$OH, CH$_3$CCH and C$_2$H$_5$. The major ice compounds (i.e. species having an abundance larger than 0.2\% with respect to solid water) for this model are summarized in Table \ref{Tab:ice_mod}, for $t=2$Myr. From this Table, it can be seen that HCN, N$_2$, CH$_3$OCH$_3$ and HCOOH account for $\lesssim 5$ monolayers (denoted as ML hereafter) each of the total ice thickness, CH$_3$NH$_2$ and CH$_3$O for $\sim1$ML. Species like CH$_3$CH$_2$OH, C$_2$H$_6$, CH$_2$OH, CH$_3$CCH, C$_2$H$_5$ are also present and account for $0.6-0.7$ML each, i.e. abundances $\sim 2.0-2.5\%$ with respect to solid water. Such a high abundance of complex organic molecules (e.g. CH$_3$OCH$_3$) may not be realistic since no abstraction reactions are considered for the formation of such molecules. The fact that S-bearing species are absent from this list is due to the low sulfur initial abundance used, which comes from the low metal abundance of \citet{Graedel82}. As emphasized by \citet{Theule13}, a large part of these species have not been observed in interstellar ices but are suspected to be present in ices of molecular clouds.
Such high abundance of radicals, such as HCO and CH$_3$O, has already been reported by \citet{Taquet12} and \citet{Chang14}. Unlike \citet{Taquet12}, \citet{Chang14} considers an active mantle chemistry, i.e including mantle photodissociation, diffusion and reaction but using a unified microscopic-macroscopic Monte Carlo code. For these two species, the results obtained with our 3-phase model are found to be very similar to those presented in \citet{Chang14}. Their model also predicts a very high abundance of OH radical, which is not the case in our simulations. This difference can be due to the fact that they do not allow any H$_2$ to remain on the grains because of the rapid H$_2$ accretion and desorption which considerably slows down the Monte Carlo simulations. Consequently they have no reactions involving H$_2$ at the surface and in the mantle of the grains. In our case such high abundance of OH may not be observed due to the reaction H$_2$+OH$\rightarrow$H$_2$O+H \citep[$E_\text{A}=2100$K;][]{Baulch84}, which is found to be, as already mentioned, the major reaction leading to H$_2$O. Since in 2-phase models, the surface chemistry is treated assuming that the ice surrounding the interstellar grain core can be represented as an isotropic lattice with periodic potential (i.e. the surface and the mantle have same properties), this chemical diversity is not as important, because photodissociation is counterbalanced by hydrogenation reactions. In the case of 3-phase modelling, this "equilibrium" is broken by the difficulty for species to move in the ice.
\begin{table}
\caption{Calculated ice abundances at $t=2$Myr$^\dagger$ using the developed 3-phase model. In this model, the mantle is considered as active (model $b$) and the diffusion-to-binding ratio was set to $E^s_\text{diff}/E_\text{des}=0.4$.}
\label{Tab:ice_mod}
\begin{center}
\begin{tabular}{lrrr}
\hline
\hline
Molecule & $n(x)/n_{\text{H}_2\text{O}}$& $n(x)/n_\text{H}$ & $N_\text{ML}$\\
& [$\%$] & [$\times 10^{-6}$] & \\
\hline
\multicolumn{4}{c}{Surface + Mantle}\\
\hline
H$_2$O$^a$ & 100.0& 97.5 & 28.8 \\
\hline
\multicolumn{4}{c}{Surface}\\
\hline
H$_2$O$^a$ & 2.7 & 2.6 & 0.8 \\
CO $^a$ & 0.8 & 0.8 & 0.3 \\
CO$_2$$^a$ & 0.5 & 0.5 & 0.2 \\
HCN$^c$ & 0.5 & 0.5 & 0.1 \\
N$_2$$^b$ & 0.4 & 0.4 & 0.1 \\
HCOOH$^b$ & 0.3 & 0.3 & 0.08 \\
HCO & 0.2 & 0.2 & 0.06 \\
NH$_3$$^a$ & 0.2 & 0.2 & 0.04 \\
CH$_3$OH$^a$ & 0.2 & 0.2 & 0.04 \\
\hline
\multicolumn{4}{c}{Mantle}\\
\hline
H$_2$O $^a$ & 97.2 & 94.8 & 28.0 \\
CO$^a$ & 33.0 & 32.2 & 9.5 \\
CO$_2$$^a$ & 22.5 & 20.0 & 5.9 \\
HCN$^c$ & 19.0 & 18.6 & 5.5 \\
N$_2$$^b$ & 14.6 & 14.2 & 4.2 \\
CH$_3$OCH$_3$ & 13.0& 12.6 & 3.7 \\
HCOOH$^b$ & 11.0 & 10.5 & 3.1 \\
H$_2$CO$^b$ & 9.0 & 8.9 & 2.6 \\
HCO & 7.5 & 7.3 & 2.1 \\
NH$_3$$^a$ & 5.9 & 5.7 & 1.7 \\
CH$_3$OH$^a$ & 5.7 & 5.6 & 1.7 \\
CH$_3$NH$_2$$^c$ & 5.1 & 5.0 & 1.5 \\
CH$_3$O & 4.1 & 4.0 & 1.2 \\
CH$_3$CH$_2$OH$^b$& 2.6 & 2.5 & 0.7 \\
C$_2$H$_6$$^b$ & 2.5 & 2.4 & 0.7 \\
CH$_2$OH & 2.4 & 2.3 & 0.7 \\
CH$_3$CCH & 2.1 & 2.0 & 0.6 \\
CH$_4$$^a$ & 1.7 & 1.6 & 0.5 \\
C$_2$H$_5$ & 1.4 & 1.3 & 0.4 \\
CH$_3$CHO$^b$ & 0.6 & 0.6 & 0.2 \\
CH$_3$OCH$_2$ & 0.6 & 0.6 & 0.2 \\
NO$^c$ & 0.5 & 0.5 & 0.1 \\
HC$_3$N & 0.4 & 0.4 & 0.1 \\
HNO & 0.2 & 0.2 & 0.07 \\
C$_2$H$_4$$^c$ & 0.2 & 0.2 & 0.05 \\
\hline
\end{tabular}
\end{center}
\medskip
The top panel shows the total solid water abundance and its contribution to the total ice material in term of number of monolayers, i.e. denoted as $N_\text{ML}$. The second panel is related to the major surface compounds and the third panel is related to the mantle species.\\
$^\dagger$ Best time defined to fit observations in MYSOs, LYSOs and toward background stars. See Section \ref{sec:ice_comp}.\\
$^a$Molecules securely identified \citep{Boogert15}.\\
$^b$Likely and possibly identified species as well as upper limit detections \citep{Boogert15}.\\
$^c$Species that are suspected to be present \citep{Theule13}.
\end{table}
The fact to include or not the full chemistry in the mantle strongly affects the results. In model $b$ with the reaction-diffusion competition, the reactions on the surface layers lead mostly to large molecules such as CH$_3$OH and CH$_3$NH$_2$ because of the faster diffusion of heavy species. These complex species are then incorporated in the mantle (when there is accretion of other gas-phase species) where they are dissociated by cosmic-ray induced photons. The radicals resulting from the dissociations (e.g. NH$_2$, CH$_3$) are then mostly hydrogenated into more simple molecules such as NH$_3$ and CH$_4$. In the 3-phase model $a$ with the reaction-diffusion competition and an inert mantle (middle panel of Fig.~\ref{Fig:ice_reacdiff}), CO, NH$_3$ and CH$_4$ abundances are very small compared to observations in interstellar ices because CO has been transformed into CO$_2$ while nitrogen and carbon are locked in more complex species in the chemically inactive mantle (e.g. CH$_3$OH).
In Model $b$ with the reaction-diffusion competition and an active mantle, NH$_3$ is formed in the grain mantle by the reaction H$_2$+NH$_2$$\rightarrow$NH$_3$+H \citep[$E_\text{A}=6300$K;][]{Mitchell84} and by hydrogenation of NH$_2$, resulting from the dissociation of CH$_3$NH$_2$.
Similarly, CH$_4$ is formed in the grain mantle by photodissociation of CH$_3$OCH$_3$ and by hydrogenation of CH$_3$ which is produced in the mantle by photodissociation of CH$_3$OH and CH$_3$NH$_2$.
The chemistry we presented depends on the efficiency of the accretion process compared to the diffusion time on the surface. If the diffusion time of species on the surface is larger than the accretion time scale (and so the transfer of species from the surface to the mantle where they can diffuse less), then the formation of complex species would be much less efficient. In fact, at the densities of cold cores the continuous renewal of the surfaces by fresh material accreting from the gas-phase does not impact the surface reactivity by transfer of species from the surface to the mantle. The typical time for a species to arrive on a particular grain of radius $r_\text{dust}$ is given by:
\begin{equation*}
\begin{split}
\tau_\text{acc}^{-1}(i) &= n(i)v(i)\pi r_\text{dust}^2 \\
&\simeq 8\times10^2 \bigg(\frac{r_\text{dust}}{0.1\mu\text{m}}\bigg) \bigg(\frac{\text{T}_\text{gaz}}{10\text{K}}\bigg)^{1/2}\bigg(\frac{\text{m}_i}{1.0~\text{amu}}\bigg)^{-1/2}\text{n}(i)~[\text{yr}^{-1}]
\end{split}
\end{equation*}
If we consider that the initial concentration of the most abundant species (except H and H$_2$) under dark cloud conditions (i.e. at n$_\text{H}=2\times10^4$cm$^{-3}$) is $\simeq 1$ molecule.cm$^{-3}$, it means that a grain accretes $\simeq10^2$ molecules per year. It therefore requires $\simeq 10^4$ yr to cover $10^6$ and so on. The density required to see an effect of the renewal of the surface by successive accretion can be obtained by comparing this time to the typical diffusion time of a species on the surface $t^s_\text{diff}$. At n$_\text{H}=2\times10^4$cm$^{-3}$~and using a diffusion-to-binding ratio of 0.4, the diffusion time of light atoms, e.g. H ($E^s_\text{diff}=230$K), O ($E^s_\text{diff}=320$K), N ($E^s_\text{diff}=320$K), etc, or molecules such as H$_2$ ($E^s_\text{diff}=180$K), O$_2$ ($E^s_\text{diff}=400$K) or CO ($E^s_\text{diff}=460$K)..., is shorter than the typical time to cover one layer by successive accretion where $t^s_\text{diff}(\text{H}_2)\simeq10^{-6}$ yr, $t^s_\text{diff}(\text{H})\simeq10^{-4}$ yr, $t^s_\text{diff}(\text{O})\simeq$ $t^s_\text{diff}(\text{N})\simeq 1$ yr, $t^s_\text{diff}(\text{O}_2)\simeq 10^4$ yr and $t^s_\text{diff}(\text{CO})\simeq 10^6$ yr. It results that for O and N, for example, this effect can be important for $n_\text{H} \gtrsim 10^{8}$cm$^{-3}$.
In the case of the formation of CO$_2$, since $E_\text{diff}^s(\text{HCO}) > E_\text{diff}^s(\text{O})$, for densities $n_\text{H} \gtrsim 10^{8}$cm$^{-3}$, the surface reaction O+HCO will start to become inefficient due to the rapid transfer of both reactants into the icy mantle.
\subsection{Comparison with interstellar ice}
\label{sec:ice_comp}
We have compared the results of our 2-phase model and 3-phase models $b$ (both with the reaction-diffusion competition process and an active mantle) with the abundances of ices observed in the envelopes around young stellar objects, i.e. low-mass and massive young stellar objects (LYSOs and MYSOs respectively), and toward background stars (BG stars) reported by \citet{Boogert15}. For these models, we have determined the time of best fit \citep[following the method described in][]{Garrod07}. This time together with the modeled and observed abundances are listed in Table~\ref{Tab:ice_obs}. Two additional models $b$ were tested in which $E^s_\text{diff}/E_\text{des}=0.3$ and 0.5 and will be discussed in the following and in Section~\ref{sec:gas_modelisation}.
While discussing the comparison, it is important to keep in mind that the observed ices toward such sources are known to be slightly to strongly affected by thermal processing \citep{Boogert15} and that such comparison may not be relevant for simulations run under dark cloud conditions, i.e. where the temperature is as low as 10K and the density is kept fixed. For this reason, our comparison is made over the entire range of observational values rather than averaged values and aims to estimate how our modelling results can qualitatively reproduce the observed ice composition in these sources. We do not show the results for models where the reaction-diffusion competition is not taken into account since we are not able to reproduce the observed CO$_2$ ice abundance and we strongly overestimate the CO abundance.
The results obtained with the 2-phase model show a good agreement with the observed abundances in ices except for CH$_3$OH and CH$_4$ which are overproduced. In comparison, the 3-phase model calculation where the full mantle chemistry is considered and where $E^s_\text{diff}/E_\text{des}=0.4$ is assumed, shows a very good agreement with observations for all the observed species. As for the 2-phase model, the results obtained with the 3-phase model where we assumed $E^s_\text{diff}/E_\text{des}=0.5$ slightly overproduce CH$_3$OH and CH$_4$. The model with $E^s_\text{diff}/E_\text{des}=0.3$ show a good agreement for these two molecules but underestimate the CO abundance and strongly overestimate the CO$_2$ abundance.
\begin{table*}
\caption{Best fit ice composition against observation in MYSOs, LYSOs and toward BG Stars. All the models where run with the reaction-diffusion competition accounted.}
\label{Tab:ice_obs}
\centering
\begin{tabular}{lcrrrrrrrrr}
\hline
\hline
Model & Best fit time [yr] &H$_2$O &CO &CO$_2$ &CH$_3$OH &NH$_3$ &CH$_4$ & H$_2$CO\\
\hline
2-phase & $2.0\times10^6$ &100 &25 &39 &17 &7 &24 &8 \\
3-phase ($b$)~($E^s_\text{diff}/E_\text{des}=0.3$) & $1.0\times10^6$ &100 &8 &90 &4 &5 &1 &4 \\
3-phase ($b$)~($E^s_\text{diff}/E_\text{des}=0.4$) & $2.0\times10^6$ &100 &34 &23 &6 &6 &2 &9 \\
3-phase ($b$)~($E^s_\text{diff}/E_\text{des}=0.5$) & $2.0\times10^6$ &100 &43 &35 &7 &9 &18 &11 \\
\hline
Observations$^a$\\
\hline
BG Stars & &100 &20-43 &18-39 &6-10 &<7 &<3 & \\
MYSOs & &100 &4-14 &12-25 &5-23 &$\sim$7 &1-3 &$\sim$2-7 \\
LYSOs & &100 &12-35 &23-37 &5-12 &4-8 &3-6 &$\sim$6 \\
\hline
\multicolumn{8}{l}{$^a$Observed ice composition taken from the review of \citet{Boogert15}.}
\end{tabular}
\end{table*}
As seen in Table \ref{Tab:ice_mod}, the reservoir of O-bearing species is water while CO, CO$_2$ contain most of the carbon. Surprisingly, HCN and N$_2$ are found to be the reservoirs of nitrogen in the icy mantle of the grain, i.e. more abundant than NH$_3$. Fig. \ref{Fig:NbearingSpecies} presents the calculated abundances of N$_2$, HCN and NH$_3$ on the grain with the 3-phase model ($b$) where $E^s_\text{diff}/E_\text{des}=0.4$. In this figure, the left panel corresponds to the results obtained without the reaction-diffusion competition activated and the right panel when this competition was accounted. When the reaction-diffusion competition is not taken into account, at relevant ages (i.e. $t \gtrsim 10^5$ yrs), NH$_3$ on the grains is always the major nitrogen bearing species. When the reaction-competition is taken into account, the abundance of NH$_3$ is highly reduced due to a lower abundance of H. This lower abundance of H is caused by the enhanced reaction rates that have a barrier and that consume the atomic hydrogen. On the other hand, the production of HCN on the grain is enhanced, compared to the case where the reaction-diffusion competition is not taken into account, by the reaction H$_2$+CN$\rightarrow$HCN+H \citep[$E_\text{A}=2070$K;][]{Mitchell84}.
Since comets could reflect (at least partially) the primordial material that formed them \citep{Oberg11,Boogert15}, it is interesting to compare qualitatively our results with observations in these objects. We focus on the comet 67P/Churyumov-Gerasimenko for which in situ measurements were acquired, even though there seems to be a large diversity on the composition of comets. The ROSINA experiment on board ROSETTA spacecraft, has found that in the coma of the comet 67P/Churyumov-Gerasimenko, HCN would be more abundant than NH$_3$ \citep{LeRoy15} and would in fact be more abundant than N$_2$ \citep{Rubin15}. HC$_3$N was also detected in the coma of the comet and is predicted by our model. CH$_3$NH$_2$ however is the fourth most abundant N-bearing species in our model and was apparently not detected in the coma of the comet 67P/Churyumov-Gerasimenko but seems to be present on the comet as seen by the COSAC experiment onboard of the Rosetta's lander Philae with an abundance of 0.6 relative to water \citep{Goesmann15}. If we make the same comparison with other volatiles identified in this comet by \citet{LeRoy15}, we find the same species in our most abundant ones, except for C$_2$H$_2$.
\begin{figure*}
\includegraphics[width=7.5cm,trim = 1cm 2cm 9.5cm 1cm, clip,angle=270]{Figures/NbearingSpecies.pdf}
\caption{HCN, N$_2$ and NH$_3$ abundances on grains with respect to $n_\text{H}$ as a function of time obtained with the 3-phase model $b$. The left panel corresponds to the results obtained without taking into account the reaction-diffusion competition, while the right panel corresponds to the results when this competition was accounted.}
\label{Fig:NbearingSpecies}
\end{figure*}
\section{Effect on the gas-phase abundances}
\label{sec:gas_modelisation}
In this section we focus on the gas-phase abundances only and study the impact of the 3-phase model on the predicted gas-phase abundances. We first discuss the differences in the gas-phase predictions of the 3-phase and 2-phase models and then look at the impact on the comparison with observed abundances in the well known TMC-1 (CP) and L134N dark clouds. For this section, we can consider either the model $a$ or $b$ since the chemistry or its absence in the mantle does not influence the gas-phase composition; i.e. because net accretion from the gas-phase dominates.
In order to see the impact of varying the diffusion-to-binding energy ratio on the modeled gas-phase abundances, we ran our 3-phase model using $E^s_\text{diff}/E_\text{des}=0.3$, 0.4 and 0.5.
\subsection{General effects}
\label{sec:gen_effects}
\begin{figure*}
\includegraphics[width=8.3cm,trim = 2cm 2cm 7cm 2cm, clip,angle=270]{Figures/reac-diff_comp.pdf}
\caption{Abundance with respect to $n_\text{H}$ of selected gas-phase species as a function of time. The black dashed lines corresponds to the results obtained with the 2-phase model where $E_\text{diff}/E_\text{des}=0.5$. The gray solid lines correspond to the results obtained with the 3-phase model with $E^s_\text{diff}/E_\text{des}=0.3$, 0.4 and 0.5. All these results, except for the black dash-dotted lines, were obtained by accounting for the reaction-diffusion competition. The black dash-dotted lines corresponds to the result obtained with the 3-phase model with $E_\text{diff}/E_\text{des}=0.4$ but without the reaction-diffusion competition.}
\label{Fig:reac-diff_comp}
\end{figure*}
As seen in Section \ref{sec:ice_comp}, 3-phase modelling, where the reaction-diffusion competition was not activated, produces worse results than when accounted, especially for CO$_2$ on grains that is highly underestimated. Nevertheless, it is interesting to see its impact on the computed gas-phase abundances. Figure \ref{Fig:reac-diff_comp} shows the calculated abundance of five selected gas-phase species as a function of time. The black dash-dotted lines corresponds to the results where the reaction-diffusion competition was not taken into account and $E^s_\text{diff}/E_\text{des}=0.4$ was assumed. The gray solid lines show the results when this competition was accounted and where $E^s_\text{diff}/E_\text{des}=0.3$, 0.4 and 0.5 respectively. The black dashed lines show the results obtained with the 2-phase model where we used $E_\text{diff}/E_\text{des}=0.5$. As presented here the reaction-diffusion competition on the grain surface can have a strong impact on the modeled gas-phase abundances. For models where $E^s_\text{diff}/E_\text{des}=0.4$, all those species are formed at the surface of the grains and released in the gas-phase at their formation by chemical desorption. CH$_3$O, CH$_2$OH and CH$_3$OH are formed via the successive hydrogenations of CO, which present two activation barriers for reactions H+CO and H+H$_2$CO on the order of $ E_\text{A}\simeq 10^3$ K. CH$_3$OCH3 and HCOOCH$_3$ are formed by the successive hydrogenation of CH$_3$CHO (which is formed by CH$_3$+HCO) and by HCO+CH$_3$O respectively.
For all these species, the predicted gas-phase abundances are larger when the reaction-diffusion competition is taken into account (dark gray solid lines versus black dash-dotted lines on Fig. \ref{Fig:reac-diff_comp}). This is due to a strong enhancement of activation-energy-barrier-mediated reactions when this competition is considered. Since this competition is introduced to take into account the fact that two molecules mobile on the surface may meet in the same binding sites and possibly react before one of the reactant hops into an adjacent binding site, this result is not straightforward considering the high mobility of hydrogen atoms. This comes from the manner that we treat (or not) the reaction-diffusion competition. In our case, we always assume that hydrogenation reactions that have a barrier proceed through tunneling of H atoms. Considering a barrier thickness of 1$\AA$, the probability of reaction without taking into account the reaction-diffusion competition is $\kappa_{ij}^*=\exp[-2(a/ \hbar)(2\mu E_{\text{A},ij})^{1/2}] \sim 10^{-9}$ where $i$ stands for H and $j$ for CO or H$_2$CO for example. When the reaction competition is activated, $\kappa_{ij} \simeq \nu_{ij} \kappa_{ij}^*/ [\nu_{ij} \kappa_{ij}^* + k_\text{hop}^s(\text{H})]$, considering that only H is moving and that $k_\text{hop}^s(\text{H}) \gg k_\text{des}(\text{H})$. At T$_\text{dust}=10$K, with $E_\text{diff}^s(\text{H})=230$K and considering $\nu_{ij} \simeq \nu_\text{H}$ of the order of $10^{12}$ s$^{-1}$, $k_\text{hop}^s(\text{H})=\nu_{\text{H}} \exp(-E_\text{diff}^s(\text{H})/\text{T}_\text{dust})\sim 10^2$ s$^{-1}$. This leads to $\kappa_{ij} = 0.90$, a value $\sim 10^9$ times higher than $\kappa_{ij}^*$, so the reaction probability is greatly enhanced considering the reaction-diffusion competition although H is very mobile at the grain surface. Increasing the diffusion-to-binding energy ratio (except for H that we consider known from theory) does not modify the calculated abundances of CH$_2$OH, CH$_3$O and CH$_3$OH since $\kappa_{ij}$ depends mostly on $k_\text{hop}^s(\text{H})$. On the contrary, the calculated abundances of CH$_3$OCH$_3$ and HCOOCH$_3$ increase when $E^s_\text{diff}/E_\text{des}$ decreases because these species are formed from reactions between radicals rather than just hydrogenation.
\subsection{Comparison with TMC-1 and L134N dark clouds}
We compare the gas-phase predicted abundances with our 3-phase model including the reaction-diffusion competition and the full chemistry in the mantle (with $E^s_\text{diff}/E_\text{des}=0.3$, 0.4 and 0.5) to the molecules observed in the two dark clouds TMC-1 (CP) and L134N listed in \citet{Agundez13}. As seen in Section \ref{sec:ice_comp}, it is important to note that such comparison should be taken with care since these sources are known to have a complex structure \citep[see][for L134N for example]{Pagani07} and could have different physical history. Fig. \ref{Fig:distance} presents the mean confidence level calculated following \citet{Garrod07} for fit with TMC-1 (CP) and L134N observations. As it can be seen, the new model proposed here does not have a strong impact on the general confidence level which lies between $\sim 45 \%$ for TMC-1 (CP) and $\sim 50 \%$ for L134N at its maximum. On average, this corresponds to less than a factor of 10 deviation between modeled and observed abundances for the best matches. The fact that the mean confidence level does not vary significantly from 2-phase to 3-phase modelling is mainly due to the fact that most of the molecules observed in both, TMC-1 (CP) and L134N clouds, originates from gas phase chemistry. The 3-phase model where $E^s_\text{diff}/E_\text{des}=0.3$ was assumed gives a better mean confidence level compared to the results obtained with $E^s_\text{diff}/E_\text{des}=0.4$ and 0.5. However, as seen in Section \ref{sec:ice_comp}, the model where $E^s_\text{diff}/E_\text{des}=0.3$ is assumed gives a worse agreement for the comparison with ice observations in comparison to the results obtained with $E^s_\text{diff}/E_\text{des}=0.4$. The use of the 3-phase model suggests a chemical-age for both TM1-CP and L134N dark clouds of few $10^5$ yr whereas the 2-phase model proposes two ages with the the same confidence level of a few $10^5$ yrs and $\sim 10^6$ yr. This later age is strongly rejected by the use of the 3-phase model precisely due to large accretion on dust which is not counterbalanced by the desorption. It is however important to keep in mind that these chemical ages depends greatly on the model as well as on the comparison method used and can vary from one study to the other depending on the assumptions made. At the time of best agreement, for both 2-phase and 3-phase models, $\sim 60\%$ and $\sim 70 \%$ of the observed species in TMC-1 (CP) and L134N respectively are reproduced by the model within a factor of 10. For TMC-1 (CP), this represent 44 over 64 molecules observed and 36 over 50 for L134N.
\begin{figure*}
\includegraphics[width=7.5cm,trim = 1cm 2cm 9.5cm 1cm, clip,angle=270]{Figures/mean_confidence_level.pdf}
\caption{Calculated mean confidence level as a function of time for fit with TMC-1 (CP) (left panel) and L134N (right panel) observations. The dashed lines corresponds to the results obtained with the 3-phase model $b$ where $E^s_\text{diff}/E_\text{des}=0.3$, 0.4 and 0.5. The solid lines corresponds to the results obtained using the 2-phase model with $E_\text{diff}/E_\text{des}=0.5$. In all cases, the reaction-diffusion competition was accounted.}
\label{Fig:distance}
\end{figure*}
\section{Conclusion}
\label{sec:conclusion}
In this paper we present a new 3-phase model for gas-grain simulations in which the mantle as well as the surface are considered as active. Mantle photodissociation, diffusion and reactions are taken into account. Following \citet{Fayolle11}, to account for surface roughness, we consider that the two outermost monolayers are part of the surface. We also assume that the bulk diffusion is driven by the diffusion of water molecules in the ice as suggested by molecular dynamics simulations and experiments \citep{Ghesquiere15}. The diffusion-to-binding ratio of surface species is taken to be equal to 0.4, except for H for which we use a specific value coming from theoretical calculations \citep{AlHalabi07}. The proposed model successfully reproduces the TPD data on ice desorption and deals with zeroth- and first-order desorption kinetics.
The main conclusions of this study are the following:
\begin{enumerate}
\item Considering the reaction-diffusion competition or not has a strong impact on the modelling results. This competition seems indispensable to form CO$_2$ on grains as already found by \citet{Garrod11}. The reaction-diffusion competition not only affects the CO$_2$ abundance on grains but more generally all the species that are formed via reactions that have a barrier. In this context, H$_2$O ice is found to be formed by H$_2$+OH$\rightarrow$H$_2$O+H \citep[$E_\text{A}=2100$K;][]{Baulch84} on the surface rather than reaction with H \citep[in agreement with][]{Cuppen07}. NH$_3$ is found to be formed by H$_2$+NH$_2$$\rightarrow$NH$_3$+H \citep[$E_\text{A}=6300$K;][]{Mitchell84} and by successive hydrogenation of NH. HCN is predominantly formed by H$_2$+CN$\rightarrow$HCN+H \citep[$E_\text{A}=2070$K;][]{Mitchell84} in the grain mantle. By incorporating the reaction-diffusion competition, it becomes crucial to have a good approach to determine the abundance of H$_2$ in interstellar ices.
\item The low diffusion-to-binding energy ratio, used for surface, makes reactions involving light atoms or molecules other than H more competitive in front of hydrogenation reactions. This leads to a lower abundance of species formed by hydrogenation chains on the grains as well as in the gas phase.
\item The proposed 3-phase model qualitatively reproduces most of the observed ice species in envelopes of young stellar objects and toward background stars. A number of others species are found to be abundant on grains, with abundances of the order of few $\times 10^{-6}$ with respect to the total proton density. These species are essentially N-bearing species such as N$_2$, HCN and CH$_3$NH$_2$. Species like CH$_3$OCH$_3$, HCOOH, HCO, CH$_3$O, CH$_3$CH$_2$OH, C$_2$H$_6$, CH$_2$OH, CH$_3$CCH and C$_2$H$_5$ are also found to be abundant on the grain surface, i.e. with abundances $\gtrsim 10^{-6}$ with respect to the total proton density.
\item It is found that accounting for the reaction-diffusion competition modifies the major N-bearing species on the grain which go from NH$_3$ to N$_2$ and HCN. The abundance of NH$_3$ is found to be reduced due to a lower abundance of H caused by the reaction-diffusion competition. On the other hand, this competition is found to promote the formation of HCN by H$_2$+CN$\rightarrow$HCN+H \citep[$E_\text{A}=2070$K;][]{Mitchell84}.
\item The developed 3-phase model does not have a strong impact on the computed abundances of the observed species in TMC-1 (CP) and L134N dark clouds compared to the original 2-phase model before $10^6$ yrs. After $10^6$ yrs, we find that the agreement dramatically falls down compared to the agreement obtained with the 2-phase model. This is the result of a dramatic fall down of the gas phase abundances due to the large accretion on dust which is, unlike the 2-phase model, not counterbalanced by the desorption. This strongly constrains the chemical-age of these clouds to be of the order of a few $10^5$ yrs and strongly rejects the largest ages of few $10^6$ yrs.
\end{enumerate}
\section*{Acknowledgements}
This work has been founded by the European Research Council (Starting Grant 3DICE, grant agreement 336474). The authors are also grateful to the CNRS program "Physique et Chimie du Milieu Interstellaire" (PCMI) for partial funding of their work.
\bibliographystyle{mnras}
|
\subsection*{Acknowledgements}
#1
}
\bibliographystyle{plainnat}
\bibpunct{(}{)}{;}{a}{,}{,}
\title{Kernel Distribution Embeddings:\\
Universal Kernels, Characteristic Kernels and Kernel Metrics on Distributions}
\author[1]{Carl-Johann {Simon-Gabriel}\thanks{<EMAIL>}}
\author[1]{Bernhard Sch\"olkopf\thanks{<EMAIL>}}
\affil[1]{Max Planck Institute for Intelligent Systems\\ Department of Empirical Inference\\
Spemanstra{\ss}e 38, 72076 T{\"u}bingen\\ Germany}
\providecommand{\keywords}[1]{\textbf{\textit{Index terms---}} #1}
\date{}
\begin{document}
\maketitle
\begin{abstract}
\input{abstract.tex}
\end{abstract}
\paragraph{Keywords:} kernel mean embedding, universal kernel, characteristic kernel, Schwartz-distributions, kernel metrics on distributions, metrisation of the weak topology
\setlength{\parskip}{4pt}
\input{DistributionEmbeddings.tex}
\section{Introduction}
During the past two decades, reproducing kernel Hilbert spaces (RKHS) have risen to a major tool in various areas of machine learning.
They offer a variety of nice function spaces for dimensionality-reduction, regression and classification algorithms, such as kernel PCA, kernel regression and SVMs. For those algorithms, the function space should be sufficiently large to approximate well the unknown target function, and its norm sufficiently strong to avoid overfitting. These two requirements lead to the question how a given RKHS $\HH_{\K}$ compares with other well-known function spaces~$\mathcal{F}$. The question is two-fold. When is $\HH_{\K}$ \emph{continuously} contained in $\mathcal{F}$? And when is it dense in $\mathcal{F}$? During the past two decades, the machine learning community focused on the second, more difficult question. Kernels $\function{k}{\mathcal{X} \times \mathcal{X}}{\mathbb{C}}{}{}$ whose RKHS is dense in $\mathcal{F}$ were called \emph{universal}, with slight variations depending on $\mathcal{F}$. The latter was usually a space of continuous functions. But we will try to ``narrow the gap'' between $\HH_{\K}$ and $\mathcal{F}$ by choosing a smaller space $\mathcal{F}$, containing for example only continuously differentiable functions; with far-reaching consequences for kernel mean embeddings (KME).
These KMEs only recently caught the attention of the machine learning community. They embed finite Borel measures into $\HH_{\K}$ via the map $\function{\emb_{\K}}{}{}{\mu}{\int_\mathcal{X} k(.,x) \diff \mu(x)}$. This gives access to the RKHS's computational handiness to handle measures numerically,
and led to new homogeneity \citep{gretton07}, distribution comparison \citep{gretton07,gretton12} and (conditional) independence tests \citep{gretton05a, gretton08, fukumizu08, gretton10, lopez-paz13}. For those algorithms, it is interesting when $\emb_{\K}$ is defined and injective over large sets $\mathcal{M}$, in which case the kernel is said \emph{characteristic} over $\mathcal{M}$. It turned out that many usual kernels are \emph{characteristic} over (subsets of) finite Borel measures \citep{micchelli06, fukumizu08,fukumizu09a,fukumizu09b, sriperumbudur08, sriperumbudur10a, sriperumbudur11}. Nevertheless, KMEs are in general not surjective, leaving ``a gap'' between $\mathcal{M}$ and $\HH_{\K}$ that we will try to narrow by extending $\emb_{\K}$ to generalised measures, i.e.\ Schwartz-distributions (thereafter simply called \emph{distributions}, as opposed to \emph{measures}).
Narrowing the gaps between $\HH_{\K}$ and $\mathcal{F}$ and between $\mathcal{M}$ and $\HH_{\K}$ may seem like unrelated problems, but they are actually linked by duality. If $\HH_{\K}$ continuously embeds into $\mathcal{F}$, Corollary~\ref{cor:EmbedDuals} will show that the KME is well-defined over the dual $\mathcal{F}'$ and Theorem~\ref{theo:UniversalMeansCharacteristic} that the kernel is universal over $\mathcal{F}$ if and only if (iff) it is characteristic to $\mathcal{F}'$. For wisely chosen spaces $\mathcal{F}$, $\mathcal{F}'$ identifies with a space of measures; for others, it becomes a space of distributions. Corollary~\ref{cor:EmbedDuals} and Theorem~\ref{theo:UniversalMeansCharacteristic} thus finally unify and systemise various known links between different notions of universal and characteristic kernels catalogued in an overview paper by \citet{sriperumbudur11}; and they give a straightforward method to extend KMEs from measures to distributions! Proposition~\ref{prop:SPD} complements these results by noticing that kernels are characteristic to a given vector space iff they are \gls{spd} over this space. This systemises the various connections (also reviewed by \citealp{sriperumbudur11}) between universal and characteristic kernels and different notions of \gls{spd} kernels, such as conditionally \gls{spd} or integrally \gls{spd} kernels. Table~\ref{tab:UCS} summarises these connections.
Using (integrally) strict positive definiteness, \citet{sriperumbudur10a} gave handy conditions to check whether a stationary (also known as translation-invariant) kernel is characteristic. We improve and extend these results to distributions. Surprisingly, it turns out that any smooth and stationary kernel that is characteristic to finite measures with compact support is also characteristic to the larger space of compactly supported distributions (Proposition~\ref{prop:CompactCharacteristicRd})!
The RKHS distance between two mapped measures (or distributions) $\mu$ and $\nu$ defines a semi-metric $d_k$ over $\mathcal{M}$: $d_k(\mu,\nu) := \normK{\emb_{\K}(\mu) - \emb_{\K}(\nu)}$. It is only natural to compare it with other topologies on $\mathcal{M}$. Table~\ref{tab:TopoSummary} summarises these comparisons. They have important consequences. For one thing, they guarantee continuity of KMEs when $\mathcal{M}$ is a dual equipped with its strong dual topology, the most common topology on duals (Proposition~\ref{prop:ContinuousEmbedding}). For another, they prove that our extension of KMEs to distributions with compact support is \emph{the only} continuous linear extension of usual KMEs (Proposition~\ref{prop:UniqueExtension}). And most importantly, they finalise a series of recent results \citep{sriperumbudur10b, sriperumbudur13} by showing that on locally compact Hausdorff spaces, $d_k$ metrises the narrow\footnote{The narrow convergence is also known as the weak or weak-* convergence in probability theory. Except for the abstract, we call it narrow to distinguish it from the weak (dual) topology from functional analysis.} convergence of probability measures iff $k$ is continuous and characteristic to probability measures (Theorem~\ref{theo:MetrizationOfNarrow2}). Metrics metrising the narrow convergence are of prime importance for convergence results in probability theory. Many such metrics exist, for example the Dudley, Lévy-Prohorov and Wasserstein (or Kantorovich) metrics. But $d_k$ has numerous advantages, particularly for applications. First, it underlies various machine learning algorithms, including almost all applications of KMEs, as well as kernel independent component analysis \citep{bach02, gretton05b, shen09} and kernel based dimensionality reduction for supervised learning \citep{fukumizu04}. Second, it is easy to estimate, even with finite samples only, because $\normK{\emb_{\K}(\mu)}^2 = \iint k(x,y) \diff \mu(x) \diff \bar \mu(y)$ (which also holds for distributions!). And third, it depends only on the kernel and can thus be defined over arbitrary input domains~$\mathcal{X}$. For further details, see introduction of \citet{sriperumbudur10b}.
Overall, our main contribution is to unify and finalise many results on KMEs that were discovered and used by the machine learning community during the past decade. Contrary to probability measures, which often need extra care and are given special attention in this paper, embeddings of distributions are rather a byproduct of our systematic unification. For generality we phrase many results in terms of distributions, but readers may focus on measures only, if they systematically:
\begin{itemize}
\item replace the word ``distribution'' by ``measure'';
\item set the parameter $m$ to $0$ (see notations in Section~\ref{sec:Definitions});
\item remember that $\DLone{0} = \M_{\! f}$ and $\Dcomp{0} = \M_{c}$.
\end{itemize}
Section~\ref{sec:Differentiation} however will lose most of its substance, as it focuses on distributional derivatives: the essence of distribution theory.
As an appetiser however, let us show how these derivatives may appear and relate to KMEs. Consider an input space $\mathcal{X} = \mathbb{R}$, and let $\vec \varphi_k(x) := \emb_{\K}(\delta_x) = k(.,x)$. When $k$ is continuously differentiable, then $\vec \varphi_k$, as a function of $x$ with values in $\HH_{\K}$, is differentiable and its derivative $\partial \vec \varphi_k$ belongs to $\HH_{\K}$ \citep[Lemma~4.34]{steinwart08}. It is thus tempting to write
\begin{equation}\label{eq:DiffIntro}
[\partial \vec \varphi_k](x) := \lim_{h \rightarrow 0} \vec \varphi_k\left(\frac{\delta_{x+h} - \delta_x}{h}\right) \overset{?}{=} \vec \varphi_k\left(\lim_{h \rightarrow 0} \frac{\delta_{x+h} - \delta_x}{h}\right) = \vec \varphi_k(- \partial \delta_x) = - \emb_{\K}(\partial \delta_x) \, ,
\end{equation}
where $\partial \delta_x := \lim_{h \rightarrow 0} \frac{\delta_{x-h} - \delta_x}{h}$ would denote the distributional derivative of $\delta_x$.
Thus, the function $\partial \vec \varphi_k$ does not seem to be the image of a measure, but the image of the first-order Schwartz-distribution $- \partial \delta_x$, which in physics is called a dipole. Equation~\eqref{eq:DiffIntro} will be made precise in Section~\ref{sec:Differentiation}.
The structure of this paper roughly follows questions~\ref{MQ1}--\ref{MQ3} of the abstract. After fixing definitions and notations in Section~\ref{sec:Definitions}, we define the KME of distributions in Section~\ref{sec:Duality}. This gives answers to~\ref{MQ1} and immediately yields Theorem~\ref{theo:UniversalMeansCharacteristic} which links universal and characteristic kernels. To answer~\ref{MQ2}, we first need basic calculus rules for embedded distributions, together with some results specific to KMEs of probability measures. Those are covered by Sections~\ref{sec:Calculus} and \ref{sec:ProbabilityMeasures} respectively. Section~\ref{sec:UniversalKernels} answers~\ref{MQ2} by giving necessary and sufficient conditions for kernels to be characteristic to some distribution spaces. In particular, it shows that kernels which injectively embed large spaces of distributions do exist and provides examples. Section~\ref{sec:Topology} addresses~\ref{MQ3} by focusing on the induced kernel semi-metric $d_k$, with a special emphasis on the metrisation of the narrow convergence of finite measures. Section~\ref{sec:Conclusion} gives a brief overview of related work and concludes.
\section{Definitions and Notations\label{sec:Definitions}}
Most of our notations are fairly standard. An informed reader might skip to Section~\ref{sec:Duality} and refer to Section~\ref{sec:Definitions} only as needed.
\paragraph{Input and output space.} Let $\mathcal{X}$ be the input set of all considered kernels and functions. Whenever referring to differentiable functions or to distributions of order $\geq 1$, we will \emph{implicitly} take $\mathcal{X} = \Omega \subset \mathbb{R}^d$, where d is a strictly positive integer, $\mathbb{R}$ the set of real numbers, and $\Omega$ an open subset of $\mathbb{R}^d$. Otherwise, when referring to functions which need not be differentiable or to distributions of order $0$ (i.e.\ measures), $\mathcal{X}$ will simply be a \emph{locally compact paracompact Hausdorff} set. Note that a Hausdorff set is paracompact \gls{iff} it admits partitions of unity subordinate to any open cover. For many results, the paracompactness assumption will be superfluous, but it is handy to keep it for ease of discussions. We will explicitly lift this assumptions when we think it is worth it. $\mathcal{X}$ will be equipped with its Borel $\sigma$-algebra. All considered functions, measures and distributions will take their values in $\mathbb{C}$, the complex numbers.
\paragraph{Kernel.} In this paper, a \emph{kernel} $\function{k}{\mathcal{X} \times \mathcal{X}}{\mathbb{C}}{}{}$ will be a positive definite function, meaning that for all $n \in \mathbb{N}$, all $\lambda_1, \ldots, \lambda_n \in \mathbb{C}$, and all $x_1, x_2, \ldots x_n \in \mathcal{X}$,
\[
\sum_{i,j=1}^{n} \lambda_i k(x_i,x_j) \overline{\lambda_j} \geq 0.
\]
\paragraph{Differentiation.} Unless stated otherwise, $m$ will always designate a positive, possibly infinite integer: $m \in \mathbb{N} \cup \{ \infty \}$. Let $p = (p_1, p_2, \ldots, p_d) \in \mathbb{N}^d$, where $\mathbb{N}$ is the set of non-negative integers. We note $|p| := \sum_{i = 1}^{d} p_i$. For a given function $\function{f}{\mathcal{X}}{\mathbb{C}}{}{}$, we define $\partial^p f := \frac{\partial^{|p|} f}{\partial^p_1 x_1 \partial^p_2 x_2 \cdots \partial^p_d x_d}$, whenever the right-hand-side is well defined. $f$ will be said $m$-times continuously differentiable, if for any $p$ such that $|p| = m$, $\partial^p f$ exists and is continuous. Similarly, for kernels $\function{k}{\Omega \times \Omega}{\mathbb{C}}{}{}$, we will write $\partial^{(p,q)} k$, where $p, q \in \mathbb{N}^d$. A kernel will be said $(m,m)$-times continuously differentiable if, for all $p$ such that $|p| = m$, $\partial^{(p, p)} k$ exists and is continuous. In particular, $\partial^{(p,q)} k$ then exists and is continuous for any $|p|,|q| \leq m$. The same notations will be used for the distributional derivative.
\paragraph{Topological subsets.} Let $\mathcal S_1$ and $\mathcal S_2$ be two topological sets such that $\mathcal S_1 \subset \mathcal S_2$. If the canonical embedding of $\mathcal S_1$ into $\mathcal S_2$ is continuous, $\mathcal S_1$ is said to \emph{embed continuously into} $\mathcal S_2$ or to \emph{be continuously contained in} $\mathcal S_2$. In that case, we write
\begin{equation*}
\mathcal S_1 \ensuremath{\hookrightarrow} \mathcal S_2 \qquad \text{or} \qquad \mathcal S_2 \ensuremath{\hookleftarrow} \mathcal S_1 \, .
\end{equation*}
In other words, $\mathcal S_1 \ensuremath{\hookrightarrow} \mathcal S_2$ means: $\mathcal S_1$ is contained in $\mathcal S_2$ and carries a stronger topology than the relative topology induced by $\mathcal S_2$.
\paragraph{Spaces of functions.} The letter $\mathcal{F}$ will always designate a \gls{lcv} topological vector space (TVS) of functions. For (a few) reminders on \gls{lcv} TVSs, see Appendix~\ref{sec:Reminders}. \emph{All function spaces encountered in this paper are \gls{lcv} TVSs.} Let $m$ be a possibly infinite, non-negative integer, and let $q \in \mathbb{R}$, with $1 \leq q \leq \infty$. Whenever it is defined, we note $\norm{f}_{\infty} := \sup_{x \in \mathcal{X}} |f(x)|$. We will consider the following spaces of functions over $\mathcal{X}$. Except $\Cont{m}{b}$, they will always be equipped with their usual, natural topology. The reader need not know all these topologies to understand the paper. They are stated here solely for completeness and rigour.
\begin{description}
\item[$\complex^\inputS$] the space of \emph{all} functions from $\mathcal{X}$ to $\mathbb{C}$, equipped with the pointwise convergence topology.
\item[$\Cont{m}{}$] the space of m-times continuously differentiable functions. It is equipped with the topology of uniform convergence on compact subsets of the functions and of their derivatives of order $\leq m$. This topology is generated by the family of semi-norms ${\{\norm{.}_{p,K} \, | \, |p| \leq m, \, K \subset \mathcal{X}, \, K \ \mathrm{compact} \}}$, where $\norm{f}_{p, K} := \max_{K} \partial^p |f|$.
\item[$(\Cont{m}{b})_c$] the space of m-times continuously differentiable functions $f$, such that all their derivatives up to order $m$ be bounded. The natural topology would be the uniform convergence of the functions and of all their derivatives up to order $m$. This topology, however, will be too strong for our purposes. Instead, we will equip $\Cont{m}{b}$ with a weaker (LCv) topology (see Section~\ref{sec:MprobAndUniversality}) ---which we mark by the index $c$ in $(\Cont{m}{b})_c$--- such that the dual of $(\Cont{m}{b})_c$ be the same as the dual of $\Cont{m}{0}$ (see next item).
\item[$\Cont{m}{0}$] the space of m-times continuously differentiable functions that vanish at infinity, as well as all their derivatives of order $\leq m$. Note that a function $f \in \complex^\inputS$ is said to \emph{vanish at infinity}, if, for any $\epsilon>0$, there exists a compact $K \subset \mathcal{X}$ such that $|f(\mathcal{X} \backslash K)| \leq \epsilon$. The space $\Cont{m}{0}$ is equipped with the topology of uniform convergence of the functions and of their derivatives of order $\leq m$. This topology is generated by the family of semi-norms ${\{\norm{.}_{p} \, | \, |p| \leq m\}}$, where $\norm{f}_{p} := \max \, \partial^p |f|$.
\item[$\Cont{m}{c}$] the space of m-times continuously differentiable functions with \emph{compact} support. It will be equipped with its usual limit Fréchet topology \citep[see][]{schwartzTD, treves67}. In this topology, a sequence $(f_n)_n$ of functions converges to $f$ iff
\begin{enumerate}
\item there exists a compact $K \subset \mathcal{X}$ such that $f_n, f \in \Cont{m}{}(K)$ and
\item $f_n \rightarrow f$ in $\Cont{m}{}(K)$.
\end{enumerate}
\item[$\Lp{q}$] with its usual $\Lp{q}$-norm $\norm{.}_{L^q}$.
\item[$\Sobo{m,q}{}:= \{ f \in \Lp{q} \, | \, \forall \, |p| \leq m, \partial^p f \in \Lp{q}\}$] Here, $\partial^p f$ is the distributional derivative of $f$. The topology on these so-called \emph{Sobolev spaces} is generated by the family of semi-norms $\function{}{}{}{f}{\norm{\partial^p f}_{L^q}}$.
\item[$\Sobo{m,q}{0}$] the closure of $\Cont{\infty}{c}$ in $\Sobo{m,q}{}$. When $q < \infty$ and $m=0$, or when $q < \infty$ and $\mathcal{X} = \mathbb{R}^d$, then it can be shown that $\Sobo{m,q}{0} = \Sobo{m,q}{}$. This does not hold for any arbitrary $\mathcal{X} = \Omega$.
\end{description}
Whenever $m=0$, we may drop the superscript $m$. Also, we may write $\Cont{}{0}(\mathbb{R}^d)$ if we want to specify that the input space $\mathcal{X}$ is specifically $\mathbb{R}^d$. We will write $\Cont{m}{*}$ if we want to designate either $\Cont{m}{}$ or $\Cont{m}{0}$ without specifying which one of them.
Note that $\complex^\inputS \ensuremath{\hookleftarrow} \Cont{m}{} \ensuremath{\hookleftarrow} (\Cont{m}{b})_c \ensuremath{\hookleftarrow} \Cont{m}{0} \ensuremath{\hookleftarrow} \Cont{m}{c}$.
We will write $k \in \Cont{(m,m)}{}$ (resp.\ $k \in \Cont{(m,m)}{0}$) to express that $k$ is $(m,m)$-times continuously differentiable (resp.\ $(m,m)$-times continuously differentiable and, for all $|p| \leq m$ and $x \in \mathcal{X}$, $\partial^{(p,p)} k(.,x) \in \Cont{}{0}$ and $\sup_{x \in \mathcal{X}} \partial^{(p,p)} k(x,x) < \infty$).
\paragraph{Spaces of measures.} We will only consider \emph{regular Borel measures}. This won't be repeated in the sequel. The letter $\mathcal{M}$ will designate a generic set of measures. We will encounter the following spaces (or sets) of (signed) measures.
\begin{description}
\item[$\M_{\delta}$] the space of measures with \emph{finite} support: ${\M_{\delta} := \lin \{\delta_x \, | \, x \in \mathcal{X} \}}$.
\item[$\M_{c}$] the finite measures with \emph{compact} support.
\item[$\M_{\! f}$] the \emph{finite} measures.
\item[$\mathcal{P}$] the set of probability measures. It is the set of \emph{positive} measures in $\M_{r}$ that sum to~$1$.
\item[$\M_{r}$] the space of \emph{locally finite} measures, also known as \emph{Radon measures}. By locally finite, we mean that, on every compact $K \subset \mathcal{X}$, the measure takes finite values.
\end{description}
We will also briefly encounter the following subsets of $\M_{\! f}$: $\mathcal{M}_{\scriptscriptstyle{+}}$, the finite positive measures; $\M_{\! f}^{\scriptscriptstyle{\leq c}}$, the finite measures with total variation $\leq c$; $\mathcal{M}_{\scriptscriptstyle{+}}^{\scriptscriptstyle{\leq c}} := \mathcal{M}_{\scriptscriptstyle +} \cap \M_{\! f}^{\scriptscriptstyle{\leq c}}$; and $\mathcal{P}_c := \M_{c} \cap \mathcal{P}$. Note that $\M_{\delta} \subset \M_{c} \subset \M_{\! f} \subset \M_{r}$. Given a measure $\mu \in \M_{r}$, we note $|\mu|$ its absolute value. In particular, $|\mu|(\mathcal{X})$ equals its (possibly infinite) total variation. Given a set $\mathcal{F}$ of $\mu$-integrable functions, for $f \in \mathcal{F}$, we will write $\mu(f) := \int f \diff \mu$. In particular, note that $\mu$ defines a linear form over $\mathcal{F}$. This leads us to
\paragraph{Dual spaces and spaces of measures.}
The \emph{(topological) dual} $\mathcal{F}'$ of a TVS $\mathcal{F}$ is the space of $\emph{continuous}$ linear forms over $\mathcal{F}$.
On locally compact Hausdorff spaces $\mathcal{X}$, some spaces of measures $\mathcal{M}$ are known to identify, algebraically and topologically,\footnote{when $\mathcal{F}'$ is equipped with its strong dual topology} with the dual $\mathcal{F}'$ of specific function spaces $\mathcal{F}$ via the map $\function{}{\mathcal{M}}{\mathcal{F}'}{\mu}{(\function{}{}{}{f}{\mu(f)})}$ (see Riesz-Markov-Kakutani Representation Theorem in Appendix~\ref{sec:Reminders}). In particular: $\M_{\delta} = (\complex^\inputS)'$, $\M_{c} = \Cont{\prime}{}$, $\M_{\! f} = \Cont{\prime}{0}$ and $\M_{r} = \Cont{\prime}{c}$. When $\mathcal{X} = \mathbb{R}^d$, these are special cases of the following
\paragraph{Spaces of distributions.} The letter $\mathcal{D}$ will always be used as a generic to designate a set of distributions. We now list the respective duals of the previously defined spaces of functions.\footnote{Note that our notations differ from those of L.\ Schwartz in that we omit the additional prime he puts to every space of distribution. For him, $\mathcal{D}$ (without prime) would rather designate a space of functions.}
\begin{description}
\item[$\M_{\delta}$] which can be shown to be the dual of $\complex^\inputS$.
\item[$\Dcomp{m}$] the space of distributions of order $m$ with compact support. It can be shown that, for $m \leq \infty$: $\Dcomp{m} = \{\sum_{|p| \leq n} \partial^p \mu_p \, | \, n < m+1, \, \mu_p \in \M_{c} \}$. In particular, $\Dcomp{0} = \M_{c}$.
\item[$\DLone{m}$] the space of \emph{summable} or \emph{integrable} distributions of order $m$. It can be shown that, for $m \leq \infty$: $\DLone{m} = \{\sum_{|p| \leq n} \partial^p \mu_p \, | \, n < m+1, \, \mu_p \in \M_{\! f} \}$. In particular, $\DLone{0} = \M_{\! f}$.
\item[$\DLone{m}$] same space as before.
\item[$\Dall{m}$] the space of Schwartz-distributions of order $m$. We will refer to $\Dall{\infty}$ simply as \emph{the space of distributions}. It can be shown that, for $m < \infty$: $\Dall{m} = \{\sum_{|p| \leq m} \partial^p \mu_p \, | \, \mu_p \in \M_{r} \}$. In particular, $\Dall{0} = \M_{r}$.
\item[$\Lp{q'}$] where for $1 \leq q < \infty$, $\frac{1}{q'} + \frac{1}{q} =1$. Note that the dual of $\Lp{1}$ is $\Lp{\infty}$, but the converse is \emph{not} true.
\item[/] We will not consider the duals of $\Sobo{m,q}{}$.
\item[$\Sobo{-m, q'}{0} := (\Sobo{m,q}{0})'$ ($q < \infty$)] For a characterisation of these spaces of distributions, see \citet[Theorem~3.10]{adams75}.
\end{description}
We will call any element of one of these dual spaces a \emph{distribution}. Note that they can all be seen as an element of $\Dall{\infty}$. In particular: $\M_{\delta} \subset \Dcomp{m} \subset \Sobo{-m-1, q'}{0} \subset \DLone{m} \subset \Dall{m} \subset \Dall{\infty}$ and $\Lp{q'} \subset \Sobo{-m,q}{0} \subset \Dall{\infty}$. These inclusions generalise those noted for measures. A diagram summarising all inclusions of functions and of their duals can be found in Appendix~\ref{sec:InclusionsDiagram}.
\paragraph{Topologies on duals.}
When $\mathcal A$ is a set of linear forms over a TVS $\mathcal{F}$, we note $b(\mathcal A, \mathcal{F})$ or $b(\mathcal \mathcal{F}', \mathcal{F}) \cap A$ (resp.\ $w(\mathcal A, \mathcal{F})$ or $w(\mathcal \mathcal{F}', \mathcal{F}) \cap A$) the topology of bounded (resp.\ pointwise) convergence over $\mathcal{F}$. We will call $b(\mathcal{F}', \mathcal{F})$ (resp.\ $w(\mathcal{F}', \mathcal{F})$) the \emph{strong dual} (resp.\ \emph{weak dual}, or \emph{weak-star}) topology on $\mathcal{F}'$. When $\mathcal{F} = \Cont{}{b}$, we will call $w(\mathcal A, \Cont{}{b})$ the \emph{narrow topology} over $\mathcal A$ and use the letter $\sigma$ rather than $w$: $\sigma(\mathcal A, \Cont{}{b}) := w(\mathcal A, \Cont{}{b})$. Finally, we call $w(\mathcal A, \Cont{}{c})$ the \emph{vague topology} over $\mathcal A$. We will write $(\mathcal{F}')_b$ (resp.\ $(\mathcal{F}')_w$, $(\mathcal{F}')_\sigma$, $(\mathcal{F}')_\mathfrak{T}$) to specify that $\mathcal{F}'$ carries its strong dual topology (resp.\ its weak dual topology, its narrow topology, a given topology $\mathfrak{T}$). By default, $\mathcal{F}'$ will be equipped with its strong topology. When $\mathcal{F}$ is a Banach space, the strong topology of $\mathcal{F}'$ is the topology induced by the dual norm.
A \emph{topological subspace of distributions} ---or topological distribution space--- is any subspace of $\Dall{\infty}$ that embeds continuously into $\Dall{\infty}$.
If a LCv TVS $\mathcal{F}_1$ is densely and continuously contained in another one $\mathcal{F}_2$, then $\mathcal{F}'_2$ is continuously in $\mathcal{F}'_1$ (see Section~\ref{sec:WwSs}). In particular, all dual spaces listed above are topological distribution spaces: they verify the following continuous inclusions.
\begin{equation*}
\M_{\delta} \ensuremath{\hookrightarrow} \Dcomp{m} \ensuremath{\hookrightarrow} \Sobo{-m-1, q'}{0} \ensuremath{\hookrightarrow} \DLone{m} \ensuremath{\hookrightarrow} \Dall{m} \ensuremath{\hookrightarrow} \Dall{\infty} \quad \mathrm{and} \quad
\Lp{q'} \ensuremath{\hookrightarrow} \Sobo{-m,q}{0} \ensuremath{\hookrightarrow} \Dall{\infty} \, .
\end{equation*}
On $\DLone{m}$, we will only consider the strong and weak topologies $b(\DLone{m}, \Cont{m}{0})$ and $w(\DLone{m}, \Cont{m}{0})$.
\iflong
Here are a few remarks on the topologies of the following spaces:
\begin{description}
\item[$\M_{\! f}$] The strong topology is induced by the total variation norm. Thus, $\mu_n \longrightarrow \mu$ strongly \gls{iff} ${\int \diff |\mu_n-\mu| \longrightarrow 0}$.
\item[$\M_{c}$] Neither weak nor strong topologies are induced by a norm. $\mu_n \longrightarrow \mu$ strongly (resp.\ weakly) iff
\begin{enumerate
\item There exists a compact $K \subset \mathcal{X}$ such that, for all $n$, $\supp \mu_n \subset K$.
\item $\int \diff |\mu_n-\mu| \longrightarrow 0$ (resp.\ $\mu_n \longrightarrow \mu$ weakly in $\M_{\! f}$).
\end{enumerate}
\item[$\Dcomp{m}$] Again, $D_n \longrightarrow D$ strongly (resp.\ weakly) in $\Dcomp{m}$ iff
\begin{enumerate
\item There exists a compact $K \subset \mathcal{X}$ such that, for all $n$, $\supp D_n \subset K$.
\item $D_n \longrightarrow D$ strongly (resp.\ weakly) in $\Dall{m}$ or, equivalently, in $\DLone{m}$.
\end{enumerate}
In particular, note the coherence with the precedent inclusion: ${\Dcomp{m} \ensuremath{\hookrightarrow} \DLone{m}}$ and ${(\Dcomp{m})_w \ensuremath{\hookrightarrow} (\DLone{m})_w}$.
\item[$\Dcomp{\infty}, \Dall{\infty}$] Being so-called \emph{Montel spaces}, they enjoy a property very useful in applications: \emph{a sequence converges strongly \gls{iff} it converges weakly}. This does not hold for finite $m$.
\item [$\HH_{\K}$] Identifying $\HH_{\K}$ with its dual space $\HH_{\K}'$ via anti-linear the Riesz representer map for Hilbert spaces (see Appendix~\ref{sec:Reminders}), one may define a strong and weak dual topology on $\HH_{\K}$. The strong is then simply the one induced by the usual RKHS norm. As for the weak topology, \emph{a sequence $f_n \in \HH_{\K}$ converges weakly to $f \in \HH_{\K}$ iff, for all $g \in \HH_{\K}$, $\ipdK{g}{f} \longrightarrow \ipdK{g}{f}$}.
\end{description}
Finally, let us now introduce another topology that we will use over finite Borel measure and in particular probability measures: the \emph{narrow (convergence) topology}.
As the names suggests, the weak topology is weaker than the strong one. In particular, $D_n \overset{b}{\longrightarrow} D$ implies $D_n \overset{w}{\longrightarrow} D$. As a matter of fact, the weak topology is sometimes inadequately weak. For instance, in $\M_{\! f}$ (and in any $\DLone{m}$), $\delta_n$ converges weakly to $0$, although it is one and the same measure that is being translated. This does not happen in $\M_{\! f}$'s strong topology. But then, it turns out the strong topology is often inadequately strong. For instance, $\delta_{x_n}$ converges to $\delta_x$ in total variation norm \gls{iff} $x_n = x$ for all $n \in \mathbb{N}$, except possibly for a finite number of them. Thus in Probability Theory, on $\mathcal{P}$ (or more generally on $\M_{\! f}$) one often prefers the so-called \emph{narrow convergence} or \emph{convergence in distribution} topology, noted $\sigma$. A sequence $\mu_n \in \M_{\! f}$ converges narrowly to $\mu \in \M_{\! f}$, written $\mu_n \overset{\sigma}{\longrightarrow} \mu$, if $\mu_n(f) \longrightarrow \mu(f)$ for any $f \in \Cont{}{b}$, the set of bounded continuous functions. This topology both prevents mass from disappearing in infinity and enjoys the handiness of the weak topology in applications. The downside however, is that, unless the input space $\mathcal{X}$ is compact, the narrow convergence is not a general dual topology\footnote{in the sense that it is not defined for any dual space}. Thus many general functional analysis theorems won't apply directly, and the proofs have to be tuned specifically. That is why in Section~\ref{sec:Topology}, the analysis of the narrow convergence case has a whole subsection on its own!
\fi
\paragraph{Function and distribution related notations.} In accordance with the notation ${\mu(f) := \int f \diff \mu}$, we may also designate $D(f)$ by
\begin{equation*}
\int f \diff D \quad \mathrm{or} \quad \int f(x) \diff D(x) \quad \mathrm{or} \quad D_x(f) \quad \mathrm{or} \quad D_x(f(\hat x)) \, .
\end{equation*}
Note that, given a function $f$ (or functional $D$), it will sometimes be handy to specify the name of its input variable. To do so, we will write $f(\hat{x})$ (or $D(\hat{f})$), meaning $f$ (or $D$), where $x$ (or $f$) is the dummy input variable. In particular $k(.,\hat{x}) = (\function{}{}{}{x}{k(.,x)})$. Finally, we note $\bar f$ the complex conjugate function $\overline{f(\hat x)}$ of $f$.
\paragraph{Supports.}
The support $\supp \varphi$ of a function $\varphi \in \complex^\inputS$ is the closure of the set of points $x \in \mathcal{X}$ such that $\varphi(x) \not = 0$. The support $\supp D$ of a distribution $D$ is the greatest closed set $S \subset \mathcal{X}$, such that for any $\varphi \in \Cont{\infty}{c}$ with support in $\mathcal{X} \backslash S$, $D(\varphi) = 0$. When identifying function $\varphi$ with the distribution $\function{}{}{}{f}{\int f \varphi}$, the two definitions coincide. \\%When a function $\varphi$ is identified to a distribution, i.e.\ when $\varphi$ is identified with the absolutely continuous measure $\varphi \diff x$, then both supports coincide.
Let us now turn to some definitions concerning kernels.
\section{Characteristicness: a Dual Counterpart to Universality\label{sec:Duality}}
In this section, we show how to embed general distribution spaces into an RKHS. The link between universal and characteristic kernels will then be straightforward. But before we go into detail, let us briefly sketch the idea of a distribution embedding.
Like any other Hilbert space, an RKHS $\HH_{\K}$ identifies with its conjugate dual $\overline \HH_{\K}'$ via the \emph{Riesz representation} map $\function{}{\HH_{\K}}{\overline \HH_{\K}'}{f}{\ipdK{\hat \varphi}{f}}$ (see Appendix~\ref{sec:Reminders})\footnote{In this paper, the inner products are chosen linear on the left, and anti-linear on the right.}. For the KME $\int k(.,x) \diff \mu(x)$ of a measure $\mu$ (and under suitable assumptions on the kernel $k$ and the measure $\mu$), this associated linear form is simply $\bar \mu \big|_{\HH_{\K}}$, because
\begin{equation*}
\ipdK{\hat \varphi}{\int k(.,x) \diff \mu(x)} = \int \ipdK{\hat \varphi}{k(.,x)} \diff \bar \mu(x) = \bar \mu(\hat \varphi) \, .
\end{equation*}
Thus, whenever a measure $\mu$ defines a continuous linear form over $\HH_{\K}$, its KME is the Riesz representer of $\bar \mu \big|_{\HH_{\K}}$. But when is $\mu$ continuous over $\HH_{\K}$? It is, as soon as $\mu$ belongs to a dual $\mathcal{F}'$ such that $\HH_{\K}$ embeds continuously into $\mathcal{F}$.
This holds not only for measures, but for all elements of $\mathcal{F}'$. And depending on the choice of $\mathcal{F}$, those elements can be distributions that are not measures.
Now the details. We start with reminders on function spaces and universal kernels, continue with the definition of distribution embeddings and characteristic kernels, and finish with the natural link between universal and characteristic kernels.
\subsection{Universal Kernels}
The literature distinguishes various kinds of universal kernels $k$, such as $c$-, $cc-$ or $c_0$-universal kernels. They are all special cases of the following unifying definition.
\begin{definition}[Universal Kernels]
Let $\mathcal{F}$ be a \gls{lcv} TVS and $k$ a kernel such that $\HH_{\K} \ensuremath{\hookrightarrow} \mathcal{F}$.
$k$ is said \emph{universal over $\mathcal{F}$} if $\HH_{\K}$ is dense in $\mathcal{F}$.
When $\mathcal{F}$ equals $\Cont{m}{0}$ (resp.\ $\Cont{m}{0}$), $k$ will be said $c^m$- (resp.\ \mbox{$c^m_0$-)} universal. When $m=0$, we may drop the superscript $m$.
\end{definition}
\begin{remark}
$c$-universality usually refers to the special case where $\mathcal{X}$ is compact, the general case being known as $cc$-universality \citep{sriperumbudur10a, sriperumbudur10b}. We find this an unnatural distinction and stick to $c$-universal for both.
\end{remark}
In the literature, the hypothesis that $\HH_{\K}$ be not only contained, but \emph{continuously} contained in $\mathcal{F}$ is usually replaced by (necessary and) sufficient smoothness assumptions on the kernel, so that this inclusion holds. For example (see proofs in Appendices~\ref{proof:HKinC} and \ref{proof:HKinCm}):
\begin{proposition}[Characterisation of $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{}{\star}$\label{prop:ContinuousRKHS}] \label{prop:HKinC}
$\HH_{\K} \subset \Cont{}{0}$ (resp.\ $\HH_{\K} \subset \Cont{}{b}$, resp.\ $\HH_{\K} \subset \Cont{}{}$) iff the two following conditions hold.
\begin{enumerate}[label = (\roman*)
\item For all $x \in \mathcal{X}$, $K(.,x) \in \Cont{}{0}$ (resp.\ $K(.,x) \in \Cont{}{b}$, resp.\ $K(.,x) \in \Cont{}{}$). \label{p:1}
\item $\function{}{}{}{x}{k(x,x)}$ is bounded (resp.\ bounded, resp.\ \emph{locally} bounded, meaning that, for each $y \in \mathcal{X}$, there exists a (compact) neighbourhood of $y$ on which $\function{}{}{}{x}{k(x,x)}$ is bounded.). \label{p:2}
\end{enumerate}
If so, then $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{}{0}$ (resp.\ $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{}{b}$\,, thus $\HH_{\K} \ensuremath{\hookrightarrow} (\Cont{}{b})_c$\,, resp.\ $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{}{}$).
\end{proposition}
\Needspace{2\baselineskip}
\begin{proposition}[Sufficient condition for $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{m}{\star}$ \label{prop:HKinCm}]
\leavevmode
\begin{enumerate}[label = , nosep]
\item If $k \in \Cont{(m,m)}{}$ , then $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{m}{}$.
\item If $k \in \Cont{(m,m)}{0}$, then $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{m}{0}$.
\item If $k \in \Cont{(m,m)}{b}$, then $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{m}{b}$, thus $\HH_{\K} \ensuremath{\hookrightarrow} (\Cont{m}{b})_c$.
\end{enumerate}
\end{proposition}
Proposition~\ref{prop:HKinC} shows that $\HH_{\K} \subset \Cont{}{*}$ \gls{iff} $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{}{*}$. As there exist non-continuous kernels whose RKHS functions are all continuous, the hypothesises in Proposition~\ref{prop:HKinCm} is sufficient but not necessary. We do not know whether, in general, $\HH_{\K} \subset \Cont{m}{*}$ implies $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{m}{*}$. However, if $\HH_{\K} \subset \Cont{m+1}{}$, then $k \in \Cont{(m,m)}{}$ (\citealp{grothendieck53}, cited by \citealp[Lemme~2]{schwartzFDVV}), thus $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{m}{}$. In particular, if $\HH_{\K} \subset \Cont{\infty}{}$, then $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{\infty}{}$.
\subsection{Distribution Embeddings and Characteristic Kernels}
Before defining characteristic kernels, we must define the KME of a distribution. The trick resides in the interpretation of the integral $\int k(.,x) \diff \mu(x)$.
For a bounded measurable kernel, the KME of a finite measure $\mu$ is defined as the RKHS function given by $\int k(.,x) \diff \mu(x)$. However, as $\function{k(.,\hat x)}{}{}{x}{k(.,x)}$ takes its values in a possibly infinite dimensional vector space, one must agree on the definition of the integral $\int k(.,x) \diff \mu(x)$. Usually one uses the Bochner-integral, which is convenient, because $k(.,\hat x)$ is Bochner-integrable \gls{wrt} $\mu$ iff $\int \normK{k(.,x)} \diff |\mu|(x) < \infty$.
Unfortunately, the Bochner-integral is difficult to generalise to arbitrary distributions. So we will use a more general integral: the \emph{weak}- (or \mbox{\emph{Pettis}-)} integral.
\begin{remark}
Alternatively, one may be tempted to see $\int k(\hat{s},x) \diff \mu(x)$ as a parametric integral with parameter $s$. (This corresponds to replacing the condition $\forall f \in \HH_{\K}$ in the upcoming Equations~\ref{eq:WICharacterization} and \ref{eq:KMECharacterisation} by the condition $\forall k(.,s) , s \in \mathcal{X}$.) However, even though the integral may be defined for any parameter value $s$, the resulting function need not be in the RKHS (see Appendix~\ref{sec:Parametric}). Thus this notion of integrability is too weak for KMEs.
\end{remark}
\begin{definition}[Weak Integral and KME]
Let $D$ be a linear form over a \gls{lcv} TVS of functions $\mathcal{F}$. Let $\function{\vec{\varphi}}{\mathcal{X}}{\HH_{\K}}{}{}$ be an RKHS-valued function such that for any $f \in \HH_{\K}$, $\ipdK{f}{\vec \varphi(\hat x)} \in \mathcal{F}$.
Then $\function{\vec{\varphi}}{\mathcal{X}}{\HH_{\K}}{}{}$ is said to be weakly integrable \gls{wrt} $D$ if there exists a function in $\HH_{\K}$, noted $\int \vec{\varphi}(x) \diff D(x)$ or $D(\vec \varphi)$, such that
\begin{equation}\label{eq:WICharacterization}
\forall f \in \HH_{\K}, \qquad \ipdK{f}{\int \vec{\varphi}(x) \diff D(x)} = \int \ipdK{f}{\vec{\varphi}(x)} \diff \bar D(x) \, .
\end{equation}
If $\vec{\varphi}$ is weakly integrable \gls{wrt} $D$ (or \gls{wrt} any $D$ in a set of linear forms $\mathcal{D}$), we say that $D$ (resp.\ $\mathcal{D}$) \emph{embeds} ---or \emph{is embeddable}--- \emph{into $\HH_{\K}$ via $\vec{\varphi}$}. If $\vec{\varphi}(\hat x) = k(.,\hat x)$, we omit the ``via $k(.,\hat x)$'' and call $\int k(.,x)\diff \mu(x)$ the kernel mean embedding (KME) of $\mu$. We note $\Phi_{\vec{\varphi}}$ the map $\function{\Phi_{\vec{\varphi}}}{\mathcal{D}}{\HH_{\K}}{D}{\int \vec \varphi(x) \diff D(x)}$. It is linear, whenever $\mathcal{D}$ is a vector space.
\end{definition}
This definition extends the usual Bochner-integral: if $\vec{\varphi}$ is Bochner-integrable \gls{wrt} a Radon measure $\mu$, then, for any $f \in \HH_{\K}$, the function $\ipdK{f}{\vec \varphi(\hat x)}$ is $\mu$-(Lebesgue-)integrable and $\vec \varphi$ is weakly integrable \gls{wrt} $\mu$ \citep[Proposition~2.3.1]{schwabik05}.
In principle, $\mathcal{F}$ could be any \gls{lcv} TVS of functions and $D$ any linear form. For us however, $\mathcal{F}$ will be one of the function spaces defined in Section~\ref{sec:Definitions}, and $D$ a distribution. Furthermore, to define KMEs, we will focus on $\vec \varphi(\hat x) = k(.,\hat x)$. The condition that $\ipdK{f}{\vec \varphi(\hat x)} \in \mathcal{F}$ for any $f \in \HH_{\K}$ then simply becomes $\HH_{\K} \subset \mathcal{F}$. And, remembering that by definition $\int f(x) \diff D(x)$ stands for $D(f)$, Equation~\eqref{eq:WICharacterization} now simply reads:
\begin{equation}\label{eq:KMECharacterisation}
\forall f \in \HH_{\K}, \qquad \ipdK{f}{\int k(.,x) \diff D(x)} = \bar D(f) \, .
\end{equation}
The left side being continuous \gls{wrt} $f$, so is the right-side. Thus $\bar D$ and $D$ are continuous linear forms over $\HH_{\K}$: $D \in \HH_{\K}'$. Conversely, if $D$ is a continuous linear form over $\HH_{\K}$, then, by the Riesz representation theorem (see Appendix~\ref{sec:Reminders}), there exists a unique element $\int k(.,x) \diff D(x) \in \HH_{\K}$, called \emph{the Riesz representer of $\bar D$}, such that \eqref{eq:KMECharacterisation} be satisfied. We just proved
\begin{lemma}\label{lem:KernelEmbedding}
A linear form $D$ over a \gls{lcv} TVS of functions $\mathcal{F}$ embeds into $\HH_{\K}$ \gls{iff} $\HH_{\K} \subset \mathcal{F}$ and if the restriction $D \big|_{\HH_{\K}}$ of $D$ to $\HH_{\K}$ is a continuous linear form over $\HH_{\K}$. In that case $\bar D \big|_{\HH_{\K}}$ is also a continuous linear form over $\HH_{\K}$ and $\int k(.,x) \diff D(x)$ is its Riesz representer.
\end{lemma}
Thus, for an embeddable space $\mathcal{D}$, the embedding map $\emb_{\K}$ is the composition of the following two linear maps:
\begin{equation}\label{eq:EmbeddingMap}
\emb_{\K} : \, \left \{ \
\begin{array}{ccccl}
\mathcal{D} & \longrightarrow & \overline \HH_{\K}' & \longrightarrow & \HH_{\K} \\
& \text{\footnotesize{Conjugate restriction}} & & \text{\footnotesize{Riesz representer}} & \\
D & \longmapsto & \bar D \big |_{\HH_{\K}} & \longmapsto & \int k(.,x) \diff D(x)
\end{array}
\right . \, ,
\end{equation}
where $\overline \HH_{\K}'$ is the conjugate space of $\HH_{\K}'$. It is the space $\HH_{\K}'$, where the scalar multiplication $\function{}{}{}{(\lambda, f')}{\lambda f'}$ is replaced by $\function{}{}{}{(\lambda, f')}{\bar \lambda f'}$. Using $\overline \HH_{\K}'$ instead of $\HH_{\K}'$ is simply a trick for both the conjugate restriction and the Riesz representation maps to become linear instead of anti-linear. $\overline \HH_{\K}'$ contains exactly the same elements as $\HH_{\K}'$. When $\HH_{\K}$ is identified with its dual $\overline \HH_{\K}'$, \emph{the KME $\emb_{\K}$ \emph{is} the complex conjugate of the restriction map (in short: conjugate restriction map) of $\mathcal{D}$ to $\HH_{\K}$.}\footnote{Had we chosen to identify $\HH_{\K}$, not with $\overline \HH_{\K}'$, but with $\HH_{\K}'$ via the \emph{anti-linear} Riesz representation map, then we would end up identifying $\emb_{\K}$, which is a \emph{linear} map, with an anti-linear map!} Furthermore, we have the following obvious but crucial lemma.
\begin{lemma}\label{lem:Transpose}
Let $\mathcal{F}$ be a \gls{lcv} TVS of functions.
If $\HH_{\K} \subset \mathcal{F}$, then the KME is simply the conjugate $\overline \imath^\star$ of the (algebraic) transpose $\imath^\star$ of the canonical embedding $\function{\imath}{\HH_{\K}}{\mathcal{F}}{f}{f}$.
\end{lemma}
The continuity assumption appearing in Lemma~\ref{lem:KernelEmbedding} may seem unpalatable. Unfortunately, whenever $\HH_{\K}$ is infinite dimensional, \emph{non-continuous} linear forms over $\HH_{\K}$ do exist, and those have no Riesz representer. Thus the continuity assumption is necessary. Now we may wonder, how to know if a linear form $D$, for example a distribution, is continuous over $\HH_{\K}$. In practice, we will use the following easy but important result.
\begin{corollary}\label{cor:EmbedDuals}
Let $\mathcal{F}$ be a \gls{lcv} TVS of functions.
If $\HH_{\K} \ensuremath{\hookrightarrow} \mathcal{F}$, then $\mathcal{F}'$ embeds into $\HH_{\K}$.
In particular:
\begin{enumerate}
\item If $\HH_{\K} \subset \Cont{}{}$ (resp.\ $\HH_{\K} \subset \Cont{}{0}$, resp.\ $\HH_{\K} \subset \Cont{}{b}$ ) then $\M_{c}$ (resp.\ $\M_{\! f}$, resp.\ $\M_{\! f}$) embeds into $\HH_{\K}$.
\item If $k \in \Cont{(m,m)}{}$ (resp.\ $k \in \Cont{(m,m)}{0}$, resp.\ $k \in \Cont{(m,m)}{b}$), then $\Dcomp{m}$ (resp.\ $\DLone{m}$, resp.\ $\DLone{m}$) is embeddable into $\HH_{\K}$.
\end{enumerate}
\end{corollary}
\begin{proof}
The first line is a straightforward corollary of lemma~\ref{lem:Transpose}, but may as well be proven directly. Indeed, suppose that $\HH_{\K} \ensuremath{\hookrightarrow} \mathcal{F}$. Let $D \in \mathcal{F}'$ and let $f, f_1, f_2, \ldots \in \HH_{\K}$. If $f_n \rightarrow f$ in $\HH_{\K}$ then $f_n \rightarrow f$ in $\mathcal{F}$, thus $D(f_n) \rightarrow D(f)$. Thus $D$ is a continuous linear form over $\HH_{\K}$. The ``in particular'' part then follows from Propositions~\ref{prop:HKinC} and \ref{prop:HKinCm}.
\end{proof}
\begin{remark}
Anticipating on Section~\ref{sec:Topology}, let us already note that if $\HH_{\K} \ensuremath{\hookrightarrow} \mathcal{F}$, meaning that the canonical embedding map $\imath$ is continuous, then (the conjugate of) its transpose is also continuous: the KME is thus continuous over $\mathcal{F}'$.
\end{remark}
For some machine learning algorithms, it is interesting when KMEs are injective. This leads to
\begin{definition}[Characteristic Kernel]
Let $\mathcal{D}$ be a set of linear forms that embed into an RKHS $\HH_{\K}$.
The kernel $k$ will be said \emph{characteristic to $\mathcal{D}$} if the embedding $\function{\emb_{\K}}{\mathcal{D}}{\HH_{\K}}{D}{\int k(.,x) \diff D(x)}$ is injective.
When $\mathcal{D} = \mathcal{P}$, $k$ is simply said \emph{characteristic}.
\end{definition}
Diagram~\eqref{eq:EmbeddingMap} shows that a kernel is characteristic to an embeddable set $\mathcal{D}$ \gls{iff} the conjugate restriction map $\function{}{}{}{D}{\bar D\big|_{\HH_{\K}}}$ (or equivalently simply the restriction map $\function{}{}{}{D}{D\big|_{\HH_{\K}}}$) is injective. When $\mathcal{D}$ is a dual of a space $\mathcal{F}$ that contains $\HH_{\K}$, it suggests to characterise characteristic kernels over $\mathcal{D}$ by checking whether there are ``enough'' functions in $\HH_{\K}$ to uniquely define a distribution $D \in \mathcal{D}$ by its values taken on $\HH_{\K}$. ``Enough'' will be when $\HH_{\K}$ is dense in $\mathcal{F}$.
\subsection{Duality Links Universal and Characteristic Kernels\label{sec:UniversalAndCharacteristic}}
Suppose that $\HH_{\K} \ensuremath{\hookrightarrow} \mathcal{F}$. If $\HH_{\K}$ is dense in $\mathcal{F}$ (i.e., if $k$ is universal over $\mathcal{F}$), any $D \in \mathcal{F}'$ is completely determined by its values taken over $\HH_{\K}$. Thus the (conjugate) restriction map is injective.
Conversely, if $\HH_{\K}$ is not dense in $\mathcal{F}$ ($k$ is not universal over $\mathcal{F}$), then, by definition, its closure $\widetilde{\HH_{\K}}$ in $\mathcal{F}$ is strictly smaller than $\mathcal{F}$. Then, as a direct corollary\footnote{It is in this corollary that one uses the local convexity of $\mathcal{F}$. See Corollary~3 of the Hahn-Banach Theorem by \citet{treves67}.} of the Hahn-Banach Theorem, one can construct a distribution $D \in \mathcal{F}'$ that is identically null on $\widetilde{\HH_{\K}}$ and non-null outside: $D \neq 0$ but $\bar D \big |_{\HH_{\K}} =0$. So the (conjugate) restriction map is not injective. We just proved
\begin{theorem}[Universal and Characteristic Kernels\label{theo:UniversalMeansCharacteristic}]
Let $\mathcal{F}$ be a \gls{lcv} TVS such that $\HH_{\K} \ensuremath{\hookrightarrow} \mathcal{F}$.
The kernel $k$ is universal over $\mathcal{F}$ \gls{iff} it is characteristic to $\mathcal{F}'$.
\end{theorem}
In particular, if $\HH_{\K}$ is continuously contained in $\Cont{m}{0}$ (resp.\ $\Cont{m}{}$), then $k$ is $c^m_0$- (resp.\ \mbox{$c^m$-)} universal \gls{iff} it is characteristic to $\DLone{m}$ (resp.\ $\Dcomp{m}$). Theorem~\ref{theo:UniversalMeansCharacteristic} generalises Theorems~3 and~16 from \citet{sriperumbudur10a}, which respectively correspond to the case $\mathcal{F}=\Cont{}{0}$ and $\mathcal{F}=\Cont{}{}$. Table~\ref{tab:UCS} illustrates the wide range of applications of Theorem~\ref{theo:UniversalMeansCharacteristic}.
\begin{table}[t]
\renewcommand{\arraystretch}{1.5}
\begin{tabu} to \linewidth {X[$$,c]X[$$,c]X[$$,c]X[2.75,c]X[1.95c]}
\hline
\toprule
\mathrm{Universal} & \mathrm{Characteristic} & \mathrm{S.P.D.} & Usual Name & Proof \\
\midrule
\mathcal{F} & \mathcal{F}' & \mathcal{F}' & / & Th.\ref{theo:UniversalMeansCharacteristic} \& P.\ref{prop:SPD} \\
\complex^\inputS & \M_{\delta} & \M_{\delta} & \gls{spd} & Th.\ref{theo:UniversalMeansCharacteristic} \& P.\ref{prop:SPD} \\
\complex^\inputS/\mathbbm{1} & \M_{\delta}^0 & \M_{\delta}^0 & conditionally \gls{spd} & P.\ref{prop:UniversalityForP} \& R.\ref{rem:M0} \& P.\ref{prop:SPD}\\
\Cont{}{} & \M_{c} & \M_{c} & $c$-universal (or $cc$-universal) & Th.\ref{theo:UniversalMeansCharacteristic} \& P.\ref{prop:SPD} \\
\Cont{}{0} & \M_{\! f} & \M_{\! f} & $c_0$-universal & Th.\ref{theo:UniversalMeansCharacteristic} \& P.\ref{prop:SPD} \\
(\Cont{}{b})_c & \M_{\! f} & \M_{\! f} & $\int$spd & Th.\ref{theo:UniversalMeansCharacteristic} \& P.\ref{prop:SPD} \\
((\Cont{}{b})_c)/\mathbbm{1} & \mathcal{P} \ (\text{or } \M_{\! f}^0) & \M_{\! f}^0 & characteristic & L.\ref{lem:CharacteristicAndM0} \& P.\ref{prop:UniversalityForP} \\
\Lp{q} & \Lp{q'} & \Lp{q'} & / & Th.\ref{theo:UniversalMeansCharacteristic} \& P.\ref{prop:SPD} \\
\Cont{m}{} & \Dcomp{m} & \Dcomp{m} & $c^m$-universal & Th.\ref{theo:UniversalMeansCharacteristic} \& P.\ref{prop:SPD} \\
\Cont{m}{0} & \DLone{m} & \DLone{m} & $c^m_0$-universal & Th.\ref{theo:UniversalMeansCharacteristic} \& P.\ref{prop:SPD} \\
(\Cont{m}{b})_c & \DLone{m} & \DLone{m} & / & Th.\ref{theo:UniversalMeansCharacteristic} \& P.\ref{prop:SPD} \\
\Sobo{m,q}{0} & \ \Sobo{-m,q'}{0} & \ \Sobo{-m,q'}{0} & / & Th.\ref{theo:UniversalMeansCharacteristic} \& P.\ref{prop:SPD} \\
\bottomrule
\hline
\end{tabu}
\caption{\label{tab:UCS}Equivalence between the notions of universal, characteristic and \gls{spd} kernels. This table is to be read: ``If $\HH_{\K}$ continuously embeds into \emph{Column 1}, then $k$ is universal over \emph{Column~1} \gls{iff} it is characteristic to \emph{Column~2} and iff it is \gls{spd} over \emph{Column~3}. See \emph{Column~4}.'' Here, $q<\infty$, $m \in \mathbb{N} \cup \{ \infty \}$, and Th,P,R stand for Theorem, Proposition and Remark. The case of $\mathcal{P}$ (last row) is not directly covered by Theorem~\ref{theo:UniversalMeansCharacteristic} and Proposition~\ref{prop:SPD}, because it is not even a vector space.}
\end{table}
In general, the assumption that $\HH_{\K} \ensuremath{\hookrightarrow} \mathcal{F}$ cannot be dropped ---at least, not the assumption $\HH_{\K} \subset \mathcal{F}$. Indeed, if $k$ is a universal kernel over $\Cont{}{0}$, then the kernel $k + 1$ is characteristic to $\M_{\! f}$ (because \gls{ispd}, see Section~\ref{sec:SPD}). But $\HH_{\K}$ is not contained in $\Cont{}{0}$.
Theorem~\ref{theo:GeneralExistence} and its corollary will show that $c_0^m$-universal kernels do exist. Their proof use results from sections to come, which establish basic calculus rules for embedded distributions.
\section{Distributional Calculus\label{sec:Calculus}}
This section's primary goal is to show the following calculus rules and a few implications. For any embeddable distributions $D$ and $T$ and any distribution $D$ such that $\partial^p D$ is embeddable,
\begin{enumerate}[label = (R\arabic*), leftmargin = 4em]
\item $\ipdK{f}{\int k(.,x) \diff D(x)} = \int \ipdK{f}{k(.,x)} \diff D(x)$ (Definition of embedding / weak integral) \label{rule1}
\item $\ipdK{\emb_{\K}(D)}{\emb_{\K}(T)} = \int k(x,y) \diff D(y) \diff \bar{T}(x)$ (Fubini) \label{rule2}
\item $\emb_{\K}(\partial^p S) = (-1)^{|p|} \int \partial^{(0,p)}k(.,x) \diff S(x)$ (Differentiation). \label{rule3}
\end{enumerate}
Rule~\ref{rule1} holds by definition of an embedding. So let us move directly to Rule~\ref{rule2}.
\subsection{Inner Product and Norm of Embeddings}
If $D$ and $T$ are two embeddable distributions for a kernel $k$, we write:
\begin{align*}
\ipdK{D}{T} &:= \ipdK{\emb_{\K}(D)}{\emb_{\K}(T)} \\
\normK{D} &:= \normK{\emb_{\K}(D)} \, .
\end{align*}
Note that this induces a new metric on the set of embeddable distributions (see Section~\ref{sec:Topology}).
\begin{theorem}[Fubini] \label{theo:Fubini}
Let $D,T$ be two embeddable distributions into $\HH_{\K}$. Then:
\begin{align}
\ipdK{D}{T} &= \iint k(x,y) \diff D(y) \diff \bar T(x) = \iint k(x,y) \diff \bar T(x) \diff D(y) \label{eq:FubiniIP} \\
\normK{D}^2 &= \iint k(x,y) \diff D(y) \diff \bar D(x) = \iint k(x,y) \diff \bar D(x) \diff D(y) \, , \nonumber
\end{align}
where $ \iint k(x,y) \diff D(y) \diff \bar T(x)$ is to be interpreted as $\bar T_x(\mathcal{I}_{\hat x})$ with $\mathcal{I}_x = D_y(k(x, \hat y))$.
\end{theorem}
\begin{proof}
See Appendix~\ref{proof:Fubini}.
\end{proof}
We will also use the tensor product notation
\begin{equation*}
[\bar{T} \otimes D](k) := [\bar{T}_x \otimes D_y](k) := \iint k(x,y) \diff \bar{T}(x) \diff D(y) = \ipdK{D}{T} \, .
\end{equation*}
\subsection{Application to Strict Positive Definiteness\label{sec:SPD}}
\begin{definition}[S.P.D.]
A kernel $k$ is said \gls{spd} over a set of distributions $\mathcal{D}$ if $D$ is embeddable into $\HH_{\K}$ and if for any $D \in \mathcal{D}$,
\begin{equation}\label{eq:SPD}
\normK{D}^2 = 0 \qquad \Rightarrow \qquad D=0 \, .
\end{equation}
Following the tradition, when $\mathcal{D} = \M_{\delta}$, we simply call $k$ \gls{spd} When $\mathcal{D} = \M_{\! f}$, $k$ is said\glsreset{ispd} \gls{ispd}.
\end{definition}
\begin{remark}
By definition, a kernel is \gls{spd} over $\mathcal{D}$ \gls{iff} the semi-norm induced by $k$ in $\mathcal{D}$ is a proper norm. Also note that, using Theorem~\ref{theo:Fubini} (Fubini), we may rewrite Equation~\eqref{eq:SPD} as follows.
For any $D \in \mathcal{D}$,
\[
\int k(x,y) \diff D(y) \diff \bar D(x) = 0 \qquad \Rightarrow \qquad D = 0.
\]
\end{remark}
Remembering that by definition, for any embeddable $D$, $\normK{D} := \normK{\emb_{\K}(D)}$, we immediately get:
\begin{proposition}\label{prop:SPD}
For any embeddable \emph{vector space} of distributions $\mathcal{D}$, $k$ is characteristic to $\mathcal{D}$ \gls{iff} it is \gls{spd} over $\mathcal{D}$.
\end{proposition}
In particular, saying that a kernel $k$ is \gls{spd} (resp.\ \gls{ispd}) is equivalent to saying it is characteristic to $\complex^\inputS$ (resp.\ $\M_{\! f}$). Note also that the proposition does not apply to the case where $\mathcal{D}$ is the set of probability measures $\mathcal{P}$. However, Lemma~\ref{lem:CharacteristicAndM0} will show that a kernel is characteristic to $\mathcal{P}$ \gls{iff} it is \gls{spd} over $\M_{\! f}^0 := \{ \mu \in \M_{\! f} \, | \, \int \diff \mu = 0 \}$.
\subsection{Differentiation}\label{sec:Differentiation}
Let us now turn towards differentiation. We start with an easy, but useful lemma proved in Appendix~\ref{proof:VectorDiff}.
\begin{lemma}\label{lem:VectorDiff}
Let $k \in \Cont{(m,m)}{}$ and $\vec \varphi_{k}(\hat x) = k(.,\hat x)$. The RKHS-valued function $\vec \varphi_{k}$ is $m$-times continuously differentiable and $\partial^p \vec \varphi_{k} = \partial^{(0,p)} k$.
\end{lemma}
This lemma is used in Remark~\ref{rem:DiffIntro} to give a concise interpretation of the following theorem (shown in Appendix~\ref{proof:Differentiation}).
\begin{theorem}\label{theo:Differentiation}
Let $k \in \Cont{(m,m)}{}$ and $p \in \mathbb{N}^d$ such that $|p| \leq m$.
A distribution $D$ embeds into $\HH_{\K}$ via $\partial^{(0,p)} k$ \gls{iff} $\partial^p D$ embeds into $\HH_{\K}$ via $k$. In that case,
\begin{equation*}\label{eq:DiffLong}
\emb_{\K}(\partial^p D) = (-1)^{|p|} \int [\partial^{(0,p)} k](.,x) \diff D(x) = (-1)^{|p|} \, \Phi_{\partial^{(0,p)} k}(D) \, .
\end{equation*}
\end{theorem}
\begin{remark}\label{rem:DiffIntro}
Noting $\vec \varphi_{k}(\hat x) = k(.,\hat x)$, Equation~\eqref{eq:DiffLong} reduces to
$\partial^p D (\vec \varphi_{k}) = (-1)^{|p|} D(\partial^p \vec \varphi_{k}) \, .$
A sufficient condition for this equality to hold is $D \in \Cont{m - |p|}{*}$. Taking $D = \delta_x$ proves Equation~\eqref{eq:DiffIntro} from the introduction: by definition, $\delta_x(\partial^p \vec \varphi_{k}) = \partial^p \vec \varphi_{k}(x)$ and $\partial^p \delta_x (\vec \varphi_{k}) = \emb_{\K}(\partial^p \delta_x)$.
\end{remark}
This result has two important practical applications.
First and foremost, it gives a concrete way to numerically calculate the KME of a distribution $D$. Indeed, consider the case where $D$ is a measure $\mu$. Equation~\eqref{eq:DiffLong} shows we may compute the embedding of $\partial^p \mu$ using only integration \gls{wrt} $\mu$. In other words, we have reduced the computation of an integral \gls{wrt} the distribution $\partial^p \mu$ to an integral \gls{wrt} the measure $\mu$. And this trick applies integrable to any embeddable and integrable distribution, because \citep[around p.100]{schwartzFDVV}
\begin{proposition} \label{prop:RepresentationOfDLone}
For any $m \leq \infty$ and any distribution in $D \in (\Cont{m}{0})'$ (resp.\ $D \in (\Cont{m}{})'$) there exists a \emph{finite} family of measures $\mu_p \in \M_{\! f}$ (resp.\ $\mu \in \M_{c}$), with $p \in \mathbb{N}^d$, $|p| \leq m$, such that $D = \sum_{|p| \leq m} \partial^p \mu_p$.
\end{proposition}
A second application is the following.
Suppose we could easily measure the values of a function $f$ (say the location of a particle), but not of its derivative $\partial f$ (the speed). But we want the KME of $\partial f$.
Then Theorem~\ref{theo:Differentiation} asserts that, under suitable assumptions on $f$, instead of measuring $\partial f$ and embed it, we can measure $f$, embed it and differentiate the embedding.
Let us now show how embeddings in $\HH_{\K}$ relate to those in $\HH_{\partial^{(p,p)} \K}$. The following proposition, proved in Appendix~\ref{proof:Isometry}, shows that $\HH_{\partial^{(p,p)} \K}$ is isometrical to a subspace of $\HH_{\K}$.
\needspace{4\baselineskip}
\begin{proposition}\label{prop:Isometry}
Let $k \in \Cont{(m,m)}{}$ and $p \in \mathbb{N}^d$ with $|p| \leq m$. Define $\HH_{\partial^{(0,p)} \K}$ to be the closed subspace in $\HH_{\K}$ generated by $\partial^{(0,p)}k (., x)$ when $x \in \mathcal{X}$:
\begin{equation*}
\HH_{\partial^{(0,p)} \K} := \overline{\lin \{\partial^{(0,p)} k(.,x) \, | \, x \in \mathcal{X} \}} \subset \HH_{\K} \, .
\end{equation*}
Then the following defines a bijective isometry from $\HH_{\partial^{(0,p)} \K}$ onto $\HH_{\partial^{(p,p)} \K}$:
\begin{equation*}
\function{\Dp}{\HH_{\partial^{(0,p)} \K}}{\HH_{\partial^{(p,p)} \K}}{f}{\partial^p f} \,
\end{equation*}
\end{proposition}
Obviously $\HH_{\partial^{(0,p)} \K}$ is a closed subset of $\HH_{\K}$, but is it a proper subset? Let us focus on the case where $k \in \Cont{(m,m)}{0}$. Assume that $|p| = 1$, say $p = (p_1, 0, \ldots, 0) \in \mathbb{N}^d$. As, for any $f \in \HH_{\K}$, $\ipdK{f}{\partial^p k(.,x)} = \partial^p f(x)$, the orthogonal complement $\HH_{\partial^{(0,p)} \K}^\perp$ of $\HH_{\partial^{(0,p)} \K}$ is contained in the set of functions that do not depend on the first coordinate. Thus, for example, if $\mathcal{X}$ is 1-dimensional ($d=1$), then $\HH_{\partial^{(0,p)} \K}^\perp$ is also at most 1-dimensional. And obviously, if $\HH_{\K} \subset \Cont{m}{0}$, then it is even $\{0\}$. And by recurrence on $|p|$, we get
\begin{theorem}\label{theo:Isometry}
Let $k \in \Cont{(m,m)}{0}$ and $p \in \mathbb{N}^d$ such that $|p| \leq m$. Then $\HH_{\partial^{(0,p)} \K} = \HH_{\K}$. $\HH_{\K}$ and $\HH_{\partial^{(p,p)} \K}$ are then isometrically isomorphic via $\Dp$, the partial derivation operator.
\end{theorem}
\begin{remark}
In geostatistics, one often considers the subspace $\HH_{\K}^0$ of $\HH_{\K}$ defined as the closure of $\{ \sum_{i = 1}^n \lambda_i k(.,x_i) \, | \, n \in \mathbb{N}, \, x_i \in \mathcal{X}, \, \lambda_i \in \mathbb{C}, \, \sum_{i =1}^n \lambda_i = 0 \}$. If $k \in \Cont{(m,m)}{}$, it is not difficult to see that $\HH_{\partial^{(0,p)} \K} \subset \HH_{\K}^0$. Thus, if $k \in \Cont{(m,m)}{0}$, $\HH_{\K}^0 = \HH_{\K}$. So when doing so-called \emph{intrinsic kriging}, as opposed to \emph{simple kriging} (i.e.\ with a known mean, see specialised literature such as \citealp{chiles12} and \citealp{wackernagel03}), we solve two different minimisation problems, yet, when $\HH_{\K} \subset \Cont{}{0}$, we look for solutions that lie in the same set of functions $\HH_{\K}$.
\end{remark}
\needspace{5\baselineskip}
\begin{proposition}[Switches of Derivation and Integration]\label{prop:IntDiffSwitch}
Let $k \in \Cont{(m,m)}{}$, $p \in \mathbb{N}^d$ such that $|p| \leq m$ and let $D$ be a distribution. Consider the following three statements.
\begin{enumerate}
\item $\partial^p D$ embeds into $\HH_{\K}$ via $k$. \label{pPoint1}
\item $D$ embeds into $\HH_{\K}$ via $\partial^{(0,p)} k$. \label{pPoint2}
\item $D$ embeds into $\HH_{\partial^{(p,p)} \K}$ via $\partial^{(p,p)} k$. \label{pPoint3}
\end{enumerate}
Conditions \ref{pPoint1} and \ref{pPoint2} are equivalent, and they imply \ref{pPoint3}.
If they are satisfied, then
\begin{equation}\label{eq:IntDiffSwitch}
(-1)^{|p|} \partial^p \emb_{\K}(\partial^p D) = \partial^p \Phi_{\partial^{(0,p)} k}(D) = \Phi_{\partial^{(p,p)} k}(D) \, .
\end{equation}
Additionally, if $k \in \Cont{(m,m)}{0}$, then all three conditions are equivalent.
\end{proposition}
This proposition, proved in Appendix~\ref{proof:IntDiffSwitch}, calls for some comments. First, Equation~\eqref{eq:IntDiffSwitch} states in particular, that the integration and derivation signs may be switched:
\begin{equation*}
\partial^p [\int \partial^{(0,p)} k(.,x) \diff D(x)] = \int \partial^{(p,p)} k(., x) \diff D(x) \, .
\end{equation*}
Second, when $k \in \Cont{(m,m)}{0}$, the function $\Phi_{\partial^{(0,p)} k}(D)$ is \emph{the only} primitive of $\Phi_{\partial^{(p,p)} k}(D)$ contained in $\HH_{\K}$: it is the primitive that converges to 0 at infinity. This confirms what we already knew: $\Dp$ is injective. Third, in general, even if the conditions \ref{pPoint1}-\ref{pPoint3} are met, the distribution $D$ may not embed into $\HH_{\K}$ via $k$. Because even if a distribution $\partial^p D$ is in $\DLone{m-|p|}$, the distribution $D$, or any other primitive of order $p$ of $\partial^p D$, may not be in $\DLone{m}$.
\begin{example}
Consider the Gaussian kernel $k(\hat x, \hat y) = e^{(\hat x - \hat y)^2}$ over $\mathcal{X} = \mathbb{R}$ and the measure $D = \arctan x \diff x$. Then $D \in \DLone{1}$, $\partial D = \frac{\diff x}{1+x^2} \in \DLone{0}$ and $\partial D$ embeds into $\HH_{\K}$; but $D$ does not. For if it did, the function $\function{}{}{}{y}{\int k(y, x) \arctan x \diff x}$ would vanish at infinity, because $\HH_{\K} \subset \Cont{}{0}$. But, when $y \rightarrow +\infty$, it converges to a strictly positive real
\end{example}
Noting that for stationary kernels, $\partial^{(0,p)} k(\hat x,\hat y) = (-1)^{|p|} \, \partial^p \psi (\hat x - \hat y)$, we get the following relation between the embedding of the derivative and the derivative of the embedding.
\begin{corollary}[For Stationary Kernels]
Suppose that the kernel $k \in \Cont{(m,m)}{}$ be stationary and that assumptions \ref{pPoint1}-\ref{pPoint3} of Proposition~\ref{prop:IntDiffSwitch} are met. Then
\begin{equation*}
\emb_{\K}(\partial^p D) = \partial^p [\emb_{\K}(D)].
\end{equation*}
\end{corollary}
Another corollary, proved in Appendix~\ref{proof:dpMandMCharacteristic}, is the following.
\begin{corollary}\label{cor:dpMandMCharacteristic}
Let $k \in \Cont{(m,m)}{}$ and $p \in \mathbb{N}^d$ such that $|p| \leq m$. Let $\mathcal{D}$ be a set of distributions such that the set $\partial^p \mathcal{D} := \{ \partial^p D \, | \, D \in \Dall{} \}$ embeds into $\HH_{\K}$. Then the kernel $\partial^{(p,p)} k$ is characteristic to $\mathcal{D}$ \gls{iff} it is characteristic to $\partial^p \mathcal{D}$.
\end{corollary}
When $k \in \Cont{(m,m)}{0}$ (resp.\ $k \in \Cont{(m,m)}{}$), this corollary applies in particular to any subset $\mathcal{D}$ of $\DLone{m - |p|}$ (resp.\ $\Dcomp{m - |p|}$). This will play an important role in the proofs of Theorems~\ref{theo:GeneralExistence} and~\ref{theo:GeneralExistenceCompact}, that show the existence of $c^\infty_0$- and $c^\infty$-universal kernels.
\section{The Set of Probability Measures \texorpdfstring{$\mathcal{P}$}{P}}\label{sec:ProbabilityMeasures}
So far, we focused on the properties of distribution embeddings in general, putting a special emphasis on duals of function spaces, such as $\M_{\! f}$ or its generalisations $\DLone{m}$. In most applications, however, one only wants to embed probability measures. And, although the set of probability measures $\mathcal{P}$ is not a vector space, the same questions as before arise. In particular: when is a kernel characteristic, not over all $\M_{\! f}$, but solely over the set of probability measures $\mathcal{P}$? As $\mathcal{P} \subset \M_{\! f}$, it is clear that if $k$ is characteristic to $\M_{\! f}$ ---i.e., if $k$ is \gls{ispd}--- then it is characteristic to $\mathcal{P}$. In Section~\ref{sec:CandISPD} we show that the converse does not hold and give an astonishingly simple characterisation of characteristic kernels. Section~\ref{sec:MprobAndUniversality} then gives a second, more theoretical characterisation that complements Section~\ref{sec:UniversalAndCharacteristic}.
\\
Before we start, we make some important preliminary observations about characteristic kernels.
The set of probability measures lies in the (closed) affine hyperplane $\M_{\! f}^1$ of $\M_{\! f}$ given by the equation $\mu(\mathbbm{1}) = 1$, where $\mathbbm{1}$ is the constant function that equals $1$: $\M_{\! f}^1 := \{ \mu \in \M_{\! f} \, | \, \mu(\mathbbm{1}) = 1\}
. $\mathcal{P}$ is not equal to $\M_{\! f}^1$. But when translated by, say, $-\delta_x$ ($x \in \mathcal{X}$) to lie in the hyperplane $\M_{\! f}^0 := \{ \mu \in \M_{\! f} \, | \, \mu(\mathbbm{1}) = 0\}$, its linear span spans the whole hyperplane $\M_{\! f}^0$ : $\lin (\mathcal{P} - \delta_x) = \M_{\! f}^0$. Thus:
\begin{lemma} [Important!] \label{lem:CharacteristicAndM0}
A kernel $k_0$ is characteristic to $\mathcal{P}$ (resp.\ $\mathcal{P}_{c} := \mathcal{P} \cap \M_{c}$) \gls{iff} it is characteristic to the closed hyperplane $\M_{\! f}^0:= \{ \mu \in \M_{\! f} \, | \, \mu(\mathbbm{1}) = 0\}$ in $\M_{\! f}$ (resp.\ $\M_{c}^0:= \M_{\! f}^0 \cap \M_{c}$ in $\M_{c}$).
\end{lemma}
Being given a kernel $k$ is equivalent to being given its KME $\emb_{\K}$ (over a set containing at least $\M_{\delta}$): the former defines the latter by construction, and the latter defines the former because
\begin{equation*}
k(x,y) = \ipdK{\emb_{\K}(\delta_y)}{\emb_{\K}(\delta_x)} =: \ipdK{\delta_y}{\delta_x} \, .
\end{equation*}
Thus, informally speaking, Lemma~\ref{lem:CharacteristicAndM0} shows that a characteristic kernel $k_0$ is ``almost'' \gls{ispd} Both the KME of a characteristic and the KME of an \gls{ispd} kernel are injective over $\M_{\! f}^0$. But the first need not be injective over $\M_{\! f}$: there might be one single line in $\M_{\! f}$, not contained in $\M_{\! f}^0$ and mapped to the null function of $\mathcal{H}_{k_0}$. This suggests that, from an \gls{ispd} kernel $k$, it is easy to construct a characteristic kernel $k_0$ that is not \gls{ispd} anymore (Proposition~\ref{prop:ISPDtoC}): consider its embedding $\emb_{\K}$, choose a direction $\nu_0 \in \M_{\! f} \backslash \M_{\! f}^0$, and construct a new embedding $\Phi_{k_0}$ that equals $\emb_{\K}$ on $\M_{\! f}^0$, but maps $\nu_0$ to the null-function. The kernel associated to this new embedding is characteristic but not \gls{ispd} Conversely, it also suggests that, given a characteristic kernel $k_0$ that is not already \gls{ispd}, one may easily construct an \gls{ispd} kernel (Proposition~\ref{prop:CtoISPD}): add 1 dimension to $\mathcal{H}_{k_0}$, and construct an embedding $\emb_{\K}$ that coincides with $\Phi_{k_0}$ on $\M_{\! f}^0$ but maps $\nu_0$ to the additional new dimension. Thus, contrary to $\Phi_{k_0}$, $\emb_{\K}$ does not identify all measures parallel to $\nu_0$ and is thus injective over $\M_{\! f}$. By definition, its associated kernel $k$ is then \gls{ispd} These considerations will lead to the characterisation of characteristic kernels given in Theorem~\ref{theo:CKCharacterisation}.
\subsection{\texorpdfstring{\GLS{spd}}{S.P.D.} Kernels and Kernels Characteristic to \texorpdfstring{$\mathcal{P}$}{P}\label{sec:CandISPD}}
\begin{proposition}[Characteristic $\not \Rightarrow$ \gls{ispd}] \label{prop:ISPDtoC}
Let $k$ be an \gls{ispd} kernel or, equivalently, a characteristic kernel over $\M_{\! f}$. Let $\nu_0 \in \M_{\! f}$ such that $\nu_0(\mathbbm{1}) \neq 0$.
Define, for any $x,y \in \mathcal{X}$, the kernel $k_0(x,y) := \ipdK{\delta_x - \nu_0}{\delta_y - \nu_0}$.
Then $k_0$ embeds $\M_{\! f}$, but is not characteristic to $\M_{\! f}$. However, $k_0$ and $k$ induce the same semi-metric $d_{k}$ in $\M_{\! f}^0$ and $\mathcal{P}$. Thus $k_0$ is a kernel that is characteristic to $\mathcal{P}$, but not over $\M_{\! f}$.
\end{proposition}
For instance, taking $z_0 \in \mathcal{X}$ and $\nu_0 = \delta_{z_0}$ leads to $k_0(x,y) = k(x,y) - k(x,z_0) - k(z_0,y) + k(z_0,z_0)$. As $\Phi_{k_0}(\delta_{z_0}) = 0$, this example shows the following
\begin{corollary}[Characteristic $\not \Rightarrow$ \gls{spd}]
There exist characteristic kernels, which are not strictly positive definite.
\end{corollary}
\begin{proof}{(of Proposition~\ref{prop:ISPDtoC})}
$k_0$ is a kernel, because it is of the form $\ipdK{\vec \varphi(x)}{\vec \varphi(y)}$, for the map $\function{\vec \varphi}{\mathcal{X}}{\HH_{\K}}{x}{\emb_{\K}(\delta_x-\nu_0)}$.
As $\Phi_{k_0}(\nu_0) = 0$, it is not characteristic to $\M_{\! f}$. To prove that $k$ and $k_0$ induce the same semi-metric in $\M_{\! f}^0$ (and thus in $\mathcal{P}$ by Lemma~\ref{lem:CharacteristicAndM0}), simply notice the following. The kernel $k_0$ verifies: $k_0(x,y) = k(x,y) + \psi(x) + \bar \psi(y)$ for some function $\function{\psi}{\mathcal{X}}{\mathbb{C}}{}{}$. Using Theorem~\ref{theo:Fubini} (Fubini), we thus get, for any $\mu \in \M_{\! f}^0$
\begin{equation*}
\norm{\mu}_{k_0} = [\bar \mu_x \otimes \mu_y](k(x,y) + \psi(x) + \bar \psi(y))
= [\bar \mu \otimes \mu](k) + 0 + 0
= \normK{\mu} \,. \vspace{-1.8em}
\end{equation*}
\end{proof}
With their Example~1, \citet{sriperumbudur11} already exhibited a kernel that is characteristic but not \gls{spd} and a fortiori not \gls{ispd} But their construction may seem somewhat abstruse. Proposition~\ref{prop:ISPDtoC} on the contrary not only gives an easy and systematic way to construct a characteristic but non-\gls{ispd} kernel, but the next proposition ---the converse--- shows that \emph{all} such kernels can be constructed with this procedure!
\begin{proposition}[Characteristic is ``almost'' \gls{ispd}] \label{prop:CtoISPD}
Let $k_0$ be a characteristic kernel to $\mathcal{P}$.
Then there exists a kernel $k$ and a measure $\nu_0 \in \M_{\! f}$ such that, $k_0(\hat x,\hat y) = \ipdK{\delta_{\hat x} - \nu_0}{\delta_{\hat y} - \nu_0}$.
\end{proposition}
\begin{remark}
Both in Proposition~\ref{prop:ISPDtoC} and \ref{prop:CtoISPD} we may replace ``characteristic (to $\mathcal{P}$ or $\M_{\! f}^0$)'' and ``\gls{ispd}'' (i.e.\ ``characteristic to $\M_{\! f}$'') by respectively ``characteristic to $\mathcal{M}^0$'' and ``characteristic to $\mathcal{M}$'', where $\mathcal{M}$ is $\M_{\delta}$ or any embeddable $\Dcomp{m}$ or $\DLone{m}$, and $\mathcal{M}^0 := \{ \mu \in \mathcal{M} \, | \, \int \diff \mu = 0 \}$.
Note that $k_0$ and $k$ define the same equivalence class of \gls{cpd} kernels (see Remark~\ref{rem:EquivClassCPD} in Appendix~\ref{sec:CPD}).
\end{remark}
We prove Proposition~\ref{prop:CtoISPD} in Appendix~\ref{proof:CtoISPD}. Minor changes in this proof (see Appendix~\ref{proof:CKCharacterisation}) yield the following, seemingly more general and astonishingly simple characterisation of characteristic kernels. Surprisingly, we could not find any similar statement in the literature.
\needspace{5\baselineskip}
\begin{theorem}[Characterisation of Characteristic Kernels] \label{theo:CKCharacterisation}
Let $k_0$ be a kernel. The following conditions are equivalent.
\begin{enumerate}
\item $k_0$ is characteristic to $\mathcal{P}$.
\item $k_0$ is characteristic to $\M_{\! f}^0$.
\item There exists $\epsilon \in \mathbb{R}$ such that the kernel $k(\hat x,\hat y):= k_0(\hat x, \hat y) + \epsilon^2$ is characteristic to $\M_{\! f}$ (i.e.\ \gls{ispd} over $\M_{\! f}$).
\item For all $\epsilon \in \mathbb{R}\backslash\{0\}$, the kernel $k(\hat x,\hat y):= k_0(\hat x, \hat y) + \epsilon^2$ is characteristic to $\M_{\! f}$
\item There exists an RKHS $\HH_{\K}$ with kernel $k$ and a measure $\nu_0 \in \M_{\! f}\backslash\M_{\! f}^0$ such that $k$ is characteristic to $\M_{\! f}$, and $k_0(\hat x, \hat y) = \ipdK{\delta_{\hat x} - \nu_0}{\delta_{\hat y} - \nu_0}$.
\end{enumerate}
If these conditions are met, then $k_0$ and $k$ induce the same semi-metric $d_{k}$ in $\M_{\! f}^0$ and in $\mathcal{P}$.
\end{theorem}
\subsection{Characteristic Kernels to \texorpdfstring{$\mathcal{P}$}{P}: Characterisation in Terms of Universality\label{sec:MprobAndUniversality}}
This section is a complement to Theorem~\ref{theo:UniversalMeansCharacteristic}. The latter applies to dual spaces but not necessarily to strict subsets. In particular, Theorem~\ref{theo:UniversalMeansCharacteristic} does not directly apply to probability measures. Nevertheless, we will now characterise characteristic kernels (to $\mathcal{P}$) in terms of universality.
To do so, consider the space of bounded continuous functions $\Cont{}{b}$. Following \citet{schwartzFDVV}, we equip $\Cont{}{b}$ with a topology $\mathfrak{T}_c$ that is weaker than its usual one.\footnote{An alternative would be to equip $\Cont{0}{b}$ with the so-called \emph{strict topology} \citep[cf.][]{fremlin72}.}
Let $\mathfrak{T}_1$ be the topology induced by $\Cont{}{}$ in $\Cont{}{b}$ and $\mathfrak{T}_2$ the topology of uniform convergence over the compact sets of $\M_{\! f}$. Then we define $\mathfrak{T}_c$ as the smallest topology containing $\mathfrak{T}_1$ and $\mathfrak{T}_2$. We note\footnote{\Citet{schwartzFDVV} uses the symbol $\mathcal{B}^m_c$ rather than $(\Cont{}{b})_c$.} $(\Cont{}{b})_c$ the space $\Cont{}{b}$ equipped with $\mathfrak{T}_c$. In this space, a sequence $(f_n)_{n \in \mathbb{N}}$ converges to $f$ iff
\begin{enumerate}
\item $f_n \rightarrow f$ in $\Cont{}{}$ (i.e., on every compact set $\norm{f_n - f}_{\infty} \rightarrow 0$) and
\item for any compact set $A \subset \M_{\! f}$, $\sup_{\mu \in A} |\mu(f_n - f)| \rightarrow 0$.
\end{enumerate}
The space $(\Cont{}{b})_c$ is complete and its dual is $\M_{\! f}$. The advantage of using $(\Cont{}{b})_c$ instead of $\Cont{}{0}$ as a predual of $\M_{\! f}$ is that $\Cont{}{b}$ contains the constant unit function $\mathbbm{1}$. Thus we can define the quotient space $((\Cont{}{b})_c / \mathbbm{1})$ and may state (and prove in Appendix~\ref{proof:UniversalityForP})
\begin{proposition}\label{prop:UniversalityForP}
Let $k$ be such that $\HH_{\K} \ensuremath{\hookrightarrow} (\Cont{}{b})_c$. Then $k$ is characteristic to $\mathcal{P}$ \gls{iff} $k$ is universal over the quotient space $((\Cont{}{b})_c/\mathbbm{1})$
\end{proposition}
\begin{remark}\label{rem:M0}
Supposing that $\HH_{\K} \ensuremath{\hookrightarrow} ((\Cont{}{b})_c/\mathbbm{1})$ is sufficient. Additionally, Proposition~\ref{prop:UniversalityForP} also holds if, in this whole section, one systematically replaces $\Cont{}{}$, $\Cont{}{b}$, $\M_{\! f}$, $\mathcal{P}$ and $\norm{f}_{\infty}$ by $\Cont{m}{}$, $\Cont{m}{b}$, $\DLone{m}$, $(\DLone{m})^0 := \{ D \in \DLone{m} \, | \, D(\mathbbm{1}) = 0 \}$ and $\forall |p| \leq m, \norm{\partial^p f}_{\infty}$ respectively. It also holds with $\complex^\inputS$ and $\M_{\delta}^0$ instead of $\Cont{}{b}$ and $\mathcal{P}$.
\end{remark}
Applying Theorem~\ref{theo:UniversalMeansCharacteristic} to $\mathcal{F} = (\Cont{m}{b})_c$, we get the following, in practice very useful lemma.
\begin{lemma}
Let $k$ be such that $\HH_{\K} \ensuremath{\hookrightarrow} (\Cont{m}{b})_c$. (For example, let $k \in \Cont{(m,m)}{b}$.) Then $k$ is characteristic to $\DLone{m}$ \gls{iff} $k$ is universal over $(\Cont{m}{b})_c$.
\end{lemma}
We close this section with a remark on an unfruitful, but maybe enlightening attempt to characterise characteristic kernels.
\begin{remark}
Let $\mathcal{X} = \mathbb{R}$. For any $\mu \in \M_{\! f}$, if $\partial \mu \in \M_{\! f}$, then $\partial \mu \in \M_{\! f}^0$. In short: $\partial \M_{\! f} \cap \M_{\! f} \subset \M_{\! f}^0$. In light of Proposition~\ref{prop:IntDiffSwitch} and its Corollary~\ref{cor:dpMandMCharacteristic}, we were tempted to formulate a proposition like: ``Let $k \in \Cont{(1,1)}{0}$ be a kernel such that $\partial^{(1,1)} k$ is characteristic to $\M_{\! f}$. Then $k$ is characteristic to $\M_{\! f}^0$ (i.e.\ to $\mathcal{P}$).'' Unfortunately $\partial \M_{\! f} \cap \M_{\! f} \not = \M_{\! f}^0$~, thus we failed to conclude.
\end{remark}
\section{\texorpdfstring{$c^m$}{Cm}- and \texorpdfstring{$c^m_0$}{Cm0}-Universal Kernels\label{sec:UniversalKernels}}
In this section, we will give sufficient conditions for a kernel to be $c_0^m$- (Theorem~\ref{theo:GeneralExistence}) or $c^m$-universal (Theorem~\ref{theo:CompactCharacteristic}). This will finally show that $c_0^\infty$- and $c^\infty$-universal kernels do exist. Furthermore, stationary kernels $k(x,y) := \psi(x-y)$ will behave particularly beautifully: as soon as they are smooth enough, $c^m_0$- (resp.\ \mbox{$c^m$-)} and $c_0$- (resp.\ $c-$) universal kernels turn out to be one and the same thing (Corollary~\ref{cor:Existence}, resp.\ Proposition~\ref{prop:CompactCharacteristicRd}).
Thus, machine learners need not change their habits: if they show, as usual, that a smooth enough, stationary kernel is $c_0$-universal, they get $c^m_0$-universality for free, even without any prerequisites in distribution theory!
\subsection{\texorpdfstring{$c_0^m$}{Cm0}-Universal Kernels}
\begin{theorem}\label{theo:GeneralExistence}
Let $k$ be a kernel in $\Cont{(m,m)}{b}$. If, for any $p \in \mathbb{N}^d$ with $|p| \leq m$, $\partial^{(p,p)} k$ is characteristic to $\M_{\! f}$, then $k$ is characteristic to $\DLone{m}$.
\end{theorem}
\begin{proof}
We proceed by recurrence on $|p|$. For ease of notation however, we restrict ourselves to the step from $|p|=0$ (which obviously holds) to $|p| = 1$.
Let $p \in \mathbb{N}^d$ with $|p| = 1$. Suppose there exist two different distribution $D,T \in \DLone{1}$ such that $\emb_{\K}(D) = \emb_{\K}(T)$. As $\partial^{(p,p)} k$ is characteristic to $\M_{\! f}$, $k$ is characteristic to $\partial^p \M_{\! f}$ (Corollary~\ref{cor:dpMandMCharacteristic}). Thus $k$ is characteristic to $\M_{\! f}$ and over $\partial^p \M_{\! f}$. Consequently $D$ and $T$ cannot be both in $\M_{\! f}$ or both in $\partial^p \M_{\! f}$. Thus, one of them, say $D$, is in $\M_{\! f} \backslash (\partial^p \M_{\! f})$.
Now, $\emb_{\K}(D) = \emb_{\K}(T)$ implies that, for any $f \in \HH_{\K}$: $D(f) = T(f)$. But $D$ being a measure, and $\HH_{\K}$ being dense in $\Cont{0}{0}$, $D$ defines a unique element in $\M_{\! f}$ by its values taken on $\HH_{\K}$. In particular, it is uniquely defined on $\Cont{1}{0} \subset \Cont{0}{0}$ by its values taken on $\HH_{\K}$. Thus so is $T$. Thus $D = T$. Contradiction. Thus $k$ is characteristic to $\M_{\! f} \cup (\partial^p \M_{\! f})$.
For any other $q \in \mathbb{N}^d$ with $|q| = 1$, one now shows in a similar fashion that $k$ is characteristic to $(\M_{\! f} \cup (\partial^p \M_{\! f})) \cup \partial^q \M_{\! f}$. Continuing this process, one finds that $k$ is characteristic to $\cup_{|p| \leq 1} \partial^p \M_{\! f}$. In other words: $k$ is characteristic to $\DLone{1}$ (Proposition~\ref{prop:RepresentationOfDLone}).
\end{proof}
As a beautiful corollary, we get:
\needspace{5\baselineskip}
\begin{corollary} \label{cor:Existence}
Let $k(\hat x,\hat y) = \psi(\hat x-\hat y) \in \Cont{(m,m)}{b}$ be a stationary kernel over $\mathcal{X} = \mathbb{R}^d$.
The following are equivalent.
\begin{enumerate}
\item $k$ is characteristic (to $\mathcal{P}$). \label{th:Mprob}
\item $k$ is characteristic to $\M_{\! f}$ (i.e.\ \gls{ispd}). \label{th:Mf}
\item $k$ is characteristic to $\DLone{m}$. \label{th:DLone}
\item $\supp \Four \psi = \mathcal{X}$, meaning that the distributional Fourier transform $\Four \psi$ of $\psi$ has full support. \label{th:Support}
\end{enumerate}
In particular, if $\psi \in \Cont{m}{0}$, then $k$ is $c_0^m$-universal \gls{iff} it is $c_0$-universal.
\end{corollary}
\begin{remark}
Modulo a possible normalisation or scaling factor that depend on the chosen convention in the definition of the Fourier transform, $\Four \psi$ \emph{is} but the (positive) measure $\Lambda$ that the Bochner theorem associates to the stationary kernel $k$.
\end{remark}
\begin{proof}
That \ref{th:Mprob} and \ref{th:Support} are equivalent is Theorem~9 of \citet{sriperumbudur10b}. Looking at the proof, it is straightforward to see that they are also equivalent to~\ref{th:Mf}. It is clear that~\ref{th:DLone} implies~\ref{th:Mf}. Thus we only need to show that~\ref{th:Support} implies~\ref{th:DLone}.
Suppose \ref{th:Support} holds. The Fourier transforms of $\partial^{(p,p)} k(\hat x, \hat y) = (-1)^p \partial^{2p}\psi(\hat x - \hat y)$ satisfy $\Four (\partial^{2p} \psi) = (-i)^{|p|} \hat \xi^p \Four \psi$. Thus they do also have full support. So for each $|p| \leq m$, $\partial^{(p,p)} k$ is characteristic to $\M_{\! f}$. Thus Theorem~\ref{theo:GeneralExistence} applies and $k$ is characteristic to $\DLone{m}$.
\end{proof}
We give an alternative proof in Appendix~\ref{proof:Existence}.
This result calls for comments. First, it shows that the popular Gaussian kernel $k(x,y) = C e^{-(x-y)^2/\sigma^2}$ (where $C, \sigma^2 > 0$) is $c_0^\infty$-universal. Now, informally, what does it mean when a KME is injective over $\DLone{\infty}$?
A distribution $D$ is by definition determined by all the values $D(\psi)$ it takes, when $\psi$ runs over the space of test functions $\Cont{\infty}{c}(\mathbb{R}^d)$. Even better: let $\psi_{\epsilon} \geq 0$ be a function in $\Cont{\infty}{c}$ with support contained in a compact set of diameter~$\leq \epsilon$ and such that $\int \psi_\epsilon(y) \diff y = 1$. Then the convolutional product $[D*\psi_\epsilon](x) := D_y(\psi_\epsilon(x-y))$ is a function in $\Cont{\infty}{c}$ that converges in $\Dall{\infty}$ to $D$ when $\epsilon \rightarrow 0$. This often leads physicists to interpret $D_y(\psi_\epsilon(x-y))$ as the measurement at point $x$ of some natural phenomenon (modelled by) $D$ by an imprecise instrument $\psi_\epsilon$. They see $D_y(\psi_\epsilon(x-y))$ as a ``weighted mean'' of $D$ on a small compact set (of diameter at most $\epsilon$) around $x$. The more precise the measurement device $\psi_\epsilon$, the smaller the $\epsilon$, the better the measurement. In particular, a physicist need not define a natural phenomenon $D$ by its exact values in every point $x$, but rather by all the possible measurements that one could do of $D$ at every point $x$. This brings us back to $c^\infty_0$-universality. For it implies that you do not need a whole family of functions $(\psi_\epsilon)_{\epsilon > 0}$ (and their translations) to characterise a distribution in $\DLone{\infty}$. A single function $\psi$ (and its translations) suffices: indeed, $\psi$ having compact support, $\supp \Four \psi = \mathbb{R}^d$, thus the kernel $\psi(\hat x - \hat y)$ is $c^\infty_0$-universal. So any distribution $D \in \DLone{\infty}$ is uniquely characterised by $D_y(\psi(\hat x - y))$, the KME of $D$ \gls{wrt} $\psi$. Informally speaking, it means we do not need infinite measuring devices: one device (translated over the input space) suffices\footnote{The physicist however is not out of the woods, for if he wants to perfectly reconstruct $D$, he now needs to perfectly know his magnifying glass $\psi$. And anyone working in deconvolution knows how hard this can be!} to distinguish $D$ from all other natural phenomena modelled by $\DLone{\infty}$. And we are back to usual functions: a function $f$ is characterised by the graph $\function{}{}{}{x}{f(x)}$; an integrable distribution $D$ is characterised by the graph $\function{}{}{}{x}{D_y(\psi(x - y))}$.
We now return to more mathematically rigorous statements and discuss $c^m$-universality.
\subsection{\texorpdfstring{$c^m$}{Cm}-Universal Kernels}
We start with the analogue of Theorem~\ref{theo:GeneralExistence}, but for characteristic kernels over $\Dcomp{m}$. Its proof is literally the same, with $\M_{\! f}$ and $\DLone{}$ being replaced by $\M_{c}$ and $\Dcomp{}$ respectively.
\begin{theorem}\label{theo:GeneralExistenceCompact}
Let $k$ be a kernel in $\Cont{(m,m)}{}$. If, for any $p \in \mathbb{N}^d$ with $|p| \leq m$, $\partial^{(p,p)} k$ is characteristic to $\M_{c}$, then $k$ is characteristic to $\Dcomp{m}$.
\end{theorem}
Obviously, any characteristic kernel over $\DLone{m}$ is also characteristic to $\Dcomp{m}$; or if one prefers: any $c^m_0$-universal kernel is also $c^m$-universal. Now, in Corollary~\ref{cor:Existence}, the condition that the support of $\Four \psi$ be all $\mathbb{R}^d$ may seem quite non-restrictive. But it actually prevents some usual kernels from being $c_0$-universal. An example in $\mathcal{X} = \mathbb{R}$: the kernel $\sinc(\hat x - \hat y)$ (where $\sinc(x) := \sin(x) / x$ for any $x \not = 0$ and $1$ otherwise). However, the next theorem and the next proposition will show that the $\sinc$ kernel, as the vast majority of stationary continuous kernels used in practice, is $c$-universal (and even $c^\infty$-universal). We thereby refine Proposition~17 of \citet{sriperumbudur10a} and provide a converse. For the proof, see Appendix~\ref{proof:CompactCharacteristic}.
\needspace{5\baselineskip}
\begin{theorem}\label{theo:CompactCharacteristic}
Let $k(\hat x,\hat y) = \psi(\hat x-\hat y) \in \Cont{(m,m)}{}$ be a stationary kernel with $\mathcal{X} = \mathbb{R}$. For a set $\mathcal S$, we note $\# \mathcal S$ its cardinal. The following two statements are equivalent.
\begin{enumerate}
\item $k$ is not characteristic to $\DLone{m}$.
\item The support $\mathcal S$ of the distributional Fourier transform $\Four \psi$ is at most countable and, there exists a constant $M \in \mathbb{R}$ such that, for any $r > 0$
\begin{equation}\label{eq:GrowthOfSupport}
\# \{ s \in \mathcal S \, | \, |s| \leq r \} \leq M r \, .
\end{equation}
\end{enumerate}
\end{theorem}
Equation~\eqref{eq:GrowthOfSupport} upper bounds the average density of the support $\mathcal S$ of $\Four \psi$ in $\mathbb{R}$.
In other words, to prevent a stationary and smooth enough kernel $k$ from being characteristic to $\DLone{m}$, the support of $\Four \psi$ needs not only be countable, but its density in $\mathbb{R}$ should also be sufficiently low. Such kernels $\psi$ include for example any periodic or any finite sum of periodic stationary kernels
Theorem~\ref{theo:CompactCharacteristic} accounts only for the case $\mathcal{X} = \mathbb{R}$. When $\mathcal{X} = \mathbb{R}^d$, we expect a similar statement to hold, with $M r$ replaced by $M r^d$.
This yet remains to be proven. However, we may state and prove (in Appendix~\ref{proof:CompactCharacteristicRd}) the following proposition.
\begin{proposition}\label{prop:CompactCharacteristicRd}
Let $k(\hat x,\hat y) = \psi(\hat x-\hat y) \in \Cont{(m,m)}{}$ be a stationary kernel with $\mathcal{X} = \mathbb{R}^d$.
\begin{enumerate}
\item The kernel is characteristic to $\Dcomp{m}$ \gls{iff} it is characteristic to $\M_{c}$.\label{p1CC}
\item If the kernel is not characteristic to $\Dcomp{m}$, then the support of the Fourier transform of $\psi$ is at most countable.\label{p2CC
\end{enumerate}
\end{proposition}
As a final remark before moving to the next section, note that one can give sufficient conditions (for a kernel to be characteristic to $\Dcomp{m}$) that apply to a slightly more general class of kernels than the stationary ones. They apply to so-called \glsreset{cpd}\gls{cpd} kernels, and their proof uses a generalisation of the Bochner theorem. As this needs too much of an introduction to \gls{cpd} kernels, with rather small benefits in the end, we move these discussions to Appendix~\ref{sec:CPD}. Among other things, these sufficient conditions prove that the Brownian motion kernel $k(\hat x, \hat y) := \min(|\hat x|, |\hat y|)$ ($x,y \in \mathbb{R}$) is characteristic to the set of measures with compact support.
\section{Topology Induced by \texorpdfstring{$k$}{k}\label{sec:Topology}}
So far, we embedded various spaces of distributions into $\HH_{\K}'$ and studied whether these embeddings are injective. We now inquire their continuity properties \gls{wrt} various topologies.
Each distribution space $\mathcal{D}$ defined in Section~\ref{sec:Definitions} can be endowed with its strong dual, its weak dual or any other topology. Naturally, when embedding $\mathcal{D}$ into $\HH_{\K}$ one may ask: does it preserve the topological structure of $\mathcal{D}$? More precisely:
\begin{enumerate}[label= (Q\arabic*), leftmargin = 4em, series=questions]
\item \label{Q1} If a sequence $D_n \in \mathcal{D}$ converges to $D \in \mathcal{D}$, does $\emb_{\K}(D_n)$ converge to $\emb_{\K}(D)$? Or more abstractly: is $\emb_{\K}$ continuous?
\item \label{Q2} If $\emb_{\K}(D_n)$ converges to $\emb_{\K}(D)$ in $\HH_{\K}$, does $D_n$ converge to $D$?
\end{enumerate}
In this section we answer those questions for various sets of distributions $\mathcal{D}$ (and various topologies). Table~\ref{tab:TopoSummary} summarises these answers.
Previous studies already addressed those questions (\citealp{guilbart78} or more recently \citealp{sriperumbudur10b, sriperumbudur13}). However, all of them focused on $\M_{\! f}$ or on subsets like $\mathcal{M}_+$ (positive finite measures) or $\mathcal{P}$. \Citet{sriperumbudur10b} for example inquire on which conditions a kernel $k$ metrises the narrow convergence topology over $\mathcal{P}$. In other words, they seek positive answers to \ref{Q1} and \ref{Q2} with $\mathcal{D} = \mathcal{P}$, when it is equipped with its narrow topology and $\HH_{\K}$ with its usual norm. We, on the contrary, start with the general case where $\mathcal{D}$ is a subset of $\Dcomp{m}$ or $\DLone{m}$ and only then focus on subsets of~$\M_{\! f}$.
\newcommand{^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}}}{^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}}}
\newcommand{^{\mathrm C.\scriptstyle{\text{\ref{cor:Q2onDcomp}}}}}{^{\mathrm C.\scriptstyle{\text{\ref{cor:Q2onDcomp}}}}}
\newcommand{^{\mathrm R.\scriptstyle{\text{\ref{rem:Q2onDcomp}~\ref{rem:p2}}}}}{^{\mathrm R.\scriptstyle{\text{\ref{rem:Q2onDcomp}~\ref{rem:p2}}}}}
\newcommand{^{\mathrm S.\scriptstyle{\text{\ref{sec:DL1wVsDk}}}}}{^{\mathrm S.\scriptstyle{\text{\ref{sec:DL1wVsDk}}}}}
\newcommand{^{\mathrm{Th}.\scriptstyle{\text{\ref{theo:MetrizationOfNarrow2}}}}}{^{\mathrm{Th}.\scriptstyle{\text{\ref{theo:MetrizationOfNarrow2}}}}}
\newcommand{^{\mathrm{Th}.\scriptstyle{\text{\ref{theo:Q2}}}}}{^{\mathrm{Th}.\scriptstyle{\text{\ref{theo:Q2}}}}}
\newcommand{^{\mathrm P.\scriptstyle{\text{\ref{prop:WeakerThanNarrow}}}}}{^{\mathrm P.\scriptstyle{\text{\ref{prop:WeakerThanNarrow}}}}}
\begin{table}[t]
\renewcommand{\arraystretch}{1.5}
\begin{tabu} to \linewidth {X[$$]X[$$]X[$$]X[$$]X[$$]X[$$]X[$$]X[$$]X[$$]}
\hline
\toprule
&\mathcal{F}' &\DLone{m} &\Dcomp{m} &\Dcomp{\infty} &\M_{\! f} &\M_{c} &\mathcal{M}_{\scriptscriptstyle{+}} &\mathcal{P} \\
\midrule
b &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} \\
b \cap \mathcal{B} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} &=^{\mathrm C.\scriptstyle{\text{\ref{cor:Q2onDcomp}}}} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:ContinuousEmbedding}}}} \\
w & &\not \supset^{\mathrm S.\scriptstyle{\text{\ref{sec:DL1wVsDk}}}} & & &\not \supset^{\mathrm S.\scriptstyle{\text{\ref{sec:DL1wVsDk}}}} & &\not \supset^{\mathrm S.\scriptstyle{\text{\ref{sec:DL1wVsDk}}}} &=^{\mathrm{Th}.\scriptstyle{\text{\ref{theo:MetrizationOfNarrow2}}}} \\
w \cap \mathcal{B} & &\subset^{\mathrm{Th}.\scriptstyle{\text{\ref{theo:Q2}}}} &=^{\mathrm C.\scriptstyle{\text{\ref{cor:Q2onDcomp}}}} &=^{\mathrm C.\scriptstyle{\text{\ref{cor:Q2onDcomp}}}} &\not \supset^{\mathrm S.\scriptstyle{\text{\ref{sec:DL1wVsDk}}}} &=^{\mathrm C.\scriptstyle{\text{\ref{cor:Q2onDcomp}}}} &\not \supset^{\mathrm S.\scriptstyle{\text{\ref{sec:DL1wVsDk}}}} &=^{\mathrm{Th}.\scriptstyle{\text{\ref{theo:MetrizationOfNarrow2}}}} \\
\sigma &\mathrm{n.d.} &\mathrm{n.d.} &\mathrm{n.d.} &\mathrm{n.d.} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:WeakerThanNarrow}}}} & &\not \supset^{\mathrm P.\scriptstyle{\text{\ref{prop:WeakerThanNarrow}}}} &=^{\mathrm{Th}.\scriptstyle{\text{\ref{theo:MetrizationOfNarrow2}}}} \\
\sigma \cap B &\mathrm{n.d.} &\mathrm{n.d.} &\mathrm{n.d.} &\mathrm{n.d.} &\supset^{\mathrm P.\scriptstyle{\text{\ref{prop:WeakerThanNarrow}}}} &=^{\mathrm R.\scriptstyle{\text{\ref{rem:Q2onDcomp}~\ref{rem:p2}}}} &\not \supset^{\mathrm P.\scriptstyle{\text{\ref{prop:WeakerThanNarrow}}}} &=^{\mathrm{Th}.\scriptstyle{\text{\ref{theo:MetrizationOfNarrow2}}}} \\
\bottomrule
\hline
\end{tabu}
\caption{\label{tab:TopoSummary}Relations between topology $\mathfrak{T}_{k}$, induced by the kernel metric $d_k$, and other topologies. Letters $b$, $w$ and $\sigma$ designate the strong dual, the weak dual and the narrow topologies. Th, P, C, S, R and n.d.\ stand for Theorem, Proposition, Corollary, Section, Remark and not defined. For example, Column~3 Line~3 reads: ``Over any bounded subset $\mathcal{B}$ of $\DLone{m}$, and under the assumptions of Proposition~\ref{prop:ContinuousEmbedding}, the strong topology of $\DLone{m}$ dominates $\mathfrak{T}_k$: $b(\DLone{m},\Cont{m}{0}) \cap \mathcal{B} \supset \mathfrak{T}_k \cap \mathcal{B}$''. Column~3 Line~4 reads: ``The weak topology of $\DLone{m}$ need not be stronger than $\mathfrak{T}_k$. See discussions in Section~\ref{sec:DL1wVsDk}''. The two last lines of last column feature this section's main theorem: On a locally compact Hausdorff space $\mathcal{X}$, a bounded kernel $k$ metrises the weak convergence of probability measures iff $k$ is continuous and characteristic to $\mathcal{P}$.
}
\end{table}
After a few preliminary remarks and notations (Section~\ref{sec:Preliminaries}), we show that, under very general assumptions on $\mathcal{D}$, the answer to \ref{Q1} is positive for all embeddable distribution sets $\mathcal{D}$, when both $\mathcal{D}$ and $\HH_{\K}$ are equipped with their strong (in short: $b \rightarrow b$) or with their weak ($w \rightarrow w$) dual topology (Section~\ref{sec:WwSs}). We then refine those results by analysing the case $w \rightarrow b$ (Section~\ref{sec:Ws}). We then address \ref{Q2}, starting with the general case where $\mathcal{D}$ could be any subset of $\Dcomp{m}$ or $\DLone{m}$. Quickly, however, we focus on bounded subsets of $\Dcomp{m}$ and $\DLone{m}$. In Section~\ref{sec:Narrow}, we then concentrate on the case where $\mathcal{D}$ is $\M_{\! f}$ or $\mathcal{P}$, equipped with the narrow topology. We finish with a short investigation in Section~\ref{sec:Surjective} of the questions: ``When is the KME surjective? And when does $\HH_{\K}$ identify with a (topological) subspace of distributions?''.
\subsection{Preliminary Remarks and Notations\label{sec:Preliminaries}}
In all this section, $\mathcal{D}$ designates an \emph{embeddable} set of distributions. For a subset $\mathcal{B}$ of a set $\S$ with topology $\mathfrak{T}$, we note $\mathfrak{T} \cap \mathcal{B}$ the relative topology induced by $\mathcal{D}$ in $\mathcal{B}$.
\paragraph{Identification of $\HH_{\K}$, \,$\overline \HH_{\K}'$ and $\HH_{\K}'$.} $\HH_{\K}$ and $\overline \HH_{\K}'$ are isomorphic, algebraically and topologically, via the Riesz representation map (see Appendix~\ref{sec:Reminders}). As depicted in Diagram~\eqref{eq:EmbeddingMap}, when $\HH_{\K}$ and $\overline \HH_{\K}'$ are identified, the KME $\emb_{\K}$ is the complex conjugate of the restriction map $\function{}{}{}{D}{D\big|_{\HH_{\K}}}$. But in this section, we will only be studying its continuity properties: they are the same, with or without the complex conjugation. So we will drop all complex conjugation bars and simply \emph{consider that the KME $\emb_{\K}$ is the restriction map} (without complex conjugation) from $\mathcal{D}$ into $\HH_{\K}'$. Mathematically speaking, we identify $\overline \HH_{\K}'$ and $\HH_{\K}'$ via the complex conjugation map $\function{}{}{}{f}{\bar f}$. In practice, it simply means that instead of writing for instance $b(\overline \HH_{\K}', \overline \HH_{\K})$, $w(\overline \HH_{\K}', \overline \HH_{\K})$ or $\bar D_\alpha \rightarrow \bar D$, we will write $b(\HH_{\K}', \HH_{\K})$, $w(\HH_{\K}',\HH_{\K})$ and $D_\alpha \rightarrow D$. It will be useful for this section to always remember that, when $\HH_{\K}$ continuously embeds into $\mathcal{F}$, then \emph{the KME $\emb_{\K}$ is the transpose $\imath^\star$ of the canonical embedding map $\function{\imath}{\HH_{\K}}{\mathcal{F}}{f}{f}$} and coincides with the restriction map of $\mathcal{F}'$ to $\HH_{\K}$. In short: if $\HH_{\K} \ensuremath{\hookrightarrow} \mathcal{F}$, then $\emb_{\K} = \imath^\star$.
\paragraph{Metric and strong topology induced by $k$.} The strong topology induced by $k$ in $\mathcal{D}$ is simply the topology induced by the semi-metric $d_k$ defined by: for any $D,T \in \mathcal{D}$,
\begin{equation*}
d_k(D,T) := \normK{\emb_{\K}(D) - \emb_{\K}(T)} \, .
\end{equation*}
We will call $d_k$ the \emph{kernel(-induced) (semi-)metric}. When $\mathcal{D}$ is a vector space, this semi-metric is induced by the semi-inner product
\begin{equation*}
\ipdK{D}{T} := \ipdK{\emb_{\K}(D)}{\emb_{\K}(T)} \, .
\end{equation*}
The ``semi'' means that the topology induced by $d_k$ may not be Hausdorff: $d_k(D,T) = 0$ may not imply $D=T$. $d_k$ is a (non-degenerate) metric \gls{iff} the KME is injective. If it is, we note $b(\HH_{\K}',\HH_{\K}) \cap \mathcal{D}$ the induced topology. A net\footnote{A net is a generalisation of a sequence, in which the directed index set $\mathcal A$ need not be countable.} $(D_\alpha)_{\alpha \in \mathcal A}$ in $\mathcal{D}$ converges to $D \in \mathcal{D}$ for the kernel semi-metric \gls{iff} $\normK{D_\alpha - D} \rightarrow 0$.
\paragraph{Weak topology induced by $k$.} We define the weak topology induced by $k$ over an embeddable set of distributions $\mathcal{D}$ by its convergent nets. A net $D_\alpha$ in $\mathcal{D}$ converges to $D$ in $\mathcal{D}$ for the weak topology induced by $k$ \gls{iff} for any $f \in \HH_{\K}$, $D_\alpha(f) \rightarrow D(f)$. Said differently, the weak topology induced by $k$ over $\mathcal{D}$ is the topology of pointwise convergence (with points) in $\HH_{\K}$. Here again, this topology is Hausdorff \gls{iff} the KME is injective over $\mathcal{D}$. If it is, we note $w(\HH_{\K}',\HH_{\K}) \cap \mathcal{D}$ this topology.
\paragraph{Induced topologies, continuity of $\emb_{\K}$ and metrisation.} Remember that the strong (resp.\ weak) topology induced by $k$ is weaker than the original topology $\mathfrak{T}$ of $\mathcal{D}$ \gls{iff} the KME $\emb_{\K}$ is continuous when $D$ is equipped with $\mathfrak{T}$ and $\HH_{\K}$ with its RKHS norm (resp.\ with its weak topology). We then write $\emb_{\K} : \mathcal{D}_{\mathfrak{T}} \ensuremath{\hookrightarrow} (\HH_{\K}')_b$ (resp.\ $\emb_{\K} : \mathcal{D}_{\mathfrak{T}} \ensuremath{\hookrightarrow} (\HH_{\K}')_w$\,). When the topology induced by $d_k$ in $\mathcal{D}$ equals the original topology of $\mathcal{D}$, $k$ is said to \emph{metrise the topology of $\mathcal{D}$}. In that case, a net $D_\alpha$ converges to $D$ in $\mathcal{D}$ for the original topology of $\mathcal{D}$ \gls{iff} $\normK{D_\alpha - D} \rightarrow 0$.
\paragraph{Continuity and sequential continuity.} Let $X$ and $Y$ be two arbitrary topological spaces and $f$ a function from $X$ to $Y$. The function $f$ is continuous \gls{iff} for any net $x_\alpha$ that converges to $x$ in $X$, $f(x_\alpha)$ converges to $f(x)$ in $Y$. In particular, if $f$ is continuous, then $f$ is also \emph{sequentially continuous}: for any sequence $x_n$ of $X$, if $x_n \rightarrow x$, then $f(x_n) \rightarrow f(x)$. If $X$ is a so-called \emph{sequential space}, then sequential continuity also implies continuity. But in general, the converse is wrong. Fortunately, many spaces are sequential. For example, any metric space ---in particular, any Banach or Fréchet space--- is sequential. Unfortunately, \gls{lcv} TVSs need not be sequential. For instance, $\DLone{m}$ is sequential \gls{iff} $m$ is finite. Thus, in all this section, we will carefully distinguish continuity and sequential continuity. In particular, question~\ref{Q1} asks whether the KME is sequentially continuous over a space $\mathcal{D}$. For practical purposes, that is all what matters. Nevertheless, we will mainly establish (non-sequential) continuity properties of the KME.
The reader should keep in mind that they imply sequential continuity. In short: if $\emb_{\K} : \mathcal{D}_\mathfrak{T} \ensuremath{\hookrightarrow} \HH_{\K}$, then \ref{Q1} is answered positively. A similar remark holds for~\ref{Q2}. Indeed, let $\mathfrak{T}_1$ and $\mathfrak{T}_2$ be two topologies over a space $X$. Obviously, when $\mathfrak{T}_1$ is stronger than $\mathfrak{T}_2$, then $\mathfrak{T}_1$ is also sequentially stronger than $\mathfrak{T}_2$: if $x_n \rightarrow x$ in $\mathfrak{T}_1$ then $x_n \rightarrow x$ in $\mathfrak{T}_2$. From metric spaces, we are used to the converse being true: if $\mathfrak{T}_1$ is sequentially stronger than $\mathfrak{T}_2$, then $\mathfrak{T}_1$ is stronger than $\mathfrak{T}_2$. However, when $\mathfrak{T}_2$ is not sequential (meaning that $X$ equipped with $\mathfrak{T}_2$ is not a sequential space), this converse may fail to hold: sequentially stronger need not imply stronger. Coming back to question~\ref{Q2}, we see it asks whether the topology induced in $\mathcal{D}$ by $\emb_{\K}$ is \emph{sequentially} stronger than the initial topology of $\mathcal{D}$. There again, for practical purposes, that is all what matters. Nevertheless, we will mainly establish statements such as: $\mathfrak{T}_1$ is stronger than (we also say \emph{dominates}) $\mathfrak{T}_2$, in which case we write $\mathfrak{T}_1 \supset \mathfrak{T}_2$.
\subsection{Embeddings of Dual Spaces are Continuous\label{sec:WwSs}}
To start, let us remind how one usually embeds $\M_{\! f}$ into the space of distributions $\Dall{\infty}$. One simply notes that the space $\Cont{\infty}{c}$ is continuously contained and dense in $\Cont{}{0}$. Thus the transpose $\imath^\star$ of the canonical embedding map $\function{\imath}{}{}{f}{f}$ defines an injective linear map from the dual $\M_{\! f}$ of $\Cont{}{0}$ into the dual $\Dall{\infty}$ of $\Cont{\infty}{0}$. (Note that $\imath^\star$ is the restriction map $\function{}{}{}{\mu}{\mu \big |_{\Cont{\infty}{c}}}$.) Thus identifying $\M_{\! f}$ with its image in $\Dall{\infty}$, one says that $\M_{\! f}$ is a subspace of $\Dall{\infty}$. But not only is $\imath^\star$ injective, it is also continuous, when both duals are equipped with their strong or with their weak topology. (That is why, when $\M_{\! f}$ is equipped with its strong topology, the total variation norm, $\M_{\! f}$ is not only a space of distributions, it is also a \emph{topological} space of distributions.) This is simply an instance of a more general fact: if a \gls{lcv} TVS $\mathcal{F}_1$ embeds continuously into another $\mathcal{F}_2$ via a linear map $\imath$, then the transpose $\imath^\star$ is a continuous linear embedding from $\mathcal{F}_2'$ into $\mathcal{F}_1'$, when $\mathcal{F}_1'$ and $\mathcal{F}_2'$ carry either both their weak or both their strong dual topology \citep[Proposition~19.5 and Corollary]{treves67}. Applying this to $\mathcal{F}_2 = \HH_{\K}$ yields:
\begin{proposition}\label{prop:ContinuousEmbedding}
Let $\mathcal{X}$ be any topological space (not necessarily locally compact and Hausdorff). If $\HH_{\K}$ continuously embeds into $\mathcal{F}$, then the KME $\function{\emb_{\K}}{\mathcal{F}'}{\HH_{\K}'}{}{}$ is continuous, when $\mathcal{F}'$ and $\HH_{\K}'$ carry either both their strong or both their weak topologies.
In short:
\begin{equation}\label{eq:ContinuousEmbedding}
\HH_{\K} \ensuremath{\hookrightarrow} \mathcal{F} \qquad \Longrightarrow \qquad \left \{
\begin{array}{lll}
\emb_{\K} : \mathcal{F}'_b \ensuremath{\hookrightarrow} (\HH_{\K}')_b \\% \quad &\text{i.e.\ } &\emb_{\K}^{-1}(b(\HH_{\K}', \HH_{\K})) \subset b(\mathcal{F}',\mathcal{F}) \\
\emb_{\K} : \mathcal{F}'_w \ensuremath{\hookrightarrow} (\HH_{\K}')_
\end{array}
\right . \, .
\end{equation}
\end{proposition}
The conclusion of Proposition~\ref{prop:ContinuousEmbedding} concerning continuity \gls{wrt} weak topologies is actually trivial! It states that for a net $D_\alpha$ and $D$ in $\mathcal{F}'$, if $D_\alpha(f) \rightarrow D(f)$ for any $f \in \mathcal{F}$, then $D_\alpha(f) \rightarrow D(f)$ for any $f \in \HH_{\K}$ (which is clear, because $\HH_{\K} \subset \mathcal{F}$\,!). The conclusion concerning strong continuity is more interesting, although not much more difficult to prove. It says: if $D_\alpha \rightarrow D$ in $\mathcal{F}'_b$, then $\normK{D_\alpha - D} \rightarrow 0$. Thus, when $\HH_{\K}$ embeds continuously into $\mathcal{F}$, then Proposition~\ref{prop:ContinuousEmbedding} answers \ref{Q1} positively, when $\mathcal{F}'$ and $\HH_{\K}'$ are equipped both with their strong or both with their weak topologies.
\begin{example}
We illustrate Proposition~\ref{prop:ContinuousEmbedding} on spaces $\mathcal{F}$ that are not listed in Section~\ref{sec:Definitions}. Let $k$ be a bounded kernel. Equip $\mathcal{X}$ with the topology induced by the kernel-induced semi-distance $\rho_k$, defined as: for any $x,y \in \mathcal{X}$, $\rho_k(x,y):= d_k(\delta_x, \delta_y) = \normK{\delta_x - \delta_y}$. ($\mathcal{X}$ may or may not be locally compact and Hausdorff.) Then $\HH_{\K}$ continuously embeds into any of the following spaces:
\begin{description}
\item[$\Cont{}{b}$] the space of bounded $\rho_k$-continuous functions, equipped with the supremum norm $\norm{f}_\infty$.
\item[$\Cont{}{L} := \{ f \in \complex^\inputS \, | \, \norm{f}_L < \infty \}$] the space of Lipschitz continuous functions, equipped with the Lipschitz-norm $\norm{f}_L := \sup \{ |f(x) - f(y)| / \rho_k(x,y) \, | \, x,y \in \mathcal{X}\,, \rho_k(x,y) \not = 0 \}$.
\item[$\Cont{}{BL} := \{ f \in \complex^\inputS \, | \, \norm{f}_{BL} < \infty \}$] the space of bounded and Lipschitz continuous functions, equipped with the BL-norm $\norm{f}_{BL} := \norm{f}_\infty + \norm{f}_L$.
\end{description}
The duals of these spaces contain all probability measures. The respective metrics induced by their dual norms on $\mathcal{P}$ are: the total variation metric, the \emph{Kantorovich metric} (which coincides with the \emph{Wasserstein metric} when $\mathcal{X}$ is separable) and the \emph{Dudley metric}. Proposition~\ref{prop:ContinuousEmbedding} shows, without any computation, that all these metrics dominate the kernel-induced semi-metric $d_k$.
\end{example}
\subsection{When Does \texorpdfstring{$\mathcal{F}'_w$}{F'_w} Continuously Embed into \texorpdfstring{$\HH_{\K}'$}{Hk'}?\label{sec:Ws}}
Proposition~\ref{prop:ContinuousEmbedding} answers \ref{Q1} positively when $\mathcal{F}$ embeds continuously into $\HH_{\K}$, and when both $\mathcal{F}'$ and $\HH_{\K}'$ are equipped with their strong (resp.\ weak) dual topology. The weak dual topology being weaker than the strong one, under the assumption of Proposition~\ref{prop:ContinuousEmbedding} we obviously also have $\emb_{\K} : \mathcal{F}' \ensuremath{\hookrightarrow} (\HH_{\K}')_w$. How about $\emb_{\K} : \mathcal{F}'_w \ensuremath{\hookrightarrow} \HH_{\K}'$\ ? This will be the focus now.
The answer depends on the specific space $\mathcal{F}'$, for the weak or strong dual topologies may vary from one dual to another. The weak (resp.\ strong) dual topology of $\Dcomp{m}$, for instance, is strictly stronger than the weak (resp.\ strong) topology it carries when seen as a subspace of $\DLone{m}$ (resp.\ $(\DLone{m})_w$). As we will see, it will also depend on some assumptions made on the kernel.
\subsubsection{Does \texorpdfstring{$(\DLone{m})_w$}{(Dm)_w} Continuously Embed into \texorpdfstring{$\HH_{\K}'$}{Hk'}?\label{sec:DL1wVsDk}}
In general no: $(\DLone{m})_w$ need not continuously embed into $\HH_{\K}'$. For instance, suppose $k$ is stationary and take a sequence $x_n \in \mathcal{X}$ such that $x_n \rightarrow \infty$. Then $\delta_{x_n}$ converges to $0$ in $(\DLone{m})_w$, but $\normK{\delta_{x_n}}^2 = k(x_n, x_n) = k(x_1,x_1)$. Thus $\delta_{x_n}$ does not converge in the strong topology induced by $k$.
\subsubsection{Does \texorpdfstring{$(\Dcomp{m})_w$}{(Em)_w} Continuously Embed into \texorpdfstring{$\HH_{\K}'$}{Hk'}?}
Under mild smoothness assumptions on $k$, yes: $(\Dcomp{m})_w$ continuously embeds into $\HH_{\K}'$ ---at least sequentially.
More precisely, inspired by a remark from \citet{matheron73}, we get the following two theorems.
\begin{theorem} \label{theo:Ws0}
The following six conditions are equivalent.
\begin{enumerate}
\item $k$ is continuous. \label{Ws01}
\item $\function{k(.,\hat{x})}{\mathcal{X}}{\HH_{\K}'}{x}{\emb_{\K}(\delta_x) = k(.,x)}$ is continuous.\label{Ws02}
\item $\function{\emb_{\K}}{(\M_{c})_{w}}{\HH_{\K}'}{}{}$ is continuous over the bounded sets of $(\M_{c})_w$. \label{Ws04}
\item $\function{\emb_{\K}}{(\M_{\delta} \cap \mathcal{M}_{\scriptscriptstyle{+}})_\sigma}{\HH_{\K}'}{}{}$ is continuous. \label{Ws07}
\item $\function{\emb_{\K}}{(\mathcal{P})_\sigma}{\HH_{\K}'}{}{}$ is continuous. \label{Ws05}
\item $\function{\emb_{\K}}{(\mathcal{M}_{\scriptscriptstyle{+}})_\sigma}{\HH_{\K}'}{}{}$ is continuous. \label{Ws06}
\end{enumerate}
If these conditions are satisfied, all these maps are sequentially continuous.
\end{theorem}
The $\sigma$ in \ref{Ws05} and \ref{Ws06} refer to the narrow topology $\sigma(\M_{\! f}, \Cont{}{b})$, which will be studied in more details in Section~\ref{sec:Narrow}.
For the general case $\mathcal{D} = \Dcomp{m}$, we state:
\begin{theorem} \label{theo:Ws}
If $k$ is $(m,m)$-times continuously differentiable, then the embedding $\function{\emb_{\K}}{(\Dcomp{m})_w}{\HH_{\K}'}{}{}$ is continuous over the bounded sets of $(\Dcomp{m})_w$. In particular, $\emb_{\K}$ is sequentially continuous over $(\Dcomp{m})_w$.
\end{theorem}
\begin{proof}{[of Theorems~\ref{theo:Ws0} and \ref{theo:Ws}]}
First, a word on Theorem~\ref{theo:Ws0}. That \ref{Ws01} and \ref{Ws02} are equivalent is proven for example by \citet[Theorem~4.29]{steinwart08}. Furthermore, it is clear that any of the points \ref{Ws04} to \ref{Ws06} imply \ref{Ws02} and that \ref{Ws06} $\Rightarrow$ \ref{Ws05} $\Rightarrow$ \ref{Ws07}. Thus, we are left with proving that \ref{Ws01} implies both \ref{Ws04} and \ref{Ws06}. The proof of these implications as well as of Theorem~\ref{theo:Ws} follow the same proof-schema, which we illustrate on the proof of \ref{Ws01} $\Rightarrow$ \ref{Ws04}.
\begin{enumerate}
\item Let $\mu_\alpha$ be a net contained in a bounded subset $\mathcal B$ of $\Dcomp{m}$ such that $\mu_\alpha \rightarrow 0$ in $w(\M_{c},\Cont{}{}) \cap \mathcal B$.
\item Show that, because $k \in \Cont{}{}(\mathcal{X} \times \mathcal{X})$, the map
\begin{equation*}
\function{B}{(\M_{c}(\mathcal{X}))_w \times (\M_{c}(\mathcal{X}))_w}{(\M_{c}(\mathcal{X} \times \mathcal{X}))_w}{(\mu,\nu)}{\mu \otimes \nu}
\end{equation*}
is (weakly) continuous when restricted to $\mathcal B \times \mathcal B$.
\item Conclude that $\normK{\mu_\alpha}^2 = [\mu_\alpha \otimes \bar \mu_\alpha](k) \rightarrow 0$.
\end{enumerate}
Appendix~\ref{sec:Proofs} details how to adapt the input and output sets of $B$ to prove each remaining implication. The continuity of each such map $B$ is also proven there. Finally, continuity over bounded sets implies sequential continuity (over the entire space $\mathcal{D}$), because any convergent sequence is bounded. (In general, however, it need not imply continuity over unbounded sets.)
\end{proof}
\begin{remark}
Theorem~\ref{theo:Ws0} shows that even if $\M_{c}$ embeds into $\HH_{\K}'$, the embedding may not be continuous from $(\M_{c})_w$ into $\HH_{\K}'$. Indeed, there exist non-continuous kernels such that $\HH_{\K} \subset \Cont{}{}$ \citep[see][]{lehto52}. With Proposition~\ref{prop:ContinuousRKHS}, this implies $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{}{}$, thus $\M_{c}$ embeds into $\HH_{\K}'$. But as $k$ is not continuous, $(\M_{c})_w \ensuremath{\hookrightarrow} \HH_{\K}'$ does not hold.
\end{remark}
In Theorem~\ref{theo:Ws0}, one may replace $(\M_{c})_w$ by its dense subset $\M_{\delta}$ equipped with the induced weak topology $w(\M_{c}, \Cont{}{}) \cap \M_{\delta}$. This shows we could have defined the KME as follows.
\begin{enumerate}
\item Embed $\M_{\delta}$ into $\HH_{\K}$ ;
\item Note that this embedding is continuous when $\M_{\delta}$ is equipped with the weak topology induced by $\M_{c}$;
\item Extend this embedding by continuity to $\M_{c}$. Theorem~\ref{theo:Ws0} then guarantees that this extension coincides with our previously defined KME.
\end{enumerate}
This technique of continuous extension has often been used as a starting point to embed measures into $\HH_{\K}$ (\citealp{matheron73, guilbart78} or \citealp[Chapter~4]{berlinet04}). The following proposition shows that for $\Dcomp{\infty}$, this continuous extension technique leads to the same KME definition as ours. Indeed, $\M_{\delta}$ is dense in $\Dcomp{\infty}$, when equipped with the weak or strong topology. Thus Theorem~\ref{theo:Ws} immediately yields
\begin{proposition}\label{prop:UniqueExtension}
Let $k \in \Cont{(\infty,\infty)}{}$. The KME of $\Dcomp{\infty}$ is the unique continuous linear extension of the KME of $\M_{\delta}$, when $\M_{\delta}$ is equipped with the (weak or strong) topology induced by $\Dcomp{\infty}$.
\end{proposition}
\subsection{When does \texorpdfstring{$k$}{K} metrise the topology of \texorpdfstring{$\mathcal{F}'$}{F'}?\label{sec:Q2}
The two preceding sections dealt solely with question \ref{Q1}.
They inquired under which conditions the weak and strong topologies induced by $k$ in a given dual $\mathcal{F}'$ are weaker than the original topology. To answer question \ref{Q2}, we now investigate under which conditions they are stronger.
First, the kernel \emph{must} be characteristic to $\mathcal{F}'$. If it was not, the weak and strong kernel induced topologies would not be Hausdorff (and the semi-metric $d_k$ not be a metric), thus could not be stronger than any topology we will consider.
So from now on, we assume that $k$ is characteristic to the set to embed.
Second, we will suppose that $\mathcal{F}$ is barrelled (see Definition in Appendix~\ref{sec:Reminders}). This is merely a technical assumption used to apply the Banach-Steinhaus theorem (see Appendix~\ref{sec:Reminders}, Theorem~\ref{theo:BS}) in the proof of Theorem~\ref{theo:Q2}. In practice, it is very unrestrictive: any Banach, Fréchet or Limit-Fréchet\footnote{Example of Limit-Fréchet spaces which are not Fréchet spaces are $\Cont{m}{c}$ and $\Dcomp{\infty}$ \citep{schwartzTD}.} space is barrelled. In particular, \emph{all function spaces defined in Section~\ref{sec:Definitions} are barrelled, except $(\Cont{m}{b})_c$ and perhaps $\complex^\inputS$.}
Third, we will focus on
bounded subsets of $\mathcal{F}'$. Let us justify why.
First, if a sequence converges in a Hausdorff topology, then it is bounded. Thus, two topologies that coincide on every bounded set define the same convergent sequences. Second, one of the most used sets of distributions is bounded: the set of probability measures $\mathcal{P}$. (Indeed, the topology of $\M_{\! f}$ is given by the total variation norm $\norm{.}_{TV}$ and, for any $P \in \mathcal{P}$, $\norm{P}_{TV} = \int \diff P = 1$.) But would $\mathcal{P}$ still be bounded, had $\M_{\! f}$ been equipped with its weak or with its narrow topology? Yes. This leads to a third good reason to consider bounded sets: \emph{if $\mathcal{F}$ is barrelled, then the Banach-Steinhaus theorem implies that all topologies stronger than the weak but weaker than the strong dual topology define the same bounded sets over $\mathcal{F}'$}.
In other words, for any such topology, if $\mathcal{F}$ is barrelled, a subset $\mathcal B$ of $\mathcal{F}'$ is bounded iff
\begin{equation}\label{eq:BoundedSets}
\forall f \in \mathcal{F} \,, \qquad \sup_{D \in \mathcal B} |D(f)| < \infty \, .
\end{equation}
The narrow topology is clearly such a topology: it is stronger than the weak-star, but weaker than the strong dual topology.
To introduce our next theorem, consider a space of finite Borel measures defined on a locally compact Hausdorff space $\mathcal{X}$. There are two common options to construct $\M_{\! f}$ as a dual space. One is to consider the space $\Cont{}{c}$ endowed with the topology of uniform convergence. The other is to consider its completion, $\Cont{}{0}$. Their duals both identify with $\M_{\! f}$. But do their weak dual topologies coincide? If $\mathcal{X}$ is not compact, they do not.\footnote{Proof: Equipped with $w(\M_{\! f}, \Cont{}{0})$, the dual of $\M_{\! f}$ is $\Cont{}{0}$. But equipped with $w(\M_{\! f}, \Cont{}{c})$ it is $\Cont{}{c}$.} The Banach-Steinhaus theorem, however, guarantees that, at least, they coincide on all bounded subsets of $\M_{\! f}$. The following theorem, proved in Appendix~\ref{proof:Q2}, states essentially the same, but with $\HH_{\K}$ and $\mathcal{F}$ instead of $\Cont{}{c}$ and $\Cont{}{0}$.
\begin{theorem}\label{theo:Q2}
Let $\mathcal{F}$ be a barrelled space such that $\HH_{\K} \ensuremath{\hookrightarrow} \mathcal{F}$ and that $k$ be universal over $\mathcal{F}$. On any bounded subset $\mathcal{B}$ of $\mathcal{F}'$, the weak-star topology coincides with the weak topology induced by $k$. Thus the topology induced by the semi-metric $d_k$ dominates the weak-star topology over any bounded subset of $\mathcal{F}'$ and
\begin{equation}\label{eq:Q2s}
b(\mathcal{F}',\mathcal{F}) \cap \mathcal{B} \ \supset \ b(\HH_{\K}',\HH_{\K}) \cap \mathcal{B} \ \supset \ w(\mathcal{F}',\mathcal{F}) \cap \mathcal{B} \ = \ w(\HH_{\K}',\HH_{\K}) \cap \mathcal{B} \, .
\end{equation}
\end{theorem}
Theorem~\ref{theo:Q2} may seem abstract, but for sequences, it simply means the following.
\begin{corollary} \label{cor:Q2}
Let $\mathcal{F}$ and $k$ be as in Theorem~\ref{theo:Q2}. Let $D_n$ be a bounded sequence in $\mathcal{F}'$, and $D \in \mathcal{F}'$.
\begin{enumerate}
\item $D_n(f) \rightarrow D(f)$ for any $f \in \mathcal{F}$ \gls{iff} $\bar D_n(f) \rightarrow \bar D(f)$ for any $f \in \HH_{\K}$.
\item If $\normK{D_n - D} \rightarrow 0$\,, then $D_n(f) \rightarrow D(f)$ for any $f \in \mathcal{F}$.
\item If $D_n \rightarrow D$ in $b(\mathcal{F}',\mathcal{F})$, then $\normK{D_n - D} \rightarrow 0$.
\end{enumerate}
\end{corollary}
With $\mathcal{F} = \Cont{m}{}$, we get the following important and stunning corollary.
\begin{corollary} \label{cor:Q2onDcomp}
Let $k$ be a kernel in $\Cont{(m,m)}{}$, and let $\mathcal B$ be a bounded subset of $\Dcomp{m}$. Then
\begin{equation}\label{eq:Q2bis}
b(\mathcal{F}',\mathcal{F}) \cap \mathcal{B} \ \supset \ b(\HH_{\K}',\HH_{\K}) \cap \mathcal{B} \ = \ w(\mathcal{F}',\mathcal{F}) \cap \mathcal{B} \ = \ w(\HH_{\K}',\HH_{\K}) \cap \mathcal{B} \, .
\end{equation}
In particular, on bounded subsets of $\Dcomp{m}$, the following statements are equivalent.
\begin{enumerate}[series=equiv]
\item For any $f \in \mathcal{F}$\,, $D_n(f) \rightarrow D(f)$. \label{conv1}
\item For any $f \in \HH_{\K}$\,, $D_n(f) \rightarrow D(f)$. \label{conv2}
\item $\normK{D_n - D} \rightarrow 0$. \label{conv3}
\end{enumerate}
Moreover, when $m = \infty$, the inclusion in \eqref{eq:Q2bis} is an equality and \ref{conv1}~-~\ref{conv3} are equivalent to:
\begin{enumerate}[resume=equiv]
\item $D_n \rightarrow D$ in $b(\Dcomp{\infty},\Cont{\infty}{})$. \label{conv4}
\end{enumerate}
\end{corollary}
\begin{proof}
Equality~\eqref{eq:Q2bis} is a straightforward consequence of Theorems~\ref{theo:Ws} and~\ref{theo:Q2}. The statements concerning the special case $m=\infty$ stem from the fact that, because $\Dcomp{\infty}$ is a Montel space, on bounded subsets, its weak and strong dual topologies coincide.
\end{proof}
Before closing this subsection, we group a few remarks.
\needspace{2\baselineskip}
\begin{remark}\label{rem:Q2onDcomp}
\leavevmode
\begin{enumerate}[label = (\roman*), itemsep=1ex]
\item Two topologies that coincide on every bounded subset of a topological space $X$ need not coincide on the whole space $X$. However, as any convergent sequence is bounded, they both define the same convergent sequences. (Thus, if both topologies are sequential and coincide on the bounded subsets of $X$, then they coincide on the whole space $X$.)
\item A subset $\mathcal B$ of $\M_{\! f}$ is bounded \gls{iff} it is uniformly bounded for the total variation norm, which is equivalent to the seemingly weaker condition~\eqref{eq:BoundedSets}. It is bounded in $\M_{c}$ \gls{iff} it is bounded in $\M_{\! f}$ (or even $\M_{r}$) and if all its elements have their support in a common compact subset of $\mathcal{X}$. In that case, $w(\M_{c}, \Cont{}{}) \cap \mathcal{B} = \sigma(\M_{c}, \Cont{}{b}) \cap \mathcal{B}$. More generally, $\mathcal B$ is bounded in $\Dcomp{m}$ \gls{iff} it is bounded in $\DLone{m}$ (or even $\Dall{m}$) and if the support of its elements are all contained in a common compact subset of $\mathcal{X}$.\label{rem:p2}
\item In Theorem~\ref{theo:Q2}, $\mathcal{F}$ continuously embeds into $\HH_{\K}$, thus $\mathcal{F}'$ continuously embeds into $\HH_{\K}'$. So bounded subsets of $\mathcal{F}'$ are also bounded for the kernel-induced metric. In general, the converse is false: if a subset $\mathcal{B}$ of $\mathcal{F}'$ is $d_k$-bounded, it need not be bounded in the original topology of $\mathcal{F}'$. Consider for example an unbounded sequence $x_n$ in $\mathcal{X}=\mathbb{R}^d$ and a bounded kernel $k$. Then $\emb_{\K}(\delta_{x_n})$ is bounded in $\HH_{\K}$\,, but $\delta_{x_n}$ is not bounded in $\M_{c}$\,, because the supports of the measures $\delta_{x_n}$ are not contained in a common compact subset of $\mathcal{X}$.
\item Corollary~\ref{cor:Q2onDcomp} states that on bounded subsets $\mathcal{B}$ of $\Dcomp{m}$, the weak and strong topologies of $\HH_{\K}$ coincide. This may seem surprising, as, in an infinite dimensional Hilbert space, even on bounded sets, weak and strong topologies in general do not coincide. For example, Bessel's inequality shows that any infinite orthonormal sequence converges weakly to 0. But it certainly does not converge strongly to 0. However, there again, $\mathcal{B}$ is not any bounded subset of $\HH_{\K}$~: it is both included in $\Dcomp{m}$ and bounded for its topology (which is stronger than that of $\HH_{\K}$~!).
\end{enumerate}
\end{remark}
So far, we focused on the two most common dual topologies: the weak and the strong dual topologies. Probability theory, however, certainly uses the narrow topology $\sigma(\M_{\! f}, \Cont{}{b})$ even more. So let us see how it compares with the topologies induced by $k$.
\subsection{When does \texorpdfstring{$k$}{K} Metrise the Narrow Convergence?\label{sec:Narrow}}
A kernel $k$ metrises the narrow topology on a set $\mathcal{B} \subset \M_{\! f}(\mathcal{X})$ if the strong topology induced by $k$ coincides on $\mathcal{B}$ with the narrow topology; i.e., if: $b(\HH_{\K}',\HH_{\K}) \cap \mathcal{B} = \sigma(\M_{\! f}, \Cont{}{b}) \cap \mathcal{B}$. When $\mathcal{B}$ is a bounded set consisting of \emph{positive} measures over a metrisable and separable (not necessarily locally compact) domain $\mathcal{X}$, the narrow convergence topology is metrisable\footnote{They are for example metrised by the Dudley or the Prokhorov metrics \citep[see][]{dudley02}.}. In that case, it is entirely defined on $\mathcal{B}$ by its convergent sequences, and we can equivalently define: $k$ metrises the narrow topology on a bounded set $\mathcal{B} \subset \M_{\! f}$ of positive measures iff: for any $\mu,\mu_1,\mu_2, \ldots \in \M_{\! f}(\mathcal{X})$, $\mu_n \rightarrow \mu$ narrowly \gls{iff} $\emb_{\K}(\mu_n) \rightarrow \emb_{\K}(\mu)$ in RKHS norm.
The quest for kernels that do metrise the narrow topology dates back at least to the 1970s. Criteria were already given by \citet{guilbart78} \citep[see also][Theorems~100 and 101]{berlinet04}. More recently, \citet[Theorem~23]{sriperumbudur10b}\footnote{Note that they call ``weak'' what we call ``narrow''.} pointed out that \emph{on compact domains $\mathcal{X}$}, any $c_0$-universal kernel metrises the narrow convergence topology on $\mathcal{P}$. Putting together Theorems~\ref{theo:Ws0} and \ref{theo:Q2} immediately yields a similar result (Corollary~\ref{cor:MetricOnCompact}). But things become trickier on unbounded domains. As we will see, the narrow topology is in general stronger than (the topology of) the kernel-induced metric $d_k$ (Proposition~\ref{prop:WeakerThanNarrow}), and often \emph{strictly} stronger (Proposition~\ref{prop:NonMetrization}). But there is an important exception: when focusing on probability measures (Proposition~\ref{prop:MetrizationOfNarrow})!
We start with the case when the input set $\mathcal{X}$ is compact. Then $\M_{\! f}(\mathcal{X}) = \M_{c}(\mathcal{X})$ and $w(\M_{\! f},\Cont{}{0}) = w(\M_{c},\Cont{}{})$. Thus Theorems~\ref{theo:Ws0} and \ref{theo:Q2} give:
\begin{corollary}\label{cor:MetricOnCompact}
Let $\mathcal{X}$ be a compact Hausdorff space. A kernel $k$ metrises the narrow topology on any bounded set of $\M_{\! f}$ \gls{iff} it is continuous and $c_0$-universal. In particular, a continuous $c_0$-universal kernel metrises the narrow topology over $\mathcal{P}$.
\end{corollary}
\begin{proof}
If $k$ is continuous and bounded, then $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{}{}$. Thus, Theorem~\ref{theo:Q2} shows that the kernel metric $d_k$ is stronger than the narrow convergence topology, and Theorem~\ref{theo:Ws0} that it is weaker. So both topologies coincide. Conversely, if both topologies coincide, then $k$ must be characteristic to $\M_{\! f}$ (for $d_k$ to be metric) and the implication $\ref{Ws05} \Rightarrow \ref{Ws01}$ of Theorem~\ref{theo:Ws0} shows that $k$ is continuous.
\end{proof}
We now turn to the general case, where $\mathcal{X}$ is a locally compact Hausdorff set. Reformulating Theorem~\ref{theo:Ws0} (which also holds, even if $\mathcal{X}$ is not paracompact), we immediately get:
\begin{proposition}[$(\M_{\! f})_\sigma \ensuremath{\hookrightarrow} \HH_{\K}$]\label{prop:WeakerThanNarrow}
Let $\mathcal{X}$ be a locally compact Hausdorff space and let $k$ be a bounded kernel on $\mathcal{X}$. The topology induced by the semi-metric $d_k$ in $\M_{\! f}$ is weaker than the narrow topology.
\end{proposition}
There exists an analogue of Proposition~\ref{prop:WeakerThanNarrow} when, instead of being locally compact, $\mathcal{X}$ is a separable metric space (see Appendix~\ref{proof:WeakerThanNarrowPolish}).
Summarising, we see that, whether $\mathcal{X}$ be a locally compact Hausdorff or a separable metric space, the narrow topology is in general stronger than the kernel-induced metric. Conversely, \citet{guilbart78} showed that, on any separable metric space, there exist kernels that do metrise the narrow topology over the set of finite \emph{positive} measures $\mathcal{M}_{\scriptscriptstyle{+}}$. However, the following proposition (proved in Appendix~\ref{proof:NonMetrization}) shows that being continuous and characteristic to $\M_{\! f}$ is not sufficient.
\begin{proposition}\label{prop:NonMetrization}
Let $\mathcal{X} = \mathbb{R}^d$ and let $k$ be a continuous stationary kernel $k(\hat x, \hat y) = \psi(\hat x - \hat y)$ such that $\psi \in \Cont{}{0}$.
Then $k$ does not metrise the narrow convergence topology over any subset of $\M_{\! f}(\mathbb{R}^d)$ that contains $\mathcal{P} \cup \{ 0 \}$.
\end{proposition}
Examples of such sets include $\M_{\! f}(\mathbb{R}^d)$, $\M_{\! f}^{\scriptscriptstyle{\leq 1}}(\mathbb{R}^d)$, $\mathcal{M}_{\scriptscriptstyle{+}}^{\scriptscriptstyle{\leq 1}}(\mathbb{R}^d)$, but not $\mathcal{P}(\mathbb{R}^d)$. We do not know whether this result extends to any (possibly non-stationary) kernel such that $\HH_{\K} \ensuremath{\hookrightarrow} \Cont{}{0}(\mathbb{R}^d)$.
Proposition~\ref{prop:NonMetrization} is somewhat disappointing. On the one side, kernels satisfying its assumptions~---Gaussian kernels for example--- are among the most used kernels in machine learning and geostatistics. They have several nice properties. For instance, the norm associated to a measure does not depend on the choice of origin in $\mathcal{X}$. On the other side, they do not metrise the narrow topology, probably the most wide-spread topology in probability theory and statistics. These fields, however, focus on a very specific subset of $\M_{\! f}$: \emph{probability} measures. For those, we will now show that \emph{any} continuous and characteristic kernel metrises the narrow convergence. We consider this the second main result of this paper.
\begin{theorem}\label{theo:MetrizationOfNarrow2}
A bounded kernel $k$ over a locally compact Hausdorff space $\mathcal{X}$ metrises the narrow topology over $\mathcal{P}$ \gls{iff} it is continuous and characteristic (to $\mathcal{P}$). In particular, if $k$ is continuous and \gls{ispd} (or continuous and $c_0$-universal), then $k$ metrises the narrow topology over $\mathcal{P}$.
\end{theorem}
\begin{proof}{[Theorem~\ref{theo:MetrizationOfNarrow2}]}
If $k$ metrises the narrow topology over $\mathcal{P}$, then $k$ is obviously characteristic, and Theorem~\ref{theo:Ws0} shows that $k$ is continuous. Conversely, if $k$ is continuous, then by Theorem~\ref{theo:Ws0}, the kernel metric on $\mathcal{P}$ is weaker than the narrow topology. Thus it suffices to show that $w(\M_{\! f}, \HH_{\K})$ is stronger than the narrow topology over $\mathcal{P}$. Consider the kernel $k_1 := k + 1$. From Theorem~\ref{theo:CKCharacterisation} it follows that $k_1$ is \gls{ispd}, thus Lemma~\ref{lem:WandW} (see Appendix~\ref{proof:WandW}) shows that $k_1$ metrises the vague topology $w(\mathcal{P}, \Cont{}{c})$. But on $\mathcal{P}$, the vague and the narrow topology coincide \citep[Chapter~2, Corollary~4.3]{berg84}. Thus $k_1$ metrises the narrow topology over $\mathcal{P}$. And $k_1$ and $k$ induce the same metric in $\mathcal{P}$.
\end{proof}
To the best of our knowledge, so far, the most general sufficient conditions for a kernel to metrise the narrow topology over $\mathcal{P}$ were given by Theorem~2 of \citet{sriperumbudur13}. It actually deals with families of kernels, but when applied to a single kernel, it states: on a Polish\footnote{A \emph{Polish space} is a complete, separable, metric space.}, locally compact (Hausdorff) space, any continuous, $c_0$-universal kernel metrises the narrow convergence topology over $\mathcal{P}$. Let us compare it to Theorem~\ref{theo:MetrizationOfNarrow2}. A kernel $k$ is continuous and $c_0$-universal \gls{iff} $k$ belongs to $\Cont{(0,0)}{0}$ and is characteristic to $\M_{\! f}$. Both these assumptions are now relaxed: instead of vanishing at infinity, $k$ only needs to be bounded; instead of characteristic to $\M_{\! f}$, it only needs to be characteristic to $\mathcal{P}$. Thanks to these weaker assumptions, Theorem~\ref{theo:MetrizationOfNarrow2} can be stated as an \gls{iff} statement.
The other major difference is that we relax the assumption that $\mathcal{X}$ be Polish, and keep only the local compact Hausdorff assumption. Doing so, we align with the trend promoted by Bourbaki to do probability theory on locally compact Hausdorff rather than Polish spaces. Wether
we could have relaxed the local compact Hausdorff and kept the Polish assumption instead remains the main and most important open question of this paper.
\subsection{Is \texorpdfstring{$\HH_{\K}'$}{Hk'} a Space of Distributions?\label{sec:Surjective}}
So far, we focused on the two (complementary) questions: when is the KME injective over a set of distributions $\mathcal{D}$? And when does $k$ metrise the topology of $\mathcal{D}$? We now briefly examine the two converse questions:
\begin{enumerate}[resume*=questions]
\item When is the KME surjective? \label{Q3}
\item And if it is, does $k$ metrise the topology of $\mathcal{D}$? \label{Q4}
\end{enumerate}
Both these questions have important practical applications. Indeed, just reason in terms of sequences. A positive answer to the first (resp.\ second) question would yield: ``If $\emb_{\K}(D_n)$ converges to $g \in \HH_{\K}$, then there exists a distribution $D$ such that $g = \emb_{\K}(D)$ (resp.\ and $D_n \rightarrow D$ in $\Dall{\infty}$).''
The difference with \ref{Q1} and \ref{Q2} is huge: they assume that the limit $D$ is the KME of a distribution. Instead, if the KME was surjective, then whatever the convergent sequence of KMEs and \emph{whatever its limit} (in RKHS norm at least), we would know that this limit is the KME of a distribution. Nevertheless, our answers to \ref{Q3} and \ref{Q4} will unfortunately apply only to very specific cases.
We concentrate on \ref{Q4}. Recall that $\mathcal{D}$ is a topological space of distributions if it is a subspace of $\Dall{\infty}$ that carries a stronger topology $\mathfrak{T}_\mathcal{D}$ than the topology induced by $\Dall{\infty}$. In particular, $\mathfrak{T}_\mathcal{D}$ is always Hausdorff. Consequently, if $\mathcal{D}$ embeds into an RKHS $\HH_{\K}$ and if the induced kernel-metric dominates the initial topology $\mathfrak{T}_\mathcal{D}$, then $\emb_{\K}$ must be injective. So if $\emb_{\K}$ is also surjective, then it is bijective. We may then identify $\mathcal{D}$ and $\HH_{\K}$ algebraically. And if we endow $\mathcal{D} \equiv \HH_{\K}$ with the kernel metric, then $\HH_{\K}$ (or rather $\overline \HH_{\K}'$) becomes a topological space of distributions. Asking \ref{Q4} thus boils down to asking: when does $\HH_{\K}$ (or $\overline \HH_{\K}'$) identify with a topological space of distributions? So, to answer \ref{Q4}, we may use any known criterion to check whether a space of linear forms is a topological space of distributions. The most common criterion is the following: if $\Cont{\infty}{c}$ is continuously contained and dense in a \gls{lcv} TVS $\mathcal{F}$, then $\mathcal{F}'$ is continuously contained in $\Dall{\infty}$. Said differently, $\mathcal{F}'$ is then a topological space of distributions. Applying this with $\mathcal{F} = \Cont{}{0}$, for example, is how one identifies $\M_{\! f}$ as a (topological) subspace of $\Dall{\infty}$. And applying it with $\mathcal{F} = \HH_{\K}$ yields Proposition~\ref{prop:TrivialEmbedding}, proved in Appendix~\ref{proof:TrivialEmbedding}.
\begin{proposition}\label{prop:TrivialEmbedding}
If $\Cont{\infty}{c}$ is continuously contained and dense in $\HH_{\K}$, then $\HH_{\K}$ identifies via the KME with a topological space of distributions via the KME.
\end{proposition}
In practice, the assumptions of Proposition~\ref{prop:TrivialEmbedding} seem cumbersome to verify.
Both examples of RKHSs that do and that do not verify these assumptions exist. Any Sobolev space $\Sobo{m,2}{0}(\mathbb{R}^d)$ does. And it is an RKHS whenever $m > 1/2$ \citep[Theorem~121]{berlinet04}. (But honestly: no need to use Proposition~\ref{prop:TrivialEmbedding} to re-discover that the duals of these Sobolev spaces are topological spaces of distributions.) On the other hand, Gaussian kernels do not verify the assumptions, because, contrary to $\Cont{\infty}{c}$, all functions of a Gaussian RKHS are extendable to entire functions over $\mathbb{C}$ \citep[Corollary~4.40]{steinwart08}.
Instead of wondering on what conditions $\HH_{\K}$ identifies with a subset of distributions, we may wonder, whether it might be a superset of distributions. Could there be any RKHS such that all distributions $\Dall{\infty}$ would embed into $\HH_{\K}$? If $\HH_{\K}$ was continuously included in $\Cont{\infty}{c}$, yes. But the following lemma, proved in Appendix~\ref{proof:HKnotBigger}, often excludes this inclusion.
\begin{lemma}\label{lem:HKnotBigger}
If $\mathcal{X}$ is non-compact subset of $\mathbb{R}^d$ and if $k$ is \gls{spd}, then $\HH_{\K}$ contains functions with non-compact support.
\end{lemma}
Two comments on the assumptions of this result. First, the assumption that $k$ be \gls{spd} is not very restrictive, for the identification of $\HH_{\K}$ with a sub- or superset of $\Dall{\infty}$ would only make sense, if the canonical embedding of one into the other was injective. And this requires an \gls{spd} kernel. As for the other assumption, that $\mathcal{X}$ be non-compact, it is also rather natural, because we already know that, as soon as $k$ is smooth, $\HH_{\K}$ can embed all distributions with compact support.
Summarising, we answered \ref{Q4} positively in some cases (when $\Cont{\infty}{c}$ embeds continuously into $\HH_{\K}$), but left many others unanswered. Lemma~\ref{lem:HKnotBigger} is good news: it fortifies the presumption that RKHSs are at least not bigger than $\Dall{\infty}$. Whether they can always be seen as the KME of a distribution space remains, however, an open question.
\section{Conclusion\label{sec:Conclusion}}
We first discuss how this work relates and contributes to existing machine learning literature and then conclude with future work and closing remarks.
\paragraph{Comparison with Related Machine Learning Literature.}
Universal and characteristic kernels play an important role in learning theory and machine learning. Universal kernels ensure the consistency of some RKHS-based estimators in the context of regression and classification \citep{steinwart01}, whereas characteristic kernels have found applications in the context of two-sample tests \citep{gretton07, gretton12}, independence tests \citep{gretton08, gretton10, fukumizu08} and kernel density estimators \citep{sriperumbudur13}. The terminology is surprisingly recent: in the past fifteen years, the machine learning community introduced various notions of universality \citep{steinwart01, micchelli06, carmeli06, caponnetto08}, accompanied by sufficient conditions on kernels to guarantee their universality. Meanwhile, \citet{fukumizu04} introduced the notion of a characteristic kernel to $\mathcal{P}$ followed by a series of articles \citep{fukumizu04, fukumizu08, fukumizu09a, fukumizu09b, gretton07, sriperumbudur08, sriperumbudur10a, sriperumbudur10b} to characterise this notion. \Citet{gretton07} were first to link universal and characteristic kernels, by showing that characteristic implies universal.
\Citet{fukumizu09b} were first to explicitly link \gls{ispd} and characteristic kernels, by showing that one implies the other. \Citet{sriperumbudur10b} then used this link to prove handy sufficient criteria for a kernel to be characteristic. In their overview article, \citet{sriperumbudur11} catalogue known (and complete some missing) relations between the various notions of universal, characteristic and \gls{spd} kernels that had appeared. However, they do not clearly systemise their equivalence. Theorem~\ref{theo:UniversalMeansCharacteristic} and Proposition~\ref{prop:SPD} fill this gap, by showing that, if $\HH_{\K}$ continuously embeds into $\mathcal{F}$, then $k$ is universal over $\mathcal{F}$ iff it is characteristic (or, equivalently, \gls{spd}) over $\mathcal{D} = \mathcal{F}'$. This is surprisingly easy to prove, simple to remember and covers almost any case encountered in practice... except the most common one: when the kernel is characteristic to $\mathcal{P}$. Theorem~\ref{theo:CKCharacterisation} and Proposition~\ref{prop:UniversalityForP} palliate this shortage and complete respectively Theorem~\ref{theo:UniversalMeansCharacteristic} and Proposition~\ref{prop:SPD}.
Although introduced much earlier in the mathematical community \citep{guilbart78}, the question whether a given kernel metrises the narrow topology was introduced and studied in the machine learning community by \cite{sriperumbudur10b}. They provided sufficient conditions, later on improved and used by \citet{sriperumbudur13} to upper bound convergence rates of kernel density estimators. Theorem~\ref{theo:MetrizationOfNarrow2} generalises these sufficient conditions and finally provides a converse on locally compact Hausdorff spaces.
The key observation underlying this paper is the dual link between the embedding of $\HH_{\K}$ into $\mathcal{F}$ and the KME of $\mathcal{F}'$, which is captured in Lemma~\ref{lem:Transpose} and Corollary~\ref{cor:EmbedDuals}. We do not claim originality for this insight but hope that this work will convince the machine learning community of its usefulness. Not only does it underly the link between universal, characteristic and \gls{spd} kernels, but it straightforwardly leads to the extension of KMEs from measures to distributions. Although we discuss possible applications (see discussions after Theorem~\ref{theo:Differentiation}), we have not yet specifically used this extension in a machine learning problem. But the calculus rules of Section~\ref{sec:Calculus} are promising, particularly the link between derivatives of embeddings and embeddings of derivatives. And considering the importance of Schwartz-distributions even in such applied problems as the resolution of (partial) differential equations, we are confident that the extension of KMEs will find useful machine learning applications. Meanwhile, it can be seen as a curious byproduct of Lemma~\ref{lem:Transpose} that completes the theory of KMEs and offers memorable results (Fubini Theorem, Corollary~\ref{cor:Existence}, Proposition~\ref{prop:CompactCharacteristicRd}, Proposition~\ref{prop:UniqueExtension}).
\paragraph{Future Work and Closing Remark.}
Except when explicitly stated otherwise, we always assumed that $\mathcal{X}$ is locally compact. This hypothesis seems more and more unadapted to the general trend in probability theory which is to use Polish spaces, such as separable Banach spaces. But a Banach space is locally compact iff it is finite dimensional. Whether Theorem~\ref{theo:MetrizationOfNarrow2} also holds for any Polish space is certainly the most important open question of this paper. Our choice to work with locally compact spaces is all the more questionable, seeing that every kernel over $\mathcal{X}$ defines a very natural (semi-) metric over $\mathcal{X}$, namely $\rho_k(\hat x, \hat y) := \normK{k(.,\hat x) - k(.,\hat y)}$. Topologies over graphs, for example, are often defined via such kernel-induced metrics. However, local compactness naturally fits distributions in general, and more specifically measures, when defined via the Riesz representation theorem.
Overall, we think our work offers good insights in the nature of the functions that appear when completing $\HH_{\K}^{\mathrm{\scriptscriptstyle{pre}}}$ to $\HH_{\K}$. Indeed, recall that $\HH_{\K}^{\mathrm{\scriptscriptstyle{pre}}}$ is the set of finite linear combinations of $k(.,x)$. Thus the question: when completing $\HH_{\K}^{\mathrm{\scriptscriptstyle{pre}}}$, what else could appear than functions that are ``infinite linear combinations of $k(.,x)$''? When saying ``infinite linear combinations of $k(.,x)$'', one might first think of continuous sums of weighted infinitesimals $k(.,x) \diff \mu(x)$, meaning the KME $\int k(.,x) \diff \mu(x)$ of a measure~$\mu$. One may, however, reasonably argue that distributions are similar to measures, but allow for more general weighting schemes. So it is only natural that, under suitable assumptions on $k$, they may also embed into $\HH_{\K}$; in general not all of them, but at least all those with compact support as soon as $k$ is smooth. In some cases, the embeddable distributions even suffice to cover the whole space $\HH_{\K}$ (for example, when $\HH_{\K}$ is a Sobolev space $\Sobo{m,2}{0}(\mathbb{R}^d)$ with $m > 1/2$). However, remember that $\HH_{\K}'$ identifies with $\HH_{\K}$ via the anti-linear Riesz representer map. And after all, with weak-integration, this is just saying that $\HH_{\K}$ contains exactly all those functions $\int k(.,x) \diff \mu(x)$ where $\mu$ might not be a continuous linear form over $\Cont{\infty}{c}$ (in which case it would be a distribution), but is at least a continuous linear form over $\HH_{\K}$.
\acks{
We are deeply indebted to Alphabet for their support via a Google European Fellowship in Causal Inference accorded to Carl-Johann Simon-Gabriel. We thank Bharath Sriperumbudur for enlightening remarks, Jonas Peters for his kind and helpful advice, and Ilya Tolstikhin for useful discussions and encouragements.
}
|
\section{Introduction} \label{sec:intro}
In this paper, we consider the following Allen-Cahn model
\cite{Allen_Cahn79}:
\begin{equation}\label{eq:AC}
\begin{aligned}
u_t - \Delta u + \frac{1}{\epsilon^2}f(u) &=0 \qquad \mbox{in }
\Omega_T:=\Omega\times(0,T),\\
\frac{\partial u}{\partial n} &=0 \qquad \mbox{on }
\partial\Omega_T:=\partial\Omega\times(0,T),
\end{aligned}
\end{equation}
and the following Cahn-Hilliard model \cite{Cahn_Hilliard58}:
\begin{equation} \label{eq:CH}
\begin{aligned}
u_t-\Delta w &=0 \qquad \mbox{in } \Omega_T,\\
-\epsilon\Delta u +\frac{1}{\epsilon}f(u) &=w \qquad \mbox{in }
\Omega_T,\\
\frac{\partial u}{\partial n} =\frac{\partial w}{\partial n} &=0
\qquad \mbox{on } \partial\Omega_T.
\end{aligned}
\end{equation}
The initial condition is set as $u|_{t=0} = u_0$. Here, $T$ is the end
time, $\Omega\subset \mathbb{R}^d \,(d=2,3)$ is
a bounded domain and $f=F'$ for some double well potential $F$ which, in
this paper, is taken to be the following polynomial:
\begin{equation}\label{double-well} F(u)=\frac{1}{4}(u^2-1)^2.
\end{equation}
In recent years, there have been a lot of studies in the literature on
the modeling aspects and their numerical solutions for both Allen-Cahn
and Cahn-Hilliard equations. For the modeling aspects, we refer to
\cite{Allen_Cahn79, cahn1996limiting, Cahn_Hilliard58, novick1998cahn,
xinfu1994spectrums, Chen96, Evans_Soner_Souganidis92,
boyer2014hierarchy, wu2017multiphase}. In this paper, we will focus
on the numerical schemes for both these equations. Among the various
different schemes studied in the literature, a special class of
partially implicit schemes, known as convex splitting schemes, appears
to be most popular, c.f.~\cite{guillen2014second, guan2014second,
feng2015long, shen2011spectral, shen2010numerical, yang2009error,
Feng_Li15} for the Allen-Cahn equation and \cite{guillen2014second,
aristotelous2013mixed, feng2015long, shen2010numerical,
shen2011spectral, shen2010energy, guan2014second, feng2015analysis,
Eyre98} for the Cahn-Hilliard model. The popularity of the CSS is
due to, among others, its two advantages: (1) a typical CSS is
unconditionally energy-stable without any stringent restriction
pertaining to the time step; (2) the resulting nonlinear numerical
system can be easily solved (e.g. Newton iteration is guaranteed to
converge regardless of the initial guess). In comparison, a standard
fully implicit scheme is only energy-stable when the time step size is
sufficiently small.
It is against the conventional wisdom that a partially implicit scheme
such as the convex splitting scheme has a better stability property
than a fully implicit scheme. One main goal of this paper is to
understand this unusual phenomenon. For the Allen-Cahn model, we
prove that the standard first-order CSS is exactly the same as the
standard first-order FIS but with a (much) smaller time step size and
as a result, it would provide an approximation to the original
solution of the Allen-Cahn model at a delayed time (although the
magnitude of the delay is reduced when the time step size is
reduced). Such a time delay is also observed for other partially
implicit schemes when time step size is not sufficient small. For the
Cahn-Hilliard model, we prove that the standard CSS is exactly the
same as the standard FIS for a different model that is a (nontrivial)
perturbation of the original Cahn-Hilliard model. This at least
explains theoretically why a CSS has a better stability property than
a FIS does since a CSS is actually a FIS with a very small time-step
size. In addition, we argue that such a gain of stability is at the
expense of a possible loss of accuracy.
Given the aforementioned equivalences between CSS and FIS and the
popularity of CSS in the literature, the value of FIS with a seemingly
stringent time-step constraint (which, again, are equivalent to CSS
without any time-step constraint) should be re-examined.
Indeed, the importance of using fully implicit schemes for the phase
field simulations has been addressed in the existing literature, e.g.
\cite{du1991numerical, feng2003numerical, feng2007analysis,
rosam2007fully, GBH08, shen2011spectral, graser2013time,
guillen2014second, Feng_Li15, feng2015analysis, li2015numerical,
wu2017multiphase}. In this paper, we further study
three families of new algorithms for FIS. First, we
revisit the standard fully implicit scheme by extending it to a energy
minimization problem at each time step. The minimization problem,
however, admits a non-convex discrete energy when the time step size
is not sufficiently small. Furthermore, we will be able to prove, rather
straightforwardly, that the global minimizer satisfies the
unconditional energy-stability, which is a natural property for linear
systems and the desired property for the nonlinear systems like the
Allen-Cahn or the Cahn-Hilliard equations. The results given by the
energy minimization problem is quite different from those given by the
standard fully implicit scheme. More precisely, instead of the severe
restriction pertaining to the time step size, the energy minimization
problem gives a good approximation to the physical solution only when
the discretization error in time is controlled. Moreover, with the
energy minimization problem, various minimization solvers (e.g.
L-BFGS \cite{nocedal1980updating, byrd1995limited}) can be efficiently
applied. This may lead a promising direction to the design of accurate
and efficient numerical schemes for phase field modeling.
Secondly, we propose a modification of a typical FIS for the
Allen-Cahn so that the maximum principle will be valid on the discrete
level. Thirdly, for this modified FIS scheme, we rigorously show
that, under the appropriate time-step size constraint, the
linearization of such a modified FIS can be uniformly preconditioned
by a Poisson-like operator.
Second-order partially implicit schemes have also been designed in the
literature with the same purpose of allowing large time step size as
the first-order partially implicit schemes. But similar to the
standard CSS, the time delay happens with large time step
size. Actually, the second-order CSS (cf. \cite{guillen2014second,
shen2011spectral, shen2010numerical, yang2009error}) can also be
viewed as the modified Crank-Nicolson scheme \cite{du1991numerical,
shen2010numerical, condette2011spectral} on the artificially
convexified model. Further, we demonstrate that, through numerical
experiments with the modified Crank-Nicolson scheme, an
unconditionally energy stable scheme is not necessarily better than a
conditionally energy stable scheme.
The rest of paper is organized as follows. In \S \ref{sec:1st-order},
we focus on the first-order schemes. We study the convexity of the
fully implicit scheme, prove that a typical first-order CSS is exactly
equivalent to some first-order FIS. We also introduce the energy
minimization version of some first-order FIS, and show that the convex
splitting schemes can be viewed as artificial convexity schemes. In
\S \ref{sec:modified-FIS}, we propose a modified FIS (or CSS) that
satisfies maximum principle on the discrete level and further prove
that the modified scheme can be preconditioned by a Poisson-like
operator. In \S \ref{sec:2nd-order}, we discuss the second-order
schemes. We study a modified Crank-Nicolson scheme and its convex
splitting version, compare the modified Crank-Nicolson scheme and some
other second-order partially implicit schemes. Finally, in \S
\ref{sec:concluding}, we give some concluding remarks.
\section{First-order schemes} \label{sec:1st-order}
First, we introduce some notation. Let $\mathcal{T}_h$ be a
shape-regular (which may not be quasi-uniform) triangulation of
$\Omega \subset \mathbb{R}^d \ (d=2,3)$. The nodes of $\mathcal{T}_h$
is denoted by $\mathcal{N}_h$. $K$ represents each element and
$\overline{\Omega}=\bigcup_{K\in\mathcal{T}_h} \overline{K}$. Let
$h_K$ denote the diameter of $K\in \mathcal{T}_h$ and
$h:=\mbox{max}\{h_K; K\in\mathcal{T}_h\}$. Define the finite element
space $V_h$ by
\begin{equation} \label{eq:Pr}
V_h = \bigl\{v_h\in C(\overline{\Omega}): v_h|_K=P_r(K)\bigr\},
\end{equation}
where $P_r(K)$ denotes the set of all polynomials whose degrees do not
exceed a given positive integer $r$ on $K$. The $L^2$-inner product
over the domain $\Omega$ is denoted by $(\cdot, \cdot)$. For the time
discretization, let $k_n$ denote the time step size on $n$-th step and
$t_n := \sum_{i=1}^n k_i$.
\subsection{Fully implicit schemes and their convexity and energy
stability properties} \label{sec:FIS}
A standard first-order fully implicit scheme to problem \eqref{eq:AC}
(FIS in short) is defined by seeking $u_h^n\in V_h$ for $n=1,2,\cdots
$, such that
\begin{equation}\label{eq:FIS-AC}
(\frac{u_h^{n}-u_h^{n-1}}{k_n},v_h)+(\nabla u_h^{n},\nabla v_h) +
\frac{1}{\epsilon^2}(f(u_h^{n}),v_h) = 0 \qquad\forall v_h\in V_h.
\end{equation}
A standard first-order FIS to problem \eqref{eq:CH} is defined by
seeking $u_h^n \in V_h$ and $w_h^n \in V_h$ for $n=1,2,\cdots$, such
that
\begin{equation} \label{eq:FIS-CH}
\begin{aligned}
(\frac{u_h^{n}-u_h^{n-1}}{k_n},\eta_h)+(\nabla w_h^{n},\nabla \eta_h) &=0
\qquad \forall \,\eta_h\in V_h, \\
\epsilon (\nabla u_h^{n},\nabla v_h) + \frac{1}{\epsilon}((u_h^n)^3 -
u_h^n,v_h)-(w_h^{n},v_h) &=0 \qquad \forall\,
v_h\in V_h.
\end{aligned}
\end{equation}
Following \cite{Evans_Soner_Souganidis92,Ilmanen93}, the
Allen-Cahn equation \eqref{eq:AC} can be interpreted as the
$L^2$-gradient flow for the free-energy functional, namely
\begin{equation}\label{eq:energy-AC}
\begin{aligned}
J_\epsilon^{\rm AC}(v) &:=
\int_\Omega \Bigl( \frac12 |\nabla v|^2
+ \frac{1}{\epsilon^2} F(v) \Bigr)\, dx, \\
\frac{d}{dt}J_\epsilon^{\rm AC}(u(t)) &= \bigl(-\Delta
u+\frac{1}{\epsilon^2}f(u),u_t\bigr)_{L^2(\Omega)}=-\|u_t\|_{L^2(\Omega)}^2\leq0.
\end{aligned}
\end{equation}
Following \cite{Alikakos_Bates_Chen94,Chen96,Pego89}, the
Cahn-Hilliard equations \eqref{eq:CH} can be interpreted as the
$H^{-1}$-gradient flow for the free-energy functional, namely
\begin{equation}\label{eq:energy-CH}
\begin{aligned}
J_\epsilon^{\rm CH}(v) &:= \int_\Omega \Bigl( \frac\epsilon2 |\nabla v|^2+
\frac{1}{\epsilon} F(v) \Bigr)\, dx, \\
\frac{d}{dt}J_\epsilon^{\rm CH}(u(t)) &= \bigl(\Delta(\epsilon\Delta
u-\frac{1}{\epsilon}f(u)),u_t\bigr)_{H^{-1}(\Omega)}
=-\|u_t\|_{H^{-1}(\Omega)}^2\leq 0.
\end{aligned}
\end{equation}
Therefore, we say that a discretization scheme such as \eqref{eq:FIS-AC} or
\eqref{eq:FIS-CH} is energy-stable if
\begin{equation} \label{AC-CH-stability}
J_\epsilon^{\rm AC}(u^n_h)\le J_\epsilon^{\rm AC}(u^{n-1}_h) \quad
\mbox{or} \quad
J_\epsilon^{\rm CH}(u^n_h)\le J_\epsilon^{\rm CH}(u^{n-1}_h) \qquad
n=1,2,\ldots
\end{equation}
We would like to point out that the concept of energy-stability for
the nonlinear schemes such as \eqref{eq:FIS-AC} or
\eqref{eq:FIS-CH} is different from the standard concept
of stability for linear schemes. For most linear systems (e.g.
heat equation), a fully implicit scheme is usually unconditionally
stable. But for nonlinear systems, fully implicit schemes such as
\eqref{eq:FIS-AC} or \eqref{eq:FIS-CH} are only conditionally
energy-stable, namely they are only energy-stable when the time-step
size $k_n$ is appropriately small. This is well-known fact in the
phase-field literature (cf. \cite{feng2003numerical, graser2013time}).
For completeness, we will study this energy-stability property through
the study of the convexity of the relevant schemes. Further, we extend
the standard schemes to the energy minimization versions at each
time step, which seem to have better numerically performance.
\subsubsection{Convexity of fully implicit schemes for the Allen-Cahn
equation}
In this section, we next study the convexity property of the FIS of
the Allen-Cahn and Cahn-Hilliard equations. Consider the Allen-Cahn
equation, in view of \eqref{eq:energy-AC}, we define the following
discrete energy
\begin{equation} \label{eq:FIS-AC-energy}
E_n^{\rm AC}(u_h ;u_h^{n-1})
=J_\epsilon^{\rm AC}(u_h)+\frac{1}{2k_n}\int_{\Omega}(u_h - u_h^{n-1})^2dx.
\end{equation}
We also extend the standard first-order fully implicit scheme to the
following energy minimization problem:
\begin{equation} \label{equ:FIS-AC-energy-min}
u_h^n = \underset{u_h\in V_h}{\mathrm{argmin}} E_n^{\rm AC}(u_h;u_h^{n-1}).
\end{equation}
\begin{theorem}\label{thm:convexity-FIS-AC}
We have
\begin{enumerate}
\item Under the condition that $k_n\leq \epsilon^2$, $E_n^{\rm
AC}(\cdot;u_h^{n-1})$ is strictly convex on $V_h$.
\item The solution of \eqref{eq:FIS-AC} satisfies $(E_n^{\rm
AC})'(u_h^n; u_h^{n-1})(v_h) = 0$.
\item The following discrete energy law holds for
\eqref{equ:FIS-AC-energy-min}
\begin{align}\label{eq:FIS-AC-energy-law}
J_\epsilon^{\rm AC}(u_h^n) + \frac{1}{2k_n}\|u_h^n -
u_h^{n-1}\|_{L^2(\Omega)}^2 \leq J_\epsilon^{\rm AC}(u_h^{n-1}).
\end{align}
\end{enumerate}
\end{theorem}
\begin{proof}
Taking the second derivative of $E_n^{\rm AC}(\cdot;u_h^{n-1})$, we
get for any $v_h \in V_h$,
\begin{equation}\label{eq:FIS-AC-frechet}
(E_n^{\rm AC})''(u_h;u_h^{n-1})(v_h,v_h) =
\frac{3}{\epsilon^2}\int_{\Omega}u_h^2v_h^2dx +
\int_{\Omega}(\frac{1}{k_n}-\frac{1}{\epsilon^2})v_h^2dx + \|\nabla
v_h\|_{L^2(\Omega)}^2.
\end{equation}
When $k_n\leq \epsilon^2$, $(E_n^{\rm AC})''(u_h;u_h^{n-1})(v_h,v_h)>0$ when
$v_h\neq 0$, which means $E(\cdot;u_h^{n-1})$ is strictly convex on
$V_h$.
A direct calculation shows that \eqref{eq:FIS-AC} satisfies $(E_n^{\rm
AC})^{\prime}(u_h^n;u_h^{n-1})(v_h) = 0$, and the following coercivity
condition holds:
\begin{equation}\label{eq:FIS-AC-energy-boundedness}
E_n^{\rm AC}(u_h;u_h^{n-1}) \geq M_1\|u_h\|_{H^1(\Omega)}^2 - M_2,
\end{equation}
where $M_1$ and $M_2$ are positive constants that depend on
$\epsilon$. Then the unique solvability of \eqref{eq:FIS-AC} follows
from \cite{ciarlet1989introduction} and
\eqref{eq:FIS-AC-energy-boundedness}. Moreover, for the global
minimizer of \eqref{equ:FIS-AC-energy-min}, we have
$$
J_\epsilon^{\rm AC}(u_h^n) + \frac{1}{2k_n}\|u_h^n -
u_h^{n-1}\|_{L^2(\Omega)}^2
= E_n^{\rm AC}(u_h^n;u_h^{n-1}) \leq E_n^{\rm AC}(u_h^{n-1};u_h^{n-1})
= J_\epsilon^{\rm AC}(u_h^{n-1}).
$$
Then we finish the proof.
\end{proof}
In view of Theorem \ref{thm:convexity-FIS-AC}, let us introduce the
terminology of {\it convex scheme}. We say that a scheme is {\it
convex} if it is equivalent to the minimization of a convex
functional. Thus \eqref{eq:FIS-AC} is a convex scheme under the
condition $k_n \leq \epsilon^2$, under which the first-order FIS
\eqref{eq:FIS-AC} is equivalent to the energy minimization version
\eqref{equ:FIS-AC-energy-min}. When $k_n > \epsilon^2$, the
$E_n^{\rm AC}(\cdot;u_h^{n-1})$ may not be convex, hence the standard
Newton's method for \eqref{eq:FIS-AC} may fail in this case. Thus,
generally speaking, the scheme \eqref{equ:FIS-AC-energy-min} calls for
the global minimization solver.
\subsubsection{Convexity of fully implicit scheme for the
Cahn-Hilliard equation}
Define the discrete Laplace operator $\Delta_h: {V}_h\mapsto
{V}_h$ as follows: Given $v_h \in {V}_h$, let $\Delta_h v_h \in{V}_h$
such that
\begin{equation} \label{eq:discrete-Laplace}
(\Delta_h v_h, w_h)=-(\nabla v_h,\nabla w_h) \qquad \forall\, w_h\in V_h.
\end{equation}
Let $L^2_0$ denote the collection of functions in $L^2(\Omega)$ with
zero mean, and let $\mathring{V}_h:=V_h\cap L^2_0$. Taking $w_h = 1$
in \eqref{eq:discrete-Laplace}, we know that $\text{Range}(\Delta_h) \subset
\mathring{V}_h$. Further, the well-posedness of the Poisson problem
with Neumann boundary condition on $\mathring{V}_h$ implies that
$\text{Range}(\Delta_h) = \mathring{V}_h$. Therefore,
$\Delta_h|_{\mathring{V}_h}: \mathring{V}_h \mapsto \mathring{V}_h$
is an isomorphism, then $\Delta_h^{-1} :=
(\Delta_h|_{\mathring{V}_h})^{-1}: \mathring{V}_h \mapsto
\mathring{V}_h$ is well-defined.
Consider the Cahn-Hilliard equations, in view of \eqref{eq:energy-CH},
we define the discrete energy
\begin{equation} \label{eq:FIS-CH-energy}
E_n^{\rm CH}(\theta_h;u_h^{n-1}) =
J_\epsilon^{\rm CH}(u_h^{n-1}+\theta_h) +
\frac{1}{2k_n}\|\nabla\Delta_h^{-1}\theta_h\|_{L^2(\Omega)}^2 \qquad
\theta_h\in \mathring{V}_h.
\end{equation}
Then, the energy minimization version of the first-order FIS for the
Cahn-Hilliard equations is shown to be
\begin{equation} \label{equ:FIS-CH-energy-min}
\theta_h^n = \underset{\theta_h \in \mathring{V}_h}{\mathrm{argmin}} E_n^{\rm
CH}(\theta_h; u_h^{n-1}), \qquad u_h^{n} = u_h^{n-1} + \theta_h^n.
\end{equation}
\begin{theorem}\label{thm:convexity-FIS-CH}
We have
\begin{enumerate}
\item Under the condition that $k\leq 4\epsilon^3$, $E_n^{\rm CH}(\cdot; u_h^{n-1})$ is convex on $\mathring{V}_h$.
\item The solution of \eqref{eq:FIS-CH} satisfies
$u_h^{n}=u_h^{n-1}+\theta_h$, with $(E_n^{\rm CH})'(\theta_h;
u_h^{n-1})(v_h) = 0$.
\item The following energy law holds for \eqref{equ:FIS-CH-energy-min}
\begin{equation} \label{eq:CH-energy}
J_\epsilon^{\rm CH}(u_h^{n}) +
\frac{1}{2k_n}\|\nabla\Delta_h^{-1}(u_h^{n}-u_h^{n-1})\|_{L^2(\Omega)}^2
\le J_\epsilon^{\rm CH}(u_h^{n-1}).
\end{equation}
\end{enumerate}
\end{theorem}
\begin{proof}
For any $\theta_h, \eta_h\in \mathring{V}_h$, we have
$$
(E_n^{\rm CH})''(\theta_h;u_h^{n-1})(\eta_h, \eta_h) = \frac{1}{{\epsilon}}\int_{\Omega}\bigl(3(u_h^{n-1}+\theta_h)^2-1\bigr)\eta_h^2 ~dx +
\frac{1}{k_n}\|\nabla\Delta_h^{-1}\eta_h\|_{L^2(\Omega)}^2 +
\epsilon\|\nabla \eta_h\|_{L^2(\Omega)}^2.
$$
Using Schwarz's inequality, we have
$$
\frac{1}{\epsilon}\|\eta_h\|_{L^2(\Omega)}^2 \leq \frac{1}{\epsilon}
(\Delta_h^{-1}\eta_h,\eta_h)^{1/2} (\Delta_h\eta_h,\eta_h)^{1/2}\leq
\frac{1}{4\epsilon^3}\|\nabla\Delta_h^{-1}\eta_h\|_{L^2(\Omega)}^2 +
\epsilon\|\nabla \eta_h\|_{L^2(\Omega)}^2.
$$
When $k_n\leq 4\epsilon^3$,
\begin{align}\label{eq:FIS-CH-convex}
(E_n^{\rm CH})''(\theta_h;u_h^{n-1})(\eta_h,\eta_h) \geq
\frac{1}{{\epsilon}}\int_{\Omega}3(u_h^{n-1}+\theta_h)^2 \eta_h^2~dx
+(\frac{1}{k_n}-\frac{1}{4\epsilon^3})\|\nabla\Delta_h^{-1}\eta_h\|_{L^2(\Omega)}^2\geq0,
\end{align}
where the strict inequality holds when $\eta_h\neq 0$.
This means that $(E_n^{\rm CH})(\cdot;u_h^{n-1})$ is strictly convex on
$\mathring{V}_h$.
Now, taking $\eta_h = 1$ in \eqref{eq:FIS-CH}, we have $u_h^n \in
u_h^{n-1} + \mathring{V}_h$. Let $v_h = 1$ in \eqref{eq:FIS-CH}, we
have $\int_{\Omega}w_h^ndx =
\frac{1}{\epsilon}\int_{\Omega}f(u_h^n)dx$. Then, the first equation
of \eqref{eq:FIS-CH} is equivalent to
$$
w_h^n = \frac{1}{k_n}\Delta_h^{-1}(u_h^n -
u_h^{n-1})+\frac{1}{\epsilon|\Omega|}\int_{\Omega}f(u_h^n)dx.
$$
Therefore, \eqref{eq:FIS-CH} is shown to be
\begin{equation} \label{eq:FIS-CH-u}
\epsilon(\nabla u_h^n, \nabla v_h) + \frac{1}{\epsilon}((I-Q_0)f(u_h^n), v_h)
- \frac{1}{k_n}(\Delta_h^{-1}(u_h^n-u_h^{n-1}), v_h)
= 0 \qquad\forall~v_h \in V_h.
\end{equation}
where $Q_0: L^2(\Omega)\mapsto \mathbb R$ is the $L^2$ projection,
namely $ Q_0v=\frac{1}{|\Omega|}\int_\Omega vdx$. Let
$\theta_h=u_h^n-u_h^{n-1} \in \mathring{V}_h$. Note that
$Q_0\theta_h=Q_0\Delta^{-1}\theta_h=0$, we can then write
\eqref{eq:FIS-CH-u} as
\begin{equation*}
\epsilon(\nabla (u_h^{n-1}+\theta_h), \nabla (I-Q_0)v_h) +
\frac{1}{\epsilon}(f(u_h^{n-1} + \theta_h), (I-Q_0)v_h)
- \frac{1}{k_n}(\Delta_h^{-1}\theta_h, (I-Q_0)v_h)
= 0 \quad\forall~v_h \in V_h.
\end{equation*}
This means that
\begin{equation*}
\epsilon(\nabla (u_h^{n-1}+\theta_h), \nabla v_h) +
\frac{1}{\epsilon}(f(u_h^{n-1}+\theta_h), v_h) -
\frac{1}{k_n}(\Delta_h^{-1}\theta_h, v_h) = 0 \qquad\forall~v_h
\in \mathring V_h,
\end{equation*}
which can be recast as $(E_n^{\rm CH})'(\theta_h; u_h^{n-1})(v_h) =
0$. The unique solvability and energy stability \eqref{eq:CH-energy}
then follows from the similar argument in Theorem
\ref{thm:convexity-FIS-AC}.
\end{proof}
\subsection{Convex splitting schemes and their equivalence to fully
implicit schemes} \label{sec:CSS-FIS}
As we have seen before, convexity is a very desirable property of the
discretize scheme and fully implicit scheme is only convex when $k$ is
sufficiently small. When $k$ is not sufficiently small, the
non-convexity of the discrete scheme comes from the fact that the
potential function $F$ in \eqref{double-well} is not convex.
The convex splitting scheme (CSS in short) stems from splitting the
non-convex potential function $F$ given by \eqref{double-well} into
the difference between two convex functions:
\begin{equation} \label{convex-splittingF}
F(u)=F_+(u)-F_-(u), \quad \mbox{with} \quad F_+(u)=\frac{1}{4}(u^4+1), \quad F_-(u)=\frac{1}{2}u^2.
\end{equation}
\subsubsection{A convex splitting scheme for the Allen-Cahn model}
\label{subsec:CSS-AC}
In view of Theorem \ref{thm:convexity-FIS-AC}, a CSS be obtained by
making the non-convex part, namely $-F_-(\cdot)$ in
\eqref{convex-splittingF}, explicit in some way, and it can be
characterized by the minimization of a convex functional:
\begin{equation}
\label{CSS-min}
u_h^n = \underset{u_h\in V_h}{\mathrm{argmin}}
\bigg\{
\int_\Omega \Bigl( \frac12 |\nabla u_h|^2
+ \frac{1}{\epsilon^2} [F_+(u_h)-\hat F_-(u_h;u_h^{n-1})] \Bigr)\, dx
+
\frac{1}{2k_n}\int_{\Omega}(u_h- u_h^{n-1})^2dx
\bigg\},
\end{equation}
where $\hat F_-(u_h;u_h^{n-1}) $ is the linearization of $F_-(\cdot)$ at
$u_h^{n-1}$, that is, $\hat F_-(u_h;u_h^{n-1})
=F_-(u_h^{n-1})+F_-^{\prime}(u_h^{n-1}) (u_h-u_h^{n-1})$.
The variational formulation of \eqref{CSS-min} is the following
well-known CSS: Find $u_h^n\in V_h$ for $n=1,2,\cdots$, such that
\begin{equation}\label{css}
(\frac{u_h^{n}-u_h^{n-1}}{k_n},v_h)+(\nabla u_h^{n},\nabla
v_h)+\frac{1}{\epsilon^2}((u_h^{n})^3-u_h^{n-1},v_h)=0
\qquad\forall v_h\in V_h.
\end{equation}
\begin{theorem} \cite{Eyre98}
The CSS scheme \eqref{css} is unconditionally energy stable.
\end{theorem}
At the first glance, the above result looks incredibly remarkable. As
we have seen above, even a fully implicit scheme can not be
unconditionally energy-stable, but as a partially implicit (or
explicit) scheme, CSS is unconditionally energy-stable. Although, as
we discussed before, we can not quite relate the energy-stability in a
nonlinear scheme to the standard stability concept in a standard
linear scheme, it is quite incredible that a partially implicit (or
explicit) scheme is actually more stable than a fully implicit scheme!
This remarkable phenomenon can be explained by the following result.
\begin{theorem}\label{thm:css-fis}
The CSS \eqref{css} can be recast as the FIS \eqref{eq:FIS-AC}
with different time step size:
\begin{equation} \label{kprime}
k_n' = \frac{\epsilon^2}{k_n+\epsilon^2}k_n.
\end{equation}
\end{theorem}
\begin{proof}
We write that
$$
(u_h^n)^3 - u_h^{n-1} = f(u_h^n) + (u_h^n - u_h^{n-1}).
$$
Substituting the above identity into \eqref{css} and regrouping the
term involving $u_h^n - u_h^{n-1}$, we obtain
\begin{align}\label{css_1}
\bigl((\frac{1}{k_n}+\frac{1}{\epsilon^2})(u_h^{n}-u_h^{n-1}),v_h\bigr)+(\nabla u_h^{n},\nabla
v_h)+\frac{1}{\epsilon^2}(f(u_h^{n}),v_h)=0
\qquad\forall v_h\in V_h,
\end{align}
which is exactly the FIS with time step size \eqref{kprime}.
\end{proof}
By comparing the condition for the time step size in Theorem
\ref{thm:convexity-FIS-AC} and \eqref{kprime}, the resulting time-step
constraint \eqref{kprime} in the CSS is actually more stringent
to assure the convexity of the original FIS, as $k_n' < \epsilon^2$ for
any $\epsilon>0$. This also explains why the CSS is always
energy-stable thanks to the Theorem \ref{thm:convexity-FIS-AC}.
\begin{remark}\label{remark:delay}
We now make some remark on the implication of Theorem \ref{thm:css-fis}.
Let $u_h^{\rm FIS}(t_n)$ be the solution to \eqref{eq:FIS-AC} and
$u_h^{{\rm CSS}}(t_n)$ be the solution to \eqref{css}. Then by
Theorem \ref{thm:css-fis}, we have
\begin{equation} \label{delay}
u_h^{{\rm CSS}}(t_n)=u_h^{{\rm FIS}}(\delta_n t_n), \quad \mbox{with}
\quad \delta_n=\frac{\epsilon^2}{k_n+\epsilon^2}.
\end{equation}
Here, $\delta_n$ can be regarded as a delaying factor. A larger time
step size $k_n$, which gives a smaller $\delta_n$, leads to a more
significant time-delay. Even for a very small $k_n$, such a delay is
not negligible. For example, if $k_n=\epsilon^2$, we have $\delta_n=1/2$.
Thus, $u_h^{{\rm CSS}}(t_n)=u_h^{{\rm FIS}}(\frac{t_n}{2})$.
Because of such a delay, it is expected and also numerically verified
that, quantitatively speaking, the CSS may have a reduced accuracy
although it gives qualitatively correct answer. Furthermore such a
delay will diminish as $k_n\to 0$ since $ \lim_{k_n\to 0}\delta_n=1$.
In summary, we conclude that the CSS has a special property that may
be known as ``delayed convergence'' in the following sense:
\begin{enumerate}
\item The CSS scheme is expected to eventually converge to the
exact solution of the originally Allen-Cahn equation as $k_n\to 0$.
\item But for any given time step size $k_n$, the CSS would approximate
better the exact solution at a delayed time.
\end{enumerate}
\end{remark}
\paragraph{Test 1} \label{test1}
In this test, the square domain $\Omega =(-1,1)^2$ is used to
investigate the performance of different numerical schemes, and the
initial condition is chosen as
\begin{align} \label{eq:initial-smooth}
u_0 = \tanh\bigl(\frac{d_0(x)}{\sqrt{2}\epsilon}\bigr).
\end{align}
Here, $d_0(x)$ is the signed distance function from $x$ to the initial
curve $\Gamma_0: x^2+y^2 = 0.6^2$, i.e., $d_0(x) =
\sqrt{x^2+y^2}-0.6$. Figure \ref{fig:AC-diff-h} and
\ref{fig:AC-diff-eps} displays the evolution of the radius with
respect to time. The singularity happens at $t = 0.18$, which is the
disappearing time.
The numerical solutions of FIS and CSS with different $h$'s are
plotted in Figure \ref{fig:AC-diff-h}. When decreasing $h$, the FIS
approximates the exact solution well, while the CSS does not.
The similar phenomenon happens with different $\epsilon$'s, as shown
in Figure \ref{fig:AC-diff-eps}.
\begin{figure}[!htbp]
\centering
\captionsetup{justification=centering}
\subfloat[FIS]{
\includegraphics[width=0.35\textwidth]{FIS-AC-hs.png}
\label{fig:AC-diff-h-FIS}
}%
\subfloat[CSS]{
\includegraphics[width=0.35\textwidth]{CSS-AC-hs.png}
\label{fig:AC-diff-h-CCS}
}
\caption{Allen-Cahn equation: FIS and CSS with $\epsilon=0.02,
k_n=0.0005$ and different $h$'s.}
\label{fig:AC-diff-h}
\end{figure}
\begin{figure}[!htbp]
\centering
\captionsetup{justification=centering}
\subfloat[FIS]{
\includegraphics[width=0.35\textwidth]{FIS-AC-eps.png}
\label{fig:AC-diff-eps-FIS}
}%
\subfloat[CSS]{
\includegraphics[width=0.35\textwidth]{CSS-AC-eps.png}
\label{fig:AC-diff-eps-CCS}
}
\caption{Allen-Cahn equation: FIS and CSS with $k_n=0.002,\ h=1/256$ and
different $\epsilon$'s.}
\label{fig:AC-diff-eps}
\end{figure}
\paragraph{Test 2} \label{test2}
In this simulation, we minimize the discrete energy
\eqref{eq:FIS-AC-energy} for the Allen-Cahn equation at each time
step. The computational domain is $\Omega=(-1,1)^2$, and
parameter is $\epsilon =5\times 10^{-3}$. The initial value, shown
in Figure \ref{fig:4.1}, is chosen as
\begin{equation}
u_0(x,y) = \tanh\left(\frac{\sqrt{x^2+y^2}-0.6}{\sqrt{2}\epsilon}
\right).
\end{equation}
When $t$ increases, we expect the radius of the hole to decrease, as
shown in Figure \ref{fig:4.2}.
\begin{figure}[!htbp]
\centering
\subfloat[Initial value of $u$]{
\includegraphics[scale=0.30]{init.png}
\label{fig:4.1}
}
\subfloat[Value of $u$ at $t=0.14$]{
\includegraphics[scale=0.30]{end.png}
\label{fig:4.2}
}
\caption{The Allen-Cahn equation with smooth initial value: Values of
$u$ at different $t$'s.}
\end{figure}
Our goal is to test if the solution from the energy minimization scheme
approximates the physical solution even when the discrete energy is
non-convex. Recall that when $k_n\leq \epsilon^2$, the discrete energy
is convex.
We first test the dependency on the initial guess for the L-BFGS
minimization algorithm (cf. \cite{nocedal1980updating,
byrd1995limited}). Here we choose $k_{1} = 10^{-3}$, which leads
to the non-convex discrete energy \eqref{eq:energy-AC}. Figure
\ref{fig:4.1b} shows the global minimizer by using $u_0(x,y)$ as the
initial guess for the L-BFGS, which is quite similar to the
solution obtained with $k_n=10^{-5}$, see Figure \ref{fig:4.3}; Figure
\ref{fig:4.2b} shows a local minimizer by using the initial guess for
L-BFGS as $1-u_0(x,y)$. We observe that when the initial guess is the
solution at previous time step, the local minimizer has lowest
discrete energy, and that the solution with the lowest discrete energy
is the best approximation to the solution obtained in the convex case.
\begin{figure}[!htbp]
\centering
\subfloat[Global minimum with $E_{1}^{\rm AC} = 718.9$]{
\includegraphics[scale=0.4]{smooth_global_minimum.png}
\label{fig:4.1b}
}
\subfloat[Local minimum with $E_{1}^{\rm AC} = 2206.4$]{
\includegraphics[scale=0.4]{smooth_local_minimum.png}
\label{fig:4.2b}
}
\caption{The Allen-Cahn equation with smooth initial value: Minimizers
at $t=10^{-3}$ for different initial guesses in the L-BFGS
algorithm, $k_{1} = 10^{-3}$.}
\end{figure}
We compare the solution for $k_n=10^{-5}$, for the case in
which the discrete energy is convex, with the solutions for
$k_n=10^{-4}$ and $k_n=10^{-3}$, for the cases in which the discrete
energies are non-convex. For the L-BFGS
algorithm, the initial guess is set to be the solution at previous
time step. Figure \ref{fig:4.3} displays the cross-sectional
solutions at $y=0$ at different $t$'s. We observe that energy
minimization version of fully implicit schemes performs all well with
different time step sizes.
\begin{figure}[!htbp]
\centering
\subfloat[$t=0$]{
\includegraphics[scale=0.4]{t=0.png}
\label{fig:4.3-1}
}%
\subfloat[$t=0.05$]{
\includegraphics[scale=0.4]{t=005.png}
\label{fig:4.3-2}
} \\
\subfloat[$t=0.1$]{
\includegraphics[scale=0.4]{t=01.png}
\label{fig:4.3-3}
\subfloat[$t=0.14$]{
\includegraphics[scale=0.4]{t=014.png}
\label{fig:4.3-4}
\caption{The Allen-Cahn equation with smooth initial value: Plot of
the cross-sectional solutions $u_h(x,0)$ at different $t$'s.}
\label{fig:4.3}
\end{figure}
Since the initial guess for the L-BFGS algorithm is random, we
conclude that the L-BFGS algorithm does not depend on the initial
guess when the solution is smooth enough. We also compare the evolutions of
physical energies $J_\epsilon^{\rm AC}$ for the three cases in Figure
\ref{fig:4.4}, which shows that the energy minimization version of
fully implicit scheme is energy-stable.
\begin{figure}[!htbp]
\begin{center}
\includegraphics[scale=0.6]{Energy.png}
\end{center}
\caption{The Allen-Cahn equation with smooth initial value: Evolutions
of the physical energies.}
\label{fig:4.4}
\end{figure}
\paragraph{Test 3} \label{test3}
In this set of simulations, we minimize the discrete energy
\eqref{eq:FIS-AC-energy} for the Allen-Cahn equation with
$\epsilon = 5\times 10^{-3}$ at each time step. The computational
domain is chosen as $\Omega=(-1,1)^2$, while the initial
value $u_0(x,y)$ is randomly chosen.
In order to smooth the initial value, we first compute the solution
from $t = 0$ to $t = 2\times 10^{-3}$ with $k = 10^{-5}$, namely
$$
k_n = 10^{-5} \qquad \text{for }n = 1, 2, \cdots, 200.
$$
Then, we switch for different time step sizes with the energy
minimization version of fully implicit scheme. This is needed only when $k_n \geq 10^{-3}$.
After the smoothing the random initial value, we first test the
dependency on the initial guess for the L-BFGS minimization algorithm.
Here we choose $k_{201} = 10^{-3}$, which leads to the non-convex
discrete energy \eqref{eq:FIS-AC-energy}. The reference solution is
obtained by evolving the Allen-Cahn equation with $k_n = 10^{-5}$
(convex case). Figure \ref{fig:global-local-minimizer} shows the
different local minimizers from different initial guesses. We observe
that: (1) When the initial guess is the solution at previous time
step, the local minimizer has lowest discrete energy; (2) The solution
with the lowest discrete energy is the best approximation to the
reference solution; (3) When the initial guesses are random chosen, we
obtain several different local minimizers. This implies that the
result obtained from L-BFGS does depend on the initial guess when the
solution is not smooth enough. Therefore, we will (and recommend to)
choose the solution at previous time step as the initial guess for the
L-BFGS algorithm.
\begin{figure}[!htbp]
\centering
\subfloat[Reference solution]{
\includegraphics[scale=0.25]{1e-5_t=0003.png}
\label{fig:global-local-ref}
}%
\subfloat[$u_h^{200}$ as initial guess, $E_{201}^{\rm AC} = 3848.7$]{
\includegraphics[scale=0.25]{1e-3_t=0003.png}
\label{fig:global-local-global}
} \\
\subfloat[Random initial guess, $E_{201}^{\rm AC} = 4238.5$]{
\includegraphics[scale=0.25]{wrong_t=0003.png}
\label{fig:global-local-local1}
\subfloat[Random initial guess, $E_{201}^{\rm AC} = 4341.7$]{
\includegraphics[scale=0.25]{wrong2_t=0003.png}
\label{fig:global-local-local2}
\caption{The Allen-Cahn equation with random initial value: Minimizers
at $t=3\times 10^{-3}$ for different initial guesses in the L-BFGS
algorithm, $k_{201} = 10^{-3}$.}
\label{fig:global-local-minimizer}
\end{figure}
Next, we evolve the Allen-Cahn equation with different time step sizes
after $t = 2\times 10^{-3}$ to see the two phases regroup. Three
different computations with $k_n = 10^{-5}$ (convex case), $k_n =
10^{-4}$ and $k_n = 10^{-3}$ (non-convex cases) are considered. In
Figure \ref{fig:4.5} shows the random initial value and the
evolutions of the numerical solutions at different $t$'s. It can be
observed that the solutions in all these cases behave similarly.
In addition, for the given random initial condition, the evolution of
physical solution and physical energy seem a little
bit faster than the others when choosing $k_n = 10^{-3}$, as shown in
Figure \ref{fig:random-energy}. This is most likely because of the
time discretization error for the large time step size. Furthermore,
the evolutions of the physical energies show the energy-stability of
the energy minimization version of the fully implicit scheme, which is
in agreement with the Theorem \ref{thm:convexity-FIS-AC}.
\begin{figure}[!htbp]
\centering
\subfloat[$t=0$, $k_n = 10^{-5}$]{
\includegraphics[scale=0.17]{1e-5_t=0.png}
}%
\subfloat[$t=0$, $k_n = 10^{-4}$]{
\includegraphics[scale=0.17]{1e-5_t=0.png}
}%
\subfloat[$t=0$, $k_n = 10^{-3}$]{
\includegraphics[scale=0.17]{1e-5_t=0.png}
} \\
\subfloat[$t=0.02$, $k_n = 10^{-5}$]{
\includegraphics[scale=0.17]{1e-5_t=002.png}
}%
\subfloat[$t=0.02$, $k_n = 10^{-4}$]{
\includegraphics[scale=0.17]{1e-4_t=002.png}
}%
\subfloat[$t=0.02$, $k_n = 10^{-3}$]{
\includegraphics[scale=0.17]{1e-3_t=002.png}
} \\
\subfloat[$t=0.05$, $k_n = 10^{-5}$]{
\includegraphics[scale=0.17]{1e-5_t=005.png}
}%
\subfloat[$t=0.05$, $k_n = 10^{-4}$]{
\includegraphics[scale=0.17]{1e-4_t=005.png}
}%
\subfloat[$t=0.05$, $k_n = 10^{-3}$]{
\includegraphics[scale=0.17]{1e-3_t=005.png}
}\\
\subfloat[$t=0.14$, $k_n = 10^{-5}$]{
\includegraphics[scale=0.17]{1e-5_t=014.png}
}%
\subfloat[$t=0.14$, $k_n = 10^{-4}$]{
\includegraphics[scale=0.17]{1e-4_t=014.png}
}%
\subfloat[$t=0.14$, $k_n = 10^{-3}$]{
\includegraphics[scale=0.17]{1e-3_t=014.png}
\caption{The Allen-Cahn with random initial value: Plot of the
solutions at different $t$'s.}
\label{fig:4.5}
\end{figure}
\begin{figure}[!htbp]
\begin{center}
\includegraphics[scale=0.6]{sim2_Energy.png}
\end{center}
\caption{The Allen-Cahn equation with random initial guess: Evolutions
of physical energies.}
\label{fig:random-energy}
\end{figure}
\subsubsection{A convex splitting scheme for the Cahn-Hilliard model}
Similar to the Allen-Cahn model, a convex splitting scheme can also be
obtained for Cahn-Hilliard model as follows: Find $u_h^{n}\in V_h$ for
$n=1,2,\cdots, N$, such that
\begin{equation} \label{eq:CSS-CH}
\begin{aligned}
(\frac{u_h^{n}-u_h^{n-1}}{k_n},\eta_h)+(\nabla w_h^{n},\nabla \eta_h) &=0
\qquad \forall \,\eta_h\in V_h,\\
\epsilon (\nabla u_h^{n},\nabla v_h) + \frac{1}{\epsilon}((u_h^n)^3 -
u_h^{n-1},v_h)-(w_h^{n},v_h) &=0 \qquad \forall\,
v_h\in V_h.
\end{aligned}
\end{equation}
\begin{theorem}
The Discretization of the Cahn-Hilliard equation using the convex
splitting scheme is equivalent to the discretization of the following
equations using the fully implicit scheme:
\begin{equation} \label{eq:perturbed-CH}
\begin{aligned}
u_t - \Delta w&= 0, \\
w + \epsilon \Delta u -
\frac{1}{\epsilon}f(u)-\frac{k_n}{\epsilon}u_t
&=0.
\end{aligned}
\end{equation}
\end{theorem}
We note that \eqref{eq:perturbed-CH} can be equivalently written as
follows:
\begin{equation} \label{ConvexCH}
(1 - \frac{k_n}{\epsilon}\Delta)u_t + \Delta (\epsilon \Delta u -
\frac{1}{\epsilon}f(u)) = 0.
\end{equation}
It is known that \cite{caginalp1998convergence} when
$k_n=\mathcal{O}(\epsilon^3)$, the solution of \eqref{ConvexCH}
converges to the Hele-Shaw flow, which is also the limiting dynamics
for the Cahn-Hilliard equation \eqref{eq:CH}. In other situations,
for example, when $k_n = \mathcal{O}(\epsilon^2)$, their limiting
dynamics may be different.
\paragraph{Test 4} \label{test4}
In this test, the computational domain is $(0,1)^2$, and the
following initial condition for the Cahn-Hilliard equation is chosen
as
\begin{align}\label{eq:initial-smooth2} u(x,t) =
\mathrm{tanh}\bigg(\frac{\sqrt{x^2+y^2}-0.17}{\sqrt{2}\epsilon}\bigg),
\qquad \epsilon = 0.02.
\end{align}
Again, the Figure \ref{fig:CH-delay} is the snapshot showing the
lagging phenomenon at different time points.
\begin{figure}[!htbp]
\centering
\includegraphics[width=0.35\textwidth]{CH-radius.png}
\caption{Cahn-Hilliard equations: FIS and CSS. Here,
$\epsilon=0.02, k_n=5\times10^{-4}$ and $h=0.015$.}\label{fig:CH-delay}
\end{figure}
\subsection{Some other first-order partially implicit schemes}
In this section, we briefly discuss several other first-order
partially implicit schemes for the Allen-Cahn model.
{\it Semi-implicit scheme}: Seeking $u_h^n\in V_h$ for $n=1,2,\cdots$, such that
\begin{align}\label{semi-implicit}
(\frac{u_h^n - u_h^{n-1}}{k_n}, v_h) + (\nabla u_h^n, \nabla v_h) +
\frac{1}{\epsilon^2}(f(u_h^{n-1}),v_h) = 0 \qquad\forall v_h\in V_h.
\end{align}
{\it Stabilized semi-implicit scheme}: Seeking $u_h^{n}\in V_h$ for
$n=1,2,\cdots$, such that
\begin{align}\label{stabilized-semi-implicit}
(\frac{1}{k_n}+\frac{S}{\epsilon^2})(u_h^n-u_h^{n-1},v_h)+(\nabla
u_h^{n},\nabla v_h)+\frac{1}{\epsilon^2}(f(u_h^{n-1}),v_h)=0
\qquad\forall v_h\in V_h,
\end{align}
where $S>0$ (set as $S=1$ in the Test 5) is a stabilized constant.
\begin{theorem} \label{thm:time-scaling}
The scheme \eqref{semi-implicit} and
\eqref{stabilized-semi-implicit} can be recast as
\begin{equation} \label{unified-AC}
\left( \frac{1+\gamma_n}{k_n}(u_h^n - u_h^{n-1}), v_h\right) + (\nabla
u_h^n, v_h) + \frac{1}{\epsilon^2} (f(u_h^n), v_h) = 0 \qquad
\forall v_h\in V_h.
\end{equation}
For semi-implicit scheme \eqref{semi-implicit},
$$
\gamma_n = \frac{k_n}{\epsilon^2}[1 - (u_h^n)^2 - u_h^n u_h^{n-1} -
(u_h^{n-1})^2],
$$
and for stabilized semi-implicit scheme
\eqref{stabilized-semi-implicit},
$$
\gamma_n = \frac{k_n}{\epsilon^2}[1+S - (u_h^n)^2 - u_h^n u_h^{n-1} -
(u_h^{n-1})^2].
$$
\end{theorem}
\begin{proof}
For semi-implicit and stabilized semi-implicit schemes, the parameter $\delta_n$ can
be derived from $f(u_h^{n-1}) = f(u_h^n) + [1 - (u_h^n)^2 - u_h^n
u_h^{n-1} - (u_h^{n-1})^2](u_h^n - u_h^{n-1})$.
\end{proof}
Depending on the size and sign of $\gamma_n$, the above theorem will
offer some insight to the behavior of the two semi-implicit schemes in
comparison with the fully implicit scheme \eqref{eq:FIS-AC}.
\paragraph{Test 5} \label{test5}
In this test, the same domain and initial conditions are chosen as in
Test 1. On the left graph of Figure \ref{fig:AC-delay}, the same
$\epsilon$, $h$ and $k$ are chosen to draw the graphs using different
numerical schemes comparing with the exact solution (which is obtained
by highly refined meshes and extremely small time step size). We
observe that only the FIS performs well. The right graph shows the
delayed convergence" of the CSS.
\begin{figure}[!htbp]
\centering
\captionsetup{justification=centering}
\subfloat[Different schemes: $\epsilon=0.02,\ k_n=0.0005$ and $h=0.015$]{
\includegraphics[width=0.35\textwidth]{Schemes-AC.png}
}%
\subfloat[CSS: $\epsilon=0.02,\ h=0.015$ and $k_n$'s]{
\includegraphics[width=0.35\textwidth]{delay-convergence.png}
}
\caption{Allen-Cahn equation: Radius change with time using different
numerical methods.} \label{fig:AC-delay}
\end{figure}
\subsection{Convex splitting schemes interpreted as artificial convexity
schemes} \label{subsec:convexity}
In this section, we give a slightly different perspective on convex
splitting schemes. We consider the following modified Allen-Cahn
model:
\begin{equation} \label{ConvexAC-delta}
\bigg(1+\frac{\delta_n}{\epsilon^2}\bigg)u_t-\Delta u+\frac{1}{\epsilon^2}f(u)=0,
\end{equation}
and the following modified Cahn-Hilliard model:
\begin{equation}\label{ConvexCH-delta}
\begin{aligned}
\bigg(1-\frac{\delta_n}{\epsilon}\Delta\bigg)u_t-\Delta w &=0 \qquad
\mbox{in } \Omega_T,\\
-\epsilon\Delta u +\frac{1}{\epsilon}f(u) &=w \qquad \mbox{in }
\Omega_T.
\end{aligned}
\end{equation}
\begin{theorem}\label{thm:convexification}
When $k _n\leq \epsilon^2+\delta_n$, the standard fully implicit scheme
for \eqref{ConvexAC-delta} is equivalent to the convex minimization
problem:
\begin{equation} \label{eq:MAC-FIS}
u_h^n = \underset{u_h\in V_h}{\mathrm{argmin}}
\left\{
J_\epsilon^{\rm AC}(u_h)+(\frac{1}{2k_n}+\frac{\delta_n}{2k_n\epsilon^2})\int_{\Omega}(u_h
- u_h^{n-1})^2dx \right\}.
\end{equation}
When $k_n\le(\epsilon^{3\slash2}+\sqrt{\epsilon^3+\delta_n})^2$, the
standard fully implicit scheme for \eqref{ConvexCH-delta} is
equivalent to the convex minimization problem:
\begin{equation} \label{eq:MCH-FIS}
u_h^n = u_h^{n-1} + \theta_h^n, \quad \theta_h^n = \underset{\theta_h\in
\mathring{V}_h}{\mathrm{argmin}}
\left\{
J_\epsilon^{\rm CH}(u_h^{n-1}+\theta_h) +
\frac{1}{2k_n}\|\nabla\Delta_h^{-1}\theta_h\|_{L^2(\Omega)}^2 +
\frac{\delta_n}{2k_n\epsilon}\|\theta_h\|_{L^2(\Omega)}^2
\right\}.
\end{equation}
\end{theorem}
\begin{proof}
The proofs of \eqref{eq:MAC-FIS} and \eqref{eq:MCH-FIS} are similar to
Theorem \ref{thm:convexity-FIS-AC} and \ref{thm:convexity-FIS-CH},
respectively.
\end{proof}
In view of Theorem \ref{thm:convexification}, the modified model
\eqref{ConvexAC-delta} may be viewed as a convexified model of the original
Allen-Cahn model \eqref{eq:AC}; the added term
$\frac{\delta_n}{\epsilon^2}u_t$ introduces a new time scale of the
model and on the discrete level it plays the role of an artificial
convexification. Similarly, the modified model \eqref{ConvexCH-delta}
may be viewed as a convexified model of the original Cahn-Hilliard
model \eqref{eq:CH}. We note that the CSS for the original Allen-Cahn
or Cahn-Hilliard model is the FIS for the convexified model with
$\delta_n =k_n$.
With such an interpretation, the convex splitting scheme may be more
appropriately viewed as an artificial convexity scheme. This is in
some way similar to the artificial viscosity scheme for hyperbolic
equations or convection dominated convection-diffusion problems. The
physical implication of the convexified model
\eqref{ConvexAC-delta} is a new time-scale: $t'=
(1+\frac{\delta_n}{\epsilon^2})t$, which leads to a time-delay in
comparison to the original model. The implication of the modified
model \eqref{ConvexCH-delta} seems to be similar but less obvious.
\section{A modified FIS satisfying a discrete maximum principle}
\label{sec:modified-FIS}
In this section, we will modify
the fully implicit scheme (or the corresponding convex splitting
scheme) to preserve the maximum principle on discrete level. We will
then further show that this modified scheme can be uniformly
preconditioned by a Poisson-like operator. We refer to
\cite{nochetto1997convergence, shen2014maximum} for other maximum
principle preserving schemes for the Allen-Cahn equation.
\subsection{A modified scheme}
Our modified FIS is motivated by the maximum principle of Allen-Cahn
on continuous level stated in the following theorem (see
\cite{gilbarg2015elliptic, feng2007analysis} for the idea, and
Proposition 2.2.1 in \cite{li2015numerical} for the details).
\begin{theorem} \label{thm:maximum-AC-continuous}
If $u$ is a weak solution of the Allen-Cahn equation \eqref{eq:AC} and
$\|u_0\|_{L^{\infty}(\Omega)} \leq 1$, then
$\|u(x,t)\|_{L^{\infty}(\Omega)} \leq 1$.
\end{theorem}
Unfortunately, the above maximum principle can not be proved for a
standard FIS. In this section, we will modify the standard FIS scheme
so that a maximum principle preserving scheme analogous to
Theorem~\ref{thm:maximum-AC-continuous} can also be rigorously proved.
We consider the $P_1$-Lagrangian finite element space in this section,
$$
V_h = \bigl\{v_h \in C(\bar{\Omega}): v_h|_{K} \in P_1(K)\bigr\}.
$$
The nodal basis function of $V_h$ related to the vertex $a_i$ is
denoted as ${\varphi_i}$. We then define the nodal value interpolation
$I_h: C(\bar{\Omega}) \mapsto V_h$ as
\begin{equation} \label{interpolation}
I_h v := \sum_{a_i \in \mathcal{N}_h} v(a_i)\varphi_i = \sum_{a_i \in
\mathcal{N}_h} v_i \varphi_i.
\end{equation}
Following \cite{xu1999monotone}, for given $K \in \mathcal{T}_h$ , we
introduce the following notation: $a_i (1\leq i \leq n+1)$ denote the
vertices of $K$, $E=E_{ij}$ the edge connecting two vertices $a_i$ and
$a_j$, $F_i$ the $(n-1)$-dimensional simplex opposite to the vertex
$a_i$, $\theta_{ij}^K$ or $\theta_E^K$ the angle between the faces
$F_i$ and $F_j$, $\kappa_E^K=F_i \cap F_j$ , the $(n-2)$-dimensional
simplex opposite to the edge $E=E_{ij}$.
We first consider the simplest and important case of the Poisson
equation with Neumann boundary condition. Then, for any $u_h, v_h \in
V_h$, we have (see \cite{xu1999monotone} for details)
\begin{equation} \label{graph-Laplacian}
(\nabla u_h, \nabla v_h) = \sum_{K \in \mathcal{T}_h} \sum_{E\subset
K} \omega_E^K \delta_Eu_h \delta_E v_h,
\end{equation}
where $\delta_E \phi = \phi(a_i) - \phi(a_j)$ for any continuous
function $\phi$ on $E = E_{ij}$ and $\omega_E^K =
\frac{1}{n(n-1)}|\kappa_E^K|\cot\theta_E^K$. We will make the
following assumption
\begin{equation} \label{Delaunay}
w_E:= \frac{1}{n(n-1)}\sum_{K\supset E} |\kappa_E^K|\cot \theta_E^K
\geq 0 \qquad
\mbox{ for any edge $E$.}
\end{equation}
We note that, in 2D, the above assumption \eqref{Delaunay} is
equivalent to the Delaunay condition \cite{strang1973analysis} which
requires the sum of any pair of angles facing a common interior edge
to be less than or equal to $\pi$. For higher dimension a sufficient
condition on ${\mathcal T}_h$ for \eqref{Delaunay} that all the
angles between any two adjacent $(n-1)$-simplicies from ${\mathcal
T}_h$ are less than or equal to $\frac{\pi}{2}$.
With the help of nodal value interpolation, we define a norm
$\|\cdot\|_h$ on $V_h$ as
\begin{equation} \label{lumping-bilinear}
\|v_h\|_h^2 := \int_\Omega I_h(v_h^2) ~dx.
\end{equation}
Our {\it modified FIS} is as follows: Find $u_h^n \in V_h$ for
$n=1,2,\cdots$, such that
\begin{equation} \label{fully-implicit-lumping}
(\frac{1}{k_n} I_h\big((u_h^{n}-u_h^{n-1})v_h\big), 1) + (\nabla
u_h^{n}, \nabla v_h) +
\frac{1}{\epsilon^2}(I_h\big(f(u_h^{n})v_h\big), 1) = 0
\qquad \forall v_h \in
V_h.
\end{equation}
\begin{theorem} \label{thm:maximum-AC-lumping}
Assume the triangulation satisfies \eqref{Delaunay}. If
$u_h^n$ is a solution of the modified FIS
\eqref{fully-implicit-lumping} and
$\|u_h^0\|_{L^{\infty}(\Omega)} \leq 1$, then
$\|u_h^n\|_{L^{\infty}(\Omega)} \leq 1$, for all $n\geq 0$.
\end{theorem}
\begin{proof}
For any function $v \in C(\bar{\Omega})$, we introduce the following notation:
$$
v^+ = \begin{cases}
v & \text{if}~v \geq 0, \\
0 & \text{otherwise},
\end{cases}\qquad \text{and} \qquad
v^- = \begin{cases}
-v & \text{if}~v \leq 0, \\
0 & \text{otherwise}.
\end{cases}
$$
A quick calculation shows that for any $v_i, v_j$,
$$
(v_i - v_j)(v_i^+ - v_j^+) - (v_i^+ - v_j^+)^2 = -(v_i^+ - v_j^+)(v_i^- - v_j^-) \geq 0.
$$
Therefore, the \eqref{graph-Laplacian} and \eqref{Delaunay} imply
$$
\begin{aligned}
(\nabla v_h, \nabla I_h(v_h^+)) &= \sum_{K \in \mathcal{T}_h} \sum_{E
\subset K} w_E^K \delta_E v_h \delta_E(I_h(v_h^+)) \\
& \geq \sum_{K \in \mathcal{T}_h} \sum_{E \subset K} w_E^K \delta_E
(I_h(v_h^+)) \delta_E(I_h(v_h^+)) = \|\nabla
I_h(v_h^+)\|_{L^2(\Omega)}^2.
\end{aligned}
$$
This proves that
\begin{equation} \label{poisson-h}
(\nabla v_h, \nabla I_h(v_h^+)) \geq \|\nabla I_h(v_h^+)\|_{L^2(\Omega)}^2.
\end{equation}
We now finish the proof by induction. First, the result holds for $n=0$ by
assumption. Assume the result holds for $n-1$, i.e.
$\|u_h^{n-1}\|_{L^\infty(\Omega)} \leq 1$. Then, we define a special test
function $v_h \in V_h$ as $v_h := I_h \left( (u_h^{n}-1)^+ \right)$.
Notice that $\|u_h^{n-1}\|_{L^\infty(\Omega)} \leq 1$ implies
$$
\frac{1}{k_n}(u_h^{n} - u_h^{n-1}) \geq
\frac{1}{k_n}(u_h^{n} - 1),
$$
which means that
$$
\begin{aligned}
(\frac{1}{k_n}I_h\big((u_h^{n}-u_h^{n-1})v_h\big), 1) &=
\frac{1}{k_n}\int_{\Omega} I_h\big( (u_h^n - u_h^{n-1}) (u_h^n-1)^+
\big) ~dx \\
&\geq \frac{1}{k_n}\int_\Omega I_h\big( (u_h^n-1)(u_h^n-1)^+ \big)
~dx =\frac{1}{k_n} \|I_h\big((u_h^n - 1)^+\big)\|_h^2.
\end{aligned}
$$
Furthermore by \eqref{poisson-h} and the inductive assumption,
$$
\begin{aligned}
(\nabla u_h^n, \nabla v_h) &= (\nabla(u_h^n-1), \nabla
I_h\big((u_h^n-1)^+\big)) \geq \|\nabla
I_h\big((u_h^n-1)^+\big)\|_{L^2(\Omega)}^2 \geq 0, \\
(I_h\big(f(u_h^n)v_h\big), 1) &= \int_\Omega I_h\big((u_h^n+1)u_h^n
(u_h^n-1)(u_h^n-1)^+\big)~dx \geq 0.
\end{aligned}
$$
Therefore,
$$
\frac{1}{k_n} \|I_h\big((u_h^n - 1)^+\big)\|_h^2 \leq
(\frac{1}{k_n} I_h\big((u_h^{n}-u_h^{n-1})v_h\big), 1) + (\nabla
u_h^{n}, \nabla v_h) +
\frac{1}{\epsilon^2}(I_h\big(f(u_h^{n})v_h\big), 1) = 0,
$$
which implies $I_h\big((u_h^{n} - 1)^+\big) = 0$, thus $u_h^{n} \leq 1$.
Similarly, by choosing a special test function $v_h := I_h \left(
(u_h^{n}+1)^- \right)$, we can prove that $u_h^{n} \geq -1$.
Therefore, $\|u_h^{n}\|_{L^{\infty}(\Omega)} \leq 1$.
\end{proof}
\paragraph{Test 6} \label{test6}
In this test, the same domain is chosen as in Test 1, and the random
initial condition for the Allen-Cahn equation is used with $\epsilon =
0.01$. In Figure \ref{fig:maximum-preserving}, it shows the random
initial condition, the evolutions, and the $L^{\infty}$-norm of the
numerical solutions at different time points.
\begin{figure}[!htbp]
\centering
\captionsetup{justification=centering}
\subfloat[$t=0$]{
\includegraphics[width=0.30\textwidth]{graph9_add.jpg}
}%
\subfloat[$t=0.003$]{
\includegraphics[width=0.30\textwidth]{graph10_add.jpg}
}%
\subfloat[$L^\infty$-norm]{
\includegraphics[width=0.30\textwidth]{inf_graph_add.jpg}
}
\caption{Performance of modified FIS with random initial condition.}
\label{fig:maximum-preserving}
\end{figure}
\begin{remark}
An analogous technique can be applied to prove the discrete maximum
principle for the convex splitting scheme with mass lumping
\begin{equation} \label{convex-splitting-lumping}
(\frac{1}{k_n} I_h\big((u_h^{n}-u_h^{n-1})v_h\big), 1) + (\nabla
u_h^{n}, \nabla v_h) +
\frac{1}{\epsilon^2}(I_h\big([(u_h^n)^3-u_h^{n-1}]v_h\big), 1) = 0
\qquad \forall v_h \in
V_h.
\end{equation}
This comes from the fact that \eqref{convex-splitting-lumping} can be
considered as the \eqref{fully-implicit-lumping} with the time step
size $\frac{\epsilon^2}{k_n+\epsilon^2}k_n$.
\end{remark}
\begin{remark}
We define the modified free-energy functional and discrete energy
\begin{equation} \label{equ:FIS-AC-energy-lumping}
\begin{aligned}
J_{\epsilon,I}^{\rm AC}(u) &= \int_{\Omega} \frac{1}{2} |\nabla u|^2 +
\frac{1}{\epsilon^2} I_h(F(u)) ~dx, \\
E_{n,I}^{\rm AC}(u_h; u_h^{n-1}) &= J_{\epsilon,I}^{\rm AC}(u_h) + \frac{1}{2k_n}\int_\Omega
I_h(u_h-u_h^{n-1})^2~dx.
\end{aligned}
\end{equation}
We also define the following energy minimization problem:
\begin{equation} \label{equ:FIS-AC-energy-min-lumping}
u_h^n = \underset{u_h\in V_h}{\mathrm{argmin}} E_{n,I}^{\rm AC}(u_h;u_h^{n-1}).
\end{equation}
Similar to Theorem \ref{thm:convexity-FIS-AC}, we have the following
results:
\begin{enumerate}
\item Under the condition that $k_n \leq \epsilon^2$, $E_{n,I}^{\rm AC}(\cdot;u_h^{n-1})$ is strictly convex on $V_h$.
\item The equation \eqref{convex-splitting-lumping} satisfies
$(E_{n,I}^{\rm AC})'(u_h^n; u_h^{n-1})(v_h) = 0$.
\item The following energy law holds
\begin{align}\label{energy-AC-lumping}
J_{\epsilon,I}^{\rm AC}(u_h^n) + \frac{1}{2k_n}\|u_h^n -
u_h^{n-1}\|_{L^2(\Omega)}^2 \leq J_{\epsilon,I}^{\rm AC}(u_h^{n-1}).
\end{align}
\end{enumerate}
\end{remark}
\subsection{A robust preconditioner for the Allen-Cahn equation}
Next we will analyze a simple preconditioner for the Newton
linearization of modified FIS \eqref{fully-implicit-lumping}. With this
preconditioner, the resulting preconditioned conjugate gradient method
(PCG) significantly reduces the number of iterations of the conjugate
gradient method (CG), and moreover, the number of iterations is
uniform with respect to the spatial meshes which can be locally
refined. We acknowledge that some nonlinear multigrid methods have
been applied to numerical schemes similar to
\eqref{fully-implicit-lumping} in the literature, see
\cite{kim2004conservative,tai2002global,wise2007solving}.
We first define the mass lumping operator $\mathcal{I}_h[u]: V_h
\mapsto V_h$ as
\begin{equation} \label{mass-lumping-operator}
(\mathcal{I}_h[u] v_h, w_h) := (I_h(uv_hw_h), 1) \qquad
\forall v_h, w_h \in V_h, u \in C(\bar{\Omega}).
\end{equation}
Let $\mathcal{I}_h = \mathcal{I}_h[1]$ for convenience. The
Fr$\acute{e}$chet derivative of scheme \eqref{fully-implicit-lumping}
is denoted by $\mathcal{L}_{n,h}[u_h^n]: V_h \mapsto V_h$, such that
\begin{equation} \label{frechet-lumping}
(\mathcal{L}_{n,h}[u_h^n] v_h, w_h) := (
\frac{1}{k_n}\mathcal{I}_h v_h, w_h ) - (\Delta_h
v_h, w_h) + \frac{1}{\epsilon^2}\left( \mathcal{I}_h[(3u_h^{n})^2 -
1]v_h, w_h\right) \quad \forall v_h, w_h \in V_h.
\end{equation}
\begin{theorem}\label{thm:well-conditioned}
The upper and lower bounds of $\mathcal{L}_{n,h}[u_h^n]$ are given by
\begin{align}\label{eq:upper-lower}
\frac{1-\gamma_n}{k_n}\mathcal{I}_h - \Delta_h \leq \mathcal{L}_{n,h}[u_h^n]
\leq \frac{1+2\gamma_n}{k_n} \mathcal{I}_h - \Delta_h.
\end{align}
where $\gamma_n := k_n\slash\epsilon^2$.
\end{theorem}
\begin{proof}
In light of \eqref{frechet-lumping}, we only need to prove
$$
-\gamma_n (\mathcal{I}_h v_h, v_h) \leq
\frac{k_n}{\epsilon^2}(I_h\big([(3u_h^{n})^2 -
1](v_h)^2\big), 1) \leq 2\gamma_n (\mathcal{I}_h v_h, v_h) \qquad
\forall v_h \in V_h.
$$
The left inequality can be proved by fact that $3(u_h^n)^2-1 \geq -1$,
and the right inequality can be proved by the fact that $3(u_h^n)^2 -
1 \leq 2$ due to the discrete maximum principle in Theorem
\ref{thm:maximum-AC-lumping}.
\end{proof}
Based on the Theorem \ref{thm:well-conditioned}, it is an immediate
consequence that when $\gamma_n \leq 1$, or $k_n \leq \epsilon^2$, $
(\mathcal{L}_{n,h}[u_h^n] v_h, v_h) \geq 0$ for any $v_h\in V_h$, which
implies the convexity of the discrete energy with mass lumping
$E_{n,I}^{\rm AC}(\cdot; u_h^{n-1})$ defined in \eqref{equ:FIS-AC-energy-lumping}.
Thus, the uniqueness and existence of FIS with mass lumping hold when
$k_n \leq \epsilon^2$. Further, we can design a preconditioner for
$\mathcal{L}_{n,h}[u_h^n]$ as
\begin{equation} \label{preconditioner-AC}
\mathcal{B}_{n,h} = \left(\frac{1-\gamma_n}{k_n}{\mathcal{I}}_h -
{\Delta}_h\right)^{-1}.
\end{equation}
Then, we have the following theorem directly followed from
the Theorem \ref{thm:well-conditioned}.
\begin{theorem} \label{thm:condition-AC}
It holds that
\begin{equation} \label{condition-AC}
\kappa(\mathcal{B}_{n,h}\mathcal{L}_{n,h}[u_h^n]) \leq
\frac{1+2\gamma_n}{1-\gamma_n}.
\end{equation}
\end{theorem}
\begin{remark}
When the uniform meshes are used with $h^{-1}=\mathcal
O(\epsilon^{-1})$ and $k_n =\mathcal O(\epsilon^2)$, then it is
apparent that $\mathcal{L}_{n,h}[u_h^n]$ is already well-conditioned.
Therefore, the above Theorem~\ref{thm:condition-AC} is of special
interest when the adaptive meshes are used.
\end{remark}
\paragraph{Test 7} \label{test7}
In this test, consider the initial condition
\eqref{eq:initial-smooth2} and the scheme
\eqref{fully-implicit-lumping}, and $\epsilon = 0.02$,
$k_n=\frac{\epsilon^2}{2}=2\times10^{-4}$. The simulation on adaptive
meshes is partially based on the MATLAB software package $i$FEM
\cite{chen2008iFEM}, and the mesh refining and coarsening are based on
the error estimator in \cite{feng2005posteriori}. The adaptive
tolerance is $10^{-5}$ and the maximal bisection level $J=20$. When
the maximal bisection level increases, the number of degrees of
freedom (DOF) increases, then the numbers of iterations of CG and PCG
are compared in the Table \ref{tab1} to verify the theoretical
results.
\begin{table}[!htbp]
\begin{center}
\centering
\begin{tabular}{|l|c|c|c|c|c|c|c|c|c|c|c|c|c|c|}
\hline
DOF & 301 & 368 & 430 & 510 & 566 & 672 & 1276 & 1633 & 2044 & 2535 &
3217 & 4027 & 4610 \\ \hline
CG & 21 & 32 & 37& 38 & 41 & 45 & 58 & 61 & 68 & 78 & 96 & 106 & 117\\ \hline
PCG & 9 & 8 & 8 & 9 & 8 & 8 & 8 & 8 & 8 & 8 & 8 & 8 & 8\\ \hline
\end{tabular}
\smallskip
\caption{The number of iterations for CG and PCG.}
\label{tab1}
\end{center}
\end{table}
\section{Second-order schemes}
\label{sec:2nd-order}
In this section, we shall consider the second-order schemes.
\subsection{(Modified) Crank-Nicolson scheme for the Allen-Cahn equation}
The standard Crank-Nicolson scheme for the Allen-Cahn equation, is to
seek $u_h^n\in V_h$ for $n = 1, 2, \cdots$, such that
\begin{align}\label{eq:SCN-AC}
\bigl(\frac{ u_h^{n}- u_h^{n-1}}{k_n},v_h\bigr)+\bigl(\frac{\nabla
u_h^{n} + \nabla u_h^{n-1}}{2}, \nabla v_h\bigr)
+\frac{1}{2\epsilon^2}(f(u_h^n)+f(u_h^{n-1}), v_h) = 0 \qquad \forall
v_h\in V_h.
\end{align}
Although the standard Crank-Nicolson scheme can not be proved
energy-stable, in view of \eqref{eq:SCN-AC}, we can still show its
convexity by defining the following discrete energy
\begin{equation}
\label{eq:SCN-AC-discrete-energy}
E_{n,\rm CN}^{\rm AC}(u_h; u_h^{n-1}) = \frac{1}{2}
\left\|\frac{\nabla u_h+\nabla u_h^{n-1}}{2}\right\|_{L^2(\Omega)}^2 +
\frac{1}{4k_n}\|u_h-u_h^{n-1}\|^2_{L^2(\Omega)}
+ \frac{1}{4\epsilon^2}\int_{\Omega} F(u_h) + f(u_h^{n-1})u_h~dx.
\end{equation}
\begin{theorem}\label{thm:convexity-SCN}
Under the condition that $k_n \leq 2\epsilon^2$, we have
\begin{enumerate}
\item $E_{n,\rm CN}^{\rm AC}(\cdot; u_h^{n-1})$ is strictly convex on $V_h$;
\item The solution of the modified Crank-Nicolson scheme
\eqref{eq:SCN-AC} satisfies
\begin{align}\notag
u_h^{n}&= \underset{u_h\in V_h}{\mathrm{argmin}}\, E_{n,\rm CN}^{\rm AC}(u_h; u_h^{n-1}),
\end{align}
which is uniquely solvable.
\end{enumerate}
\end{theorem}
\begin{proof}
A direct calculation shows that
\begin{equation}
\label{convexity-SCN}
(E_{n,\rm CN}^{\rm AC})''(u_h; u_h^{n-1})(v_h,v_h)= \frac14\|\nabla
v_h\|_{L^2(\Omega)}^2
+(\frac{1}{2k_n}-\frac{1}{4\epsilon^2})\|v_h\|^2_{L^2(\Omega)}
+ \frac{1}{4\epsilon^2}\int_{\Omega}3u_h^2v_h^2~dx.\nonumber
\end{equation}
This implies that $E_{n,\rm CN}^{\rm AC}(\cdot; u_h^{n-1})$ is a strictly
convex functional when $k_n \leq 2\epsilon^2$. The rest of the proof is
standard.
\end{proof}
With the purpose of energy stability, the {\it modified Crank-Nicolson
scheme} \cite{du1991numerical, shen2010numerical,
condette2011spectral} is constructed as follows: Find $u_h^n\in V_h$
for $n = 1, 2, \cdots$, such that
\begin{align}\label{eq:CN-AC}
\bigl(\frac{ u_h^{n}- u_h^{n-1}}{k_n},v_h\bigr)+\bigl(\frac{\nabla
u_h^{n} + \nabla u_h^{n-1}}{2}, \nabla v_h\bigr)
+\frac{1}{\epsilon^2}(\tilde F[u_h^n, u_h^{n-1}], v_h) = 0 \qquad \forall
v_h\in V_h,
\end{align}
where
$$
\tilde F[u, u_h^{n-1}]=
\begin{cases}
\frac{F(u)-F(u_h^{n-1})}{ u - u_h^{n-1}} & u\neq u^{n-1}_h,\\
u^3 - u & u = u^{n-1}_h.
\end{cases}
$$
\begin{lemma}[\cite{shen2010numerical,condette2011spectral}]
\label{thm:unconditionally-CSS}
The modified Crank-Nicolson scheme \eqref{eq:CN-AC} is
unconditionally energy stable. More precisely, for any $k_n>0$,
\begin{align}\label{eq:CN-AC-energy}
J_\epsilon^{\rm AC}( u_h^{n}) + \frac{1}{k_n}\|u_h^{n} -
u_h^{n-1}\|_{L^2(\Omega)}^2 = J_\epsilon^{\rm AC}( u_h^{n-1}).
\end{align}
\end{lemma}
\begin{proof}
\eqref{eq:CN-AC-energy} is an immediate consequence by taking
$v_h=u_h^{n} - u_h^{n-1}$ in \eqref{eq:CN-AC}.
\end{proof}
The modified Crank-Nicolson scheme \eqref{eq:CN-AC} is
unconditionally energy-stable but it is not unconditionally convex as
we shall see below. In view of \eqref{eq:CN-AC}, we define the
following discrete energy
\begin{equation}
\label{eq:CN-AC-discrete-energy}
E_{n,\rm MCN}^{\rm AC}(u_h; u_h^{n-1}) = \frac12\left\| \frac{\nabla u_h +
\nabla u_h^{n-1}}{2}\right\|_{L^2(\Omega)}^2 +
\frac{1}{4k_n}\|u_h-u_h^{n-1}\|^2_{L^2(\Omega)} +
\frac{1}{2\epsilon^2}\int_{\Omega}\check{G}(u_h; u_h^{n-1})~dx, \\
\end{equation}
where $\check{G}(u_h; u_h^{n-1}) = \check{G}_+(u_h; u_h^{n-1}) -
\check{G}_-(u_h;u_h^{n-1})$, and
$$
\check{G}_+(u_h; u_h^{n-1})=\frac{1}{4}\bigl[ \frac{1}{4}u_h^4 +
\frac{u_h^{n-1}}{3} u_h^3 + \frac{(u_h^{n-1})^2}{2} u_h^2 + (u_h^{n-1})^3u_h
\bigr]\quad \text{and} \quad
\check{G}_-(u_h; u_h^{n-1})=
\frac14u_h^2+\frac12u_hu_h^{n-1}.
$$
\begin{theorem}\label{thm:convexity-CN}
Under the condition that $k \leq 2\epsilon^2$, we have
\begin{enumerate}
\item $E_{n,\rm MCN}^{\rm AC}(\cdot;u_h^{n-1})$ is strictly convex on $V_h$;
\item The solution of the modified Crank-Nicolson scheme
\eqref{eq:CN-AC} satisfies
\begin{align}\notag
u_h^{n}&= \underset{u_h\in V_h}{\mathrm{argmin}}\, E_{n,\rm MCN}^{\rm AC}(u_h; u_h^{n-1}),
\end{align}
which is uniquely solvable.
\end{enumerate}
\end{theorem}
\begin{proof}
A direct calculation shows that
\begin{equation}
\label{convexity-MCN}
\begin{aligned}
(E_{n,\rm MCN}^{\rm AC})''(u_h; u_h^{n-1})(v_h,v_h) &= \frac14\|\nabla v_h\|_{L^2(\Omega)}^2 +(\frac{1}{2k_n}-\frac{1}{4\epsilon^2})\|v_h\|^2_{L^2(\Omega)} \\
&+ \frac{1}{8\epsilon^2}\int_{\Omega}\bigl[ 3u_h^2+ 2u_h^{n-1}u_h
+ (u_h^{n-1})^2 \bigr]v_h^2~dx.
\end{aligned}
\end{equation}
This implies that $E_{n, \rm MCN}^{\rm AC}(\cdot; u_h^{n-1})$ is a strictly convex
functional when $k_n\leq 2\epsilon^2$. The rest of the proof is
standard.
\end{proof}
The ``convexity size'' of standard and modified Crank-Nicolson schemes
are the same. We also observe the similar numerical performance of
these two schemes (see Test 8, 9 and 11 below), although the standard
Crank-Nicolson does not satisfy the energy stability.
\begin{remark}
Similar to the CSS \eqref{css}, we can obtain the corresponding
convex splitting version of the modified Crank-Nicolson scheme in the
following:
\begin{equation} \label{CSS-MCN}
(\frac{ u_h^{n}- u_h^{n-1}}{k_n},v_h)+(\frac{\nabla u_h^{n} +
\nabla u_h^{n-1}}{2}, \nabla v_h)
+\frac{1}{\epsilon^2} \left(g_+(u_h^{n}; u_h^{n-1})- g_{-}(u_h^{n-1};
u_h^{n-1}), v_h\right) = 0\quad \forall v_h\in V_h,
\end{equation}
where
$$
g_+(u_h; u_h^{n-1})=G_+'(u_h;u_h^{n-1})=\frac14\left[ u_h^3+ u_h^{n-1}u_h^2 + (u_h^{n-1})^2
u_h + (u_h^{n-1})^3 \right],
$$
$$
g_-(u_h; u_h^{n-1})=G_-'(u_h; u_h^{n-1}) = \frac12( u_h+ u_h^{n-1}).
$$
Similar to Theorem~\ref{thm:css-fis}, we know that the convex
splitting scheme~\eqref{CSS-MCN} can be recast as the modified
Crank-Nicolson scheme \eqref{eq:CN-AC} with the time step size
$k_n' = \frac{2\epsilon^2}{k_n+2\epsilon^2}k_n$. This also shows the delay
effect of the convex splitting scheme \eqref{CSS-MCN} to the original
fully implicit scheme \eqref{eq:CN-AC}, but with a slightly
different delay-factor: $ \delta_n=\frac{2\epsilon^2}{k_n+2\epsilon^2}$.
Again, similar to the argument we made in \S~\ref{subsec:CSS-AC}, the
convex splitting scheme~\eqref{CSS-MCN} derived here is the same as
the original modified Crank-Nicolson scheme~\eqref{eq:CN-AC} in
disguise with a reduced time step size.
\end{remark}
\paragraph{Test 8} \label{test8a}
In this simulation, we minimize the discrete energy
\eqref{eq:SCN-AC-discrete-energy} for the Allen-Cahn equation at each time
step. The computational domain is $\Omega=(-1,1)^2$, and
parameter is $\epsilon =5\times 10^{-3}$.
In order to smooth the initial value, we first compute the solution
from $t = 0$ to $t = 0.01$ with $k = 10^{-3}$, namely
$ k_n = 10^{-5}$ for $n = 1, 2, \cdots, 10.$
Then, we switch to $k_{11}=10^{-2}$.
After the smoothing the random initial value, we test the
dependency on the initial guess for the L-BFGS minimization algorithm.
Figure
\ref{fig:ck-regular-global-local-minimizer} shows different results with
different initial guess for $u$ and using the standard Crank-Nicolson scheme.
We observe that the result with the lowest energy is the one the closest to the reference solution.
\begin{figure}[!htbp]
\centering
\subfloat[Reference solution at $t=0.02$]{
\includegraphics[scale=0.25]{ck_regular_ref.png}
\label{fig:regular-global-local-refb}
}%
\subfloat[$u_h^{10}$ as initial guess, $E_{1,\rm MCN}^{\rm AC} = 8.338$]{
\includegraphics[scale=0.25]{ck_regular_right.png}
\label{fig:regular-global-local-globalb}
}\\
\subfloat[Random initial guess, $E_{1,\rm MCN}^{\rm AC} = 13.017$]{
\includegraphics[scale=0.25]{ck_regular_wrong.png}
\label{fig:regular-global-local-local1b}
}
\subfloat[Random initial guess, $E_{1,\rm MCN}^{\rm AC} = 12.569$]{
\includegraphics[scale=0.25]{ck_regular_wrong2.png}
\label{fig:regular-global-local-local2b}
}\\
\caption{The Allen-Cahn equation with random initial value and using standard Crank-Nicolson: Minimizers
at $t=1.1\times 10^{-2}$ for different initial guesses in the L-BFGS
algorithm.}
\label{fig:ck-regular-global-local-minimizer}
\end{figure}
\paragraph{Test 9} \label{test8}
In this simulation, we minimize the discrete energy
\eqref{eq:CN-AC-discrete-energy} for the Allen-Cahn equation at each time
step. The computational domain and
parameter are the same as Test 8. Figure
\ref{fig:ck-global-local-minimizer} shows different results with
random initial $u$ and using the modified Crank-Nicolson scheme. Even
though any solution given by the modified Crank-Nicolson is
unconditionally energy stable, we observe that the result with the
lowest energy is the one the closest to the reference solution.
Moreover, the unconditionally stable scheme (e.g. modified
Crank-Nicolson) can not guarantee the physical solution.
\begin{figure}[!htbp]
\centering
\subfloat[Reference solution at $t=0.01$]{
\includegraphics[scale=0.25]{ck_ref.png}
\label{fig:global-local-refb}
}%
\subfloat[$u_h^{0}$ as initial guess, $E_{1,\rm MCN}^{\rm AC} = -297.176$]{
\includegraphics[scale=0.25]{ck_right.png}
\label{fig:global-local-globalb}
}\\
\subfloat[Random initial guess, $E_{1,\rm MCN}^{\rm AC} =-284.995$]{
\includegraphics[scale=0.25]{ck_wrong.png}
\label{fig:global-local-local1b}
}
\subfloat[Random initial guess, $E_{1,\rm MCN}^{\rm AC} =-287.473$]{
\includegraphics[scale=0.12]{ck_wrong2.png}
\label{fig:global-local-local2b}
}\\
\caption{The Allen-Cahn equation with random initial value and using modified Crank-Nicolson: Minimizers
at $t=0.01$ for different initial guesses in the L-BFGS algorithm. (Here we add a constant to the discrete energy
\eqref{eq:CN-AC-discrete-energy}, which does not affect the minimizers.)}
\label{fig:ck-global-local-minimizer}
\end{figure}
\paragraph{Test 10} \label{test9}
Next, as done in the previous section, we evolve the Allen-Cahn
equation with different time step sizes to
see the two phases regroup. Three different computations with $k_n =
10^{-5}$ (convex case), $k_n = 10^{-4}$ and $k_n = 10^{-3}$
(non-convex cases) are considered. In Figure \ref{fig:ck-2} shows the
random initial value and the evolutions of the numerical solutions at
different $t$'s, using the modified Crank-Nicolson for time
discretization. It can be observed that the solutions in all these
cases behave similarly. Furthermore, the evolutions of the physical
energies, see Figure \ref{fig:ck-3}, shows the energy-stability of the
energy minimization version of the modified Crank-Nicolson scheme,
which is in agreement with the Theorem \ref{thm:convexity-SCN}.
\begin{figure}[!htbp]
\centering
\subfloat[$t=0$, $k_n = 10^{-5}$]{
\includegraphics[scale=0.17]{ck_1e-5_t=0.png}
}%
\subfloat[$t=0$, $k_n = 10^{-4}$]{
\includegraphics[scale=0.17]{ck_1e-5_t=0.png}
}%
\subfloat[$t=0$, $k_n = 10^{-3}$]{
\includegraphics[scale=0.17]{ck_1e-5_t=0.png}
}
\\
\subfloat[$t=0.02$, $k_n = 10^{-5}$]{
\includegraphics[scale=0.17]{ck_1e-5_t=002.png}
}
\subfloat[$t=0.02$, $k_n = 10^{-4}$]{
\includegraphics[scale=0.17]{ck_1e-4_t=002.png}
}%
\subfloat[$t=0.02$, $k_n = 10^{-3}$]{
\includegraphics[scale=0.17]{ck_1e-3_t=002.png}
}%
\\
\subfloat[$t=0.05$, $k_n = 10^{-5}$]{
\includegraphics[scale=0.17]{ck_1e-5_t=005.png}
}
\subfloat[$t=0.05$, $k_n = 10^{-4}$]{
\includegraphics[scale=0.17]{ck_1e-4_t=005.png}
}%
\subfloat[$t=0.05$, $k_n = 10^{-3}$]{
\includegraphics[scale=0.17]{ck_1e-3_t=005.png}
}%
\\
\subfloat[$t=0.14$, $k_n = 10^{-5}$]{
\includegraphics[scale=0.17]{ck_1e-5_t=014.png}
}
\subfloat[$t=0.14$, $k_n = 10^{-4}$]{
\includegraphics[scale=0.17]{ck_1e-4_t=014.png}
}%
\subfloat[$t=0.14$, $k_n = 10^{-3}$]{
\includegraphics[scale=0.17]{ck_1e-3_t=014.png}
}%
\\
\caption{The Allen-Cahn with random initial value: Plot of the
solutions at different $t$'s.}
\label{fig:ck-2}
\end{figure}
\begin{figure}[!htbp]
\begin{center}
\includegraphics[scale=0.6]{ck_Energy.png}
\end{center}
\caption{The Allen-Cahn equation with random initial guess: Evolutions
of physical energies.}
\label{fig:ck-3}
\end{figure}
\subsection{Modified Crank-Nicolson scheme for the Cahn-Hilliard equation}
The modified Crank-Nicolson scheme \cite{du1991numerical,
shen2010numerical, condette2011spectral} for the Cahn-Hilliard model
is defined as follows: Find $u_h^n \in V_h,\ w_h^n \in V_h$ for
$n=1,2,\cdots$, such that
\begin{equation}\label{eq:CN-CH}
\begin{aligned}
(\frac{u_h^{n}-u_h^{n-1}}{k_n},\eta_h)+(\nabla w_h^{n},\nabla \eta_h) &=0
\qquad \forall \,\eta_h\in V_h, \\
\epsilon (\frac{\nabla u_h^n + \nabla u_h^{n-1}}{2},\nabla v_h) +
\frac{1}{\epsilon}(\tilde F[u_h^n,
u_h^{n-1}],v_h)-(w_h^{n},v_h) &=0 \qquad \forall\, v_h\in V_h.
\end{aligned}
\end{equation}
\begin{lemma}[\cite{condette2011spectral, shen2010numerical}]
\label{lem_CR_CH_energy}
The modified Crank-Nicolson scheme \eqref{eq:CN-CH} is
unconditionally energy stable. More precisely, for any $k_n>0$,
\begin{align}\label{eq_CR_CH_energy}
J_\epsilon^{\rm CH}( u_h^{n}) + \frac{1}{k_n}\|\nabla\Delta_h^{-1}(u_h^{n} -
u_h^{n-1})\|_{L^2(\Omega)}^2 = J_\epsilon^{\rm CH}( u_h^{n-1}).
\end{align}
\end{lemma}
\begin{proof}
It can be directly proved by taking
$\eta_h=\Delta_h^{-1}(u_h^n-u_h^{n-1})$ and $v_h=u_h^n-u_h^{n-1}$ in
\eqref{eq:CN-CH}.
\end{proof}
Consider the Cahn-Hilliard equation, we define the following discrete energy
\begin{equation}\label{eq_CR_CH4}
E_{n,\rm MCN}^{\rm CH}(\theta_h; u_h^{n-1}) = \frac{\epsilon}{2}\left\| \frac{\nabla
\theta_h + \nabla u_h^{n-1}}{2}\right\|_{L^2(\Omega)}^2 +
\frac{1}{4k_n}\|\nabla\Delta^{-1}_h(\theta_h-u_h^{n-1})\|^2_{L^2(\Omega)}
+ \frac{1}{2\epsilon}\int_{\Omega}\check{G}(\theta_h,u_h^{n-1})~dx.
\end{equation}
\begin{theorem}\label{thm_CR_CH1}
Under the assumption that $k_n \leq 8\epsilon^3$, we have
\begin{enumerate}
\item $E_{n,\rm MCN}^{\rm CH}(\cdot;u_h^{n-1})$ is strictly convex on $\mathring{V}_h$;
\item The solution of the modified Crank-Nicolson scheme
\eqref{eq:CN-CH} satisfies
\begin{align}\notag
u_h^{n}=u_h^{n-1}+\theta_h^n, \mbox{ with }
\theta_h^n= \underset{\theta_h\in \mathring{V}_h}{\mathrm{argmin}}\,E_{n,\rm MCN}^{\rm CH}(\theta_h; u_h^{n-1}),
\end{align}
which is uniquely solvable.
\end{enumerate}
\end{theorem}
\begin{proof}
By the definition of operator $\Delta_h$ and the Schwarz's inequality, we have
\begin{align}\label{eq_laplace_inverse}
\frac{1}{2\epsilon}\|v_h\|_{L^2(\Omega)}^2\le \frac{1}{8\epsilon^3}\|\nabla\Delta_h^{-1}v_h\|^2_{L^2(\Omega)} + \frac{\epsilon}{2}\|\nabla v_h\|_{L^2(\Omega)}^2.
\end{align}
A direct calculation shows that
\begin{align} \label{convexity-MCN2}
(E_{n,\rm MCH}^{\rm CH})''(\theta_h; u_h^{n-1})(v_h,v_h)&= \frac{\epsilon}{4}\|\nabla v_h\|_{L^2(\Omega)}^2 +\frac{1}{2k_n}\|\nabla\Delta_h^{-1}v_h\|^2_{L^2(\Omega)}-\frac{1}{4\epsilon}\|v_h\|^2_{L^2(\Omega)}\\
&\qquad+ \frac{1}{2\epsilon}\int_{\Omega}\bigl[ 3\theta_h^2+ 2u_h^{n-1}\theta_h + (u_h^{n-1})^2 \bigr]v_h^2~dx.\nonumber
\end{align}
This implies that $E_{n,\rm MCN}^{\rm CH}(\cdot; u_h^{n-1})$ is strictly convex
when $k_n\leq 8\epsilon^3$. The rest of the proof is standard.
\end{proof}
\begin{remark}
Similar to the Allen-Cahn equation, the standard Crank-Nicolson
can also be constructed and analyzed for the Cahn-Hilliard equations.
\end{remark}
\subsection{Some other second-order partially implicit schemes}
In this section, we briefly discuss several other second-order
partially implicit schemes.
{\it Second-order stabilized semi-implicit scheme (BDF2)}: Seeking
$u_h^n\in V_h$ for $n=1,2,\cdots$, such that
\begin{equation}\label{eq:BDF2-AC}
\begin{aligned}
&(\frac{3u_h^{n}-4u_h^{n-1}+u_h^{n-2}}{2k_n},v_h)+(\nabla
u_h^n,\nabla v_h) +
\frac{1}{\epsilon^2}((2f(u_h^{n-1})-f(u_h^{n-2})),v_h)\\
&\qquad+
\frac{S}{\epsilon^2}(u_h^n-2u_h^{n-1}+u_h^{n-2},v_h)=0 \qquad\forall
v_h\in V_h,
\end{aligned}
\end{equation}
where $S>0$ (set as $S=10$ in the Test 10) is a stabilized constant.
{\it Second-order convex splitting scheme (CSS2)}: Seeking $u_h^n \in
V_h$ for $n = 1,2,\cdots$, such that
\begin{equation} \label{eq:CSS2}
(\frac{u_h^n - u_h^{n-1}}{k_n}, v_h) + (\frac{\nabla u_h^n + \nabla
u_h^{n-1}}{2}, \nabla v_h) +
\frac{1}{\epsilon^2}(g_+(u_h^{n}, u_h^{n-1}) -
\frac{1}{2\epsilon^2}(3u_h^{n-1} - u_h^{n-2}), v_h) = 0.
\end{equation}
We know that BDF2 is a linear scheme so that satisfies the convexity
property. Similar to the argument for the CSS version of modified
Crank-Nicolson scheme \eqref{CSS-MCN}, we know that \eqref{eq:CSS2}
also satisfies the convexity property. When $k_n\leq \epsilon^2$, these
second-order splitting schemes perform well (see Test 11 below).
However, we observe the following phenomenon for these second-order
splitting schemes:
\begin{enumerate}
\item They do not satisfy the discrete maximum principle, and it is
frequently worse than the first-order scheme;
\item They still suffer the lagging phenomenon or delayed convergence
for large time step size (see Test 11 below);
\end{enumerate}
\paragraph{Test 11} \label{test11}
In this test, the same domain and initial conditions are chosen as in
Test 1. Figure \ref{fig:2nd-CSS-small} shows the evolution of the
radius with respect to time for different second-order schemes. We
observe that all these second-order schemes perform well when
$k_n=\epsilon^2$. The performance of standard and modified
Crank-Nicolson schemes are similar. When increasing the time step
size, however, we observe that the lagging phenomenon exists for the
CSS2 (see Figure \ref{fig:2nd-CSS-large}).
\begin{figure}[!htbp]
\centering
\captionsetup{justification=centering}
\subfloat[Small time step: $k_n=\epsilon^2 = 0.0004$]{
\includegraphics[width=0.35\textwidth]{2nd-order.png}
\label{fig:2nd-CSS-small}
}%
\subfloat[Large time step: $k_n=15\epsilon^2 = 0.006$]{
\includegraphics[width=0.35\textwidth]{CSS2.png}
\label{fig:2nd-CSS-large}
}
\caption{Different second-order schemes for Allen-Cahn:
$\epsilon=0.02$, $h=0.015$, and $T=0.17$}
\label{fig:2nd-CSS-smooth}
\end{figure}
\subsection{Artificial convexity}
Following \S\ref{subsec:convexity}, the concept of artificial convexity
scheme can also be applied to the wildly used CSS2 \eqref{eq:CSS2} by
considering the following modified model:
\begin{equation} \label{ConvexAC_2nd}
u_t + \frac{\delta_n}{\epsilon^2}u_{tt} - \Delta u +
\frac{1}{\epsilon^2}f(u) = 0.
\end{equation}
The modified Crank-Nicolson of \eqref{ConvexAC_2nd} can be written as
$$
\begin{aligned}
(\frac{u_h^n-u_h^{n-1}}{k_n}, v_h) & +
(\frac{\delta_n}{\epsilon^2}\cdot\frac{u_h^n - 2u_h^{n-1} +
u_h^{n-2}}{k_n^2}, v_h) \\
& + (\frac{\nabla u_h^n + \nabla
u_h^{n-1}}{2}, \nabla v_h) + \frac{1}{\epsilon^2}(\tilde{F}[u_h^n,
u_h^{n-1}], v_h) = 0 \qquad \forall v_h \in V_h,
\end{aligned}
$$
which is exactly the CSS2 scheme \eqref{eq:CSS2} when $\delta_n =
\frac{k_n^2}{2}$.
\section{Concluding remarks}
In this paper, we mainly focus on how the behavior of numerical
schemes depend on the time-step size. For a given finite element
mesh, we compare solutions of fully discrete schemes with moderately
small time step size with those of fully implicit schemes with
extremely small time step size (which can be practically regarded as a
reliable approximation of a semi-discretization scheme).
We reach the following conclusions:
\label{sec:concluding}
\begin{enumerate}
\item A first-order CSS can be mathematically interpreted as a
standard FIS with a (much) smaller time-step size. As a result, a
CSS would usually lead to approximation of the solution of the
original model at a delayed time. For the Allen-Cahn model, we have
easily proved this time-delay effect rigorously. For the
Cahn-Hilliard model, we observe that, from the numerical
experiments, CSS also has a similar time-delay effect. This seems
to indicate that the solution of the regularized model
\eqref{ConvexCH} will probably have a time-delay effect in
comparison to the solution of the original Cahn-Hilliard model
\eqref{eq:CH}.
\item Since CSS is really an FIS scheme in disguise (at least for the
cases we have studied in this paper), the value of other FIS should
not be under-estimated. Thus a modified FIS is proposed so that the
maximum principle holds on the discrete level and, as a result, a
Poisson-like preconditioner can be devised and rigorously analyzed.
\item A major advantage of any partially implicit scheme is that a
relatively large time-step size can be used; but such schemes with
a large time-step size may have time delay (see Figure
\ref{fig:2nd-CSS-large}) and hence may be inaccurate.
\item By using energy minimization we can remove the constraint on the
time step for fully implicit schemes without creating any delayed in
the solutions.
\item Through numerical experiments with modified Crank-Nicolson
scheme, we showed that energy stable is not a sufficient condition
(see Figure \ref{fig:ck-global-local-minimizer}).
That is, an unconditionally stable scheme is not necessarily better
than a conditionally stable scheme.
\item {\it In summary}, we recommend to use FIS with energy
minimization.
\end{enumerate}
While most partially implicit schemes have been developed as a numerical
technique for solving a given phase-field model, given the insight
obtained in this paper, we would like to argue that it may be helpful
to view the convex splitting technique as a discrete modeling
technique, namely a procedure to convexify the original model. The
convexified models are \eqref{ConvexAC-delta} and
\eqref{ConvexCH-delta} for the Allen-Cahn Model and the Cahn-Hilliard
equation, respectively. While neither \eqref{ConvexAC-delta} nor
\eqref{ConvexCH-delta} has a corresponding convexity property on the
continuous level, their appropriately discretized model would have the
desired ``uniform convexity'' properties as stated in Theorem
\ref{thm:convexification}.
Partially implicit schemes (especially CSS) have been used for many
different models that are different from or more complicated than both
the Allen-Cahn and Cahn-Hilliard equations. We have not studied
carefully how these schemes behave in those models, but hopefully our
findings in this paper on partially implicit schemes for both the
Allen-Cahn and Cahn-Hilliard models will give some new insight into
the nature of convex splitting technique.
In terms of the unconditional energy-stability, we presented an energy
minimization version of the fully implicit schemes for phase field
modeling. Although it is challenging to find the global minimizer,
hopefully our findings in this paper on fully implicit schemes for
both the Allen-Cahn and Cahn-Hilliard equations will give some new
insight on the phase field modeling. Accordingly, the design of a fast
solver for the energy minimization problem arising from the phase
field modeling is a research topic of great theoretical and practical
importance.
\section*{References}
\bibliographystyle{elsarticle-num}
|
\section{Introduction}
The non linear ${\mathbb C}P^{N-1}$ sigma model in two dimensions has been extensively studied in the past starting from the works \cite{D'Adda:1978uc,Witten:1978bc}. It has many properties in common with QCD in four dimensions, such as asymptotic freedom, mass gap, confinement and the existence of a topological sector.
Moreover it has the advantage of being solvable in the large-$N$ limit.
Recently the ${\mathbb C}P^{N-1}$ sigma model appeared in the study of low energy effective action on certain topological solitons such as the non-Abelian string \cite{Hanany:2003hp,Auzzi:2003fs,Shifman:2004dr}.
In this paper we study the large-$N$ solution of the bosonic ${\mathbb C}P^{N-1}$ model on a finite interval of length $L$ with various types of boundary conditions.
The periodic boundary condition has been previously studied as a thermal compactification in \cite{Affleck:1979gy,Actor:1985yh} and more recently in \cite{Monin:2015xwa}. One key feature for the solvability of this model is that the periodic compactification preserves translational invariance.
The problem with the Dirichlet boundary condition in a finite interval has been studied recently in \cite{Milekhin:2012ca} by using a translational invariance Ansatz, where
two possible phases were found: a confinement phase with mass generation at large $L$ and a Higgs phase for a shorter string $L< L_{\rm crit} \sim 1/ \Lambda$.
It is the purpose of the present paper to examine in depth the bosonic ${\mathbb C}P^{N-1}$ model on a finite-width strip, with Dirichlet or Neumann conditions at the space boundaries.
The exact functional saddle-point equations will be studied in the large $N$ limit, with no a priori assumption about the translational invariance.
It will be seen that while with the periodic boundary condition the translational invariance Ansatz is indeed consistent with the full set of equations of motion,
the generalized gap equations cannot be satisfied by a translational invariant (constant) mass-generation Ansatz when the D-D or N-N boundary condition is used.
The solution which satisfies the full set of equations is found numerically, for various values of $L$.
Contrary to a claim made in \cite{Milekhin:2012ca} we find that the system has a unique phase, which smoothly approaches the ``confinement phase" in the large
$L$ limit. The physical reason for this result may be found in the fact that, for small $L$, the system reduces in the infrared (the large wavelength) limit effectively to a one-dimensional (quantum mechanics) system where we do not expect to find any phase transitions.
\section{${\mathbb C}P^{N-1}$ sigma model on a finite space interval}
The classical action for the ${\mathbb C}P^{N-1}$ sigma model is given by
\begin{eqnarray}
S= \int dx dt \left( (D_{\mu} n_i)^*D^{\mu} n_i - \lambda (n_{i}^* n_i - r) \right) \;,
\end{eqnarray}
where $n^i$ with $i=1,\dots,N$ are $N$ complex scalar fields and the covariant derivative is $D_{\mu} = \partial_{\mu} -i A_{\mu}$. Configurations related by a $U(1)$ gauge transformation $z_i \to e^{i\alpha} z_i$ are equivalent: the $U(1)$ gauge field $A_{\mu} $ does not have a kinetic term in the classical action.
$\lambda$ is a Lagrange multiplier that enforces the classical condition
\begin{eqnarray}
\label{classicalconstrain}
n_{i}^* n_i = r\;,
\end{eqnarray}
where $r$ is the ``size'' of the ${\mathbb C}P^{N-1}$ manifold, which is the radius of $S^2$ sphere for $N=2$, and can also be expressed in terms of the coupling constant by
\begin{eqnarray} r= \frac{4 \pi}{g^2}\;. \end{eqnarray}
Since $n$ appears only quadratically in the Lagrangian, it can be integrated out in the partition function
\begin{eqnarray}
Z = \int [dA_{\mu}][d \lambda][d n_i][dn_i^*] \, e^{ i S} = \int [dA_{\mu}][d \lambda]\, e^{ i {S}_{{\rm eff} } }\ ,
\end{eqnarray}
thus leaving an effective action for $A_{\mu}$ and $\lambda$:
\begin{eqnarray}
{S}_{{\rm eff}} = \int d^2 x \left( N \, {\rm tr}\, {\rm log} (- D_{\mu}^*D^{\mu} + \lambda ) -\lambda r\right) \;.
\end{eqnarray}
The condition of stationarity with respect to $\lambda$ leads to the gap equation which is conveniently written in the Euclidean formulation as
\begin{eqnarray}
r -N \, {\rm tr} \left(\frac{1}{-\partial_{\tau}^2 -\partial_x^2 +m^2}\right) = 0\;,
\end{eqnarray}
where we have set $A_{\mu}=0$ and $\lambda = m^2$. An expectation value of $\lambda$ provides a mass for the $n_i$ particles (here we assumed a constant vacuum expectation value for $\lambda$; see however below).
On the infinite line the spectrum is continuous and the gap equation reads
\begin{eqnarray}
r= N \int_0^{\Lambda_{\rm UV}} \frac{ k dk }{2 \pi } \frac{1}{k^2 +m^2} = \frac{N}{4\pi} \log{\left(\frac{\Lambda_{\rm UV}^2 + m^2}{m^2}\right)} \;,
\end{eqnarray}
leading to the well-known scale-dependent renormalized coupling
\begin{eqnarray}
\label{uvbeta}
r(\mu)= \frac{4 \pi}{g(\mu)^2} \simeq \frac{N}{2 \pi} \log{\left(\frac{\mu}{\Lambda}\right)}
\end{eqnarray}
and to a dynamically generated mass, which in the case of the infinite line can be taken to coincide with the dynamical scale $\Lambda$,
\begin{eqnarray}
\label{ml}
m = \Lambda\;. \label{eq:dynamicalscale}
\end{eqnarray}
\subsection{Generalized gap equations}
The ${\mathbb C}P^{N-1}$ theory on a finite interval of length $L$, $0 < x < L$ will now be considered.
For this problem the boundary conditions must be specified. One possibility is the Dirichlet boundary condition which, up to a $U(N)$ transformation, is the following constraint on the boundary
\begin{eqnarray}
\hbox{D-D} : \qquad n_1(0)=n_1(L) = \sqrt{r}\;, \qquad n_{i}(0)= n_{i}(L) =0\;, \quad i>1\;. \label{DDbc}
\end{eqnarray}
For simplicity and for definiteness, we take in this paper the $n_i$ field in the same direction in the ${\mathbb C}P^{N-1}$ space at the two boundaries.
Another possibility is the Neumann boundary condition
\begin{eqnarray}
\hbox{N-N}: \qquad \partial_x n_i(0) = \partial_x n_i(L) =0\;.
\end{eqnarray}
We consider in detail the three possible combinations D-D, N-N and periodic boundary conditions.
More possibilities are open for the choice of classical boundary condition but, for reasons to be clarified later, there is no need to list all of them.
The $N$ fields can be separated into a classical component $\sigma \equiv n_1$ and the rest, $n^i$ ($i=2,\dots,N$).
Integrating over the $N-1$ remaining fields yields the following effective action
\begin{eqnarray}
{S}_{{\rm eff}} = \int d^2 x \left( (N-1) \, {\rm tr}\, {\rm log} (- D_{\mu}D^{\mu} + \lambda) + (D_{\mu} \sigma)^*D^{\mu} \sigma - \lambda (|\sigma|^2 - r) \right)\;.
\end{eqnarray}
One can take $\sigma$ real and set the gauge field to zero, and consider the leading contribution at large $N$ only.
The total energy can formally be written as
\begin{eqnarray}
\label{engen}
E = N \sum_{n}\omega_n + \int_0^L \left( (\partial_x \sigma)^2 +\lambda (\sigma^2 - r )\right) dx \;,
\end{eqnarray}
where $\omega_n^2$ are the eigenvalues of the following operator
\begin{eqnarray}
\label{operator}
\left( - \partial_{x}^2 + \lambda(x) \right) f_n(x) = \omega_n^2 \ f_n(x) \;,
\end{eqnarray}
and $f_n$ are the corresponding eigenfunctions.
The eigenfunctions $f_n$ can be taken to be real and orthonormal
\begin{eqnarray}
\int_0^L dx \, f_n(x) f_m(x) = \delta_{n\,m}\;.
\end{eqnarray}
The expression for the energy (\ref{engen}) is not regularized yet, it still contains quadratic, linear and logarithmic divergences with the UV cutoff. For the moment we shall work with this formally divergent expression for the energy.
The eigenfunctions $f_n$'s satisfy also the completeness condition
\begin{eqnarray}
\sum_{n=1}^\infty f_n(x) f_n(x')=\sum_{n\in Z}
\Big( \delta(x-x'+2\,n L) \mp \delta(x+x'+2\,n L) \Big) \;, \label{mirror}
\end{eqnarray}
where $\mp$ refers respectively to the Dirichlet or Neuman conditions.
Note that for $x, x^{\prime} \in [0,L]$, only the first term $\delta(x-x^{\prime})$ is relevant; other terms guarantee that the completeness condition is consistent with
the boundary condition (the mirror image method).
The two functions $\sigma(x)$ and $\lambda(x)$ must be determined by extremizing the energy (\ref{engen}).
Varying the action with respect to $\sigma(x)$ one gets
\begin{eqnarray}
\partial_x^2 \sigma(x) - \lambda(x) \sigma(x) = 0 \ . \label{lambda}
\end{eqnarray}
In a translationally invariant system (i.e. with constant $\lambda$ and $\sigma$) this equation reduces to $\lambda \, \sigma = 0 $.
This implies that either one of the condensates $\lambda$ or $\sigma$ must vanish. It follows that there are in general two possible distinct phases which are generally called ``confinement phase" ($\lambda \neq 0$, $\sigma =0$) or ``Higgs phase" ($\lambda =0$, $\sigma \neq0$).
In a non-translational invariant system there is no net distinction between these two phases since in general both $\lambda(x)$ and $\sigma(x)$ are different from zero.
The variation of the spectrum of the operator (\ref{operator}) for $\lambda(x) \to \lambda(x) + \delta \lambda(x)$ is given by
\begin{eqnarray}
\delta \omega_n^2 = \int_0^L dx \, \delta \lambda(x) f_n(x)^2 \,,
\end{eqnarray}
to first order in $\delta \lambda(x)$, as can be seen easily from (\ref{operator}).
The variation of the energy (\ref{engen}) with respect to $\lambda(x)$ then gives
\begin{eqnarray}
\label{gapeq}
\frac{N}{2} \, \sum_n\frac{f_n(x)^2}{\omega_n} + \sigma(x)^2 - r = 0 \ .
\end{eqnarray}
We find it convenient to separate this equation into a constant part (the average in $x$) plus a non-constant part with zero integral.
First write $\sigma^2$ as
\begin{eqnarray}
\sigma^2 = \widetilde{\sigma}^2 + \frac{1}{L} \int_0^L \sigma^2 dx \;, \qquad \int_0^L \widetilde{\sigma}^2 dx = 0\;.
\end{eqnarray}
Eq.~(\ref{gapeq}) can thus be separated into the one for the constant part
\begin{eqnarray}
\label{const}
\frac{N}{2 L} \, \sum_n\frac{1}{ \omega_n} + \frac{1}{L} \int_0^L \sigma^2 dx - r = 0 \;,
\end{eqnarray}
and another for the non-constant part
\begin{eqnarray}
\label{lnonconst}
\frac{N}{2} \, \sum_n\frac{1}{\omega_n}\left( f_n(x)^2 -\frac1L \right) + \widetilde{\sigma}^2 = 0 \;.
\end{eqnarray}
So the three equations to be solved for $\lambda(x)$ and $\sigma(x)$ are (\ref{lambda}), (\ref{const}) and (\ref{lnonconst}). Only Eq.~(\ref{const}) needs to be regularized since it contains a logarithmic divergence with the UV cutoff.
For later use we provide a relation between the expression $\sum_n\frac{f_n(x)^2}{\omega_n}$ that appears in the generalized gap equation and the Euclidean propagator.
The Euclidean propagator satisfies
\begin{eqnarray}
&& \left( - \frac{\partial^2}{\partial \tau^2} - \frac{\partial^2}{\partial x^2} + \lambda(x) \right) D(x,\tau; x',\tau') = \nonumber \\
&& \quad \qquad = \delta(\tau-\tau^{\prime})\sum_{n\in Z} \Big(
\delta(x-x'+2\,n L) \mp \delta(x+x'+2\,n L) \Big)\; \label{single} \end{eqnarray}
and, in terms of $\{ f_n, \omega_n\}$, it is given by
\begin{eqnarray}
D(x,\tau; x',\tau')\equiv \sum_n\frac{e^{-|\tau-\tau'| \omega_n}}{2\omega_n} f_n(x) f_n(x')\;. \label{thetwo}
\end{eqnarray}
We can thus infer the useful relation
\begin{eqnarray}
\label{usefulformula}
\sum_n\frac{f_n(x)^2}{2 \omega_n} = \lim_{\epsilon \to 0} D(x, \epsilon; x ,0)\;,
\end{eqnarray}
where the Euclidean time interval $\epsilon$ plays the role of the UV
cutoff.
At this stage it is easy to see that
the generalized gap equation (\ref{gapeq}) is nothing but
a quantized version of the defining condition (\ref{classicalconstrain}):
\begin{eqnarray}
\left< n_i(x)^* n^i(x)\right>-r\equiv
\sigma(x)^2+\lim_{\epsilon \to 0}(ND(x,\epsilon,x,0)) -r=0\;. \label{byusing}
\end{eqnarray}
\subsection{Translational invariance Ansatz \label{sec:proof}}
Let us first test if the Ansatz of a translationally invariant (constant) $\lambda$ is consistent with our functional saddle-point equations.
Let us consider first the D-D case. If $\lambda= m^2$ were constant the eigenfunctions and eigenvalues of the operator (\ref{operator}) would be simply given by
\begin{eqnarray}
\label{ddstates}
f_n(x)=\sqrt{\frac2L} \sin\left(\frac{n \pi x}L\right),\qquad
\omega_n=\sqrt{\left(\frac{n\pi}L\right)^2+ m^2} \;, \qquad n\geq 1, \quad n \in \mathbb Z\;.
\end{eqnarray}
Here one has an explicit representation of the propagator,
\begin{eqnarray} D(x,\tau; x',\tau') &=& \sum_{n\in Z} \frac{1}{2\pi} K_0 (m \sqrt{ (x- x^{\prime} + 2n L)^2 + (\tau- \tau^{\prime})^2} ) \nonumber \\
&& - \sum_{n\in Z} \frac{1}{2\pi} K_0 (m \sqrt{ (x+ x^{\prime} + 2n L)^2 + (\tau- \tau^{\prime})^2 )} \;.
\end{eqnarray}
Note that each term satisfies the standard Green function equation (\ref{single}) with a single delta function in $x$ on the right hand side.
In the case with a constant $\sigma$,
Eq.(\ref{const}) gives, by using an appropriate regularization
\begin{eqnarray}
0&=& \frac{N}{2L}\sum_{n}\frac1{\omega_n}+\sigma^2-r
\nonumber\\
&=& \lim_{\epsilon \to 0}\frac{1}{L} \int_0^L dx \left(
N D(x,\epsilon;x,0) -r \right)+\sigma^2\nonumber \\
&=&\frac{N}{2\pi}\ln\frac{\Lambda}m
-\frac{N}{4mL}+\frac{N}{\pi}\sum_{n=1}^\infty K_0(2nmL)+\sigma^2
\label{eq:constgap}
\end{eqnarray}
which is nothing but the gap equation
discussed by Milekhin \cite{Milekhin:2012ca}. Here, taking into account the
consistency with Eq.(\ref{eq:dynamicalscale}) for infinite string,
the dynamical scale
$\Lambda$ can be introduced as
\begin{eqnarray}
r=\frac{4\pi}{g^2}=\frac{N}{2\pi }\left(\ln\frac{2}{\Lambda \epsilon }-\gamma
\right)\quad \leftrightarrow \quad
\Lambda
=\frac{2}{\epsilon } \exp\left(-\frac{8\pi^2}{Ng^2}-\gamma\right)
\label{eq:Lambdaepsilon}
\end{eqnarray}
where $\gamma$ is the Euler-Mascheroni constant.
The second term in the last line of Eq.~(\ref{eq:constgap})
comes from the infinite mirror poles:
\begin{eqnarray}
\frac{N}{2\pi} \frac{1}{L}
\sum_{n \in Z} \int_0^L dx K_0 (2m | x + n L|)
= \frac{N}{2\pi} \frac{1}{L} \int_{-\infty}^{\infty} dx \, K_0 (2m
| x |) = \frac{N}{4 m L}\;. \label{eq:mirrors}
\end{eqnarray}
One can verify that
Eq.~(\ref{eq:constgap}) gives the local extremum (maximum)
of the total energy (\ref{engen})
\begin{eqnarray}
E&=& \lim_{\epsilon \to 0} \int_0^L \left\{ 2 \frac{\partial^2}{\partial
\epsilon^2}(N D(x,\epsilon;x,0
)-r)
+m^2 (\sigma^2-r)\right\}dx\nonumber \\
&=& \frac{Nm^2L}{2\pi} \left(\frac12 - \log \frac m{\Lambda} \right)-
\frac{N m}2
-\frac{ N m^2 L}\pi \sum_{n=1}^\infty \frac{ K_1(2 \, n \,m\,L)}{n\,m
L}+m^2L \sigma^2 \label{energycstm}
\end{eqnarray}
with respect to $m^2$, under the translational-invariance Ansatz.
However, the problem is that an additional equation, (\ref{lnonconst}), must be satisfied as well.
The left hand side, using $\widetilde{\sigma} = 0$ (under the assumption of translational invariance), is just
\begin{eqnarray}
\label{DDnosolved}
\frac{N}{2L} \sum_{n=1}^\infty \frac1{\omega_n} \left( 2 \sin^2
\left(\frac{n \pi
x}L\right) - 1
\right)
=-\frac{N}{2L} \sum_{n=1}^\infty \frac1{\omega_n} \cos \left(\frac{2 n \pi x}L\right) \;,
\label{formuladd}
\end{eqnarray}
which is equal to, by using (\ref{usefulformula}),
\begin{eqnarray}
&& N\lim_{\epsilon \to 0} \left( D(x, \epsilon; x;0)-
\frac{1}{L} \int_0^L dx D(x, \epsilon; x;0)\right)
\nonumber\\
&=&
\frac{N}{2L} \left( \frac1{2 m }-\frac{L}\pi \sum_{n \in \mathbb Z}K_0(2 m |x- n L|) \right).\label{propeq}
\end{eqnarray}
This is clearly not zero: Eq.~(\ref{lnonconst}) is not
satisfied by a constant $m$.
For N-N boundary conditions and $\lambda=m^2$ constant the eigenmodes are
\begin{eqnarray}
\label{nnstates}
f_n(x)=\sqrt{\frac2L} \cos \left(\frac{n \pi x}L\right),\quad
\omega_n=\sqrt{\left(\frac{n\pi}L\right)^2+ m^2} \;, \qquad n\geq 0\,, \quad n \in \mathbb Z
\end{eqnarray}
In this case, the left hand side of Eq.~(\ref{lnonconst}) gives
\begin{eqnarray}
\label{NNnosolved}
\frac{N}{2L} \sum_{n=0}^\infty \frac1{\omega_n} \left( 2 \cos^2 \left(\frac{n \pi x}L\right) - 1 \right)
=
\frac{N}{2L} \sum_{n=1}^\infty \frac1{\omega_n} \cos \left(\frac{2 n \pi x}L\right)\nonumber \\
=-\frac{N}{2L} \left( \frac1{2 m }-\frac{L}\pi \sum_{n \in \mathbb Z}K_0(2 m |x-n L|) \right).
\end{eqnarray}
which is the same as the D-D case (\ref{DDnosolved}), except for the sign.
The proof is as before by using instead the plus sign in (\ref{single}).
Again, Eq.~(\ref{lnonconst}) cannot be satisfied by a constant $\lambda$.
Thus both for DD and NN boundary conditions, the constant generated mass $m$ does not represent a quantum saddle point of our system.
For the periodic boundary condition one can set for convenience the period length to $2L$. The complete set of eigenstates and eigenfunctions are exactly given by a D-D set (\ref{ddstates}) plus a N-N set, (\ref{nnstates}), applied in the enlarged space $[0, 2L]$.
In this case, the left hand side of equation (\ref{lnonconst}) is the sum of D-D states contribution (\ref{DDnosolved}) plus the N-N states contribution (\ref{NNnosolved}) which cancel. As expected, the translational invariance Ansatz is consistent in this case.
This system has been studied in \cite{Monin:2015xwa}.
With a periodic condition,
the total
energy and the gap equation can depend on the Wilson loop
$\exp(i \int_0^{2L}A_xdx)$. With a nonvanishing constant gauge field $A_x$, one finds that
the propagator is given by
\begin{eqnarray}
D(x,\tau; x',\tau') &=& \sum_{n\in Z} \frac{1}{2\pi} K_0 (m \sqrt{ (x- x^{\prime} + 2n L)^2 + (\tau- \tau^{\prime})^2} ) \, e^{iA_x(x-x'+2nL)}.
\end{eqnarray}
Therefore the energy in the confinement phase $(\sigma=0)$, is
\cite{Monin:2015xwa}
\begin{eqnarray}
E&=&2L\times \lim_{\epsilon\to 0}\left\{
2\frac{d^2}{d\epsilon^2}(ND(0,\epsilon,0,0)-r)-m^2 r\right\}\nonumber\\
&=&
\frac{Nm^2L}{\pi} \left(\frac12 - \log \frac m{\Lambda} \right)
-\frac{2 N m^2 L}\pi \sum_{n=1}^\infty \frac{ K_1(2n \,mL)}{n\,m
L}\cos(2nA_x L).
\end{eqnarray}
By minimizing the energy with respect to $A_x$, one finds $A_x=0$.
The saddle point with respect to $m^2$ is determined by the gap equation
\begin{eqnarray}
0= \frac{N}{2\pi}\ln\frac{\Lambda}m+\frac{N}{\pi}\sum_{n=1}^\infty K_0(2nmL).
\end{eqnarray}
In this case no other equations must be satisfied, so this gives the solution of the problem.
\section{Solution of the generalized gap equation}
Having proven that a constant $\lambda=m^2$ does not satisfy the functional saddle point equations, (\ref{lambda}), (\ref{const}) and (\ref{lnonconst}), for the problem with the Dirichlet or Neumann boundary conditions,
we now discuss the solution of these equations, relying also on a numerical analysis. The content of this section constitutes the main new contribution of this paper.
\subsection{Behavior of the functions $\lambda(x)$ and $\sigma(x)$ near the boundaries}
Before embarking on the numerical analysis one must first understand the behavior close to the boundaries of the two unknown functions $\lambda(x)$ and $\sigma(x)$.
For the case of D-D boundary condition, and under the assumption of constant $\lambda$, the left hand side of (\ref{lnonconst}) is given by (\ref{DDnosolved}) and thus contains a logarithmic divergence near the boundaries since $K_0(x) \simeq -\log{x}$ for $x \ll 1$.
In the propagator formalism (\ref{propeq}) this leading divergence comes from the closest mirror pole.
The logarithmic behavior is due to the fact that at $x \ll 1$ one can neglect the potential $\lambda$ and use the massless propagator.
Another crude, but somehow useful, way to understand this logarithm divergence is the following. At fixed $x$, we split the sum (\ref{formuladd}) into ``low-energy" modes and ``high-energy" modes.
For the low-energy modes we approximate $ \sin^2 \left(\frac{n \pi x}L\right) \simeq 0$. The high-energy modes instead are summed to zero due to the fast averaging. The result gives the correct log divergent term:
\begin{eqnarray}
&& \frac{N}{2L} \sum_{n=1}^{[L/\pi x]} \frac1{\omega_n} \left( 2 \sin^2 \left(\frac{n \pi x}L\right) - 1 \right) +
\frac{N}{2L} \sum_{n=[L/\pi x]+1}^{\infty} \frac1{\omega_n} \left( 2 \sin^2 \left(\frac{n \pi x}L\right) - 1 \right) \nonumber \\
&& \simeq
\frac{N}{2L} \sum_{n=1}^{[L/\pi x]} \frac1{\omega_n} \left(- 1 \right) \simeq \frac{N}{2 \pi} \log{x} + \dots \ .
\end{eqnarray}
We will show below more carefully that this type of divergence near the boundary is really there, at least for the D-D condition, also for a generic, but not too singular, potential $\lambda(x)$.
Let us use the WKB approximation to compute the leading divergence of $ \sum_n\frac{f_n(x)^2}{\omega_n}$ near the boundaries of the interval. We assume $\lambda(x)$ to be generic, with $
\lambda(x) >0$ and $ \lambda(x)=\lambda(L-x) $, but not too singular near the boundaries:
\begin{eqnarray}
\label{condition}
\lim_{x \to 0 } x^2 \lambda(x) = 0\;.
\end{eqnarray}
It will be seen that the potential $\lambda(x)$ is non-constant and
divergent near the boundaries $\lambda(x) \to \infty$ as $x \to
0,L$. Nevertheless it does satisfy the condition (\ref{condition}).
This fact also implies that `the Higgs phase' defined by a
configulation in which the potential vanishes identically, $\lambda(x)=0$,
cannot be a solution of the generalized gap equation.
By using WKB approximation the high-energy modes of the operator (\ref{operator}) can be approximated, in the classically allowed region, by
\begin{eqnarray}
f_n(x) \simeq \frac{C_n}{\sqrt{p_n(x)}}
\sin\left(\int_{\epsilon_n}^x p_n(x') dx'-\frac{\theta_n}2\right)
\end{eqnarray}
where
\begin{eqnarray}
p_n(x)=\sqrt{\omega_n^2-\lambda(x)},\qquad C_n =
\sqrt{\frac2{\int_{\epsilon_n}^{L-\epsilon_n} \frac{dx}{p_n(x)} }}
\end{eqnarray}
and $\epsilon_n$ and $L-\epsilon_n$ are the classical turning point
\begin{eqnarray}
\omega_n^2-\lambda(\epsilon_n) = 0 \;,\qquad \omega_n^2-\lambda(L-\epsilon_n) = 0 \ .\label{eq:turnigpoint}
\end{eqnarray}
The Bohr-Sommerfeld quantization condition is
\begin{eqnarray}
\int_{\epsilon_n}^{L-\epsilon_n} \sqrt{\omega_n^2-\lambda(x)} \, dx
=\pi \, n+\theta_n\;,\qquad n\in\mathbb Z_{>0}\;.
\end{eqnarray}
The initial phase $\theta_n$ is quite important to determine the divergence
near the boundaries. It would be equal to ${\pi}/2$ if there were no boundary, but a smooth classical turning point.
However, the phase $\theta_n$ turns out to vanish
\begin{eqnarray}
\theta_n=0\;,
\end{eqnarray}
as can be seen as follows. If $\lambda(x)$ had the maximum $\lambda_M$,
then for $\omega_n >\sqrt{\lambda_M}$ there was no classical turning
point and the classically allowed
region was $[0,L]$ $(\epsilon_n=0)$ and we get $\theta_n=0$ due to
the D-D condition. Even in the case where $\lambda$ diverges at the boundaries, which
actually is our case, the same result is obtained because, from the condition (\ref{condition}) and the equation
(\ref{eq:turnigpoint}), one gets
\begin{eqnarray}
\lim_{\omega_n \to \infty} \omega_n \, \epsilon_n = 0 \;,
\end{eqnarray}
meaning that the turning point $\epsilon_n$ goes to zero faster than the typical wave length of the eigenstate, $\sim 1/\omega_n$.
This is sufficient for letting us to conclude that for large $n$ the eigenfunctions and eigenvalues are well approximated by
\begin{eqnarray}
\label{largen}
f_n \simeq
\sqrt{\frac2L} \sin\left(\frac{n \pi x}L\right)\;, \qquad
\omega_n \simeq \frac{n\pi}L\;,
\end{eqnarray}
and thus
\begin{eqnarray}
\frac{N}{2} \, \sum_n\frac{1}{\omega_n}\left( f_n(x)^2 -\frac1L \right) \simeq-\frac{N}{2 \pi } \sum_{n=1}^\infty \frac1n \cos \left(\frac{2 n \pi x}L\right)
= \frac{N}{2 \pi} \log
\left(2 \sin{\left(\frac{\pi x}{L} \right)} \right) \ , \label{massless}
\end{eqnarray}
which behaves indeed near $x=0$ as
\begin{equation} \sim \frac{N}{2 \pi} \log x\;.
\end{equation}
In other words, the sum of the fluctuations of the $n_i$ fields very generally produces a divergent behavior for the first two terms of Eq.~(\ref{lnonconst}) near the boundaries,
quite independently of the form of $\lambda(x)$, as long as the latter satisfies the condition (\ref{condition}).
The only way to solve Eq.~(\ref{lnonconst}) is then to cancel this divergence with the classical field $\sigma$
\begin{eqnarray}
\label{sigmadiv}
\sigma^2 \simeq \frac{N}{2 \pi} \log{\frac{1}{x}} \;.
\end{eqnarray}
But this is exactly the expected behavior, as it corresponds to the classical constraint (\ref{classicalconstrain}), or to the D-D boundary condition, (\ref{DDbc}), as can be seen once a renormalized coupling (\ref{uvbeta}) with energy scale $\mu =1/x$ is substituted. Approaching the boundaries, $x \sim \epsilon, L- \epsilon $, is thus similar to going into the UV, hence the classical value for $\sigma(x)=n_1(x)$ there (see more on this point below).
The divergence of the $\sigma$ field near the boundaries (\ref{sigmadiv}) on the other hand implies, through equation (\ref{lambda}), that the potential $\lambda$ also diverges. Its leading behavior at $x \simeq 0$ is given by
\begin{eqnarray}
\lambda(x) \simeq \frac{1}{2 \,x^2 \log{1/x}} \; \label{satisfying}
\end{eqnarray}
which indeed satisfies the condition, (\ref{condition}).
Thus the behavior of the functions $\lambda(x)$ and $\sigma(x)$ near the boundaries has been determined self-consistently to be given by (\ref{sigmadiv}) and (\ref{satisfying})
(and similarly for $x\sim L$, with $x \to L-x$).
Physically, such a behavior can be understood as follows. At any fixed $x$, far from the boundaries, the UV divergences due to the higher modes are cancelled by a constant
(and divergent) $r_{\epsilon} = \tfrac{4\pi}{g_{\epsilon}^2} $, exactly as in the standard ${\mathbb C}P^{N-1}$ sigma model without the space boundaries. This is so because the UV divergences are
local effects in $x$: far from the boundaries the effects of the latter are negligible. Near the boundaries where the quantum fluctuations of the $n_i$ fields are suppressed, however, this cancellation cannot occur, $r_{\epsilon} $ being a constant. This is where the classical field $\sigma= n_1$ comes to rescue.
The generalized gap equation (\ref{gapeq}) is now satisfied by balancing the "ultraviolet" divergent behavior of $\sigma(x)$ at $x \sim \epsilon $, with $r_{\epsilon}$.
Even though this way of interpreting (\ref{sigmadiv}) and (\ref{satisfying}) is straightforward in the case of the D-D condition, actually the same
results hold for the system with the N-N boundary condition as well. They just tell that at the boundaries, where the quantum fluctuations of the $n_i$ fields are suppressed and cannot produce the logarithmic divergences due to the lack of the two-dimensional spacetime, the defining condition (\ref{byusing}) of the ${\mathbb C}P^{N-1}$ theory must be satisfied by the classical field \footnote{Note that in the large $N$ approximation we are working in, ``quantum fluctuations" of the $\sigma$ field are suppressed by $1/N$ as compared to those of $n_i, \, i\ne 1$, as well as to its classical mode.}, independently of the type of the boundary condition.
The numerical solutions found below indeed hold true both for the case of the D-D and the N-N boundary conditions.
This conclusion can be further confirmed by studying the wave functions $f_n(x)$ analytically near the boundaries, assuming $\lambda(x)$ of the form of (\ref{satisfying}), as is done in
Appendix \ref{eigen}. The resulting behavior is
\begin{eqnarray}
f_n(x \to 0) \propto \frac{x}{\sqrt{-\log{x}}}\;; \qquad
f_n(x \to L) \propto \frac{L-x}{\sqrt{-\log{(L-x)}}}\;. \label{result}
\end{eqnarray}
Thus not only do they satisfy the Dirichlet boundary condition but also the Neumann boundary condition.
As already anticipated, this is the indication one gets from the numerical solution found by the recursive procedure to be described in the next subsection. The results found for $\lambda(x)$ and $\sigma(x)$
turn out to be the same, irrespectively of the boundary condition used to solve the wave equation (\ref{operator}).
Finally we note that the case of the periodic boundary condition is qualitatively different. In that case, the points $x=0, L$ are no special points, the quantum fluctuations
are effective there, as well as at any other point, and our results (\ref{sigmadiv}) and (\ref{satisfying}) do not apply. Such system has been recently studied in \cite{Monin:2015xwa}.
\subsection{Numerical solutions for $\lambda(x)$ and $\sigma(x)$}
The method we employ to solve the set of equations
(\ref{lambda}), (\ref{const}), and (\ref{lnonconst}) numerically is as follows.
We first introduce a finite cutoff $n_{\rm max}$ on the number of modes. Accordingly, equation (\ref{const}) can be regularized as (see Eq.~(\ref{uvbeta}))
\footnote{
A careful change of the regularization gives
the factor 2 in front of $\mu(n_{\rm max})$
so that it is consistent with Eq.(\ref{eq:dynamicalscale}).
Omitting higher modes larger than $n_{\rm max}$
\begin{eqnarray}
\frac{\pi}{L}\sum_{n=n_{\rm max}+1}^\infty \frac{e^{-\epsilon
\omega_n}}{\omega_n}\simeq \sum_{n=n_{\rm max}+1}^\infty
\frac{e^{-\frac{n \pi}{L}\epsilon}}{n}
\simeq -\log(1-e^{-\frac{\pi}L\epsilon })-\sum_{n=1}^{n_{\rm
max}}\frac1n
\simeq -\log \epsilon -\log \mu(n_{\rm max})-\gamma\;,
\end{eqnarray}
introduces a translation between the two UV cut-off parameters
$\epsilon$ and $\mu(n_{\rm max})$ as $1/\epsilon =\mu
e^{\gamma}$. Therefore, Eq.(\ref{eq:Lambdaepsilon})
giving $\Lambda$ is translated as
\begin{eqnarray}
r=\frac{N}{2\pi}\left(\log\frac2{\Lambda \epsilon }-\gamma
\right)=\frac{N}{2\pi} \log \frac{2\mu(n_{\rm max})}{\Lambda}\;.
\end{eqnarray}
}
\begin{eqnarray}
\label{lconstreg}
\frac{N}{2 L} \, \sum_{n=1}^{n_{\rm max}}\frac{1}{ \omega_n} + \frac{1}{L} \int_0^L \sigma^2 dx - \frac{N}{2 \pi} \log{\left(\frac{2\mu(n_{\rm max})}{\Lambda}\right)} = 0 \;,
\end{eqnarray}
where, by using (\ref{largen}),
\begin{eqnarray}
\mu(n_{\rm max}) = \frac{n_{\rm max} \pi}{L} \ .
\end{eqnarray}
The algorithm we use here to find the solution, somewhat reminiscent of Hartree's equations in atomic physics, is a recursive procedure in which at each step $k$ one has a certain function $\lambda_k(x)$, with some initial $\lambda_0(x)$ satisfying (\ref{satisfying}).
Given $\lambda_k(x)$, the Schr\"odinger equation (\ref{operator}) is solved to give $ \{ \omega_n, f_n(x)\}$ for the desired number of modes; (\ref{lnonconst}) and (\ref{lconstreg}) are then used to find the corresponding value of $\sigma_k^2$:
\begin{eqnarray}
\label{sigmak}
\sigma_k^2 = -
\frac{N}{2} \, \sum_n\frac{1}{\omega_n}\left( f_{n,k}(x)^2 -\frac1L \right)-
\frac{N}{2 L} \, \sum_{n=1}^{n_{\rm max}}\frac{1}{ \omega_{n,k}}
+\frac{N}{2 \pi} \log{\left(\frac{2 \mu(n_{\rm max})}{\Lambda}\right)} \;.
\end{eqnarray}
Note that the right hand side of this equation depends only on $\lambda_k(x)$.
The next iteration for $\lambda$ is found by use of Eq.~(\ref{lambda}):
\begin{eqnarray}
\label{weakpassage}
\lambda_{k+1}(x) = \frac{\partial_x^2 \sigma_k(x)}{\sigma_k(x) } \ .
\end{eqnarray}
This procedure can be repeated until a convergence to a consistent
set of $\lambda(x)$ and $\sigma(x)$ is achieved\footnote{The whole
analysis has been performed by using Mathematica, Wolfram (Version 10.3). The
spectra $\{f_n, \omega_n\}$ at each recursion step are found by use of
the command ``NDEigensystem''.
}.
We set $L$ fixed and then study various values of $\Lambda$. We take the starting point of the iteration to be $\lambda_0(x)=0$ for the first value of $\Lambda$.
For the successive values of $\Lambda$, the self-consistent solution $\lambda(x)$ obtained with the previous value of $\Lambda$ will be taken as the
starting point $\lambda_0(x)$ of recursion.
The method as described above works well for $L\Lambda$ up to $1$ after which it loses convergence.
The delicate point in the algorithm is the step (\ref{weakpassage}) which is exceedingly sensitive to small variations of $\sigma_k(x)$ in the denominator.
A technical improvement we implement is the following. We substitute (\ref{weakpassage}) with a ``smoother" recursive formula
\begin{eqnarray}
\label{strongpassage}
\lambda_{k+1}(x) = \frac{1}{K} \left( \frac{\partial_x^2 \sigma_k(x)}{\sigma_k(x) } + (K-1) \lambda_k(x)\right) \ ,
\end{eqnarray}
with some conveniently chosen $K$. Having a larger value of $K$ makes the convergence slower but at the same time it allows to reach higher values of $L \Lambda$. For example by choosing $K= 15 $ (as is done to produce the plots for large $L \Lambda$ given below) one can reach $L \Lambda $ up to $4$.
Another technical issue is that $\sigma_k(x)$, as computed in (\ref{sigmak}), cannot be inserted as it is in the second derivative of the expression for $\lambda_{k+1}(x)$. In passing from (\ref{sigmak}) to (\ref{strongpassage}) one must perform a numerical fit to approximate $\sigma_k(x)$ with a sum of analytical functions. In the plots given below $\sigma_k(x)$ and its analytical fit are superimposed: the two curves are indistinguishable, within the resolution of the graphs.
\noindent {\bf Results}
In Figure \ref{lconst} we present some numerical results for smaller values of $L \Lambda$. $\sqrt{\lambda(x)}$ is shown in the
left panel while the right panel gives the classical field $\sigma(x)^2/N$.
The Figures show the results for $L=1$ fixed and $\Lambda = 0.2, 0.4, 0.6, 0.8, 1$.
\begin{figure}[h!t]
\centerline{
\begin{tabular}{cc}
\epsfxsize=8cm \epsfbox{lambda.eps} &
\epsfxsize=8cm \epsfbox{sigma.eps}
\end{tabular}}
\caption{{\footnotesize On the left $\sqrt{\lambda(x)}$, on the right $\sigma(x)^2/N$. These plots are obtained by keeping $L=1$ fixed and changing $\Lambda$. }}
\label{lconst}
\end{figure}
\begin{figure}[h!t]
\centerline{
\begin{tabular}{cc}
\epsfxsize=8cm \epsfbox{lambdar.eps} &
\epsfxsize=8cm \epsfbox{sigmar.eps}
\end{tabular}}
\caption{{\footnotesize On the left $\sqrt{\lambda(x)}$, on the right $\sigma(x)^2/N$. These plots are the corresponding of Figure \ref{lconst} but rescaled in order to keep $\Lambda=1$ fixed and changing $L$. The constant line on the left figure is $\Lambda$. }}
\label{lambdaconst}
\end{figure}
Figure \ref{lambdaconst} shows the plots for fixed dynamical scale $\Lambda = 1$ and various values of $L$.
The results in the two
figures are related by a trivial rescaling. The only non-trivial dimensionless quantity is $ \Lambda L$. Two cases with the same $ \Lambda L$ are related by the following scale transformation
\begin{eqnarray}
\frac{1}{\alpha^2}\lambda\left(\frac{x}{\alpha};\frac{L}{\alpha},\Lambda \alpha\right) = \lambda(x;L,\Lambda)\;; \qquad
\sigma\left(\frac{x}{\alpha};\frac{L}{\alpha},\Lambda \alpha\right) = \sigma(x;L,\Lambda)\;.
\end{eqnarray}
\begin{figure}[h!t]
\centerline{
\begin{tabular}{cc}
\epsfxsize=8cm \epsfbox{lmezzo.eps} &
\epsfxsize=8cm \epsfbox{smezzo.eps}
\end{tabular}}
\caption{{\footnotesize On the left is $\sqrt{\lambda(L/2)}$; on the right $\sigma(L/2)^2/N$ for various values of $L$ keeping $\Lambda=1$. The data points are compared with the singular behavior (\ref{sigmadiv}) and (\ref{satisfying}) extrapolated towards the center of the string, $L/2$. }}
\label{mezzo}
\end{figure}
Another visualization of the results is given in Figure \ref{mezzo} where the value of the fields at the center of the string, $L/2$, is shown for various values of $L$ and at fixed $\Lambda =1$.
\begin{figure}[h!t]
\centerline{
\begin{tabular}{cc}
\epsfxsize=8cm \epsfbox{lambdarbig.eps} &
\epsfxsize=8cm \epsfbox{sigmarbig.eps}
\end{tabular}}or
\caption{{\footnotesize On the left $\sqrt{\lambda(x)}$, on the right $\sigma(x)^2/N$. These plots are rescaled in order to keep $\Lambda=1$ fixed and for $L=1,2,3,4$. The constant line on the left figure is $\Lambda$.}}
\label{lambdaconstbig}
\end{figure}
The results for larger values of $ L \Lambda $ are shown in Figure \ref{lambdaconstbig}, for $\Lambda=1$ fixed and $L=1,2,3,4$. From the figures we see the expected pattern emerging: by going to larger $L$ at fixed $\Lambda$ one expects to recover the confined phase of the standard ${\mathbb C}P^{N-1}$ sigma model, Eq.~(\ref{ml}). We indeed see that $\sqrt{\lambda(x)} \to \Lambda$ in the middle of the interval whereas
the condensate $\sigma$ approaches zero there at the same time. The effects of the boundary remain concentrated near the two extremes and do not propagate beyond $1/\Lambda$.
\begin{figure}[h!t]
\centerline{
\begin{tabular}{cc}
\epsfxsize=7.5cm \epsfbox{lmezzobig.eps} \ & \
\epsfxsize=7.5cm \epsfbox{smezzobig.eps} \\
\epsfxsize=7.5cm \epsfbox{lmezzologbig.eps} \ & \
\epsfxsize=7.5cm \epsfbox{smezzologbig.eps}
\end{tabular}}
\caption{{\footnotesize These plots are: on the top-left is $\sqrt{\lambda(L/2)}$, on the top-right $\sigma(L/2)^2/N$, on the bottom-left $\log{ \left( \sqrt{\lambda(L/2)-\Lambda^2}/\Lambda \right)}$ and on the bottom-right $ \log{\left( \sigma^2(L/2)/N \right) } $. These plots are obtained for various values of $L$ keeping $\Lambda=1$. }}
\label{mezzobig}
\end{figure}
\begin{figure}[h!t]
\centerline{
\begin{tabular}{cc}
\epsfxsize=8cm \epsfbox{sigmanew1.eps} &
\epsfxsize=8cm \epsfbox{sigmanew2.eps}
\end{tabular}}
\caption{{\footnotesize $\sigma(x)^2/N$ compared with the $cosh$ approximation for $\Lambda=1$ and $L=1$ on the left and $L=4$ on the right. } }
\label{sigmanew}
\end{figure}
\noindent The values of the fields at the middle point of the interval are given in Figure \ref{mezzobig} where in the bottom line are the corresponding logarithmic plots to show better the rate of convergence to the confinement phase. A linear fit to the logarithmic plots at large $L$, both for $\log{ \left( \sqrt{\lambda(L/2)-\Lambda^2}/\Lambda \right)}$ and for $ \log{\left( \sigma^2(L/2)/N \right) } $,
or
\begin{equation} \lambda(\tfrac{L}{2}) \simeq \Lambda^2 + \Lambda^2 e^{0.97 - 0.55 L}\;;
\qquad \sigma(\tfrac{L}{2})^2 \simeq N \, e^{-0.88 - 0.86 L} \;, \label{exponentially}
\end{equation}
is a fairly clear signal that the boundary effects are exponentially suppressed at fixed $x$, for large values of $L$.
As a further check of our conclusion,
Figure \ref{sigmanew} shows that the field $\sigma(x)$ becomes indeed well approximated by a hyperbolic cosine function in the central region for large $L $. As seen from Eq.~(\ref{lambda})
this is what is to be expected for $\sigma(x)$, upon dynamical generation of the mass for $ n_i $, $ \langle \lambda \rangle = \Lambda^2$.
\subsection{Absence of the ``Higgs" phase}
The preceding analysis clearly shows that the solution of the set of the generalized gap equations is unique:
it smoothly approaches in the large $L$ limit the well-known physics of the $CP(N-1)$ model (at large $N$) in ``confinement phase" with
\begin{equation} \langle \sigma(x) \rangle =0\;; \qquad \langle \lambda(x) \rangle = m^2= \Lambda^2\;,
\end{equation}
(See Fig.~\ref{lconst} - Fig.~\ref{mezzobig} ). It is however really a simple matter to prove directly the absence of the "Higgs phase", characterized by the condensates
\begin{equation} \langle \sigma(x) \rangle = {\rm const.} \sim \Lambda \;,\quad \langle \lambda(x) \rangle = 0\; \label{this}
\end{equation}
for any value of $L$.
The proof is basically identical to the proof already given (Subsection~\ref{sec:proof}) of the fact that translationally invariant condensates, $\lambda$ and $\sigma$ constant, are not consistent with
the generalized gap equations: rather, it is a special case of it. Indeed, if the $n$ field mass is not generated, $\lambda \equiv 0$,
the approximation used for higher levels ($n \gg 1$) (see Eq.~(\ref{largen}), Eq.~(\ref{massless})) is actually valid for all levels. Thus one finds
that the first term of the gap equation (\ref{lnonconst}) is given exactly by,
\begin{eqnarray}
\frac{N}{2} \, \sum_n\frac{1}{\omega_n}\left( f_n(x)^2 -\frac1L \right) = \frac{N}{2 \pi} \log
\left(2 \sin{\left(\frac{\pi x}{L} \right)} \right) \ , \label{masslessbis}
\end{eqnarray}
which is certainly not equal to $0$ identically. This proves that the Higgs phase is not possible in the presence of the boundaries, except for the case with the periodic boundary conditions.
\section{Discussion}
In this paper we have studied in detail the two-dimensional ${\mathbb C}P^{N-1}$ model with a finite space interval. In other words the system is defined on a
finite-width worldstrip, in which the fields propagate. We find that the system has a unique phase which smoothly approaches in the large $L$ limit the standard $2D$ ${\mathbb C}P^{N-1}$ system in confinement phase, with (constant) mass generation for the $n_i$ fields, which are then confined by a $2D$ Coulomb force.
This kind of model is of great interest in physics. For instance, it appears as the low-energy effective theory describing the quantum excitations of monopole-vortex soliton complex \cite{MVComplex}. In such a context, the ${\mathbb C}P^{N-1}$ model describes the nonAbelian orientational zeromodes of the nonAbelian vortex (string),
whereas its boundaries represent the monopoles arising from a higher-scale gauge-symmetry breaking, carrying the same orientational ${\mathbb C}P^{N-1}$
moduli. NonAbelian monopoles, which are not plagued by the well-known pathologies, emerge in such a context, and the infrared properties of
such a soliton complex is an important question, defining the dynamical properties of the nonAbelian monopoles.
As the ${\mathbb C}P^{N-1}$ sigma model in two dimensions is asymptotically free, i.e., it is a theory which is scale invariant in the UV, one might wonder what the meaning
of the "finite interval" $L$ is. The point is that the behavior of the system in the UV - where the effects of the space boundaries should be negligible - contains in itself by dimensional transmutation the renormalization-invariant
mass scale $\Lambda$ (equivalent to specifying the value of the coupling constant at the ultraviolet cutoff, $\Lambda_{UV}$), whether or not the system dynamically
flows actually into the infrared regime at $1/\Lambda$ where the interactions become strong.
The space interval $L$ can be defined in reference to $1/\Lambda$.
But this implies that for $L \ll 1/ \Lambda $ quantum fluctuations would not become strongly coupled, their wavelengths
constrained to be smaller than $1/\Lambda$. In other words, the system effectively reduces to a finite dimensional object propagating in time, i.e., quantum mechanics,
rather than a proper $2D$ quantum field theory. This would explain our finding that the ${\mathbb C}P^{N-1}$ model with a space boundary has a unique phase.
With the periodic boundary condition, the story could be different. The translational invariance is unbroken, and it could be a property of the vacuum: the constant mass $\lambda(x)=m^2$
(or $\sigma$) generation of the order of $\Lambda$ is certainly consistent with the functional saddle-point equations, as we have shown.
Even $L< 1/\Lambda$ the system thus maintains $2D$ field-theoretic properties, and it could be \cite{Monin:2015xwa} that, at large $N$, the system shows a phase transition at a critical length $L_{crit} = O(1/ \Lambda)$, from confinement ($m \sim \Lambda,\, \sigma=0$) to Higgs ($\sigma\sim \Lambda,m=0$) phase.
\section*{Acknowledgments}
We thank Alessandro Betti and Simone Giacomelli for discussions, Ettore Vicari for useful comments, and Gerald Dunne for communications. The work of SB is funded by the grant ``Rientro dei Cervelli Rita Levi Montalcini'' of the Italian government. The present research work is supported by the INFN special research project grant, GAST ("Gauge and String Theories").
|
\section{Introduction}
In this section, we consider the following question:
What could be a more basic tools to compute the negative order of the first
and the second kind Euler numbers? One of the motivations is associated with
this question and its answer. Especially, in the work of Golombek \cit
{golombek}, which is entitled \textbf{Aufgabe 1088}, we see the following
novel combinatorial sum
\begin{equation}
\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) j^{n}=\frac{d^{n}}{dt^{n}}\left( e^{t}+1\right) ^{k}\left\vert
_{t=0}\right. , \label{Gl}
\end{equation
where $n=1,2,\ldots $. Golombek \cite{golombek} also mentioned that this sum
is related to the following sequenc
\begin{equation*}
n2^{n-1},n(n+1)2^{n-2},\ldots
\end{equation*}
The other motivation is to introduce new families of special numbers, which
are not only used in counting techniques and problems, but also computing
negative order of the first and the second kind Euler numbers and other
combinatorial sums. Here, our technique is related to the generating
functions. In the historical development of Mathematics, we can observe that
the generating functions play a very important role in Pure and Applied
Mathematics. These function are powerful tools to solve counting problems
and investigate properties of the special numbers and polynomials. In
addition, the generating functions are also used in Computer Programming, in
Physics, and in other areas. Briefly, in Physics, generating functions,
which arise in Hamiltonian mechanics, are quite different from generating
functions in mathematics. The generating functions are functions whose
partial derivatives generate the differential equations that determine a
system's dynamics. These functions are also related to the partition
function of statistical mechanics (\textit{cf}. \cite{Charamb}, \cite{Knuth
, \cite{M. Spiegel}, \cite{Wm}, \cite{Wp}). As for mathematics, a generating
function is a formal power series in one indeterminate whose coefficients
encode information about a sequence of numbers and that is indexed by the
natural numbers (\textit{cf}. \cite{Charamb}, \cite{Comtet}, \cite{Doubilet
, \cite{Grademir}, \cite{Knuth}, \cite{M. Spiegel}, \cite{Rainville}, \cit
{SrivastavaBook}, \cite{Wm}). As far as we know that the generating function
is firstly discovered by Abraham de Moivre (26 May 1667 -27 November 1754,
French mathematician) (\textit{cf}. \cite{Knuth}, \cite{Wm}). In order to
solve the general linear recurrence problem, Moivre constructed the concept
of the generating functions in 1730. In work of Doubilet et al. \cit
{Doubilet}, we also see that Laplace (23 March 1749-5 March 1827, French
mathematician, physicist and statistician), discovered the remarkable
correspondence between set theoretic operations and operations on formal
power series. Their method gives us great success to solve a variety of
combinatorial problems. They developed new kinds of algebras of generating
functions better suited to combinatorial and probabilistic problems. Their
method is depended on group algebra (or semigroup algebra) (see for detail
\cite{Doubilet}). It is well-known that there are many different ways\ or
approaches to generate a sequence of numbers and polynomials from the series
or the generating functions. The purpose of this paper is to construct the
generating functions for new families of numbers involving Golombek's
identity in (\ref{Gl}), the Stirling numbers, the central factorial numbers,
the Euler numbers of negative order, the rook numbers and combinatorial
sums. Our method and approach provides a way of constructing new special
families of numbers and combinatorial sums. We show how several of these
numbers and these combinatorial sums relate to each other.
\textit{We summarize our paper results as follows}:
In Section 2, we briefly review some special numbers and polynomials, which
are the Bernoulli numbers, the Euler numbers, the Stirling numbers, the
central factorial numbers and the array polynomials.
In Section 3, we give a generating function. By using this function, we
define a family of new numbers $y_{1}(n,k;\lambda )$. We investigate many
properties including a recurrence relation of these numbers by using their
generating functions. We compute a few values of the numbers
y_{1}(n,k;\lambda )$, which are given by the tables. We give some remarks
and comments related to the Golombek's identity and the numbers
y_{1}(n,k;1) $. Finally, we give a conjecture with two open questions.
In Section 4, we give a generating function for a new family of the other
numbers $y_{2}(n,k;\lambda )$. By using this function, we investigate many
properties with a recurrence relation of these numbers. We compute a few
values of the numbers $y_{2}(n,k;\lambda )$, which are given by the tables.
We give relations between these numbers, the Fibonacci numbers, the Lucas
numbers, and the $\lambda $-Stirling numbers of the second kind. We also
give some combinatorial sums.
In Section 5, we define $\lambda $-central factorial numbers $C(n,k;\lambda
) $. By using their generating functions, we derive some identities and
relations for these numbers and the others.
In Section 6, we give some applications related to the special values of
mathematical expectation for the binomial distribution, the Bernstein
polynomials and the Bernoulli polynomials.
In Section 7, by using the numbers $y_{1}(n,k;\lambda )$, we compute the
Euler numbers of negative order. In addition, we compute a few values of
these numbers, which are given by the tables.
In Section 8, We give two algorithms for our computations.
In Section 9, we give some combinatorial applications, including a rook
numbers and polynomials. We also give combinatorial interpretation for the
numbers $y_{1}(n,k)$. Finally in the last section, we give further remarks
with conclusion.
\textbf{Notations}: Throughout this paper, we use the following standard
notations:
\begin{equation*}
\mathbb{N}=\{1,2,3,\ldots \}\text{, }\mathbb{N}_{0}=\{0,1,2,3,\ldots \}
\mathbb{N}\cup \{0\}
\end{equation*
Here, $\mathbb{Z}$ denotes the set of integers, $\mathbb{R}$ denotes the set
of real numbers and $\mathbb{C}$ denotes the set of complex numbers. The
principal value $\ln z$ is the logarithm whose imaginary part lies in the
interval $(-\pi ,\pi ]$. Moreover we also use the following notational
conventions
\begin{equation*}
0^{n}=\left\{
\begin{array}{cc}
1, & (n=0) \\
0, & (n\in \mathbb{N)
\end{array
\right.
\end{equation*
an
\begin{equation*}
\left(
\begin{array}{c}
\lambda \\
\end{array
\right) =1\text{ and }\left(
\begin{array}{c}
\lambda \\
\end{array
\right) =\frac{\lambda (\lambda -1)\cdots (\lambda -v+1)}{v!}=\frac{\left(
\lambda \right) _{v}}{v!}\text{ }(n\in \mathbb{N}\text{, }\lambda \in
\mathbb{C)}
\end{equation*
(\textit{cf}. \cite{Bayad}, \cite{Comtet}, \cite{SrivastavaChoi2012}). For
combinatorial example, we will use the notations of Bona \cite{Bona}, that
is the set $\{1,2,\ldots ,n\}$ is an $n$-element set, that is, $n$ distinct
objects. Therefore, Bona introduced the shorter notation $[n]$ for this set.
The number $n(n-1)(n-2)\cdots (n-k+1)$ of all $k$-element lists from $[n]$
without repetition occurs so often in combinatorics that there is a symbol
for it, namel
\begin{equation*}
(n)_{k}=n(n-1)(n-2)\cdots (n-k+1)
\end{equation*
(\textit{cf}. \cite[PP. 11-13.]{Bona}).
\section{Background}
In this section, we give a brief introduction about the Bernoulli numbers,
the Euler numbers, the ($\lambda $-)Stirling numbers and the array
polynomials. Because we use these numbers and polynomials in the next
sections.
In \cite{Alayont}-\cite{Qi}, we see that there are many known properties and
relations involving various kind of the special numbers and polynomials such
as the Bernoulli polynomials and numbers, the Euler polynomials and numbers,
the Stirling numbers and also the rook polynomials and numbers by making use
of some standard techniques based upon generating functions and other known
techniques.
The Bernoulli polynomials are defined by means of the following generating
function
\begin{equation*}
\frac{t}{e^{t}-1}e^{tx}=\sum_{n=0}^{\infty }B_{n}(x)\frac{t^{n}}{n!},
\end{equation*
where $\left\vert t\right\vert <2\pi $ (\textit{cf}. \cite{Grademir}-\cit
{Qi}; see also the references cited in each of these earlier works).
One can observe tha
\begin{equation*}
B_{n}=B_{n}(0),
\end{equation*
which denotes the Bernoulli numbers\textit{\ (cf. \cite{Grademir}-\cite{Qi};
see also the references cited in each of these earlier works).}
The sum of the powers of integers is related to the Bernoulli numbers and
polynomials
\begin{equation}
\sum_{k=0}^{n}k^{r}=\frac{1}{r+1}\left( B_{r+1}(n+1)-B_{r+1}(0)\right) ,
\label{BB11}
\end{equation
(\textit{cf}. \cite{Grademir}, \cite{SrivastavaBook}, \cit
{SrivastavaChoi2012}).
The first kind Apostol-Euler polynomials of order $k$ are defined by means
of the following generating function
\begin{equation}
F_{P1}(t,x;k,\lambda )=\left( \frac{2}{\lambda e^{t}+1}\right)
^{k}e^{tx}=\sum_{n=0}^{\infty }E_{n}^{(k)}(x;\lambda )\frac{t^{n}}{n!},
\label{Cad3}
\end{equation
($\left\vert t\right\vert <\pi $ when $\lambda =1$ and $\left\vert
t\right\vert <\left\vert \ln \left( -\lambda \right) \right\vert $ when
\lambda \neq 1$), $\lambda \in \mathbb{C}$, $k\in \mathbb{N}$ with, of
course
\begin{equation*}
E_{n}^{(k)}(\lambda )=E_{n}^{(k)}(0;\lambda ),
\end{equation*
which denotes the first kind Apostol-Euler numbers of order $k$ (\textit{cf
. \cite{DSkim1}, \cite{Grademir}, \cite{Ozden}, \cite{Ozden AML}, \cite{Ryoo
, \cite{SrivastavaBook}, \cite{Qi}). Substituting $k=\lambda =1$ into (\re
{Cad3}), we have the first kind Euler numbers $E_{n}=E_{n}^{(1)}(1)$, which
are defined by means of the following generating function
\begin{equation*}
\frac{2}{e^{t}+1}=\sum_{n=0}^{\infty }E_{n}\frac{t^{n}}{n!},
\end{equation*
where $\left\vert t\right\vert <\pi $ (\textit{cf}. \cite{Grademir}-\cite{Qi
; see also the references cited in each of these earlier works).
The Euler numbers of the second kind $E_{n}^{\ast }$ are defined by means of
the following generating function
\begin{equation*}
\frac{2}{e^{t}+e^{-t}}=\sum_{n=0}^{\infty }E_{n}^{\ast }\frac{t^{n}}{n!},
\end{equation*
where $\left\vert t\right\vert <\frac{\pi }{2}$ (\textit{cf}. \cite{Byrd},
\cite{Grademir}, \cite{Ozden AML}, \cite{Ryoo}, \cite{SrivastavaChoi2012},
\cite{Qi}; see also the references cited in each of these earlier works).
The Stirling numbers of the second kind are used in pure and applied
Mathematics. These numbers occur in combinatorics and in the theory of
partitions. The Stirling numbers of the second kind, denoted by $S_{2}(n,k)
, is the number of ways to partition a set of $n$ objects into $k$ groups
\cite{Bona}, \cite{Cigler}, \cite{Comtet}, \cite{M. Spiegel}, \cit
{SrivastavaChoi2012}).
The $\lambda $-Stirling numbers of the second kind $S_{2}(n,v;\lambda )$ are
generalized of the Stirling number of the second kind. These numbers$\
S_{2}(n,v;\lambda )$ are defined by means of the following generating
function
\begin{equation}
F_{S}(t,v;\lambda )=\frac{\left( \lambda e^{t}-1\right) ^{v}}{v!
=\sum_{n=0}^{\infty }S_{2}(n,v;\lambda )\frac{t^{n}}{n!}, \label{SN-1}
\end{equation
where $v\in \mathbb{N}_{0}$ and $\lambda \in \mathbb{C}$. For further
information about these numbers, the reader should consult \cite{Luo} and
\cite{SimsekFPTA}, \cite{SimsekMANISA}, \cite{Srivastava2011}; see also the
references cited in each of these earlier works).
Observe tha
\begin{equation*}
S_{2}(n,v)=S_{2}(n,v;1),
\end{equation*
which are computing by the following formulas
\begin{equation*}
x^{n}=\sum_{v=0}^{n}\left(
\begin{array}{c}
x \\
\end{array
\right) v!S_{2}(n,v)
\end{equation*
o
\begin{equation*}
S_{2}(n,v)=\frac{1}{v!}\sum_{j=0}^{v}\left(
\begin{array}{c}
v \\
\end{array
\right) (-1)^{j}\left( v-j\right) ^{n}
\end{equation*
(\textit{cf}. \cite{Grademir}-\cite{Qi}; see also the references cited in
each of these earlier works). A Recurrence relation for these numbers is
given b
\begin{equation*}
S_{2}(n,k)=S_{2}(n-1,k-1)+kS_{2}(n-1,k),
\end{equation*
wit
\begin{equation*}
S_{2}(n,0)=0\text{ (}n\in \mathbb{N}\text{); }S_{2}(n,n)=1\text{ (}n\in
\mathbb{N}\text{); }S_{2}(n,1)=1\text{ (}n\in \mathbb{N}\text{)}
\end{equation*
and $S_{2}(n,k)=0$ ($n<k$ or $k<0$) (\textit{cf}. \cite{Grademir}-\cite{Qi};
see also the references cited in each of these earlier works).
In \cite{SimsekFPTA}, we defined the $\lambda $-array polynomials
S_{v}^{n}(x;\lambda )$ by means of the following generating function
\begin{equation}
F_{A}(t,x,v;\lambda )=\frac{\left( \lambda e^{t}-1\right) ^{v}}{v!
e^{tx}=\sum_{n=0}^{\infty }S_{v}^{n}(x;\lambda )\frac{t^{n}}{n!},
\label{ARY-1}
\end{equation}
where $v\in \mathbb{N}_{0}$ and $\lambda \in \mathbb{C}$ (\textit{cf}. \cit
{Bayad}, \cite{SimsekFPTA}).
The array polynomials $S_{v}^{n}(x)$ are defined by means of the following
generating function
\begin{equation}
F_{A}(t,x,v)=\frac{\left( e^{t}-1\right) ^{v}}{v!}e^{tx}=\sum_{n=0}^{\infty
}S_{v}^{n}(x)\frac{t^{n}}{n!}, \label{Ary}
\end{equation
(\textit{cf}. \cite{Bayad}, \cite{Chan}, \cite{SimsekFPTA}; see also the
references cited in each of these earlier works). By using the above
generating function, we hav
\begin{equation*}
S_{v}^{n}(x)=\frac{1}{v!}\sum_{j=0}^{v}(-1)^{v-j}\left(
\begin{array}{c}
v \\
\end{array
\right) \left( x+j\right) ^{n}
\end{equation*
wit
\begin{equation*}
S_{0}^{0}(x)=S_{n}^{n}(x)=1,S_{0}^{n}(x)=x^{n}
\end{equation*
and for $v>n$
\begin{equation*}
S_{v}^{n}(x)=0
\end{equation*
(\textit{cf}. \cite{Chan}, \cite{SimsekFPTA}, \cite{AM2014}; see also the
references cited in each of these earlier works).
Recently, the central factorial numbers $T(n,k)$ have been studied by many
authors. These functions have been many applications in theory of
Combinatorics and Probability. The central factorial numbers $T(n,k)$ (of
the second kind) are defined by means of the following generating function
\begin{equation}
F_{T}(t,k)=\frac{1}{(2k)!}\left( e^{t}+e^{-t}-2\right)
^{k}=\sum_{n=0}^{\infty }T(n,k)\frac{t^{2n}}{(2n)!} \label{CT-1}
\end{equation
(\textit{cf}. \cite{Bona}, \cite{Cigler}, \cite{Comtet}, \cite{SrivastavaLiu
, \cite{AM2014}, \cite{M. Spiegel}; see also the references cited in each of
these earlier works).
These numbers have the following relations
\begin{equation*}
x^{n}=\sum_{k=0}^{n}T(n,k)x(x-1)(x-2^{2})(x-3^{2})\cdots (x-(k-1)^{2}).
\end{equation*
Combining the above equation with (\ref{C1}), we also hav
\begin{equation*}
T(n,k)=T(n-1,k-1)+k^{2}T(n-1,k),
\end{equation*
where $n\geq 1$, $k\geq 1$, $(n,k)\neq (1,1)$. For $n$, $k\in \mathbb{N}$,
T(0,k)=T(n,0)=0$ and $T(n,1)=1$ (\textit{cf}. \cite{Bona}, \cite{Cigler},
\cite{Comtet}, \cite{SrivastavaLiu}, \cite{AM2014}, \cite{M. Spiegel}).
\section{A family of new numbers $y_{1}(n,k;\protect\lambda )$}
In this section, we give generating function for the numbers
y_{1}(n,k;\lambda )$. We give some functional equations and differential
equations of this generating function. By using these equations, we derive
various new identities and combinatorics relations related to these numbers.
Some our observations on these numbers can be briefly expressed as follows:
the numbers $y_{1}(n,k;\lambda )$ are related to the $\lambda $-Stirling
numbers of the second kind, the central factorial numbers, the Euler numbers
of negative orders and the Golombek's identity.
It is time to give the following generating function for these numbers
\begin{equation}
F_{y_{1}}(t,k;\lambda )=\frac{1}{k!}\left( \lambda e^{t}+1\right)
^{k}=\sum_{n=0}^{\infty }y_{1}(n,k;\lambda )\frac{t^{n}}{n!}, \label{ay1}
\end{equation
where $k\in \mathbb{N}_{0}$ and $\lambda \in \mathbb{C}$.
Note that there is one generating function for each value of $k$. This
function is an analytic function.
By using (\ref{ay1}), we ge
\begin{equation*}
\sum_{n=0}^{\infty }y_{1}(n,k;\lambda )\frac{t^{n}}{n!}=\sum_{n=0}^{\infty
}\left( \frac{1}{k!}\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) j^{n}\lambda ^{j}\right) \frac{t^{n}}{n!}.
\end{equation*
Comparing the coefficients of $t^{n}$ on both sides of the above equation,
we arrive at the the following theorem:
\begin{theorem}
Let $n$ be a positive integer. Then we hav
\begin{equation}
y_{1}(n,k;\lambda )=\frac{1}{k!}\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) j^{n}\lambda ^{j}. \label{ay2}
\end{equation}
\end{theorem}
We assume that $\lambda \neq 0$. For $k=0,1,2,3,4$ and we $n=0,1,2,3,4,5$
compute a few values of the numbers $y_{1}(n,k;\lambda )$ given by Equation
\ref{ay2}) as follows:
\begin{equation*}
\begin{tabular}{llllll}
$n\backslash k$ & $0$ & $1$ & $2$ & $3$ & $4$ \\
$0$ & $1$ & $\lambda $ & $\frac{1}{2}\lambda ^{2}+\lambda $ & $\frac{1}{6
\lambda ^{3}+\frac{1}{2}\lambda ^{2}+\frac{1}{2}\lambda $ & $\frac{1}{24
\lambda ^{4}+\frac{1}{6}\lambda ^{3}+\frac{1}{4}\lambda ^{2}+\frac{1}{6
\lambda $ \\
$1$ & $0$ & $\lambda $ & $\lambda ^{2}+\lambda $ & $\frac{1}{2}\lambda
^{3}+\lambda ^{2}+\frac{1}{2}\lambda $ & $\frac{1}{6}\lambda ^{4}+\frac{1}{2
\lambda ^{3}+\frac{1}{2}\lambda ^{2}+\frac{1}{6}\lambda $ \\
$2$ & $0$ & $\lambda $ & $2\lambda ^{2}+\lambda $ & $\frac{3}{2}\lambda
^{3}+2\lambda ^{2}+\frac{1}{2}\lambda $ & $\frac{2}{3}\lambda ^{4}+\frac{3}{
}\lambda ^{3}+\lambda ^{2}+\frac{1}{6}\lambda $ \\
$3$ & $0$ & $\lambda $ & $4\lambda ^{2}+\lambda $ & $\frac{9}{2}\lambda
^{3}+4\lambda ^{2}+\frac{1}{2}\lambda $ & $\frac{8}{3}\lambda ^{4}+\frac{9}{
}\lambda ^{3}+2\lambda ^{2}+\frac{1}{6}\lambda $ \\
$4$ & $0$ & $\lambda $ & $8\lambda ^{2}+\lambda $ & $\frac{27}{2}\lambda
^{3}+8\lambda +\frac{1}{2}\lambda $ & $\frac{32}{3}\lambda ^{4}+\frac{27}{2
\lambda ^{3}+4\lambda ^{2}+\frac{1}{6}\lambda $ \\
$5$ & $0$ & $\lambda $ & $16\lambda ^{2}+\lambda $ & $\frac{81}{2}\lambda
^{3}+816\lambda +\frac{1}{2}\lambda $ & $\frac{128}{3}\lambda ^{4}+\frac{81}
2}\lambda ^{3}+8\lambda ^{2}+\frac{1}{6}\lambda
\end{tabular
\end{equation*
For $k=0,1,2,\ldots ,9$ and $n=0,1,2,\ldots ,9$ we compute a few values of
the numbers $y_{1}(n,k;1)$ given by Equation (\ref{ay2}) as follows
\begin{equation*}
\begin{tabular}{lllllllllll}
$n\backslash k$ & $0$ & $1$ & $2$ & $3$ & $4$ & $5$ & $6$ & $7$ & $8$ & $9$
\\
$0$ & $1$ & $2$ & $2$ & $\frac{4}{3}$ & $\frac{2}{3}$ & $\frac{4}{15}$ &
\frac{4}{45}$ & $\frac{8}{315}$ & $\frac{2}{315}$ & $\frac{4}{2835}$ \\
$1$ & $0$ & $1$ & $2$ & $2$ & $\frac{4}{3}$ & $\frac{2}{3}$ & $\frac{4}{15}$
& $\frac{4}{45}$ & $\frac{8}{315}$ & $\frac{2}{315}$ \\
$2$ & $0$ & $1$ & $3$ & $4$ & $\frac{10}{3}$ & $2$ & $\frac{14}{15}$ &
\frac{16}{45}$ & $\frac{4}{35}$ & $\frac{2}{63}$ \\
$3$ & $0$ & $1$ & $5$ & $9$ & $\frac{28}{3}$ & $\frac{20}{3}$ & $\frac{18}{5}
$ & $\frac{14}{9}$ & $\frac{176}{315}$ & $\frac{6}{35}$ \\
$4$ & $0$ & $1$ & $9$ & $22$ & $\frac{85}{3}$ & $24$ & $\frac{224}{15}$ &
\frac{328}{45}$ & $\frac{102}{35}$ & $\frac{62}{63}$ \\
$5$ & $0$ & $1$ & $17$ & $57$ & $\frac{274}{3}$ & $\frac{275}{3}$ & $\frac
328}{5}$ & $\frac{1624}{45}$ & $\frac{5048}{315}$ & $\frac{208}{35}$ \\
$6$ & $0$ & $1$ & $33$ & $154$ & $\frac{925}{3}$ & $367$ & $\frac{4529}{15}$
& $\frac{8416}{45}$ & $\frac{3224}{35}$ & $\frac{2360}{63}$ \\
$7$ & $0$ & $1$ & $65$ & $429$ & $\frac{3238}{3}$ & $\frac{4580}{3}$ &
\frac{7223}{5}$ & $\frac{9065}{9}$ & $\frac{173216}{315}$ & $\frac{8576}{35}$
\\
$8$ & $0$ & $1$ & $129$ & $1222$ & $\frac{11665}{3}$ & $6554$ & $\frac{10711
}{15}$ & $\frac{252268}{45}$ & $\frac{118717}{35}$ & $\frac{104288}{63}$ \\
$9$ & $0$ & $1$ & $257$ & $3537$ & $\frac{42994}{3}$ & $\frac{86645}{3}$ &
\frac{181458}{5}$ & $\frac{1444534}{45}$ & $\frac{6781748}{315}$ & $\frac
402723}{35}
\end{tabular
\end{equation*
Some special values of $y_{1}(n,k;\lambda )$ are given as follows
\begin{equation*}
y_{1}(0,k;\lambda )=\frac{1}{k!}(\lambda +1)^{k},
\end{equation*
\begin{equation*}
y_{1}(n,0;\lambda )=0,
\end{equation*
an
\begin{equation*}
y_{1}(n,1;\lambda )=\lambda .
\end{equation*
By using (\ref{ay1}), we derive the following functional equatio
\begin{equation*}
\lambda ^{k}e^{kt}=\sum_{l=0}^{k}(-1)^{k-l}\left(
\begin{array}{c}
k \\
\end{array
\right) l!F_{y_{1}}(t,l;\lambda ).
\end{equation*
Combining (\ref{ay1}) with the above equation, we ge
\begin{equation*}
\lambda ^{k}\sum_{n=0}^{\infty }\frac{\left( kt\right) ^{n}}{n!
=\sum_{n=0}^{\infty }\left( \sum_{l=0}^{k}(-1)^{k-l}\left(
\begin{array}{c}
k \\
\end{array
\right) l!y_{1}(n,l;\lambda )\right) \frac{t^{n}}{n!}.
\end{equation*
Comparing the coefficients of $\frac{t^{n}}{n!}$ on both sides of the above
equation, we arrive at the following theorem:
\begin{theorem}
\begin{equation*}
k^{n}\lambda ^{k}=\sum_{l=0}^{k}(-1)^{k-l}\left(
\begin{array}{c}
k \\
\end{array
\right) l!y_{1}(n,l;\lambda ).
\end{equation*}
\end{theorem}
We give a relationship between the numbers $y_{1}(n,k;\lambda )$\ and the
\lambda $-Stirling numbers of the second kind by the following theorem:
\begin{theorem}
\begin{equation*}
S_{2}(n,k;\lambda ^{2})=\frac{k!}{2^{n}}\sum_{l=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) S_{2}(l,k;\lambda )y_{1}(n-l,k;\lambda ).
\end{equation*}
\end{theorem}
\begin{proof}
By using (\ref{SN-1}) and (\ref{ay1}), we derive the following functional
equation
\begin{equation*}
F_{S}(2t,v;\lambda ^{2})=k!F_{S}(t,v;\lambda )F_{y_{1}}(t,k;\lambda ).
\end{equation*
From this equation, we hav
\begin{equation*}
\sum_{n=0}^{\infty }2^{n}S\left( n,v;\lambda ^{2}\right) \frac{t^{n}}{n!
=\sum_{n=0}^{\infty }S\left( n,v;\lambda \right) \frac{t^{n}}{n!
\sum_{n=0}^{\infty }y_{1}(n,k;\lambda )\frac{t^{n}}{n!}.
\end{equation*
Therefor
\begin{equation*}
\sum_{n=0}^{\infty }2^{n}S\left( n,v;\lambda ^{2}\right) \frac{t^{n}}{n!
=\sum_{n=0}^{\infty }\left( k!\sum_{l=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) S_{2}(l,k;\lambda )y_{1}(n-l,k;\lambda )\right) \frac{t^{n}}{n!}.
\end{equation*
Comparing the coefficients of $\frac{t^{n}}{n!}$ on both sides of the above
equation, we arrive at the desired result.
\end{proof}
A relationship between the numbers $y_{1}(n,k;\lambda )$, $S_{2}(n,k;\lambda
^{3})$ and the array polynomials $S_{k}^{n}(x;\lambda )$ is given by the
following theorem:
\begin{theorem}
\begin{equation*}
S_{2}(n,k;\lambda ^{3})=\sum_{l=0}^{n}\sum_{j=0}^{k}\left(
\begin{array}{c}
n \\
\end{array
\right) \left(
\begin{array}{c}
k \\
\end{array
\right) \frac{\lambda ^{2k-2j}j!}{3^{n}}y_{1}(l,j;\lambda
)S_{k}^{n-l}(2k-2j;\lambda ).
\end{equation*}
\end{theorem}
\begin{proof}
If we combine (\ref{SN-1}), (\ref{ARY-1}) and (\ref{ay1}), we ge
\begin{equation*}
F_{S}(3t,k;\lambda ^{3})=\sum_{j=0}^{k}\frac{k!}{(k-j)!}\lambda
^{2k-2j}F_{A}(t,2k-2j,k;\lambda )F_{y_{1}}(t,j;\lambda ).
\end{equation*
By using the above functional equation, we obtai
\begin{equation*}
\sum_{n=0}^{\infty }3^{n}S\left( n,v;\lambda ^{3}\right) \frac{t^{n}}{n!
=\sum_{j=0}^{k}\frac{k!}{(k-j)!}\lambda ^{2k-2j}\sum_{n=0}^{\infty
}S_{k}^{n}\left( n,2k-2j;\lambda \right) \frac{t^{n}}{n!}\sum_{n=0}^{\infty
}y_{1}(n,j;\lambda )\frac{t^{n}}{n!}.
\end{equation*
Therefor
\begin{equation*}
\sum_{n=0}^{\infty }3^{n}S\left( n,v;\lambda ^{3}\right) \frac{t^{n}}{n!
=\sum_{n=0}^{\infty }\sum_{l=0}^{n}\sum_{j=0}^{k}\left(
\begin{array}{c}
n \\
\end{array
\right) \left(
\begin{array}{c}
k \\
\end{array
\right) j!\lambda ^{2k-2j}y_{1}(l,j;\lambda )S_{k}^{n-l}(2k-2j;\lambda
\frac{t^{n}}{n!}.
\end{equation*
Comparing the coefficients of $\frac{t^{n}}{n!}$ on both sides of the above
equation, we arrive at the desired result.
\end{proof}
There are many combinatorics and analysis applications for (\ref{ay2}). By
substituting $\lambda =1$ into (\ref{ay2}), then we se
\begin{equation}
B(n,k)=k!y_{1}(n,k;1). \label{CC2}
\end{equation
In \cite{golombek}, Golombek gave the following formula for (\ref{ay2})
\begin{equation*}
B(n,k)=\frac{d^{n}}{dt^{n}}\left( e^{t}+1\right) ^{k}\left\vert
_{t=0}\right. .
\end{equation*}
\begin{remark}
If we substitute $\lambda =-1$ into (\ref{ay2}), then we get the Stirling
numbers of the second kind
\begin{equation*}
S_{2}(n,k)=(-1)^{k}y_{1}(n,k;-1)=\frac{1}{k!}\sum_{j=0}^{k}(-1)^{k-j}\left(
\begin{array}{c}
k \\
\end{array
\right) j^{n}
\end{equation*
(\textit{cf}. \cite{Bona}-\cite{SrivastavaBook}).
\end{remark}
\begin{remark}
We se
\begin{equation*}
B(n,k)=k!y_{1}(n,k;1)=\frac{d^{n}}{dt^{n}}\left( e^{t}+1\right)
^{k}\left\vert _{t=0}\right. .
\end{equation*
These numbers are related to the following numbers
\begin{equation*}
a_{k}2^{k}
\end{equation*
where the sequence $a_{k}$ is a positive integer depend on $k$.
Consequently, in the work of Spivey \cite[Identity 8-Identity 10]{Spevy}, we
see tha
\begin{equation*}
B(0,k)=2^{k},
\end{equation*
\begin{equation*}
B(1,k)=k2^{k-1},
\end{equation*
\begin{equation*}
B(2,k)=k(k+1)2^{k-2},
\end{equation*
see also \cite[P. 56, Exercise 21]{Bona} and \cite[p. 117]{Charamb}.
\end{remark}
\begin{remark}
In \cite[Identity 12.]{Spevy}, Spivey also proved the following novel
identity by the falling factorial method
\begin{equation}
B(m,n)=\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) j!2^{n-j}S_{2}(m,j). \label{Bs-1}
\end{equation}
\end{remark}
The numbers $B(0,k)$ are given by means of the following well-known
generating function: Let $\left\vert x\right\vert <\frac{1}{2}$, we hav
\begin{equation*}
\sum_{k=0}^{\infty }B(0,k)x^{k}=\frac{1}{1-2x}.
\end{equation*
The numbers $B(1,k)$ are given by means of the following well-known
generating function: Let $\left\vert x\right\vert <\frac{1}{2}$, we hav
\begin{equation*}
\sum_{k=1}^{\infty }B(1,k)x^{k}=\frac{x}{\left( 1-2x\right) ^{2}}.
\end{equation*}
\begin{remark}
In work of Boyadzhiev \cite[p.4, Eq-(7)]{Boyadzhiev}, we see tha
\begin{equation*}
\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) j^{n}x^{j}=\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) j!2^{n-j}S_{2}(m,j)x^{j}(1+x)^{n-j}.
\end{equation*
Substituting $x=1$ into the above equation, we arrive at (\ref{Bs-1}).
\end{remark}
\begin{theorem}
Let $d$ be a positive integer and $m_{0},m_{1},m_{2},...,m_{d}\in \mathbb{Q}
. Let $m_{0}\neq 0$. Thus we hav
\begin{equation}
\sum_{v=0}^{d-1}m_{v}B(d-v,k)=2^{k-d}\left(
\begin{array}{c}
k \\
\end{array
\right) . \label{CB1}
\end{equation}
\end{theorem}
\begin{proof}
It is well-known tha
\begin{equation*}
(1+x)^{k}=\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) x^{j}.
\end{equation*
Taking the $k^{th}$ derivative, with respect to $x$, we obtai
\begin{equation}
\left(
\begin{array}{c}
k \\
\end{array
\right) (1+x)^{n-d}=\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) \left(
\begin{array}{c}
j \\
\end{array
\right) x^{j-d}. \label{Ci7}
\end{equation
Substituting $x=1$ into the above equation, we ge
\begin{equation}
2^{n-k}\left(
\begin{array}{c}
k \\
\end{array
\right) =\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) \left(
\begin{array}{c}
j \\
\end{array
\right) . \label{Ci8}
\end{equation
In our work of \cite{mmas2015}, we know tha
\begin{equation*}
\left(
\begin{array}{c}
j \\
\end{array
\right) =m_{0}j^{d}+m_{1}j^{d-1}+\cdots +m_{d-1}j,
\end{equation*
where $m_{0},m_{1},\ldots ,m_{d-1}\in \mathbb{Q}$. Therefor
\begin{equation*}
2^{k-d}\left(
\begin{array}{c}
k \\
\end{array
\right) =\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) \left( m_{0}j^{d}+m_{1}j^{d-1}+\cdots +m_{d-1}j\right) .
\end{equation*
Thus we ge
\begin{equation*}
2^{k-d}\left(
\begin{array}{c}
k \\
\end{array
\right) =\sum_{v=0}^{d-1}m_{v}\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) j^{d-v}.
\end{equation*
Combining (\ref{CC2}) with the above equation, we hav
\begin{equation*}
2^{k-d}\left(
\begin{array}{c}
k \\
\end{array
\right) =\sum_{v=0}^{d-1}m_{v}B(d-v,k).
\end{equation*
Thus proof of theorem is completed.
\end{proof}
There are many combinatorial arguments of (\ref{Ci7}).That is, if we
substitute $d=3$ and $4$ into (\ref{Ci7}), then we compute $B(3,k)$ and
B(4,k)$, respectively, as follows
\begin{equation*}
B(3,k)=k^{2}(k+3)2^{k-3}
\end{equation*
an
\begin{equation*}
B(4,k)=k(k^{3}+6k^{2}+3k-2)2^{k-4}.
\end{equation*}
By using (\ref{CB1}), we derive the following result
\begin{equation*}
B(d,k)=\frac{2^{k-d}}{m_{0}}\left(
\begin{array}{c}
k \\
\end{array
\right) -\sum_{v=1}^{d-1}\frac{m_{v}}{m_{0}}B(d-v,k).
\end{equation*}
Therefore, we conjecture that
\begin{equation*}
B(d,k)=(k^{d}+x_{1}k^{d-1}+x_{2}k^{d-2}+\cdots
++x_{d-2}k^{2}+x_{d-1}k)2^{k-d},
\end{equation*
where $x_{1},x_{2},\ldots ,x_{d-1}$, $d$ are positive integers.
Consequently, we arrive at the following open questions:
1-How can we compute the coefficients $x_{1},x_{2},\ldots ,x_{d-1}?$
2-We assume that for $\left\vert x\right\vert <r
\begin{equation*}
\sum_{k=1}^{\infty }B(d,k)x^{k}=f_{d}(x).
\end{equation*}
Is it possible to find $f_{d}(x)$ function?
\subsection{Recurrence relation and some identities for the numbers
y_{1}(n,k;\protect\lambda )$}
Here, by applying derivative operator to the generating functions (\ref{ay1
), we give a recurrence relation and other formulas for the numbers
y_{1}(n,k;\lambda )$.
\begin{theorem}
Let $k$ be a positive integer. Then we hav
\begin{equation*}
y_{1}(n+1,k;\lambda )=ky_{1}(n,k;\lambda )-y_{1}(n,k-1;\lambda ).
\end{equation*}
\end{theorem}
\begin{proof}
Taking derivative of (\ref{ay1}), with respect to $t$, we obtain the
following partial differential equation
\begin{equation*}
\frac{\partial }{\partial t}F_{y_{1}}(t,k;\lambda )=kF_{y_{1}}(t,k;\lambda
)-F_{y_{1}}(t,k-1;\lambda ).
\end{equation*
Combining (\ref{ay1}) with the above equation, we ge
\begin{equation*}
\sum_{n=1}^{\infty }y_{1}(n,k;\lambda )\frac{t^{n-1}}{\left( n-1\right) !
=k\sum_{n=0}^{\infty }y_{1}(n,k;\lambda )\frac{t^{n}}{n!}-\sum_{n=0}^{\infty
}y_{1}(n,k-1;\lambda )\frac{t^{n}}{n!}.
\end{equation*
After some elementary calculation, comparing the coefficients of $\frac{t^{n
}{n!}$ on both sides of the above equation, we arrive at the desired result.
\end{proof}
\begin{theorem}
Let $k$ be a positive integer. Then we hav
\begin{equation*}
\frac{\partial }{\partial \lambda }y_{1}(n,k;\lambda )=\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) y_{1}(j,k-1;\lambda ).
\end{equation*}
\end{theorem}
\begin{proof}
Taking derivative of (\ref{ay1}), with respect to $\lambda $, we obtain the
following partial differential equation
\begin{equation}
\frac{\partial }{\partial \lambda }F_{y_{1}}(t,k;\lambda
)=e^{t}F_{y_{1}}(t,k-1;\lambda ). \label{D.y1}
\end{equation
Combining (\ref{ay1}) with the above equation, we ge
\begin{equation*}
\sum_{n=0}^{\infty }\frac{\partial }{\partial \lambda }y_{1}(n,k;\lambda
\frac{t^{n}}{n!}=\sum_{n=0}^{\infty }\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) y_{1}(j,k-1;\lambda )\frac{t^{n}}{n!}.
\end{equation*
After some elementary calculation, comparing the coefficients of $\frac{t^{n
}{n!}$ on both sides of the above equation, we arrive at the desired result.
\end{proof}
\begin{theorem}
Let $k$ be a positive integer. Then we hav
\begin{equation*}
\lambda \frac{\partial }{\partial \lambda }y_{1}(n,k;\lambda
)=ky_{1}(n,k;\lambda )-y_{1}(n,k-1;\lambda ).
\end{equation*}
\end{theorem}
\begin{proof}
By using (\ref{D.y1}), we obtain the following partial differential equation
\begin{equation*}
\lambda \frac{\partial }{\partial \lambda }F_{y_{1}}(t,k;\lambda
)=kF_{y_{1}}(t,k;\lambda )-F_{y_{1}}(t,k-1;\lambda ).
\end{equation*
Combining (\ref{ay1}) with the above equation, we ge
\begin{equation*}
\sum_{n=0}^{\infty }\frac{\partial }{\partial \lambda }y_{1}(n,k;\lambda
\frac{t^{n}}{n!}=\sum_{n=0}^{\infty }ky_{1}(n,k;\lambda )\frac{t^{n}}{n!
-\sum_{n=0}^{\infty }y_{1}(j,k-1;\lambda )\frac{t^{n}}{n!}.
\end{equation*
Comparing the coefficients of $\frac{t^{n}}{n!}$ on both sides of the above
equation, we arrive at the desired result.
\end{proof}
\section{A family of new numbers $y_{2}(n,k;\protect\lambda )$}
In this section, we define a family of new numbers $y_{2}(n,k;\lambda )$ by
means of the following generating function
\begin{equation}
F_{y_{2}}(t,k;\lambda )=\frac{1}{(2k)!}\left( \lambda e^{t}+\lambda
^{-1}e^{-t}+2\right) ^{k}=\sum_{n=0}^{\infty }y_{2}(n,k;\lambda )\frac{t^{n
}{n!}, \label{C1}
\end{equation
where $k\in \mathbb{N}_{0}$ and $\lambda \in \mathbb{C}$.
Note that there is one generating function for each value of $k$.
In this section, by using (\ref{C1}) with their functional equation, we
derive various identities and relations including our new numbers, the
Fibonacci numbers, the Lucas numbers, the Stirling numbers and the central
factorial numbers.
By using (\ref{C1}), we get the following explicit formula for the numbers
y_{2}(n,k;\lambda )$:
\begin{theorem}
\begin{equation}
y_{2}(n,k;\lambda )=\frac{1}{\left( 2k\right) !}\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) 2^{k-j}\sum_{l=0}^{j}\left(
\begin{array}{c}
j \\
\end{array
\right) \left( 2l-j\right) ^{n}\lambda ^{2l-j}. \label{CCC3}
\end{equation}
\end{theorem}
\begin{proof}
By (\ref{C1}), we hav
\begin{equation*}
\sum_{n=0}^{\infty }y_{2}(n,k;\lambda )\frac{t^{n}}{n!}=\sum_{n=0}^{\infty
}\left( \frac{1}{\left( 2k\right) !}\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) 2^{k-j}\sum_{l=0}^{j}\left(
\begin{array}{c}
j \\
\end{array
\right) \left( 2l-j\right) ^{n}\lambda ^{2l-j}\right) \frac{t^{n}}{n!}.
\end{equation*
Comparing the coefficients of $\frac{t^{n}}{n!}$ on both sides of the above
equation, we arrive at the desired result.
\end{proof}
For $k=0,1,2,3$ and we $n=0,1,2,3,4,5$ compute a few values of the numbers
y_{2}(n,k;\lambda )$ given by Equation (\ref{CCC3}) as follows:
\begin{equation*}
\begin{tabular}{lllll}
$n\backslash k$ & $0$ & $1$ & $2$ & $3$ \\
$0$ & $1$ & $\frac{1}{2\lambda }+\frac{\lambda }{2}$ & $\frac{\lambda
^{2}+4\lambda }{24}+\frac{4\lambda +1}{24\lambda ^{2}}$ & $\frac{\lambda
^{3}+6\lambda ^{2}}{720}+\frac{\lambda }{48}+\frac{1}{48\lambda }+\frac
6\lambda +1}{720\lambda ^{3}}$ \\
$1$ & $0$ & $\frac{\lambda }{2}-\frac{1}{2\lambda }$ & $\frac{\lambda
^{2}+2\lambda }{12}-\frac{2\lambda +1}{6\lambda ^{2}}$ & $\frac{\lambda
^{3}+4\lambda ^{2}}{240}+\frac{\lambda }{28}-\frac{1}{48\lambda }-\frac
4\lambda +1}{240\lambda ^{3}}$ \\
$2$ & $0$ & $\frac{\lambda }{2}+\frac{1}{2\lambda }$ & $\frac{\lambda
^{2}+\lambda }{6}+\frac{\lambda +1}{6\lambda ^{2}}$ & $\frac{\lambda ^{3}}{8
}+\frac{\lambda ^{2}}{30}+\frac{\lambda }{48}+\frac{1}{48\lambda }+\frac{1}
30\lambda ^{2}}+\frac{1}{80\lambda ^{3}}$ \\
$3$ & $0$ & $\frac{\lambda }{2}-\frac{1}{2\lambda }$ & $\frac{2\lambda
^{2}+\lambda }{6}-\frac{\lambda +2}{6\lambda ^{2}}$ & $\frac{3\lambda ^{3}}
80}+\frac{\lambda ^{2}}{15}+\frac{\lambda }{48}-\frac{1}{48\lambda }-\frac{
}{15\lambda ^{2}}-\frac{3}{80\lambda ^{3}}$ \\
$4$ & $0$ & $\frac{\lambda }{2}+\frac{1}{2\lambda }$ & $\frac{2\lambda
^{2}+\lambda }{3}+\frac{\lambda +4}{6\lambda ^{2}}$ & $\frac{9\lambda ^{3}}
80}+\frac{2\lambda ^{2}}{15}+\frac{\lambda }{48}+\frac{1}{48\lambda }+\frac{
}{15\lambda ^{2}}+\frac{9}{80\lambda ^{3}}$ \\
$5$ & $0$ & $\frac{\lambda }{2}-\frac{1}{2\lambda }$ & $\frac{8\lambda
^{2}+\lambda }{6}-\frac{\lambda +8}{6\lambda ^{2}}$ & $\frac{27\lambda ^{3}}
80}+\frac{4\lambda ^{2}}{15}+\frac{\lambda }{48}-\frac{1}{48\lambda }-\frac{
}{15\lambda ^{2}}-\frac{27}{80\lambda ^{3}}
\end{tabular
\end{equation*
By using (\ref{ay1}) and (\ref{C1}), we get the following functional
equation
\begin{equation*}
F_{y_{2}}(t,k;\lambda )=\frac{k!}{(2k)!}\sum_{j=0}^{k}F_{y_{1}}(t,j;\lambda
)F_{y_{1}}\left( -t,k-j;\lambda ^{-1}\right) .
\end{equation*
By combining (\ref{ay1}) and (\ref{C1}) with the above equation, we obtai
\begin{equation*}
\sum_{n=0}^{\infty }y_{2}(n,k;\lambda )\frac{t^{n}}{n!}\frac{k!}{(2k)!
\sum_{j=0}^{k}\left( \sum_{n=0}^{\infty }y_{1}(n,j;\lambda )\frac{t^{n}}{n!
\sum_{n=0}^{\infty }(-1)^{n}y_{1}(n,k-j;\lambda ^{-1})\frac{t^{n}}{n!
\right) .
\end{equation*
Therefor
\begin{equation*}
\sum_{n=0}^{\infty }y_{2}(n,k;\lambda )\frac{t^{n}}{n!}=\frac{k!}{(2k)!
\sum_{n=0}^{\infty }\sum_{j=0}^{k}\sum_{l=0}^{n}(-1)^{n-l}\left(
\begin{array}{c}
n \\
\end{array
\right) y_{1}(l,j;\lambda )y_{1}(n-l,k-j;\lambda ^{-1})\frac{t^{n}}{n!}.
\end{equation*
Comparing the coefficients of $\frac{t^{n}}{n!}$ on both sides of the above
equation, the numbers $y_{2}(n,k;\lambda )$ is given in terms of the numbers
$y_{1}(n,k;\lambda )$ by the following theorem:
\begin{theorem}
\begin{equation}
y_{2}(n,k;\lambda )=\frac{k!}{(2k)!}\sum_{j=0}^{k}\sum_{l=0}^{n}(-1)^{n-l
\left(
\begin{array}{c}
n \\
\end{array
\right) y_{1}(l,j;\lambda )y_{1}(n-l,k-j;\lambda ^{-1}). \label{Alg-2}
\end{equation}
\end{theorem}
\begin{theorem}
\label{TheoremG copy(2)
\begin{equation*}
y_{1}(n,2k;\lambda )=\lambda ^{k}\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) k^{n-j}y_{2}(j,k;\lambda ).
\end{equation*}
\end{theorem}
\begin{proof}
By using (\ref{ay1}) and (\ref{C1}), we get the following functional
equation
\begin{equation*}
\lambda ^{k}e^{kt}F_{y_{2}}(t,k;\lambda )=F_{y_{1}}(t,2k;\lambda ).
\end{equation*
From the above functional equation, we obtai
\begin{equation*}
\sum_{n=0}^{\infty }y_{1}(n,2k;\lambda )\frac{t^{n}}{n!}=\lambda
^{k}\sum_{n=0}^{\infty }\frac{(kt)^{n}}{n!}\sum_{n=0}^{\infty
}y_{2}(n,k;\lambda )\frac{t^{n}}{n!}.
\end{equation*
Therefor
\begin{equation*}
\sum_{n=0}^{\infty }y_{1}(n,2k;\lambda )\frac{t^{n}}{n!}=\sum_{n=0}^{\infty
}\left( \lambda ^{k}\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) k^{n-j}y_{2}(j,k;\lambda )\right) \frac{t^{n}}{n!}.
\end{equation*
Comparing the coefficients of $\frac{t^{n}}{n!}$ on both sides of the above
equation, we arrive at the desired result.
\end{proof}
By substituting $\lambda =1$ into (\ref{C1}), we hav
\begin{equation*}
F_{y_{2}}(t,k)=\frac{1}{(2k)!}\left( e^{t}+e^{-t}+2\right) ^{k}.
\end{equation*
The function $F_{y_{2}}(t,k)$ is an even function. Consequently, we get the
following result
\begin{equation*}
y_{2}(2n+1,k;1)=0.
\end{equation*
Thus, we ge
\begin{equation}
F_{y_{2}}(t,k;1)=\sum_{n=0}^{\infty }y_{2}(2n,k;1)\frac{t^{2n}}{(2n)!}.
\label{CC1}
\end{equation
By using (\ref{CC1}), we give the following explicit formula for the numbers
$y_{2}(n,k)$ $(=y_{2}(n,k;1))$:
\begin{corollary}
\begin{equation}
y_{2}(n,k)=\frac{1}{\left( 2k\right) !}\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) 2^{k-j}\sum_{l=0}^{j}\left(
\begin{array}{c}
j \\
\end{array
\right) \left( 2l-j\right) ^{n}. \label{CCa3}
\end{equation}
\end{corollary}
For $k=0,1,2,\ldots ,9$, we compute a few values of the numbers $y_{2}(n,k)$
given by Equation (\ref{CCa3}) as follows
\begin{equation*}
y_{2}(0,0)=1,
\end{equation*
\begin{equation*}
y_{2}(n,0)=0,\text{ (}n\in \mathbb{N}\text{)}
\end{equation*
\begin{equation*}
y_{2}(n,1)=(-1)^{n}+1,
\end{equation*
\begin{equation*}
y_{2}(n,2)=\frac{\left( (-1)^{n}+1\right) }{6}+\frac{2^{n-1}-(-2)^{n-1}}{3},
\end{equation*
\begin{equation*}
y_{2}(n,3)=\frac{\left( (-1)^{n}+1\right) }{24}+\frac{2^{n-2}+(-2)^{n-2}}{15
+\frac{(-3)^{n-2}+3^{n-2}}{10},
\end{equation*
\begin{eqnarray*}
y_{2}(n,4) &=&\frac{13\left( (-1)^{n}+1\right) }{5040}+\frac
2^{n-1}-(-2)^{n-1})}{315}+\frac{4^{n-1}-(-4)^{n-1}}{630}+\frac
3^{n-2}+(-3)^{n-2}}{140} \\
&&+\frac{2^{n-4}+(-2)^{n-4}}{105},
\end{eqnarray*}
\begin{eqnarray*}
y_{2}(n,5) &=&\frac{19\left( (-1)^{n}+1\right) }{120960}+\frac
5^{n-2}+(-5)^{n-2}}{4536}+\frac{4^{n-2}+(-4)^{n-2}}{2835}+\frac
2^{n-2}+(-2)^{n-2}}{2835} \\
&&+\frac{3^{n-3}-(-3)^{n-3}}{560}+\frac{2^{n-5}-(-2)^{n-5}}{2835},
\end{eqnarray*}
\begin{eqnarray*}
y_{2}(n,6) &=&\frac{67\left( (-1)^{n}+1\right) }{13305600}+\frac
5^{n-2}+(-5)^{n-2}}{99792}+2\frac{4^{n-2}+(-4)^{n-2}}{155925}+\frac
4^{n-3}-(-4)^{n-3}}{31185} \\
&&+\frac{2^{n-3}-(-2)^{n-3}}{31185}+\frac{3^{n-4}+(-3)^{n-4}}{6160}+2\frac
6^{n-5}-(-6)^{n-5}}{1925}+\frac{3^{n-5}-(-3)^{n-5}}{12320} \\
&&+\frac{2^{n-8}+(-2)^{n-8}}{31185},
\end{eqnarray*}
\begin{eqnarray*}
y_{2}(n,7) &=&\frac{41\left( (-1)^{n}+1\right) }{296524800}+\frac
7^{n-2}+(-7)^{n-2}}{13899600}+\frac{5^{n-2}+(-5)^{n-2}}{2223936}+\frac
4^{n-2}+(-4)^{n-2}}{2027025} \\
&&+\frac{3^{n-2}+(-3)^{n-2}}{1601600}+\frac{4^{n-3}-(-4)^{n-3}}{2432430}
\frac{2^{n-3}-(-2)^{n-3}}{1216215}+\frac{6^{n-5}-(-6)^{n-5}}{25025} \\
&&+\frac{3^{n-5}-(-3)^{n-5}}{1281280}+\frac{2^{n-9}-(-2)^{n-9}}{2027025},
\end{eqnarray*}
\begin{eqnarray*}
y_{2}(n,8) &=&\frac{53\left( (-1)^{n}+1\right) }{20118067200}+\frac
7^{n-2}+(-7)^{n-2}}{416988000}+\frac{5^{n-2}+(-5)^{n-2}}{93405312}+\frac
4^{n-2}+(-4)^{n-2}}{182432250} \\
&&+4\frac{8^{n-3}}{638512875}-\frac{4^{n-3}-(-4)^{n-3}}{30405375}-\frac
4(-8)^{n-3}}{638512875}+\frac{2^{n-4}+(-2)^{n-4}}{91216125} \\
&&+\frac{4^{n-5}-(-4)^{n-5}}{18243225}+23\frac{3^{n-5}}{64064000}-\frac
(-3)^{n-5}}{4004000}+\frac{3\left( 6^{n-6}+(-6)^{n-6}\right) }{350350} \\
&&-\frac{(-3)^{n-5}}{9152000}+\frac{2^{n-7}-(-2)^{n-7}}{6081075}+\frac
2^{n-8}-(-2)^{n-8}}{18243225}+\frac{2^{n-11}-(-2)^{n-11}}{91216125},
\end{eqnarray*}
\begin{eqnarray*}
y_{2}(n,9) &=&\frac{14897\left( (-1)^{n}+1\right) }{355687428096000}+\frac
7^{n-2}+(-7)^{n-2}}{14177592000}+19\frac{5^{n-2}+(-5)^{n-2}}{88921857024}+
\frac{8^{n-3}-(-8)^{n-3}}{10854718875} \\
&&+\frac{4^{n-3}-(-4)^{n-3}}{1550674125}+\frac{9^{n-4}+(-9)^{n-4}}{190590400
}+2\frac{4^{n-4}+(-4)^{n-4}}{1550674125}+\frac{3^{n-5}-(-3)^{n-5}}{272272000}
\\
&&+\frac{2^{n-5}-(-2)^{n-5}}{1550674125}+2\frac{6^{n-6}}{14889875}+\frac
3^{n-6}+(-3)^{n-6}}{435635200}+\frac{2\left( 4^{n-6}+(-4)^{n-6}\right) }
1550674125} \\
&&+\frac{2(-6)^{n-6}}{14889875}+\frac{6^{n-7}-(-6)^{n-7}}{4254250}+\frac
3^{n-7}-(-3)^{n-7}}{67020800}+\frac{2^{n-8}+(-2)^{n-8}}{310134825} \\
&&+\frac{2^{n-9}-(-2)^{n-9}}{1550674125}+\frac{2^{n-12}+(-2)^{n-12}}
10854718875}.
\end{eqnarray*}
For $k=0$, we hav
\begin{eqnarray*}
y_{2}(0,0) &=&1, \\
y_{2}(0,1) &=&2, \\
y_{2}(0,2) &=&\frac{2}{3}, \\
y_{2}(0,3) &=&\frac{5}{36}, \\
y_{2}(0,4) &=&\frac{63}{5292},
\end{eqnarray*
and for $k=0,1,2,\ldots ,9$ and $n=1,2,\ldots ,9$, we compute a few values
of the numbers $y_{2}(n,k)$ given by Equation (\ref{CCa3}) as follows:
\begin{equation*}
\begin{tabular}{lllllllllll}
$n\backslash k$ & $0$ & $1$ & $2$ & $3$ & $4$ & $5$ & $6$ & $7$ & $8$ & $9$
\\
$1$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ \\
$2$ & $0$ & $1$ & $\frac{2}{3}$ & $\frac{2}{15}$ & $\frac{4}{315}$ & $\frac{
}{2835}$ & $\frac{4}{155925}$ & $\frac{4}{6081075}$ & $\frac{8}{638512875}$
& $\frac{2}{10854718875}$ \\
$3$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ \\
$4$ & $0$ & $1$ & $\frac{5}{3}$ & $\frac{8}{15}$ & $\frac{22}{315}$ & $\frac
2}{405}$ & $\frac{34}{155925}$ & $\frac{8}{1216215}$ & $\frac{92}{638512875}$
& $\frac{2}{834978375}$ \\
$5$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ \\
$6$ & $0$ & $1$ & $\frac{17}{3}$ & $\frac{47}{15}$ & $\frac{184}{315}$ &
\frac{152}{2835}$ & $\frac{454}{155925}$ & $\frac{634}{6081075}$ & $\frac
1688}{638512875}$ & $\frac{542}{10854718875}$ \\
$7$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ \\
$8$ & $0$ & $1$ & $\frac{65}{3}$ & $\frac{338}{15}$ & $\frac{1957}{315}$ &
\frac{2144}{2835}$ & $\frac{7984}{155925}$ & $\frac{2672}{1216215}$ & $\frac
41462}{638512875}$ & $\frac{15206}{10854718875}$ \\
$9$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0$ & $0
\end{tabular
\end{equation*}
This function is related to the $\cosh t$. That i
\begin{equation*}
F_{y_{2}}(t,k)=\frac{2}{(2k)!}\left( \cosh t+1\right) ^{k}
\end{equation*
By using this function, we get the following combinatorial sums:
\begin{theorem}
\begin{equation*}
y_{2}(n,k;1)=\frac{1}{\left( 2k\right) !}\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) 2^{k-j}\sum_{l=0}^{j}\left(
\begin{array}{c}
j \\
\end{array
\right) \left( 2l-j\right) ^{2n}
\end{equation*
and als
\begin{equation*}
\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) 2^{k-j}\sum_{l=0}^{j}\left(
\begin{array}{c}
j \\
\end{array
\right) \left( 2l-j\right) ^{2n+1}=0.
\end{equation*}
\end{theorem}
\begin{proof}
By using (\ref{CC1}), we hav
\begin{equation*}
\sum_{n=0}^{\infty }y_{2}(n,k)\frac{t^{2n}}{\left( 2n\right) !
=\sum_{n=0}^{\infty }\left( \frac{1}{\left( 2k\right) !}\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) 2^{k-j}\sum_{l=0}^{j}\left(
\begin{array}{c}
j \\
\end{array
\right) \left( 2l-j\right) ^{2n}\right) \frac{t^{n}}{n!}.
\end{equation*
Comparing the coefficients of $t^{2n}$ on both sides of the above equation,
we arrive at the desired result.
\end{proof}
By using (\ref{CC1}), we obtai
\begin{equation*}
F_{y_{1}}(t,2k;1)e^{-kt}=\frac{k!}{(2k)!
\sum_{v=0}^{k}F_{y_{1}}(t,v;1)F_{y_{1}}(-t,k-v;1).
\end{equation*
By using the above functional equation, we obtain the following theorem:
\begin{theorem}
\begin{equation*}
\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) (-k)^{n-j}y_{1}(j,2k;1)=\frac{k!}{(2k)!}\sum_{j=0}^{n}(-1)^{n-j
\left(
\begin{array}{c}
n \\
\end{array
\right) \sum_{v=0}^{k}y_{1}(j,v;1)y_{1}(n-j,k-v;1).
\end{equation*}
\end{theorem}
\begin{lemma}
\label{LemmaRainville}(\cite[Lemma 11, Eq-(7)]{Rainville}
\begin{equation*}
\sum_{n=0}^{\infty }\sum_{k=0}^{\infty }A(n,k)=\sum_{n=0}^{\infty
}\sum_{k=0}^{\left[ \frac{n}{2}\right] }A(n,n-2k),
\end{equation*
where $\left[ x\right] $ denotes the greatest integer function.
\end{lemma}
\begin{theorem}
\label{TheoremG copy(1)
\begin{equation*}
y_{1}(n,2k;1)=\sum_{j=0}^{\left[ \frac{n}{2}\right] }\left(
\begin{array}{c}
n \\
2
\end{array
\right) k^{n-2j}y_{2}(j,k;1).
\end{equation*}
\end{theorem}
\begin{proof}
By using (\ref{CC1}), we obtain the following functional equation
\begin{equation*}
F_{y_{1}}(t,2k;1)=F_{y_{2}}(t,k)e^{kt}
\end{equation*
Combining this equation with (\ref{ay1}), we ge
\begin{equation*}
\sum_{n=0}^{\infty }y_{1}(n,2k;1)\frac{t^{n}}{n!}=\sum_{n=0}^{\infty }\frac
(kt)^{n}}{n!}\sum_{n=0}^{\infty }y_{2}(n,k;1)\frac{t^{2n}}{\left( 2n\right)
}.
\end{equation*
Applying Lemma \ref{LemmaRainville} in the above equation, we hav
\begin{equation*}
\sum_{n=0}^{\infty }y_{1}(n,2k;1)\frac{t^{n}}{n!}=\sum_{n=0}^{\infty }\left(
\sum_{j=0}^{\left[ \frac{n}{2}\right] }\frac{k^{n-2j}}{(2j)!(n-2j)!
y_{2}(j,k;1)\right) t^{n}.
\end{equation*
Comparing the coefficients of $t^{n}$ on both sides of the above equation,
we arrive at the desired result.
\end{proof}
We now present an explicit relation between the Lucas numbers $L_{n}$ and
the numbers $y_{2}(n,k;1)$ by the following theorem:
\begin{theorem}
Let $a+b=1$, $ab=-1$ and $\frac{a-b}{2}=c=\frac{\sqrt{5}}{2}$. Then we hav
\begin{equation*}
L_{n}^{(k)}=\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) \left( 2j\right) !(-2)^{k-j}\sum_{m=0}^{\left[ \frac{n}{2}\right]
}\left(
\begin{array}{c}
n \\
2
\end{array
\right) c^{2m}y_{2}(m,j;1)\left( \frac{k}{2}\right) ^{n-2m},
\end{equation*
where $L_{n}^{(k)}$ denotes the Lucas numbers of order $k$.
\end{theorem}
\begin{proof}
In \cite[pp. 232-233]{koshy} and \cite{Byrd}, the Lucas numbers $L_{n}$ are
defined by means of the following generating function
\begin{equation*}
e^{at}+e^{bt}=\sum_{n=0}^{\infty }L_{n}\frac{t^{n}}{n!}.
\end{equation*
From the above, we hav
\begin{equation}
F_{L}(t,k;a,b)=\left( e^{at}+e^{bt}\right) ^{k}=\sum_{n=0}^{\infty
}L_{n}^{(k)}\frac{t^{n}}{n!}. \label{Lu}
\end{equation
wher
\begin{equation*}
L_{n}^{(k)}=\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) L_{n}^{(m)}L_{n}^{(k-m)}.
\end{equation*
By combining (\ref{Lu}) with (\ref{C1}), we obtain the following functional
equatio
\begin{equation*}
F_{L}(t,k;a,b)=e^{\frac{tk}{2}}\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) (-2)^{k-j}(2j)!F_{y_{2}}(ct,j;1).
\end{equation*
Since $F_{y_{2}}(ct,j;\lambda )$ is an even function, we hav
\begin{equation*}
\sum_{n=0}^{\infty }L_{n}^{(k)}\frac{t^{n}}{n!}=\sum_{n=0}^{\infty }\left(
\frac{k}{2}\right) ^{n}\frac{t^{n}}{n!}\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) (-2)^{k-j}(2j)!\sum_{m=0}^{\infty }y_{2}(m,j;1)c^{m}\frac{t^{2m}}
\left( 2m\right) !}.
\end{equation*
Applying Lemma \ref{LemmaRainville} in the above equation, we ge
\begin{equation*}
\sum_{n=0}^{\infty }L_{n}^{(k)}\frac{t^{n}}{n!}=\sum_{n=0}^{\infty
}\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) \left( 2j\right) !(-2)^{k-j}\sum_{m=0}^{\left[ \frac{n}{2}\right]
}\left(
\begin{array}{c}
n \\
2
\end{array
\right) c^{2m}y_{2}(m,j;1)\left( \frac{k}{2}\right) ^{n-2m}\frac{t^{n}}{n!}.
\end{equation*
Comparing the coefficients of $t^{n}$ on both sides of the above equation,
we arrive at the desired result.
\end{proof}
We also present an identity including the Fibonacci numbers $f_{n}$, the
Lucas numbers $L_{n}$ and the numbers $y_{1}(n,k;1)$ by the following
theorem:
\begin{theorem}
Let $a+b=1$, $ab=-1$ and $\frac{a-b}{2}=c=\frac{\sqrt{5}}{2}$. Then we hav
\begin{equation*}
L_{n}^{(k)}=k!\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) \left( 2c\right) ^{n-j}y_{1}(n-j,k;1)\left( f_{j}\left(
a-2ck^{j}\right) +f_{j-1}\right) .
\end{equation*}
\end{theorem}
\begin{proof}
We set
\begin{equation*}
F_{f}(t,a,b)=\frac{e^{at}-e^{bt}}{a-b}=\sum_{n=0}^{\infty }f_{n}\frac{t^{n}}
n!}
\end{equation*
(\textit{cf}. \cite[p. 232]{koshy}, \cite{Byrd}). By combining (\ref{Lu})
and (\ref{ay1}) with the above equation, we obtain the following functional
equatio
\begin{equation*}
F_{L}(t,k;a,b)=k!F_{y_{1}}(2ct,k;1)\left( e^{akt}-2cF_{f}(kt,a,b)\right) .
\end{equation*
Therefore
\begin{eqnarray*}
\sum_{n=0}^{\infty }L_{n}^{(k)}\frac{t^{n}}{n!} &=&k!\sum_{n=0}^{\infty
}\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) a^{j}\left( 2c\right) ^{n-j}y_{1}(n-j,k;1)\frac{t^{n}}{n!} \\
&&-k!\sum_{n=0}^{\infty }\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) (2c)^{n-j+1}y_{1}(n-j,k;1)k^{j}f_{j}\frac{t^{n}}{n!}.
\end{eqnarray*
After some elementary calculations and comparing the coefficients of $\frac
t^{n}}{n!}$ on both sides of the above equation, we arrive at the desired
result.
\end{proof}
\subsection{Recurrence relation for the numbers $y_{2}(n,k;\protect\lambda )
}
Here, taking derivative of (\ref{C1}), with respect to $t$, we give a
recurrence relation for the numbers $y_{2}(n,k;\lambda )$.
\begin{theorem}
Let $k$ be a positive integer. Then we hav
\begin{equation*}
y_{2}(n+1,k;\lambda )=ky_{2}(n,k;\lambda )-y_{2}(n,k-1;\lambda )-\lambda
^{-1}\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) (-1)^{n-j}y_{2}(j,k-1;\lambda ).
\end{equation*}
\end{theorem}
\begin{proof}
Taking derivative of (\ref{C1}), with respect to $t$, we obtain the
following partial differential equation
\begin{equation*}
\frac{\partial }{\partial t}F_{y_{2}}(t,k;\lambda )=kF_{y_{2}}(t,k;\lambda
)-F_{y_{2}}(t,k-1;\lambda )-\lambda ^{-1}e^{-t}F_{y_{2}}(t,k-1;\lambda ).
\end{equation*}
Combining (\ref{C1}) with the above equation, we obtai
\begin{eqnarray*}
\sum_{n=1}^{\infty }y_{2}(n,k;\lambda )\frac{t^{n-1}}{\left( n-1\right) !}
&=&k\sum_{n=0}^{\infty }y_{2}(n,k;\lambda )\frac{t^{n}}{n!
-\sum_{n=0}^{\infty }y_{2}(n,k-1;\lambda )\frac{t^{n}}{n!} \\
&&-\sum_{n=0}^{\infty }\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) (-1)^{n-j}y_{2}(j,k-1;\lambda )\frac{t^{n}}{n!}.
\end{eqnarray*
After some elementary calculation, comparing the coefficients of $\frac{t^{n
}{n!}$ on both sides of the above equation, we arrive at the desired result.
\end{proof}
\begin{theorem}
Let $k$ be a positive integer. Then we hav
\begin{equation*}
\frac{\partial }{\partial t}y_{2}(n,k;\lambda )=\lambda y_{2}(n,k;\lambda )
\frac{\lambda }{k(2k-1)}y_{2}(n,k-1;\lambda ).
\end{equation*}
\end{theorem}
\begin{proof}
Taking derivative of (\ref{C1}), with respect to $\lambda $, we obtain the
following partial differential equation
\begin{equation*}
\frac{\partial }{\partial \lambda }F_{y_{2}}(t,k;\lambda )=\lambda
F_{y_{2}}(t,k;\lambda )-\frac{\lambda }{k(2k-1)}F_{y_{2}}(t,k-1;\lambda ).
\end{equation*
Combining (\ref{C1}) with the above equation, we ge
\begin{equation*}
\sum_{n=0}^{\infty }\frac{\partial }{\partial \lambda }y_{2}(n,k;\lambda
\frac{t^{n}}{n!}=\sum_{n=0}^{\infty }\lambda y_{1}(n,k;\lambda )\frac{t^{n}}
n!}-\frac{\lambda }{k(2k-1)}\sum_{n=0}^{\infty }y_{1}(n,k-1;\lambda )\frac
t^{n}}{n!}.
\end{equation*
After some elementary calculation, comparing the coefficients of $\frac{t^{n
}{n!}$ on both sides of the above equation, we arrive at the desired result.
\end{proof}
\section{$\protect\lambda $-central factorial numbers $C(n,k;\protect\lambda
)$}
In this section, we define $\lambda $-central factorial numbers
C(n,k;\lambda )$ by means of the following generating function
\begin{equation}
F_{C}(t,k;\lambda )=\frac{1}{(2k)!}\left( \lambda e^{t}+\lambda
^{-1}e^{-t}-2\right) ^{k}=\sum_{n=0}^{\infty }C(n,k;\lambda )\frac{t^{n}}{n!}
\label{caC0}
\end{equation
where $k\in \mathbb{N}_{0}$ and $\lambda \in \mathbb{C}$.
Note that there is one generating function for each value of $k$.
For $\lambda =1$, we have the central factorial number
\begin{equation*}
T(n,k)=C(n,k;1)
\end{equation*
(\textit{cf}. \cite{Alayont}, \cite{Cigler}, \cite{Kang}, \cite{AM2014},
\cite{SrivastavaLiu}).
\begin{theorem}
\begin{equation*}
T(n,k;\lambda ^{2})=2^{-n}(2k)!\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) C(j,k;\lambda )y_{2}(n-j,k;\lambda ).
\end{equation*}
\end{theorem}
\begin{proof}
By using (\ref{C1}) and (\ref{caC0}), we get the following functional
equation
\begin{equation*}
F_{C}(2t,k;\lambda ^{2})=(2k)!F_{C}(t,k;\lambda )F_{y_{2}}(t,k;\lambda ).
\end{equation*
From this equation, we ge
\begin{equation*}
\sum_{n=0}^{\infty }C(n,k;\lambda ^{2})\frac{\left( 2t\right) ^{n}}{n!
=(2k)!\sum_{n=0}^{\infty }C(n,k;\lambda )\frac{t^{n}}{n!}\sum_{n=0}^{\infty
}y_{2}(n,k;\lambda )\frac{t^{n}}{n!}.
\end{equation*
Therefor
\begin{equation*}
\sum_{n=0}^{\infty }C(n,k;\lambda ^{2})\frac{2^{n}t^{n}}{n!
=\sum_{n=0}^{\infty }(2k)!\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) C(j,k;\lambda )y_{2}(n-j,k;\lambda )\frac{t^{n}}{n!}.
\end{equation*
Comparing the coefficients of $\frac{t^{n}}{n!}$ on both sides of the above
equation, we arrive at the desired result.
\end{proof}
By using (\ref{CT-1}) and (\ref{CC1}), we obtain the following functional
equation
\begin{equation*}
F_{T}(t,k)F_{y_{2}}(t,k)=\frac{1}{(2k)!}F_{T}(2t,k).
\end{equation*
Combining the above equation with (\ref{CT-1}) and (\ref{CC1}), we ge
\begin{equation*}
\frac{1}{(2k)!}\sum_{n=0}^{\infty }T(n,k)\frac{2^{n}t^{n}}{n!
=\sum_{n=0}^{\infty }y_{2}(j,k)\frac{t^{n}}{n!}\sum_{n=0}^{\infty }T(n,k
\frac{t^{n}}{n!}.
\end{equation*
Therefor
\begin{equation*}
\frac{1}{(2k)!}\sum_{n=0}^{\infty }T(n,k)\frac{2^{n}t^{n}}{n!
=\sum_{n=0}^{\infty }\left( \sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) y_{2}(j,k;1)T(n-j,k)\right) \frac{t^{n}}{n!}
\end{equation*
Comparing the coefficients of $\frac{t^{n}}{n!}$ on both sides of the above
equation, we obtain a relationship between the central factorial numbers
T(n,k)$ and the numbers $y_{2}(j,k)$ by the following theorem:
\begin{theorem}
\begin{equation*}
T(n,k)=2^{-n}(2k)!\sum_{j=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) y_{2}(j,k;1)T(n-j,k).
\end{equation*}
\end{theorem}
\begin{remark}
In \cite{Aloyat-1}, Alayont et al. have studied the rook polynomials, which
count the number of ways of placing non-attacking rooks on a chess board. By
using generalization of these polynomials, they gave the rook number
interpretations of generalized central factorial and the Genocchi numbers.
In \cite{Alayont}, Alayont and Krzywonos gave the following results for the
classical central factorial numbers:
The number of ways to place $k$ rooks on a size $m$ triangle board in three
dimensions is equal to $T(m+1,m+1-k)$, where $0\leq k\leq m$.
\end{remark}
\section{Application in Statistics: In the binomial distribution and the
Bernstein polynomials}
Let $n$ be a nonnegative integer. For every function $f:\left[ 0,1\right]
\rightarrow \mathbb{R}$ and the $n^{th}$ Bernstein polynomial of $f$ is
defined b
\begin{equation*}
B_{n}(f,x)=\sum_{k=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) f\left( \frac{n}{k}\right) B_{k}^{n}(x),
\end{equation*
where $B_{k}^{n}(x)$\ denotes the Bernstein basis functions
\begin{equation*}
B_{k}^{n}(x)=\left(
\begin{array}{c}
n \\
\end{array
\right) x^{k}(1-x)^{n-k}
\end{equation*
and $x\in \left[ 0,1\right] $. Let $(U_{k})_{k\geq 1}$ be a sequence of
independent distributed random variable having the uniform distribution on
\left[ 0,1\right] $ and defined by Adel \textit{et al}. \cite{Adel JMAA}
\begin{equation*}
S_{n}(x)=\sum_{k=1}^{n}1_{\left[ 0,x\right] }(U_{k}).
\end{equation*
In \cite{Adel JMAA}, it is well-know that, $S_{n}(x)$ is a binomial random
variable. That is the theory of Probability and Statistics, the binomial
distribution is very useful. This distribution, with parameters $n$ and
probability $x$, is the discrete probability distribution. This distribution
is defined as follows
\begin{equation*}
P(S_{n}(x)=k)=\left(
\begin{array}{c}
n \\
\end{array
\right) x^{k}(1-x)^{n-k},
\end{equation*
where $k=0,1,2,\cdots ,n$. $E$ denotes mathematical expectation, tha
\begin{equation*}
Ef\left( \frac{S_{n}(x)}{n}\right) =B_{n}(f,x)
\end{equation*
(\textit{cf}. \cite{Adel JMAA}). For any $x\in \left( 0,1\right) $, $n\geq 2
, and $r>1$, Adel \textit{et al}. \cite{Adel JMAA} define
\begin{equation}
E\left( S_{n}(x)\right) ^{r}=\sum_{k=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) k^{r}x^{k}(1-x)^{n-k}. \label{ay3}
\end{equation
Substituting $x=\frac{1}{2}$ into (\ref{ay3}), we ge
\begin{equation}
E\left( S_{n}\left( \frac{1}{2}\right) \right) ^{r}=\frac{1}{2^{n}
\sum_{k=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) k^{r}. \label{ay4}
\end{equation
By combining (\ref{ay2}) with (\ref{ay4}), we arrive at the following
theorem:
\begin{theorem}
Let $n\geq 2$. Let $r$ be a positive integer with $r>1$. Then we hav
\begin{equation*}
y_{1}(r,n)=\frac{2^{n}}{n!}E\left( S_{n}\left( \frac{1}{2}\right) \right)
^{r}.
\end{equation*}
\end{theorem}
Integrating (\ref{ay3}) from $0$ to $1$, we ge
\begin{equation*}
\int\limits_{0}^{1}E\left( S_{n}(x)\right) ^{r}dx=\frac{1}{n+1
\sum_{k=0}^{n}k^{r}.
\end{equation*
By substituting (\ref{BB11}) into the above equation, we arrive at the
following theorem:
\begin{theorem}
\begin{equation*}
\int\limits_{0}^{1}E\left( S_{n}(x)\right) ^{r}dx=\frac
B_{r+1}(n+1)-B_{r+1}(0)}{\left( n+1\right) \left( r+1\right) }.
\end{equation*}
\end{theorem}
\section{Computation of the Euler numbers of negative order}
In this section, we not only give elementary properties of the first and the
second kind Euler polynomials and numbers, but also compute the first kind
of Apostol type Euler numbers associated with the numbers $y_{1}(n,k;\lambda
)$ and\ $y_{2}(n,k;\lambda )$.
We define the second kind Apostol type Euler polynomials of order $k$, with
k\geq 0$, $E_{n}^{\ast (k)}(x;\lambda )$ by means of the following
generating functions
\begin{equation*}
F_{P}(t,x;k,\lambda )=\left( \frac{2}{\lambda e^{t}+\lambda ^{-1}e^{-t}
\right) ^{k}e^{tx}=\sum_{n=0}^{\infty }E_{n}^{\ast (k)}(x;\lambda )\frac
t^{n}}{n!}.
\end{equation*
Substituting $x=0$ into the above equation, we get the second kind Apostol
type Euler numbers of order $k$, $E_{n}^{\ast (k)}(\lambda )$ by means of
the following generating function
\begin{equation*}
F_{N}(t;k,\lambda )=\left( \frac{2}{\lambda e^{t}+\lambda ^{-1}e^{-t}
\right) ^{k}=\sum_{n=0}^{\infty }E_{n}^{\ast (k)}(\lambda )\frac{t^{n}}{n!}.
\end{equation*
If we substitute $k=\lambda =1$ into the above generating function, then we
hav
\begin{equation*}
E_{n}^{\ast }=E_{n}^{\ast (1)}(1).
\end{equation*}
The first kind Apostol-Euler numbers of order $-k$ are defined by means of
the following generating function
\begin{equation}
G_{E}(t,-k;\lambda )=\left( \frac{\lambda e^{t}+1}{2}\right)
^{k}=\sum_{n=0}^{\infty }E_{n}^{(-k)}(\lambda )\frac{t^{n}}{n!}.
\label{ae-1}
\end{equation
The second kind Apostol type Euler numbers of order $-k$ are defined by
means of the following generating function
\begin{equation}
F_{N}(t;-k,\lambda )=\left( \frac{\lambda e^{t}+\lambda ^{-1}e^{-t}}{2
\right) ^{k}=\sum_{n=0}^{\infty }E_{n}^{\ast (-k)}(\lambda )\frac{t^{n}}{n!}.
\label{Cac3}
\end{equation}
The numbers $E_{n}^{\ast (-k)}(\lambda )$ are related to the numbers
E_{n}^{(-k)}(\lambda )$ and the Apostol Bernoulli numbers
B_{n}^{(-k)}(\lambda )$ of the negative order. By using (\ref{Cac3}), we get
the following functional equation
\begin{equation*}
F_{N}(t;-k,\lambda )=\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) 2^{j-k}t^{k-j}G_{E}(t,-j;\lambda )H_{B}(-t,-k+j;\lambda ^{-1}),
\end{equation*
wher
\begin{equation*}
H_{B}(t,-k;\lambda )=\left( \frac{\lambda e^{t}-1}{t}\right)
^{k}=\sum_{n=0}^{\infty }B_{n}^{(-k)}(\lambda )\frac{t^{n}}{n!}\text{
\textit{cf}. \cite{Luo}, \cite{OzdenAMC2014}, \cite{Srivastava2011}).}
\end{equation*
By using this equation, we ge
\begin{equation*}
\sum_{n=0}^{\infty }E_{n}^{\ast (-k)}(\lambda )\frac{t^{n}}{n!
=\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) 2^{j-k}t^{k-j}\sum_{n=0}^{\infty }E_{n}^{(-j)}(\lambda )\frac{t^{n}}
n!}\sum_{n=0}^{\infty }B_{n}^{(-k+j)}(\lambda ^{-1})\frac{\left( -t\right)
^{n}}{n!}.
\end{equation*
Therefor
\begin{eqnarray*}
\sum_{n=0}^{\infty }E_{n}^{\ast (-k)}(\lambda )\frac{t^{n}}{n!}
&=&\sum_{n=0}^{\infty }\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) \sum_{l=0}^{n-k+j}(-1)^{n+j-k-l}\left(
\begin{array}{c}
n-k+j \\
\end{array
\right) \\
&&\times 2^{j-k}(n)_{k-j}E_{l}^{(-j)}(\lambda )B_{n+j-k-l}^{(-k+j)}(\lambda
^{-1})\frac{t^{n}}{n!}.
\end{eqnarray*
Comparing the coefficients of $\frac{t^{n}}{n!}$ on both sides of the above
equation, we arrive at the following theorem:
\begin{theorem}
\begin{equation*}
E_{n}^{\ast (-k)}(\lambda )\frac{t^{n}}{n!}=\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) \sum_{l=0}^{n-k+j}(-1)^{n+j-k-l}\left(
\begin{array}{c}
n-k+j \\
\end{array
\right) 2^{j-k}(n)_{k-j}E_{l}^{(-j)}(\lambda )B_{n+j-k-l}^{(-k+j)}(\lambda
^{-1}).
\end{equation*}
\end{theorem}
After the results of the preceding sections, we are ready to compute the
Euler numbers of negative order.
Combining (\ref{ay1}) and (\ref{ae-1}), we ge
\begin{equation*}
k!2^{k}\sum_{n=0}^{\infty }y_{1}(n,k;\lambda )\frac{t^{n}}{n!
=\sum_{n=0}^{\infty }E_{n}^{(-k)}(\lambda )\frac{t^{n}}{n!}.
\end{equation*
Comparing the coefficients of $\frac{t^{n}}{n!}$ on both sides of the above
equation, we arrive at the following theorem:
\begin{theorem}
Let $k$ be nonnegative integer. Then we hav
\begin{equation}
E_{n}^{(-k)}(\lambda )=k!2^{-k}y_{1}(n,k;\lambda ). \label{Cab3}
\end{equation}
\end{theorem}
\begin{remark}
Substituting $\lambda =1$ into (\ref{Cab3}), we obtain the following
explicit formula for the first kind Euler numbers of order $-k$ as follows
\begin{equation}
E_{n}^{(-k)}=2^{-k}\sum_{j=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) j^{n} \label{Caa3}
\end{equation}
\end{remark}
For $k=0,-1,-2,\ldots -7$, we compute a few values of the numbers
E_{n}^{(-k)}$ given by Equation (\ref{Caa3}) as follows
\begin{eqnarray*}
E_{0}^{(0)} &=&1, \\
E_{n}^{(0)} &=&0,\text{(}n\neq 0\text{)} \\
E_{n}^{(-1)} &=&\frac{1}{2}, \\
E_{n}^{(-2)} &=&{2}^{n-2}+\frac{1}{2}, \\
E_{n}^{(-3)} &=&\frac{{3}^{n}}{8}+3.{2}^{n-3}+\frac{3}{8}, \\
E_{n}^{(-4)} &=&\frac{{3}^{n}}{4}+{4}^{n-2}+3.{2}^{n-3}+\frac{1}{4}, \\
E_{n}^{(-5)} &=&\frac{{5}^{n}}{32}+\frac{5.{3}^{n}}{16}+\frac{5.{4}^{n-2}}{2
+5.{2}^{n-4}+\frac{5}{32}, \\
E_{n}^{(-6)} &=&\frac{{6}^{n}}{64}+\frac{3.{5}^{n}}{32}+\frac{5.{3}^{n}}{16
+15.{4}^{n-3}+15.{2}^{n-6}+\frac{3}{32} \\
E_{n}^{(-7)} &=&\frac{{7}^{n}}{128}+\frac{7.{6}^{n}}{128}+\frac{21.{5}^{n}}
128}+\frac{35.{3}^{n}}{128}+\frac{35.{4}^{n-3}}{2}+21.{2}^{n-7}+\frac{7}{128
,...
\end{eqnarray*
That is for $n=0,1,2,\ldots ,9$ and $k=0,-1,-2,\ldots ,-9$, we compute a few
values of the numbers $E_{n}^{(-k)}$, given by the above relations, as
follows
\begin{equation*}
\begin{tabular}{lllllllllll}
$n\backslash k$ & $0$ & $-1$ & $-2$ & $-3$ & $-4$ & $-5$ & $-6$ & $-7$ & $-8$
& $-9$ \\
$0$ & $1$ & $\frac{1}{2}$ & $\frac{3}{4}$ & $\frac{7}{8}$ & $\frac{15}{16}$
& $\frac{33}{32}$ & $\frac{33}{64}$ & $\frac{81}{64}$ & $\cdots $ & $\cdots $
\\
$1$ & $0$ & $\frac{1}{2}$ & $1$ & $\frac{3}{2}$ & $2$ & $\frac{5}{2}$ & $3$
& $\frac{7}{2}$ & $4$ & $\frac{9}{2}$ \\
$2$ & $0$ & $\frac{1}{2}$ & $\frac{3}{2}$ & $3$ & $5$ & $\frac{15}{2}$ &
\frac{21}{2}$ & $14$ & $18$ & $\frac{45}{2}$ \\
$3$ & $0$ & $\frac{1}{2}$ & $\frac{5}{2}$ & $\frac{27}{4}$ & $14$ & $25$ &
\frac{81}{2}$ & $\frac{245}{4}$ & $88$ & $\frac{243}{2}$ \\
$4$ & $0$ & $\frac{1}{2}$ & $\frac{9}{2}$ & $\frac{33}{2}$ & $\frac{85}{2}$
& $90$ & $168$ & $287$ & $459$ & $\frac{1395}{2}$ \\
$5$ & $0$ & $\frac{1}{2}$ & $\frac{17}{2}$ & $\frac{171}{4}$ & $137$ &
\frac{1375}{4}$ & $738$ & $1421$ & $2524$ & $4212$ \\
$6$ & $0$ & $\frac{1}{2}$ & $\frac{33}{2}$ & $\frac{231}{2}$ & $\frac{925}{2}
$ & $\frac{5505}{4}$ & $\frac{13587}{4}$ & $7364$ & $14508$ & $26550$ \\
$7$ & $0$ & $\frac{1}{2}$ & $\frac{65}{2}$ & $\frac{1287}{4}$ & $1619$ &
5725$ & $\frac{65007}{4}$ & $\frac{317275}{8}$ & $86608$ & $173664$ \\
$8$ & $0$ & $\frac{1}{2}$ & $\frac{129}{2}$ & $\frac{1833}{2}$ & $\frac{1166
}{2}$ & $\frac{49155}{2}$ & $\frac{160671}{2}$ & $\frac{441469}{2}$ & $\frac
1068453}{2}$ & $1173240$ \\
$9$ & $0$ & $\frac{1}{2}$ & $\frac{513}{2}$ & $\frac{15531}{2}$ & $\frac
161365}{2}$ & $\frac{1951155}{4}$ & $\frac{8499057}{4}$ & $7418789$ &
22071123$ & $\frac{232549335}{4}
\end{tabular
\end{equation*}
\begin{theorem}
Let $k$ be nonnegative integer. Then we hav
\begin{equation*}
y_{2}(n,k;\lambda )=\frac{2^{k}}{(2k)!}\sum_{l=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) E_{n}^{\ast (-l)}(\lambda ).
\end{equation*}
\end{theorem}
\begin{proof}
By using (\ref{C1}) and (\ref{Cac3}), we get the following functional
equation
\begin{equation*}
F_{C}(t,k;\lambda )=\frac{1}{(2k)!}\sum_{l=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) 2^{k}F_{N}(t;-l,\lambda ).
\end{equation*
From this equation, we obtai
\begin{equation*}
\sum_{n=0}^{\infty }y_{2}(n,k;\lambda )\frac{t^{n}}{n!}=\sum_{n=0}^{\infty
}\left( \frac{1}{(2k)!}\sum_{l=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) 2^{k}E_{n}^{\ast (-l)}(\lambda )\right) \frac{t^{n}}{n!}.
\end{equation*
Comparing the coefficients of $\frac{t^{n}}{n!}$ on both sides of the above
equation, we arrive at the desired result.
\end{proof}
\begin{theorem}
Let $k$ be nonnegative integer. Then we hav
\begin{equation*}
y_{2}(n,k;\lambda )=\frac{(-1)^{n}2^{n+k}}{(2k)!}\sum_{l=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) \lambda ^{-l}E_{n}^{(-l)}\left( -\frac{l}{2};\lambda ^{2}\right) .
\end{equation*}
\end{theorem}
\begin{proof}
By using (\ref{C1}) and (\ref{Cad3}), we get the following functional
equation
\begin{equation*}
F_{C}(t,k;\lambda )=\frac{2^{k}}{(2k)!}\sum_{l=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) \lambda ^{-l}F_{P1}\left( 2t,-\frac{l}{2};-k,\lambda ^{2}\right) .
\end{equation*
From this equation, we obtai
\begin{equation*}
\sum_{n=0}^{\infty }y_{2}(n,k;\lambda )\frac{t^{n}}{n!}=\sum_{n=0}^{\infty
}\left( \frac{2^{n+k}}{(2k)!}\sum_{l=0}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) E_{n}^{(-l)}\left( -\frac{l}{2};\lambda ^{2}\right) \right) \frac
t^{n}}{n!}.
\end{equation*
Comparing the coefficients of $\frac{t^{n}}{n!}$ on both sides of the above
equation, we arrive at the desired result.
\end{proof}
By applying derivative operator to the generating function in (\ref{ay1}),
we give a relationship between the numbers $y_{1}(n,k;\lambda )$\ and
E_{n}^{(-1)}\left( \lambda \right) $\ by the following theorem:
\begin{theorem}
Let $k\geq 2$. Then we hav
\begin{eqnarray*}
y_{1}(n+2,k;\lambda ) &=&ky_{1}(n,k;\lambda )+y_{1}(n,k-2;\lambda
)-y_{1}(n,k-1;\lambda ) \\
&&+2k\sum_{l=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) E_{l}^{(-1)}\left( \lambda \right) y_{1}(n-l,k;\lambda ).
\end{eqnarray*}
\end{theorem}
\begin{proof}
By applying derivative operator to (\ref{ay1}) with respect to $t$, we
obtain the following partial differential equation
\begin{equation*}
\frac{\partial ^{2}}{\partial t^{2}}F_{y_{1}}(t,k;\lambda )=k\left(
F_{y_{1}}(t,k;\lambda )+2G_{E}(t,1;\lambda )\right) +F_{y_{1}}(t,k-2;\lambda
)-F_{y_{1}}(t,k-1;\lambda ).
\end{equation*}
Combining (\ref{ay1}) and (\ref{ae-1}) with the above equation, we ge
\begin{eqnarray*}
&&\sum_{n=2}^{\infty }y_{1}(n,k;\lambda )\frac{t^{n-2}}{\left( n-2\right) !}
\\
&=&k\sum_{n=0}^{\infty }y_{1}(n,k;\lambda )\frac{t^{n}}{n!
+\sum_{n=0}^{\infty }y_{1}(n,k-2;\lambda )\frac{t^{n}}{n!
-\sum_{n=0}^{\infty }y_{1}(n,k-1;\lambda )\frac{t^{n}}{n!} \\
&&+2k\sum_{n=0}^{\infty }\sum_{l=0}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) E_{l}^{(-1)}\left( \lambda \right) y_{1}(n-l,k;\lambda )\frac{t^{n}}
n!}.
\end{eqnarray*
We make arrangement of the series and then compare the coefficients of
\frac{t^{n}}{n!}$ on both sides of the above equation, and we obtain the
desired result.
\end{proof}
\section{Algorithms and Computation}
Computer science and Applied Mathematics have study information and
computation and also their theoretical foundations. In these areas practical
techniques are very important (\textit{cf}. \cite{Wpc}). Therefore
algorithmic processes play a very important role in both areas. Thus, in
this section, we give two algorithms for the computation of the numbers
y_{1}(n,k;\lambda )$ and $y_{2}(n,k;\lambda )$.
\section{Combinatorial applications and further remarks}
In this section, we discuss some combinatorial interpretations of these
numbers, as well as the generalization of the central factorial numbers
given in Section 3-5. These interpretations includes the rook numbers and
polynomials and combinatorial interpretation for the numbers $y_{1}(n,k)$.
We see that our numbers are associated with known counting problems. By
using counting techniques and generating functions techniques, Bona \cit
{Bona} rederived several known properties and novel relations involving
enumerative combinatorics and related areas. A very interesting further
special cases of the numbers $B(n,k)$ is worthy of note by the work of Bona
\cite{Bona}. That is, in \cite[P. 46, Exercise 3-4]{Bona}, Bona gave the
following two exercises which are associated with the numbers $B(n,k)$:
\textbf{Exercise 3}. Find the number of ways to place $n$ rooks on an
n\times n$ chess board so that no two of them attack each other.
\textbf{Exercise 4}. How many ways are there to place some rooks on an
n\times n$ chess board so that no two of them attack each other?
\begin{remark}
Our numbers occur in combinatorics applications. In \cite[P. 46, Exercise 3-
]{Bona}, Bona gave detailed and descriptive solution of these two exercises,
which are related to the numbers $B(n,k)$, respectively as follows:
There has to be one rook in each column. The first rook can be anywhere in
its column ($n$ possibilities). The second rook can be anywhere in its
column except in the same row where the first rook is, which leaves $n-1$
possibilities. The third rook can be anywhere in its column, except in the
rows taken by the first and second rook, which leaves $n-2$ possibilities,
and so on, leading to $n(n-1)\cdots 2.1=n!$ possibilities.
Exercise 4. If we place $k$ rooks, then we first need to choose the $k$
columns in which these rooks will be placed. We can do that in $\left(
\begin{array}{c}
n \\
\end{array
\right) $ ways. Continuing the line of thought of the solution of the
previous exercise, we can then place our $k$ rooks into the chosen columns
in $(n)_{k}$ ways. Therefore, the total number of possibilities i
\begin{equation*}
\sum_{k=1}^{n}\left(
\begin{array}{c}
n \\
\end{array
\right) (n)_{k}.
\end{equation*}
\end{remark}
\begin{remark}
In (\ref{Ci8}), for $j<d$, it is well-known tha
\begin{equation*}
\left(
\begin{array}{c}
j \\
\end{array
\right) =0.
\end{equation*
Therefore, we arrive at solutions of Exercise 16 (a) in \cite[p. 55,
Exercise 16(a)]{Bona} and also Exercise 10 \cite[p. 126]{Charamb} as follows
\begin{equation*}
2^{n-k}\left(
\begin{array}{c}
k \\
\end{array
\right) =\sum_{j=d}^{k}\left(
\begin{array}{c}
k \\
\end{array
\right) \left(
\begin{array}{c}
j \\
\end{array
\right) .
\end{equation*}
\end{remark}
\section{Conclusions}
In this paper, we have constructed some new families of special numbers with
their generating functions. We give many properties of these numbers. These
numbers are related to the many well-known numbers, which are the Bernoulli
numbers, the Stirling numbers of the second kind, the central factorial
numbers and also related to the Golombek's problem \cite{golombek}
\textquotedblleft Aufgabe 1088\textquotedblright . We have discussed some
combinatorial interpretations of these numbers. Besides, we give some
applications about not only rook polynomials and numbers, but also
combinatorial sum.
\begin{acknowledgement}
The paper was supported by the \textit{Scientific Research Project
Administration of Akdeniz University.}
\end{acknowledgement}
|
\section{Introduction \label{secintro}}
Hydrodynamics, and its relativistic incarnation, is a topic of very active theoretical and phenomenological development \cite{kodama}. Phenomenologically, it seems to provide a good description of physics in heavy ion collisions, making numerical hydrodynamic solvers an indispensable tool in this field.
These phenomenological applications are however hampered by the fact that a rigorous link between hydrodynamics and ``microscopic theory'' (in this case, Quantum Chromodynamics close to deconfinement temperature) is still missing. In fact, a general link between hydrodynamics and {\em any} microscopic theory, including models where hydrodynamic behavior appears most naturally as an infrared limit \cite{4pi}, is a surprisingly non-trivial problem.
There are several aspects to this: Extending Navier-Stokes hydrodynamics to the relativistic limit will give problems with causality \cite{israelst,romdev,romconf}, due to the presence of arbitrarily-high speed dissipative modes.
These can be removed by promoting all elements of the energy-momentum tensor to degrees of freedom, and giving them a Maxwell-Cattaneo type equation of motion \cite{israelst,romdev} characterized by a ``relaxation time'' transport coefficient.
Phenomenologically this works, and also avoids unphysical instabilities in the linearized expansion \cite{hiscock,shipu,marrochio} (such instabilities would affect the hydrostatic limit, making local entropy non-decrease problematic), but, if one regards the microscopic origin of hydrodynamics as a ``gradient expansion'' in terms of bulk quantities, it is not immediately clear why additional degrees of freedom need to arise at second order, nor what the relationship between relaxation time $\tau_\pi$ and the usual microscopic ``dimensionless small parameter'' (the Knudsen number) of the theory is. One expects $\tau_\pi$ to scale as the sound wave attenuation length, but this is not universally true and in any case the extra degrees of freedom are determined by initial conditions, and there is no limitation to their size \cite{mauricio,mepratt}.
The existence of this extra small parameter can also be understood from the form of the microscopic spectral function \cite{denicol}, but this turns out to be highly dependent on the exact microscopic theory we are dealing with. Some works \cite{reynolds} consider it a second independent small parameter (``inverse Reynolds number'') to the gradient ``Knudsen number'' expansion.
In general,
extending these approaches into a consistent general systematic small parameter expansion, with possibly additional higher-order tensor degrees of freedom, hundreds of higher order gradient terms, and the requirement of overall hydrostatic stability entropy non-decrease seems only feasible for a select number of highly symmetric theories and boundary conditions \cite{series1,series2,series3}{.}
Microscopic fluctuation terms, most likely highly relevant in the low viscosity limit \cite{mooresound,kovfluct,betz,mevisc} are even more mysterious.
So far{,} they have been studied systematically only at linear order \cite{linfluct1,linfluct2}, but evidence exists \cite{hydro1,burch} they cannot at all be captured in a perturbative expansion.
A recent attempt to investigate this problem is to rewrite hydrodynamics as a field theory \cite{hydro0,hydro2,ritz1,grozdanov,galley,glorioso,floerchinger}, with the fields representing the Lagrangian coordinates of the fluid's volume elements. This picture allows the use effective field theory techniques \cite{kaplan} to investigate links between microscopic and macroscopic theories without explicitly writing down the microscopic dynamics. In this approach, hydrodynamics can be thought of as an example of an effective field theory with a cutoff, since we do track macroscopic degrees of freedom, but only conserved currents (energy-momentum, conserved charges) averaged over each fluid cell. Thus, long wave length and microscopic variables can be reformulated in the sense of effective field theory (EFT) as, respectively, infrared and ultraviolet degrees of freedom \cite{kaplan,betz}, the latter relevant at a microscopic scale $l_{UV}$ (either a small distance or a high wavenumber/momentum). In the case of hydrodynamics the Knudsen number provides a natural expansion parameter, combining the mean free path $l_{mfp}$ and the gradients into a dimensionless parameter.
Effective Lagrangian terms are calculated or correcting with systematic expansion of higher order derivatives $(l_{UV}. \vec{\nabla})^n$ and the fundamental symmetries of the system.
The big apparent limitation of such an approach is that leading corrections in hydrodynamics are dissipative, and standard Lagrangian theory cannot deal with them. However, methods have been developed to overcome this problem \cite{caltech,morse,galley1,porto}. Provided these can be developed consistently for all orders in the EFT, the problems highlighted in the preceding paragraph are all solvable systematically. EFT techniques will automatically separate physical from non-physical terms, and fluctuations can be included without any approximations by promoting the least action trajectory into a functional integral \cite{hydro1,mevisc,burch}.
\begin{figure}[t]
\includegraphics[height=0.2\textheight]{action_ns.jpg}
\includegraphics[height=0.2\textheight]{action_is.jpg}
\caption{\label{action}The qualitative form of the action $S$ in terms of the $b$ {$B$} and $B_{IJ}$ degrees of freedom for Navier-Stokes (top panel) and Israel Stewart hydrodynamics (bottom panel) close to the hydrostatic ($\phi^I \simeq x^I$) limit. The first exhibits a saddle point, the other is positive definite.
}
\end{figure}
This works in this direction using the ``doubled coordinate approach'' outlined in Appendix \ref{appctp} \cite{galley,grozdanov} ({in this work, a variable with a subscript $\pm$ is doubled, without the subscript it is standard non-dissipative}).
As this work will show, the appearance of extra degrees of freedom at second order, and the relationship between the relaxation time and the microscopic scale, also look natural within the Lagrangian formalism once the existence of semi-classical Lagrangian and ``vacuum stability'' (the existence of an action extremum) are taken into account. We show that, as hypothesized in \cite{grozdanov}, the extra degrees of freedom appear already in the Navier-Stokes limit, but in a way that cannot give a stable hydrostatic vacuum. The extra degrees of freedom in Israel-Stewart \cite{israelst,romdev} are then required to stabilize the theory.
{More specifically, we shall show that the form of the Lagrangian for viscous hydrodynamics has to be
{
\begin{equation}\label{Hyexpansion}
\mathcal{L} = \mathcal{L}_{ideal}(B_{\pm}) + \mathcal{L}_{bulk}(B_{\pm},u^\mu_{\pm}) +{ \mathcal{L}_{shear}(B_{\pm}, u^\mu_{\pm},B_{IJ\pm})}
\end{equation}}
The term $\mathcal{L}_{ideal}(B)$ is the one studied in \cite{hydro0,hydro1,hydro2}, corresponds to a conserved local quantity (the microscopic entropy. An infinite number of non-local conserved vorticies are also present \cite{hydro0}) and generates Euler's equations. $\mathcal{L}_{bulk}$ does not require extra degrees of freedom, but needs to generate dissipative terms, something done here using the doubling of DoFs described in appendix \ref{appctp}.
Shear viscosity requires, as well as doubling, new terms ( $B_{IJ}$) which not correspond to a conserved quantity and break volume-preserving diffeomorphisms, and yet are necessary to define the shear viscosity. Mathematically, they represent the dissipation of macroscopic energy by microscopic degrees of freedom, above the cutoff.}
As we will show, extra degrees of freedom appear in $\mathcal{L}_{shear}$ ``implicitly'', without touching the equations of motion. As long known \cite{caltech}, actions based on such lagrangians are unstable, without global minimum (Fig. \ref{action} top panel). {\em this can be understood as the fundamental reason for the instability of the Navier-Stokes equations}. Furthermore, as we shall show the only way to stabilize this system (have a Lagrangian of the form Fig. \ref{action} bottom panel) is to {modify $\mathcal{L}_{shear,bulk}$ into} a term of the form $\mathcal{L}_{IS}$, with additional degrees of freedom $X_{IJ}$ (corresponding to shear stress terms {$\Pi_{\mu \nu}$ in the comoving frame, now} promoted to independent degrees of freedom), which gives rise to Israel-Stewart type dynamics, {The Lagrangian of this new dynamics is therefore of the form
{
\begin{equation}\label{Hyexpansion2}
\mathcal{L} = \mathcal{L}_{ideal}(B_{\pm}) + { \mathcal{L}_{IS}(B_{\pm},u^\mu_{\pm},X_{IJ\pm},B_{IJ\pm}).}
\end{equation}}
\section{ \label{secideal}A review of ideal hydrodynamics}
In this section, we give a review of the understanding of Lagrangian hydrodynamics as a field theory, developed in \cite{hydro0,hydro1,mevisc,burch}{.}
Let us consider an uncharged fluid element. {In} in the Lagrangian formulation of hydrodynamics it can be characterized by three scalar fields $\phi^I(\vec{x},t)$ as d.of., where $\phi^I$ is simply the Lagrangian coordinate of the comoving volume, and $\vec{x}$ the Eulerian (lab) spacetime coordinate. At thermostatic equilibrium these coordinates coincide so $\ave{\phi^I} = x^I$, with $I=\left\{ 1,2,3 \right \} $, it identify physical coordinate in flat $3+1$ dimensional with metric $g_{\mu\nu}=diag(-1,1,1,1)$\footnote{{Greek letters are used here to specify spacetime coordinates, while latin letters specify comoving coordinates. The Einstein summation convention, with respectively 4D Minkowski and 3D Euclidean metrics, is used unless specified} } \cite{hydro1}.
In this formalism the dynamics of fluids, as opposed to other continuous media, can be built up by imposing symmetries on the Lagrangian.
Translation symmetry ($\phi^{I } \rightarrow \phi^{I }+a^I$ with $ a^I = const$ ) forces the Lagrangian to depend on derivatives of $ \phi^{I } $. Rotation symmetry (isotropy, $ \phi^{I } \rightarrow R^I_{J}\ \phi^{J }), \ \ R^I_J \in SO(3)$ is straightforwardly implemented by requiring the Lagrangian to be a function of $ B_{IJ}$. {Volume preserving deformation symmetry ($\phi^{I} \rightarrow \xi^{ I}(\phi^{J })$, where $\xi^I$ is a different set of coordinates with the same volume element ( i.e. det$(\partial \xi^{I}/\partial\phi^{J})=1$) implies the Lagrangian depends solely on B}. (in the hydrostatic limit each such symmetry gives the "Goldstone bosons" of the sound waves) \cite{hydro2}.
In summary, an ideal fluid is described as
{
\begin{equation}\label{idealhy}
\mathcal{L}= T^4_0 F(B), \ \ \ B \equiv det \left | B^{IJ} \right | = det \left | \partial_\mu \phi^{I} \partial^\mu \phi^{J}\right | {,}
\end{equation}}
{Where $T_0$ is a microscopic scale whose necessity is clear since $\partial \phi^{I}$ is dimensionless. The role of this microscopic scale , (which also absorbs a microscopic degeneracy, such as $N_c^2$ in gauge theories) is extensively discussed in \cite{mevisc,burch} and will be discussed later in this work.}
It is straightforward derive the stress energy tensor from the (\ref{idealhy}) via the usual Noether current
{
\begin{equation}
\label{noetherT}
T_{\mu\nu} = \sum_{I} \frac{\partial \mathcal{L}}{\partial (\partial^\mu \phi^I)} (\partial_\nu \phi^I) - g_{\mu \nu} \mathcal{L} {,}
\end{equation}}
we get
{
\begin{equation}\label{idealtensor}
T_{\mu\nu}= T_0^4 \left( 2B\frac{dF}{dB} B^{-1}_{IJ} A^{IJ}_{\mu \nu} - F g_{\mu\nu} \right) .
\end{equation}}
Where $ B^{-1}_{IJ}$ is inverse of matrix defined as
\begin{equation}
\label{BAdef}
B^{IJ} \equiv \partial_\mu \phi^I \partial^\mu \phi^J, \ \ \ \ A^{IJ}_{\mu \nu} \equiv \partial_\mu \phi^I \partial_\nu \phi^J {,}
\end{equation}
the average value is $\Delta^{\mu\nu} \equiv \langle B^{-1}_{IJ} A^{IJ} \rangle = u^\mu u^\nu + g^{\mu \nu}$ \cite{burch}. The tensor can be written in the usual hydrodynamic form
{
\begin{equation}\label{tensor}
T^{\mu\nu} = e \ u^\mu u^\nu + p \Delta^{\mu\nu}{,}
\end{equation}}
provided the fluid energy density and pressure are, respectively,
{
\begin{equation}
\label{rhopdef}
eT_0^{-4} = - F(B), \ \ \ \ \ \ \ pT_0^{-4}= F(B) - 2B \frac{dF}{dB}{,}.
\end{equation}}
and the velocity is defined, via {$u^\mu \partial_\mu \phi^I =0$} $ \forall I,u_\mu u^\mu=-1$ as
\begin{equation}
\label{flowdef}
u^\mu = \frac{1}{6 \sqrt B} \epsilon^{\mu \alpha \beta \gamma} \epsilon_{I J K} \partial_\alpha \phi^I \partial_\beta \phi^J \partial_\gamma \phi^K {.}
\end{equation}
Using the Gibbs-Duhem relation, relating entropy $s$ to pressure $P$, energy density $\rho$ (Eq. \ref{rhopdef}) and temperature $T$
{
\begin{equation}
\label{gibbsduhem}
s =\left. \frac{dP}{dT}\right|_{V} = \frac{P + e }{T}{,}
\end{equation}}
we obtain the thermodynamic parameters
{
\begin{equation}
s=T^3_o \sqrt B , \ \ \ \ \ T= {-} T_o \frac{\sqrt{B} dF/dB}{g}{,}
\end{equation}
(where to define temperature one needs to separate the microscopic degeneracy $g$ from $T_0$ \cite{burch} because of the heat capacity's explicit dependence on $g$)}
This entropy is the only locally conserved quantity (there are infinite numbers of non-local conserved vorticity charges \cite{landau} corresponding to the Noether charges of diffeomorphisms \cite{hydro0}), giving rise to the conserved current used in \cite{grozdanov}
\begin{equation}\label{entropy}
K^\mu = \sqrt B u^\mu {,}
\end{equation}
One can understand the above by {\em defining} {$u^\mu$} to be parallel to entropy flow (the so-called Landau frame \cite{landau}), since the Euler-Lagrange equations applied to the Lagrangian in Eq \ref{idealhy} will just yield $\partial_\mu K^\mu=0$. The symmetry of this Lagrangian against deformation and rotation will then yield the fact that $u^\mu$ is always perpendicular to the gradients of $\phi^I$.
{This way one can always construct $K^\mu$ and $u^\mu$ out of $\phi^I$ via a projector
\textcolor{black}{
\begin{equation}
\label{projector2}
P^{\mu \nu}_K = \frac{1}{3!} \epsilon^{\mu \alpha \beta \nu} \epsilon_{IJK} \partial_\alpha \phi^I \partial_\beta \phi^J,
\end{equation}}
This definition is in accordance with Eq. \ref{entropy} since clearly
\begin{equation}\label{defk}
K^\mu \equiv P^{\mu \nu}_K \partial_\nu \phi^K.
\end{equation}}
\section{Navier-Stokes \label{secns}}
{The natural first order term within the Lagrangian is first order, i.e. contains exactly one gradient. Such terms, however, are,
as shown in \cite{hydro2}, non-dynamical since they can always be reabsorbed into field redefinitions. Physically, this should not surprise us since we know that first order terms in the Navier-Stokes equations are dissipative, and hence cannot be represented by ``normal'' Lagrangian terms.
Such terms are{,} however{,} amenable to be included via the doubled degrees of freedom formalism \cite{caltech,morse,galley1,galley} described in appendix \ref{appctp}.
In this approach, the two degrees of freedom (represented here by $\phi_{\pm}$ according to the formalism introduced within \cite{grozdanov}) can be taken as representing the ``system'' and ``unobserved environment'',with the two distinguished by advanced and retarded boundary conditions \cite{galley}. }
Coarse-graining usually implies that the dynamics of the theory is a function of currents of conserved quantities, since these are the slowest to equilibrate. These are related to symmetries by Noether's theorem, as well as their derivatives. Since in the last section, we found that the only conserved local charge is the entropy. We construct two independent vectors by doubling the degrees of freedom (DoFs) of Eq. \ref{entropy}, {we get two currents degenerated and independent}
{
\begin{equation}\label{kctp}
K^{i\mu} = \frac{1}{3!} \epsilon^{\mu\alpha_1 \alpha_2 \alpha_3} \epsilon_{IJK}\partial_{ \alpha_1} \phi^{\sigma_1 I}\partial_{ \alpha_2}\phi^{\sigma_2 J}\partial_{ \alpha_3}\phi^{\sigma_3 K} {,}
\end{equation}}
{where} $(\sigma _1 \sigma _2 \sigma _3) = \left \{(---),(+++)\right \}$, for i=$\left \{0,3 \right \}$. The current vectors are still conserved by $\partial_\mu K^{i \mu} = 0$, with further combinations are in fact forbidden by conservation laws \cite{grozdanov}.
$K^\mu$ can be understood as a generalization of the entropy current with doubled fields (i=$\left \{0,3 \right \}$) \textcolor{black}{with the two new projectors constructed using the proprieties of Eq \ref{projector2} and \ref{defk}. }
\textcolor{black}{
\begin{equation}\label{proj1}
P^{i \mu \nu}_K \partial^\lambda \phi^K = \frac{1}{3}(K^{i\mu} \Delta^{\nu \lambda} - K^{i\nu} \Delta^{\mu \lambda}){,}
\end{equation}
\begin{equation}\label{proj2}
P^{i \mu \nu}_K \partial^\lambda \partial_\nu \phi^K = \frac{1}{3} \partial^\lambda K^{i\mu}.
\end{equation}}
We use the CTP formalism to obtain the Lagrangian and extend the hydrodynamics formulation to first order terms. Following the correction to Noether's theorem described in \cite{galley1} and the procedure of \cite{grozdanov}( Eq. \ref{ctp} in Appendix \ref{appctp}.).
We see that the stress-energy tensor in CTP can be obtained by varying just one field by the Noether current
\begin{equation}\label{phi}
\phi^+(x) \rightarrow \phi^+(x + a(x)){,} \ \ \ \ , \ \ \ \ \ \phi^-(x) \rightarrow \phi^-(x).
\end{equation}
{Note} that in physical limit (p.l.), the $\phi^{+K}=\phi^{-K}$ involve $K^{i \mu}$=$K^\mu$ which also defines $K^{3\mu}\equiv P^{3 \mu\alpha}_K \partial_\alpha \phi^{+K}$ and $ P^{0\mu \alpha}_{K} \equiv 0 $. As we deal with only variations in $\delta^{+}_\phi K^{i\mu} = iP^{i \mu \alpha}_K \partial_\alpha \delta \phi^{+K}$, the other one $\delta^{-}_{\phi} K^{i\mu} = 0$, after a shift the metric $x \rightarrow x + a(x)$, we get $\delta^{+}_x \phi^{+K} = a^\mu \partial_\mu \phi^{+K}$. By inspection its gives
\begin{equation}
\delta^+_x K^{i\mu} =iP^{i\mu\alpha}_K (\partial_\alpha a_\lambda\partial^\lambda\phi^{+K}+a_\lambda\partial^\lambda\partial_\alpha\phi^{+K}).
\end{equation}
The displacement $a(x)$, one can identify a equation of motion for
$T_{\mu \nu}$ with a non-vanishing divergence which however depends on
second-order gradients \cite{grozdanov}.
{Without dissipative terms, $+$ and $-$ Lagrangians are symmetric, hence the results of the previous section merely get doubled \cite{grozdanov}. The Lagrangian of Eq. \ref{idealhy}, written in terms of {$K^{i\mu}$}, is then promoted to }
\begin{equation}
\mathcal{L}^{(0)}_{CTP} = T^4_oF(K^3_\gamma K ^{3\gamma}) - T^4_oF(K^0_\gamma K ^{0\gamma}){,}.
\end{equation}
{where clearly the first term can be regarded, in the notation of the previous section, as the equation of state defined by $B_+$ and the second term as the equation of state defined by $B_-$. In this form, the lagrangian is just two doubled lagrangians for two fluids, not talking to each other.}
{Additional} terms, are however possible. In \cite{grozdanov} the bulk viscosity term was constructed to be
\begin{equation}\label{bulkgroz}
\mathcal{L}^{(1)}_{CTP} = T^4_o \sum_{i,j,k} z_{ijk}(K^{l\gamma}K^{m}_\gamma) K^{i \mu} K^{j \nu} \partial_\mu K^k_\nu.
\end{equation}
which contains the same symmetries of ideal hydrodynamics.
{Small Latin index (symbolizing where we are in the doubled lagrangian) are always summed over $\left \{0,3\right \}$. The $l,m$ is also a summation term, but, unlike non-dissipative terms, it mixes $0$ and $3$, because $l \ne m$ and $i,j,k$ is summed over (for additional details on this notation see \cite{grozdanov} section IV)}{.}
The eight coefficients $z_{ijk}$ reduce to four $\bar{z}_{ijk} \equiv \left.z_{ijk}\right|_{|\phi^{+K} = \phi^{-K}}$ due to CTP symmetry as well as positivity ( ensuring the system is dissipative rather than anti-dissipative, where gradients {\em grow}), see Eq. \ref{ctpdef}.
These terms specify the dependence of the shear and bulk viscosity on entropy $B^{1/2}$ by contractions of $(K^{l}_{\gamma}K^{m\gamma}={B} )$ in the argument of coefficient $z_{ijk}$.
As correctly noted in \cite{grozdanov}, the construction of the shear viscosity term is complicated by the fact that it breaks the volume preserving diffeomorphism symmetry, and hence cannot be just a function of $K$. Noting that $B_{IJ}$ is the leading term allowed by all but the volume preserving symmetries, and any thermodynamic quantity can be represented as a function of $B$ only, and using
\begin{equation}
\label{projector}
u_\gamma \partial_\mu (\Delta^{\gamma \nu}) = \partial_\mu u_\nu =- u^\gamma B^{-1}_{IJ} \partial_\mu \partial_\gamma \phi^I \partial_\nu \phi^J {,}
\end{equation}
(easily proven by taking the hydrodynamic derivative of eq. (28) of \cite{hydro0} ) we arrive at
\begin{equation}\label{ns}
\mathcal{L}^{(1)}_{CTP} = T^4_o \sum_{i,j,k} z'_{ijk}(K^{l\gamma}K^{m}_\gamma) B B^{-1}_{IJ}\partial^{\mu} \phi^{iI} \partial^{\nu} \phi^{jJ} \partial_\mu K^k_\nu {,}
\end{equation}
will, when converted to $\Delta T_{\mu \nu}$ via Eq. \ref{noetherT}, produce the usual first order Navier-Stokes' equation shear viscosity term $\eta$ and bulk viscosity $\zeta$ that represent most general possible correction in first order with the symmetry.
\begin{equation}
\label{eqns}
\sigma^{\mu\nu} \equiv \eta \Delta^{\mu\alpha} \Delta^{\nu \beta}\left( \partial_\alpha u_\beta + \partial_\beta u_\alpha - \frac{2}{3}\eta_{\alpha \beta} \partial_\lambda u^\lambda \right) +\zeta \Delta_{\mu \nu} \partial_\alpha u^\alpha {.}
\end{equation}
A similar lagrangian to Eq. \ref{ns} was recently derived in \cite{floerchinger} (section 7) using laboratory coordinates.
Summarizing the shear viscosity appears when we introduce ``transverse stress'' d.o.f.s to break rotational diffeomorphism symmetry of the Lagrangian, $B^{-1}_{IJ}\partial^\mu \phi^I \partial^\nu \phi^J$, where it doesn't volume-preserve diffeomorphisms by a transformation det$(\partial \xi^{+I}/\partial\phi^{+I})=1$. The bulk viscosity, on the other hand, can be formulated by a projection parallel to $K^\mu$. As a result, the Noether current for diffeomorphism invariance, vorticity \cite{hydro0} is explicitly broken by Eq. \ref{ns}, something we know well since the presence of shear viscosity dissipates vorticity. Bulk viscosity also violates vorticity conservation, but it does so via the ``source term'' of Noether's theorem for dissipative theories \cite{galley}{.}
The relation between the viscosity as usually defined and the matrix coefficients {as well as the instantaneus entropy $B$ is \footnote{{During a time $dt$, entropy should increase from $B$ to $B+dB$, where $dB/dt$ is a function of the gradient. Viscosity in this context should be a function of $B$ only and this can generate ambiguity in the definition of viscosity, See the discussion in \cite{grozdanov} around eq. 85,98,99. This issue is also discussed in the conclusion section of this work.}}} ({note the mixing between shear and bulk viscosity terms and $z$})
\begin{eqnarray}\label{bulkeq}
\zeta & = & - B^{3/2}(\bar{z'}_{003} + \bar{z'}_{303} + 2\bar{z'}_{333} + 2\bar{z'}_{033} + \bar{z}_{333} + \bar{z}_{300} \nonumber \\
& & - \bar{z}_{303} + 3\bar{z}_{330}) + B^{5/2} (\bar{z'}_{003,03} +\bar{z'}_{303,03}+\bar{z'}_{333,03} \nonumber \\
& & +\bar{z'}_{033,03} -2 \bar{z}_{333,03} -2\bar{z}_{303,03} +2 \bar{z}_{330,03} +2 \bar{z}_{300,03}) \nonumber \\
& & - 4B^{5/2}(\bar{z}_{333,00} + \bar{z_{303,00}}) + 4B^{5/2}(\bar{z'}_{003,33} + \bar{z'}_{303,33} \nonumber \\
& & + \bar{z'}_{333,33} + \bar{z'}_{033,33} + \bar{z}_{330,33} + \bar{z}_{300,33}),
\end{eqnarray}
\begin{eqnarray}
\eta = B^{3/2}(\bar{z}_{003} + \bar{z}_{033} + \bar{z}_{303} + \bar{z}_{333}).
\end{eqnarray}
Where $z_{ijk,lm} \equiv \partial z / \partial (K^l_\gamma K^{m\gamma})$. Eq. \ref{ns} is very strange since a term $B_{IJ}$, independent from $K^\mu$ and $B$, is present at linear order. This term represents the dynamics of energy-momentum components perpendicular to flow, and cannot be put in terms of DoFs invariant under volume-preserving diffeomorphisms.
Physically, the fact that the shear viscosity term also breaks volume-preserving invariance, something physically understandable since this kind of dissipation necessarily requires degrees of freedom moving from from IR to UV ``macroscopic'' to ``microscopic'' across a cutoff $ \sim \frac{1}{T_o} $, and the microscopic scale is expected to be immune to deformation.
The doubled degrees of freedom make it possible that these first order terms are physical rather than redundancy terms (as first order terms usually are \cite{caltech,hydro2}).
This means, however, that the doubled Lagrangian does not have a minimum but at most a saddle point (Fig. \ref{action} top panel). This means that while equations of motion can be constructed independent of $B_{IJ}$, these will be unstable against perturbations in the $B_{IJ}$ direction. This, in fact, explains, in terms of the Lagrangian, the linear-order results of \cite{hiscock,marrochio,shipu} about the instability of Navier-Stokes hydrodynamics and makes it apparent non-linearities cannot cure the instabilities encountered in these works, at least at the classical level.
In reality, this condition exists implicitly for bulk viscosity as well, for while $K_\mu K^\mu$ is positive-definite, $K_\mu K_\nu \partial^\nu K^\mu$ is unbounded above or below (it actually generically follows shear viscosity in the sense that both $B_{IJ}$ and $K_\mu K_\nu \partial^\nu K^\mu$ can become large and arbitrarily positive/negative when gradients do not follow the direction of entropy flow ). Hence, Eq. \ref{bulkgroz} is {\em also} unbounded below, as expected from the fact that bulk and shear viscosity instabilities arise in a very similar way \cite{shipu} {.}
The way to stabilize the Lagrangian is clearly to add higher order well behaved (even-power) terms, something that requires a few subtleties, as explained in the next section.
\section{Israel-Stewart \label{secis}}
The NS shows unphysical behavior for short wavelength, with a causality problem is most clearly seen by considering linearized perturbations. The equations of motion for a Lagrangian perturbed from the hydrostatic limit
\[\ \phi^I = x^I + \delta \pi^I(x^\mu) ,\phantom{AA} B \rightarrow B_0+\delta B(x^\mu) \]
will, when linearized in $\delta B$ and Fourier transformed, yield a dispersion relation for sound-waves of frequency $w$ and wave-number $k$
\begin{equation}
w - \left( \frac{\partial P}{\partial \rho} \right)^{1/2} k + i \left(
\frac{4\eta}{3 sT}
\right) k^2 =0
\end{equation}
It is clear that, for the high wavenumber diffusive mode, the speed of diffusion
\[\ v = \frac{w}{k} \sim k \]
Therefore, for $k \frac{4\eta}{3 sT} \gg 1 $ we go to limit where modes of propagation can be travel faster than light, then principle of causality will be violated. As long been known \cite{hiscock}, such lack of causality implies lack of stability. {The Lagrangian treatment in the previous section, with a demonstration the Lagrangian is unbound, confirms the lack of stability is not an artifact of leading-order approximations but a fundamental feature of the theory.}
That Higher-order NS appears neither stable nor causal is not surprising, since the two concepts correlated in relativistic systems, as non-causality generally implies the absence of a ``vacuum'' (either quantum or thermal), which in turn generically leads to instabilities in the effective theory. The most widely accepted way to solve this issue \cite{israelst} is to {\em promote} $\Pi_{\mu \nu}$ to independent degrees of freedom at second order. This means to consider the energy-momentum tensor to be
\begin{equation}\label{general}
T^{\mu\nu} = T^{\mu\nu}_0 + \Pi^{\mu\nu}{,}
\end{equation}
where $T^{\mu \nu}_0$ is given by Eq. \ref{tensor} and $\Pi^{\mu \nu}$ is arbitrary beyond the constraints of symmetry and transversality
\[ \Pi_{\mu \nu} = \Pi_{\nu \mu} ,\phantom{AA} u_\mu \Pi^{\mu \nu}=0{,} \]
the equation of motion is engineered to keep $\Pi^{\mu \nu}$ symmetric and to have the Navier-Stokes as the asymptotic value. {
\begin{equation}\label{IS}
\tau _\pi^\eta \Delta^{\kappa \mu} \Delta^{\zeta \nu} u^\alpha \partial _\alpha {\pi_{\kappa\zeta}} + {\pi^{\mu\nu}} = \sigma^{\mu \nu}_\eta + \order{(\partial u)^2}{,}
\end{equation}
\begin{equation}\label{ISzeta}
\tau _\pi^\zeta u^\alpha \partial _\alpha \Pi + \Pi = \sigma_\zeta + \order{(\partial u)^2}.
\end{equation}
Where, $\sigma^{\mu \nu}_{\eta,\zeta}$ are respectively the Navier-Stokes terms for shear and bulk viscosity (Eq. \ref{eqns}). {$\Pi^{\mu\nu} = \pi^{\mu\nu} + \Delta^{\mu\nu}\Pi $ where} {$\pi^{\mu \nu}$} is symmetric and transverse and has 5 DoFs \cite{romdev,kovfluct} (the two $\Delta^{...}$ projects make sure {$\pi^{\mu \nu}$} remains orthogonal to velocity provided initial conditions are so), while { $\Pi \equiv \Pi^\mu_\mu /3 $} { $\Pi = \Pi^\mu_\mu $} is one number representing the trace.}
To understand equation (\ref{IS}) from the EFT Lagrangian approach, we have to remember that $ {\pi_{\mu\nu}}$ get promoted to independent degrees of freedom, subject to the constraint of symmetry and transversality with velocity.
This degree of freedom is {\em not} a Noether current (and hence cannot be obtained from an Eq. such as \ref{noetherT}) or a conserved quantity.
Hence, the way to write this down in our formalism is to use
\begin{equation}
\label{xdef}
{\pi_{\mu\nu}} = X_{IJ} \bar{A}^{IJ}_{\mu \nu} ,\phantom{AA} \Pi = { X_{IJ}\frac{1}{3} B^{IJ},}
\end{equation}
{where $X_{IJ}$ is a new symmetric matrix of degrees of freedom, one which is not necessarily isotropic but still homogeneous and $\bar{A}^{IJ}_{\mu \nu}$ are traceless and traced parts of the most general rank 2 tensor transversal to flow projected onto the comoving frame, the scalar-tensor decomposition of Eq. \ref{BAdef}
\[\
A^{IJ}_{\mu\nu} = \frac{1}{3} \delta_{\mu\nu} \partial_\lambda \phi^I \partial^\lambda \phi^J + \frac{1}{2}( \partial_\mu \phi^I \partial_\nu \phi^J +
\]
\begin{equation}
\label{aijdef}
\partial_\nu \phi^I \partial_\mu \phi^J - \frac{2}{3} \delta_{\mu\nu} \partial_\lambda \phi^I \partial^\lambda \phi^J) .
\end{equation}}
The shear part therefore is
{
\begin{equation}
\label{shearpi}
{\pi_{\mu\nu}} = X_{IJ} \frac{1}{2}( \partial_\mu \phi^I \partial_\nu \phi^J + \partial_\nu \phi^I \partial_\mu \phi^J - \frac{2}{3} \delta_{\mu\nu} \partial_\lambda \phi^I \partial^\lambda \phi^J),
\end{equation}}
and the bulk part is
{
\begin{equation}
\label{bulkpi}
\Pi = X_{IJ} \frac{1}{3} \partial_\lambda \phi^I \partial^\lambda \phi^J .
\end{equation}
Each of these new degrees of freedom can be doubled, as were equilibrium degrees of freedom in the previous section, to model dissipative dynamics. The doubled degrees of freedom are denoted by $X_\pm,\Pi_\pm$.
We can see the need for $A^{IJ}_{\mu\nu}$ by applying Eq. \ref{projector}. It has the same role as Eq. \ref{ns}, but its coefficient is an independent degree of freedom and not fixed by shear viscosity.}
The necessity of new degrees of freedom at second order, somewhat arbitrary in other approaches, becomes clear here from symmetry and causality arguments. Since $\phi_I$ are already fixed by the initial conditions (up to the volume-preserving and $SO(3)$ diffeomorphism invariance of hydrodynamics), second-order terms in the Lagrangian in therms of just $\phi_I$ would be either non-dissipative, non-causal, or lead to violations of conservation laws: Ostrogradski's theorem \cite{ostro,ostro2} (see appendix \ref{appctp}) prevents us from employing second order derivatives of $\phi$ as degrees of freedom \footnote{Note that the Ostrogradski instability s very different \cite{ostro} from the instability due to the Lagrangian having saddle points which plagues the Navier-Stokes theory (Fig. \ref{action} top panel). In the Ostrogradski case dynamics is still well-defined, but energy is not positive-definite. For an isolated system this does not necessarily produce instabilities, but coupled to another system such a system cannot reach equilibrium. For an unbounded {\em lagrangian} the instability happens in an isolated system too {.} } (as would have been the natural continuation in a gradient expansion). A $ {\pi_{\mu\nu}}$ dependent on the first derivatives of $\phi_I$, translated into Eq \ref{eqns} can only become of the form
\[\
{\pi_{\mu\nu} = f(\partial_\alpha u_\beta). }
\]
As shown in eq \ref{projector}, such a term projected perpendicular to $u_\mu$ will generally contain a pathologically linear $B^{-1}_{IJ}$ term. At the Lagrangian level, this is the realization that, after linearization, will give a dispersion relation as a complex polynomial
\[\ w(k) = A_n k^n{,} \]
without extreme fine-tuning, such a dispersion relation will inevitably be non-causal.
We note that, provided the lagrangian contains square terms of $ {\pi_{\mu\nu}}$, eq. \ref{xdef} will contain terms $\sim B_{IJ}^2$ and hence, provided $\Pi_{\mu \nu}$'s normalization is positive-definite, should be stable even if $X_{IJ}$ are arbitrary. Thus, a bounded Lagrangian stable w.r.t. Ostrogradski's conditions should contain terms at least up to $\sim \Pi_{\mu \nu} \Pi^{\mu \nu}$ where $\Pi_{\mu \nu}$ depends on $X_{IJ}$. The leading-order dependence compatible with Lorentz symmetries is Eq. \ref{shearpi} and \ref{bulkpi}.
The introduction of these new degrees of freedom in Eq. \ref{xdef} and the absence of additional conserved currents means { equation \ref{IS} cannot be obtained from a Noether current equation of the form of $\partial_\mu J^\mu = R$ and $J^\mu,R$ are deriveable from the symmetrized coordinates (Eq. \ref{noetherT} and \ref{entropy} are of this form), but must be obtained from the full Lagrangian equation of motion
\begin{equation}
\label{lageq}
\partial_\mu \frac{\partial \mathcal{L}}{\partial (\partial_\mu Z)} = \frac{\partial \mathcal{L}}{\partial Z}
\end{equation}
where $Z = \Pi_{\mu \nu}(X_{IJ},\phi_I)$. The right hand side of this equation is fixed by the necessity of the asymptotic theory to relax to Navier-Stokes
by symmetry, since $\Pi_{\mu \nu}$ is perpendicular to $u_{\mu}$, the new DoFs have to have the same number of elements as $A^{IJ}_{\mu\nu}$, $B_{IJ}$, hence the necessity for the new matrix.}
Using $\Pi_{\mu \nu}$ as variables for the Lagrangian allows us to more readily make contact with standard I-S equations, but obscures the role of symmetries of the $X$ and $A$ terms.
In particular, note that the projected traceless part of $\frac{\partial \mathcal{L}}{\partial (\partial_\alpha A^{IJ}_{\mu \nu})} \partial_\beta A^{IJ}_{\mu \nu} \sim \Pi_{\alpha \beta} \partial_\gamma u^\gamma$, the residual violation of conformal symmetry within volume preserving diffeomorphism invariance for $\Pi_{\mu \nu}$ (the third term of Eq. 3.12 of \cite{romconf}). A conformal transformation on the Lagrangian would generate such a term in the energy momentum tensor, and hence this term must appear with the opposite sign if conformal invariance was enforced at the IS level. A consistent development of conformally invariant hydrodynamics is however left for a different work, since, as can be seen from these equations, the relationship between $X_{IJ},\Pi_{\mu \nu}$ and $A$ are complex enough to require some work for conformal symmetry to be fully implemented (there is much more to a conformal fluid than the absence of bulk viscosity){.}
The second law of thermodynamics prevents $X_{IJ}$ from having non-dissipative terms and requires, for long distances, that $\Pi_{\mu \nu}$ relaxes to its Navier-Stokes value. The simplest Lagrangian of this form is (note that the projection of $\Pi_{\mu \nu}$ perpendicularly to $u_\mu$ is taken when {$\Pi_{\mu \nu}$} is defined)
{
\begin{equation}
\label{isl}
\mathcal{L} = \mathcal{L}_{ideal}(B_{\pm}) + \mathcal{L}_{IS-shear} + \mathcal{L}_{IS-bulk} + \mathcal{L}_2 \left( \left(\partial \phi_{\pm}\right)^2 \right){,}
\end{equation}}
\[\ \mathcal{L}_{IS-shear}= \frac{1}{2}\tau_\pi^\eta \left({\pi^{\mu\nu}_-} u^\alpha_+ \partial_\alpha {\pi_{\mu\nu +}} - {\pi^{\mu\nu}_+} u^\alpha_- \partial_\alpha {\pi_{\mu\nu -}} \right)+ \]
\[\ + \frac{1}{2} {\pi^{\mu\nu}_{\pm}} {\pi_{\mu\nu \pm}} + \underbrace{\left[ \left( A^{\circ} \right)_{\mu \nu}^{IJ} \partial^\mu K^\nu \right]_{\pm}}_{\sim \sigma_{\mu \nu}^\eta}{,} \]
\[\ \mathcal{L}_{IS-bulk}= \frac{1}{2}\tau_\pi^\zeta \left(\Pi_- u^\alpha_+ \partial_\alpha \Pi_{ +} - \Pi_+ u^\alpha_- \partial_\alpha \Pi_{ -}\right)+ \]
\[\ + \frac{1}{2} \Pi_{\pm}^2 + \underbrace{\left[ K_\mu \partial^\mu B \right]_{\pm}}_{\sim \sigma^\zeta}{.} \]
{Where $\left( A^{\circ} \right)_{\mu \nu}^{IJ} \equiv A^{IJ}_{\mu\nu} / B_{IJ} $ and }the first term is the ideal one (Eq. \ref{idealhy}), the next two terms give the dissipative dynamics of $\Pi_{\mu \nu}$ and the last one gives the Navier-Stokes source Eq. \ref{eqns} (note the explicit Lagrangian dependence of section \ref{secns} disappears, as its presence would give rise to unstable modes).
$\mathcal{L}_2$ contains non-dissipative ``hydrodynamic'' terms to second order in Gradient enumerated in works such as \cite{secondorder}. It will contain shear and bulk-mixing terms, as well as further restrictions due to, for example, conformal symmetry. Its construction, as in all EFTs, is based on enumerating all second order terms conpatible with Lorentz and homogeneity symmetries{.}
It is easy to see that Eq. \ref{IS} arises as an equation of motion w.r.t. $X$ and a
\[\ T^{\mu \nu} = T_0^{\mu \nu}(B,u^\mu) + \Pi^{\mu \nu}(X_{IJ},A^{\mu \nu}){,}\]
where $T_0^{\mu \nu}$ is given by the ideal tensor Eq. \ref{noetherT} and $\Pi^{\mu \nu}$ is perpendicular to $u_\mu$.
It is also clear that this Lagrangian is stable (the action is bounded, with one minimum, in the near-hydrostatic ($\phi_I \simeq \vec{x}$) limit, as shown in Fig. \ref{action} bottom panel) against both the ``old'' DoFs $\phi_I$ and the new one $X_{IJ}$: $\Pi_{\mu \nu} \Pi^{\mu \nu}$ is positive definite, and, as long as $\tau_\pi$ is large enough to guarantee slower than light diffusion propagation the kinetic term will not contain ghost modes. {Beyond this restriction, $\tau_\pi^{\eta,\zeta}$ can have an arbitrary dependence on the equilibrium DoF $B${.}
\section{Discussion \label{secfinal}}
Our results provide a general method to extend the EFT which completes the insights of \cite{marrochio,shipu,denicol}. For stability the theory in its Lagrangian description has to contain strictly positive powers of $B_{IJ}$ and its derivatives, which means even powers with positive combinations of gradients and traces at the lagrangian level. An odd power will generally mean an unstable equation of motion, of the type found in \cite{shipu,marrochio}.
Beyond these constraints, all the allowed combinations of $B,B_{IJ},X_{IJ}$ and their gradients can go into the Lagrangian, with terms suppressed in powers of the gradient by the Knudsen number. Naively, terms with $X_{IJ}$ are ``one higher order in gradient'' w.r.t. $B_{IJ},B$. This is what one expects when the theory is close to equilibrium and the viscosity $\eta$, relaxation time $\tau_\pi$, temperature $T$ and and entropy $s$ are related by $\tau_\pi T \sim \eta/s$. This relation however is {\em not} universal. In situations of critical slowing down it manifestly fails \cite{critslow}, since shear viscosity is at a minimum while $X_{IJ}$ never equilibrate.
More generally, since $X_{IJ}$ are independent degrees of freedom, their equilibration time in a classical theory depends on initial conditions, a dependence that, at least in examples with reduced dimension, has been shown to be highly non-trivial \cite{mauricio,mepratt}. This is why the proposal of \cite{reynolds} to treat such terms as independent of the gradient expansion appears justified.
That said, the fact that the leading order dynamics of such terms is only dissipative does provide an explanation for the applicability of the EFT expansion in a regime where there is scope for it failing \cite{eftfail}. After all, hydrodynamic behavior appears universal in nature.
These extra degrees of freedom provide a conceptual framework for unifying Israel-Stewart hydrodynamics with anisotropic hydrodynamics, recently developed as a successful phenomenological theory \cite{aniso1,aniso2}. There is in fact no distinction between usual Israel-Stewart and anisotropic hydrodynamics in principle, since the appearance of DoFs corresponding to anisotropies is inevitable in the former. The phenomenological success of \cite{aniso1,aniso2} might be due to the fact that the latter keeps track, within the gradient expansion, the fact that anisotropies in the gradient are very different in the transverse and longitudinal direction. Hence, the number of terms considered should vary between these directions.
It should be remembered that the dissipative terms generally violate conservation laws \cite{galley}, but, for an EFT expansion of a highly symmetric theory, this violation typically goes as a higher order than the Lagrangian \cite{grozdanov}. The lagrangians examined here are no exception, since the violation of energy conservation examined in Section \ref{secns} is $\sim (l_{mfp}\nabla)^2$ \cite{grozdanov}{ while that in \ref{secis} should be, from \cite{galley} Eq. 2.63
\[\ \Delta T^{0i} \sim \dot{X} \frac{\partial \mathcal{L}_{diss}}{\partial X} + \ddot{X} \frac{\partial \mathcal{L}_{diss}}{\partial \dot{X}} + (l_{mfp}\nabla)^2(\nabla X) \]
\[\ \sim (l_{mfp}\nabla)(\nabla X)^2 + (l_{mfp}\nabla)^2(\nabla X){.} \]}
However, as the convergence of the IS expansion is unclear in the general case, this issue will need to be examined on a case-by case basis.
The introduction of $X_{IJ}$ at second order raises the question of weather additional degrees of freedom of this sort are required at higher order. To answer this question, one must remember that Ostrogradski's theorem can be applied sequentially. Once second order derivatives of $X_{IJ}$ are taken into account, new degrees of freedom are required to ensure thermodynamic stability of the theory. These terms cannot be rank two tensors, since by the Coleman-Mandula \cite{cm} theorem the only conserved quantity is $T_{\mu \nu}$ and hence a hypothetical $X^{IJ}_2$ can be always absorbed into a redefinition of the non-conserved $X_{IJ}$. Hence, new terms will come as contractions of higher rank tensors, for example $X^{IJKL}_2 X_{IJ}X_{KL}$, with new higher rank terms being again non-conserved. Within the Boltzmann equation \cite{reynolds} one can consider these extra terms as related to moments of the Boltzmann equation, but our theory is ''bottom-up'' so, beyond these terms encoding microscopic correlations of some sort \cite{meeft}, we can say nothing about them except their symmetry properties.
A topic which we did not elaborate is the role of the entropy in this dynamics. The conservation of the entropy current arises as an equation of motion if the non-dissipative Lagrangian in section \ref{secideal} is analyzed in terms of its equations of motion rather than the energy-momentum tensor. To investigate the entropy current systematically in terms of the Lagrangian, we would need a quantitative relation between action and entropy. In the adiabatic limit (microscopic DoFs are parametrically faster than macroscopic ones) we can use Matsubara's prescription \cite{kapustagale}
\begin{equation}
t \rightarrow \frac{i}{T} ,\phantom{AA} S_{quantum} \rightarrow \frac{F}{T}{,}
\end{equation}
(where $S_{quantum}$ is the action of the quantum theory, $F$ is the free energy and $T$ the temperature)
together with the semiclassical limit ($T_0 \rightarrow \infty$. Note that expansion beyond this limit is uncorrelated from the gradient expansion \cite{mevisc,burch}. It generally goes as $T_0 \sim g^{-1}$, so $\sim N_c^{-2}$ in $SU(N_c)$ Gauge theories)
\begin{equation}
\label{semiclassical}
F=T \ln Z ,\phantom{AA} Z \simeq \exp\left(T_0^4 S_{minimum} \right){,}
\end{equation}
and the definition of the CTP formalism \cite{grozdanov} of Eq. \ref{ctp} it is clear that the macroscopic entropy of a fluid at temperature $T$ will be
\begin{equation}
s = \frac{1}{T} \int_0^T dT' \int_0^{2\pi} \mathcal{L}\left(\phi_{\pm}(x,t=e^{i\theta/T'} \right) d\theta d^d x {.}
\end{equation}
These relations ensure that there is a one to one correspondence between the lagrangian terms in the effective theory and the entropy current, which needs to be investigated term by term.
In the ideal limit, where the mixing term in Eq. \ref{ctpdef} vanishes, this entropy is simply equal to {$T_0^3 B^{1/2}$} and is conserved, but, as elucidated in \cite{galley}, dissipative terms generally introduce ``violations'' of Noether's theorem via sources in the unobserved part of the system. Entropy conservation is of course the most well-known of such violations. For $T \ll T_0$ we should recover the entropy formulae in \cite{grozdanov}.
Hence, the formulae argued for in \cite{romdev}
{\begin{equation}
\partial_\mu (s u^\mu) = \partial_\mu (\sqrt{B} u^\mu) \sim \left. 0\right|_{i=0} + \left. \Pi_{\mu \nu} \Pi^{\mu \nu} \right|_{i \ge 1}{,}
\end{equation}
where i corresponds to gradient order }
can be justified from the Lagrangian description. Higher order terms in the effective Lagrangian with couplings between $X_{IJ}$ and gradients of $B$ will therefore also enter in the entropy current. In a sense, the non-decrease of entropy in this formulation is equivalent to the Lagrangian being bound from below, which reinforces the connection between our work and \cite{shipu,marrochio}{.}
This ``semiclassical'' limit, though, is likely to severely underestimate entropy formation at {\em low} viscosity, for the first of the terms in the inequality required for hydrodynamics to hold \cite{betz,burch,mevisc}
\begin{equation}
\label{hyerarchy}
\frac{1}{T_0} \ll \frac{\eta}{Ts} \ll \frac{1}{\partial u}{,}
\end{equation}
will inevitably break down as $\eta \rightarrow 0$. In this case Eq. \ref{semiclassical} will also break down and one will have to do the full functional integral, with $T_0$ as the coupling constant, ie replace in Eq. \ref{semiclassical}
\[\ e^{S_{minimum}(B,X)} \rightarrow \int \mathcal{D} \left[B,X\right] e^{T_0^4 \int \mathcal{L}(B,X) d^4 x}{,} \]
Relatively elementary considerations, such as the fact that vortices, which require no energy to form, do not propagate suggests the expansion around $T_0$ is hihgly non-perturbative, possibly necessitating nomerical methods to be properly taken into account. {Physically, this means that excitations of macroscopic degrees of freedon $\phi_I$ and $X$, and coupling of these to microscopic degrees of freedom, gives a non-negligible description of the entropy{.} }
{The most likely appearanche of such degrees of freedom is within the variables $A_{IJ}^{\mu \nu}$ of Eq. \ref{aijdef}, classically forbidden within the ideal hydrodynamic limit, as shown by the first efforts to simulate this system numerically \cite{burch}. }
Such effects might be crucial in the low viscosity high flow limit, where the phenomenon of turbulence \cite{landau} occurs in the classical limit.
In our picture, turbulence can be understood as the occurrence of multiple irregularly distributed minima and saddle points in the action as a function of field configurations (Fig. \ref{turbo}). In this limit deviations from the semiclassical approximations are likely to dominate even for ``small gradients'', precisely because $T_0 \sim \ave{\partial u}$, and the EFT expansion likely breaks down \cite{eftfail,meeft}.
Such dynamics might have a role in clarifying the mysteries the phenomenon of turbulence still yields. Since $T_0$ in equation \ref{hyerarchy} is proportional to the distance scale of {\em microscopic} DoFs, $\order{1000(100fm^3)^{-1}}$ in a heavy ion collision (or $10^4/m^3$ in a cold atom system), such corrections, as yet completely unexplored, could become crucial to connect our EFT to phenomenology. Naively, the fluctuation-driven mixing of turbulent and microscopic degrees of freedom will shorten microscopic thermalization, invalidating ``hydrodinamicization'' scenarios such as \cite{chesler}, at least beyond the planar limit.
\begin{figure}[t]
\includegraphics[height=0.2\textheight]{action_turbo.jpg}
\caption{\label{turbo}The profile of the action in a "turbulent" system (small viscosity and well away from the hydrostatic limit), and a qualitative sketch of the role of corrections of gradient and $T_0$ terms{.}
}
\end{figure}
Effective field theories emerge from renormalization group flow of microscopic theories. Hydrodynamics is ultimately {\em not} different, except for the fact that the effective Lagrangian must be non-unitary to take into account entropy exchanges between the microscopic and macroscopic scales \cite{meeft}. Furthermore, this exchange assumes the existence of a microscopic scale which is not invariant under macroscopic transformations, requiring terms non-invariant under rescaling even in a theory which macroscopically is invariant under such transformations.This is manifest at first order already, since viscosity, ultimately due to a "physical" microscopic scale, is represented by terms that violate rescaling diffeomorphisms. {Given these considerations, any strongly-coupled relativistic microscopic field theory should in principle coarse-grain to something like Eq. \ref{Hyexpansion2} provided coarse-graining is done within the CTP formalism, as suggested in \cite{polctp}{.} }
In conclusion, we have shown that the Lagrangian formalism incorporates naturally both the Navier-Stokes and the Israel-Stewart terms of hydrodynamics, and naturally explains the appearance and scaling of these terms in a way that is somewhat model-dependent and ad hoc in other approaches. We await to see to what extent this proof can be generalized to arbitrary order.
\textit{Acknowledgements} GT acknowledges support from FAPESP proc. 2014/13120-7 and CNPQ bolsa de produtividade 301996/2014-8. DM would like to acknowledge CNPQ graduate fellowship n. 147435/2014-5
We would like to thank Jorge Noronha, Saso Grozdanov and Jun Takahashi for discussions and suggestions.
|
\section{Introduction}
\label{sec:intro}
With the advent of Web 2.0, a large number of platforms including e-commerce sites, discussion forums, blogs etc. have emerged that allow users to express their opinions regarding various businesses, products and services. These opinions are usually in the form of reviews, each consisting of text feedback describing various aspects of the product along with a single numeric rating representing the users' overall sentiment about the same \cite{mcauley2012learning}. Such user review ratings are normally aggregated to provide an overall product rating, which help other people form their own opinion and help them make an informed decision during purchase. However, in case of new products, there is a time delay till a sufficient number of ratings that give a `complete picture' of the product can be obtained. In such a scenario, the seller of the product may find it useful to identify a few people whose ratings, when combined together, reflect this `complete picture'. The seller may then invite these people to review the product and, as a result, reduce the time delay involved in getting the `true' product rating.
Review text is unstructured and inherently noisy. But it can be a valuable source of information since users justify their ratings through such text \cite{mcauley2013hidden}. Users tend to express their sentiments about different aspects of a product in the review text and provide a rating based on some combination of these sentiments \cite{ganu2009beyond}. However, some users are influenced heavily by one particular aspect of the product and this is reflected in their ratings. For example: While reviewing smartphones, the ratings provided by a user may be influenced heavily by just the battery-life, irrespective of the quality of other aspects of the phone. Similarly, while reviewing restaurants, some users' ratings may correlate with the ambience of the restaurant or the level of service provided. We call such users as `representative users' since their ratings tend to `represent' one particular dimension of the product.
Although latent factors obtained from ratings data have been used extensively for rating prediction,
\FloatBarrier
\begin{figure*}[t]
\centering
\includegraphics[scale=0.11]{overview}
\caption{An overview of our proposed method}
\label{figure:overview}
\end{figure*}
\FloatBarrier
\noindent very few previous works have attempted to combine both review text and ratings. Our approach combines latent topics obtained from review text with users' rating data to learn representative users for each product. This enables us to predict ratings for new products by just looking at the ratings of a small set of users, even when no review text is available. In traditional methods, product ratings are obtained by modelling the product factors from ratings data. However, \cite{mcauley2013hidden} suggest that this approach is not accurate in case of new products due to the lack of sufficient number of ratings. They, in turn, propose a model which fits product factors from a few review texts. Our approach is free from both these constraints.
In this study, we use the topic model Multi-Grain Latent Dirchlet Allocation (MG-LDA) described in \cite{titov2008modeling} on restaurant reviews obtained from Yelp\footnote{\url{http://www.yelp.com}} to obtain latent topics that correspond to ratable aspects of the restaurants. Since we segregate the reviews on the basis of restaurant category, we notice some interesting variations across different cuisines. The words associated with the extracted topics are then used to perform review segmentation where we identify the sentences that describe each topic. This also enables us to analyse the sentiment expressed regarding each topic in a review. We then capture the intuition of representative users to learn a set of users who best represent each topic. Latent topic ratings for restaurants are then obtained by aggregating the ratings of those users who represent that topic. The overall ratings of new restaurants are then predicted using a regression model. An overview of the proposed method is shown in Figure~\ref{figure:overview}.
We also show how this concept could be used to better understand rating behaviour across different cuisines. For example: What do people who visit French restaurants care most about - food, service or value for money? How is this different from people who visit Italian restaurants?
The rest of the paper is structured as follows. Section~\ref{sec:papers} provides a review of related work. Section~\ref{sec:methodology} describes our proposed method. In Section~\ref{sec:experiments}, we describe the experiments performed and report the results of our evaluation. Section~\ref{sec:end} concludes the paper with a summary of the work and the scope for future work.
\section{Related Work}
\label{sec:papers}
One of the earliest attempts at rating prediction that combines both review text and ratings is \cite{ganu2009beyond}. However, their review segmentation method differs from ours in that their work depends on manual annotation of each review sentence into pre-determined domain-specific aspects and the training of separate classifiers for each aspect. Furthermore,
\FloatBarrier
\begin{figure*}[t]
\centering
\includegraphics[scale=0.5]{segmentation}
\caption{Review Segmentation}
\label{figure:segmentation}
\end{figure*}
\FloatBarrier
\noindent it does not capture the variation that may exist within the domain. For example: The aspects that affect ratings for French restaurants (e.g. `Drinks (wine)', `Deserts' etc.) may be different from those of Indian restaurants (e.g. `Flavour (spiciness)', `Variety' etc.). \cite{wang2010latent} approach the problem of segmentation by measuring the overlap between each sentence of the review and the seed words describing each aspect. However, these aspect seed words are chosen manually which are, again, domain-specific.
Topic models are normally used to make the segmentation task transferable across different domains. The problem of mapping such topics into aspects is studied in \cite{titov2008joint,lu2011multi,brody2010unsupervised,mcauley2012learning,jo2011aspect}. \cite{titov2008joint,mcauley2012learning} use explicit aspect ratings as a form of weak supervision to identify rated aspects while \cite{lu2011multi} use manually selected aspect seed words as a form of weak supervision. To remove the dependence on aspect ratings and aspect seed words, \cite{jo2011aspect} develop a model that captures aspects using a set of sentiment seed words while \cite{brody2010unsupervised} present an unsupervised method for extracting aspects by automatically deriving the sentiment seed words from review text. It is important to note that we do not map the latent topics we obtain into explicit aspects since it is not necessary for our final goal.
Rating prediction is also studied in \cite{gupta2010capturing,moghaddam2011ilda,baccianella2009multi} where the authors focus on multi-aspect rating prediction and in \cite{mcauley2013hidden} where the authors build a recommendation system using a combination of latent dimensions obtained from rating data and latent topics obtained from review text.
\section{Methodology}
\label{sec:methodology}
\subsection{Dataset and Preprocessing}
\label{ssec:data}
We use the Yelp Challenge Dataset\footnote{\url{http://www.yelp.com/dataset_challenge}} consisting of around 1.12 million reviews of more than 42000 restaurants across 4 countries. These reviews are provided by more than 250000 users. Reviews contain a single star rating, text, author etc. Details of restaurants like average star rating, categories (cuisine) etc. are also available. We segment the restaurants according to its category since we would like to better understand the variation that exists across different cuisines. Note that we ignore the fact that certain restaurants may have multiple categories. For example: Some Indian restaurants may also serve Thai food.
We tokenize the review text along whitespaces, remove all punctuation and stop-words, and lemmatize the words using the NLTK Wordnet lemmatizer described in \cite{bird2009natural}.
\subsection{Topic Extraction}
\label{ssec:mglda}
We run the topic model multi-grain LDA described in \cite{titov2008modeling} on a corpus of restaurant reviews obtained from a single cuisine to extract $K$ latent topics. Unlike standard topic
\FloatBarrier
\begin{table*}[t]
\begin{tabular}{|c|c|l|}
\hline
Cuisine & Interpreted Topic & \multicolumn{1}{c|}{Top Words} \\ \hline
\multirow{5}{*}{Indian} & Variety & buffet,lunch,dish,vegetarian,menu,selection,option,good,item,great \\ \cline{2-3}
& Food & chicken,masala,tikka,curry,naan,lamb,dish,paneer,tandoori,ordered \\ \cline{2-3}
& Flavour & spicy,spice,flavour,dish,hot,curry,food,like,sauce,taste \\ \cline{2-3}
& Value & price,portion,food,meal,get,two,small,little,rice,bit \\ \cline{2-3}
& Atmosphere & restaurant,place,nice,decor,inside,strip,little,clean,like,table,look \\ \hline
\multirow{5}{*}{Italian} & Food (Pizza) & pizza,crust,good,cheese,sauce,slice,thin,like,wing,great,topping \\ \cline{2-3}
& Food (Salad) & salad,bread,cheese,garlic,tomato,fresh,sauce,olive,delicious,oil \\ \cline{2-3}
& Service & service,staff,friendly,server,owner,customer,waiter,always,attentive \\ \cline{2-3}
& Location & place,restaurant,location,strip,little,find,italian,away,parking,right \\ \cline{2-3}
& Value & food,good,price,better,much,pretty,like,quality,portion,worth,nothing \\ \hline
\multirow{5}{*}{French} & Drinks & menu,wine,course,tasting,glass,bottle,ordered,selection,meal,two \\ \cline{2-3}
& Dessert & dessert,chocolate,cream,cake,ice,coffee,sweet,creme,tart,also,good,souffle \\ \cline{2-3}
& Food (Bread) & bread,egg,french,butter,good,toast,delicious,fry,cheese,fresh,croque \\ \cline{2-3}
& Food & cheese,salad,soup,onion,ordered,good,french,delicious,appetizer,lobster \\ \cline{2-3}
& Service Time & table,minute,time,wait,reservation,waiter,get,seated,server,took,order,got \\ \hline
\end{tabular}
\caption{Local topics for Indian, Italian and French restaurants obtained using MG-LDA}
\label{table:mglda}
\end{table*}
\FloatBarrier
\noindent modeling methods such as LDA and PLSA, which extract topics that correspond to global properties of a product, MG-LDA extracts much finer topics that correspond to ratable aspects of the product. To extract topics at such granular level, the model generates terms which are either chosen at the document level or chosen from a sliding window\footnote{A sliding window is a set of fixed number of adjacent sentences.}. The terms chosen from the sliding window correspond to the fine topics.
\subsection{Review Segmentation and Sentiment Analysis}
\label{ssec:mapping}
Once cuisine-specific latent topics are obtained, the review segmentation task is performed where each review sentence $s_i$ is assigned to one of the latent topics $t_k$. The purpose of this task is to understand which sentences of the review discuss which of the topics. The topic assignment is made as follows:
\begin{equation}
Topic(s_i)=\operatorname*{arg\,max}_k \sum_{w\in{t_k}}count (w, s_i) * P(w|t_k)
\end{equation}
where w is the word associated with each topic, count(w, $s_i$) is the count of word w in sentence $s_i$ and $P(w|t_k)$ is the probability as determined from the word distributions obtained using the MG-LDA model.
For every review, the sentences that discuss each topic are identified as shown in Figure~\ref{figure:segmentation}. It is therefore possible to determine the sentiment expressed by the review author regarding each latent topic by averaging over the sentiments of its constituent sentences. We use the implementation TextBlob\footnote{\url{http://www.textblob.readthedocs.org/en/dev/}}, which is based on the Pattern\footnote{\url{http://www.clips.ua.ac.be/pattern}} library, to determine the polarity of each sentence. The polarity is obtained in the range of [-1, 1].
\subsection{User Segmentation}
\label{ssec:rep. users}
We then proceed to learn the representative users for each latent topic. First, the feature vector $\theta^{overall}_u$ is obtained for each user $u$ where each feature represents the users' review rating for a restaurant. We assume that each user writes only one review per restaurant. Similarly, $\theta^{t_k}_u$ is obtained where each feature represents the users' sentiment regarding topic $t_k$.
The influence of a topic on a users' rating is determined by calculating the Pearson's correlation between $\theta^{overall}_u$ and $\theta^{t_k}_u$. Only users who have provided a minimum of 5 reviews are considered. A user-topic correlation matrix $C$ is thus obtained which indicates the dimensions along which each
\FloatBarrier
\begin{figure*}[t]
\centering
\includegraphics[scale=0.5]{graphs}
\caption{Number of Representative Users for various cuisines}
\label{figure:graphs}
\end{figure*}
\FloatBarrier
\noindent user tends to rate restaurants. Simply put,
\begin{equation}
C(u,t_k)=PearsonCorr(\theta^{overall}_u,\theta^{t_k}_u)
\end{equation}
The representative users for a topic are those users whose $C(u,t_k)$ value is above a certain threshold $T$ for that particular topic. It is important to note that $C(u,t_k)$ value may not be available for all user-topic pairs since every user may not express sentiments regarding every topic.
\subsection{Rating Prediction}
\label{ssec:prediction}
We calculate the topic ratings of restaurants once we obtain a list of representative users for each latent topic. This rating is calculated as the average of the review ratings that are provided by the representative users of that particular topic. In case there are no representative users for a particular topic for that particular restaurant, this rating is calculated as the average of the other latent topic ratings. Such topic ratings provide some indication of the quality of various aspects of the restaurant (like food, service etc.), although we do not explicitly calculate the aspect ratings or map the topics to aspects.
Since the overall restaurant rating can be thought of as some combination of the ratings for food, service, atmosphere etc., we try to combine the latent topic ratings in some way. For this purpose, we fit a Support Vector Regression (SVR) model with radial basis function kernel on the latent topic ratings and use it to predict the overall rating of restaurants. During test time, just the ratings provided by a few representative users would be enough to obtain the overall restaurant rating. Such a rating takes into account the different dimensions of the restaurant and provides a `complete picture' of the restaurant.
\section{Experiments and Analysis}
\label{sec:experiments}
We use the topic model MG-LDA on a set of 8000 reviews each of Indian, Italian, French and Greek restaurants. The number of global topics is set at $K_{glo}=40$ and local topics at $K_{loc}=15$ (After trying various combinations, we found that this combination provides the best results. Previous works have also used a similar number of topics). The length of the sliding window is set at 2 and all the other parameters for the model is set at 0.1. We run the chain for 1000 iterations. While the global topics are ignored, some select local topics as determined by the model are shown in Table~\ref{table:mglda}. We try to interpret the topics manually by looking at the constituent words. Usually, around 5-6 local topics are ambiguous and difficult to interpret.
A quick look at the topics obtained shows us the variation that exists among different cuisines. For example: While Indian restaurants have `Flavour' and `Variety' as topics; Italian restaurants have `Drinks'; French restaurants have `Drinks' and `Dessert' as topics. Greek restaurants have `Cooking Style' as a topic with words like dry, fry, fresh, cooked, soft, tender etc. Also, certain words like table, minute, time, wait, hour, bar, seated etc. appear together in case of French and Italian restaurants signaling, perhaps, a long wait to get seated at such restaurants.
Review segmentation is then performed on around 8500 reviews of Indian restaurants, 61000 reviews of Italian restaurants and 17000 reviews of French restaurants, where each sentence is assigned to one of the 15 latent topics. Sentiment analysis is conducted and the user-topic correlation matrix is obtained for each restaurant category.
Using the user-topic correlation matrix, we segment the users according to each latent topic. Figure~\ref{figure:graphs} shows the number of representative users for each topic for different correlation thresholds $T$. For the sake of clarity, we only show those latent topics that could be interpreted by us. It is interesting to observe that people who visit Indian restaurants tend to care the most about `Location' and `Value (Pricing)' and the least about `Service' and `Atmosphere'. On the other hand, people who visit French restaurants care the most about `Food (Bread)' and `Food (Main)' and the least about `Atmosphere'. Similarly, while providing ratings, more number of users are influenced by the `Atmosphere' at Greek restaurants than `Food'. We then proceed to obtain the latent topic ratings for each restaurant. For this purpose, we only select those users whose correlation threshold, $T >= 0.4$ as representative users. For each latent topic, we average over the ratings provided by such users to obtain the topic ratings (out of 5). It is therefore possible to obtain crude ratings for aspects like `Food', `Service' etc. which give an indication of the quality of the aspects. We then fit an SVR model, the performance of which is described below.
\subsection{Evaluation}
\label{ssec:eval}
To evaluate the performance of rating prediction, we determine the RMSE between the actual and predicted ratings for Italian restaurants. We compare the RMSE for MG-LDA and online LDA described in \cite{hoffman2010online}. In case of LDA, we detect $K = 50$ topics as in previous works. We use the latent topic ratings of 640 restaurants for training and 215 restaurants for test. The results are shown in Table~\ref{table:eval1}.
\FloatBarrier
\begin{table}[h]
\begin{center}
\begin{tabular}{|l|c|}
\hline
\multicolumn{1}{|c|}{Models} & RMSE \\ \hline
\begin{tabular}[c]{@{}l@{}}(a) MG-LDA, SVR with rbf kernel\\ (Proposed Model)\end{tabular} & 0.4909 \\ \hline
(b) MG-LDA, SVR with linear kernel & 0.5377 \\ \hline
(c) LDA, SVR with rbf kernel & 0.5812 \\ \hline
(d) LDA, SVR with linear kernel & 0.6277 \\ \hline
(e) Baseline 1 & 0.6737 \\ \hline
(f) Baseline 2 & 0.5831 \\ \hline
\multicolumn{2}{|c|}{Improvement} \\ \hline
\multicolumn{1}{|c|}{(a) vs. (e)} & 27\% \\ \hline
\multicolumn{1}{|c|}{(a) vs. (f)} & 16\% \\ \hline
\end{tabular}
\end{center}
\caption{Evaluation (Italian Restaurants)}
\label{table:eval1}
\end{table}
\FloatBarrier
An RMSE of 0.4909 is obtained when using MG-LDA and SVR with rbf kernel. Each restaurant has an average of 22 representative users. Inviting these users to rate new restaurants would help in predicting the `true' restaurant rating (which is the rating obtained once a considerable number of users have rated the restaurant over a period of time). However, conventional methods just average over their ratings, without taking into account the different topics that they represent. Such an approach gives an RMSE of 0.6737 (Baseline 1). Our approach outperforms this method by 27\%. Also, since most people provide a rating of 3, 3.5 or 4 when rating restaurants, predicting a constant rating every time may also give a reasonable result. We find that predicting a rating of 3.64 (average over the test set) every time results in an RMSE of 0.5831 (Baseline 2). Our approach outperforms such a constant classifier by 16\%.
We repeat the same procedure for Indian restaurants by using the latent topic ratings of 120 restaurants for training and 40 restaurants for test. The results are shown in Table~\ref{table:eval2}.
\FloatBarrier
\begin{table}[h]
\begin{center}
\begin{tabular}{|c|c|}
\hline
Models & RMSE \\ \hline
MG-LDA, SVR with rbf kernel & 0.4635 \\ \hline
MG-LDA, SVR with linear kernel & 0.5795 \\ \hline
LDA, SVR with rbf kernel & 0.5734 \\ \hline
LDA, SVR with linear kernel & 0.6997 \\ \hline
\end{tabular}
\end{center}
\caption{Evaluation (Indian Restaurants)}
\label{table:eval2}
\end{table}
\FloatBarrier
\section{Conclusion and Future Work}
\label{sec:end}
In summary, we show how latent topics in review text could be used to unlock hidden value in user reviews. We utilise the intuition that, while rating products, certain users are influenced heavily by one particular aspect of the product. We learn such users by detecting the sentiments expressed by them with regard to each latent topic and then by comparing these sentiments with the actual ratings provided. We also use this to draw some interesting insights regarding users' rating behaviour across different cuisines and obtain latent topic ratings for restaurants. Overall ratings, which take into account the different dimensions of the restaurant, are then obtained using a regression model.
In the future, we would like to show that this approach is transferable to other domains like e-commerce. Also, it would be interesting to segregate the reviews by star ratings as this would help us understand the factors that a restaurant is getting right and those they are getting wrong. For example: The dimensions corresponding to review text having 5-star ratings would be different from those having 1-star ratings.
\bibliographystyle{acl}
|
\section{Introduction}
In neural networks, `plasticity' of synapses refers to their connection rearrangements and changes in strengths over time. Over the past decade, a plethora of learning rules have been proposed which are capable of training networks of spiking neurons through various forms of synaptic plasticity \citep{gardner2015,Kuhlmann2014,Sporea2013,Chronotron,ReSuMe_neco,Gutig2006,Brader2007,Arthur2006,Gerstner2002,Moore2002,Mel2001}. A large majority of these works have explored weight plasticity where a neural network is trained by modifying (strengthening or weakening) of the synaptic strengths. We identify another unexplored form of plasticity mechanism termed as structural plasticity that trains a neural network through formation and elimination of synapses. Since structural plasticity involves changing the network connections over time, it does not need the provision to keep high-resolution weights. Hence, it is inherently a low resolution learning rule. Such a type of low-resolution learning rule is motivated by the following biological observations:
\begin{enumerate}
\item Biological experiments have shown that the strength of synaptic transmission at cortical synapses can experience considerable fluctuations ``up" and ``down" representing facilitation and depression respectively, or both, when excited with short synaptic stimulation and these dynamics are distinctive of a particular type of synapse \citep{Thomson1993,Markham1996,Varela1997,Hempel2000}. This kind of short-time dynamics is in contrary to the traditional connectionist models assuming high-resolution synaptic weight values and conveys that synapses may only have a few states.
\item Moreover, another experimental research on long-term potentiation (LTP) in the hippocampus region of the brain revealed that excitatory synapses may exist in only a small number of long-term stable states, where the continuous grading of synaptic efficacies observed in common measures of LTP may exist only in the average over a huge population of low-resolution synapses with randomly staggered thresholds for learning \citep{Petersen1998}.
\end{enumerate}
Since the learning happens through formation and elimination of synapses, structural plasticity has been used to train networks of neurons with active dendrites and binary synapses \citep{Mel2001,Hussain2014_nc,roy_biocas1,roy_tbcas,Roy_MOT_tnnls_2015}. These works demonstrated that networks constructed of neurons with nonlinear dendrites and binary synapses and trained through structural plasticity rules can obtain superior performance for supervised and unsupervised pattern recognition tasks.
However, till now structural plasticity has been employed as a learning rule only in the context of neurons with non-linear dendrites and binary synapses. We identify that it is a generic rule and can be tailored to train any neural network thereby allowing it to evolve in low-resolutions. We intend to venture into this domain and as a first step we have chosen to modify the sparse recurrent connections of a liquid or reservoir of Liquid State Machine (LSM) \citep{Maass2002} constructed of standard Leaky Integrate and Fire (LIF) neurons through structural plasticity and study its effects. In our algorithm, structural plasticity happening in longer timescales is guided by a fitness function updated by a STDP inspired rule in shorter timescales. In contrast to the recently proposed algorithms that aim to enhance the LSM performance by evolving its liquid \citep{Xue2013,Hourdakis2013,Notley2012,Obst2012}, our structural plasticity-based training mechanism provides the following advantages:
\begin{enumerate}
\item For hardware implementations, the `choice' of connectivity can be easily implemented exploiting Address Event Representation (AER) protocols commonly used in current neuromorphic systems where the connection matrix is
stored in memory. Unlike traditional algorithms modifying and storing real-valued synaptic weights, online learning in real time scenarios is achieved by the proposed algorithm through only modification of the connection table stored in memory.
\item Due to the presence of positive feedback connections in liquid, training it through `weight plasticity' might lead to an average increase in synaptic weight and eventually take it to the unstable region. We conjecture that since our connection based learning rule keeps the average synaptic weight of the liquid constant throughout learning, it reduces the chance of leading the liquid into instability.
\end{enumerate}
The rest of the paper is organized as follows. In the following section, we shall discuss the LSM framework and throw some light on the previous works on LSM and structural plasticity. In Section \ref{unsup_str_plas}, we will propose the structural plasticity based unsupervised learning rule we have developed to train a liquid or reservoir composed of spiking neurons. In Section \ref{exp_res}, we shall share and discuss the results obtained from the experiments performed to evaluate the performance of our liquid. We will conclude the paper by discussing the implications of our work and future directions in the last section. We have included an Appendix section where we list the specification of the liquid architecture and values of parameters used in this article.
\section{Background and Theory}
In this section, we shall briefly describe the LSM framework and look into few works from the last few years that aspired to improve the liquid or reservoir of LSM. Next we shall briefly review few supervised and unsupervised structural plasticity learning rules.
\subsection{Theory of Liquid State Machine}
LSM \citep{Maass2002} is a reservoir computing method developed from the viewpoint of computational neuroscience by Maass et al. It supports real-time computations by employing a high dimensional heterogeneous dynamical system which is continuously perturbed by time-varying inputs. The basic structure of LSM is shown in Fig. \ref{fig:LSM}. It comprises three parts: an input layer, a reservoir or liquid, and a memoryless readout circuit. The liquid is a recurrent interconnection of a large number of biologically realistic spiking neurons and synapses. The readout is implemented by a pool of neurons which do not possess any lateral interconnections. The spiking neurons of the liquid are connected to the neurons of the readout. The liquid does not create any output, instead it transforms the lower dimensional input stream to a higher dimensional internal state. These internal states act as an input to the memoryless readout circuit which is responsible for producing the final output of LSM.
\begin{figure}[!t]
\begin{center}
\includegraphics[width=0.95\textwidth]{LSM_basic}
\caption{In this figure the LSM framework is shown. LSM consists of three stages with the first stage being the input layer. The input stage is followed by a pool of recurrent spiking neurons whose synaptic connections are generated randomly and are usually not trained. The next stage is a simple linear classifier that is selected and trained in a task-specific manner.}
\label{fig:LSM}
\end{center}
\end{figure}
Following \citep{Maass2002}, if $u(t)$ is the input to the reservoir, then the liquid neuron circuit can be represented mathematically as a liquid filter $L^M$ which maps the input function $u(t)$ to the internal states $x^M(t)$ as:
\begin{equation}
\label{eq1}
x^M(t)=(L^Mu)(t)
\end{equation}
The next part of LSM i.e. the readout circuit takes these liquid states as input and transforms them at every time instant $t$ into the output $y(t)$ given by:
\begin{equation}
\label{eq2}
y(t)=f^M(x^M(t))
\end{equation}
The liquid circuit is general and does not depend on the problem at hand whereas the readout is selected and trained in a task-specific manner. Moreover, multiple readouts can be used in parallel for extracting different features from the internal states produced by the liquid. For more details on the theory and applications of LSM, we invite the reader to refer to \citep{Maass2002}.
\subsection{Previous research on improvement of liquid}\label{research_liquid}
In \citep{Xue2013}, a novel Spike Timing Dependent Plasticity (STDP) based learning rule for generating a self-organized liquid was proposed. The authors showed that LSM with STDP learning rule provides better performance than LSM with randomly generated liquid. \citet{Ju2013} have studied in detail the effect of the distribution of synaptic weights and synaptic connectivity in the liquid on LSM performance. In addition, the authors have proposed a genetic algorithm based rule for the evolution of the liquid from a minimum structure to an optimized kernel having an optimal number of synapses and high classification accuracy. The authors of \citep{Hourdakis2013} have used the Fisher’s Discriminant Ratio as a measure of the Separation Property of the liquid. Subsequently, they have used this measure in an evolutionary framework to generate liquids with suitable parameters, such that the performance of readouts get optimized. \citet{Sillin2013} implemented a reservoir by using Atomic Switch Networks (ASN) that is capable of utilizing nonlinear dynamics without needing to control or train the connections in the reservoir. They showed a method to optimize the physical device parameters to maximize efficiency for a given task. \citet{Schliebs2012} have proposed an algorithm to dynamically vary firing threshold of the liquid neurons in presence of neural spike activity such that LSM is able to achieve both a high sensitivity of the liquid to weak inputs as well as an enhanced resistance to over-stimulation for strong stimuli. \citet{Wojcik2012} simulated the LSM by forming the liquid with Hodgkin-Huxley neurons instead of LIF neurons as used in \citep{Maass2002}. They have done a detailed analysis of the influence of cell electrical parameters on the Separation Property of this Hodgkin-Huxley liquid. In \citep{Notley2012}, Notley et al. have proposed a learning rule which updates the synaptic weights in the liquid by using a tri-phasic STDP rule. \citet{Frid2012} have proposed a modified version of LSM which can successfully approximate real-valued continuous functions. Instead of providing spike trains as input to the liquid, they have directly provided the liquid with continuous inputs. Moreover, they have also used neurons with firing history dependent sliding threshold to form the liquid. In \citep{Hazan2012}, the authors have shown that LSM in its normal form is less robust to noise in data but when certain biologically plausible topological constraints are imposed then the robustness can be increased. The authors of \citep{Schliebs_ijcnn_2011} have presented a liquid formed with stochastic spiking neurons and termed their framework as pLSM. They have shown that due to the probabilistic nature of the proposed liquid, in some cases pLSM is able to provide better performance than traditional LSM. In \citep{RheAume2011}, the authors have proposed novel techniques for generating liquid states to improve the classification accuracy. First, they have presented a state generation technique which combines the membrane potential and firing rates of liquid neurons. Second, they have suggested representing the liquid states in frequency domain for short-time signals of membrane potentials. Third, they have shown that combination of different liquid states lead to better performance of the readout. \citet{Kello2010} have presented a self-tuning algorithm that is able to provide a stable liquid firing activity in the presence of a varied range of inputs. A self-tuning algorithm is used with the liquid neurons that adjusts the post-synaptic weights in such a way that the spiking dynamics remain between sub-critical and super-critical. In \citep{Norton2010}, the authors have proposed a learning rule termed as `Separation Driven Synaptic Modification (SDSM)' for training the liquid, which is able to construct a suitable liquid in fewer generations than random search.
\subsection{Previous research involving Structural Plasticity}
\citet{Mel2001} showed that supervised classifiers employing neurons with active dendrites i.e. dendrites having lumped non-linearities and binary synapses can be trained through structural plasticity to recognize high-dimensional Boolean inputs. Inspired by \citep{Mel2001}, \citet{Hussain2014_nc} proposed a supervised classifier composed of neurons with non-linear dendrites and binary synapses suitable for hardware implementations. In \citep{roy_biocas1,roy_tbcas} this classifier was upgraded to accommodate spike train inputs and a spike-based structural plasticity rule was proposed that was amenable for neuromorphic implementations. In \citep{Roy_MOT_tnnls_2015} another supervised spike-based structural plasticity rule inspired from Tempotron \citep{Gutig2006} was proposed for training a threshold-adapting neuron with active dendrites and binary synapses. Moreover, an unsupervised spike-based strutural plasticty learning rule was proposed in \citep{Roy_unsup_2015} for training a Winner-Take-All architecture composed of neurons with active dendrites and binary synapses.
Till now, the works related to structural plasticity that we showcased in this subsection have been confined to networks employing neurons with nonlinear dendrites and binary synapses. In recent years, structural plasticity has been used to train generic neural networks as well. For example, in \citep{George2015a}, a STDP learning rule interlaced with structural plasticity was proposed to train feed-forward neural networks. In \citep{George2015b}, this work was modified and applied to a highly recurrent spiking neural network. In these two works, the synaptic weights are modified by STDP and when a critical period is reached, the synapses are pruned through structural plasticity. Unlike these works, that implement an interplay between STDP and structural plasticity, in the proposed learning rule structural plasticity or connection modifications happen on longer timescales (at the end of patterns) which is guided by the fitness function or correlation coefficient updated by a STDP inspired rule in shorter timescales (at each pre- and post-synaptic spike). In the following section, we will propose our connection based unsupervised learning rule.
\section{Unsupervised structural plasticity in liquid} \label{unsup_str_plas}
The liquid is a three-dimensional recurrent architecture of spiking neurons that are sparsely connected with synapses of random weights. We used Leaky Integrate and Fire (LIF) neurons and biologically realistic dynamic synapses to construct our liquids. The specifications of the architecture and the parameter values are listed in the Appendix and unless otherwise mentioned, we use these values in our experiments. In the proposed algorithm, learning happens through formation and elimination of synapses instead of the traditional way of updating real-valued weights associated with them. Hence, to guide the unsupervised learning, we define a correlation coefficient based fitness value $c_{ij}(t)$ for the synapse (if present) connecting the $j^{th}$ excitatory neuron to the $i^{th}$ excitatory neuron, as a substitute for its weight. Since the liquid neurons are sparsely connected, $c_{ij}(t)$'s are defined only for the neuron pairs that have synaptic connections. Note that the proposed learning rule only modifies the connections between excitatory neurons. The operation of the network and the learning process comprises the following steps whenever a pattern is presented:
\begin{itemize}
\item $c_{ij}(t)$ is initialized as $c_{ij}(t=0)=0 \; \forall$ excitatory neuron pairs $(i,j)$ having a synaptic connection from the $j^{th}$ to the $i^{th}$ neuron. Here, $L_e$ is the number of excitatory liquid neurons and $i\in{0,1,...L_e} \; \& \; j\in{0,1,...L_e}$. Note that $L$ is the total number of neurons in the liquid which comprises of $L_e$ excitatory and $L_i$ inhibitory neurons.
\item The value of $c_{ij}(t)$ is depressed at pre-synaptic and potentiated at post-synaptic spikes according to the following rule:
\begin{enumerate}
\item Depression: If a post-synaptic spike of the $j^{th}$ excitatory neuron appears after some time delay $\delta_{ij}$ as a pre-synaptic spike to the $i^{th}$ excitatory neuron at time $t^{pre}$, then the value of $c_{ij}(t)$ is updated by a quantity $\Delta c_{ij}(t^{pre})$ given by:
\begin{equation}
\Delta c_{ij}(t^{pre})= -\;\bar{f}_{i}(t^{pre})
\end{equation}
where $f_i(t)$ and $\bar{f}_{i}(t)= K(t) \ast f_i(t)$ are the output and the post-synaptic trace of the $i^{th}$ excitatory spiking neuron. In this work we have chosen an exponential form of $K(t)$ given by $K(t)= I_0 (e^{-t/\tau_s}-e^{-t/\tau_f})$.
\item Potentiation: If the $i^{th}$ excitatory neuron fires a post-synaptic spike at time $t^{post}$ then $c_{ij}(t)$ for each synapse connected to it is updated by $\Delta c_{ij}(t^{post})$ given by:
\begin{equation}
\Delta c_{ij}(t^{post})=\bar{e}_{j}(t^{post})
\end{equation}
where $\delta_{ij}$ and $\bar{e}_{j}(t) = K(t) \ast f_{j}(t-\delta_{ij})$ are its delay and the pre-synaptic trace of the spiking input it receives.
\end{enumerate}
A pictorial explanation of this update rule of $c_{ij}(t)$ is shown in Fig. \ref{fig:pre_post_pre}.
\begin{figure}[!t]
\centerline{
\includegraphics[width=0.9\textwidth]{pre_post_update_explained}}
\caption{An example of the update rule of fitness value ($c_{ij}(t)$) associated with the synapse connecting the $j^{th}$ excitatory neuron to the $i^{th}$ excitatory neuron is shown. When a post-synaptic spike is emitted by excitatory neuron $i$ at $t^{post3}$, the value of $c_{ij}(t)$ increases by $\bar{e}_{j}(t^{post3})$. On the other hand, when excitatory neuron $j$ emits a post-synaptic spike at $t^{post2}$, it reaches neuron $i$ at $t^{pre2} = t^{post2} + \delta_{ij}$ due to the presence of synaptic delay. The arrival of a pre-synaptic spike at $t^{pre2}$ reduces $c_{ij}(t)$ by $\bar{f}^{i}(t^{pre2})$ as shown in the figure.}
\label{fig:pre_post_pre}
\end{figure}
\item After the network has been integrated over the current pattern, the synaptic connections of the excitatory neurons which have produced at least one spike are modified.
\item If we consider that $Q$ out of $L_e$ excitatory neurons have produced a post-synaptic spike for the current pattern, then the synaptic connections of the $q^{th}$ neuron $\forall \; q=1,2...,Q$ is updated by tagging the synapse ($s_{min}^{q}$) having the lowest value of correlation coefficient out of all the synapses connected to it, for possible replacement.
\item To aid the unsupervised learning process, randomly chosen sets $R^{q}$ containing $n_R$ of the $L_e$ excitatory neurons are forced to make connections to the $q^{th}$ neuron through silent synapses having same physiological parameters as $s_{min}^{q} \; \forall \; q=1,2...,Q$. We term these synapses as ``silent" since they do not contribute to the computation of the neuron's membrane voltage $V^n(t)$ - so they do not alter the liquid output when the same pattern is re-applied. The value of $c_{qj}(t)$ is calculated for synapses in $R^{q}$ and $s_{min}^{q}$ is replaced with the synapse having maximum $c_{qj}(t)$ ($r_{max}^{q}$) in $R^{q}$ $\forall q=1,2...,Q$ i.e. the pre-synaptic neuron connected to $s_{min}^{(q)}$ is swapped with the pre-synaptic neuron connected to $r_{max}^{q}$.
\item All the $c_{ij}$ values are reset to zero and the above-mentioned steps are repeated for every pre- and post-synaptic spike. The proposed learning rule is explained by demonstrating the connection modification of a single neuron in Fig. \ref{fig:swapping}.
\end{itemize}
\begin{figure} [!t]
\centering
\includegraphics[width=0.95\textwidth, height = 7.5cm]{swapping_explained}
\caption{(Caption in the following page.)}
\label{fig:swapping}
\end{figure}
\addtocounter{figure}{-1}
\begin{figure} [t!]
\caption{In this figure, the proposed learning rule is explained by showing an example of synaptic connection modification. After the presentation of a pattern, a set of excitatory neurons $Q$ produces output spikes. Although connection modification takes place for all the neurons in set $Q$, the $47^{th}$ excitatory neuron is randomly chosen for this example and all the stages of its connection modification are shown in (a)-(e). The $15^{th}$, $33^{rd}$, $64^{th}$ and $79^{th}$ excitatory neurons are connected to the $47^{th}$ excitatory neuron as shown in (a). Above each connection or synapse we mention the $c_{i,j}$ associated with that synapse. Moreover, below each synapse we mention the set of physiological parameters $P_{i,j} = \{w_{ij}, \delta_{ij}, \tau_{ij}, U_{ij}, D_{ij}, F_{ij}\}$ associated with it which includes the weight ($w_{ij}$), delay ($\delta_{ij}$), synaptic time constant ($\tau_{ij}$) and the $U_{ij}$, $D_{ij}$ and $F_{ij}$ parameters. Note that the $U_{ij}$, $D_{ij}$ and $F_{ij}$ parameters are only applicable for dynamic synapses. The $c_{ij}$ values of all the connections are checked at the end of the pattern and the one having the minimum value ($s_{min}^{47}$) is identified. In this example the connection from the $64^{th}$ excitatory neuron is identified as the minimum $c_{ij}$ connection and tagged for replacement (b). In the next step (c) a randomly chosen set of excitatory neurons are forced to make connections to the $47^{th}$ neuron through silent synapses. Note that the physiological parameters for these silent synapses are set to $P_{64,47}$ i.e. same as the synapse connecting the $64^{th}$ excitatory neuron to the $47^{th}$ excitatory neuron. The next step involves identifying the silent synapse having the maximum value of $c_{ij}$ i.e. $r_{max}^{47}$ which is the connection from the $52^{nd}$ excitatory neuron. Subsequently, our learning rule swaps these connections to form the updated morphology as shown in ((d)-(e)). \\}
\end{figure}
\section{Experiments and results} \label{exp_res}
In this section, we will describe the experiments performed to evaluate the performance of our algorithm and discuss the obtained results. We will employ various metrics to explore different properties of our liquid and compare it with the traditionally used randomly generated liquid. Moreover, we will compare its performance with another algorithm that performs iterative refining of liquids.
\subsection{Separation capability} \label{sep_cap}
In this sub-section, we throw some light on the computational power of our liquid trained by structural plasticity by evaluating its separation capability on spike train inputs. As a first test, we choose the \emph{pairwise separation property} considered in \cite{Maass2002} as a measure of its kernel quality. First, we take a spike train pair $u(t)$ and $v(t)$ of duration $T_p = 1$ sec and give it as input to numerous randomly generated liquids having different initial conditions in each trial. In this experiment, while the inputs remain same, the liquids are different for different trials. The resulting internal states of the liquid $x_u^M(t)$ and $x_v^M(t)$ are noted for $u(t)$ and $v(t)$ respectively. We calculate the average Euclidean norm $||x_u^M(t)-x_v^M(t)||$ between these two internal states and plot them in Fig. \ref{pairwise1} and \ref{pairwise2} against time for various fixed values of distance $d(u(t),v(t))$ between the two injected spike trains $u(t)$ and $v(t)$. To compute the distance between $u(t)$ and $v(t)$ we use the same method proposed in \citep{Maass2002}. Moreover, we show the Pairwise Separation obtained at each trial at the output of the liquid which is given by the following formula:
\begin{equation}
\textrm{Pairwise Separation} = \sum\limits_{n \;\;s.t. \;\; 0 < t_n < T_p} ||x_u^M(t_n)-x_v^M(t_n)||
\end{equation}
where the liquid output is sampled at times $t_n$.
\begin{figure} [!t]
\centering
\subfloat[]{\includegraphics[width=0.5\textwidth]{same_in_diffn_liq_d0}}
\subfloat[]{\includegraphics[width=0.5\textwidth]{same_in_diffn_liq_d1}}
\caption{(Caption in the following page.)}
\label{pairwise1}
\end{figure}
\addtocounter{figure}{-1}
\begin{figure} [t!]
\caption{Same input, different liquid: In this figure, we compare the \emph{pairwise separation property} of randomly generated liquids and the same liquids when trained through the proposed unsupervised structural plasticity based learning rule. While the blue lines indicate the separation capability of randomly generated liquids, the red lines are obtained by evolving the same liquids by the proposed algorithm. For this simulation, in each trial the connections are updated for 15 iterations. In each iteration one connection update happens for each spike train of the pair and hence the liquid encounters 30 connection modifications during training. In this figure, (a) shows that the noise level of both the random and the learnt liquid is similar. Hence, during training our learning rule does not induce extra noise. Moreover, (b) depicts that liquid trained by structural plasticity is able to obtain more separation than random liquids for $d(u(t),v(t)=$ 0.1 for all the trials. \\}
\end{figure}
\begin{figure} [!t]
\centering
\subfloat[]{\includegraphics[width=0.5\textwidth]{same_in_diffn_liq_d2}}
\subfloat[]{\includegraphics[width=0.5\textwidth]{same_in_diffn_liq_d3}}
\caption{Same input, different liquid: In this figure, the experiment performed to generate Fig. \ref{pairwise1} has been repeated for input spike train pairs of distance $d(u_(t),v_(t)=$ 0.2 (a) and 0.4 (b). Similar to Fig. \ref{pairwise1}(b) the trained liquids demonstrate more separation for all trials.}
\label{pairwise2}
\end{figure}
In Fig. \ref{pairwise1} and Fig. \ref{pairwise2}, the blue curves correspond to the traditional randomly generated liquid with no evolution as proposed in \cite{Maass2002} and the red curves correspond to the scenario when the same randomly generated liquid (for each trial) is trained through structural plasticity. Hence, the blue curves indicate the initial condition for generation of the red curves. In Fig. \ref{pairwise1}(a) i.e. the curves for $d(u(t),v(t)) = 0$ are generated by applying the same spike train to two randomly chosen initial conditions of the liquid. Hence, these curves show the noise level of the liquid. Fig. \ref{pairwise1}(b), Fig. \ref{pairwise2}(a) and Fig. \ref{pairwise2}(b) correspond to $d(u(t),v(t)) = 0.1$, $d(u(t),v(t)) = 0.2$ and $d(u(t),v(t)) = 0.4$ respectively. The parameters of the liquids are kept as shown in Table \ref{params_table} in the Appendix . Fig. \ref{pairwise1}(a) depicts that the separation of the liquid states are similar for both the methods. This demonstrates that the noise level is same for both the liquids. On the other hand, Fig. \ref{pairwise1} (b) and Fig. \ref{pairwise2}(a)-(b) show that the proposed algorithm is able to produce liquid states with more separation than the traditional liquid with no evolution. In other words, morphologically evolved liquids are better in capturing and amplifying the separation between input spike trains as compared to randomly generated liquids.
In the next experiment, we use the same liquid for all trials but vary the input spike pairs. 500 different spike train pairs $u_i(t)$ and $v_i(t)$ (here $i$ varies from 1 to 500) of distance $d(u_i(t),v_i(t)) = 0.2$ are generated and given as input to the same liquid separately. The internal state distance separation for all the trials are averaged and plotted in Fig. \ref{same_liq_diff_in} against time for both the random and trained liquids. The input spike trains typically tend to produce peaks and troughs in the state distance plot. They appear at different regions for different input spike trains. However, these peaks and troughs average out in Fig. \ref{same_liq_diff_in} since we take the mean of state distances obtained from 500 trials with different inputs. This figure clearly depicts that a liquid trained through structural plasticity consistently shows higher separation than a random liquid for different inputs.
\begin{figure}[!t]
\begin{center}
\includegraphics[width=0.7\textwidth]{same_liq_diff_in}
\caption{Same liquid, different input: In this figure, the same liquid is excited by 500 different input spike trains and the separation between the internal state distances are recorded. The resulting state distance, averaged over 500 trials, is plotted for both the randomly generated liquid and the same liquid when trained through structural plasticity. It is clear that the trained liquid always produces more separation than the random liquid at its output.}
\label{same_liq_diff_in}
\end{center}
\end{figure}
Moreover, to evaluate the separability across a wide range of input distances, we generate numerous spike train pairs having progressively increasing distances and note the internal state distances of both the random and trained liquids. While the state distances at $t = T_p = 1 \; sec$ for both the random and trained liquids are plotted in Fig. \ref{d_out_vs_d_in}(a), their ratio is shown in Fig. \ref{d_out_vs_d_in}(b). Fig. \ref{d_out_vs_d_in}(a) and Fig. \ref{d_out_vs_d_in}(b) suggest that for inputs with smaller distance, which might correspond to the intra-class separation during classification tasks, the separability provided by both the liquids are close. On the other hand, when the distance between inputs increase, which might correspond to inter-class separation for classification tasks, the separation provided by trained liquids are more than random liquid. According to Fig. \ref{d_out_vs_d_in}(b) the ratio of separation provided by our liquid trained by structural plasticity and random liquid increases and finally saturates at ~1.36. Hence, our trained liquid provides 1.36 $\pm$ 0.18 times more inter-class separation than a random liquid while maintaining a similar intra-class separation. The increased separation achieved by our morphological learning rule provides the subsequent linear classifier stage with an easier recognition problem.
\begin{figure} [!t]
\centering
\subfloat[]{\includegraphics[width=0.48\textwidth]{d_out_vs_d_in_abs}}
\subfloat[]{\includegraphics[width=0.48\textwidth]{d_out_vs_d_in_rat}}
\caption{(a) The internal state distances (averaged over 200 trials) of randomly generated liquids and the same liquids when trained through structural plasticity is plotted against the distances between the input spike trains. While at lower input distances (intra-class) the separation achieved by both are similar, the trained liquid provides more separation at higher input distances (inter-class). (b) The ratio (averaged over 200 trials) of state distance obtained by trained and random liquids gradually increases with input distance and saturates approximately at 1.36 $\pm$ 0.18.}
\label{d_out_vs_d_in}
\end{figure}
The \emph{pairwise separation property} is a good measure of the extent to which the details of the input streams are captured by the liquid's internal state. However, in most real-world problems we require the liquid to not only produce a desired internal state for two, but for a fairly large number of $m$ significantly different input spike trains. Although we could test whether a liquid can separate each of the $m \choose 2$ pairs of such inputs, we still would not know whether a subsequent linear classifier would be able to generate given target outputs for these $m$ inputs. Hence, a stronger measure of kernel quality is required. \cite{Maass05} addressed this issue and proposed a rank-based measure termed as the \emph{linear separation property} as a more suitable metric for evaluating a liquid's kernel quality or computational power. Although for the sake of completeness we discuss here how this quantitative measure is calculated for $m$ given spike trains, we invite the reader to look into \citep{Maass05} for its detailed proof.
The method for evaluating the \emph{linear separation property} for a liquid C for $m$ different spike trains is shown in Fig. \ref{rank_measure}. First, these spike trains are injected into the liquid and the internal its states are noted (Fig. \ref{rank_measure}(a)-(c)). Next, a $L \times m$ matrix $M_s$ is formed (Fig. \ref{rank_measure}(d)) for all the inputs $u_1(t), u_2(t),..,u_i(t),..., u_m(t)$, whose columns are the liquid states $x_{u_i}^M(T_p)$ resulting at the end of the preceding input spike train $u_i$ of duration $T_p$. \cite{Maass05} suggested that the rank $r_s$ of matrix $M_s$ reflects the \emph{linear separation property} and can be considered as a measure of the kernel quality or computational power of the liquid $C$, since $r_s$ is the `number of degrees of freedom' that a subsequent linear classifier has in assigning target outputs $y_i$ to these inputs $u_i$. Hence, a liquid with more computational power or better kernel quality has a higher value of $r_s$. The proposed unsupervised learning rule modifies the liquid connections after the end of each pattern. Hence in real-time simulations, where patterns are presented continuously, the connections within our liquid are modified through structural plasticity in an online fashion. To show that the online update generates liquids with progressively better kernel quality, we plot in Fig. \ref{sep_gen_comb} the value of the mean rank $r_{s,mean}$ against the number of spike trains ($N_p$) applied to the circuit. $r_{s,mean}$ is calculated by taking an average of the ranks $r_s$ obtained from each trial. In a real world implementation the liquid connections will get updated without any intervention and hence calculation of rank is not required. However, to probe into the performance of our learning rule, we create the matrix $M_s$ after each input is presented based on all the input spike trains at our disposal and calculate its rank $r_s$. The curves presented in Fig. \ref{sep_gen_comb} are generated by applying 100 different spike trains to liquids having random initial states for each trial. Each point in the curves is averaged over 200 trials. Fig. \ref{sep_gen_comb} clearly shows that the average rank $r_{s,mean}$ increases as more number of inputs are presented until it reaches saturation. This suggests that our proposed unsupervised structural plasticity based learning rule is capable of generating liquids with more computational power as compared to the traditional method of randomly generating the liquid connections. Note that the point in the curve $r_{s,mean}=35.48$ corresponding to $N_p=1$ reflects the kernel quality or computational power of the traditional randomly generated liquid. The proposed algorithm is able to generate liquids having $r_{s,mean}=72.87$ i.e. 2.05 $\pm$ 0.27 times better than random liquids.
\begin{figure}[!htbp]
\begin{center}
\includegraphics[width=0.95\textwidth]{rank_calculation}
\caption{In this figure we explain the process of creating the matrix $M_s$, the rank of which is used to assess the quality of a liquid. (a) $m$ different input spike trains of duration $T_p$ are shown. (b) The input spike trains are injected into the liquid having $L$ neurons to obtain the post-synaptic spikes from all the neurons. $F_{u_i}^M(t)$ denotes the firing profile of the liquid when the $i^{th}$ input spike train is presented. (c) $F_{u_i}^M(t)$ is passed through an exponential kernel to generate the liquid's internal states $x^M_{u_i}(t)$. (d) The internal states at the end of the spike trains i.e. $x^M_{u_i}(T_p)$ are read for each input spike train, to create the matrix $M_s$. }
\label{rank_measure}
\end{center}
\end{figure}
\begin{figure} [!htbp]
\centering
\includegraphics[width=0.7\textwidth]{sep_gen_comb}
\caption{(Caption in the following page.)}
\label{sep_gen_comb}
\end{figure}
\addtocounter{figure}{-1}
\begin{figure} [t!]
\caption{This figure shows the rank of the matrices $M_s$ and $M_g$, averaged over 200 trials and denoted by $r_{s,mean}$ and $r_{g,mean}$ respectively, against the number of input spike trains $N_p$ presented in succession. At each point of the curves, the rank is calculated based on all the spike trains. Hence, the value of $r_{s,mean}$ and $r_{g,mean}$ for $N_p=1$ corresponds to a randomly generated liquid. Our learning rule trains this randomly generated liquid through structural plasticity as the input spike trains are gradually presented. The curve shows that $r_{s,mean}$ gradually increases until it reaches saturation at $N_p=41$. Moreover, this figure depicts that by applying an unsupervised low-resolution training mechanism, we are able to generate liquids with 2.05 $\pm$ 0.27 times more computational power or better kernel quality as compared to traditional randomly liquids. Furthermore, this figure throws some light on the generalization performance of liquids trained through our proposed structural plasticity based learning rule. The matrix $M_g$ is formed from liquids produced at each stage of training corresponding to the evolution of $r_{s,mean}$. Its rank (averaged over 200 trials) denoted by $r_{g,mean}$ is plotted against the number of different input spike trains $N_p$ presented successively presented to the liquid. The almost flat line represents that our learning rule can retain the generalization ability of random liquids. At a particular value of $N_p$, $r_{s,mean}$ and $r_{g,mean}$ are calculated based on the same liquid thereby providing an insight to both its separation and generalization property. \\}
\end{figure}
\subsection{Generalization capability}
Till now we have looked into the separation capability of a liquid to assess its computational performance. However, this is only one piece of the puzzle with another being its capability to \emph{generalize} a learned computational function to new inputs i.e. input it has not seen during the training phase. It is interesting to note that \cite{Maass05} suggested using the same rank measure used in Sec. \ref{sep_cap} to measure a liquid's generalization capability. However, in this case, the inputs to the liquid are entirely different from the ones used in Sec. \ref{sep_cap}. For a particular trial, a single spike train is considered and $s$ noisy variations of it are created to form the set $S_{univ}$. In other words, $S_{univ} = \{ u_1(t), u_2(t), ......, u_s(t)\}$ contains many jittered versions of the same input signal. Similar to Sec. \ref{sep_cap} a $L\times s$ matrix $M_{g}$ is formed by injecting these spike trains into a liquid and by noting the liquid states resulting at the end of the preceding input spike train $u_i$ of duration $T_p$. However, unlike Sec. \ref{sep_cap} a lower value of rank $r_{g}$ of the matrix $M_{g}$ corresponds to better generalization performance. To assess our liquid's generalization capability we provide $s=100$ input spike trains to the liquids produced at each stage of learning corresponding to the evolution of $r_{s,mean}$ curve in Fig. \ref{sep_gen_comb} and note the average rank $r_{g,mean}$ of matrix $M_{g}$. $r_{g,mean}$. $r_{g,mean}$ vs. the number inputs ($N_p$) presented to the liquid is shown in Fig. \ref{sep_gen_comb}. An almost flat curve shown in Fig. \ref{sep_gen_comb} suggests that our morphologically trained liquids are capable of retaining the generalization performance shown by random liquids. This revelation combined with the insight from Sec. \ref{sep_cap} suggests that our trained liquids are capable of amplifying the inter-class separation while retaining the intra-class distances for classification problems.
\subsection{Generality}
By performing the previous experiments we got a fair idea about the separation and generalization property of our trained liquids. Next, we look into its generality i.e. whether the trained liquid is still general enough to separate inputs which it has not seen before and which are not related (noisy, jittered, etc.) to the training inputs in any way. We consider the initial random liquid before training and the final trained liquid after training on 100 spike train inputs of Fig. \ref{sep_gen_comb} from each trial and separately inject both of them with 500 different spike train pairs $u_i(t)$ and $v_i(t)$ having $d(u(t),v(t)) = 0.2$. We note the average state distances of both the liquids for these 500 spike train pairs for the current trial. This experiment is repeated for each trial of Fig. \ref{sep_gen_comb} and the mean state distances are shown in Fig. \ref{generality}. It is clear from the two closely placed curves of Fig. \ref{generality} that the trained and random liquids show similar generality. We conclude that even if a liquid is trained on a set of inputs, it is still fairly general to previously unseen significantly different inputs.
\begin{figure}[!t]
\begin{center}
\includegraphics[width=0.7\textwidth]{generality_final}
\caption{In this figure, we assess the effect of training on the generality of liquids. The blue and the red curves (averaged over 200 trials) correspond to the separation of random and trained liquids respectively when they are injected with 500 previously unseen and significantly different (with respect to the training set) input spike train pairs of distance $d(u(t),v(t)) = 0.2$. The comparable curves obtained by both the random and trained liquids suggest that our structural plasticity rule does not decrease a liquid's generality.}
\label{generality}
\end{center}
\end{figure}
\subsection{Fading memory}
Till now we discussed the \emph{separation} property, \emph{generalization} capability and generality of liquids. Another component which defines a liquid is its \emph{fading memory}. Since a liquid is a recurrent interconnection of spiking neurons, the effect of an input applied to it may be felt at its output even after it is gone. A liquid with a superior fading memory is able to remember a given input activity for a longer duration of time. To study the effect of our structural plasticity rule on a liquid's fading memory we performed the following experiment. First, an input spike train of duration $T_p=1 sec$ was generated having a burst of spikes at a random time. Next, this spike train was injected into a randomly generated liquid and the post-synaptic spikes of its neurons were recorded. Subsequently, this liquid was trained through our learning rule and the same spike train was reapplied. This experiment was repeated N times for different spike trains and liquids and time of the last spike at the liquid output were noted for all these trials to compute the following measure:
\begin{equation}
TLS_{diff} = \frac{1}{N} \sum\limits_{i=1}^{N} \left( t_i^{tr,last} - t_i^{ran,last} \right)
\end{equation}
where $t_i^{ran,last}$ and $t_i^{tr,last}$ are the time to last spike at the output of random and trained liquids for the $i^{th}$ trial. The computed metric $TLS_{diff}$ serves as a parameter to assess the amount of additional fading memory provided by our training mechanism. For our simulations we keep N=200.
\begin{figure}[!htbp]
\begin{center}
\includegraphics[width=0.95\textwidth]{memory_comparison}
\caption{(a) An input spike train with a burst of spikes around 500 $ms$ is presented to a randomly generated liquid. Its output is shown and the portion of its output where spikes are present is magnified. (b) The random liquid is taken and trained by our structural plasticity rule. Subsequently, it is injected with the same input spike train and its output (along with the magnified version) is shown. Comparing the last two figures of (a) and (b) it is clear that our learning rule endows the liquid with a higher fading memory.}
\label{memory_comparison}
\end{center}
\end{figure}
In Fig. \ref{memory_comparison}, we show the outcome of a single trial. Fig. \ref{memory_comparison}(a) shows that an input spike train with a burst of spikes around 500 $ms$ is given as input to a random liquid and its corresponding output is recorded. We train this random liquid through the proposed algorithm and show in Fig. \ref{memory_comparison}(b) its output when the same spike train is reapplied. It can be seen from Fig. \ref{memory_comparison} that $t_i^{ran,last}=$ 0.6128 $secs$ and $t_i^{tr,last}=$ 0.6929 $secs$ i.e. the last spike provided by the trained liquid occurs 80.1 $ms$ after the one provided by the random liquid. Combining the result from all the trials we obtain that trained liquids provide $TLS_{diff}=$ 83.67 $\pm$ 5.79 $ms$ longer fading memory than random liquids having 92.8 $\pm$ 5.03 $ms$ fading memory. This experiment suggests that the fading memory of a liquid can be increased by applying structural plasticity.
\subsection{Liquid connectivity}
In the previous sections, we have analyzed the output of our morphologically trained liquids in various ways and for different inputs. Here we will delve into the liquid itself, and analyze the effect of our learning rule on the recurrent connectivity. Fig. \ref{connectivity_update} shows a representative example of the conducted experiments which depicts the number of post-synaptic connections each neuron in the liquid has before (Fig. \ref{connectivity_update}(a)) and after (Fig. \ref{connectivity_update}(b)) training on $N_p$=100 distinct spike trains. The triangles in Fig. \ref{connectivity_update} identifies the neurons which have the input spike train as a pre-synaptic input. While the number of post-synaptic connections are distributed uniformly across the neurons of the random liquid as shown in Fig. \ref{connectivity_update}(a), in Fig. \ref{connectivity_update}(b) we see that some neurons have more post-synaptic connections compared to others. Since the number of connections are same for both Fig. \ref{connectivity_update}(a) and Fig. \ref{connectivity_update}(b), during learning the post-synaptic connections of some neurons increase while the others decrease.
\begin{figure}[!htbp]
\begin{center}
\includegraphics[width=0.95\textwidth]{lin_sep_connectivity_analysis}
\caption{(a) The number of post-synaptic connections vs. the neuron index is shown before training i.e. for the random liquid. The connections are uniformly distributed across the neurons of the liquid. (b) The number of post-synaptic connections vs. the neuron index is shown after the training is complete. The connections get rearranged during learning in such a way that after training some neurons have more post-synaptic connections than the others. Note that the total number of connections are same for both the figures since it remains constant throughout the learning procedure. Our learning rule does not create any new connections, instead, it reorganizes them. The downward-triangle denotes the neurons which have the input line as pre-synaptic connection. The figure reveals that most of the neurons having increased post-synaptic connections have the input line as a pre-synaptic connection. }
\label{connectivity_update}
\end{center}
\end{figure}
A close inspection of Fig. \ref{connectivity_update}(b) reveals that most of the neurons which have more post-synaptic connections than the others have the input line as a pre-synaptic connection. This essentially means that the neurons to which the input gets randomly distributed are more likely to be selected as a replacement during the connection swapping procedure (Sec. \ref{unsup_str_plas}) of our learning.
\subsection{Comparison with other works}\label{SDSM_comp_sec}
After its inception in \citep{Maass2002}, researchers have looked into improving the reservoir of Liquid State Machine and we have provided a brief survey of the same in Sec. \ref{research_liquid}. Out of the algorithms showcased in Sec. \ref{research_liquid}, we compare the proposed learning rule with the work, termed as SDSM, provided in \citep{Norton2010} since it is architecturally similar to our algorithm and iteratively updates a randomly generated liquid like us. The authors of \citep{Norton2010} derived a metric based on the separation property of the liquid and used it to update the synaptic parameters. We consider the pattern recognition task described in \citep{Norton2010} and compare the performance of the proposed algorithm with the results obtained by SDSM \citep{Norton2010}.
In this task, a dataset with variable number of classes of spiking patterns is considered. Each pattern has eight input dimensions and patterns of each class are generated by creating jittered versions of a random template. The random template for each class is generated by plotting individual spikes with a random distance between one another. This distance is drawn from the absolute value of a normal distribution with a mean of 10 $ms$ and a standard deviation of 20 $ms$. The amount of jitter added to each spike is randomly drawn from a normal distribution with zero mean and 5 $ms$ standard deviation. Similar to \citep{Norton2010}, we consider four, eight and twelve class versions of this problem. The number of training and testing patterns per class have been kept to 400 and 100 respectively.
For fair comparison, the readout and the experimental setup have been kept similar to \citep{Norton2010}. The readout is implemented by a single layer of perceptrons where each perceptron is trained to identify a particular class of patterns. The results are averaged over 50 trials and in each trial the liquid is evolved for 500 iterations. The liquids are constructed with LIF neurons and static synapses and the parameters have been set to the values listed in \citep{Norton2010}.
\begin{figure} [!htbp]
\centering
\subfloat[]{\includegraphics[width=0.7\textwidth]{SDSM_comp_sep}}\\
\subfloat[]{\includegraphics[width=0.7\textwidth]{SDSM_comp_acc}}
\caption{(a) Mean separation and (b) mean accuracy are shown for random liquids and for the same random liquid when trained separately through SDSM and the proposed structural plasticity based learning rule. The results depict that our algorithm outperforms the SDSM learning rule.}
\label{SDSM_comp}
\end{figure}
The liquid separation and classification accuracy for the testing patterns, averaged over 50 trials, are plotted in Fig. \ref{SDSM_comp}(a) and Fig. \ref{SDSM_comp}(b) respectively. It is evident from Fig. \ref{SDSM_comp} that LSMs with liquid evolved through structural plasticity obtain superior performance as compared to LSMs trained through SDSM and LSMs with random liquid. Quantitatively, our algorithm provides 9.30\%, 15.21\% and 12.52\% increase in liquid separabilities and 2.8\%, 9.1\% and 7.9\% increase in classification accuracies for four, eight and twelve class recognition tasks respectively, as compared to SDSM. Since the proposed learning rule creates liquids with higher separation as shown in Fig. \ref{SDSM_comp}(b), the readout is able to provide better classification accuracies.
\section{Conclusion}
In this article, we have proposed an unsupervised learning rule which trains the liquid or reservoir of LSM by rearranging the synaptic connections. The proposed learning rule does not modify synaptic weights and hence keeps the average synaptic weight of the liquid constant throughout learning. Since it only involves modification and storage of the connection matrix during learning, it can be easily implemented by AER protocols. An analysis of the `pairwise separation property' reveals that liquids trained through the proposed learning rule provide a 1.36 $\pm$ 0.18 times more inter-class separation while maintaining similar intra-class separation as compared to the traditional random liquid. Next we looked into the `linear separation property' and from the performed experiments it is clear that our trained liquids are 2.05 $\pm$ 0.27 times better than random liquids. Moreover, experiments performed to test the `generalization property' and `generality' of liquids formed by our learning algorithm reveal that they are capable of inheriting the performance provided by random liquids. Furthermore, we have shown that our trained liquids have 83.67 $\pm$ 5.79 $ms$ longer fading memory than random liquids providing 92.8 $\pm$ 5.03 $ms$ fading memory for a particular type of spike train inputs. These results suggest that our learning rule is capable of eliminating the weaknesses of a random liquid while retaining its strengths. We have also analyzed the evolution of internal connections of the liquid during training. Furthermore, we have shown that compared to a recently proposed method of liquid evolution termed as SDSM, we provide 9.30\%, 15.21\% and 12.52\% more liquid separations and 2.8\%, 9.1\% and 7.9\% better classification accuracies for four, eight and twelve class classifications respectively on a task described in Sec. \ref{SDSM_comp_sec}.
The plans for our future work include developing a framework that combines the proposed liquid with the readout proposed in \citep{roy_tbcas} which is composed of neurons with nonlinear dendrites and binary synapses and trained through structural plasticity. \citep{amitava_iscas_2015} have proposed a hardware implementation of this readout and the next step is to implement the proposed liquid in hardware. Subsequently, we will combine them to form a complete structural plasticity based LSM system and deploy it for real-time applications. Moreover, having achieved success in applying structural plasticity rules to train a generic spiking neural recurrent architecture, we will move forward to develop spike-based morphological learning rules for multi-layer feedforward spiking neural networks. We will employ these networks to classify individuated finger and wrist movements of monkeys \citep{NITISH1} and recognize spoken words \citep{Verstraeten}.
\section*{Appendix}
In this table, we list specification of the liquid architecture and values of the parameters used in this paper. Unless otherwise mentioned, these are the values used for the experiments.
\begin{longtable}{|p{.65\textwidth}|p{.3\textwidth}|}
\hline
\multicolumn{2}{|c|}{\textbf{Liquid specification}} \\
\hline Number of neurons ($L$) & 135\\
\hline Percentage of excitatory neurons ($\frac{L_e*100}{L}$) & 80\\
\hline Percentage of inhibitory neurons ($\frac{L_i*100}{L}$) & 20\\
\hline Structure & Single $15\times3\times3$ column\\
\hline Excitatory-excitatory connection probability & 0.3\\
\hline Excitatory-inhibitory connection probability & 0.2\\
\hline Inhibitory-excitatory connection probability & 0.4\\
\hline Inhibitory-inhibitory connection probability & 0.1\\
\hline
\hline \multicolumn{2}{|c|}{\textbf{Leaky Integrate and Fire (LIF) neuron parameters}} \\
\hline Membrane time constant & 30 $ms$\\
\hline Input resistance & 1 $M\Omega$\\
\hline Absolute refractory period of excitatory neurons & 3 $ms$\\
\hline Absolute refractory period of inhibitory neurons & 2 $ms$\\
\hline Threshold voltage & 15 $mV$\\
\hline Reset voltage & 13.5 $mV$\\
\hline Constant nonspecific background current & 13.5 $nA$\\
\hline
\hline \multicolumn{2}{|c|}{\textbf{Dynamic Synapse parameters}} \\
\hline Excitatory-excitatory $U_{mean}$ & 0.5\\
\hline Excitatory-excitatory $D_{mean}$ & 1.1 $sec$\\
\hline Excitatory-excitatory $F_{mean}$ & 0.05 $sec$\\
\hline Excitatory-inhibitory $U_{mean}$ & 0.05\\
\hline Excitatory-inhibitory $D_{mean}$ & 0.125 $sec$\\
\hline Excitatory-inhibitory $F_{mean}$ & 1.2 $sec$\\
\hline Inhibitory-excitatory $U_{mean}$ & 0.25\\
\hline Inhibitory-excitatory $D_{mean}$ & 0.7 $sec$\\
\hline Inhibitory-excitatory $F_{mean}$ & 0.02 $sec$\\
\hline Inhibitory-inhibitory $U_{mean}$ & 0.32\\
\hline Inhibitory-inhibitory $D_{mean}$ & 0.144 $sec$\\
\hline Inhibitory-inhibitory $F_{mean}$ & 0.06 $sec$\\
\hline Standard deviation of $U$, $D$ and $F$ & 50\% of respective mean\\
\hline Time constant of excitatory synapse ($\tau_s$) & 3 $ms$\\
\hline Time constant of inhibitory synapse & 6 $ms$\\
\hline Excitatory-excitatory transmission delay & 1.5 $ms$\\
\hline Transmission delay of other connections & 0.8 $ms$\\
\hline
\hline \multicolumn{2}{|c|}{\textbf{Structural Plasticity parameters}} \\
\hline Number of silent synapses ($n_R$) & 25\\
\hline Slow time constant of kernel $K$ ($\tau_s$) & 3 $ms$\\
\hline Fast time constant of kernel $K$ ($\tau_f$) & Very small positive value\\
\hline
\caption{Liquid specification and parameter values}
\label{params_table}
\end{longtable}
\subsection*{Acknowledgments}
Financial support from MOE through grant ARC 8/13 is acknowledged.
\bibliographystyle{chicago}
|
\section{Introduction}
Galaxy interaction plays an important role in the evolution of galaxies;
it enhances strong starbust activities (Larson \& Tinsley 1978; Joseph et al. 1984; Sanders et al. 1988),
induces nuclear and AGN feedback (Lehnert \& Heckman 1996; Heckman et al. 2000; Rupke et al. 2002),
enriches the intergalactic medium with outflows (Nath \& Trentham 1997; Scannapieco et al. 2002),
and grows the mass of stellar bulges and supermassive black holes (SMBHs) (Kormendy \& Richstone 1995; Magorrian et al. 1998; Gebhardt et al. 2000; Ferrarese \& Merritt 2000; Tremaine et al. 2002; Marconi \& Hunt 2003; Hopkins et al. 2005).
When two SMBHs coalesce at the final stage of galaxy interaction,
{\it a merged SMBH} can recoil from the host galaxy due to anisotropic emission of gravitational waves.
Recent simulations of merging black holes predict that the merged SMBH can attain a kick velocity of
a few hundred to a few thousands km s$^{-1}$ depending on mass ratios, spin magnitudes,
and spin orientations of the merging SMBHs (Campanelli et al. 2007; Schnittman 2007; Baker et al. 2008; Lousto \& Zlochower 2011).
If the merging SMBHs are of equal mass, are highly-spinning, and their spins are aligned along the orbital plane (superkick configuration),
recoil velocities as large as 4000 km s$^{-1}$ (Campanelli et al. 2007) to 5000 km s$^{-1}$ (Lousto \& Zlochower 2011) can be reached
and the recoiling SMBH (hereafter rSMBH) will eventually escape from the host galaxy (i.e., Merritt et al. 2004).
The rSMBH carries along with it the broad-line region (BLR) and leaves the starburst nucleus behind (Blecha et al. 2011; Sijacki et al. 2011).
Thus, they will have two observational characteristics:
i) broad emission lines will have velocity offsets with respect to the systemic velocity (Merritt et al. 2006; kinematic offset), and
ii) the center of the BLR will be spatially offset from stellar center of the host galaxy (spatial offset).
Bonning et al. (2007) conducted a search for rSMBHs by measuring kinematic offsets in the Sloan Digital Sky Survey (SDSS) DR3 QSO spectra,
but failed to detect any.
They placed upper limits on the incidence of rSMBHs in QSOs
of 0.2\% for kick velocities greater than 800 \hbox{km~s$^{-1}$}.
Their result suggests that the majority of the kick velocities might be a few hundreds \hbox{km~s$^{-1}$}\ or even less than 100 \hbox{km~s$^{-1}$}\
(i.e. Dotti et al. 2010). In such a case, broad emission lines from rSMBHs will be well
blended with the narrow emission lines, and a careful deblending is required to decompose each emission line component.
A similar systematic search was carried out by Eracleous et al. (2012), but mainly aimed at detecting close binary SMBHs
whose broad H$\beta$ emission lines are displaced from the quasar rest frame by more than 1000 \hbox{km~s$^{-1}$}.
By analyzing Hubble Space Telescope archival images of 14 nearby core ellipticals,
Lena et al. (2014) find evidence for small (10 pc) displacements between the AGN and host galaxy center in six of them.
They found that the displacement axis in 4 out of these 6 galaxies is aligned with the radio source axis
suggesting intrinsic asymmetries in radio jet power as a possible displacement mechanism.
Comerford \& Greene (2014) surveyed SDSS spectra
to search for offset AGNs that are produced by galaxy interaction
where one of the black holes is fueled as an AGN,
but they excluded sources with velocity offsets produced by rSMBHs.
One of the interesting rSMBH candidates so far is a CID-42 (also known as CXOC J100043.1+020637).
It has two compact optical sources separated by $\sim$2.5 kpc and has a large velocity offset ($\sim$1200 $\hbox{km~s$^{-1}$}$)
between the H$\beta$ narrow and broad emission line components (Civano et al. 2010).
Chandra observations find that the south-eastern source that has a point-like morphology typical of a bright
AGN is responsible for the whole X-ray emission in this system (Civano et al. 2012).
The north-western source has a more extended profile in the optical band with a scale length of $\sim$0.5 kpc.
Recent 3 GHz Karl G. Jansky Very Large Array (VLA) observations find that the entire observed 3 GHz radio emission can be
associated with the south-eastern component of this system (Novak et al. 2015).
Their finding preferred rSMBH picture but cannot rule out the presence of an obscured and radio-quiet SMBH in the north-western source.
Detection of rSMBHs will have a significant impact in astrophysics.
A scaling law between the SMBH mass and host galaxy bulge has been suggested by many correlations:
SMBH mass vs. bulge luminosity (Kormendy \& Richstone 1995; Marconi \& Hunt 2003),
bulge mass (Magorrian et al. 1998),
and stellar velocity dispersion (Gebhardt et al. 2000; Ferrarese \& Merritt 2000; Tremaine et al. 2002).
These correlations implicitly assume that the merged SMBH stays in the center of host galaxy.
If the recoil velocity is less than the escape velocity ($v_{\rm e}\approx$1500 km s$^{-1}$ in elliptical galaxies, i.e. Merritt et al. 2004), which is true in most cases (Dotti et al. 2010),
the rSMBHs will be oscillating about the center of their host galaxies (Blecha et al. 2011).
From numerical simulations, Blecha et al. (2011) predicted that the oscillating SMBHs may be up to five times less massive than their
stationary counterparts and could be a source of intrinsic scatter in the SMBH and stellar bulge mass scaling law.
The AGN feedback and outflow regulate starburst activity in merging galaxies,
but if the central AGN is displaced by a recoil event, it enhances star formation rates in the center of host galaxy (Blecha et al. 2011).
The oscillating SMBHs can also induce interesting results in unified models of AGN.
An obscured type 2 QSO with its BLR hidden by the molecular torus will appear as unobscured type 1 QSO during the recoil
oscillations, when moving beyond the torus scale (Komossa \& Merritt 2008).
The kicking mechanism of the rSMBH is due to an anisotropic radiation of the gravitational wave in merging black holes and
detection of the rSMBHs will be an indirect observational evidence of the existence of the gravitational wave.
Despite of these astrophysical importance, none of the rSMBHs has been positively identified yet.
Thus, we have undertaken spectral decomposition project for the nearby SDSS QSOs to identify rSMBHs.
The paper is divided into four sections.
In Section 2, the sample selection process of the rSMBH candidates is described.
The results and discussion are presented in Sections 3,
and a summary of the paper is presented in Section 4.
Throughout this paper, the cosmology H$_0$ = 70 km s$^{−1}$ Mpc$^{−1}$, $\Omega_M$ = 0.3, and $\Omega_\Lambda$ = 0.7 are adopted.
\section{Selection Process of the rSMBH Candidates}
To select rSMBH candidates, we used a complete sample of 1271 z $<$ 0.25 SDSS DR7 QSO (Schneider et al. 2010, hereafter SDSS QSO) spectra.
The size $r_k$ of the rSMBHs is given by
\begin{equation}
r_{\rm k} = {GM_{\rm BH}\over{v_{\rm k}^2}} \approx 0.4
\left({M_{\rm BH}\over{10^8\ {\rm M}_\odot}}\right)
\left({v_{\rm k}\over{10^3\ {\rm km\ s}^{-1}}}\right)^{-2} ~{\rm pc},
\end{equation}
where $M_{\rm BH}$ is mass of the black hole and $v_{\rm k}$ is the kick velocity (Merritt et al. 2009).
With typical values of $M_{\rm BH}=5\times 10^7 M_\odot$ and $v_{\rm k}$=200 $\hbox{km~s$^{-1}$}$, the size of rSMBH becomes $\sim$5 pc, which is large enough to carry BLR.
Thus, if the rSMBHs are recoiled from the host galaxy, broad emission lines will show velocity offsets with respect to systemic velocity.
Fig. 1 illustrates model spectra of H$\alpha +$ [N II] for an object with no velocity offset in broad-line (Fig. 1a),
a BLR coming toward us (blueshifted 200 km$^{-1}$ with respect to systemic, Fig. 1b),
and a BLR moving away from us (redshifted 200 km$^{-1}$ with respect to systemic, Fig. 1c).
As a first step for searching for rSMBH candidates,
we have visually inspected the SDSS QSO spectra and selected spectra showing blueshifted broad-line with respect to systemic as shown in Fig. 1b.
We favor blueshifts because it will be easier to see the rSMBHs coming toward us rather than moving away from us due to extinction in the host galaxy.
The broad-line velocity offsets can be produced by
gas motion in the accretion disk around a single BH (so called disk-emitters; Chen et al. 1989; Eracleous \& Halpern 1994; Chornock et al. 2010) or
binary SMBHs (Komossa et al. 2003; Zhou et al. 2004; Eracleous et al. 2012; Shen et al. 2013).
Thus, we have excluded spectra having widely separated and highly asymmetric two broad-line profiles (disk-emitters)
and double-peaked emission lines (binary SMBHs) in this stage.
For the systemic velocity, we used low-ionization (ionization potential = 10.36 eV) forbidden lines [S II]$\lambda 6716,6731$ which are expected to be less influenced by central engine.
If the [S II]$\lambda 6716,6731$ lines are not available, we used either [N II] $\lambda 6583$ or core component of [O III] $\lambda 5007$ lines since [O III] line often shows blueshifted wing component (i.e. Boroson 2005).
This step resulted in 124 candidates and for these objects, we have performed a detailed spectral decomposition.
In the spectral decomposition, we used the H${\alpha}$ line instead of the H${\beta}$ line since the H${\alpha}$ line is
about 3 times stronger than the H${\beta}$ line and free from Fe II line contamination.
We used the IRAF/Specfit package with 3 component fits: i) power-law continuum, ii) broad emission line, and iii) narrow emission line.
We applied a single Lorentzian or a single Gaussian profile for the H${\alpha}$ broad-line component and a single Gaussian profile for the H${\alpha}$ and [N II] narrow line components.
The same Gaussian line widths were used for the narrow emission lines of H${\alpha}$ and [N II], and
a fixed value of $1/3$ was used for the [NII]6548 to [NII]6583 line ratio.
From spectral decomposition, we have identified 37 rSMBH candidates whose H${\alpha}$ broad-lines are blueshifted
more than 1.5\AA\, which corresponds to instrumental dispersion of 69 km s$^{\rm -1}$ of the SDSS spectra, with respect to systemic velocity.
In this stage, we applied one more constraint before selecting the final rSMBH candidates.
It is known that line widths of H$\alpha$ and H$\beta$ broad-lines are well correlated (i.e. Eq. 3 of Greene \& Ho 2005).
This suggests that their line emitting gases are co-spatial.
Thus, if the H$\alpha$ broad-line velocity offset was produced by recoiling BLR,
we should see a similar amount of velocity offset in H$\beta$ broad-line too.
We have measured velocity offsets in the H$\beta$ broad-line using 4 components fit:
i) power-law continuum, ii) broad emission line, iii) narrow emission line, and iv) [Fe II] lines.
To select the final rSBMH candidates, we have applied the following arbitary selection criterion:
we excluded sources whose H${\beta}$ broad-line velocity offset is either
50\% smaller or 50\% larger than that of the H${\alpha}$ broad-line velocity offset.
After applying this criterion, the final number of rSMBH candidates becomes 26.
Fig. 2 shows correlation of velocity offset between the H${\alpha}$ and H${\beta}$ broad-lines,
\textbf{where solid and dotted lines are one-to-one correspondence and $\pm 50\%$ deviation from the one-to-one correspondence, respectively.
For the final 26 rSMBH candidates,} we see a good correlation of velocity offsets between H${\alpha}$ and H${\beta}$ broad-lines ($r=0.90$).
The H${\beta}$ broad-lines are on average $32\pm 38$ \hbox{km~s$^{-1}$} more blueshifted than the H${\alpha}$ broad-lines.
Fig. 3 shows results of spectral decompositions for H${\alpha}$ and H${\beta}$ lines for the final rSMBH candidates,
where black, cyan, blue, green, magenta, and red lines represent
data, power-law continuum, broad emission line, narrow emission lines, [O III] lines, and model (sum of all fitting components), respectively.
Dotted lines represent [Fe II] lines and vertical dotted line in each plot represents rest frame line center for the H${\alpha}$ and H${\beta}$ lines.
Fitting residuals (data/model in percentage) are shown on the bottom of each plot.
As mentioned earlier, we used Gaussian or Lorentzian profile to fit H${\alpha}$ broad-line,
but interestingly the H${\alpha}$ broad-line profiles for the rSMBH candidates are all found to be Lorentzian
which suggests they originate by a turbulent velocity field.
Carmona-Loaiza et al. (2015) find that turbulence dominates corotating inflows near the SMBHs and significantly enhance accretion activity.
Thus, turbulence could be a dominant velocity field in the accretion disk of the rSMBHs.
\section{Results and Discussion}
\subsection{Properties of rSMBH candidates}
Table 1 lists basic properties of the final 26 rSMBH candidates.
The fraction of the rSMBH candidates in SDSS QSO spectra with z $<$ 0.25 is $\sim$2\%.
If we assume the fraction of the rSMBH moving away from us has a similar fraction, about 4\% of the SDSS QSOs are rSMBHs.
\textbf{A histogram of projected recoil velocities measured from H${\alpha}$ broad-line is presented in Fig. 4a.
The projected recoil velocities range from $-76\ \hbox{km~s$^{-1}$}$ to $-307\ \hbox{km~s$^{-1}$}$ with an average of $-149\pm58\ \hbox{km~s$^{-1}$}$.
Except for one, all candidates have recoil velocities smaller than absolute value of $-220\ \hbox{km~s$^{-1}$}$.
The lack of detecting rSMBH candidates with large recoil velocities could be explained either by a finite size of SDSS fiber radius (see \S 3.2) or orbital configuration in merging black holes that produces large recoil velocities ($<-300\ \hbox{km~s$^{-1}$}$) is rare.
Fig. 4b shows a plot of recoil velocity vs. velocity dispersion of the rSMBH candidates.
Though the correlation is poor (r=0.17), we see a trend that the broad-line velocity offset
tends to increase with decreasing velocity dispersion.
Velocity dispersion has a linear correlation with mass (i.e. M-$\sigma$ relation).
Thus, the rSMBHs with large recoil velocities are more likely to be found in less massive galaxies
and the rSMBHs with small recoil velocities are more likely to be found in more massive galaxies.
This can naturally be understood in terms of escape velocity since massive galaxies have large escape velocities
and exert more gravitational drag to the rSMBHs and trap them to undergo oscillatory motion.
Infrared luminosity vs. velocity offset plot is presented in Fig. 4c where we see only a weak correlation (r=0.31).
}
\textbf{
The infrared luminosities for our sample range from 10$^{10.69}$ to 10$^{12.11}$ L$_\odot$ and
the corresponding range of star formation rates (SFR) estimated from Kennicutt \& Evans (2012, i.e. SFR/M$_\odot$yr$^{-1}$ = 1.5 $\times 10^{-10}$ L$_{FIR}$/L$_\odot$) are 7 to 190 M$_\odot$yr$^{-1}$.
Predicted SFRs in the center of SMBH-displaced host galaxies range from a few M$_\odot$yr$^{-1}$ (Blecha et al. 2011)
to a few $\times 10^3$ M$_\odot$yr$^{-1}$ (Sijacki et al. 2011).
Our estimated value fits in the middle of these two predictions.
}
The SDSS g, r, and i composite images, which are deep enough ($\sim26$ mag arcsec$^{-2}$, Kniazev et al. 2004) to detect tidal features, of the rSMBH candidates are presented in Fig. 5.
We find that one object shows strong tidal tails and is clearly interacting (J075819.69+421935.1),
four objects show short tidal tails (J080742.46+375332.1, J115341.16+101754.0, J130103.5+065711.7, and J155504.78+134335.8),
one object shows an off-center nucleus (J091617.53+303037.9), and
five objects have nearby companions (J085946.35+274534.8, J105752.69+105037.9,
J115632.23+112653.8, J145824.46+363119.5, and J163734.52+305403.5).
For these latter five sources, we do not see obvious signs of tidal interaction between main galaxy and its companion.
The fraction of tidal features in our candidates is about 23\% (6 out of 26).
\subsection{Implications of the recoils}
From the projected recoil velocities, we can estimate projected spatial offsets between the rSMBHs and center of host galaxy.
The projected recoil velocities are the radial components of the actual ones and
the projected spatial offsets are the transversal components of the actual ones.
If we assume random recoil direction (polar angle $\theta$ = azimuthal angle $\phi$ = 45$^\circ$) for ease of calculation,
the expected spatial offset will be the recoil velocity times the AGN lifetime.
Column 8 in Table 1 lists the expected spatial offsets calculated by adopting an AGN lifetime of 10 Myr for rSMBHs (Blecha et al. 2011).
The estimated spatial offsets are maximum values for the AGN lifetime of 10 Myr and range from 0.21$^{\prime\prime}$ \ to 1.97$^{\prime\prime}$ \ (0.79 kpc to 3.14 kpc) with a mean of 0.51$^{\prime\prime}$$\pm$0.35$^{\prime\prime}$ \ (1.52$\pm$0.59 kpc).
The adopted AGN lifetime of 10 Myr seems to be reasonable since all but one of the estimated separations fall within the SDSS fiber radius of 1.5$^{\prime\prime}$.
If the estimated spatial offsets were larger than 1.5$^{\prime\prime}$, it would not been observed with the SDSS spectrograph with 1.5$^{\prime\prime}$\ radius fiber.
If the SMBH is recoiled at z=0.2 to a random direction with recoil velocity of $\sim 470$\hbox{km~s$^{-1}$}, it will move outside of the SDSS fiber radius in 10 Myr.
The limited radius of SDSS fiber could explain why we couldn't detect high-velocity rSMBHs even if they exist.
The recoil velocities we have measured are only about 10\% to 20\% of the typical escape velocity in elliptical galaxy ($v_{\rm e}\approx$1500 km s$^{-1}$).
In such a case, the rSMBH candidates will undergo damped oscillations around the center of host galaxy (Gualandris \& Merritt 2008; Blecha et al. 2011).
Blecha et al. (2011) predicted that the oscillating SMBHs may be up to five times less massive than their
stationary counterparts and could be a source of intrinsic scatter in the SMBH and stellar bulge mass scaling law.
We have investigated this possibility from correlations of black hole mass (M$_{BH}$) vs. velocity dispersion ($\sigma_v$), and
M$_{BH}$ vs. Eddington ratio (L$_{bol}$/L$_{Edd}$) for SDSS QSOs and rSMBH candidates.
The velocity dispersion $\sigma_v$ was estimated from line widths of [S II]6716,6731 (FWHM ([S II])/2.35; i.e. Komossa \& Xu (2007))
and the bolometric luminosity L$_{bol}$ was adopted from Shen et al. (2011).
The black hole mass M$_{BH}$ was calculated from virial mass formula that depends on the H$\alpha$ line
(Greene \& Ho 2005; Reines et al. 2013):
\begin{eqnarray}
{\rm M_{BH}} & = & f \times 10^{6.57} \left(\frac{\rm L_{H\alpha}}{10^{42}~{\rm erg~s^{-1}}} \right)^{0.47}
\left(\frac{\rm FWHM_{H\alpha}}{10^{3}~\mathrm{\hbox{km~s$^{-1}$}}} \right)^{2.06} \ensuremath{M_{\odot}} ,
\end{eqnarray}
where $f$, L$_{H\alpha}$, and FWHM$_{H\alpha}$, are virial factor that matches measured virial
product into the actual black hole mass, H$\alpha$ broad-line luminosity and FWHM of H$\alpha$ broad-line, respectively.
For the virial factor $f$, we adopted the latest value of $f=1.12^{+0.36}_{-0.27}$ from Woo et al. (2015).
The correlation between the M$_{BH}$ and $\sigma_v$ is plotted in Fig. 6a, \textbf{where blue circles and green dots represent rSMBH candidates and SDSS QSOs, respectively. Solid lines represent least square fits for each data.
We find that M$_{BH}$ of the rSMBH candidates are on average 5.2$\pm$3.2 (median=4.1) times smaller than that in SDSS QSOs
and causes a large scatter in the M$_{BH}$ and $\sigma_v$ relation.
For a moderate kick velocity ($0 < v_{\rm k} < 0.9 v_{\rm e}$),
the mass of the rSMBH grows about 3 times more than initial mass (Sijacki et al. 2011).
Even if we assume our rSMBH candidates are in the initial stage of recoiling, the mass of full grown rSMBH is still 2 times smaller than their stationary counterpart.
When stellar mass black holes are merging, only $\sim$5\% of total mass is carried away by a gravitational wave (Abbott et al. 2016).
Unlike stellar mass BH merging, a significant fraction of mass could be carried away by gravitational waves in the merging process of the SMBHs, which could be one of the possibilities of small SMBH mass of the rSMBHs.
}
Recent simulations suggest that the rSMBHs could be a source of scatter in M$_{BH}$ and host galaxy bulge mass scaling law (Volonteri 2007; Blecha et al. 2011).
The simulations predicted the black hole mass shortfall preferentially occur at high velocity recoil events ($v_{\rm k}\approx v_{\rm e}$ for Volonteri (2007) and $v_{\rm k} \geq 0.8\times v_{\rm e}$ for Blecha et al. (2011))
and the black hole mass for rapidly recoiling rSMBH can be up to 5 times smaller than their stationary counterpart (Blecha et al. 2011).
Note, however that the recoil velocities we have measure are much smaller than their kick velocities.
The kick velocity $v_{\rm k}$ is the initial velocity when the SMBH is recoiled at the center of host galaxy and
the recoil velocity we have measured is recoil velocity at spatially offset position.
To be compatible with the simulations, the kick velocity must have suffered a significant gravitational drag after it kicked out.
The correlation between the M$_{BH}$ and Eddington ratio $L_{bol}/L_{Edd}$ is shown in Fig. 6b where blue circles and green dots represent
rSMBH candidates and SDSS QSOs, respectively.
The solid line is a least-square fit to the SDSS QSOs.
The Eddington ratio of all of the rSMBH candidates is larger than 0.1 with an average of 0.52$\pm$0.27 (median=0.48)
whereas it is 0.19$\pm$0.28 (median=0.11) in SDSS QSOs.
The small black hole mass in Fig. 6a and large Eddington ratio in Fig. 6b suggest that rSMBHs are
actively accreting mass and could be in the stage of growing SMBH mass until they can reach full-grown SMBHs.
If most of the interacting galaxies must go through this stage,
then it will be an important evolutionary path in the galaxy evolution we have missed so far.
It is suggested that star formation in galaxies is regulated by AGN feedback and outflow (Fabian 2012; Tombesi et al. 2015).
If the central AGN is displaced by a recoil event, it will no longer result in quenching but instead enhancing central star formation in the host galaxy (Blecha et al. 2011; Sijacki et al. 2011).
If this is the case, the host galaxy of rSMBHs will contain a significant amount of gas and dust for star formation and could be very luminous in the infrared.
To calculate the infrared luminosity for each host galaxy,
we used IRAS ADDSCAN/SCANPI (Helou et al. 1988).
For some sources, the default parameter values in ADDSCAN/SCANPI yielded a poor fit and could not be used to compute the IRAS fluxes.
In such a case, we adjusted the ADDSCAN/SCANPI source and background fitting ranges from default values
(i.e. background fitting range 30 arcmin and source fitting ranges 3.2 arcmin (60 $\mu m$) and 6.4 arcmin (100 $\mu m$)) to appropriate ones.
The IRAS 60 $\mu m$ and 100 $\mu m$ fluxes and calculated infrared luminosities are listed in Table 1.
We find that most of them are infrared luminous galaxies; either LIRGs (L$_{FIR} > 10^{11}$ L$_{\odot}$) or ULIRGs (L$_{FIR} > 10^{12}$ L$_{\odot}$).
Furthermore, $\sim60\%$ of them (16 out of 26) show Wolf-Rayet features suggesting evidence of recent star formation activity in these galaxies.
The typical morphology of the LIRGs/ULIRGs are interacting/merging galaxies with tidal features (Sanders et al. 1988; Kim et al. 2013; Evans et al. 2016).
The fraction of tidal features in rSMBH candidates (23\%) is much smaller than that of the LIRGs/ULIRGs (80\%, Kim et al. 2013) suggesting
that, if the AGN activity was triggered by interactions, majority of the rSMBH candidates are advanced mergers.
If this is the case, gravitational recoil event could happen long after the merging event when the tital features were almost faded.
\subsection{Do broad-line offsets in rSMBH candidates really originated from recoiling SMBHs?}
\subsubsection{Possible origin of broad-line velocity offset}
The broad-line velocity offsets can be produced by disk-emitters or binary SMBHs,
but in the candidate selection process, we have excluded these sources.
An AGN outflow powered by radiation pressure from the accretion disk or radio jets can produce
a blueshifted broad-line velocity offset (Harrison et al. 2012; Genzel et al. 2014).
It is suggested that the AGN outflows can also produce blue wings in the [O III]$\lambda \lambda$4959,5007 emission lines (Heckman et al. 1981, Whittle et al. 1988, Crenshaw et al. 2010).
Thus, if the blueshifted H${\alpha}$ broad emission line is produced by outflow,
we would expect to observe a correlation of the velocity offsets between the H${\alpha}$ broad-line and [O III]$\lambda$5007 wing component.
To measure the velocity offset in the [O III] wing component,
we have decomposed the [O III]$\lambda$5007 line into core and wing components for all of the rSMBH candidates.
The fitting results are plotted in Fig. 3 and listed in Column 2 of Table 2.
The correlation between the velocity offsets in H${\alpha}$ broad-line and [O III]$\lambda$5007 wing component is
plotted in Fig. 7,
where dashed and solid lines represent one to one relation and least-square fit of the data, respectively.
We find only a weak correlation (r=0.35) of velocity offsets between the H${\alpha}$ broad-line and [O III]$\lambda$5007 wing component.
This suggests that the AGN outflow could be responsible for the broad-line offset for a few individual sources, but not likely for the whole sample.
Another scenario for producing narrow lines plus blueshifted broad lines is an interacting/merging system with double nuclei:
one nucleus is Seyfert producing broad and narrow lines and the other one is either LINER or H II galaxy producing narrow lines.
As discussed in Section 3.1, only 6 rSMBH candidates show tidal signatures.
If these rSMBHs are Seyfert and LINER/HII pairs,
we would observe two distinct sets of narrow forbidden lines in the spectra.
We have inspected the spectra of all 26 rSMBH candidates, but none of them have two sets of narrow lines.
Thus, it is unlikely that the broad-line velocity offsets in rSMBH candidates are caused by interacting/merging galaxies.
\subsubsection{High-excitation coronal lines}
The presence of high-excitation forbidden lines whose ionization potential $I_p$ is larger than He II ionization edge (54.4 eV)
is an unambiguous sign of AGN activity.
It is known that the high-excitation coronal lines are often blueshifted by a few hundreds km s$^{-1}$ with respect to systemic
(Appenzeller \& Oestreicher 1988; Erkens et al. 1997; Mullaney et al. 2009; Gelbord et al. 2009).
If the rSMBHs are indeed recoiling, the blueshift of the high-excitation coronal lines will be the sum of
the recoil velocity plus the blueshift component of the coronal lines (i.e. more blueshifted than their stationary counterpart).
Thus, the high-excitation coronal lines can be used to probe the origin of the broad-line velocity offset in rSMBHs.
We have inspected spectra of the rSMBHs and find 23 out of 26 (88\%) and 11 out of 26 (42\%) of the rSMBHs
have high-excitation coronal lines of [Ne V]$\lambda$3426 ($I_p$=97.11 eV) and [Fe VII]$\lambda$6087 ($I_p$=99.00 eV), respectively.
We found that most of the coronal lines in our candidates have two components: a narrow core component and blueshifted broad wing component.
Spectral decomposition was performed for [Ne V]$\lambda$3426 and [Fe VII]$\lambda$6087 lines and
their results are listed in Table 3.
As summarized in Table 3, the average velocity offsets for [Ne V]$\lambda$3426 ([Fe VII]$\lambda$6087) are
$-$235$\pm$190 km s$^{-1}$ and $-$690$\pm$430 km s$^{-1}$ (-340$\pm$190 km s$^{-1}$ and $-$560$\pm$180 km s$^{-1}$) for core and wing component, respectively.
While studying ionization properties for nearby (z$<$0.4) 63 SDSS Seyfert galaxies,
Gelbord et al. (2009) found velocity offsets of $-$74$\pm$16 km s$^{-1}$ in core component and $-$296$\pm$28 km s$^{-1}$ in wing component of the [Fe VII]$\lambda$6087 line.
Compared to their measurements, [Fe VII]$\lambda$6087 in rSMBH are on average about $-$270 km s$^{-1}$ and $-$260 km s$^{-1}$ more blueshifted for core and wing component, respectively.
Their sample can be regarded as stationary AGNs since their H$\alpha$ broad-line velocity offset with respect to systemic is only $-$3$\pm$26 km s$^{-1}$.
Thus, this result offers further evidence (although still circumstancial) that rSMBH candidates are indeed recoiling with a mean recoil velocity of about $-$265 km s$^{-1}$.
For a combined sample of [Ne V]$\lambda$3426 and [Fe VII]$\lambda$6087, the average velocity offsets become
$-$270$\pm$190 km s$^{-1}$ and $-$665$\pm$400 km s$^{-1}$ for core and wing component, respectively.
Compared to the core component, the $\sim -$400 km s$^{-1}$ larger velocity offset in wing component could indicate that these lines originate closer to the AGN center.
Velocity offset plots between H$\alpha$ broad-line and coronal lines are presented in
Fig. 8a (core component) and Fig. 8b (wing component)
where blue and red circles represent velocity offset for [Ne V]$\lambda$3426 and [Fe VII]$\lambda$6087, respectively.
The dotted lines represent one-to-one correspondence and the dashed lines are least-square fit of the data.
We find a weak correlation ($r$=0.26) between the H$\alpha$ broad-line and core components of the coronal lines,
and no correlation ($r$=0.07) between the H$\alpha$ broad-line and wing components of the coronal lines.
Though they have poor correlations, best fit slopes of the dashed lines are almost parallel to those of the dotted lines (i.e. coronal lines have constant velocity offsets with respect to H$\alpha$ broad-line).
These two results suggest that the velocity offset between H$\alpha$ broad-line and coronal lines are
not locally correlated, probably because the physical/kinematic conditions of the line emitting regions are different,
but globally well correlated due to recoil motion.
Further evidence that the rSMBH candidates are actually recoiling is found in the velocity offset between H$\alpha$ broad-line and coronal lines.
As shown in Fig. 8c, we find a good correlation (r=0.77) of velocity offset between two coronal lines [Ne V]$\lambda$3426 and [Fe VII]$\lambda$6087.
This, along with a similar $I_p$ for [Ne V]$\lambda$3426 (97.11 eV) and [Fe VII]$\lambda$6087 (99.00 eV), indicate that these lines are originated from kinematically/spatially similar regions.
\subsubsection{Diagnostic line ratios}
Diagnostic line ratios (Baldwin, Phillips \& Terlevich 1981; Veilleux \& Osterbrock 1987; Kewley et al. 2006) of the rSMBH candidates have been
investigated to see if they can provide a clue for the origin of broad-line velocity offset.
Fig. 9 shows narrow line ratio plots of [N II]/H$\alpha$ vs. [O III]/H$\beta$ (Fig. 9a) and [S II]/H$\alpha$ vs. [O III]/H$\beta$ (Fig. 9b),
where blue circles and green dots represent rSMBH candidates and SDSS QSOs, respectively.
The overall distribution of line ratios for the rSMBHs are similar to those of the SDSS QSOs.
However, we notice that a higher fraction of H II region sources is found in rSMBH candidates than in SDSS QSOs:
about 19\% and 23\% of the rSMBHs fall in H II region in [N II]/H$\alpha$ and [S II]/H$\alpha$ plots, respectively
whereas only 3\% and 11\% of the SDSS QSOs fall in H II region in [N II]/H$\alpha$ and [S II]/H$\alpha$ plots, respectively.
The large fraction of H II region sources in rSMBH candidates
could be related with a combined effect of spatially offset AGN and density-stratified NLR.
To investigate further, we have divided the rSMBH candidates into two groups:
H II region group (5 sources inside red-dotted circles in the plots) and AGN group (the rest of the sources).
We find that narrow line luminosities in H II region rSMBH candidates
are on average about 4.0, 5.2, and 6.5 times smaller for [O III], [N II], and [S II] lines, respectively than those in AGN rSMBH candidates.
If the H II rSMBH are spatially more offset from center of host galaxy than the AGN rSMBHs,
they will have smaller electron density and their narrow line luminosities will be weaker than that in AGN rSMBHs under density-stratified NLR environment (e.g., Filippenko \& Halpern 1984; Veilleux 1991).
We tested this hypothesis by calculating electron density $N_e$ from [S II]6716/[S II]6731 ratio using
the Temden task in Nebular package of the IRAF/STSDAS (Shaw \& Dufour 1995)
assuming typical temperature of $T=1.0\times 10^4$K in line emitting region of the AGNs (Osterbrock \& Ferland 2006).
The Temden task numerically solves the equilibrium equation for a 5-level atom approximation developed by De Robertis et al. (1987).
As expected, the mean $N_e$ in the H II region rSMBH candidates ($22^{+32}_{-0}$ cm$^{-3}$, median=0 cm$^{-3}$) is
about 10 times smaller than that in AGN rSMBH candidates ($216^{+218}_{-152}$ cm$^{-3}$, median=266 cm$^{-3}$).
In Section 3.1, we have estimated the expected spatial offset for the rSMBH by assuming random recoil direction.
Even if we used this crude assumption,
the spatial offset in H II region rSMBH candidates (mean=$2.1\pm 1.0$ kpc, median=1.7 kpc) is
$\sim$30\% larger than that in AGN rSMBH candidates (mean=$1.4\pm 0.5$ kpc, median=1.3 kpc).
The same argument can be applied to the 26 rSMBH candidates versus the SDSS QSOs.
If the rSMBH candidates are spatially offset, their $N_e$ will be smaller than that of the SDSS QSOs.
The calculated mean $N_e$ are 172$^{+209}_{-145}$ cm$^{-3}$ (median=165 cm$^{-3}$) and 480$^{+650}_{-320}$ cm$^{-3}$ (median=435 cm$^{-3}$)
for the rSMBH candidates and SDSS QSOs, respectively.
Indeed, the mean $N_e$ in rSMBH candidates is only $\sim$1/3 of that in SDSS QSOs.
This could be another evidence that the rSMBH candidates are actually recoiling.
\section{Summary}
We have performed a spectral decomposition to search for recoiling supermassive black hole (rSMBH) candidates in the SDSS QSOs with $z<0.25$.
We reported on the properties of the rSMBH candidates and on the mounting evidence that these candidates are in fact recoiling.
$\bullet$
Out of 1271 QSOs, we have identified 26 rSMBH candidates that are recoiling toward us.
If we assume a similar number of rSMBHs are recoiling to opposite direction, then $\sim$4\% of the SDSS QSOs with $z<0.25$ are rSMBHs.
$\bullet$
The projected recoil velocities of the rSMBH candidates range from $-76\ \hbox{km~s$^{-1}$}$ to $-307\ \hbox{km~s$^{-1}$}$ with an average of $-149\pm58\ \hbox{km~s$^{-1}$}$.
The expected spatial offsets range from 0.21$^{\prime\prime}$ \ to 1.97$^{\prime\prime}$ \ (0.79 kpc to 3.14 kpc) with a mean of 0.51$^{\prime\prime}$$\pm$0.35$^{\prime\prime}$ \ (1.52$\pm$0.59 kpc)
if we assume a random recoil direction and an AGN lifetime of 10 Myr for the rSMBH candidates.
\textbf{
$\bullet$
The rSMBH candidates in massive hosts are more likely to undergo oscillatory motion due to large escape velocity of the host galaxy.}
$\bullet$
The line profile of the H$\alpha$ broad-line in all rSMBH candidates was found to be Lorentzian and suggests turbulence is a dominant velocity field in the accretion disk of the rSMBHs.
$\bullet$
We find that the black hole mass $M_{BH}$ of the rSMBH candidates is on average 5.2$\pm$3.2 (median=4.1) times smaller than
that of their stationary counterparts and causes a large scatter in $M_{BH}-\sigma_*$ relation.
\textbf{Unlike stellar mass BH merging, a significant fraction of mass could be
carried away by gravitational wave in the merging process of the SMBHs, which
could be one of the possibilities of small SMBH mass of the rSMBHs.}
The Eddington ratio of all of the rSMBH candidates is larger than 0.1 with average of 0.52$\pm$0.27 (median=0.48)
suggesting they are actively accreting mass.
$\bullet$
Most of the rSMBH candidates are found to be LIRGs or ULIRGs,
but unlike typical LIRGs/ULIRGs only 23\% shows a sign of tidal features suggesting majority of them are advanced mergers.
$\bullet$
The possibility that AGN outflows or double nuclei (Seyfert $+$ LINER/HII) cause the broad-line velocity offsets were examined,
but we could not find strong evidences, except that the broad-line velocity offset in a few individual sources could have been originated by AGN outflow.
$\bullet$
Slopes in the velocity offset plots of H$\alpha$ broad-line vs. high-excitation coronal lines suggest that the rSMBH candidates are actually recoiling.
Comparison of [Fe VII]$\lambda$6087 velocity offsets between rSMBH candidates and stationary AGNs suggest that the rSMBH candidates are recoiling on average velocity of $-$265 km s$^{-1}$.
$\bullet$
We find that electron density in the NLR of the H II rSMBHs is about 1/10 of that in AGN rSMBHs.
This can be explained if the H II rSMBHs are more spatially offset than the AGN rSMBHs under density-stratified NLR environment.
The mean electron density in rSMBH candidates is found to be 1/3 of that in SDSS QSOs suggesting the former was more spatially offset than the latter. This can be another evidence that the rSMBH candidates are actually recoiling.
As summarized above, there is much evidence to suggest that broad-line velocity offsets in rSMBH candidates are originated from recoiling SMBH.
To confirm this, we need evidence for spatial offset between the rSMBH and center of host galaxy.
We have submitted adaptive optics imaging proposal to identify and measure spatial offset
and integral-field spectroscopy to study velocity field in the rSMBH candidates.
If confirmed, the result will have significant implications in astrophysics including
formation and evolution of SMBHs, black hole binary dynamics, SMBH and bulge mass scaling law, and AGN unification theories.
The authors thank the anonymous referee for comments and suggestions that greatly improved this paper.
We also thank Y. Shen for useful discussions.
This research has made use of the NASA/IPAC Extragalactic Database
(NED) which is operated by the Jet Propulsion Laboratory, California
Institute of Technology, under contract with the National Aeronautics and Space Administration.
D.C.K., A.S.E., and S.S acknowledge support from the National Radio Astronomy Observatory (NRAO) and G.C.P. was supported by a FONDECYT Postdoctoral Fellowship (No.\ 3150361).
The National Radio Astronomy Observatory is a facility of the National Science Foundation operated under cooperative agreement by Associated Universities, Inc.
\clearpage
|
\section{Introduction}
\label{introduction}
The millimeter-wave (mmWave) spectrum, roughly defined as the frequencies between 10 and 300~GHz, is a new and promising frontier for cellular wireless communications~\cite{ted_book,ted4}.
With the rapidly growing demand for cellular data, conventional frequencies below 3~GHz are now highly congested. For example, in the most recent FCC auction,
65~MHz of AWS-3 spectrum were sold for a record breaking \$45 billion, which shows the severe spectrum crunch encountered when trying to expand wireless networks today. In contrast, the mmWave bands offer vast and largely untapped spectrum, up to 200 times all current cellular allocations by some estimates.
Due to this enormous potential, mmWave networks have been widely cited as one of the most promising technologies for Beyond 4G and 5G cellular evolution.
A fundamental and outstanding question for the design of these
networks is to understand the effects of interference and, more
specifically, under which circumstances mmWave cellular
networks are likely to be limited by interference or by thermal noise.
Identifying in which regimes networks operate is central to system design:
for example, while interference limited networks can benefit from
advanced techniques such as
inter-cellular interference coordination, coordinated beamforming
and dynamic orthogonalization, these techniques have little value
in networks where thermal noise, rather than interference, is dominant.
While for traditional (in particular macrocell-based) cellular deployments the relative power
of interference to thermal noise
is a function of the distance between cells and of the
transmit power spectral density, the results in this paper will demonstrate that in mmWave systems
the relative strength of
interference depends on many more factors. Most importantly,
mmWave systems rely on highly directional transmissions to overcome
the high isotropic path loss. Directional transmissions
tend to isolate users, thereby reducing the interference.
However, the degree of isolation depends strongly on the size of the antenna arrays, the antenna pattern,
and the level of local scattering and spatial multipath.
In addition, mmWave signals can be blocked by many common materials,
eliminating long distance links. This potentially improves the isolation
but may also lead to coverage holes. There are also significant differences
in path loss for mobiles in Line-of-Sight (LoS) and Non-Line-of-Sight
(NLoS) locations.
The broad purpose of this paper is to leverage detailed measurement-based
statistical channel models to provide an accurate assessment of
the Interference-to-Noise Ratio (INR), and of its relation to various
key deployment parameters including base station density,
transmit power, bandwidth and antenna pattern. Our analysis uses
the latest channel models for 28 and 73~GHz based on extensive New York City
measurements~\cite{ted1,ted2,ted3,ted4}.
The rest of the paper is organized as follows. In Section \ref{related_work} we present the prior art related to interference and noise evaluations.
In Section \ref{system_model} we describe the scenarios simulated.
A preliminary numerical evaluation, along with some important remarks, is reported in Section \ref{numerical_evaluation}. Finally, we conclude the paper and describe some future research steps in Section \ref{conclusion}.
\section{Related work}
\label{related_work}
In~\cite{management1} and~\cite{management2}, the authors outline the challenges of interference management in 5G cellular networks, overviewing techniques such as Coordinated MultiPoint (CoMP) and other advanced interference management techniques.
In~\cite{renzo}, a new mathematical framework for the analysis of mmWave cellular networks is presented.
The paper introduces a multi-ball approximation that lies in replacing the LoS or NLoS probability of typical User Equipment (UE) with an approximate function, which still depends on the Base Station (BS) to UE distance $d$ but is piece-wise constant as a function of $d$. A noise-limited approximation is found to be quite accurate for a small density of BSs. However, when the density of BSs increases, thus decreasing the average cell radius, the approximation no longer holds.
Noise-limited and interference-limited regimes are studied for ad hoc mmWave networks at $60$~GHz operating under slotted ALOHA and Time Division Multiple Access (TDMA) protocols in~\cite{fischione} and~\cite{fischione2}.
These works consider networks at 60~GHz, motivated by the fact that a lot of research has been done in the last years to support the development of WiGig~\cite{wigig}.
However, we note that propagation at 60~GHz is heavily affected by the peak of oxygen absorption, and for this reason different Access Points (APs) will be more isolated than at 28 or 73~GHz.
Different scenarios are studied and implemented from both analytical and simulation standpoints.
As a result, \cite{fischione} and~\cite{fischione2} suggest the use of a hybrid MAC protocol that works in two distinct phases; a distributed contention-based resource allocation, which is more suitable for the noise-limited regime, followed by a centralized contention-free resource allocation, which is more suitable for the interference-limited regime.
In~\cite{heath}, an analytical framework is proposed to evaluate the instantaneous INR distribution of an outdoor mmWave ad hoc network working at 60~GHz.
The authors consider a narrowband channel model with transmitter locations forming a Poisson Point Process (PPP), and capture mmWave features by considering directional beamforming and LoS/NLoS configurations. It is shown that, in a very dense network (e.g., 1000~sources/km$^2$), the interference power is nearly always higher than the noise power.
This motivates novel ad hoc mmWave architectures to deal with interference in order to realize networks that can achieve gigabit speeds.
Some general results related to interference and noise regimes for mmWave cellular networks have been presented in~\cite{sundeep_challenges} and~\cite{heath2}, which motivated us to run a more detailed campaign of simulations at varying operating configurations. The work in
\cite{felipe} used simple approximations of the channel
propagation to identify scaling laws for the bandwidth, number of antennas
and transmit power under which the network would be in an interference or
noise-limited regime.
Reference~\cite{gupta15} studies the feasibility of spectrum pooling in mmWave cellular networks under ideal conditions at both 28 and 73~GHz, and \cite{boccardi16} studies the impact of coordination between different networks, under the assumption of ideal beamforming.
In both~\cite{gupta15} and~\cite{boccardi16}, beamforming is modeled as an ON/OFF beam.
Our INR evaluation introduces some key additional contributions: (i) a detailed \emph{lobe}-shaped antenna pattern to precisely capture the mmWave beamforming gains\footnote{A precise description of the model used in this paper can be found in~\cite{rebato16}.}; (ii) an updated channel model at both 28 and 73~GHz\footnote{We use the NYU channel models for 28~GHz and 73~GHz frequencies~\cite{mustafa} based on measurement campaigns carried out in a real dense urban environment, as reported in~\cite{ted1,ted2,ted3,ted4}.}, which, together with a more realistic beamforming model, provides a very accurate characterization of the useful and interfering received signal; and (iii) a comparison of a blind allocation vs. a centralized upper bound vs. an interference-less case.
We believe that these additional contributions, with respect to the previous work, are an important step forward towards a more realistic understanding of the role of interference in 5G mmWave system design.
\section{System model}
\label{system_model}
We consider a mobile network where BSs and UEs are deployed following a PPP with density $\lambda_{\text{BS}}$ and $\lambda_{\text{UE}}$, respectively.
Moreover, the use of this unplanned deployment where the BS positions are not optimized is suitable to model the case where APs are deployed by users in a similar way to WiFi today.
Our simulations follow a Monte Carlo approach, in which many independent experiments\footnote{More precisely, experiments are independent because the deployment of the devices in the area is randomly generated at each iteration.} are repeated to empirically derive statistical quantities of interest. Without loss of generality, we evaluate the performance of a typical receiver located in the origin of the area considered, whose statistics are estimated based on 50000 repetitions of this procedure.
Thanks to a detailed channel and antenna characterization, we can compute the Signal-to-Interference-plus-Noise-Ratio (SINR) between transmitter $i$ and receiver $j$ as:
\begin{equation}
\text{SINR}_{ij} = \frac{\frac{P_{Tx}}{PL_{ij}}G_{ij}}{\sum_{k \neq i} \frac{P_{Tx}}{PL_{kj}}G_{kj} + BW \times N_0},
\label{equation_sinr}
\end{equation}
where $k$ represents each interfering link, $BW$ is the total bandwidth, $N_0$ is the thermal noise, $P_{Tx}$ is the transmitted power, $G$ is the beamforming gain, and $PL$ is the pathloss between the receiver UE and the associated BS.
The pathloss is modeled with three states, as reported in~\cite{mustafa}: LoS, NLoS and outage as a function of the distance $d$ between transmitter and receiver.
In the simulations, UEs are associated to the BS that provides the smallest pathloss.
The channel is modeled as reported in~\cite{mustafa}, which represents a dense urban environment.
A precise \emph{lobe}-shaped beamforming gain $G$ is computed by multiplying the Multiple-Input and Multiple-Output (MIMO) beamforming vectors\footnote{The beamforming vectors are computed as reported in \cite{antenna_book}. This antenna gain model is detailed and complete with main and side-lobes.} by the channel matrix.
The beamforming gain from transmitter $i$ to receiver $j$ is given by:
\begin{equation}
G_{ij} = |\textbf{w}^*_{Rx_{ij}} \textbf{H}_{ij} \textbf{w}_{Tx_{ij}} |^2,
\label{bf_comp}
\end{equation}
where $\textbf{w}_{Tx_{ij}} \in \mathbb{C}^{n_{Tx}}$ is the beamforming vector of transmitter $i$ when transmitting to receiver $j$, $\textbf{w}_{Rx_{ij}} \in \mathbb{C}^{n_{Rx}}$ is the beamforming vector of receiver $j$ when receiving from transmitter $i$, and $\textbf{H}$ is the channel matrix.
Both vectors are complex, with length equal to the number of antenna elements in the array.
The use of beamforming is essential in mmWave communications, as the gain obtained from directional beam steering is a critical factor to achieve a sufficient link margin.
We assume to have the possibility of steering in any direction, i.e., we can generate a beamforming vector for any possible angle between 0 and 360 degrees.
With this transmission, the two beams (i.e., the one of the UE and the one of the BS) are always perfectly
aligned.
From a realistic point of view, the set of beampatterns is discrete, and performing the steering in an arbitrary direction may be too costly or even impossible.
\section{Simulation results}
\label{numerical_evaluation}
\begin{figure}[t!]
\centering
\includegraphics[width=0.77\columnwidth]{300.pdf}
\caption{Empirical CDF of the INR for $\lambda_{\text{UE}}$ = 300~UEs/km$^2$ and $\lambda_{\text{BS}}$ = 30~BSs/km$^2$.}
\label{300}
\end{figure}
\begin{figure}[t!]
\centering
\includegraphics[width=0.77\columnwidth]{600.pdf}
\caption{Empirical CDF of the INR for $\lambda_{\text{UE}}$ = 600~UEs/km$^2$ and $\lambda_{\text{BS}}$ = 60~BSs/km$^2$.}
\label{600}
\end{figure}
\begin{figure}[t!]
\centering
\includegraphics[width=0.77\columnwidth]{900.pdf}
\caption{Empirical CDF of the INR for $\lambda_{\text{UE}}$ = 900~UEs/km$^2$ and $\lambda_{\text{BS}}$ = 90~BSs/km$^2$.}
\label{900}
\end{figure}
\begin{figure}[t!]
\centering
\includegraphics[width=0.77\columnwidth]{1200.pdf}
\caption{Empirical CDF of the INR for $\lambda_{\text{UE}}$ = 1200~UEs/km$^2$ and $\lambda_{\text{BS}}$ = 120~BSs/km$^2$.}
\label{1200}
\end{figure}
We consider a 64 elements (8$\times$8) Uniform Planar Array (UPA) antenna at the BS, while at the receiver side we have a UPA with 16 elements (4$\times$4).
For the analysis in this paper, we focus on the INR, which is defined as:
\begin{equation}
\text{INR}_{ij} = \frac{\sum_{k \neq i} \frac{P_{Tx}}{PL_{kj}}G_{kj}}{BW \times N_0},
\label{inr}
\end{equation}
where at the numerator we sum all the interfering links by multiplying their transmit powers $P_{Tx}$, beamforming gains $G$ and respective pathloss values $PL$. The denominator comprises the thermal noise power, which is equal to the power spectral density $N_0$ multiplied by the total bandwidth $BW$.
We report, for each case, the Empirical Cumulative Distribution Function (ECDF) of the downlink INR defined in~\eqref{inr}, and identify $\text{INR} = 0$ dB as the transitional point that determines the shift from a noise-limited to an interference-limited regime.
In our simulation campaign, we have considered a 7~dB Noise Figure (NF), a 500~MHz total bandwidth, and a transmit power $P_{Tx}=30$~dBm, which are in line with the specifications envisioned for future 5G mmWave mobile networks considering a downlink transmission.
By observing Figures~\ref{300}~--~\ref{1200}, we can derive the following general insights.
\subsubsection{Higher BSs density, higher interference}
A first (obvious) result is that interference increases with the number of base stations, therefore increasingly biasing towards the interference limited regime. We show that we start observing the majority of links ($>$ 80$\%$) operating in the interference limited region for $\lambda_{\text{BS}} =$~120~BSs/km$^2$.
It is important to note that a large amount of interference is generated from the symmetric lobe.
We reserve as a future work the study of a scenario where an antenna model that blocks symmetric lobes is applied.
We have also verified that changes in the density of the UEs $\lambda_{\text{UE}}$ for fixed $\lambda_{\text{BS}}$ do not affect the behavior of the INR curves. In fact, as long as the number of active BSs (and so the active number of interfering source) remains the same, the behavior of the INR does not change. However, we note that this holds under the assumption of full-buffer UEs.
\begin{figure}[t!]
\centering
\includegraphics[width=0.80\columnwidth]{big_antenna_inr.pdf}
\caption{Empirical CDF of the INR for $\lambda_{\text{BS}}$ = 30~BSs/km$^2$ and $\lambda_{\text{UE}}$ = 300~BSs/km$^2$.}
\label{big_antenna_inr}
\end{figure}
\subsubsection{Higher band, lower interference}
At 73~GHz, due to a higher pathloss, interference is $\sim$ 10~dB less than the interference experienced at lower mmWave bands (28~GHz). Please note that in these first simulations we consider the same number of antennas for both frequencies. Nonetheless, at higher operating bands we could deploy more antennas in the same area, which would result in higher directionality, and therefore even less interference.
\subsubsection{Interferers domains}
We report in Table~\ref{table_probabilities} the distributions of interfering link states for the 28~GHz curve of Figure \ref{300}.
The table reports the probability for an interferer to be in one of the three states (LoS, NLoS, and outage) for the two ECDF intervals.
We split the curve into two intervals in order to capture the relation between the state of the interferers and the INR value.
\begin{figure}[t!]
\centering
\includegraphics[width=0.80\columnwidth]{big_antenna_sinr.pdf}
\caption{Empirical CDF of the SINR for $\lambda_{\text{BS}}$ = 30~BSs/km$^2$ and $\lambda_{\text{UE}}$ = 300~BSs/km$^2$.}
\label{big_antenna_sinr}
\end{figure}
\begin{table}[h!]
\centering
\begin{tabular}{c|c |c |c }
\bottomrule
ECDF \emph{interval} & LoS & NLoS & outage \\ [-2pt]\hline
[0\% - 12\%] & 0\% & 0\% & 100\% \\ [-2pt] \hline
[12\% - 100\%] & 1\% & 18\% & 81\% \\ [-2pt]\bottomrule
\end{tabular}
\caption{Empirical probabilities to be in LoS, NLoS or outage for the interferers of Figure~\ref{300} (the case in which $\lambda_{\text{UE}}$ = 300~UEs/km$^2$ and $\lambda_{\text{BS}}$ = 30~BSs/km$^2$). We provide the statistics for two ECDF intervals (0~-~12\% and 12~-~100\%), that represent different trends in the plot of Figure~\ref{300}.}
\label{table_probabilities}
\end{table}
It is interesting to note how, for low BS density scenarios, the dominant interfering links are in outage, thus obviously reflecting a noise-limited regime. As observed, at higher BS densities, the states of the interferers become NLoS and LoS, thus increasingly biasing the system towards interference limited regimes.
These results allowed us to identify three main working regimes.
\begin{itemize}
\item When the BS density is smaller than 30~BSs/km$^2$ (average cell radius bigger than 103~m), the mmWave cellular network can be assumed to be \textbf{noise-limited}.
In such a regime, interference coordination will not be necessary.
\item Conversely, when the density is above 120~BSs/km$^2$, the mmWave cellular network can be assumed to be \textbf{interference-limited}.
Under this assumption, some sort of interference coordination is needed.
\item Finally, we captured an intermediate case, where the density is between 30 and 120~BSs/km$^2$; here, we can observe both regimes.
For this particular state, any user can be either \textbf{noise-limited} or \textbf{interference-limited}. We may need a hybrid coordination scheme in this case.
\end{itemize}
\subsubsection{More antenna elements at 73~GHz}
So far, we have considered the same antenna array size for both frequencies. Nonetheless, because of the reduced wavelength at 73~GHz, we can deploy a higher number of antenna elements in the same area.
Figures \ref{big_antenna_inr} and \ref{big_antenna_sinr} report the INR and the SINR ECDFs, respectively. The two cases considered before (solid lines, same number of antennas) are compared to a configuration with an increased number of antennas at 73~GHz, i.e., $16\times16$ at the transmitter and $8\times8$ at the receiver (dashed line). The results show that using more antennas results in a slightly increased interference (about 2--3~dB in most cases, see Figure \ref{big_antenna_inr}). While the average interference due to the main transmit/receive lobes is expected to be roughly the same in the two cases (as the increased gain is compensated by the correspondingly reduced beamwidth), with more antennas the effect of the side lobes is larger, and the interference variance is also larger, thus resulting in an increased INR. On the other hand, the higher directivity of the larger arrays (which in this specific example provides a total gain of 12~dB, i.e., a factor of 4 at both sides) results in an increased SINR value (about 9--10~dB, see Figure \ref{big_antenna_sinr}).
\begin{figure}[t!]
\centering
\includegraphics[width=0.80\columnwidth]{gains_double_elements.pdf}
\caption{Performance comparison at increasing BS densities for both 28~GHz and 73~GHz.}
\label{comparisons}
\end{figure}
Finally, we report in Figure~\ref{comparisons} the 5th and 50th percentiles of the SINR at 28~GHz and 73~GHz vs. the BS density. An improvement of the SINR when the BS density is increased corresponds to a noise-limited regime, whereas in an interference-limited regime densification leads to a similar increase of both the intended signal and the interference, making the SINR weakly dependent on the BS density (this change of regime occurs between 60 and 90~BSs/km$^2$ for the 5th percentile, and between 30 and 60~BSs/km$^2$ for the 50th percentile). Note that the slight SINR decrease when the BS density is further increased is due to the fact that some interferers move from NLoS to LoS condition, so that their power increases more than that of the intended signal (an effect more visible at 28~GHz).
\section{Conclusion}
\label{conclusion}
This paper leverages the latest measurement-based channel models to accurately assess the interference statistics in a wide range of deployment scenarios.
The channel models also account for blockage, line-of-sight and non-line-of-sight regimes, as well as local scattering, that significantly affect the level of spatial isolation.
Determining the regime in which the network is operating, and specifically whether it is noise- or interference-limited, is critical in order to properly design MAC and physical-layer procedures.
In this paper, we capture each operating regime as a function of the transmitter density at two different frequencies, i.e., 28~GHz and 73~GHz, and observe their different trends, which depend on directionality and propagation characteristics.
Based on our findings, we believe that a flexible, user-centric, interference-aware MAC protocol may represent the right solution to better leverage the mmWave potential, which motivates us to further investigate these possibilities as part of our future work.
\bibliographystyle{IEEEtran}
|
\section{Introduction}
Wetting and dewetting phenomena are ubiquitous in soft matter systems
and have a profound impact on many disciplines, including
biology~\cite{Prakash2012}, microfluidics~\cite{Geoghegan2003}, and
microfabrication~\cite{Chakraborty2010}. One problem of great interest
concerns the suspension of fluid films on or near structured surfaces
where, depending on the interplay of competing short-range molecular
or capillary forces (e.g. surface tension), gravity, and long-range
dispersive interactions (i.e. van der Waals or more generally, Casimir
forces), the film may undergo wetting or dewetting transitions, or
exist in some intermediate state, forming a continuous surface profile
of finite thickness~\cite{Bonn2009, Geoghegan2003}. Thus far,
theoretical analyses of these competing effects have relied on
approximate descriptions of the dispersive van der Waals (vdW)
forces~\cite{arodreview, Israelachvili, Parsegian}, i.e. so-called
Derjaguin~\cite{Derjaguin1934} and Hamaker~\cite{Hamaker1937}
approximations, which have recently been shown to fail when applied in
regimes that fall outside of their narrow range of
validity~\cite{Buscher2004, lambrechtPWS, Emig2001,arodreview}.
In this paper, building on recently developed theoretical techniques
for computing Casimir forces in arbitrary geometries~\cite{Reid2013,
Reid2009}, we demonstrate an approach for studying the equilibrium
shapes (the wetting and dewetting properties) of liquid surfaces that
captures the full non-additivity and non-locality of vdW
interactions~\cite{aroddesigner}. As a proof of concept, we consider
the problem of a fluid surface on or near a periodic grating,
idealized as a deformable perfect electrical conductor (PEC) surface
(playing the role of a fluid surface) interacting through vacuum below
a fixed periodic PEC grating [\figref{schematic}], and show that the
competition between surface tension and non-additive vdW pressure
leads to quantitatively and qualitatively different equilibrium fluid
shapes and wetting properties compared with predictions based on
commonly employed additive approximations. Our simplifying choice of
PEC surfaces allows for a scale-invariant analysis of the role of
geometry on both non-additivity and fluid deformations, ignoring
effects associated with material dispersion that would otherwise
further complicate our analysis and which are likely to result in even
larger deviations~\cite{Noguez2004,arodreview}. Our results provide a
basis for experimental studies of fluid suspensions in situations where
vdW non-additivity can have a significant impact.
Equilibrium fluid problems are typically studied by way of the
augmented Young-Laplace equation~\cite{interfacecolloidYLE},
\begin{equation}
\gamma \nabla \cdot \left(\frac{\nabla \Psi}{\sqrt{1+|\nabla
\Psi|^2}}\right) + \frac{\delta}{\delta\Psi}
\left(\mathcal{E}_{\mathrm{other}}[\Psi]+\mathcal{E}_{\mathrm{vdW}}[\Psi]
\right) = 0
\label{eq:YLE}
\end{equation}
describing the local balance of forces (variational derivatives of
energies) acting on a fluid of surface profile $\Psi(\vec{x})$. The
first two terms describe surface and other external forces (e.g.
gravity), with $\gamma$ denoting the fluid--vacuum surface tension,
while the third term $\frac{\delta}{\delta \Psi}
\mathcal{E}_{\mathrm{vdW}}$ denotes the local disjoining pressure
arising from the changing vdW fluid--substrate interaction energy
$\mathcal{E}_{\mathrm{vdW}}$. Semi-analytical~\cite{Quinn2013,
Ledesma2012nanoscale} and brute-force~\cite{Ledesma2012multiscale,
Sweeney1993} solutions of the YLE have been pursued in order to
examine various classes of wetting problems, including those arising
in atomic force microscopy, wherein a solid object (e.g. spherical
tip) is brought into close proximity to a fluid
surface~\cite{Quinn2013, Ledesma2012nanoscale, Ledesma2012multiscale},
or those involving liquids on chemically~\cite{Bauer1999, Checco2006}
or physically~\cite{Geoghegan2003, Bonn2009, Sweeney1993} textured
surfaces.
A commonality among prior theoretical studies of \eqref{YLE} is the
use of simple, albeit heuristic approximations that treat vdW
interactions as additive forces, often depending on the shape of the
fluid in a power-law fashion~\cite{Derjaguin1934, Derjaguin1956,
Hamaker1937}. Derjaguin or proximity-force approximations (PFA) are
applicable in situations involving nearly planar structures,
i.e. small curvatures compared to their separation, approximating the
interaction between the objects as an additive, pointwise summation of
plate--plate interactions between differential elements comprising
their surfaces~\cite{Derjaguin1934, Derjaguin1956}. Hamaker or
pairwise-summation (PWS) approximations are applicable in situations
involving dilute media~\cite{lambrechtPWS}, approximating the
interaction between two objects as arising from the pairwise summation
of (dipolar) London--vdW~\cite{caspol1} or
Casimir--Polder~\cite{caspol2} forces between volumetric elements of
the same constitutive materials~\cite{Hamaker1937}; such a treatment
necessarily neglects multiple-scattering and other non-additive
effects. When applied to geometries consisting of planar interfaces,
PFA can replicate exact results based on the so-called Lifshitz theory
(upon which it is based)~\cite{Dzyaloshinskii1961}, whereas PWS
captures the distance dependence obtained by exact calculations but
differs in magnitude (except in dilute situations)~\cite{lambrechtPWS}.
Typically, the quantitative discrepancy of PWS is rectified via a
renormalization of the force coefficient to that of the Lifshitz formula,
widely known as the Hamaker constant~\cite{Bergstrom1997}.
The inadequacy of these additive approximations in situations that
fall outside of their range of validity has been a topic of
significant interest, spurred by the recent development of techniques
that take full account of complicated non-additive and boundary
effects arising in non-planar structures, revealing non-monotonic,
logarithmic, and even repulsive interactions stemming from geometry
alone~\cite{arodreview, aroddesigner, arodpistons, bordagcyl}. These
brute-force techniques share little semblance with additive
approximations, which offer computational simplicity and intuition at
the expense of neglecting important electromagnetic effects. In
particular, the exact vdW energy in these modern formulations is often
cast as a log-determinant expression involving the full (no
approximations) electromagnetic scattering properties of the
individual objects, obtained semi-analytically or numerically by
exploiting spectral or localized basis expansions of the scattering
unknowns~\cite{arodreview, Lambrecht2006}. The generality of these
methods does, however, come at a price, with even the most
sophisticated of formulations requiring thousands or hundreds of
thousands of scattering calculations to be performed~\cite{arodreview}.
Despite the fact that fluid suspensions motivated much of the original
theoretical work on vdW interactions between macroscopic
bodies~\cite{Lamoreaux2006, Dzyaloshinskii1961, Israelachvili,
Parsegian}, to our knowledge these recent techniques have yet to be
applied to wetting problems in which non-additivity and boundary
effects are bound to play a significant role on fluid deformations.
\begin{figure}[t!]
\centering
\includegraphics[width=0.75\columnwidth]{unitcellschematic.eps}
\caption{Schematic of fluid--grating geometry comprising a fluid
(blue) of surface profile $\Psi(\vec{x})$ in close proximity
(average distance $d$) to a solid grating (red) of height profile
$h(\vec{x})$, involving thin nanorods of height $H$, thickness $2P$,
and period $\Lambda$. (a) Representative mesh employed by a recently
developed FSC boundary-element method~\cite{SCUFF1} for computing
exact vdW energies in complex geometries. (b) and (c) illustrate
commonly employed pairwise--summation (PWS) and proximity--force
approximations (PFA), involving volumetric and surface interactions
throughout the bodies, respectively.}
\label{fig:schematic}
\end{figure}
\emph{Methods.--} In order to solve \eqref{YLE} in general settings,
we require knowledge of $\frac{\delta}{\delta\Psi}
\mathcal{E}_{\mathrm{vdW}} [\Psi]$ for arbitrary $\Psi$. We employ a
mature and freely available method for computing vdW interactions in
arbitrary geometries and materials~\cite{SCUFF1,SCUFF2}, based on the
fluctuating--surface current (FSC) framework~\cite{Reid2009, Reid2013}
of electromagnetic scattering, in which the vdW energy,
\begin{equation}
\mathcal{E}_\mathrm{FSC} = \frac{\hbar}{2\pi}\int_0^\infty
\mathrm{d}\xi \, \ln(\det(\mathbb{M} \mathbb{M}_{\infty}^{-1}))
\label{eq:FSC}
\end{equation}
is expressed in terms of ``scattering'' matrices $\mathbb{M}$,
$\mathbb{M}_\infty$ involving interactions of surface currents
(unknowns) flowing on the boundaries of the bodies~\cite{Reid2009,
Reid2013} and integrated along imaginary frequencies $\xi =
\mathrm{i} \omega$; these are computed numerically via expansions in
terms of localized basis functions, or triangular meshes interpolated
by linear polynomials [\figref{schematic}(a)], in which case it is
known as a boundary element method. Because exact methods most commonly
yield the total vdW energy or force, rather than the local pressure on
$\Psi$, it is convenient to consider the YLE in terms of an equivalent
variational problem for the total energy~\cite{bormashenko,silin}:
\begin{equation}
\min_{\Psi} \; \left(\gamma \int \sqrt{1 + |\nabla \Psi|^2} +
\mathcal{E}_{\mathrm{other}}[\Psi] +
\mathcal{E}_{\mathrm{vdW}}[\Psi]\right),
\label{eq:Emin}
\end{equation}
where just as in \eqref{YLE}, the first term captures the surface
energy, the second captures contributions from gravity or bulk
thermodynamic/fluid interactions, and the third captures the dispersive
vdW interaction energy. For simplicity, we ignore other competing
interactions, including thermodynamic and viscous
forces~\cite{Ledesma2012multiscale, Ledesma2012nanoscale} and neglect
gravity when considering nanoscale fluid deformations, focusing
instead only on the impact of surface and dispersive vdW interactions.
\Eqref{Emin} can be solved numerically via any number of available
nonlinear optimization/minimization
techniques~\cite{bormashenko,silin}, requiring only a convenient
parametrization of $\Psi$ using a finite number of degrees of
freedom. In what follows, we consider numerical solution of
\eqref{Emin} for the particular case of a deformable incompressible
PEC surface $\Psi$ interacting through vacuum with a 1d-periodic PEC
grating of period $\Lambda$ and shape $h(\vec{x}) = d -
H\left(\frac{1}{e^{\alpha (x - P)} + 1} + \frac{1}{e^{-\alpha (x + P)}
+ 1} - 2\right)$, for $|x| < \frac{\Lambda}{2}$, with half-pitch
$P = 0.03\Lambda$ and height $H =1.2\Lambda$. \Figref{schematic} shows
the grating surface and fluid profile obtained by solving \eqref{Emin}
for a representative set of parameters and mesh discretization. Here,
$d = 0.4\Lambda$ is the initial minimum grating-fluid separation, and
$\alpha\Lambda = 150$ is a parameter that smoothens otherwise sharp
corners in the grating, alleviating spatial discretization errors in
the calculation of $\mathcal{E}_{\mathrm{vdW}}$ while having a
negligible impact on the qualitative behavior of the energy compared
to what one might expect from more typical, piecewise-constant
gratings~\cite{Buscher2004}.
To minimize the energy, we employ a combination of algorithms found in
the NLOPT optimization suite~\cite{NLOPT, COBYLA, BOBYQA}. Although
the localized basis functions or mesh of the FSC method provide one
possible parametrization of the surface, for the class of periodic
problems explored here, a simple Fourier expansion of the surface
provides a far more efficient and convenient basis, requiring far
fewer degrees of freedom to describe a wide range of periodic
shapes. Because the grating is translationally invariant along the $z$
direction and mirror-symmetric about $x = 0$, we parametrize $\Psi$ in
terms of a cosine basis, $\Psi(\vec{x}) = \sum_{n} c_n
\cos\left(\frac{2\pi{} nx}{\Lambda}\right)$, with the finite number of
coefficients $\{c_n\}$ functioning as minimization parameters. As we
show below, this choice not only offers a high degree of convergence,
requiring typically less than a dozen coefficients, but also
automatically satisfies the incompressibility or volume-conservation
condition $\int \Psi = 0$, which would otherwise require an
additional, nonlinear constraint. Note that the optimality and
efficiency of the minimization can be significantly improved when
local derivative information (with respect to the minimization
parameters) is available, but given that even a single evaluation of
$\mathcal{E}_{\mathrm{vdW}} [\Psi]$ is expensive---a tour-de-force
calculation involving hundreds of scattering
calculations~\cite{arodreview}---this is currently prohibitive in the
absence of an adjoint formulation (a topic of future
work)~\cite{Giles2000}. Given our interest in equilibrium fluid shapes
close to the initial condition of a flat fluid surface ($\Psi = 0$) and
because of the small number of degrees of freedom $\{c_n\}$ needed to
resolve the shapes, we find that local, derivative-free optimization is
sufficiently effective, yielding fast-converging solutions.
In what follows, we compare the solutions of~\eqref{Emin} based
on~\eqref{FSC} against those obtained through PFA and PWS, which
approximate $\mathcal{E}_{\mathrm{vdW}}$ in this periodic geometry as:
\begin{align}
\mathcal{E}_{\mathrm{PFA}} &= -\frac{\pi^2 \hbar c}{720}
\int_{-\Lambda/2}^{\Lambda/2} \mathrm{d}x
\left(\frac{1}{h(x) - \Psi(x)}\right)^{3} \label{eq:PFA} \\
\mathcal{E}_\mathrm{PWS} &=
A \int_{-\Lambda/2}^{\Lambda/2} \mathrm{d}x'
\int_{-\infty}^{\infty} \mathrm{d}x
\int_{h(x')}^{\infty} \mathrm{d}y'
\int_{-\infty}^{\Psi(x)} \mathrm{d}y \frac{1}{s^6},
\label{eq:PWS}
\end{align}
where $A = -\frac{2\pi\hbar c}{45}$ is a Hamaker-like coefficient
obtained by requiring that \eqref{PWS} yield the correct vdW energy
for two parallel PEC plates, as is typically
done~\cite{Bergstrom1997}. \Eqref{PWS} is obtained from pairwise
integration of the $r^{-7}$ Casimir--Polder interactions following
integration over $z$ and $z'$, with $r = \sqrt{s^2 + (z - z')^2}$ and
$s = \sqrt{(x - x')^2 + (y - y')^2}$~\footnote{Note that in situations
involving a deformed PEC surface and flat PEC plate, one can show
that $\mathcal{E}_\mathrm{PWS} =
\mathcal{E}_\mathrm{PFA}$~\cite{Emig2003}, as this is a direct
consequence of the additivity of the interaction.}. Note that
because we only consider perfect conductors, there is no dispersion to
set a characteristic length scale and hence all results can be quoted
in terms of an arbitrary length scale, which we choose to be
$\Lambda$. Additionally, we express the surface tension $\gamma$ in
units of $\gamma_{\mathrm{vdW}} = \frac{\pi^{2}\hbar c}{720d^{3}}$,
the vdW energy per unit area between two flat PEC plates separated by
distance $d$. In what follows, we consider the impact of
non-additivity on the fluid shape under both repulsive [\figref{fig2}]
or attractive [\figref{fig3}] vdW pressures (obtained by appropriate
choice of its sign), under the simplifying assumption of PEC surfaces
interacting through vacuum. In either case, we consider local
optimizations with small initial trust radii around $\Psi = 0$, and
characterize the equilibrium fluid profile $\Psi(x)$ as $\gamma$ is
varied. Our minimization approach is also validated against numerical
solution of \eqref{YLE} under PFA (green circles).
\begin{figure}[t!]
\centering
\includegraphics[width=0.97\columnwidth]{repulsivehdiffsvsg_smallstep_withinsets.eps}
\caption{Maximum displacement $\Delta\Psi/d$ of a fluid--vacuum
interface that is repelled from a grating (insets) by a repulsive
vdW force, as a function of surface tension
$\gamma/\gamma_{\mathrm{vdW}}$, obtained via solution of
\eqref{Emin} using FSC (blue), PWS (red), and PFA (green)
methods. Circles indicate results obtained through \eqref{YLE}.
Insets show the equilibrium fluid--surface profiles at selected
$\gamma \in{} \{0.006, 0.055, 0.277\}\gamma_{\mathrm{vdW}}$, with
the unperturbed $\Psi = 0$ surface denoted by black dashed lines.}
\label{fig:fig2}
\end{figure}
\emph{Repulsion.--} We first consider the effects of vdW repulsion on
the equilibrium profile of the fluid--vacuum interface, enforced in
our PEC model by flipping the sign of the otherwise attractive vdW
energy. Such a situation can arise when a fluid film either sits on or
is brought in close proximity to a solid grating
[\figref{fig2}(insets)], causing the fluid to either wet or dewet the
grating~\cite{Israelachvili}, respectively. \Figref{fig2} compares the
dependence of the maximum displacement $\Delta\Psi =
\Psi_{\mathrm{max}} - \Psi_{\mathrm{min}}$ of the fluid surface on
$\gamma$, as computed by FSC (blue), PWS (red), and PFA (green). Also
shown are selected surface profiles at small, intermediate, and large
$\gamma/\gamma_\mathrm{vdW}$. Note that the combination of a repulsive
vdW force, surface tension, and incompressibility leads to a
\emph{local} equilibrium shape that is corroborated via linear
stability analysis~\cite{ivanov1988thin}.
Under large $\gamma$, the surface energy dominates and thus all three
methods result in nearly-flat profiles, with $|\Psi| \ll d$. While
both additive approximations reproduce the exact energy of the
plane--plane geometry (with the unnormalized PWS energy
underestimating the exact energy by 20\%~\cite{lambrechtPWS}), we find
that (at least for this particular grating geometry)
$\mathcal{E}_\mathrm{PWS,PFA} / \mathcal{E}_\mathrm{FSC} \approx 0.25$
in the limit $\gamma \to \infty$, revealing that even for a flat fluid
surface, the grating structure contributes significant non-additivity.
Noticeably, at large but finite $\gamma \gg \gamma_\mathrm{vdW}$,
$\Delta\Psi$ is significantly larger under FSC and PFA than under PWS,
with $\Psi_\mathrm{FSC,PWS}$ exhibiting increasingly better qualitative
and quantitative agreement compared to the sharply peaked
$\Psi_\mathrm{PFA}$ as $\gamma$ decreases [\figref{fig2}(insets)]. The
stark deviation of PFA from FSC and PWS in the vdW--dominated regime
$\gamma \ll \gamma_{\mathrm{vdW}}$ is surprising in that PWS involves
volumetric interactions within the objects, whereas PFA and FSC depend
only on surface topologies. Essentially, the pointwise nature of PFA
means $\mathcal{E}_{\mathrm{PFA}}$ depends only on the local
surface--surface separation, decreasing monotonically with decreasing
separations and competing with surface tension and incompressibility
to yield a surface profile that nearly replicates the shape of the
grating in the limit $\gamma\to 0$. Quantitatively, PFA leads to
larger $\Delta\Psi$ as $\gamma \to 0$, asymptoting to a constant
$\lim_{\gamma \to 0} \Delta \Psi_{\mathrm{PFA}} \to H = 3d$ at
significantly lower $\frac{\gamma}{\gamma_{\mathrm{vdW}}} <
10^{-5}$. On the other hand, both $\mathcal{E}_{\mathrm{FSC}}$ and
$\mathcal{E}_{\mathrm{PWS}}$ exhibit much weaker dependences on the
fluid shape at low $\gamma$, with the former depending slightly more
strongly on the surface amplitude and hence leading to asymptotically
larger $\Delta\Psi$ as $\gamma \to 0$; in this geometry, we find that
$\Delta\Psi_{\mathrm{FSC,PWS}} \to \{0.32, 0.28\}d$ for
$\frac{\gamma}{\gamma_{\mathrm{vdW}}} \lesssim 10^{-2}$. Furthermore,
while PFA and PWS are found to agree with FSC at large and small
$\gamma$, respectively, neither approximation accurately predicts the
surface profile in the intermediate regime $\gamma \sim
\gamma_\mathrm{vdW}$, where neither vdW nor surface energies
dominate. Ultimately, neither of these approximations is capable of
predicting the fluid shape over the entire range of $\gamma$.
\emph{Attraction.--} We now consider the effects of vdW attraction,
which can cause a fluid film either sitting on or brought into
close proximity to a solid grating [\figref{fig3}(insets)] to dewet
or wet the grating, respectively~\cite{Israelachvili}. Here, matters
are complicated by the fact that $\mathcal{E}_\mathrm{vdW} \to -\infty$
as the fluid surface approaches the grating, leading to a fluid
instability or wetting transition below some critical
$\gamma^{(\mathrm{c})}$, depending on the competition between the
restoring surface tension and attractive vdW pressure. Such
instabilities have been studied in microfluidic systems through both
additive approximations~\cite{Bonn2009, kerle, Geoghegan2003,
Quinn2013}, but as we show in \figref{fig3}, non-additivity can lead
to dramatic quantitative discrepancies in the predictions obtained from
each method of computing $\mathcal{E}_{\mathrm{vdW}}$. To obtain
$\gamma^{(\mathrm{c})}$ along with the shape of the fluid surface for
$\gamma > \gamma^{(\mathrm{c})}$, we seek the nearest local solution
of~\eqref{Emin} starting from $\Psi = 0$. \Figref{fig3} quantifies the
onset of the wetting transition by showing the variation of the
minimum grating-fluid separation $h_{\mathrm{min}} -
\Psi_{\mathrm{max}}$ with respect to $\gamma$, as computed by FSC
(blue), PWS (red), and PFA (green), along with the corresponding
$\mathcal{E}_{\mathrm{vdW}}$ [\figref{fig3}(inset)] normalized to
their respective values for the plane--grating geometry (attained in
the limit $\gamma\to\infty$). Also shown in the top-right inset are
the optimal surface profiles at $\gamma\approx\gamma^{(\mathrm{c})}$
obtained from the three methods.
In contrast to the case of repulsion, here the fluid surface
approaches rather than moves away from the grating, which ends up
changing the scaling of $\mathcal{E}_{\mathrm{vdW}}$ with $\Psi$ and
leads to very different qualitative results. In particular, we find
that $\mathcal{E}_{\mathrm{FSC}}$ exhibits a much stronger dependence
on $\Psi_{\mathrm{max}}$ compared to PWS and PFA, leading to a much
larger $\gamma^{(\mathrm{c})}$ and a correspondingly broad surface
profile. As before, the strong dependence of
$\mathcal{E}_{\mathrm{PFA}}$ on the fluid surface, a consequence of
the pointwise nature of the approximation, produces a sharply peaked
surface profile, while the very weak dependence of
$\mathcal{E}_{\mathrm{PWS}}$ on the fluid shape ensures both a gross
underestimation of $\gamma^{(\mathrm{c})}$ along with a broader
surface profile. Interestingly, we find that
$\gamma^{(\mathrm{c})}_{\mathrm{FSC,PFA, PWS}} \approx
\{0.65,0.38,0.07\}\gamma_{\mathrm{vdW}}$, emphasizing the failure of
PWS to capture the critical surface tension by nearly an order of
magnitude.
\begin{figure}[t!]
\centering
\includegraphics[width=0.87\columnwidth]{attractive_new.eps}
\caption{Minimum surface--surface separation $\frac{h_{\mathrm{min}} -
\Psi_{\mathrm{max}}}{d}$ of a fluid--vacuum interface that is
attracted to a grating (insets) by an attractive vdW force, as a
function of surface tension $\frac{\gamma}{\gamma_{\mathrm{vdW}}}$,
obtained via solution of \eqref{Emin} using FSC (blue), PWS (red),
and PFA (green) methods. Circles indicate results obtained through
\eqref{YLE}. Wetting transitions occurring at critical values of
surface tension $\gamma^{(\mathrm{c})}$, marked as 'x'. The
top-right inset shows the equilibrium fluid--surface profiles near
$\gamma^{(\mathrm{c})}$ while the bottom-left inset shows the
equilibrium vdW energies normalized by the energies of the
unperturbed ($\Psi=0$) plane--grating geometry (the limit of $\gamma
\to \infty$).}
\label{fig:fig3}
\end{figure}
\emph{Concluding Remarks.--} The predictions and approach described
above offer evidence of the need for exact vdW calculations for the
accurate determination of the wetting and dewetting behavior of fluids
on or near structured surfaces. While we chose to employ a simple
materials-agnostic and scale-invariant model for the vdW energy,
realistic (dispersive) materials can be readily analyzed within the
same formalism, requiring no modifications. We expect that in these
cases, non-additivity will play an even larger role. In fact, recent
works~\cite{Noguez2004, lambrechtPWS} have shown that additive
approximations applied to even simpler structures can contribute
larger discrepancies in dielectric as opposed to PEC bodies. For the
geometry considered above, assuming $\Lambda = 50 \, \mathrm{nm}$ and
a nonretarded Hamaker constant $A =
10^{-19}~\mathrm{J}$~\cite{Gu2001, Bergstrom1997, Israelachvili},
corresponding to a gold--water--oil material combination (with the thin
$d = 20~\mathrm{nm}$ water film taking the role of vacuum in our
model), we estimate that significant fluid displacements $\Delta \Psi
\sim 10~\mathrm{nm}$ and non-additivity can arise at $\gamma \approx
10^{-6}~\mathrm{J/m^{2}}$. By exploiting surfactants, it
should be possible to explore a wide range of $\gamma \in [10^{-7},
10^{-2}] \, \mathrm{J/m^{2}}$~\cite{Quinn2013} and hence fluid
behaviors, from vdW- to surface-energy dominated regimes. Yet another
tantalizing possibility is that of observing these kinds of
non-additive interactions in extensions of the original liquid He$^4$
wetting experiments that motivated development of more general
theories of vdW forces (Lifshitz theory) in the first
place~\cite{Dzyaloshinskii1961}. In the future, it might also be
interesting to consider the impact of other forces, including but not
limited to gravity as well as finite-temperature thermodynamic effects
arising in the presence of gases in contact with fluid surfaces.
\emph{Acknowledgments.--} We are grateful to Howard A. Stone, M. T.
Homer Reid, and Steven G. Johnson for useful discussions. This
material is based upon work supported by the National Science
Foundation under Grant No. DMR-1454836 and by the National Science
Foundation Graduate Research Fellowship Program under Grant No. DGE
1148900.
|
\section{Introduction}
Bell showed that quantum mechanics allows correlations that cannot be generated by classical physics~\cite{bell1964einstein}.
Clauser, Horne, Shimony, and Holt (CHSH) found simpler constraints on correlations which could be violated on quantum mechanics, but is always satisfied
on classical physics~\cite{PhysRevLett.23.880}, which in fact, characterize the set of correlations generated by classical physics on the binary setting~\cite{PhysRevLett.48.291}.
Apart from the concrete mathematical description of quantum mechanics, we can only consider abstract statistical behavior realized by quantum mechanics.
A nonlocal box is an abstract device which represents statistical behavior of separable measurements on a possibly entangled state on quantum mechanics and superquantum theory as well.
A nonlocal box is assumed to be shared by two parties, Alice and Bob.
A nonlocal box has input ports and output ports on the both sides.
A nonlocal box is specified by the conditional probability distribution $p(a,b\mid x,y)$ representing the probability of
outputting $a$ to Alice and $b$ to Bob when Alice and Bob input $x$ and $y$ into the nonlocal box, respectively.
Here, all of $x$, $y$, $a$ and $b$ are assumed to be either of 0 or 1.
They cannot communicate by using the nonlocal box since it satisfies the no-signaling condition
\begin{align*}
\sum_{b\in\{0,1\}} p(a,b\mid x,0) &= \sum_{b\in\{0,1\}} p(a,b\mid x,1)\\
\sum_{a\in\{0,1\}} p(a,b\mid 0,y) &= \sum_{a\in\{0,1\}} p(a,b\mid 1,y).
\end{align*}
The CHSH probability $P_{\mathrm{CHSH}}$ is a measure of the nonlocality of the nonlocal box defined by
\begin{equation*}
P_{\mathrm{CHSH}} := \frac14\sum_{x,y} \sum_{\substack{a,b\\ a\oplus b = x\wedge y} }p(a,b\mid x,y).
\end{equation*}
While the maximum CHSH probability given by classical physics is $P_{\mathrm{CHSH}}=3/4$,
that for quantum mechanics is $P_{\mathrm{CHSH}}=\frac{2+\sqrt{2}}4$~\cite{cirelson1980}.
On the other hand, Popescu and Rohrich showed that there exists the nonlocal box, called the PR box, with $P_{\mathrm{CHSH}}=1$~\cite{PR1994}.
Hence, it is a natural question why quantum mechanics cannot achieve the CHSH probability greater than $\frac{2+\sqrt{2}}4$.
Van Dam showed that if Alice and Bob share unlimited number of PR boxes, they can compute arbitrary function $f(x,y)$ only by sending 1 bit to each other where $x$ and $y$ are $n$ bits owned by Alice and Bob, respectively~\cite{vandam2005}.
It gives the explanation why Nature does not allow $P_{\mathrm{CHSH}}=1$ since we strongly believe that the trivial communication complexity must not be allowed by Nature.
Furthermore, Brassard et al.\@ showed that the nonlocal box with $P_{\mathrm{CHSH}} > \frac{3+\sqrt{6}}6$ yields the trivial communication complexity on the probabilistic setting~\cite{PhysRevLett.96.250401}.
It has not been known whether or not the communication complexity is trivial when the CHSH probability is between $\frac{2+\sqrt{2}}4$ and $\frac{3+\sqrt{6}}6$.
Later, Paw\l owski et al.\@ completely characterized the quantum CHSH probability $\frac{2+\sqrt{2}}4$ by using new principle called information causality~\cite{pawlowski2009information}.
However, it is still interesting to determine the exact threshold of $P_{\mathrm{CHSH}}$ for the trivial communication complexity.
In this paper, we show that the trivial communication complexity below $\frac{3+\sqrt{6}}6$ cannot be proved by Brassard et al.'s technique.
Their technique is based on the recursive bias amplification from exponentially small bias to constant bias by using the 3-input majority function $\mathrm{Maj}_3$.
It was not obvious that $\mathrm{Maj}_3$ is the best choice for the bias amplification.
It seems to be curious that $\mathrm{Maj}_3$ is the optimal function for the bias amplification if it is true.
In this paper, we show that $\mathrm{Maj}_3$ is the unique optimal function for the bias amplification.
\begin{theorem}\label{thm:main}
The 3-input majority function is the unique optimal for Brassard et al.'s technique of the bias amplification using the nonlocal boxes.
Hence, one cannot obtain the threshold for the trivial communication complexity smaller than $\frac{3+\sqrt{6}}{6}$ by Brassard et al.'s technique.
\end{theorem}
In Brassard et al.'s protocol, the 3-input majority function $\mathrm{Maj}_3$ is computed by a non-adaptive protocol, i.e.,
inputs for nonlocal boxes are independent of outputs of other nonlocal boxes.
In this work, we introduce a new adaptive protocol inspired by~\cite{pawlowski2009information}, and show that the new adaptive protocol is no worse than arbitrary non-adaptive protocol.
Then, we show Theorem~\ref{thm:main} for generalizations of Brasssard et al.'s protocol in which arbitrary boolean function is used for the bias amplification in place of $\mathrm{Maj}_3$, and is
computed by the new adaptive protocol.
In this work, protocols for the computation of the function corresponding to $\mathrm{Maj}_3$
are restricted to be non-adaptive protocols or the new adaptive protocol inspired by~\cite{pawlowski2009information}.
For the proof of Theorem~\ref{thm:main}, we use the Fourier analysis of boolean functions developed in theoretical computer science~\cite{odonnell2014analysis}.
\section{Preliminaries}\label{sec:pre}
\subsection{XOR protocol and nonlocal boxes}
We introduce some notions and notations.
\begin{definition}
For a boolean function $f\colon\{0,1\}^n\times\{0,1\}^n\to\{0,1\}$,
XOR protocol with bias $\epsilon$ is a process of computations by Alice and Bob
in which Alice and Bob compute $a$ and $b$, respectively, by using nonlocal boxes and shared random bits but without any communication
such that $a\oplus b=f(x,y)$ with probability $(1+\epsilon)/2$.
\end{definition}
There is a simple XOR protocol with bias $2^{-n}$ for arbitrary function~\cite{PhysRevLett.96.250401}.
\begin{lemma}
\label{lem:1bit2n}
There is an XOR protocol with bias $2^{-n}$ for arbitrary function $f(x,y)$ without using nonlocal boxes.
\end{lemma}
\begin{proof}
Let $r\in\{0,1\}^n$ be shared uniform random bits.
Let $a=f(x,r)$.
Let $b = 0$ if $r=y$ and $b=r'$ otherwise where $r'\in\{0,1\}$ is Bob's private uniform random bit.
Then, $a\oplus b =f(x,y)$ with probability $\frac12+\frac1{2^{n+1}}$.
\end{proof}
\begin{definition}
The nonlocal box is said to be isotropic if
\begin{equation*}
\sum_{\substack{a,b\\ a\oplus b = x\wedge y}} p(a,b\mid x,y)
\end{equation*}
does not depend on $x$ and $y$ and if the marginal distributions for $a$ and $b$ are uniform for any $x$ and $y$.
\end{definition}
It was shown in~\cite{PhysRevA.73.012112, PhysRevLett.102.180502} that the isotropic nonlocal box can be simulated by arbitrary nonlocal box with the same CHSH probability.
\begin{lemma}\label{lem:iso}
Using arbitrary given nonlocal box, the isotropic nonlocal box with the same CHSH probability can be simulated.
\end{lemma}
From Lemma~\ref{lem:iso}, in this study, we assume that all nonlocal boxes are isotropic.
Forster et al.\@ showed that non-isotropic nonlocal boxes can be used for the nonlocality distillation, which is the
amplification of the CHSH probability~\cite{PhysRevLett.102.120401}.
Brunner and Skrzypczyk showed that there exists non-isotropic nonlocal box with $P_{\mathrm{CHSH}}=3/4+\epsilon$
for arbitrary small $\epsilon>0$ which allows the simulation of nonlocal box arbitrarily close to the PR box~\cite{PhysRevLett.102.160403}.
Of course, such nonlocal box cannot be simulated on quantum mechanics even if the CHSH probability of the nonlocal box is achievable by quantum mechanics.
In this study, we do not consider the nonlocality distillation, but consider the XOR protocol using isotropic nonlocal boxes.
\subsection{Fourier analysis}
The Fourier analysis is the main mathematical tool in this work.
\begin{definition}
Any boolean function $f\colon\{+1,-1\}^n\to\{+1,-1\}$ can be represented by a polynomial on $\mathbb{R}$ uniquely
\begin{equation*}
f(x) = \sum_{S\subseteq [n]} \widehat{f}(S)\prod_{i\in S} x_i
\end{equation*}
where $[n]:=\{1,2,\dotsc,n\}$.
Here, $(\widehat{f}(S))_{S\subseteq[n]}$ are called the Fourier coefficients of $f$.
When we consider the Fourier coefficients of boolean function $f\colon\{0,1\}^n\to\{0,1\}$,
we regard $f$ as the function from $\{+1,-1\}^n$ to $\{+1,-1\}$.
From Parseval's identity, the sum of squares of the Fourier coefficients is 1.
Let $\mathrm{supp}(\widehat{f}):=\{S\subseteq[n]\mid \widehat{f}(S)\ne 0\}$.
For $S\subseteq[n]$, let $1_S$ be a vector on $\mathbb{F}_2$ of length $n$ such that $i$-th element of $1_S$ is 1 iff $i\in S$.
Let $\dim(\widehat{f})$ be the Fourier dimension of $f$ which is the dimension of linear space on $\mathbb{F}_2$ spanned by $\{1_S\mid S\in \mathrm{supp}(\widehat{f})\}$.
\end{definition}
\subsection{One-way communication complexities}
We introduce notions on the one-way communication complexity of $f\colon\{0,1\}^n\times\{0,1\}^n\to\{0,1\}$.
Let $M_f$ be a $2^n\times 2^n$ matrix whose $(x,y)$-element is $f(x,y)$.
Let $D_{\rightarrow}(f)$ be the one-way communication complexity of $f$ from Alice to Bob, which is the minimum $m$ such that
there exist functions $s\colon \{0,1\}^n\to\{0,1\}^m$ and $h\colon\{0,1\}^m\times\{0,1\}^n\to\{0,1\}$ satisfying the identity $f(x,y) = h(s(x), y)$.
Similarly, let $D_{\leftarrow}(f)$ be the one-way communication complexity of $f$ from Bob to Alice.
The one-way communication complexities can be characterized by the number of distinct rows and columns of $M_f$, i.e,
$D_\rightarrow(f) = \lceil \log_2 \mathrm{nrows}(M_f)\rceil$ and
$D_\leftarrow(f) = \lceil \log_2 \mathrm{ncols}(M_f)\rceil$
where $\mathrm{nrows}(M_f)$ and $\mathrm{ncols}(M_f)$ denote the number of distinct rows and the number of distinct columns of $M_f$, respectively.
We also define
\begin{align*}
D_{\rightarrow}^\oplus(f) &:= \min_{A\colon \{0,1\}^n\to\{0,1\}} D_{\rightarrow}\left(f(x,y)\oplus A(x)\right)\\
D_{\leftarrow}^\oplus(f) &:= \min_{B\colon \{0,1\}^n\to\{0,1\}} D_{\leftarrow}\left(f(x,y)\oplus B(y)\right).
\end{align*}
Here, $D_\rightarrow^\oplus(f)$ is the minimum number of bits Alice have to send to Bob such that
Alice can compute $a$ and Bob can compute $b$ satisfying $a\oplus b = f(x,y)$.
\subsection{Other notations}
For odd $n$, let $\mathrm{Maj}_{n}\colon\{0,1\}^n\to\{0,1\}$ be the majority function on $n$ variables.
For even $n$, let $\mathrm{Maj}_{n}$ be the set of majority functions on $n$ variables where the definitions for the tie cases are arbitrary.
Since there are $\binom{n}{\frac{n}2}$ tie cases, $|\mathrm{Maj}_n|=2^{\binom{n}{\frac{n}2}}$ for even $n$.
Note that a function $f\colon\{0,1\}^{2k}\to\{0,1\}$ which ignores one of the $2k$ input variables, and outputs the majority of the other $2k-1$ variables is a member of $\mathrm{Maj}_{2k}$.
Finally, let $\delta:=2P_{\mathrm{CHSH}}-1$, i.e., $P_{\mathrm{CHSH}}=\frac{1+\delta}2$.
Here, we call $\delta$ the bias of the CHSH probability.
\section{Brassard et al.'s protocol}\label{sec:brassard}
Brassard et al.'s basic idea is bias amplification by $\mathrm{Maj}_3$.
They showed that $\mathrm{Maj_3}$ can be computed by using two PR boxes.
Here, we give a simple argument showing that two PR boxes are sufficient to compute $\mathrm{Maj}_3(x\oplus y)$.
The $\mathbb{F}_2$-polynomial representation of the 3-input majority function is $\mathrm{Maj}_3(z_1,z_2,z_3)=z_1z_2\oplus z_2z_3\oplus z_3z_1$.
Hence, one obtains the representation
\begin{align}
&\mathrm{Maj}_3(x_1\oplus y_1, x_2\oplus y_2, x_3\oplus y_3)\nonumber\\
&=
(x_1\oplus x_2)(y_2\oplus y_3) \oplus (x_2\oplus x_3)(y_1\oplus y_2)\nonumber\\
&\quad\oplus (x_1x_2 \oplus x_2x_3 \oplus x_3 x_1)
\oplus (y_1y_2 \oplus y_2y_3 \oplus y_3 y_1).
\label{eq:maj3}
\end{align}
The following is the protocol for computing $a$ and $b$.
Alice and Bob can compute their local terms
$\mathrm{Maj}_3(x):=x_1x_2 \oplus x_2x_3 \oplus x_3 x_1$
and
$\mathrm{Maj}_3(y):=y_1y_2 \oplus y_2y_3 \oplus y_3 y_1$
without communication, respectively.
For the each of first two terms in~\eqref{eq:maj3}, they use the PR box.
For the first PR box, Alice and Bob input $x_1\oplus x_2$ and $y_2\oplus y_3$
and obtain $a_1$ and $b_1$, respectively.
Similarly,
for the second PR box, Alice and Bob input $x_2\oplus x_3$ and $y_1\oplus y_2$
and obtain $a_2$ and $b_2$, respectively.
Then, Alice and Bob output $a:= \mathrm{Maj}_3(x)\oplus a_1\oplus a_2$ and $b:= \mathrm{Maj}_3(y)\oplus b_1\oplus b_2$, respectively.
This is the XOR protocol without error using two PR boxes.
Von Neumann showed that the probability of correctness of computations sufficiently close to 1/2 is amplified by noisy $\mathrm{Maj}_3$ iff the computation of $\mathrm{Maj}_3$ succeeds with probability greater than 5/6~\cite{neumann1956}.
Hence, the threshold of the above protocol is given by the condition $P_{\mathrm{CHSH}}^2 + (1-P_{\mathrm{CHSH}})^2 > 5/6\iff P_{\mathrm{CHSH}}>\frac{3+\sqrt{6}}6$.
On this condition, the iterative applications of $\mathrm{Maj}_3$ to independent samples obtained by the protocol in Lemma~\ref{lem:1bit2n}
give a constant bias.
Brassard et al.\@ invented the above elegant protocol, and showed that if $P_{\mathrm{CHSH}}>\frac{3+\sqrt{6}}6$, there exists an XOR protocol with constant bias for arbitrary function $f$.
However, there is no reason why $\mathrm{Maj}_3$ should be used for the bias amplification.
We can use arbitrary functions, e.g., the majority function on 5 variables, in place of $\mathrm{Maj}_3$.
Of course, on given number $n$ of input variables, the majority functions $\mathrm{Maj}_n$ minimize the threshold value, corresponding to 5/6 for $\mathrm{Maj}_3$.
However, non-majority function may require smaller number of nonlocal boxes than the majority functions.
Hence, non-majority functions are also candidates for the generalization of Brassard et al's protocol.
We have to generalize two quantities ``2'' and ``5/6'' in the case of $\mathrm{Maj}_3$, which are the number of nonlocal boxes needed for the computation
and the threshold for the probability of the correctness of computation of the function for the bias amplification, respectively.
In this work, these two quantities are clearly characterized.
Although we can consider general function $f\colon\{0,1\}^n\times\{0,1\}^n\to\{0,1\}$ in place of $\mathrm{Maj}_3(x\oplus y)$,
in this study, we restrict $f$ to be XOR function, i.e., $f(x,y)=g^\oplus(x,y):=g(x\oplus y)$ for some $g\colon\{0,1\}^n\to\{0,1\}$.
It seems to be a natural restriction since the inputs $x$ and $y$ have meaning only when their XOR is taken.
Linden et al.\@ showed that quantum mechanics has no advantage on XOR protocol for computation of XOR function when the input distribution is also XOR function~\cite{PhysRevLett.99.180502}.
\section{Non-adaptive PR-correct protocols}
Brassard et al.\@ consider the protocol according to the $\mathbb{F}_2$-polynomial representation~\eqref{eq:maj3} for computing $\mathrm{Maj}_3^\oplus$.
In this section, we show that for arbitrary given $f\colon \{0,1\}^n\times\{0,1\}^n\to\{0,1\}$, this protocol is the best protocol for computing $f(x,y)$
among all protocols satisfying the non-adaptivity and the PR-correctness.
\begin{definition}
An XOR protocol is said to be non-adaptive if inputs for nonlocal boxes does not depend on outputs of other nonlocal boxes.
An XOR protocol is said to be PR-correct if the protocol computes the target function $f(x,y)$ without error when the nonlocal boxes are PR boxes.
An XOR protocol is said to be non-redundant if the inputs $(l_i(x),r_i(x))_{i=1,\dotsc,t}$ for the nonlocal box satisfy
\begin{align}
&A(x) \oplus B(y) \oplus \bigoplus_{i=1}^{t} \left(C_i\wedge l_i(x)\wedge r_i(y)\right) = 0\nonumber\\
& \iff (C_i)_{i=1,\dotsc,t} = 0, A(x)=B(y).
\label{eq:red}
\end{align}
\end{definition}
The following lemma was shown by Kaplan et al.~\cite{kaplan2011nonlocal}.
Here, we give a short proof using Fourier analysis.
\begin{lemma}\label{lem:parity}
The outputs of both players in non-adaptive PR-correct non-redundant protocol must be parity of the outputs of nonlocal boxes and a function of local inputs.
\end{lemma}
\begin{proof}
Let $l_1(x),\dotsc,l_t(x)$ and $r_1(y),\dotsc,r_t(y)$ be the inputs of nonlocal boxes from Alice and Bob, respectively.
Let $a_1,\dotsc,a_t$ and $b_1,\dotsc,b_t$ be the outputs of the nonlocal boxes for Alice and Bob, respectively.
From any protocol, one can obtain a modified protocol using $(l'_i(x):=l_i(x)\oplus l_i(0),r'_i(x):=r_i(y)\oplus r_i(0))_{i=1,\dotsb,t}$ as the inputs for nonlocal boxes
since replacements of $a_i$ and $b_i$ by $a'_i\oplus l'_i(x)r_i(0) \oplus l_i(0)r_i(0)$ and $b'_i\oplus l_i(0)r'_i(y)$ for $i=1,\dotsc,t$, respectively, simulate the original protocol where $(a'_i, b'_i)_{i=1,\dotsc t}$ is the outputs of the nonlocal boxes in the modified protocol.
This transformation preserves non-adaptivity, PR-correctness and non-redundancy.
This transformation also preserves whether or not the outputs of both players are parity of the outputs of nonlocal boxes and a function of local inputs.
Hence, without loss of generality, we can assume that $l_1(0)=\dotsb=l_t(0)=r_1(0)=\dotsb=r_t(0)=0$.
Assume that $a=u_x(a_1,\dotsc,a_t)$ and $b=v_y(b_1,\dotsc,b_t)$.
Since the protocol is PR-correct, $a\oplus b = u_x(a_1,\dotsc,a_t)\oplus v_y(a_1\oplus z_1(x,y),\dotsc,a_t\oplus z_t(x,y))$ must be constant for all $(a_1,\dotsc,a_t)\in\{0,1\}^t$
where $z_i(x,y):=l_i(x)\wedge r_i(y)$.
By letting $x=0$ ($y=0$), we obtain that $v_y$ $(u_x)$ is equal to $u_0$ ($v_0$) or its negation for any $y$ ($x$), respectively.
Hence, there exists boolean functions $F\colon\{0,1\}^t\to\{0,1\}$, $\varphi, \psi\colon \{0,1\}^n\to\{0,1\}$ such that
$u_x(a_1,\dotsc,a_t) = \varphi(x)\oplus F(a_1,\dotsc,a_t)$ and
$v_y(b_1,\dotsc,b_t) = \psi(y)\oplus F(b_1,\dotsc,b_t)$.
On the other hand, it holds on the $\{+1,-1\}$ domain that
\begin{align}
&ab = \left(\sum_{S\subseteq [t]} \widehat{u}_x(S) \prod_{i\in S} a_i\right)
\left(\sum_{S\subseteq [t]} \widehat{v}_y(S) \prod_{i\in S} (a_i z_i(x,y))\right)\nonumber\\
&= \sum_{S_1, S_2\subseteq [t]} \widehat{u}_x(S_1) \widehat{v}_y(S_2) \prod_{i\in S_2} z_i(x,y) \prod_{i\in (S_1\cup S_2)-(S_1\cap S_2)} a_i\nonumber\\
&= \sum_{S\subseteq [t]} \left(\sum_{\substack{S_1, S_2,\\ (S_1\cup S_2) - (S_1\cap S_2)= S}} \widehat{u}_x(S_1) \widehat{v}_y(S_2) \prod_{i\in S_2} z_i(x,y)\right)\nonumber\\
&\qquad \cdot\prod_{i\in S} a_i
\label{eq:PRc}
\end{align}
This is the Fourier expansion of
$u_x(a_1,\dotsc,a_t)\oplus v_y(a_1\oplus z_1(x,y),\dotsc,a_t\oplus z_t(x,y))$ as a function of $a_1,\dotsc,a_t$.
Since the function must be constant, the Fourier coefficients for the empty set must be $\pm1$, i.e.,
\begin{align*}
\sum_{S_1\subseteq[t]} \varphi(x)\psi(y)\widehat{F}(S_1)^2 \prod_{i\in S_1} z_i(x,y) \in \{+1,-1\}
\end{align*}
for any $x,y\in\{0,1\}^n$.
Hence, for any $x,y\in\{0,1\}^n$, $\prod_{i\in S_1}z_i(x,y)$ must be common
for all $S_1 \in\mathrm{supp}(\widehat{F})$.
The equality $\prod_{i\in S_1} z_i(x,y)=\prod_{i\in S_2} z_i(x,y)$ for $S_1\ne S_2$ implies $\prod_{i\in (S_1\cup S_2)-(S_1\cap S_2)} z_i(x,y)=1$
that means the existence of a redundant nonlocal box.
Hence, $\widehat{F}(S_1)\ne 0$ for unique $S_1\subseteq [t]$.
It implies that $u_x$ ($v_y$) is the parity of variables in $S_1$ and $\varphi(x)$ ($\psi(y)$), respectively.
\end{proof}
Naturally, we can ask whether or not the non-redundancy is restriction, i.e., whether or not we can reduce the error probability of the protocol by using the redundancy when the nonlocal boxes are not the PR boxes.
The following lemma says that redundancy does not help to reduce the error probability of non-adaptive PR-correct protocol.
\begin{lemma}\label{lem:redundant}
For arbitrary given non-adaptive PR-correct protocol, there exists non-adaptive PR-correct non-redundant protocol whose error probability is at most that of the original protocol for any bias $\delta$ of the CHSH probability.
\end{lemma}
\begin{proof}
As in the proof of Lemma~\ref{lem:parity}, we can assume without loss of generality that $l_1(0)=\dotsb=l_t(0)=r_1(0)=\dotsb=r_t(0)=0$.
Similarly to~\eqref{eq:PRc}, when the nonlocal boxes are not necessarily the PR boxes, $ab$ is equal to
\begin{align*}
&\sum_{S\subseteq [t]} \left(\sum_{\substack{S_1, S_2,\\ (S_1\cup S_2) - (S_1\cap S_2)= S}} \widehat{u}_x(S_1) \widehat{v}_y(S_2) \prod_{i\in S_2} (e_iz_i(x,y))\right)\\
&\quad\cdot \prod_{i\in S} a_i
\end{align*}
where $e_i$ represents the error of the output of $i$-th nonlocal box, i.e., $e_i=+1$ if the $i$-th nonlocal box computes correctly and $e_i=-1$ otherwise.
Recall that the bias of the CHSH probability is $\delta$, i.e., the expectation of $e_i$ is $\delta$.
Since the nonlocal boxes are isotropic, $e_i$ is independent of any other variables $x$, $y$, $(a_j)_{j\in[t]}$ and $(e_j)_{j\in[t]\setminus\{i\}}$ for $i\in[t]$.
Since the nonlocal boxes are isotropic, $a_i$ is uniformly distributed for all $i\in[t]$.
Hence, the expectation of $ab$ (the bias of $a\oplus b$) is
\begin{align*}
&\sigma(x,y) \varphi(x)\psi(y)\sum_{S_1\subseteq[t]}\widehat{F}(S_1)^2 \delta^{|S_1|}\\
&=:\sigma(x,y)\varphi(x)\psi(y) \mathbf{Stab}_\delta(F)
\end{align*}
where $\sigma(x,y)$ denotes the common sign of $\prod_{i\in S_1}z_i(x,y)\in\{+1,-1\}$
for all $S_1\in \mathrm{supp}(\widehat{F})$.
Since the protocol is PR-correct, $\sigma(x,y)\sigma(x)\psi(y)\in\{+1,-1\}$ must be equal to $f(x,y)$.
Hence, the output of the protocol is correct with probability $(1+\mathbf{Stab}_{\delta}(F))/2$.
On the other hand, since $\prod_{i\in S}z_i(x,y)\in\{+1,-1\}$ is common for all $S\in\mathrm{supp}(\widehat{F})$,
we can obtain a new non-adaptive PR-correct protocol by replacing
$u_x(a_1,\dotsc,a_t)$ and $v_y(b_1,\dotsc,b_t)$ by $\varphi(x)\oplus \bigoplus_{i\in S^*} a_i$ and $\psi(y)\oplus \bigoplus_{i\in S^*} b_i$
for $S^*:=\mathop{\mathrm{argmin}}_{S\in\mathrm{supp}(\widehat{F})} |S|$, respectively.
In order to obtain non-adaptive PR-correct non-redundant protocol,
we shrink the set $S^*$ to $T\subseteq S^*$ if $S^*$ includes the redundancy
(The local terms $\varphi(x)$ and $\psi(y)$ should also be modified according to the shrinkage).
The bias of the probability of correctness of the protocol is $\delta^{|T|}\ge \delta^{|S^*|}\ge \mathbf{Stab}_{\delta}(F)$.
\end{proof}
Lemma~\ref{lem:redundant} implies that if we are interested in the minimization of the error probability among all non-adaptive PR-correct protocols,
we only have to consider non-adaptive PR-correct non-redundant protocols.
\section{The number of nonlocal boxes}
Lemma~\ref{lem:parity} implies that arbitrary non-adaptive PR-correct non-redundant protocol corresponds to $\mathbb{F}_2$-polynomial representation of $f(x,y)$
\begin{equation}
f(x,y) = A(x) \oplus B(y) \oplus \bigoplus_{i=1}^t l_i(x) r_i(y).
\label{eq:F2expand}
\end{equation}
Since the bias of the correctness of the corresponding protocol is $\delta^t$,
we define the following measure of the complexity.
\begin{definition}
The nonlocal box complexity $\mathrm{NLBC}(f)$ is the minimum $t$ such that there exists a representation~\eqref{eq:F2expand}.
\end{definition}
The nonlocal box complexity can be characterized by the rank of some matrix on $\mathbb{F}_2$.
The following theorem slightly generalizes a theorem in~\cite{kaplan2011nonlocal}.
\begin{theorem}\label{thm:f2rank}
For any $f\colon\{0,1\}^n\times\{0,1\}^n\to\{0,1\}$,
\begin{equation*}
\mathrm{NLBC}(f) = \mathrm{rank}_{\mathbb{F}_2}(M_{f'})
\end{equation*}
where $f'(x,y) = f(x,y) \oplus f(x,0) \oplus f(0,y) \oplus f(0,0)$,
and where $M_{f'}$ is a $2^n\times 2^n$ matrix on $\mathbb{F}_2$ such that its $(x,y)$-element is equal to $f'(x,y)$.
\end{theorem}
\begin{proof}
First, we show
$\mathrm{NLBC}(f) \le \mathrm{rank}_{\mathbb{F}_2}(M_{f'})$.
If $\mathrm{rank}_{\mathbb{F}_2}(M_{f'})=r$, there is a matrix factorization $M_{f'}=UV$
for some $2^n\times r$ matrix $U$ and $r\times 2^n$ matrix $V$.
It implies that $f'(x,y)=\bigoplus_{i=1}^r a_i(x) b_i(y)$ where $a_i(x)$ denotes $(x,i)$ element of $U$ and where $b_i(y)$ denotes $(i,y)$ element of $V$.
Hence, it holds $f(x,y) = \left(f(x,0)\oplus f(0,0)\right) \oplus f(0,y) \oplus \bigoplus_{i=1}^r a_i(x)b_i(y)$, and hence $\mathrm{NLBC}(f)\le r$.
Conversely,
if $\mathrm{NLBC}(f)=t$, there is a representation
$f(x,y) = A(x) \oplus B(y) \oplus \bigoplus_{i=1}^t l_i(x) r_i(y)$.
There also exists a representation
$f'(x,y) = A'(x) \oplus B'(y) \oplus \bigoplus_{i=1}^t l_i(x) r_i(y)$.
Since $f'(0,y)=f'(x,0)=0$ for all $x$ and $y$,
by expanding constant terms in $l_i(x)$ and $r_i(x)$, we obtain a representation
$f'(x,y) = \bigoplus_{i=1}^t l'_i(x) r'_i(y)$.
It implies that there is a matrix factorization $M_{f'}=UV$
for $2^n\times r$ matrix $U$ and $r\times 2^n$ matrix $V$
where $(x,i)$ element of U is $l'_i(x)$ and $(i,y)$ element of $V$ is $r'_i(y)$.
Hence, $\mathrm{rank}_{\mathbb{F}_2}(M_{f'})\le t$.
\end{proof}
\begin{remark}
If we restrict the decomposition to be symmetric, i.e., $l_i = r_i$ for all $i=1,\dotsc,t$, extra 1 dimension is required for arbitrary XOR function $g^\oplus$~\cite{doi:10.1137/0204014}.
\end{remark}
\begin{lemma}\label{lem:nlbc1}
For any $g\colon\{0,1\}^n\to\{0,1\}$, $\mathrm{NLBC}(g^\oplus)=0$ only when $g$ is a parity of some variables or its negation.
Furthermore, $\mathrm{NLBC}(g^\oplus)$ cannot be equal to 1.
\end{lemma}
\begin{proof}
From Theorem~\ref{thm:f2rank}, $\mathrm{NLBC}(g^\oplus)=0$ implies
$g(x\oplus y)\oplus g(x) \oplus g(y) \oplus g(0)=0$.
Hence, it holds $g(x\oplus y)\oplus g(0) = (g(x) \oplus g(0)) \oplus (g(y) \oplus g(0))$, so that $g(z)\oplus g(0)$ is linear, i.e., parity of some variables.
Assume $\mathrm{NLBC}(g^\oplus)=1$. From Theorem~\ref{thm:f2rank}, $\mathrm{rank}_{\mathbb{F}_2}(M_{{g^{\oplus}}'})$ must be equal to 1.
Since $M_{{g^\oplus}'}$ is a symmetric matrix, there is a decomposition $M_{{g^\oplus}'}=vv^t$ where $v$ denotes a $\mathbb{F}_2$-vector of length $2^n$.
On the other hand, the diagonal elements of $M_{{g^\oplus}'}$ must be zero.
That implies $v=0$, and hence $\mathrm{NLBC}(g^\oplus)=0$.
This is a contradiction.
\end{proof}
\begin{example}\label{exm:majn}
The following table shows the nonlocal box complexity of $\mathrm{Maj}_n$ computed numerically by a computer.
\begin{ruledtabular}
\begin{tabular}{ccccccccc}
$n$ & 3 & 5 & 7 & 9 & 11 & 13 & 15 & 17\\ \hline
$\mathrm{NLBC}(\mathrm{Maj}_n^\oplus)$ & 2 & 14 & 26 & 254 & 494 & 1090 & 1818 & 65534\\
\end{tabular}
\end{ruledtabular}
\end{example}
In Example~\ref{exm:majn}, it is not easy to find any rule between $n$ and the nonlocal box complexity although $\mathrm{NLBC}(\mathrm{Maj}_n^\oplus)=2^{n-1}-2$
may happen frequently, e.g., $n=3,5,9,17$.
Generally, it is considered to be difficult to express $\mathrm{rank}_{\mathbb{F}_2}(M_f)$ in a simple form for arbitrary given $f$.
Note that the rank on $\mathbb{R}$ is always at least the rank on $\mathbb{F}_2$.
Since $\mathrm{rank}_{\mathbb{R}}(M_{g^\oplus})$ is equal to the number of nonzero Fourier coefficients of $g$~\cite{10.1109/12.755000},
$2^{n-1}+1$ is an upper bound of $\mathrm{NLBC}(\mathrm{Maj}_n^\oplus)$ for odd $n$ (an inequality $\mathrm{rank}_{\mathbb{F}_2}(M_f)-2\le \mathrm{NLBC}(f)\le \mathrm{rank}_{\mathbb{F}_2}(M_f)$ can be obtained in a similar way as Theorem~\ref{thm:f2rank}).
Here, we introduce a lower bound of the nonlocal box complexity using the one-way communication complexity.
\begin{lemma}\label{lem:xor-oneway}
For any $f\colon\{0,1\}^n\times\{0,1\}^n\to\{0,1\}$,
\begin{equation*}
\mathrm{NLBC}(f) \ge \max\left\{D_\rightarrow^\oplus(f), D_\leftarrow^\oplus(f)\right\}.
\end{equation*}
\end{lemma}
\begin{proof}
Assume $f(x,y)$ has the form~\eqref{eq:F2expand}.
Bob can compute $f\oplus A(x)$ from $(l_i(x))_{i=1,\dotsc,\mathrm{NLBC}(f)}$.
\end{proof}
It obviously holds $D_\rightarrow^\oplus(f)\ge D_\rightarrow(f)-1$.
If $g$ is an odd function, i.e., $g(\overline{z})=\overline{g(z)}$ where $\overline{z}$ denotes the bit inversion of $z$, then
$D_\rightarrow^\oplus(g^\oplus)=D_\rightarrow(g^\oplus)-1$
since $g(x\oplus y)\oplus g(x)= g(\overline{x}\oplus y)\oplus g(\overline{x})$.
\begin{example}\label{exm:majlow}
It obviously holds $D_\rightarrow(\mathrm{Maj}_n^\oplus)=n$.
Since $\mathrm{Maj}_n$ is an odd function, it holds $D_\rightarrow^\oplus(\mathrm{Maj}_n^\oplus)=n-1$.
From Example~\ref{exm:majn}, this lower bound is tight for $n=3$, but becomes looser as $n$ increases.
This lower bound seems not to be asymptotically tight.
\end{example}
In fact, the adaptive protocol introduced in the next section has bias $\delta^{D_\rightarrow^\oplus(g^\oplus)}$ for arbitrary XOR function $g^\oplus$.
\section{Adaptive protocol}\label{sec:adaptive}
\subsection{Paw\l owski et al.'s protocol}
In this section, we show a new adaptive protocol which is inspired by the adaptive protocol invented in~\cite{pawlowski2009information}.
Let the address function $\mathrm{Addr}_n$ be
\begin{equation*}
\mathrm{Addr}_n(x_0,\dotsc,x_{2^n-1},y_1,\dotsc,y_n) := x_y
\end{equation*}
where $y=\sum_{i=1}^{n}y_i2^{i-1}$.
In~\cite{pawlowski2009information}, Paw\l owski et al.\@ characterized the quantum limit $\frac{2+\sqrt{2}}{4}$ of the CHSH probability by using a new principle called information causality.
What they essentially showed in~\cite{pawlowski2009information} is following.
\begin{lemma}\label{lem:addr}
There is a PR-correct protocol computing the address function $\mathrm{Addr}_n$ with bias $\delta^{n}$.
\end{lemma}
\begin{proof}
The lemma is shown by the induction.
There is an representation
\begin{equation*}
\mathrm{Addr}_1(x_0,x_1,y_1) = x_0 \oplus y_1 (x_0\oplus x_1).
\end{equation*}
Hence, there exists a non-adaptive protocol computing $\mathrm{Addr}_1$ with bias $\delta$, so that the lemma holds for $n=1$.
For $n\ge 2$, there is a recursive formula
\begin{equation*}
\mathrm{Addr}_n(x_0,\dotsc,x_{2^n-1},y_1,\dotsc,y_n)
=
\mathrm{Addr}_1(x'_0, x'_1, y_n)
\end{equation*}
where
\begin{align*}
x'_0 &:= \mathrm{Addr}_{n-1}(x_0,\dotsc,x_{2^{n-1}-1}, y_1,\dotsc,y_{n-1})\\
x'_1 &:= \mathrm{Addr}_{n-1}(x_{2^{n-1}},\dotsc,x_{2^{n}-1}, y_1,\dotsc,y_{n-1}).
\end{align*}
From the hypothesis of the induction, there is a PR-correct protocol computing $x'_0$ and $x'_1$ with bias $\delta^{n-1}$.
Let $a_0$ and $b_0$ ($a_1$ and $b_1$) be random variables corresponding to the outputs of the protocol computing $x'_0$ ($x'_1$), respectively.
Then, if $\delta=1$, one obtains
\begin{align*}
&\mathrm{Addr}_n(x_0,\dotsc,x_{2^n-1},y_1,\dotsc,y_n)\\
&=\mathrm{Addr}_1(a_0\oplus b_0, a_1\oplus b_1, y_n)\\
&=\mathrm{Addr}_1(a_0, a_1, y_n)\oplus \mathrm{Addr}_1(b_0, b_1, y_n)\\
&=a_0 \oplus y_n (a_0\oplus a_1) \oplus b_{y_n}.
\end{align*}
From this observation, we recursively define the protocol for $\mathrm{Addr}_n$ in the following way.
(P1) Compute $a_0$ and $a_1$ at Alice's side, and $b_{y_n}$ at Bob's side using the protocol for $\mathrm{Addr}_{n-1}$.
(P2) Input $a_0\oplus a_1$ and $y_n$ into the common nonlocal box, and obtain $a'$ and $b'$.
(P3) Output $a:=a_0\oplus a'$ at Alice's side and $b:=b'\oplus b_{y_n}$ at Bob's side.
This protocol is obviously PR-correct.
Since at each step, the error of bias $\delta$ is XORed, this protocol has bias $\delta^n$.
\end{proof}
\subsection{The adaptive protocol}\label{subsec:adaptive}
In the following, we show a new adaptive protocol computing arbitrary given function $f\colon\{0,1\}^n\times\{0,1\}^n\to\{0,1\}$ using Paw\l owski et al's protocol.
\begin{theorem}\label{thm:adaptive}
For arbitrary function $f\colon\{0,1\}^n\times\{0,1\}^n\to\{0,1\}$,
there is a PR-correct protocol computing $f$ with bias $\delta^{\min\{D_\rightarrow^\oplus(f), D_\leftarrow^\oplus(f)\}}$.
\end{theorem}
\begin{proof}
Arbitrary function $f$ can be represented by
\begin{align*}
f(x,y) &= \mathrm{Addr}_{n}\bigl(f(x,0,\dotsc,0),f(x,0\dotsc,0,1),\\
&\quad\dotsc,f(x,1,\dotsc,1),y_1,\dotsc,y_n\bigr).
\end{align*}
From Lemma~\ref{lem:addr}, there is an adaptive protocol computing $f$ with bias $\delta^n$.
We can consider compression of Bob's input since we do not have to distinguish $y$'s belong to equivalent columns of $M_f$.
By applying the compression, we obtain the protocol with bias $\delta^{D_\leftarrow(f)}$.
Furthermore, if we have an XOR protocol for $f(x,y)\oplus B(y)$, we also obtain an XOR protocol for $f(x,y)$
by replacing Bob's output $b$ with $b\oplus B(y)$.
Hence, we obtain the protocol with bias $\delta^{D_\leftarrow^\oplus(f)}$.
In the same way, we also obtain the protocol with bias $\delta^{D_\rightarrow^\oplus(f)}$.
\end{proof}
From Lemma~\ref{lem:xor-oneway} and Theorem~\ref{thm:adaptive}, we obtain the following corollary.
\begin{corollary}
The adaptive PR-correct protocol in Theorem~\ref{thm:adaptive} is no worse than any non-adaptive PR-correct protocol.
\end{corollary}
\section{Bias amplification}\label{sec:ba}
We now consider the bias amplification by general XOR function $g^\oplus$ in Brassard et al.'s protocol where $g^\oplus$ is computed by the adaptive PR-correct protocol introduced in Theorem~\ref{thm:adaptive}.
If $z$ is a random variable taking $+1$ with probability $\frac{1+\epsilon}2$ and $-1$ with probability $\frac{1-\epsilon}2$,
its expectation is $\epsilon$.
The expectation $\epsilon$ is called the bias of random variable $z$.
If the inputs for $g$ is independently and identically distributed and have bias $\epsilon$, the bias of output of $g$ is given in the following formula.
\begin{definition}
For any $g\colon\{0,1\}^n\to\{0,1\}$,
we define
\begin{equation*}
\mathrm{Bias}_\epsilon(g) :=
\sum_{S\subseteq[n]} \widehat{g}(S) \epsilon^{|S|}.
\end{equation*}
\end{definition}
\begin{example}
Since $\mathrm{Maj}_3(z_1,z_2,z_3)=(1/2)(z_1+z_2+z_3-z_1z_2z_3)$, one obtains
$\mathrm{Bias}_\epsilon({\mathrm{Maj}_3}) = (3/2) \epsilon - (1/2) \epsilon^3$.
Roughly speaking, the input bias $\epsilon$ is amplified to $(3/2)\epsilon$ for small $\epsilon$.
\end{example}
When a boolean function $g$ is computed correctly with probability $\frac{1+\rho}2$, the output bias of $g$ is $\rho \mathrm{Bias}_\epsilon(g)$.
We say that the bias is amplified by $g$ if the absolute value of bias of output of $g$ is larger than that of input and if the sign of bias is preserved.
The bias is amplified by the noisy $g$ for sufficiently small input bias iff $\mathrm{Bias}_0(g)=0$ and $\rho \left.\frac{\mathrm{d} \mathrm{Bias}_\epsilon(g)}{\mathrm{d}\epsilon}\right|_{\epsilon=0}>1$.
Hence, we obtain the following theorem.
\begin{theorem}
Assume that $g\colon\{0,1\}^n\to\{0,1\}$
can be computed correctly with probability $\frac{1+\rho}2$.
Then, the bias is amplified by the noisy $g$ when the input bias is sufficiently small iff
$\widehat{g}(\varnothing)=0$ and $\rho>\rho_{\mathrm{B}}(g)$ where
\begin{equation*}
\rho_{\mathrm{B}}(g) := \frac1{\max\left\{1,\,\sum_{i=1}^n\widehat{g}(\{i\})\right\}}.
\end{equation*}
\end{theorem}
The majority functions minimize $\rho_\mathrm{B}(g)$.
\begin{lemma}\label{lem:majmax}
For $g\colon\{0,1\}^n\to\{0,1\}$,
\begin{align*}
\rho_{\mathrm{B}}(g) &\ge \frac{2^{n-1}}{n\binom{n-1}{\frac{n-1}2}},&&\text{if $n$ is odd}\\
\rho_{\mathrm{B}}(g) &\ge \frac{2^{n}}{n\binom{n}{\frac{n}2}},&&\text{if $n$ is even.}
\end{align*}
The equality is achieved by and only by the majority functions on $n$ variables.
Asymptotically, it holds $\rho_{\mathrm{B}}(g) \ge \sqrt{\pi/(2n)}(1+O(n^{-1/2}))$.
\end{lemma}
\begin{proof}
One obtains $\sum_{i\in[n]} \widehat{g}(\{i\})=\mathbb{E}[g(x)(x_1+\dotsb+x_n)]\le\mathbb{E}[|x_1+\dotsb+x_n|]$
where the equality holds only when $g$ is $\mathrm{Maj}_n$~\cite{odonnell2014analysis}.
Hence, only the majority functions $\mathrm{Maj}_n$ maximize $\sum_{i\in[n]}\widehat{g}(\{i\})$.
It is easy to complete the rest of the proof~\cite{odonnell2014analysis}.
\end{proof}
Note that the lower bound for even $n$ is equal to the lower bound for $n-1$.
The condition on $\delta$ for the bias amplification by Brassard et al.'s protocol is $\delta^{D_{\rightarrow}^\oplus(g^\oplus)}> \rho_{\mathrm{B}}(g)$.
\begin{definition}
For any $g\colon \{0,1\}^n\to\{0,1\}$,
\begin{equation*}
\delta_\mathrm{B}(g) :=
\begin{cases}
\rho_{\mathrm{B}}(g)^{\frac1{D_\rightarrow^\oplus(g^\oplus)}},& \text{if $\widehat{g}(\varnothing)=0$ and $\rho_{\mathrm{B}}(g)<1$}\\
1,&\text{otherwise.}
\end{cases}
\end{equation*}
\end{definition}
If $\delta > \delta_{\mathrm{B}}(g)$ for some $g\colon\{0,1\}^n\to\{0,1\}$, there exists an XOR protocol with constant bias.
\begin{example}\label{exm:maj3brassard}
One obtains $\delta_\mathrm{B}(\mathrm{Maj}_3) = \sqrt{2/3}$
that means that the threshold for the CHSH probability is $\frac{1+\sqrt{2/3}}2 = \frac{3+\sqrt{6}}6$~\cite{PhysRevLett.96.250401}.
\end{example}
We can now rephrase Theorem~\ref{thm:main} in the following form.
\begin{theorem}\label{thm:main1}
\begin{equation*}
\inf_{g\colon \{0,1\}^n\to\{0,1\}, n\in\mathbb{N}} \delta_{\mathrm{B}}(g) = \sqrt{\frac23}.
\end{equation*}
Furthermore, $\delta_{\mathrm{B}}(g) = \sqrt{2/3}$ iff $g$ is essentially equivalent to $\mathrm{Maj}_3$.
\end{theorem}
Here, we say that $g$ is essentially equivalent to $\mathrm{Maj}_3$ if $g$ is the majority of some fixed three input variables and ignores the other $n-3$ input variables.
The following lemma was shown in~\cite{montanaro2009ccxor}.
\begin{lemma}\label{lem:fdim}
For any $g\colon\{0,1\}^n\to\{0,1\}$,
\begin{equation*}
D_\rightarrow(g^\oplus)=\dim(\widehat{g}).
\end{equation*}
\end{lemma}
Since $D_\rightarrow^\oplus(f)\ge D_\rightarrow(f)-1$, it holds $D_\rightarrow^\oplus(g^\oplus)\ge \dim(\widehat{g})-1$.
\begin{remark}
If $A(x)$ in the definition of $D_\rightarrow^\oplus(f)$ is restricted to be linear, $D_\rightarrow^\oplus(g^\oplus)$ is equal to the affine dimension of $\widehat{g}$, which is
the minimum dimension of affine space on $\mathbb{F}_2$ including $\{1_S \mid S\in\mathrm{supp}(\widehat{g})\}$.
Hence, the affine dimension of $\widehat{g}$ is an upper bound of $D_\rightarrow^\oplus(g^\oplus)$.
\end{remark}
First, we show that Theorem~\ref{thm:main1} holds for $n\le 4$.
\begin{lemma}\label{lem:exh}
It holds $\delta_{\mathrm{B}}(g) \ge \sqrt{2/3}$ for all boolean functions $g$ on at most 4 variables.
Furthermore, for $n\le 4$, only functions essentially equivalent to $\mathrm{Maj}_3$ satisfy $\delta_{\mathrm{B}}(g)=\sqrt{2/3}$.
\end{lemma}
\begin{proof}
Assume $D_\rightarrow^\oplus(g^\oplus)\le 1$.
Then, the protocol is non-adaptive.
From Lemma~\ref{lem:nlbc1}, $g$ must be linear, and hence, $\rho_\mathrm{B}(g)=1$.
Assume $D_\rightarrow^\oplus(g^\oplus)\ge 2$.
From Lemma~\ref{lem:majmax}, $\rho_\mathrm{B}(g)\ge 2/3$ for $n\le 4$, and hence, $\delta_{\mathrm{B}}(g)\ge\sqrt{2/3}$.
From Example~\ref{exm:maj3brassard}, it is achieved by $\mathrm{Maj}_3$.
Next, we show the uniqueness.
From the above argument, it holds $\delta_\mathrm{B}(g)=\sqrt{2/3}$ only when
$\rho_\mathrm{B}(g)=2/3$ and $D_\rightarrow^\oplus(g^\oplus)=2$.
From Lemma~\ref{lem:majmax}, $\rho_{\mathrm{B}}(g)=2/3$ only when $g$ is one of the 64 majority functions on 4 variables.
In the following, we show that for $g\in\mathrm{Maj}_4$, $D_\rightarrow^\oplus(g^\oplus)=2$ only when $g$ is essentially equivalent to $\mathrm{Maj}_3$.
From Lemma~\ref{lem:fdim}, $|\{i\in[n]\mid\widehat{g}(\{i\})\ne 0\}|\le \dim(\widehat{g})\le 3$.
If $|\{i\in[n]\mid\widehat{g}(\{i\})\ne 0\}|\le 2$,
it holds $\sum_{i\in[n]}\widehat{g}(\{i\})\le \sqrt{2} < 3/2$ from the Cauchy-Schwartz inequality.
If $|\{i\in[n]\mid\widehat{g}(\{i\})\ne 0\}|= 3$, $g$ depends only on three variables since $\dim(\widehat{g})\le 3$.
Hence, $g$ is essentially equivalent to $\mathrm{Maj}_3$.
\end{proof}
From the following lemma, only boolean functions with small Fourier dimension may outperform $\mathrm{Maj}_3$.
\begin{lemma}\label{lem:sum}
For any $g\colon\{0,1\}^n\to\{0,1\}$,
\begin{equation*}
\delta_{\mathrm{B}}(g)
\ge \left(\frac1{\dim(\widehat{g})}\right)^{\frac1{2(\dim(\widehat{g})-1)}}.
\end{equation*}
In particular, if $\dim(\widehat{g})\ge 5$, it holds $\delta_{\mathrm{B}}(g)>\sqrt{2/3}$.
\end{lemma}
\begin{proof}
One obtains
\begin{align*}
\dim(\widehat{g})&\ge |\{i\in[n] \mid \widehat{g}(\{i\})\ne 0\}|\\
&\ge
\frac{\left(\sum_{i\in[n]}\widehat{g}(\{i\})\right)^2}{\sum_{i\in[n]}\widehat{g}(\{i\})^2}
\ge
\left(\sum_{i\in[n]}\widehat{g}(\{i\})\right)^2.
\end{align*}
In the above, the first inequality is trivial. The second inequality is the Cauchy-Schwartz inequality.
The third inequality holds since sum of squares of all of the Fourier coefficients is 1.
Hence, $\rho_{\mathrm{B}}(g) \ge \dim(\widehat{g})^{-1/2}$.
From Lemma~\ref{lem:fdim}, we obtain this theorem.
\end{proof}
Lemmas~\ref{lem:exh} and~\ref{lem:sum} give the complete proof of Theorem~\ref{thm:main1}.
\begin{proof}[Proof of Theorem~\ref{thm:main1}]
From Lemma~\ref{lem:sum},
we only have to show that
if $|\{i\in[n] \mid \widehat{g}(\{i\})\ne 0\}|\le \dim(\widehat{g}) \le 4$,
$\delta_{\mathrm{B}}(g) \le \sqrt{2/3}$ only for $g$ essentially equivalent to $\mathrm{Maj}_3$.
Assume $|\{i\in[n] \mid \widehat{g}(\{i\})\ne 0\}|= 4$.
Then, the boolean function $g$ depends only on 4 input variables since $\dim(\widehat{g})\le 4$.
From Lemma~\ref{lem:exh}, there is no function on 4 variables satisfying $\delta_{\mathrm{B}}(g)\le \sqrt{2/3}$ except for functions essentially equivalent to $\mathrm{Maj}_3$.
Next, we assume $|\{i\in[n] \mid \widehat{g}(\{i\})\ne 0\}|= 3$.
In this case, $\sum_{i\in[n]}\widehat{g}(\{i\})\le \sqrt{3}$.
Since $(1/\sqrt{3})^{1/3}> \sqrt{2/3}$, we can assume $D_\rightarrow^\oplus(g^\oplus)\le 2$.
Then, the boolean function $g$ depends only on 3 input variables since $\dim(\widehat{g})\le D_\rightarrow^\oplus(g^\oplus)+1 \le 3$.
From Lemma~\ref{lem:exh}, there is no function on 3 variables satisfying $\delta_{\mathrm{B}}(g)\le\sqrt{2/3}$ except for $\mathrm{Maj}_3$.
Next, we assume $|\{i\in[n] \mid \widehat{g}(\{i\})\ne 0\}|\le 2$.
In this case, $\sum_{i\in[n]}\widehat{g}(\{i\})\le \sqrt{2}$.
Since $(1/\sqrt{2})^{1/2}> \sqrt{2/3}$, we can assume $D_\rightarrow^\oplus(g^\oplus)\le 1$.
From Lemma~\ref{lem:nlbc1}, it holds $\delta_{\mathrm{B}}(g)= 1$.
We conclude that there is no function satisfying $\delta_{\mathrm{B}}(g)\le \sqrt{2/3}$ except for functions essentially equivalent to $\mathrm{Maj}_3$.
\end{proof}
\section{Conclusion}
In this paper, we show that the 3-input majority function is the unique optimal function for Brassard et al.'s bias amplification on some conditions.
This paper also develops mathematical framework using Fourier analysis for problems on XOR protocols with nonlocal boxes.
On the other hand, in this paper, functions $g^\oplus$ for the bias amplification are restricted to be XOR function although it seems to be a natural restriction.
Furthermore, protocols for computing functions $g^\oplus$, in this paper, are restricted to be the particular adaptive PR-correct protocol, which is better than arbitrary non-adaptive PR-correct protocol.
General adaptive protocols may allow more reliable computation than these protocols~\cite{PhysRevLett.102.160403}.
Similar adaptive protocol in Section~\ref{subsec:adaptive} gives the bias $\delta^{D_{\leftrightarrow}^\oplus(f)}$ where $D_{\leftrightarrow}^\oplus(f)$ denotes the two-way communication complexity for computing $a$ and $b$ satisfying $a\oplus b=f(x,y)$.
Hence, the result of this paper does not show the limitation of the idea of the bias amplification, but show only the limitation of the idea of the bias amplification by XOR function computed by the particular adaptive PR-correct protocol.
The bias amplification by general adaptive computation of non-XOR function would be an interesting direction of research.
\begin{acknowledgments}
This work was supported by MEXT KAKENHI Grant Number 24106008.
\end{acknowledgments}
|
\section{\label{sec:level1}First-level heading}
The $\bar{\Lambda}/\Lambda$ production ratio measured in a wide
range of proton scattering experiments $p Z \rightarrow \Lambda (\bar{\Lambda}) X$
has been found to be
a universal function $f(y_p - y)$ of ``rapidity loss" $y_p - y$,
where $y_p$ and $y$ are, respectively, the rapidities of the beam proton and
the produced $\Lambda$ or $\bar{\Lambda}$ \cite{LHCb, l}.
The function $f(y_p - y)$ is observed to be independent,
or depends only weakly, on the total center of mass energy
$\sqrt{s}$ of the two colliding hadrons in the range
0.024 to 7 TeV, on the target $Z = p, \bar{p}$, Be or Pb,
on the transverse momentum $p_T$ of the
$\Lambda$ or $\bar{\Lambda}$, or on sample composition \cite{l}.
We consider the picture in which an $s$ quark produced
in the scattering may coalesce with a $ud$ diquark remnant of the
beam proton and produce a $\Lambda$ \cite{l,x,x2,x3,x4}.
Let $n_\Lambda(y)$ and $n_{\bar{\Lambda}}(y)$ be the distributions
of $\Lambda$'s and $\bar{\Lambda}$'s as a function
of rapidity $y$ in the center of mass frame of the two colliding hadrons.
Rapidity is defined so that the $p$ beam has positive rapidity $y_p$.
We write these distributions as follows:
\begin{eqnarray}
n_{\Lambda}(y) & = & n_{\Lambda \alpha 1}(y) + n_{\Lambda \alpha 2}(y)
+ n_{\Lambda \beta}(y), \nonumber \\
n_{\bar{\Lambda}}(y) & = & n_{\bar{\Lambda} \alpha 1}(y) + n_{\bar{\Lambda} \alpha 2}(y)
+ n_{\bar{\Lambda} \beta}(y),
\label{n}
\end{eqnarray}
where $n_{\Lambda \alpha 1}(y)$ is the distribution of $\Lambda$'s containing
a diquark remnant of beam 1,
$n_{\Lambda \alpha 2}(y)$ is the distribution of $\Lambda$'s containing
a diquark remnant of beam 2,
and $n_{\Lambda \beta}(y)$ is the distribution of $\Lambda$'s containing
no beam remnant, and similarly for $\bar{\Lambda}$'s.
Production mechanism $\beta$ has no memory of the beams and hence
$n_{\Lambda \beta}(y) = n_{\bar{\Lambda} \beta}(y) \equiv n_{\beta}(y) = n_{\beta}(-y)$.
The distribution $n_{\beta}(y)$ is approximately independent of $y$ within the
``rapidity plateau" $-y_\textrm{max} < y < y_\textrm{max}$
as shown schematically in Fig. \ref{ny}. See also Fig. 2 of \cite{l}, and
Fig. 50.4 of \cite{PDG}.
We assume that beam 1 is a proton beam, so $n_{\bar{\Lambda} \alpha 1} = 0$.
If beam 2 is a $p$ beam, $n_{\bar{\Lambda} \alpha 2} = 0$.
If beam 2 is a $\bar{p}$ beam, $n_{\Lambda \alpha 2} = 0$.
We now consider events with $y > y_\textrm{min}$ so that
$n_{\bar{\Lambda} \alpha 2}$ and $n_{\Lambda \alpha 2}$
can be neglected. The $\bar{\Lambda}/\Lambda$ production ratio
can then be written as:
\begin{equation}
f = \frac{n_{\beta}(y)}{n_{\beta}(y) + n_{\Lambda \alpha 1}(y)} \equiv \frac{1}{1 + r},
\label{f}
\end{equation}
where the ratio, $r$, of the yields of the
two production mechanisms $\alpha$ and $\beta$ is
\begin{equation}
r \equiv \frac{n_{\Lambda \alpha 1}(y)}{n_{\beta}(y)} = \frac{1}{f} - 1.
\label{r}
\end{equation}
The purpose of this note is to point out that
the ratio $r$ can be fit
over four orders of magnitude, from $r \approx 0.01$ to
$r \approx 100$, with a simple universal function
with only two parameters $\kappa$ and $i$:
\begin{equation}
r = \left[ \frac{\kappa}{y_p - y} \right]^i.
\label{i}
\end{equation}
\begin{figure}
\includegraphics[scale=0.35]{ny.eps}
\caption{\label{ny} Distributions of $\Lambda$ and $\bar{\Lambda}$
production as a function of rapidity $y$
in the center of mass frame of $p \bar{p}$ scattering.
The beam rapidities are respectively $y_p$ and $y_{\bar{p}}$.
The sub-index $\alpha$ ($\beta$) denotes $\Lambda$'s or $\bar{\Lambda}$'s
containing (not containing) a beam diquark remnant.
Lowering the total center of mass energy $\sqrt{s}$ translates
$y_p$ and $n_{\Lambda \alpha 1}(y)$ left, and translates
$y_{\bar{p}}$ and $n_{\bar{\Lambda} \alpha 2}(y)$ right.
}
\end{figure}
\begin{figure}
\includegraphics[scale=0.35]{r_all_adjusted.eps}
\caption{\label{ri} Ratio
$r \equiv n_{\Lambda \alpha 1}(y) / n_{\beta}(y)$
of $\Lambda$'s produced
with and without a beam proton remnant, as a function of
rapidity loss $y_p - y$, obtained by the experiments
listed \cite{ALICE, ATLAS, l, STAR, ISR607, ISR, E8}.
The fit shown has the form
$r = [ \kappa/(y_p - y) ]^i$ with
$\kappa = 2.862$ and $i = 4.393$.}
\end{figure}
Figure \ref{ri} presents the ratios $r = 1/f - 1$ measured in a wide range of proton
scattering experiments. The data points with $y < 0.75$
of the D\O\ $p \bar{p}$ experiment were omitted because for them we
can not neglect $n_{\bar{\Lambda} \alpha 2}(y)$.
The data point of the STAR $pp$ experiment has $y = 0$, so
$n_{\Lambda \alpha 1} = n_{\Lambda \alpha 2}$. Therefore we have divided
$1/f - 1$ by 2.
The parameters $\kappa$ and $i$ have a simple interpretation and can be read off
the $\log{(y_p - y)}$ vs $\log{r}$ graph in
Fig. \ref{ri}: $\kappa \approx 2.8$ is the rapidity loss at which $r = 1$,
and $-i \approx -4.4$ is the slope of the straight line in Fig. \ref{ri}.
For $y_p - y < \kappa$ production mechanism
$\alpha$ dominates. For $y_p - y > \kappa$ production mechanism
$\beta$ dominates.
The fit to all of the data in Fig. \ref{ri} obtains
$\kappa = 2.79 \pm 0.03$ and $i = 4.54 \pm 0.08$ with $\chi^2 = 637$ for 121 degrees of freedom.
The large $\chi^2$ is due to
tension between the data points of different experiments
as can be seen in Fig. \ref{ri}.
Omitting the R-603 and R-607 measurements,
which have some data points off the rapidity plateau,
obtains
$\kappa = 2.86 \pm 0.03$ and $i = 4.39 \pm 0.06$ with $\chi^2 = 342$ for 102 degrees of freedom.
This is the fit shown in Fig. \ref{ri}.
Fitting only the E8 Pb data points where production mechanism
$\alpha$ dominates obtains
$\kappa = 2.93 \pm 0.15$ and $i = 4.06 \pm 0.30$ with $\chi^2 = 10.6$ for 13 degrees of freedom.
Fitting all data with $y_p - y > 2.8$,
where production mechanism $\beta$ dominates, obtains
$\kappa = 2.94 \pm 0.10$ and $i = 4.23 \pm 0.25$ with $\chi^2 = 37$ for 32 degrees of freedom.
In conclusion, we see no significant departure from Eq. (\ref{i}) at either end of the data range.
Our final estimate from several fits is
\begin{equation}
\kappa = 2.86 \pm 0.03 \pm 0.07,
i = 4.39 \pm 0.06 \pm 0.15,
\end{equation}
where the first uncertainty is statistical from the fit, and
the second uncertainty is systematic and accounts for
different data selections for the fits.
From $\sqrt{s} = 0.024$ to 7 TeV the cross-sections
$\sigma(pp)$ and $\sigma(p \bar{p})$, and the width
of the rapidity plateau $2 y_\textrm{max}$, increase
by approximately a factor 2 \cite{PDG}, so $n_\beta(y)$ is
approximately independent of $\sqrt{s}$ and $y$
on the rapidity plateau.
We conclude that the probability density that a
$p$ scatters and becomes a $\Lambda$ with rapidity $y$
is proportional to $[ \kappa/(y_p - y) ]^i$.
This result should also be valid for $\Lambda_c$,
$\Lambda_b$, $\Sigma^+$, etc.
I thank my colleagues in the D0 Collaboration for their
comments and inspiration to undertake this analysis.
|
\section{Introduction}
The detailed shape analysis of the two-particle Bose-Einsten
Correlations (BEC) is an important topic in high energy particle and
nuclear physics because the shape of the correlation function carries
information about the space-time structure of the particle emission
process~\cite{Kittel:2001zw, Csorgo:1999sj}.
With a few assumptions~\cite{Csorgo:1999sj} the two-particle
correlation function is related to the Fourier transformed source
distribution. In this article, however, we do not assume such a
relationship between Fourier transformed source distributions, and
measured two-particle correlations, because in some cases these
assumptions are experimentally shown to be invalid even if they were
expected to hold~\cite{Achard:2011zza}. Instead, we continue the
development of a {\it model-independent} method of analyzing
short-range correlations, developing further the ideas suggested in
Ref.~\cite{Csorgo:2000pf}. This general, model-independent
characterization of short-range correlation
functions~\cite{Csorgo:2000pf} depends on the following experimental
conditions:
\begin{description}
\item {\it (i)} The correlation function tends to a constant for large
values of the relative momentum $Q$.
\item {\it (ii)} The correlation function has a non-trivial structure
at a certain value of its argument, here assumed to be around
$Q = 0$.
\end{description}
The first applications of this method investigated nearly Gaussian and
nearly exponential correlations~\cite{Csorgo:2000pf,Csorgo:2003uv}.
Here we continue the investigations started in
Ref.~\cite{DeKock:2012gp}, to develop a model-independent technique to
analyze short-range correlations that have a stretched exponential or
L\'evy shape in zeroth order approximation; hence we add a third
experimental precondition:
\begin{description}
\item {\it (iii)} The short-range behaviour of the correlation
function has a form which is close to the stretched exponential
i.e.\ an exponential in the stretched variable $Q^{\alpha}$ with
$0\leq \alpha\leq 2$.
\end{description}
We compare the resulting L\'evy expansion series to the earlier
results for the $\alpha =$ 1 and 2 special cases, and extend this
analysis in a natural manner to the case of multivariate, nearly
symmetric L\'evy distributions.
\section{Univariate L\'evy expansions}
In order to characterize the deviation of the correlation shape from
the approximate L\'evy shape, we apply the general expansion method of
Ref.~\cite{Csorgo:2000pf} for the special case of the L\'evy weight
function, $t = Q R$,
$w(t|\alpha) = \exp(-t^{\alpha}) = \exp(-Q^{\alpha} R^{\alpha})$ . The
expansion is based on a set of polynomials which are orthonormal with
respect to the weight function $w(t|\alpha)$. This expansion is
uniquely defined by a Gram-Schmidt process if the order $n$ terms are
order $n$ polynomials, with convergence criteria specified in
Ref.~\cite{Csorgo:2000pf}.
The L\'evy expansion of short range correlation functions results in
the following formula which can be easily fitted to a given data set
as
\begin{eqnarray}
t & = & Q R, \\
C_2(t) & = & N \left\{ 1+\lambda \exp(-t^\alpha) \sum_{n=0}^{\infty} c_n L_n (t|\alpha) \right\},
\label{e:Levy-expansion}
\end{eqnarray}
where $N$ is a normalization coefficient, $\lambda$ measures the
strength of the correlation function, $\exp(-t^{\alpha})$ is the
weight function and zeroth order approximation for the experimentally
measured correlation function and $\alpha$ is the L\'evy index of
stability. The expansion coefficients are denoted by $c_n$ and
$\{L_n(t|\alpha) \}_{n=0}^{\infty}$ denote the L\'evy polynomials, a
complete set of polynomials which are orthogonal with respect to the
L\'evy weight function $\exp(-t^{\alpha})$. These L\'evy polynomials
were introduced in Ref.~~\cite{DeKock:2012gp}; the first three are
\begin{eqnarray}
L_0(t\,|\,\alpha) & =& 1 , \\
L_1(t\,|\,\alpha) & =&
\det\left(\begin{array}{c@{\hspace*{8pt}}c}
\mu_{0,\alpha} & \mu_{1,\alpha} \nonumber \\
1 & t \end{array} \right) , \\
L_2(t\,|\,\alpha) & =&
\det\left(\begin{array}{c@{\hspace*{8pt}}c@{\hspace*{8pt}}c}
\mu_{0,\alpha} & \mu_{1,\alpha} & \mu_{2,\alpha} \\
\mu_{1,\alpha} & \mu_{2,\alpha} & \mu_{3,\alpha} \nonumber \\
1 & t & t^2 \end{array} \right) \qquad \text{etc.}
\end{eqnarray}
where
$$
\mu_{n,\alpha} = \int_0^\infty dt\;t^{n} \exp( - t^\alpha) =
\tfrac{1}{\alpha}\,\Gamma( \tfrac{n+1}{\alpha}) \\
$$
and Euler's gamma function is defined as
$
\Gamma(z) = \int_0^\infty dt\;t^{z-1}e^{-t}
$ as usual.
The lowest-order Levy polynomials are
\begin{eqnarray}
L_0(t\,|\,\alpha) & = & 1
, \\
L_1(t\,|\,\alpha) & = &
\frac{1}{\alpha}\left\{
\Gamma\left(\frac{1}{\alpha}\right) t -
\Gamma\left(\frac{2}{\alpha}\right)
\right\}
, \\
L_2(t\,|\,\alpha) & = &
\frac{1}{\alpha^2}\left\{
\left[
\Gamma\left(\frac{1}{\alpha}\right) \Gamma\left(\frac{3}{\alpha}\right)
- \Gamma^2\left(\frac{2}{\alpha}\right)
\right] t^2 - \right. \nonumber \\
& & - \left[
\Gamma\left(\frac{1}{\alpha}\right) \Gamma\left(\frac{4}{\alpha}\right)
- \Gamma\left(\frac{3}{\alpha}\right)
\Gamma\left(\frac{2}{\alpha}\right)
\right] t + \\
& & \left. + \left[
\Gamma\left(\frac{2}{\alpha}\right) \Gamma\left(\frac{4}{\alpha}\right)
- \Gamma^2\left(\frac{3}{\alpha}\right)
\right]
\right\} . \nonumber
\end{eqnarray}
For $\alpha=1$, these reduce to Laguerre polynomials and the L\'evy
expansion reduces to the Laguerre expansion of
Ref.~\cite{Csorgo:2000pf},
\begin{eqnarray}
L_0(t\,|\,\alpha = 1) & = & 1 , \\
L_1(t\,|\,\alpha = 1) & = & t - 1 , \\
L_2(t\,|\,\alpha = 1) & = & t^2 - 4 t + 2 .
\end{eqnarray}
The $\alpha = 2 $ case provides a new expansion around a Gaussian
shape that is defined for non-negative values of $t$ only,
\begin{eqnarray}
L_0(t\,|\,\alpha = 2) & = &
1, \\
L_1(t\,|\,\alpha = 2) & = &
\frac{1}{2}\left\{
\sqrt{\pi} t - 1
\right\} , \\
L_2(t\,|\,\alpha = 2) & = &
\frac{1}{16}\left\{
2(\pi - 2) t^2 - 2 \sqrt{\pi} t + (4 - \pi)
\right\} .
\end{eqnarray}
\section{Multi-variate Levy expansions}
Multi-variate short range correlations, in particular Bose-Einstein or
HBT correlations, as well as dynamical ``ridge" correlations are
frequently studied in high energy particle and heavy ion physics. If
they are symmetric ~\cite{Nolan:2016st,Csorgo:2003uv}, a new variable
can be introduced that reduces the multi-variate problem to an
effective one-dimensional problem.
For the multi-variate Bose-Einstein or HBT correlation measurements, a
dimensionless scaling variable has already been
introduced~\cite{Csorgo:2003uv} as follows,
\begin{equation}
t=\left(\sum_{i,j= {\mbox{\rm\tiny side,out,long}}} R_{i,j}^2 q_i q_j \right)^{1/2},
\end{equation}
where $q_i$ stands for the relative momentum component in the given
direction.
For multi-variate angular or ridge correlation measurements that result in a nearly L\'evy
shape~\cite{Janik:2014hkt}, a similar, dimensionless scaling variable can
be introduced:
\begin{equation}
t=\left(\sum_{i,j={\eta,\phi}} \sigma_{i,j}^2 {\Delta}_i {\Delta}_j \right)^{1/2},
\end{equation}
where $\Delta_i$ stands for the angular difference in the
$(\eta,\phi)$ lego plot.
In both cases, the fit function for a multi-variate, nearly Levy
correlation functions becomes identical to
Eq.~(\ref{e:Levy-expansion}).
\section*{Acknowledgements}
\noindent
We are grateful to the organizers of WPCF 2015 for an inspiring and useful meeting.
This work was supported in part by the Hungarian OTKA grant NK--101438 and the
South African National Research Foundation.
|
\section{Introduction}
A W UMa-type system is a contact binary system where both components share a common envelope and are typical main sequence stars with similar surface temperatures. Astronomers have been aware of the optical variability of prototypical W UMa-type systems was noticed for more than a century \citep{Muller1903}. To date, there are thousands of known W UMa-type variables were found. The spectral type of this kind of system usually ranges from A to K, with a period that ranges from 0.2 to 1.4 days and variability amplitudes typically less than 1 magnitude. Contact binaries can be further classified into two major types: A and W \citep{Binnendijk1970}. The primary minimum in the folded light curve of an A-type contact binary is caused by the less massive component transiting the more massive one; otherwise, the contact binary is a W-type. In general, an A-type system has a relatively longer orbital period ($P \gtrsim 0.3$ day), a lower mass ratio ($q\lesssim0.3$), and an earlier spectral type (typically from A to G). On the other hand, a W-type system usually has a later spectral type. A- and W-type contact binaries are possibly related with respect to their evolution. For example, \citet{Hilditch1988} suggested that a W-type system evolves to an A-type system; however, \citet{Gazeas2006} proposed an opposite evolutionary track.
W UMa-type systems are expected to have high chromospheric activity and coronal emission; hence, some systems are strong X-ray emitters, e.g., VW Cep \citep{Carroll1980, Huenemoerder2006}. The strength of the X-ray emission is related to the binary orbital period and the spectral type \citep{Stepien2001, Chen2006}. Chromospheric activity is related to the presence of cool spots, which cause asymmetry, known as the O'Connell effect \citep{OConnell1951,Wilsey2009}, in the orbital profile. In addition, the variability of the H$\alpha$ equivalent width along with the orbital phase is an indication of chromospheric activity \citep{Kaszas1998}. A detailed investigation of the X-ray timing and spectral variability, as occurred with the brightest contact binary VW Cep \citep{Huenemoerder2006}, can reveal the position and geometry of the corona.
\begin{figure*}
\plotone{Swift_XMM_LOT4.eps} \caption{(a) {\it Swift}\ image of the field containing 2MASS J11201034$-$2201340 and 3FGL J1119.9$-$2204. This image is smoothed with a Gaussian kernel of $\sigma=3"$ to enhance the visibility of faint sources. The blue circle encompasses the 95\% error ellipse of 3FGL J1119.9$-$2204 and the green box is the region of the cropped {\it XMM-Newton}\ and Lulin LOT r'-band images in the center and right panels, respectively. (b) Enlarged view of the {\it XMM-Newton}\ image. The center of the cyan circle is located at the {\it XMM-Newton}\-determined position, with coordinates R.A. = 11$^h$20$^m$10.32$^s$ and Decl. = $-$22$^{\circ}$01'35.6" and the diameter of the circle is the {\it XMM-Newton}\ half-energy width. (c) The r'-band image of the same field in the center panel taken by the LOT. \label{xmm_lot}}
\end{figure*}
We present the detection of the contact binary 2MASS J11201034$-$2201340 in X-ray, optical, and infrared bands in Section \ref{detection}. Section \ref{optical_obs} presents the results of optical band analysis, including the determination of the orbital period and the spectral energy distribution. We also present the photometric solution to determine the basic physical parameters of this system, utilizing orbital profile fitting. Section \ref{xray_obs} presents X-ray timing and spectral behaviors determined from the results of X-ray data analysis, e.g., the non-detection of orbital modulation and the non-thermal spectral nature. We also estimate X-ray intensity and discuss the relationship between X-ray and optical luminosities. Finally, we summarize our results and future aspects in Section \ref{summary}.
\section{Source Detection}\label{detection}
\subsection{{\it Swift}\ Observations}
After the detection of 1FGLJ1119.9$-$2205 (also named 2FGL J1120.0$-$2204 and 3FGL J1119.9$-$2204), the {\it Swift}\ XRT took 27 exposures of this field for a total exposure time of $\sim 67$ ks between 2010 and 2013. \citet{Hui2015} studied all the {\it Swift}\ observational data, found two millisecond pulsar candidates within the 95\% error ellipse of 3FGL J1119.9$-$2204. On the other hand, several uncataloged X-ray point sources outside the error ellipse also were detected but their properties were not further investigated. 2MASS J11201034$-$2201340, which has relatively faint X-ray emission, is one of the outliers unrelated to the $\gamma$-ray source 3FGL J1119.9$-$2204.
The energy range of XRT is 0.2--10 keV, the pixel scale is 2.36\arcsec, and the full-width at half maximum (FWHM) of the point spread function (PSF) is roughly 7\arcsec\ in 1.5 keV (or a half-power diameter of 18\arcsec\!). All the data, including two target IDs (41371 and 49351), were used to determine the X-ray positions of the point sources. We extracted photon events and X-ray images from the standard products of all the XRT observations using {\it xselect} version 2.4. The point sources were detected using the {\it detect} task of the multi-mission X-ray image analysis program {\it XIMAGE}, for which the signal-to-noise threshold was set to 3.0. The position and corresponding uncertainty were determined using the {\it xrtcentroid} task. We found an X-ray point source located at R.A. = 11$^h$20$^m$10.65$^s$ and Decl. = $-$22\arcdeg 01\arcmin 30.7\arcsec\ with a 90\% uncertainty of $\sim$ 7.6\arcsec. Figure \ref{xmm_lot}(a) is the {\it Swift}\ image of the field containing 2MASS J11201034$-$2201340 and 3FGL J1119.9$-$2204.
\subsection{{\it XMM-Newton}\ Observation}
2FGL J1120.0$-$2204 was observed by the {\it XMM-Newton}\ observatory on 2014 June 14 for a total exposure time of $\sim 70$ ks (\dataset[ADS/Sa.XMM#obs/0742930101]{ObsID 0742930101}). All three detectors of the European Photon Imaging Camera (EPIC) were used in this observation. The MOS1 and MOS2 detectors were operated in full-frame mode with a timing resolution of 2.6 s and an on-axis PSF FWHM of 6\arcsec\ (half-energy width 13.6"). The pn detector was operated in timing mode with an extreme timing resolution of 0.03 ms. In this mode, all X-ray photons are compressed in one dimension. However, this observation was performed to investigate the timing properties of the millisecond pulsar candidate 2FGL J1120.0-2204. The pn data were useless because the target is far from the aim point of the observation. The optical/UV monitor also was used in this observation but our target was outside the field of view and the optical/UV monitor data were unavailable. We applied the pipeline task {\it emproc} of the XMM Science Analysis Software (XMMSAS version 15.0.0) program to the MOS data using the latest instrumental calibration database. Events with patterns $<12$ were adopted in this research, and the flaring background was filtered out when the entire count rate was $>3.5$ counts s$^{-1}$. We performed source detection using the maximum likelihood fitting with the aid of the XMMSAS task {\it edetect\_chain} and the signal-to-noise threshold set to $4\sigma$.
We found a source located at R.A. = 11$^h$20$^m$10.32$^s$ and Decl. = $-$22\arcdeg 01\arcmin 35.6\arcsec\ with a 90\% uncertainty of 2\arcsec. The detection likelihood is 34.5, which corresponds to a 8 $\sigma$ significance level. This source is likely a point source because the likelihood of source extent is not determined. Figure \ref{xmm_lot}(b) shows the {\it XMM-Newton}\ image of the region containing 2MASS J11201034$-$2201340 where a point source is clearly seen.
\begin{figure*}
\plottwo{lightcurve.eps}{ls_period_orbital.eps} \caption{The CRTS light curve (a) and the corresponding Lomb--Scargle power spectrum (b) of 2MASS J11201034$-$2201340. A significant peak located at $f=6.926$ 1/day and its two associated 1-year aliases are clearly seen. The 3-$\sigma$ white noise level is indicated by the dashed line. \label{lsp}}
\end{figure*}
\subsection{Optical and Infrared Counterparts}
The field around the X-ray source was surveyed in optical and infrared bands by USNO-B-1.0, the Two Micron All Sky Survey (2MASS), and the Wide-field Infrared Survey Explorer (WISE). All three catalogs are well organized by the the NASA/IPAC Infrared Science Archive (IRSA). Each catalog has only one source that is within the PSF of the {\it XMM-Newton}: USNO-B1.0 0679$-$0311979 at R.A. = 11$^h$20$^m$10.36$^s$ and Decl. = $-$22\arcdeg 01\arcmin 34.14\arcsec, 2MASS J11201034$-$2201340 at R.A. = 11$^h$20$^m$10.35$^s$ and Decl. = $-$22\arcdeg 01\arcmin 34.04\arcsec, and WISE J112010.35$-$220134.1 at R.A. = 11$^h$20$^m$10.35$^s$ and Decl. = $-$22\arcdeg 01\arcmin 34.16\arcsec. 2MASS J11201034$-$2201340 is 5.3\arcsec\ from the {\it Swift}\ determined X-ray source, and 1.5\arcsec\ from the position determined by {\it XMM-Newton}. Hence, 2MASS J11201034$-$2201340 is likely to be the optical counterpart of the X-ray source because the angular separation between the optical and X-ray positions well reside in the uncertainties of {\it Swift}\ and {\it XMM-Newton}.
We also observed the field with the Lulin One-Meter Telescope (LOT), located at Central Taiwan, using the ALTA U42 CCD with SDSS r'-band and g'-band filters. This configuration has a pixel scale of 0.32\arcsec\ and a limiting magnitude of $\sim$19.5 at the detection level of 5 $\sigma$. Figure \ref{xmm_lot}(c) shows the cropped r'-band image. Only one source is detected in the region of the point spread function of {\it XMM-Newton}.
\section{Detailed Optical Investigation}\label{optical_obs}
\begin{figure}
\plotone{fold_color_nobin_wise_xmm_subbg_12bin_hjd.eps} \caption{The multi-band light and color curves of 2MASS JJ11201034$-$2201340 folded according to a period of 0.288 day. (a) and (b) Folded R-band and V-band light curves obtained by SLT, (c) V $-$ R color variability, (d) and (e) folded W1-band and W2-band light curves obtained by WISE, and (f) folded X-ray light curve obtained by {\it XMM-Newton}\ with energy of 0.2 -- 10 keV. \label{fold_lc}}
\end{figure}
\subsection{Timing Analysis}
To investigate the temporal variation of 2MASS J11201034$-$2201340, we first collected the multi-epoch photometric data obtained by the Catalina Real-Time Transient Survey (CRTS) to search for periodicity. The CRTS data set contains the observations made by the Siding Springs Survey (SSS) 0.5-m Schmidt telescope (218 exposures) and by the Catalina Sky Survey (CSS) 0.7-m Schmidt telescope (76 exposures). We found a significant periodicity with a period of 0.144 day by applying the Lomb-Scargle periodogram \citep{Scargle1982, Horne1986}. Figure \ref{lsp} shows the light curve from the CRTS and the power spectrum. One-year aliases due to the observational window function also were detected in the power spectrum.
To check the robustness of the detected result and the possibility that the true periodicity is twice the detected value, we observed the field using the R and V bands of the 0.4-m Super Light Telescope (SLT) at the Lulin Observatory on 2015 April 24--27. The SLT was equipped with an Andor iKon-L 936 CCD with a field of view of $28 \times 28$ \arcmin\ and a pixel scale of 0.82\arcsec. The exposure time for each frame was 5 min, and the observation lasted $\sim 5$h on April 24, 27, and 2.2 h on April 26. The R band had 117 exposures and the V band had 115. For comparing the phase alignment of the CRTS data, the SLT data, and the data from other wavelengths, the observation times were corrected from the Earth to the solar barycenter. The CCD reduction package of the {\it Image Reduction and Analysis Facility} ({\it IRAF}) was used for standard image reduction, including bias, dark current, and flat-field corrections. We then compared the instrumental magnitude of 2MASS J11201034$-$2201340 with that of four comparison stars in the same field to obtain differential photometric data. The light curves clearly showed variability on a time scale of several hours. After folding both the light curves and the B$-$V color curve using 0.144 and 0.288 day, respectively, we found that the color seemed to vary with a period of 0.288 day (see Figure \ref{fold_lc}). The true period of $0.28876208\pm5.6\times10^{-7}$ day is twice that detected by the Lomb-Scargle periodogram from the CRTS light curve. The uncertainty was estimated by a combination of the limited time span and photon statistical error. The uncertainty caused by limited time span and the strength of the signal was estimated using Equation 3 in \citet{LevineBC2011} and the statistical error was estimated using a $10^4$ times Monte Carlo simulation.
From the archived multiepoch photometry data of WISE observations of this field, we found 52 W1-band (3.4$\mu$m) and 42 W2-band (4.6 $\mu$m) significant detections and folded them with the best-determined periodicity. Figure \ref{fold_lc} shows that there is still modulation and it is coherent in the mid-infrared bands.
\subsection{Spectral Energy Distribution}
We further investigated the physical properties of this system using currently available broad-band spectral energy distribution (SED) data. For the optical band, we used the photometric B, R, and I band data in the USNO-B 1.0 catalog, where $B1=16.4$, $B2=16.03$, $R1=14.36$, $R2=14.96$, and $I=14.55$. To describe the spectral behavior of a contact binary system, it is better to use one of the flux minimum in the folded light curve that has all the photons from the primary component. However, the amount of current data is insufficient because only one or two measurements were made for individual bands. Therefore, we took the average of the detected magnitudes for the B and R bands for which there were two measurements, and applied a typical photometric uncertainty of 0.3 mag \citep{Monet2003}. The near-infrared data were from 2MASS in the J, H, and Ks bands, where $J=13.875\pm0.03$, $H=13.354\pm0.03$, and $Ks=13.276\pm0.04$. The mid-infrared data were from WISE in the W1 and W2 bands, where $W1=13.286\pm0.025$ and $W2=13.331\pm0.031$.
\begin{figure}
\plotone{sed_k2v_final.eps} \caption{Spectral energy distribution of 2MASS J11201034$-$2201340. The data points were obtained from the USNO-B 1.0 catalog, the 2MASS catalog, and the WISE All-Sky Point Source catalog. The red dashed line is the best-fit K2V spectral template and the blue line is the corresponding blackbody radiation spectrum. \label{sed}}
\end{figure}
The SLT did not observe standard stars so calibration in the V and R bands was not possible. Instead, to estimate the apparent magnitude of 2MASS J11201034$-$2201340, we used the cataloged star TYC 6090-207-1, which is a bright star with a coordinate of R.A. = 11$^h$19$^m$56.983$^s$ and Decl. = $-$22\arcdeg04\arcmin43.94\arcsec and magnitudes of $B=13.09\pm0.26$ and a $V=12.20\pm0.16$ \citep{Hog2000}. By scaling of the brightness of 2MASS J11201034$-$2201340 and TYC 6090-207-1, we estimated the V-band magnitude of 2MASS J11201034$-$2201340 as $15.37\pm0.16$.
Before constructing the SED, the measured magnitudes underwent extinction correction using the online Galactic dust extinction tool provided by IRSA. We assumed that the relationship between the extinction ($A_V$) and reddening ($E(B-V)$) is $A_V=3.1E(B-V)$ \citep{Guver2009}. We estimated the extinction for individual bands according to the latest measurements provided by \citet{SchlaflyF2011}. Figure \ref{sed} shows the constructed SED of 2MASS J11201034$-$2201340. We compared the SED with various stellar spectral templates presented in \citet{Pickles1998} and found that our SED fit that of a K2V star that has a typical surface temperature of 4960 K. This indicates that the major component of 2MASS J11201034$-$2201340 is a late-type star.
\begin{figure}
\plotone{profile_fitting_2.eps} \caption{The observed folded R-band light curve (blue), folded V-band light curve (red) with a shift of 0.1 mag, and the corresponding best-fit contact binary model estimated using the Wilson--Devinney code. The green dashed line is the best-fit model without a cool spot and the black line is the best-fit model with a cool spot. \label{profile_fitting}}
\end{figure}
\begin{table*}
\centering
\begin{small}
\caption{Photometric solutions for 2MASS J11201034$-$2201340.}
\label{photometric_table}
\begin{tabular}{lclcl}
\hline
Parameters & Photometric elements & Errors & Photometric elements & Errors \\
\\
& without cool spot & & cool spot solutions & \\
\hline \hline
$g_1=g_2$ & 0.32 & assumed & 0.32 & assumed \\
$A_1=A_2$ & 0.50 & assumed & 0.50 & assumed \\
$x_{1bol},x_{2bol}$ & 0.299,0.299 & assumed & 0.299,0.299 & assumed \\
$y_{1bol},y_{2bol}$ & 0.396,0.396 & assumed & 0.396,0.396 & assumed \\
$x_{1V},x_{2V}$ & 0.581,0.581 & assumed & 0.581,0.581 & assumed \\
$y_{1V},y_{2V}$ & 0.249,0.249 & assumed & 0.249,0.249 & assumed \\
$x_{1R},x_{2R}$ & 0.356,0.356 & assumed & 0.356,0.356 & assumed \\
$y_{1R},y_{2R}$ & 0.413,0.413 & assumed & 0.413,0.413 & assumed \\
$T_1$ & 4960K & fixed & 4960K & fixed \\
Phase Shift & $-0.0153$ & $\pm0.0005$ & $-0.0155$ & $\pm0.0004$ \\
$q$ & 0.291 & $\pm0.006$ & 0.317 & $\pm0.004$ \\
$\Omega_1=\Omega_2$ & 2.4253 & $\pm0.0126$ & 2.4735 & $\pm0.0111$ \\
$\Omega_{in}$ & 2.4464 & -- & 2.5026 & -- \\
$\Omega_{out}$ & 2.2645 & -- & 2.3060 & -- \\
$T_2$ & 5125K & $\pm20$K & 5124K & $\pm16$K \\
$i$ & $89^{\circ}.4$ & $\pm3.3$ & $88^{\circ}.5$ & $\pm2.7$ \\
$L_1/(L_1+L_2)(V)$ & 0.7180 & $\pm0.0051$ & 0.7019 & $\pm0.0046$ \\
$L_1/(L_1+L_2)(R)$ & 0.7259 & $\pm0.0045$ & 0.7100 & $\pm0.0042$ \\
$\theta$ ($^\circ$) & & & 86.5 & $\pm2.6$ \\
$\psi$ ($^\circ$) & & & 92.2 & $\pm4.7$ \\
$\Omega(^\circ)$ & & & 11.9 & $\pm1.2 $ \\
$T_s/T_*$ & & & 0.80 & $\pm0.09$ \\
$f$ & $11.6\,\%$ & $\pm6.9\,\%$& $14.8\,\%$ & $\pm5.7\,\%$ \\
\hline
\end{tabular}
\end{small}
\end{table*}
\subsection{Photometric Solution}\label{Timing_Solution}
To determine the physical nature of this contact binary system using the available data, we fitted the observed V-band and R-band light curves using the Wilson--Devinney code \citep{Wilson1971, Wilson1979, Wilson1990, Wilson1994} to obtain a photometric solution. The surface temperature of the more massive star ($T_1$) was fixed at 4960 K, as the SED fitting suggested. The gravity darkening parameters were fixed at $g_1=g_2=0.32$, according to the prediction made by \citet{Lucy1967}, and the bolometric albedos were fixed at $A_1=A_2=0.5$ \citep{Rucinski1969} on the basis of the assumption that both components have convective envelopes. The limb-darkening coefficients for bolometric and individual bands ($x_{1bol}$, $x_{2bol}$, $y_{1bol}$, $y_{2bol}$, $x_{1V}$, $x_{2V}$, $y_{1V}$, $y_{2V}$, $x_{1R}$, $x_{2R}$, $y_{1R}$, and $y_{2R}$) were estimated using the values provided by \citet{vanhamme1993} (see Table \ref{photometric_table}). The remaining free parameters were the mass ratio ($q$), the inclination angle of the orbital plane ($i$), the surface temperature of the less massive component ($T_2$), the phase shift of V and R bands, the dimensionless potential of the more massive star ($\Omega_1=\Omega_2$), and the relative luminosity ($L_1$ and $L_2$) of each star in the V and R bands.
Because the spectral mass ratio could not be determined using the radial velocity method, we searched for a proper initial guessing value before fitting the light curves. We estimated the sum of the weighted square deviations ($\Sigma$) with respect to different trial values of $q$, ranging between 0.1 and 6. A minimum of $\Sigma$ was clearly seen at $q=0.3$, so we chose that as the initial $q$ values for the fitting. Moreover, the profile seemed to be asymmetric, so we introduced a cool (dark) spot in the fitting to compare against the model without a cool spot. The cool spot model included three additional parameters: the colatitude ($\theta$), longitude ($\psi$), and radius ($\Omega$) of the spot. The best-fit parameters are given in Table \ref{photometric_table} and the model light curves are shown in Figure \ref{profile_fitting}.
The magnitude of the secondary minimum (phase $\sim$0.5), which is not much different from that of the primary in the folded light curve, indicates that the less massive star is completely obscured and only the more massive star contributes to the flux. The V-band magnitude of the secondary minimum is estimated as $15.75\pm0.16$ in this measurement. Therefore, the distance can be roughly estimated as $690 \pm 50$ pc after considering the extinction and assuming that the more massive component is a K2V star.
The result of the fitting indicates that 2MASS J11201034$-$2201340 is a short-period A-type contact binary with a nearly edge-on orbital plane. It is necessary that there be a cool spot on the more massive component to explain the O'Connell effect. In this scenario, the best-fit mass ratio is $q=0.317$ and a fill-out factor is estimated to be $f=14.8 \%$, which suggests a low degree of over contact. From the averaged value of the phase shift, we proposed a linear ephemeris for the primary minimum defined as
\begin{equation*}
T_{{\rm primary}}={\rm MJD (TDB) } 53791.3984(1) + 0.28876208(56)\times N,
\end{equation*}
where $N$ is the number of cycle count.
\section{Results from X-ray Observations}\label{xray_obs}
\begin{figure*}
\centering
\columnwidth=0.7\columnwidth
\includegraphics*[width=0.9\columnwidth,angle=270]{powerlaw1.ps}
\hfil
\includegraphics*[width=0.9\columnwidth,angle=270]{bremss1.ps}
\caption{(a) The X-ray spectral data (crosses) and the best-fit power-law model (steps) of 2MASS J11201034$-$2201340 obtained with {\it XMM-Newton}. The lower panel shows the deviation of each data point from the best-fit model. (b) The same as (a) for the thermal Bremsstrahlung model. \label{powerlaw_spectrum}}
\end{figure*}
\subsection{X-ray Profile and Spectrum}
Investigation of the timing and spectral properties of the X-ray emission from 2MASS J11201034$-$2201340 detected by {\it XMM-Newton}\ will add to our understanding of the nature of this system. After filtering out the flaring background, the effective exposure time was $\sim 57$ ks. We extracted 238 X-ray photons from a 20-arcsec-radius circular region centered at the detected centroid of 2MASS J11201034$-$2201340 (see Figure \ref{xmm_lot}). Because the effective exposure time encompassed only approximately two orbital cycles of 2MASS J11201034$-$2201340, we needed to carefully examine background variability. We selected ten backgrounds with the same area in the source-free region on the same chip and found that the background counts were $\sim 150$. Therefore, only $\sim 90$ X-ray photons that originated from the source were available for use in a marginal investigation of the timing and spectral analysis. First, we folded individually the source and all the backgrounds according to the best period determined in the optical band. Then, we obtained a mean folded light curve by averaging all the folded background light curves to obtain the fluctuation of the background in the phase domain. The clean folded light curve shown in Figure \ref{fold_lc} (f) was obtained by subtracting the background profile from the folded source light curve. Another way compute the background contribution is by weighting a larger source-free region, e.g., a circle with an 80-arcsec radius or a large annulus around the source. Both methods yield similar results. The folded light curve showed no detection of significant X-ray variability. We used different bin sizes and applied the $\chi^2$ test to the folded profile and found that the detection significance in all cases was $<1\sigma$. The lack of detection of variability means that the geometry of the X-ray emission area may differ from that of the optical area.
The high-energy emission mechanism can be investigated by X-ray spectral analysis, despite the small number of X-ray photons. The source selection criterion was the same as that for the X-ray timing analysis above, while we used an 80-arcsec-radius circle around a source-free region to estimate the background spectrum. The response matrix was created using the XMMSAS task {\it rmfgen} and the ancillary response file was created using {\it arfgen}. The X-ray photons were further grouped to have at least 15 counts per spectral bin. No pile-up issue was addressed for this faint source.
The X-ray spectral fitting was achieved using {\tt XSPEC v12.9.0}. The X-ray emission from a contact binary system may come from a hot coronal plasma and may be represented with a thermal or non-thermal model. We tried two typical spectral models: non-thermal power law ({\tt XSPEC} model {\tt powerlaw}), and the thermal Bremsstrahlung ({\tt XSPEC} model {\tt bremss}) to fit the X-ray spectrum. The spectral fitting was calculated within the energy range 0.2--10 keV. We first set the $N_{\rm{H}}$ to be a free parameter and yielded a best-fit value of $2.7 \times 10^{-20}$ cm$^{-2}$, which is not very far from $3.65 \times 10^{-20}$ cm$^{-2}$ derived from Leiden/Argentine/Bonn (LAB) Survey \citep{Kalberla2005}. However, the uncertainty is $5 \times 10^{-21}$ cm$^{-2}$, which is too large to well constrain the $N_{\rm{H}}$ value. Therefore, we fixed the $N_{\rm{H}}$ value at the galactic one of $3.65 \times 10^{-20}$ cm$^{-2}$ in the following analysis. The power-law model yielded an acceptable fitting with a photon index of $2.4\pm0.5$ and a $\chi_{\nu}^2=1.09$. The uncertainties of spectral parameters are estimated within the 90 \% confidence interval. On the other hand, the thermal Bremsstrahlung model result in an equally good fitting with a slightly larger $\chi_{\nu}^2$ of 1.15 and a plasma temperature of $kT=0.8^{+1.4}_{-0.3}$\,keV. Both of the single component model can describe the X-ray spectrum of 2MASS J11201034$-$2201340 very well and no additional components are required. The best-fit parameters for the two models are given in Table \ref{spectral_fitting}, and the spectral data and corresponding best-fit models are shown in Figure \ref{powerlaw_spectrum}. The X-ray flux in the 0.3--10 keV energy range was estimated as $1.7^{+0.9}_{-0.5}\times10^{-14}$ erg cm$^{-2}$ s$^{-1}$.
\begin{table}
\centering
\caption{The best-fit parameters of two different models for the X-ray spectrum of 2MASS J11201034$-$2201340 obtained with {\it XMM-Newton}. }
\label{spectral_fitting}
\begin{tabular}{ccc}
\hline
& Power Law & Bremsstrahlung\tabularnewline
\hline
\hline
$\Gamma$ & $2.4\pm0.5$ & \nodata \\
$kT$ (eV) & \nodata & $0.8^{+1.4}_{-0.3}$ \\
Normalization & $4.2_{-1.3}^{+1.2}\times10^{-6}$ & $1.1_{-0.6}^{+1.0}\times 10^{-6}$ \\
$\chi_{\nu}^2$ (dof) & 1.09(12) & 1.15 (12)\\
\hline
\end{tabular}
\end{table}
\subsection{Indications from X-ray Emission}
Because the fitting of the optical folded light curve suggested the presence of a cool spot, the existence of X-ray emission suggests chromospheric activity. The result of the X-ray spectral fitting also suggests a possible non-thermal or thermal Bremsstrahlung origin for the X-ray emission. However, the X-ray orbital profile shows no significant variations, but this may be due to an insufficient number of X-ray photons. Considering the stability of star spots, it is possible that their position and size in these two observations are quite different. To investigate the origin of the X-ray emission and its connection to the star spot, simultaneous X-ray and optical observations using an X-ray telescope with a large effective area are necessary.
Although only $\sim$ 30X-ray photons were detected in all the {\it Swift}\ observations, we were able to estimate a crude X-ray spectrum and the corresponding X-ray flux by using the online tool provided by UK {\it Swift}\ Science Data Centre. The flux of X rays between 0.3 and 10 keV determined by {\it Swift}\ was $1.0^{+0.6}_{-0.5}\times10^{-14}$ erg cm$^{-2}$ s$^{-1}$, which is consistent with the value obtained by a single {\it XMM-Newton}\ observation ($1.7^{+0.9}_{-0.5}\times10^{-14}$ erg cm$^{-2}$ s$^{-1}$). This may indicate that no significant X-ray flare was detected during the {\it Swift}\ observations.
Using the distance estimated from the SED, the X-ray intensity was estimated to be $(0.7-1.5)\times 10^{30}$ erg s$^{-1}$. Factoring in the relationship between the X-ray intensity and the orbital period \citep{Chen2006}, 2MASS J11201034$-$2201340 is within a reasonable range on the X-ray intensity vs.~orbital period plot (see Figure \ref{lx_porb}). \citet{Stepien2001} categorized W UMa-type stars into hot $[(B-V)_0\leq0.6]$ and cool $[(B-V)_0>0.6]$ groups. The X-ray flux seems to positively correlate with the color index for the hot group, whereas it reaches a constant value after $(B-V)_0>0.6$. Judging from the SED fitting, 2MASS J11201034$-$2201340 is likely to be in the cool group. The ratio of the X-ray and bolometric fluxes, $\log(L_x/L_{bol})$, is roughly estimated to be between $-3$ and $-3.3$, which is reasonably close to the value presented in \citet{Stepien2001}. Accurate multi-band photometric observations and standard star calibration are required to investigate the nature of this system in detail.
\begin{figure}
\plotone{Lx_Porb.eps} \caption{The relation between the X-ray luminosity and orbital period for contact binaries. The red star denotes 2MASS J11201034$-$2201340 and the open circles are historical data adopted from \citet{Chen2006}. \label{lx_porb}}
\end{figure}
\section{Summary}\label{summary}
While searching for the X-ray and optical counterparts of millisecond pulsar candidates, we serendipitously detected the modulation of the uncataloged X-ray-emitting contact binary 2MASS J11201034$-$2201340. We presented a multi-wavelength investigation of the object because it is detectable from infrared to X-ray bands. We first detected 2MASS J11201034$-$2201340 after we combined all the {\it Swift}\ observations of 2FGL J1120.0$-$2204. The exact X-ray position was further confirmed by an {\it XMM-Newton}\ observation. For the optical band, the long-term CRTS light curve and SLT color measurements confirmed that the orbital period of this system is 0.288 day, which is between the values for A-type and W-type contact binaries. Photometric measurement data in the USNO-B 1.0, 2MASS, and WISE catalogs indicate that the broad-band SED of 2MASS J11201034$-$2201340 is that of a K-type star. We used the Wilson--Devinney code to fit the orbital profile in the R- and V-band follow-up light curves observed by the SLT and showed that this system is an A-type contact binary with a mass ratio of $\sim0.3$. Furthermore, we proposed a cool spot to explain the asymmetric orbital profile. In addition to the optical periodicity, the X-ray emission hints at the X-ray origin of this object. Although the number of X-ray photons was insufficient to obtain a significant X-ray orbital profile, the X-ray spectrum is likely to be nonthermal and thus can be linked to chromospheric activity and star spots. The X-ray flux, orbital period, and color index of 2MASS J11201034$-$2201340 all point to it being a typical contact binary. Additional multi-band observations with standard star calibrations and long-time-baseline monitoring should conclusively determine the physical properties of this object in detail.
\acknowledgments
This work made use of the data collected by {\it XMM-Newton}, an ESA science mission with instruments and contributions directly funded by ESA Member States and the USA (NASA). The {\it Swift}\ data was supplied by the UK {\it Swift}\ Science Data Centre at the University of Leicester. The orbital ephemeris is obtained using the data collected by the CRTS survey, which is supported by the U.S. National Science Foundation under grants AST-0909182. The LOT and SLT are maintained by the Graduate Institute of Astronomy, National Central University. The near infrared data is collected by the 2MASS, which is a joint project of the University of Massachusetts and the Infrared Processing and Analysis Center/California Institute of Technology, funded by the NASA and the National Science Foundation. The mid-infrared data was provided by the WISE, which is a joint project of the University of California, Los Angeles, and the Jet Propulsion Laboratory/California Institute of Technology, funded by NASA.
C.-P.~H. is supported by the NSC 101-2119-M008-007-MY3 grant from the Ministry of Science and Technology (MOST) of Taiwan and an ECS grant of Hong Kong Government under HKU 709713P. T.-C.~Y. and W.-H.~I. are supported by the MOST grant NSC 101-2119-M008-007-MY3 and MOST 104-2119-M-008-024. Y.~C. is supported by the MOST grant NSC 102-2112-M-008-020-MY3. L.~L. and S.-B.~Q. is supported by the Science Foundation of Yunnan Province (2012HC011) and the Chinese Natural Science Foundation (No.11133007 and No. 11325315). C.~Y.~H. is supported by the National Research Foundation of Korea through grant 2014R1A1A2058590. A.~K.~H.~K. is supported by the MOST grant 103-2628-M-007-003-MY3. P.~H.~T. is supported by the One Hundred Talents Program of the Sun Yat-Sen University. C.-C.~N. is supported by the MOST grant NSC 101-2112-M-008-017-MY3 and 104-2112-M-008-012-MY3. W.~P.~C. is supported by the MOST grants 103-2112-M-008-024-MY3.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.